Full Text:   <1564>

CLC number: TP309; TN929.3

On-line Access: 2021-07-20

Received: 2020-01-24

Revision Accepted: 2020-06-23

Crosschecked: 2021-03-16

Cited: 0

Clicked: 3269

Citations:  Bibtex RefMan EndNote GB/T7714

 ORCID:

Abolfazl Falahati

https://orcid.org/0000-0003-1682-6563

-   Go to

Article info.
Open peer comments

Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.7 P.1010-1019

http://doi.org/10.1631/FITEE.2000043


An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication


Author(s):  Masoud Kaveh, Abolfazl Falahati

Affiliation(s):  Department of Electrical Engineering, Iran University of Science and Technology, Tehran 13114-16846, Iran

Corresponding email(s):   afalahati@iust.ac.ir

Key Words:  Dolphin whistle, Improved Merkle hash tree, Secure underwater acoustic communication (UWAC)


Masoud Kaveh, Abolfazl Falahati. An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication[J]. Frontiers of Information Technology & Electronic Engineering, 2021, 22(7): 1010-1019.

@article{title="An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication",
author="Masoud Kaveh, Abolfazl Falahati",
journal="Frontiers of Information Technology & Electronic Engineering",
volume="22",
number="7",
pages="1010-1019",
year="2021",
publisher="Zhejiang University Press & Springer",
doi="10.1631/FITEE.2000043"
}

%0 Journal Article
%T An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
%A Masoud Kaveh
%A Abolfazl Falahati
%J Frontiers of Information Technology & Electronic Engineering
%V 22
%N 7
%P 1010-1019
%@ 2095-9184
%D 2021
%I Zhejiang University Press & Springer
%DOI 10.1631/FITEE.2000043

TY - JOUR
T1 - An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
A1 - Masoud Kaveh
A1 - Abolfazl Falahati
J0 - Frontiers of Information Technology & Electronic Engineering
VL - 22
IS - 7
SP - 1010
EP - 1019
%@ 2095-9184
Y1 - 2021
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/FITEE.2000043


Abstract: 
Recently, bionic signals have been used to achieve covert underwater acoustic communication (UWAC) with high signal-to-noise ratios (SNRs) over transmission systems. A high SNR allows the attackers to proceed with their mischievous goals and makes transmission systems vulnerable against malicious attacks. In this paper we propose an improved Merkle hash tree based secure scheme that can resist current underwater attacks, i.e., replay attack, fabricated message attack, message-altering attack, and analyst attack. Security analysis is performed to prove that the proposed scheme can resist these types of attacks. Performance evaluations show that the proposed scheme can meet UWAC limitations due to its efficiency regarding energy consumption, communication overhead, and computation cost.

基于改进Merkle哈希树的仿生水声通信安全方案

Masoud KAVEH,Abolfazl FALAHATI
伊朗科技大学电气工程系,伊朗德黑兰市,13114-16846
摘要:近来,在传输系统中仿生信号已用于实现具有高信噪比的隐蔽水声通信。高信噪比使得攻击者能实行恶意计划,导致传输系统易受恶意攻击。提出一种基于改进Merkle哈希树的安全方案,能够抵御当前水下攻击,具体包含重放攻击、伪造消息攻击、消息篡改攻击和分析攻击。进行安全性分析,证明所提方案能够抵抗这些类型的攻击。性能评估表明,该方案在能量消耗、通信开销和计算开销方面的效率可满足水声通信的限制要求。

关键词:海豚哨音;改进Merkle哈希树;安全水声通信(UWAC)

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article

Reference

[1]Ahmed M, Salleh M, Channa MI, 2017. Routing protocols based on node mobility for underwater wireless sensor network (UWSN): a survey. J Netw Comput Appl, 78:242-252.

[2]Dai W, 2019. Crypto++ 5.6.2 Benchmark13. http://www.cryptopp.com/

[3]Diffie W, Hellman M, 1976. New directions in cryptography. IEEE Trans Inform Theory, 22(6):644-654.

[4]Falahati A, Woodward B, Bateman SC, 1991. Underwater acoustic channel models for 4800 b/s QPSK signals. IEEE J Ocean Eng, 16(1):12-20.

[5]Ferguson N, Schroeppel R, Whiting D, 2001. A simple algebraic representation of Rijndael. Proc 8th Annual Int Workshop on Selected Areas in Cryptography, p.103-111.

[6]Han GJ, Jiang JF, Sun N, et al., 2015. Secure communication for underwater acoustic sensor networks. IEEE Commun Mag, 53(8):54-60.

[7]Han X, Yin JW, Du PY, et al., 2014. Experimental demonstration of underwater acoustic communication using bionic signals. J Appl Acoust, 78:7-10.

[8]Huang Y, Zhou SL, Shi ZJ, et al., 2016. Channel frequency response-based secret key generation in underwater acoustic systems. IEEE Trans Wirel Commun, 15(9):5875-5888.

[9]Jia YC, Liu GJ, Zhang LH, 2015. Bionic camouflage underwater acoustic communication based on sea lion sounds. Int Conf on Control, Automation and Information Sciences, p.1-5.

[10]Jiang SM, 2019. On securing underwater acoustic networks: a survey. IEEE Commun Surv Tutor, 21(1):729-752.

[11]Li H, He YH, Cheng XZ, et al., 2015. Security and privacy in localization for underwater sensor networks. IEEE Commun Mag, 53(11):56-62.

[12]Liu SZ, Qiao G, Yu Y, et al., 2013a. Biologically inspired covert underwater acoustic communication using high frequency dolphin clicks. IEEE Conf on Oceans, p.1-5.

[13]Liu SZ, Qiao G, Ismail A, 2013b. Covert underwater acoustic communication using dolphin sounds. J Acoust Soc Am, 133(4):EL300-EL306.

[14]Liu SZ, Ma TL, Gang Q, et al., 2016. Bionic communication by dolphin whistle with continuous-phase based on MSK modulation. Proc IEEE Int Conf on Signal Processing, Communications and Computing, p.1-5.

[15]Luo Y, Pu L, Peng Z, et al., 2016. RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements. IEEE Commun Mag, 54(2):32-38.

[16]Merkle RC, 1980. Protocols for public key cryptosystems. IEEE Symp on Security and Privacy, p.122-134.

[17]Mobasseri BG, Lynch RS, 2016. Information embedding in sonar by modifications of time-frequency properties. IEEE J Ocean Eng, 41(1):139-154.

[18]Mosavi MR, Kaveh M, 2018. Covert and secure underwater acoustic communication using Merkle hash tree and dolphin whistle. J Electron Cyber Def, 6(2):135-146.

[19]Mosavi MR, Kaveh M, Khishe M, et al., 2016. Design and implementation a sonar data set classifier by using MLP NN trained by improved biogeography-based optimization. Proc 2nd National Conf on Marine Technology, p.1-6.

[20]Mosavi MR, Kaveh M, Khishe M, et al., 2018. Design and implementation a sonar data set classifier using multi-layer perceptron neural network trained by elephant herding optimization. Iran J Mar Technol, 5(1):1-12.

[21]Rivest RL, Shamir A, Adleman L, 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM, 21(2):120-126.

[22]van Walree PA, Otnes R, 2013. Ultrawideband underwater acoustic communication channels. IEEE J Ocean Eng, 38(4):678-688.

[23]Yang TC, Yang WB, 2008. Performance analysis of direct-sequence spread-spectrum underwater acoustic communications with low signal-to-noise-ratio input signals. J Acoust Soc Am, 123(2):842-855.

[24]Zielinski A, Yoon YH, Wu LX, 1995. Performance analysis of digital acoustic communication in a shallow water channel. IEEE J Ocean Eng, 20(4):293-299.

Open peer comments: Debate/Discuss/Question/Opinion

<1>

Please provide your name, email address and a comment





Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2022 Journal of Zhejiang University-SCIENCE