§Context
for our work
–Application
Assumptions and Requirements
–Related
Work for WSN Authentication and RF Fingerprints
§Our
main Contributions:
–Definition
of a process to bind the physical layer to higher cryptographic layers in a WSN
–WSN
Authentication Attacks
§Conclusions and Future Work
–
§