|
|
|
|
|
|
|
|
|
|
§ |
Shown
how RF Fingerprints can be used in a distributed WSN
|
|
|
|
– |
Shown
how to use physical layer RF Fingerprints to produce ‘data layer’
credentials
|
|
§ |
Protocol
allows secure, resilient aggregation of RF Fingerprint
|
|
|
measurements
from multiple sources
|
|
|
§ |
Practicality
needs to be demonstrated
|
|
|
§ |
Formal
Security needs to be proved
|
|