2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) 2014
DOI: 10.1109/sahcn.2014.6990362
|View full text |Cite
|
Sign up to set email alerts
|

Securing underwater acoustic communications through analog network coding

Abstract: We propose a new secure underwater acoustic communication scheme designed to let a user (Alice) transmit a confidential message to another user (Bob) in the presence of an eavesdropper (Eve). A typical approach in conventional wireless physical-layer security is to rely on a friendly jammer to jam Eve through artificial noise (AN). Instead, for the first time, we propose a secure underwater communication scheme that relies on cooperative friendly jamming through CDMA-based analog network coding (ANC). The coop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 32 publications
(24 citation statements)
references
References 31 publications
0
22
0
1
Order By: Relevance
“…Each data packet contains a preamble, a chirp signals of duration 100 ms sweeping the bandwidth from 10 Hz to 5.12 kHz. The chirp signal is appended to each packet and is used for channel probing, symbol synchronization for chip-matched filtering, and multipath delay spread estimation [19]. The chirp signals are in baseband and are modulated by multiplying by the carrier fc before transmission.…”
Section: Underwater Lab Experimentsmentioning
confidence: 99%
“…Each data packet contains a preamble, a chirp signals of duration 100 ms sweeping the bandwidth from 10 Hz to 5.12 kHz. The chirp signal is appended to each packet and is used for channel probing, symbol synchronization for chip-matched filtering, and multipath delay spread estimation [19]. The chirp signals are in baseband and are modulated by multiplying by the carrier fc before transmission.…”
Section: Underwater Lab Experimentsmentioning
confidence: 99%
“…In some advertise environment, some nodes leads to an incorrect localization. The type of attacks is classified into the coordinated attacks and Non-Coordinated attacks [5].…”
Section: Modified Gdm Approachmentioning
confidence: 99%
“…To overcome these problems, some efficient resistant methods (node deployment schemes) have been introduced. Gradient Descent Secure Localization (GDSL) [2], Least Mean Square (LMS) [4], and Voting Based Scheme (VBS) [5] are the some of the important secured localization methods from location accuracy point of view. The localization error of these methods is almost same but the complexity of GDSL is comparatively less than the other methods.…”
Section: Introductionmentioning
confidence: 99%
“…For example, in [3], the authors proposed a secure underwater communication scheme based on cooperative friendly jamming, which is Jamming through Analog Network Coding (J-ANC). Unlike conventional cooperative jamming secure schemes, which employ artificial noise as a jamming source, J-ANC utilizes the same spreading code used by a legitimate link.…”
Section: Secure Communication In the Acoustic Physical Layermentioning
confidence: 99%