Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks

被引:10
|
作者
Diamant, Roee [1 ]
Tomasin, Stefano [2 ,3 ]
Ardizzon, Francesco [2 ,3 ]
Eccher, Davide [3 ,4 ]
Casari, Paolo [3 ,4 ]
机构
[1] Univ Haifa, Dept Marine Technol, IL-3498838 Haifa, Israel
[2] Univ Padua, Dept Informat Engn, I-35131 Padua, Italy
[3] Consorzio Nazl Interuniv Telecomunicazioni CNIT, I-43124 Parma, Italy
[4] Univ Trento, DISI, I-38123 Trento, Italy
关键词
Underwater acoustics; Propagation delay; Delays; Security; Routing protocols; Topology; Modems; Underwater acoustic networks; physical layer security; secret-key generation; time of flight; simulation; Bellhop; lake experiments; SECURE COMMUNICATION; TIME-SYNCHRONIZATION; AUTHENTICATION; LOCALIZATION; SCHEME;
D O I
10.1109/TIFS.2023.3280040
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the growing use of underwater acoustic communications and the recent adoption of standards in this field, it is becoming increasingly important to secure messages against eavesdroppers. In this paper, we focus on a physical-layer security solution to generate sequences of random bits (keys) between two devices (Alice and Bob) belonging to an underwater acoustic network (UWAN); the key must remain secret to a passive eavesdropper (Eve) not belonging to the UWAN. Our method is based on measuring the propagation delay of the underwater acoustic channel over multiple hops of the UWAN: this harvests the randomness in the UWAN topology and turns the slow sound propagation in water into an advantage against eavesdropping. Our key generation protocol includes a route discovery handshake, whereby all UWAN devices at intermediate hops accumulate their message processing delays. This enables Alice and Bob to compute the actual propagation delays along each route and to map such information to a sequence of bits. Finally, from these bit sequences, Alice and Bob obtain a secret key. We analyze the performance of the protocol theoretically and assess it via extensive simulations and field experiments.
引用
收藏
页码:3318 / 3333
页数:16
相关论文
共 50 条
  • [41] Exploiting FDD Channel Reciprocity for Physical Layer Secret Key Generation in IoT Networks
    Torshizi, Ehsan Olyaei
    Henkel, Werner
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (06) : 1268 - 1272
  • [42] LoRa-LiSK: A Lightweight Shared Secret Key Generation Scheme for LoRa Networks
    Junejo, Aisha Kanwal
    Benkhelifa, Fatma
    Wong, Boon
    Mccann, Julie A.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (06): : 4110 - 4124
  • [43] A simple method for secret-key generation between mobile users across networks
    Hua, Yingbo
    SIGNAL PROCESSING, 2025, 227
  • [44] Fast Secret Key Generation Based on Dynamic Private Pilot from Static Wireless Channels
    Huang, Yu
    Jin, Liang
    Wei, Hongquan
    Zhong, Zhou
    Zhang, Shengjun
    CHINA COMMUNICATIONS, 2018, 15 (11) : 171 - 183
  • [45] Poster: Secret Key Generation from CFR for OFDM TDD Systems Over Fading Channels
    Peng, Yuexing
    Alexandropoulos, George C.
    Wang, Peng
    Li, Yonghui
    Dac-Binh Ha
    2014 9TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2014, : 660 - 661
  • [46] Secret key generation from classical physics - Physical uncloneable functions
    Tuyls, Pim
    Skoric, Boris
    AMIWARE: HARDWARE TECHNOLOGY DRIVERS OF AMBIENT INTELLIGENCE, 2006, 5 : 421 - +
  • [47] Eliminating Privacy Amplification in Secret Key Generation from Wireless Channels
    Cao, Zhongqiang
    Wu, Xiaofu
    Zhu, Wei-ping
    Cui, Jingwu
    PROCEEDINGS OF THE 2015 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA CHINACOM 2015, 2015, : 266 - 271
  • [48] Fast Secret Key Generation Based on Dynamic Private Pilot from Static Wireless Channels
    Yu Huang
    Liang Jin
    Hongquan Wei
    Zhou Zhong
    Shengjun Zhang
    中国通信, 2018, 15 (11) : 171 - 183
  • [49] Lightweight Group Secret Key Generation Leveraging Non-Reconciled Received Signal Strength in Mobile Wireless Networks
    Li, Guyue
    Hu, Liangjun
    Hu, Aiqun
    2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2019,
  • [50] Pattern-reconfigurable antenna-assisted secret key generation from multipath fading channels
    Wan, Zheng
    Yan, Mengyao
    Huang, Kaizhi
    Zhong, Zhou
    Xu, Xiaoming
    Chen, Yajun
    Wu, Fan
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2023, 24 (12) : 1803 - 1814