§Shown
how RF Fingerprints can be used in a distributed WSN
–Shown
how to use physical layer RF Fingerprints to produce ‘data layer’
credentials
§Protocol
allows secure, resilient aggregation of RF Fingerprint measurements
from multiple sources
§Practicality
needs to be demonstrated
§Formal
Security needs to be proved