2021 Fifth Underwater Communications and Networking Conference (UComms) 2021
DOI: 10.1109/ucomms50339.2021.9598102
|View full text |Cite
|
Sign up to set email alerts
|

Physical Layer Security against an Informed Eavesdropper in Underwater Acoustic Channels: Feature Extraction and Quantization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…Channel impulse response features, such as its norm, a smooth sparseness measure, and the root-mean-square delay spread are exploited for key generation in [24], and demonstrated through experimental results. The works in [25], [26] extend the above by pursuing all steps of key generation including reconciliation and privacy amplification, showing acceptable bit disagreement ratios. The work in [27] investigates multipath-based features for secret key generation, with experimental results collected in a shallow-water experiment off the coast of Portugal.…”
Section: Literature Background and Contributionmentioning
confidence: 70%
“…Channel impulse response features, such as its norm, a smooth sparseness measure, and the root-mean-square delay spread are exploited for key generation in [24], and demonstrated through experimental results. The works in [25], [26] extend the above by pursuing all steps of key generation including reconciliation and privacy amplification, showing acceptable bit disagreement ratios. The work in [27] investigates multipath-based features for secret key generation, with experimental results collected in a shallow-water experiment off the coast of Portugal.…”
Section: Literature Background and Contributionmentioning
confidence: 70%
“…Possible candidates are the number of channel taps, the average tap power, the root mean square (RMS) delay, and the smoothed received power, as discussed in [19,20]. Still, another possible set of channel features is reported instead in [16].…”
Section: System Modelmentioning
confidence: 99%
“…In [16] and [17] a complete protocol for SKA in UWACs is proposed. Still, the proposed technique exploits a quantizer whose bin size is determined by the standard deviation of each feature, assuming an underlying Gaussian distribution.…”
Section: Introductionmentioning
confidence: 99%
“…Yet, underwater acoustic channels offer specific characteristics that can be exploited for security. For instance, the channel's spatial dependency and the long propagation delay offer a diversity gain that enables the exchange of cryptographic keys [7][8][9] or authentication [10], e.g., through physical layer security (PLS) schemes; the complex mobility patterns of drifting nodes and the timevarying channel impulse response could help prevent interception attacks; and the strong attenuation leads to sparse logical topologies that increase security by splitting communications across disjoint wireless links [11].…”
Section: Introductionmentioning
confidence: 99%