Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks

被引:10
|
作者
Diamant, Roee [1 ]
Tomasin, Stefano [2 ,3 ]
Ardizzon, Francesco [2 ,3 ]
Eccher, Davide [3 ,4 ]
Casari, Paolo [3 ,4 ]
机构
[1] Univ Haifa, Dept Marine Technol, IL-3498838 Haifa, Israel
[2] Univ Padua, Dept Informat Engn, I-35131 Padua, Italy
[3] Consorzio Nazl Interuniv Telecomunicazioni CNIT, I-43124 Parma, Italy
[4] Univ Trento, DISI, I-38123 Trento, Italy
关键词
Underwater acoustics; Propagation delay; Delays; Security; Routing protocols; Topology; Modems; Underwater acoustic networks; physical layer security; secret-key generation; time of flight; simulation; Bellhop; lake experiments; SECURE COMMUNICATION; TIME-SYNCHRONIZATION; AUTHENTICATION; LOCALIZATION; SCHEME;
D O I
10.1109/TIFS.2023.3280040
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the growing use of underwater acoustic communications and the recent adoption of standards in this field, it is becoming increasingly important to secure messages against eavesdroppers. In this paper, we focus on a physical-layer security solution to generate sequences of random bits (keys) between two devices (Alice and Bob) belonging to an underwater acoustic network (UWAN); the key must remain secret to a passive eavesdropper (Eve) not belonging to the UWAN. Our method is based on measuring the propagation delay of the underwater acoustic channel over multiple hops of the UWAN: this harvests the randomness in the UWAN topology and turns the slow sound propagation in water into an advantage against eavesdropping. Our key generation protocol includes a route discovery handshake, whereby all UWAN devices at intermediate hops accumulate their message processing delays. This enables Alice and Bob to compute the actual propagation delays along each route and to map such information to a sequence of bits. Finally, from these bit sequences, Alice and Bob obtain a secret key. We analyze the performance of the protocol theoretically and assess it via extensive simulations and field experiments.
引用
收藏
页码:3318 / 3333
页数:16
相关论文
共 50 条
  • [21] A Novel Physical Layer Secret Key Generation Method for Wireless Sensor Networks
    Aygul, Mehmet Ali
    Cirpan, Hakan Ali
    Arslan, Huseyin
    2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024, 2024, : 231 - 235
  • [22] Verification of Secret Key Generation from UWB Channel Observations
    Madiseh, Masoud Ghoreishi
    He, Shuai
    McGuire, Michael L.
    Neville, Stephen W.
    Dong, Xiaodai
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 593 - 597
  • [23] Code-based physical layer secret key generation in passive optical networks
    Baldi, Marco
    Chiaraluce, Franco
    Incipini, Lorenzo
    Ruffini, Marco
    AD HOC NETWORKS, 2019, 89 : 1 - 8
  • [24] Protecting Physical Layer Secret Key Generation from Active Attacks
    Mitev, Miroslav
    Chorti, Arsenia
    Belmega, E. Veronica
    Poor, H. Vincent
    ENTROPY, 2021, 23 (08)
  • [25] Secret key generation scheme from WiFi and LTE reference signals
    Ngassa, Christiane L. Kameni
    Moliere, Renaud
    Delaveau, Francois
    Sibille, Alain
    Shapira, Nir
    ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING, 2017, 91 (02) : 277 - 292
  • [26] Secret key generation scheme from WiFi and LTE reference signals
    Christiane L. Kameni Ngassa
    Renaud Molière
    François Delaveau
    Alain Sibille
    Nir Shapira
    Analog Integrated Circuits and Signal Processing, 2017, 91 : 277 - 292
  • [27] A survey on secret key generation mechanisms on the physical layer in wireless networks
    Shehadeh, Youssef El Hajj
    Hogrefe, Dieter
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 332 - 341
  • [28] Beam-Domain Secret Key Generation for Multi-User Massive MIMO Networks
    Chen, You
    Li, Guyue
    Sun, Chen
    Zhang, Junqing
    Jorswieck, Eduard
    Xiao, Bin
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [29] Secret Key Generation Rate With Power Allocation in Relay-Based LTE-A Networks
    Chen, Kan
    Natarajan, Balasubramaniam
    Shattil, Steve
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2424 - 2434
  • [30] A Temperature Prediction-Assisted Approach for Evaluating Propagation Delay and Channel Loss of Underwater Acoustic Networks
    Gao, Rui
    Liu, Jun
    Song, Shanshan
    Wang, En
    Gou, Yu
    Zhang, Tong
    Cui, Jun-hong
    2022 18TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN, 2022, : 781 - 785