2023
DOI: 10.1109/tifs.2023.3280040
|View full text |Cite
|
Sign up to set email alerts
|

Secret Key Generation From Route Propagation Delays for Underwater Acoustic Networks

Abstract: With the growing use of underwater acoustic communications and the recent adoption of standards in this field, it is becoming increasingly important to secure messages against eavesdroppers. In this paper, we focus on a physical-layer security solution to generate sequences of random bits (keys) between two devices (Alice and Bob) belonging to an underwater acoustic network (UWAN); the key must remain secret to a passive eavesdropper (Eve) not belonging to the UWAN. Our method is based on measuring the propaga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 52 publications
0
3
0
Order By: Relevance
“…As shown in Equations ( 12) and ( 13), given the slot length, adjusting the collector position will change the arrival order of packets sent by sensor nodes. On the contrary, we can also first select an arrival order of packets (e.g., di /v) to satisfy (14) and, then, try to find an achievable location for the collector that satisfies the selected arrival orders. Furthermore, in order to achieve maximal throughput, we want to find a perfect location for the collector under the minimum slot length.…”
Section: Design Of Sras-macmentioning
confidence: 99%
See 1 more Smart Citation
“…As shown in Equations ( 12) and ( 13), given the slot length, adjusting the collector position will change the arrival order of packets sent by sensor nodes. On the contrary, we can also first select an arrival order of packets (e.g., di /v) to satisfy (14) and, then, try to find an achievable location for the collector that satisfies the selected arrival orders. Furthermore, in order to achieve maximal throughput, we want to find a perfect location for the collector under the minimum slot length.…”
Section: Design Of Sras-macmentioning
confidence: 99%
“…Unfortunately, the cost and challenge are heavier for implementing encryption and the PLS in UANs than in TRNs. First, a portion of limited bandwidth is taken for regular updates of the secret key, not for data transmission [13,14]. Second, the security rate of the PLS approach is directly related to the estimation accuracy on the dynamic multi-path acoustic channel and underwater noise [15,16].…”
Section: Introductionmentioning
confidence: 99%
“…The study in [9] proposes to learn the advantage distillation process by using a dataset of observed channels from the legitimate parties and the attacker, respectively. The proposed protocol in [10] extracts common acoustic channel features between receiving and sending nodes. Then, each party uses these features to generate his/her own secret bits via a random sequence generator.…”
Section: Related Workmentioning
confidence: 99%