Location-based Physical Layer Authentication in Underwater Acoustic Communication Networks

被引:3
作者
Aman, Waqas [1 ]
Al-Kuwari, Saif [1 ]
Qaraqe, Marwa [1 ]
机构
[1] Hamad Bin Khalifa Univ, Qatar Fdn, Div Informat & Comp Technol, Coll Sci & Engn, Doha, Qatar
来源
2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING | 2023年
关键词
D O I
10.1109/VTC2023-Spring57618.2023.10199682
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Research in underwater communication is rapidly becoming attractive due to its various modern applications. An efficient mechanism to secure such communication is via physical layer security. In this paper, we propose a novel physical layer authentication (PLA) mechanism in underwater acoustic communication networks where we exploit the position/location of the transmitter nodes to achieve authentication. We perform transmitter position estimation from the received signals at reference nodes deployed at fixed positions in a predefined underwater region. We use time of arrival (ToA) estimation and derive the distribution of inherent uncertainty in the estimation. Next, we perform binary hypothesis testing on the estimated position to decide whether the transmitter node is legitimate or malicious. We then provide closed-form expressions of false alarm rate and missed detection rate resulted from binary hypothesis testing. We validate our proposal via simulation results, which demonstrate errors' behavior against the link quality, malicious node location, and receiver operating characteristic (ROC) curves. We also compare our results with the performance of previously proposed fingerprint mechanisms for PLA in underwater acoustic communication networks, for which we show a clear advantage of using the position as a fingerprint in PLA.
引用
收藏
页数:6
相关论文
共 22 条
[1]   Security of underwater and air-water wireless communication: State-of-the-art, challenges and outlook [J].
Aman, Waqas ;
Al-Kuwari, Saif ;
Muzzammil, Muhammad ;
Rahman, Muhammad Mahboob Ur ;
Kumar, Ambrish .
AD HOC NETWORKS, 2023, 142
[2]   Securing the Insecure: A First-Line-of-Defense for Body-Centric Nanoscale Communication Systems Operating in THz Band [J].
Aman, Waqas ;
Rahman, Muhammad Mahboob Ur ;
Abbas, Hasan T. ;
Khalid, Muhammad Arslan ;
Imran, Muhammad A. ;
Alomainy, Akram ;
Abbasi, Qammer H. .
SENSORS, 2021, 21 (10)
[3]   Impersonation Detection in Line-of-Sight Underwater Acoustic Sensor Networks [J].
Aman, Waqas ;
Rahman, Muhammad Mahboob Ur ;
Qadir, Junaid ;
Pervaiz, Haris ;
Ni, Qiang .
IEEE ACCESS, 2018, 6 :44459-44472
[4]   New results on the sum of Gamma random variates with application to the performance of wireless communication systems over Nakagami-m fading channels [J].
Ansari, Imran Shafique ;
Yilmaz, Ferkan ;
Alouini, Mohamed-Slim ;
Kucur, Oguz .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (01)
[5]   Your 802.11 wireless network has no clothes [J].
Arbaugh, WA ;
Shankar, N ;
Wan, YCJ ;
Zhang, K .
IEEE WIRELESS COMMUNICATIONS, 2002, 9 (06) :44-51
[6]   Distribution of a sum of weighted noncentral chi-square variables [J].
Castaño-Martínez, A ;
López-Blázquez, F .
TEST, 2005, 14 (02) :397-415
[7]   A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges [J].
Fattah, Salmah ;
Gani, Abdullah ;
Ahmedy, Ismail ;
Idris, Mohd Yamani Idna ;
Hashem, Ibrahim Abaker Targio .
SENSORS, 2020, 20 (18) :1-30
[8]   How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits [J].
Gidney, Craig ;
Ekera, Martin .
QUANTUM, 2021, 5
[9]  
Hao P, 2014, IEEE ICC, P939, DOI 10.1109/ICC.2014.6883440
[10]  
Kay StevenM., 1993, FUNDAMENTALS STAT SI