Conclusions and Future Work
§ Shown how RF Fingerprints can be used in a distributed WSN
Shown how to use physical layer RF Fingerprints to produce ‘data layer’ credentials
§ Protocol allows secure, resilient aggregation of RF Fingerprint
measurements from multiple sources
§ Practicality needs to be demonstrated
§ Formal Security needs to be proved