Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks

被引:13
作者
Diamant, Roee [1 ]
Tomasin, Stefano [2 ,3 ]
Ardizzon, Francesco [2 ,3 ]
Eccher, Davide [3 ,4 ]
Casari, Paolo [3 ,4 ]
机构
[1] Univ Haifa, Dept Marine Technol, IL-3498838 Haifa, Israel
[2] Univ Padua, Dept Informat Engn, I-35131 Padua, Italy
[3] Consorzio Nazl Interuniv Telecomunicazioni CNIT, I-43124 Parma, Italy
[4] Univ Trento, DISI, I-38123 Trento, Italy
关键词
Underwater acoustics; Propagation delay; Delays; Security; Routing protocols; Topology; Modems; Underwater acoustic networks; physical layer security; secret-key generation; time of flight; simulation; Bellhop; lake experiments; SECURE COMMUNICATION; TIME-SYNCHRONIZATION; AUTHENTICATION; LOCALIZATION; SCHEME;
D O I
10.1109/TIFS.2023.3280040
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the growing use of underwater acoustic communications and the recent adoption of standards in this field, it is becoming increasingly important to secure messages against eavesdroppers. In this paper, we focus on a physical-layer security solution to generate sequences of random bits (keys) between two devices (Alice and Bob) belonging to an underwater acoustic network (UWAN); the key must remain secret to a passive eavesdropper (Eve) not belonging to the UWAN. Our method is based on measuring the propagation delay of the underwater acoustic channel over multiple hops of the UWAN: this harvests the randomness in the UWAN topology and turns the slow sound propagation in water into an advantage against eavesdropping. Our key generation protocol includes a route discovery handshake, whereby all UWAN devices at intermediate hops accumulate their message processing delays. This enables Alice and Bob to compute the actual propagation delays along each route and to map such information to a sequence of bits. Finally, from these bit sequences, Alice and Bob obtain a secret key. We analyze the performance of the protocol theoretically and assess it via extensive simulations and field experiments.
引用
收藏
页码:3318 / 3333
页数:16
相关论文
共 55 条
[1]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[2]  
[Anonymous], 2018, PROC UCOMMS
[3]  
Bloch M., 2011, Physical-Layer Security: From Information Theory to Security Engineering
[4]   Towards optimal broadcasting policies for HARQ based on fountain codes in underwater networks [J].
Casari, Paolo ;
Rossi, Michele ;
Zorzi, Michele .
2008 FIFTH ANNUAL CONFERENCE ON WIRELESS ON DEMAND NETWORK SYSTEMS AND SERVICES, 2008, :11-19
[5]  
Catipovic J., 1993, Oceanography, V6, P112, DOI [10.5670/oceanog.1993.06, DOI 10.5670/OCEANOG.1993.06]
[6]   At-Sea NATO Operational Experimentation with Interoperable Underwater Assets Using Different Robotic Middlewares [J].
Costanzi, Riccardo ;
Fenucci, Davide ;
Manzari, Vincenzo ;
Micheli, Michele ;
Morlando, Luca ;
Natale, Daniele ;
Stifani, Mirko ;
Tesei, Alessandra ;
Caiti, Andrea .
TECHNOLOGY AND SCIENCE FOR THE SHIPS OF THE FUTURE (NAV 2018), 2018, :194-201
[7]  
Cover T. A., 2006, Elements of information theory, V2nd
[8]   Investigation of Underwater Acoustic Networking Enabling the Cooperative Operation of Multiple Heterogeneous Vehicles [J].
Cruz, Nuno A. ;
Ferreira, Bruno M. ;
Kebkal, Oleksiy ;
Matos, Anibal C. ;
Petrioli, Chiara ;
Petroccia, Roberto ;
Spaccini, Daniele .
MARINE TECHNOLOGY SOCIETY JOURNAL, 2013, 47 (02) :43-58
[9]   Cooperative Authentication in Underwater Acoustic Sensor Networks [J].
Diamant, Roee ;
Casari, Paolo ;
Tomasin, Stefano .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (02) :954-968
[10]  
Diamant R, 2017, WORKS POSIT NAVIGAT