2016
DOI: 10.1109/jsen.2015.2446465
|View full text |Cite
|
Sign up to set email alerts
|

A Half-Duplex Self-Protection Jamming Approach for Improving Secrecy of Block Transmissions in Underwater Acoustic Channels

Abstract: Block transmissions are commonly used in underwater acoustic communications due to the large delay spread of the underlying channels. In this paper, we propose a novel jamming protocol based on the half-duplex nature of the underwater transceivers and the block-based transmission structure, taking advantage of the large propagation delays of underwater acoustic channels to create interference at the eavesdropper without affecting the reception of the intended user. This half-duplex jamming protocol acts like a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(17 citation statements)
references
References 32 publications
1
16
0
Order By: Relevance
“…Eavesdropping attacks on UWASNs are studied in References 37 and 38. Specifically, Reference 37 considers a single eavesdropper Eve that attempts to overhear the ongoing communication between the nodes of a UWASN, and computes the success probability of Eve (ie, the probability that Eve can decode what she hears).…”
Section: Related Work and Contributions Of This Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Eavesdropping attacks on UWASNs are studied in References 37 and 38. Specifically, Reference 37 considers a single eavesdropper Eve that attempts to overhear the ongoing communication between the nodes of a UWASN, and computes the success probability of Eve (ie, the probability that Eve can decode what she hears).…”
Section: Related Work and Contributions Of This Workmentioning
confidence: 99%
“…Specifically, Reference 37 considers a single eavesdropper Eve that attempts to overhear the ongoing communication between the nodes of a UWASN, and computes the success probability of Eve (ie, the probability that Eve can decode what she hears). In Reference 38, the authors maximize the SR of a UWA channel that is under threat by a single eavesdropper Eve. Specifically, they suggest that the receiver node transmits a well‐crafted noise‐like signal that combines with transmitter's signal at Eve (which equivocates Eve)—thanks to the large propagation delays of the UWA channel.…”
Section: Related Work and Contributions Of This Workmentioning
confidence: 99%
“…A comprehensive discussion on the security attacks faced in UASNs is presented in Shahapur and Khanai [25]. A technique to improve the secrecy of block transmissions based on the half-duplex nature of the underwater transceivers in underwater acoustic channels is presented in Huang et al [26]. A few protocols are designed to handle the communication voids in the network [27,28].…”
Section: Related Workmentioning
confidence: 99%
“…From a different perspective, there are few more works that deal with the passive eavesdropping attacks in singlehop UWASNs [9], [10]. The work [9] considers a 2-D region (a disk) comprising multiple UWASN nodes (and one Eve node) distributed according to a Poisson point process.…”
Section: A Related Workmentioning
confidence: 99%