With the growing use of underwater acoustic communications and the recent adoption of standards in this field, it is becoming increasingly important to secure messages against eavesdroppers. In this paper, we focus on a physical-layer security solution to generate sequences of random bits (keys) between two devices (Alice and Bob) belonging to an underwater acoustic network (UWAN); the key must remain secret to a passive eavesdropper (Eve) not belonging to the UWAN. Our method is based on measuring the propagation delay of the underwater acoustic channel over multiple hops of the UWAN: this harvests the randomness in the UWAN topology and turns the slow sound propagation in water into an advantage against eavesdropping. Our key generation p...
As the research topics in ocean emerge, Underwater Acoustic Sensor Networks (UASNs) have become ever...
An Underwater Acoustic Network (UAN) raises many issues in terms of security. In this paper we focus...
Underwater wireless communication networks are particularly vulnerable to malicious attacks due to t...
We propose a method to let a source and a destination agree on a key that remains secret to a potent...
Physical layer security has been under extensive investigation in recent years in wireless radio com...
Abstract—Neighbor discovery is a fundamental requirement and need be done frequently in underwater a...
Advances in underwater acoustic telemetry have paved the way for emerging technologies, such as unde...
We tackle a fundamental security problem in underwater acoustic networks (UANs). The S-box in the ex...
As an emerging research area, underwater acoustic network (UAN) has attracted tremendous interests f...
Abstract—We propose a new secure underwater acoustic com-munication scheme designed to let a user (A...
The security and privacy of underwater acoustic sensor networks has received extensive attention rec...
There is an increasing requirement of the application of Underwater Acoustic Network (UAN) both in m...
Underwater Acoustic Networks (UANs) have long been recognized as an instrumental technology in vario...
This paper considers a line-of-sight underwater acoustic (UWA) sensor network consisting of M underw...
In this paper, we discuss the performance of multi-path routing techniques in underwater acoustic ne...
As the research topics in ocean emerge, Underwater Acoustic Sensor Networks (UASNs) have become ever...
An Underwater Acoustic Network (UAN) raises many issues in terms of security. In this paper we focus...
Underwater wireless communication networks are particularly vulnerable to malicious attacks due to t...
We propose a method to let a source and a destination agree on a key that remains secret to a potent...
Physical layer security has been under extensive investigation in recent years in wireless radio com...
Abstract—Neighbor discovery is a fundamental requirement and need be done frequently in underwater a...
Advances in underwater acoustic telemetry have paved the way for emerging technologies, such as unde...
We tackle a fundamental security problem in underwater acoustic networks (UANs). The S-box in the ex...
As an emerging research area, underwater acoustic network (UAN) has attracted tremendous interests f...
Abstract—We propose a new secure underwater acoustic com-munication scheme designed to let a user (A...
The security and privacy of underwater acoustic sensor networks has received extensive attention rec...
There is an increasing requirement of the application of Underwater Acoustic Network (UAN) both in m...
Underwater Acoustic Networks (UANs) have long been recognized as an instrumental technology in vario...
This paper considers a line-of-sight underwater acoustic (UWA) sensor network consisting of M underw...
In this paper, we discuss the performance of multi-path routing techniques in underwater acoustic ne...
As the research topics in ocean emerge, Underwater Acoustic Sensor Networks (UASNs) have become ever...
An Underwater Acoustic Network (UAN) raises many issues in terms of security. In this paper we focus...
Underwater wireless communication networks are particularly vulnerable to malicious attacks due to t...