I. Introduction
The concept of security encapsulates a set of ideas that includes authentication, integrity, and secrecy. This paper focuses on the authentication aspect of security; namely, can a node be identified solely by its transmission characteristics? We show that the answer is yes, subject to specifically identified tradeoffs in the stealth, robustness, and security of the system. For an authentication system, the uniqueness and nonreproducibility of the identification signal are of the utmost importance.