With the growing use of underwater acoustic communications and the recent adoption of standards in this field, it is becoming increasingly important to secure messages against eavesdroppers. In this paper, we focus on a physical-layer security solution to generate sequences of random bits (keys) between two devices (Alice and Bob) belonging to an underwater acoustic network (UWAN); the key must remain secret to a passive eavesdropper (Eve) not belonging to the UWAN. Our method is based on measuring the propagation delay of the underwater acoustic channel over multiple hops of the UWAN: this harvests the randomness in the UWAN topology and turns the slow sound propagation in water into an advantage against eavesdropping. Our key generation protocol includes a route discovery handshake, whereby all UWAN devices at intermediate hops accumulate their message processing delays. This enables Alice and Bob to compute the actual propagation delays along each route and to map such information to a sequence of bits. Finally, from these bit sequences, Alice and Bob obtain a secret key. We analyze the performance of the protocol theoretically and assess it via extensive simulations and field experiments.

Secret Key Generation from Route Propagation Delays for Underwater Acoustic Networks / Diamant, Roee; Tomasin, Stefano; Ardizzon, Francesco; Eccher, Davide; Casari, Paolo. - In: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. - ISSN 1556-6013. - 18:(2023), pp. 3318-3333. [10.1109/TIFS.2023.3280040]

Secret Key Generation from Route Propagation Delays for Underwater Acoustic Networks

Diamant, Roee;Casari, Paolo
2023-01-01

Abstract

With the growing use of underwater acoustic communications and the recent adoption of standards in this field, it is becoming increasingly important to secure messages against eavesdroppers. In this paper, we focus on a physical-layer security solution to generate sequences of random bits (keys) between two devices (Alice and Bob) belonging to an underwater acoustic network (UWAN); the key must remain secret to a passive eavesdropper (Eve) not belonging to the UWAN. Our method is based on measuring the propagation delay of the underwater acoustic channel over multiple hops of the UWAN: this harvests the randomness in the UWAN topology and turns the slow sound propagation in water into an advantage against eavesdropping. Our key generation protocol includes a route discovery handshake, whereby all UWAN devices at intermediate hops accumulate their message processing delays. This enables Alice and Bob to compute the actual propagation delays along each route and to map such information to a sequence of bits. Finally, from these bit sequences, Alice and Bob obtain a secret key. We analyze the performance of the protocol theoretically and assess it via extensive simulations and field experiments.
2023
Diamant, Roee; Tomasin, Stefano; Ardizzon, Francesco; Eccher, Davide; Casari, Paolo
Secret Key Generation from Route Propagation Delays for Underwater Acoustic Networks / Diamant, Roee; Tomasin, Stefano; Ardizzon, Francesco; Eccher, Davide; Casari, Paolo. - In: IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. - ISSN 1556-6013. - 18:(2023), pp. 3318-3333. [10.1109/TIFS.2023.3280040]
File in questo prodotto:
File Dimensione Formato  
casari_SecretKeyGeneration_Topology_UW_TIFS_2023_postprint.pdf

accesso aperto

Tipologia: Post-print referato (Refereed author’s manuscript)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 4.46 MB
Formato Adobe PDF
4.46 MB Adobe PDF Visualizza/Apri
casari_Secret_Key_Generation_from_Route_Propagation_Delays_for_Underwater_Acoustic_Networks_IEEE_TIFS.pdf

Solo gestori archivio

Descrizione: Versione editoriale
Tipologia: Versione editoriale (Publisher’s layout)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 2.65 MB
Formato Adobe PDF
2.65 MB Adobe PDF   Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/379030
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 8
  • ???jsp.display-item.citation.isi??? 5
social impact