CLC number: TP309; TN929.3
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2021-03-16
Cited: 0
Clicked: 5607
Masoud Kaveh, Abolfazl Falahati. An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication[J]. Frontiers of Information Technology & Electronic Engineering, 2021, 22(7): 1010-1019.
@article{title="An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication",
author="Masoud Kaveh, Abolfazl Falahati",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="22",
number="7",
pages="1010-1019",
year="2021",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2000043"
}
%0 Journal Article
%T An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
%A Masoud Kaveh
%A Abolfazl Falahati
%J Frontiers of Information Technology & Electronic Engineering
%V 22
%N 7
%P 1010-1019
%@ 2095-9184
%D 2021
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2000043
TY - JOUR
T1 - An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
A1 - Masoud Kaveh
A1 - Abolfazl Falahati
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 22
IS - 7
SP - 1010
EP - 1019
%@ 2095-9184
Y1 - 2021
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2000043
Abstract: Recently, bionic signals have been used to achieve covert underwater acoustic communication (UWAC) with high signal-to-noise ratios (SNRs) over transmission systems. A high SNR allows the attackers to proceed with their mischievous goals and makes transmission systems vulnerable against malicious attacks. In this paper we propose an improved Merkle hash tree based secure scheme that can resist current underwater attacks, i.e., replay attack, fabricated message attack, message-altering attack, and analyst attack. Security analysis is performed to prove that the proposed scheme can resist these types of attacks. Performance evaluations show that the proposed scheme can meet UWAC limitations due to its efficiency regarding energy consumption, communication overhead, and computation cost.
[1]Ahmed M, Salleh M, Channa MI, 2017. Routing protocols based on node mobility for underwater wireless sensor network (UWSN): a survey. J Netw Comput Appl, 78:242-252.
[2]Dai W, 2019. Crypto++ 5.6.2 Benchmark13. http://www.cryptopp.com/
[3]Diffie W, Hellman M, 1976. New directions in cryptography. IEEE Trans Inform Theory, 22(6):644-654.
[4]Falahati A, Woodward B, Bateman SC, 1991. Underwater acoustic channel models for 4800 b/s QPSK signals. IEEE J Ocean Eng, 16(1):12-20.
[5]Ferguson N, Schroeppel R, Whiting D, 2001. A simple algebraic representation of Rijndael. Proc 8th Annual Int Workshop on Selected Areas in Cryptography, p.103-111.
[6]Han GJ, Jiang JF, Sun N, et al., 2015. Secure communication for underwater acoustic sensor networks. IEEE Commun Mag, 53(8):54-60.
[7]Han X, Yin JW, Du PY, et al., 2014. Experimental demonstration of underwater acoustic communication using bionic signals. J Appl Acoust, 78:7-10.
[8]Huang Y, Zhou SL, Shi ZJ, et al., 2016. Channel frequency response-based secret key generation in underwater acoustic systems. IEEE Trans Wirel Commun, 15(9):5875-5888.
[9]Jia YC, Liu GJ, Zhang LH, 2015. Bionic camouflage underwater acoustic communication based on sea lion sounds. Int Conf on Control, Automation and Information Sciences, p.1-5.
[10]Jiang SM, 2019. On securing underwater acoustic networks: a survey. IEEE Commun Surv Tutor, 21(1):729-752.
[11]Li H, He YH, Cheng XZ, et al., 2015. Security and privacy in localization for underwater sensor networks. IEEE Commun Mag, 53(11):56-62.
[12]Liu SZ, Qiao G, Yu Y, et al., 2013a. Biologically inspired covert underwater acoustic communication using high frequency dolphin clicks. IEEE Conf on Oceans, p.1-5.
[13]Liu SZ, Qiao G, Ismail A, 2013b. Covert underwater acoustic communication using dolphin sounds. J Acoust Soc Am, 133(4):EL300-EL306.
[14]Liu SZ, Ma TL, Gang Q, et al., 2016. Bionic communication by dolphin whistle with continuous-phase based on MSK modulation. Proc IEEE Int Conf on Signal Processing, Communications and Computing, p.1-5.
[15]Luo Y, Pu L, Peng Z, et al., 2016. RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements. IEEE Commun Mag, 54(2):32-38.
[16]Merkle RC, 1980. Protocols for public key cryptosystems. IEEE Symp on Security and Privacy, p.122-134.
[17]Mobasseri BG, Lynch RS, 2016. Information embedding in sonar by modifications of time-frequency properties. IEEE J Ocean Eng, 41(1):139-154.
[18]Mosavi MR, Kaveh M, 2018. Covert and secure underwater acoustic communication using Merkle hash tree and dolphin whistle. J Electron Cyber Def, 6(2):135-146.
[19]Mosavi MR, Kaveh M, Khishe M, et al., 2016. Design and implementation a sonar data set classifier by using MLP NN trained by improved biogeography-based optimization. Proc 2nd National Conf on Marine Technology, p.1-6.
[20]Mosavi MR, Kaveh M, Khishe M, et al., 2018. Design and implementation a sonar data set classifier using multi-layer perceptron neural network trained by elephant herding optimization. Iran J Mar Technol, 5(1):1-12.
[21]Rivest RL, Shamir A, Adleman L, 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM, 21(2):120-126.
[22]van Walree PA, Otnes R, 2013. Ultrawideband underwater acoustic communication channels. IEEE J Ocean Eng, 38(4):678-688.
[23]Yang TC, Yang WB, 2008. Performance analysis of direct-sequence spread-spectrum underwater acoustic communications with low signal-to-noise-ratio input signals. J Acoust Soc Am, 123(2):842-855.
[24]Zielinski A, Yoon YH, Wu LX, 1995. Performance analysis of digital acoustic communication in a shallow water channel. IEEE J Ocean Eng, 20(4):293-299.
Open peer comments: Debate/Discuss/Question/Opinion
<1>