We consider the problem of discriminating a legitimate transmitter from an impersonating attacker in an underwater acoustic network under a physical layer security framework. In particular, we utilize features of the underwater acoustic channel such as the number of taps, the delay spread, and the received power. In the absence of a reliable statistical model of the underwater channel, we turn to a machine learning technique to extract the feature statistics and utilize them to distinguish between legitimate and fake transmissions. Numerical results show how, using only four channel features as input of either a neural network or an autoencoder, we achieve a good trade off between false alarm and detection rates. Moreover, cooperative techniques fusing soft decision statistics from multiple trusted nodes further outperform the discrimination capability of each separate node. Data from a sea trial carried out in Israeli eastern Mediterranean waters demonstrate the applicability of our approach.
With the growing use of underwater acoustic communications and the recent adoption of standards in this field, it is becoming increasingly important to secure messages against eavesdroppers. In this paper, we focus on a physical-layer security solution to generate sequences of random bits (keys) between two devices (Alice and Bob) belonging to an underwater acoustic network (UWAN); the key must remain secret to a passive eavesdropper (Eve) not belonging to the UWAN. Our method is based on measuring the propagation delay of the underwater acoustic channel over multiple hops of the UWAN: this harvests the randomness in the UWAN topology and turns the slow sound propagation in water into an advantage against eavesdropping. Our key generation protocol includes a route discovery handshake, whereby all UWAN devices at intermediate hops accumulate their message processing delays. This enables Alice and Bob to compute the actual propagation delays along each route and to map such information to a sequence of bits. Finally, from these bit sequences, Alice and Bob obtain a secret key. We analyze the performance of the protocol theoretically and assess it via extensive simulations and field experiments.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.