We consider the problem of discriminating a legitimate transmitter from an impersonating attacker in an underwater acoustic network under a physical layer security framework. In particular, we utilize features of the underwater acoustic channel such as the number of taps, the delay spread, and the received power. In the absence of a reliable statistical model of the underwater channel, we turn to a machine learning technique to extract the feature statistics and utilize them to distinguish between legitimate and fake transmissions. Numerical results show how, using only four channel features as input of either a neural network or an autoencoder, we achieve a good trade off between false alarm and detection rates. Moreover, cooperative techniques fusing soft decision statistics from multiple trusted nodes further outperform the discrimination capability of each separate node. Data from a sea trial carried out in Israeli eastern Mediterranean waters demonstrate the applicability of our approach.
Authentication of Underwater Acoustic Transmissions via Machine Learning Techniques / Bragagnolo, L.; Ardizzon, F.; Laurenti, N.; Casari, P.; Diamant, R.; Tomasin, S.. - (2021), pp. 255-260. (Intervento presentato al convegno COMCAS 2021 tenutosi a Tel Aviv, Israel nel 1-3 November 2021) [10.1109/COMCAS52219.2021.9629031].
Authentication of Underwater Acoustic Transmissions via Machine Learning Techniques
Casari P.;
2021-01-01
Abstract
We consider the problem of discriminating a legitimate transmitter from an impersonating attacker in an underwater acoustic network under a physical layer security framework. In particular, we utilize features of the underwater acoustic channel such as the number of taps, the delay spread, and the received power. In the absence of a reliable statistical model of the underwater channel, we turn to a machine learning technique to extract the feature statistics and utilize them to distinguish between legitimate and fake transmissions. Numerical results show how, using only four channel features as input of either a neural network or an autoencoder, we achieve a good trade off between false alarm and detection rates. Moreover, cooperative techniques fusing soft decision statistics from multiple trusted nodes further outperform the discrimination capability of each separate node. Data from a sea trial carried out in Israeli eastern Mediterranean waters demonstrate the applicability of our approach.File | Dimensione | Formato | |
---|---|---|---|
COMCAS21_authentication_ML.pdf
accesso aperto
Descrizione: Articolo principale
Tipologia:
Post-print referato (Refereed author’s manuscript)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
360.38 kB
Formato
Adobe PDF
|
360.38 kB | Adobe PDF | Visualizza/Apri |
Authentication_of_Underwater_Acoustic_Transmissions_via_Machine_Learning_Techniques.pdf
Solo gestori archivio
Tipologia:
Versione editoriale (Publisher’s layout)
Licenza:
Tutti i diritti riservati (All rights reserved)
Dimensione
443.8 kB
Formato
Adobe PDF
|
443.8 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione