We propose a method to let a source and a destination agree on a key that remains secret to a potential eavesdropper in an underwater acoustic network (UWAN). We generate the key from the propagation delay measured over a set of multihop routes: this harvests the randomness in the UWAN topology and turns the slow sound propagation in the water into an advantage for the key agreement protocol. Our scheme relies on a route discovery handshake. During this process, all intermediate relays accumulate message processing delays, so that both the source and the destination can compute the actual propagation delays along each route, and map this information to a string of bits. Finally, via a secret key agreement from the information-theoretic security framework, we obtain an equal set of bits at the source and destination, which is provably secret to a potential eavesdropper located away from both nodes. Our simulation results show that, even for small UWANs of 4 nodes, we obtain 11 secret bits per explored topology, and that the protocol is insensitive to an average node speed of up to 0.5 m/s.

Topology-based Secret Key Generation for Underwater Acoustic Networks / Diamant, R.; Casari, P.; Tomasin, S.. - (2021), pp. 1-5. (Intervento presentato al convegno UCOMMS tenutosi a Lerici, Italy nel 2021) [10.1109/UComms50339.2021.9598062].

Topology-based Secret Key Generation for Underwater Acoustic Networks

P. Casari;
2021-01-01

Abstract

We propose a method to let a source and a destination agree on a key that remains secret to a potential eavesdropper in an underwater acoustic network (UWAN). We generate the key from the propagation delay measured over a set of multihop routes: this harvests the randomness in the UWAN topology and turns the slow sound propagation in the water into an advantage for the key agreement protocol. Our scheme relies on a route discovery handshake. During this process, all intermediate relays accumulate message processing delays, so that both the source and the destination can compute the actual propagation delays along each route, and map this information to a string of bits. Finally, via a secret key agreement from the information-theoretic security framework, we obtain an equal set of bits at the source and destination, which is provably secret to a potential eavesdropper located away from both nodes. Our simulation results show that, even for small UWANs of 4 nodes, we obtain 11 secret bits per explored topology, and that the protocol is insensitive to an average node speed of up to 0.5 m/s.
2021
Proceedings - UCOMMS
United States
IEEE
978-1-7281-9315-1
978-1-7281-9316-8
Diamant, R.; Casari, P.; Tomasin, S.
Topology-based Secret Key Generation for Underwater Acoustic Networks / Diamant, R.; Casari, P.; Tomasin, S.. - (2021), pp. 1-5. (Intervento presentato al convegno UCOMMS tenutosi a Lerici, Italy nel 2021) [10.1109/UComms50339.2021.9598062].
File in questo prodotto:
File Dimensione Formato  
c102_2020_UCOMMS_Underwater_key_generation_network_delay.pdf

accesso aperto

Tipologia: Post-print referato (Refereed author’s manuscript)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 461.23 kB
Formato Adobe PDF
461.23 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/289807
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 1
social impact