4
WSN Authentication using RF Fingerprints (D. Knox and T. Kunz)
Presentation Outline
§Context for our work
–Application Assumptions and Requirements
–Related Work for WSN Authentication and RF Fingerprints
§Our main Contributions:
–Definition of a process to bind the physical layer to higher cryptographic layers in a WSN
–WSN Authentication Attacks
§Conclusions and Future Work
–
§