Our Contributions
§ We propose a method to bind RF fingerprints to more standard
existing cryptographic mechanisms (binding the physical layer to the
‘data layer’)
Based on a method proposed by Burmester and Desmedt in 1998 for establishing a
group conference key
Allows neighbour discovery to take place
§ Practical implementation issues for WSNs are considered:
Distributed solution proposed (no online or centralized Trusted Authority is
required)
‘Noisy’ RF fingerprints can still be used for authentication
Attacks on authentication using RF Fingerprints are briefly presented