Physical Layer Security against an Informed Eavesdropper in Underwater Acoustic Channels: Reconciliation and Privacy Amplification

George Sklivanitis, Konstantinos Pelekanakis, S. Yildirim, R. Petroccia, J. Alves, D. Pados
{"title":"Physical Layer Security against an Informed Eavesdropper in Underwater Acoustic Channels: Reconciliation and Privacy Amplification","authors":"George Sklivanitis, Konstantinos Pelekanakis, S. Yildirim, R. Petroccia, J. Alves, D. Pados","doi":"10.1109/UComms50339.2021.9598159","DOIUrl":null,"url":null,"abstract":"We propose a strategy for generating the same crypto-key between two trusted underwater acoustic nodes (Alice and Bob) without revealing it to an eavesdropper (Eve). Our work builds upon the results of [1] where a methodology for generating a string of bits for Alice, Bob and Eve based on channel feature extraction and quantization is discussed. In this paper, we aim to reconcile the respective bits of Alice and Bob while minimizing the information leaked to Eve. To this end, we examine various Reed Solomon (RS) codes and measure the reconciliation rate of Alice, Bob and Eve. Additionally, we propose the Secure Hash Algorithm-3 (SHA-3) as means to eliminate any information that Eve acquires during reconciliation. We evaluate our reconciliation and privacy amplification strategies with bits generated from real underwater acoustic channel probe exchanges between Alice and Bob and Bellhop-simulated channels for Eve. Our analysis confirms that appropriate combinations of channel features and RS codes lead to a computationally secure generation of a 256-bit crypto-key according to the principles of the National Institute of Standards and Technology (NIST), even if Eve is informed about the RS encoder and the SHA-3 function.","PeriodicalId":371411,"journal":{"name":"2021 Fifth Underwater Communications and Networking Conference (UComms)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Fifth Underwater Communications and Networking Conference (UComms)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UComms50339.2021.9598159","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

We propose a strategy for generating the same crypto-key between two trusted underwater acoustic nodes (Alice and Bob) without revealing it to an eavesdropper (Eve). Our work builds upon the results of [1] where a methodology for generating a string of bits for Alice, Bob and Eve based on channel feature extraction and quantization is discussed. In this paper, we aim to reconcile the respective bits of Alice and Bob while minimizing the information leaked to Eve. To this end, we examine various Reed Solomon (RS) codes and measure the reconciliation rate of Alice, Bob and Eve. Additionally, we propose the Secure Hash Algorithm-3 (SHA-3) as means to eliminate any information that Eve acquires during reconciliation. We evaluate our reconciliation and privacy amplification strategies with bits generated from real underwater acoustic channel probe exchanges between Alice and Bob and Bellhop-simulated channels for Eve. Our analysis confirms that appropriate combinations of channel features and RS codes lead to a computationally secure generation of a 256-bit crypto-key according to the principles of the National Institute of Standards and Technology (NIST), even if Eve is informed about the RS encoder and the SHA-3 function.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
水声信道中针对知情窃听者的物理层安全:和解与隐私放大
我们提出一种策略,在两个可信的水声节点(Alice和Bob)之间生成相同的加密密钥,而不会将其泄露给窃听者(Eve)。我们的工作建立在[1]的结果之上,其中讨论了基于信道特征提取和量化为Alice, Bob和Eve生成一串比特的方法。在本文中,我们的目标是调和Alice和Bob各自的比特,同时最小化泄露给Eve的信息。为此,我们研究了各种里德·所罗门码,并测量了爱丽丝、鲍勃和夏娃的和解率。此外,我们提出了安全哈希算法-3 (SHA-3)作为消除Eve在和解过程中获得的任何信息的手段。我们用Alice和Bob之间的真实水声通道探针交换和Eve的bellhop模拟通道产生的比特来评估我们的和解和隐私放大策略。我们的分析证实,根据美国国家标准与技术研究所(NIST)的原则,即使Eve被告知RS编码器和SHA-3功能,信道特征和RS代码的适当组合也会导致256位加密密钥的计算安全生成。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Topology-based Secret Key Generation for Underwater Acoustic Networks Enhancing JANUS Signaling Experimental evaluation of an FPGA based Real-Time Doppler estimator Polar Coded Non-Coherent Acoustic Underwater Communication An Adaptive Transmission Power Controller for Flooding-based Underwater Network Protocols
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1