2020
DOI: 10.1109/access.2020.2970746
|View full text |Cite
|
Sign up to set email alerts
|

A Basic Bio-Inspired Camouflage Communication Frame Design and Applications for Secure Underwater Communication Among Military Underwater Platforms

Abstract: Many marine mammal species, such as different kinds of whales and dolphins, live together in groups. Although having no nice eyesight, they can accomplish cooperative foraging, inter-communication and group sailing very efficiently and accurately only depending on their sound. Generally, present interception systems almost always classify biological signals as ocean noise and try to filter them out. In addition, the covertness and security are very important for many military underwater platforms (MUPs) and th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 58 publications
0
8
0
Order By: Relevance
“…Recent studies have verified the efficiency and feasibility of this scheme in IoUT, when the transmitted signal is camouflaged with marine mammal voices (e.g. killer whales) [100], ship-radiated noise [101], etc. On the other hand, secure protocols can also be employed by IoUT architectural layers for ensuring network-threat-resilient underwater communications.…”
Section: H Iout Network Securitymentioning
confidence: 92%
See 1 more Smart Citation
“…Recent studies have verified the efficiency and feasibility of this scheme in IoUT, when the transmitted signal is camouflaged with marine mammal voices (e.g. killer whales) [100], ship-radiated noise [101], etc. On the other hand, secure protocols can also be employed by IoUT architectural layers for ensuring network-threat-resilient underwater communications.…”
Section: H Iout Network Securitymentioning
confidence: 92%
“…In addition to the above methods, camouflaged data transmission is another creative technique of covert communications. Generally speaking, the eavesdropping systems classify engine sounds, environmental noises, and biological voices as ocean noise and try to filter them [100]. Here, the underwater acoustic communications can benefit from shaping their output signals in accordance to the time and frequency features of a targeted chaotic signal.…”
Section: H Iout Network Securitymentioning
confidence: 99%
“…Since the usage of sound to achieve covert UAC was first proposed by the Office of Naval Research in 2001 [16], many BC-UAC methods have been proposed [17][18][19][20][21][22][23][24][25][26][27][28][29][30][31].…”
Section: Submarinementioning
confidence: 99%
“…Tests in simulations and sea experiments show good BER with error correction coding, and a good level of mimicry. Jiajia et al 10 encode the information to be transmitted into the inter-click intervals of killer whale vocalizations used to localize targets. Similarly, Ahn et al 11 propose to encode bit sequences in the transition between different types of mimicked dolphin whistles, and resort to machine learning to identify different whistles in the spectrogram of a received acoustic signal.…”
Section: Introductionmentioning
confidence: 99%
“…Our work informs biomimicking system design based on engineered as well as played-back animal sounds by evaluating how the emitted signals really resemble natural sounds. In fact, time-based signal modulations 10 , 17 , 19 , frequency-based modulations 9 , 13 , and even direct playback 12 , 16 can be put in jeopardy if the last element of the transmitter chain (i.e., the transducer) exposes the emitted signal as a non-natural one.…”
Section: Introductionmentioning
confidence: 99%