With the introduction of standards in underwater acoustic communications, protecting the content of packets sent underwater has become a pressing need. Since underwater devices can be compromised over long-term deployments, navies are reluctant to use encryption devices on the one hand; and on the other hand, they require secure communication without the use of pre-agreed secret keys for flexibility. To answer this demand, here we present a key agreement protocol to generate secret keys from the channel impulse response (CIR) between Alice and Bob. Considering the time-varying nature of the underwater acoustic CIR, our key generator is based on the parameters of the distribution of the random features that characterize the CIR rather than directly on the features themselves. Assuming CIR reciprocity, we estimate the CIR by transmitting probe signals between Alice and Bob, and synchronize the probe transmissions such that signals fly by each other while still respecting the half-duplex constraints of underwater acoustic modems. In turn, Alice and Bob's packets arriving to Eve, the attacker, expose different CIRs and possibly collide. Modeled simulation results show agreement between the keys generated by Alice and Bob, and a significant difference with respect to the keys obtained by Eve.

A Key Agreement Algorithm for Securing Underwater Acoustic Communications

Casari, Paolo;Ardizzon, Francesco;Tomasin, Stefano;
2024

Abstract

With the introduction of standards in underwater acoustic communications, protecting the content of packets sent underwater has become a pressing need. Since underwater devices can be compromised over long-term deployments, navies are reluctant to use encryption devices on the one hand; and on the other hand, they require secure communication without the use of pre-agreed secret keys for flexibility. To answer this demand, here we present a key agreement protocol to generate secret keys from the channel impulse response (CIR) between Alice and Bob. Considering the time-varying nature of the underwater acoustic CIR, our key generator is based on the parameters of the distribution of the random features that characterize the CIR rather than directly on the features themselves. Assuming CIR reciprocity, we estimate the CIR by transmitting probe signals between Alice and Bob, and synchronize the probe transmissions such that signals fly by each other while still respecting the half-duplex constraints of underwater acoustic modems. In turn, Alice and Bob's packets arriving to Eve, the attacker, expose different CIRs and possibly collide. Modeled simulation results show agreement between the keys generated by Alice and Bob, and a significant difference with respect to the keys obtained by Eve.
2024
Proc. of OCEANS 2024 - Singapore
OCEANS 2024 - Singapore
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/3535163
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
  • OpenAlex ND
social impact