As underwater acoustic communication technologies become mature and underwater networks evolve into reliable solutions for data communications, authenticating transmitted data turns from an option to a necessity. In this paper, we explore physical-layer authentication for an underwater acoustic networks with mobile devices. We choose the power-weighted average of the channel taps' arrival delay as the main authentication feature. We then develop a Kalman filter approach to track the evolution of this feature in the presence of mobility. The filter computes an innovation metric for each new transmission, which is processed to determine if a signal originates from a legitimate network node. Simulation results obtained from a dataset generated with Bellhop show that our authentication mechanism successfully distinguishes between legitimate and impersonating transmitters. Moreover, we show that linearly combining innovation readings from multiple sensors yields a good low-complexity classifier, and assess the impact of the transmitter speed on the authentication performance.
Physical Layer Authentication in Underwater Acoustic Networks with Mobile Devices
Casari P.;Ardizzon F.;Tomasin S.
2022
Abstract
As underwater acoustic communication technologies become mature and underwater networks evolve into reliable solutions for data communications, authenticating transmitted data turns from an option to a necessity. In this paper, we explore physical-layer authentication for an underwater acoustic networks with mobile devices. We choose the power-weighted average of the channel taps' arrival delay as the main authentication feature. We then develop a Kalman filter approach to track the evolution of this feature in the presence of mobility. The filter computes an innovation metric for each new transmission, which is processed to determine if a signal originates from a legitimate network node. Simulation results obtained from a dataset generated with Bellhop show that our authentication mechanism successfully distinguishes between legitimate and impersonating transmitters. Moreover, we show that linearly combining innovation readings from multiple sensors yields a good low-complexity classifier, and assess the impact of the transmitter speed on the authentication performance.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.