A Lightweight Secure Scheme for Underwater Wireless Acoustic Network

被引:2
作者
Shi, Jia [1 ]
Wu, Jinqiu [1 ]
Zhao, Zhiwei [1 ]
Qi, Xiaofei [1 ]
Zhang, Wenbo [1 ]
Qiao, Gang [1 ,2 ]
Zuo, Dahong [1 ]
机构
[1] Peng Cheng Lab, Dept Strateg & Adv Interdisciplinary Res, Shenzhen 518055, Peoples R China
[2] Haerbin Engn Univ, Coll Underwater Acoust Engn, Harbin 150009, Peoples R China
基金
中国国家自然科学基金;
关键词
authentication; bit commitment; threshold secret sharing; self-certifying; underwater acoustic networks (UANs); QUANTUM BIT COMMITMENT; AUTHENTICATION;
D O I
10.3390/jmse12050831
中图分类号
U6 [水路运输]; P75 [海洋工程];
学科分类号
0814 ; 081505 ; 0824 ; 082401 ;
摘要
Due to the open underwater channels and untransparent network deployment environments, underwater acoustic networks (UANs) are more vulnerable to hostile environments. Security research is also being conducted in cryptography, including authentication based on asymmetric algorithms and key distribution based on symmetric algorithms. In recent years, the advancement of quantum computing has made anti-quantum attacks an important issue in the field of security. Algorithms such as lattice and SPHINCS+ have become a research topic of interest in the field of security. However, within the past five years, few papers have discussed security algorithms for UANs to resist quantum attacks, especially through classical algorithms. Some existing classical asymmetric and symmetric algorithms are considered to have no prospects. From the perspective of easy deployment in engineering and anti-quantum attacks, our research focuses on a comprehensive lightweight security framework for data protection, authentication, and malicious node detection through the Elliptic Curve and Hash algorithms. Our mechanism is suitable for ad hoc scenarios with limited underwater resources. Meanwhile, we have designed a multi-party bit commitment to build a security framework for the system. A management scheme is designed by combining self-certifying with the threshold sharing algorithm. All schemes are designed based on certificate-less and ad hoc features. The proposed scheme ensures that the confidentiality, integrity, and authentication of the system are well considered. Moreover, the scheme is proven to be of unconditional security and immune to channel eavesdropping. The resource and delay issues are also taken into consideration. The simulations considered multiple variables like number of nodes, attackers, and message length to calculate proper values that can increase the efficiency of this scheme. The results in terms of delay, delivery ratio, and consumption demonstrate the suitability of the proposal in terms of security, especially for malicious node detection. Meanwhile, the computational cost has also been controlled at the millisecond level.
引用
收藏
页数:19
相关论文
共 37 条
[1]  
Al Ebri N., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P40
[2]   Adversarial Learning for Advantage Distillation in Secret Key Agreement Over UWAC [J].
Ardizzon, Francesco ;
Giuliani, Amedeo ;
Laurenti, Nicola ;
Tomasin, Stefano .
2023 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS, ICC WORKSHOPS, 2023, :715-720
[3]  
Bao Xuan, 2023, 2023 3rd International Conference on Intelligent Communications and Computing (ICC), P132, DOI 10.1109/ICC59986.2023.10421485
[4]  
Baumgart I, 2007, INT C PAR DISTRIB SY, P579
[5]  
Blum M., 1982, Digest of Papers Spring COMPCON 82. High Technology in the Information Industry, P133, DOI 10.1145/1008908.1008911
[6]   A Handover Authentication Using Credentials Based on Chameleon Hashing [J].
Choi, Jaeduck ;
Jung, Souhwan .
IEEE COMMUNICATIONS LETTERS, 2010, 14 (01) :54-56
[7]   Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks [J].
Diamant, Roee ;
Tomasin, Stefano ;
Ardizzon, Francesco ;
Eccher, Davide ;
Casari, Paolo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :3318-3333
[8]   Cooperative Authentication in Underwater Acoustic Sensor Networks [J].
Diamant, Roee ;
Casari, Paolo ;
Tomasin, Stefano .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (02) :954-968
[9]   A secure routing scheme for underwater acoustic networks [J].
Du, Xiujuan ;
Peng, Chunyan ;
Li, Keqin .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (06) :1-13
[10]   Computational problems in supersingular elliptic curve isogenies [J].
Galbraith, Steven D. ;
Vercauteren, Frederik .
QUANTUM INFORMATION PROCESSING, 2018, 17 (10)