تعداد نشریات | 38 |
تعداد شمارهها | 1,240 |
تعداد مقالات | 8,992 |
تعداد مشاهده مقاله | 7,843,167 |
تعداد دریافت فایل اصل مقاله | 4,704,909 |
ارتباطات زیرآبی پنهان و امن مبتنی بر سوت دلفین و درخت مرکل | ||
پدافند الکترونیکی و سایبری | ||
مقاله 12، دوره 6، شماره 2 - شماره پیاپی 22، مرداد 1397، صفحه 135-146 اصل مقاله (1.23 M) | ||
نوع مقاله: مقاله پژوهشی | ||
نویسندگان | ||
سید محمدرضا موسوی میرکلائی* ؛ مسعود کاوه | ||
دانشکده مهندسی برق، دانشگاه علم و صنعت ایران | ||
تاریخ دریافت: 31 تیر 1396، تاریخ بازنگری: 01 اسفند 1397، تاریخ پذیرش: 28 شهریور 1397 | ||
چکیده | ||
شرایط و چالشهای منحصر به فرد موجود در کانالهای زیرآبی موجب میشود تا ارتباطات در این محیط در مقابل حملات بدخواهانه بسیار آسیبپذیر باشند. لذا در سالهای اخیر استفاده از سیگنالهای زیستی مانند سوت دلفین به منظور ایجاد ارتباطات پنهان و همچین به منظور استفاده از خواص فرکانسی بسیار مناسب این سیگنالها در زیر آب، پیشنهاد شده است. اما در این روش نیز نمیتوان به ارتباطات امن کامل در محیط زیر آب رسید، زیرا این سیگنالهای در همه آبها موجود نبوده و یا در حالتی بدتر، ممکن است دشمن به تجهیزاتی مجهز باشد که به هر طریقی قادر به آشکارسازی این سیگنالها در زیر آب باشد. لذا در این مقاله، روشی مبتنی بر درخت مرکل به هدف فراهم نمودن ارتباطی امن در همه حالتها متناسب با ویژگیهای محیط زیرآبی ارائه میشود تا در مقابل حملات ممکن در این محیط از جمله حمله بازپخش، حمله ارسال پیامهای جعلی، حمله تحلیل پیام و حمله اصلاح پیام مقاوم باشد. تحلیلهای امنیتی، نشان میدهند که روش ارائه شده در این مقاله در برابر همه حملات ذکر شده امن کامل بوده و سه شرط مهم تصدیق صحت، محرمانگی و بیعیبی پیام را برآورده میسازد. همچنین در بخش ارزیابی عملکرد این روش ثابت میشود که روش ارائه شده با توجه به محدودیتهای محیط زیرآب، بسیار مناسب بوده و نسبت روشهای سنتی رمزنگاری، عملکرد بهینهتری را در دو مولفه سربار مخابراتی و هزینههای محاسباتی از خود به جای میگذارد. | ||
کلیدواژهها | ||
ارتباطات زیرآبی پنهان و امن؛ سیگنالهای زیستی؛ سوت دلفین؛ تهدیدات زیرآبی؛ درخت مرکل | ||
عنوان مقاله [English] | ||
Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle | ||
نویسندگان [English] | ||
Seyyed Mohammadreza Mousavi Mirkalaei؛ Masoud Kaveh | ||
چکیده [English] | ||
The unique characteristics of the Underwater Acoustic Communication (UWAC) channel cause the UWAC systems to be very vulnerable to the malicious attacks. So, the bionic-based UWAC has been used due to its good covert performance, and its suitable frequency and correlation properties. It may not be covert in all the underwater environments, or an adversary can detect the message anyway. Therefore, this paper aims at proposing an improved Merkle hash tree based secure scheme that can resist the current possible underwater attacks, i.e., the replay attack, the fabricated message attack, the message altering attack, and the analyst attack. The security analysis indicates that the proposed scheme is resilient to the mentioned attacks. Also, the performance evaluations show that the proposed scheme is proportional to the UWAC limitations due to its efficiency in terms of energy consumption, communication overhead, and computation cost. | ||
کلیدواژهها [English] | ||
Bionic Signals, Covert and Secure UWAC, Dolphin Whistle, Malicious Attacks, Merkle Hash Tree | ||
مراجع | ||
[1] A. Falahati, B. Woodward, and S. C. Bateman, “Underwater Acoustic Channel Models for 4800 b/s QPSK Signals,” IEEE J. Oceanic Engineering, vol. 19, no. 1, pp. 12-20, 1991.## [2] A. Zielinski, Y. Yoon, and L. Wu, “Performance Analysis of Digital Acoustic Communication in a Shallow Water Channel,” IEEE J. Oceanic Engineering, vol. 20, no. 4, pp. 293-299, 1995.## [3] P. A. Walree and R. Otnes, “Ultrawideband Underwater Acoustic Communication Channels,” IEEE J. Oceanic Engineering, vol. 38, no. 4, pp. 678-688, 2013.## [4] A. C. Singer, J. K. Nelson, and S. S. Kozat, “Signal Processing for Underwater Acoustic Communications,” IEEE Communication Magazine, vol. 47, no. 1, pp. 90-96, 2009.## [5] T. C. Yang, “Correlation-Based Decision-Feedback Equalizer for Underwater Acoustic Communications,” IEEE J. Oceanic Engineering, vol. 30, no. 4, pp. 865-880, 2005.## [6] S. Hwang and P. Schniter, “Efficient Multicarrier Communication for Highly Spread Underwater Acoustic Channels,” IEEE J. Selected Areas in Communications, vol. 26, no. 9, pp. 1674-1683, 2008.## [7] M. Stojanovic and J. Preisig, “Underwater Acoustic Communication Channels: Propagation Models and Statistical Characterization,” IEEE Communication Magazine, vol. 47, no. 1, pp. 84-89, 2009.## [8] M. khishe, M. R. Mosavi, and M. Kaveh, “Improved Migration Models of Biogeography-Based Optimization for Sonar Dataset Classification by using Neural Network,” J. Applied Acoustics, vol. 118, no. 3, pp. 15-29, 2017.## [9] J. Ling, H. He, J. Li, and W. Roberts, “Covert Underwater Acoustic Communications: Transceiver Structures, Waveform Designs and Associated Performances,” IEEE Conf. Oceans 2010 MTS/IEEE Seattle, pp. 1-10, 2010.## [10] J. Ling, H. He, J. Li, and W. Roberts, “Covert Underwater Acoustic Communications,” J. Acoust. Soc. Am., vol. 128, no. 5, pp. 2898-2909. 2010.## [11] G. Leus and P. A. Walree, “Multiband OFDM for Covert Acoustic Communications,” IEEE J. Selected Areas in Communications, vol. 26, no. 9, pp. 1662-1673, 2008.## [12] G. Leus, P. Van Walree, J. Boschma, C. Fanciullacci, H. Gerritsen, and P. Tusoni, “Covert Underwater Communications with Multiband OFDM,” IEEE Conf. Oceans, pp. 1-8, 2008.## [13] Z. Hijaz, and V. S. Frost, “Exploiting OFDM Systems for Covert Communication,” in Military Communications Conference, pp. 2149-2155, 2010.## [14] P. Van Walree, E. Sangfelt, and G. Leus, “Multicarrier Spread Spectrum for Covert Acoustic Communications,” IEEE Conf. Oceans, pp. 264-271, 2008.## [15] T. C. Yang and W. B. Yang, “Low Probability of Detection Underwater Acoustic Communications using Direct-Sequence Spread Spectrum,” J. Acoust. Soc. Am, vol. 124, no. 6, pp. 3632-3647, 2008.## [16] T. C. Yang and W. B. Yang, “Performance Analysis of Direct-Sequence Spread-Spectrum Underwater Acoustic Communications with Low Signal-to-Noise-Ratio Input Signals,” J. Acoust. Soc. Am, vol. 123, no. 2, pp. 842-855, 2008.## [17] S. Liu, G. Qiao, and A. Ismail, “Covert Underwater Acoustic Communication using Dolphin Sounds,” J. Acoust. Soc. Am, vol. 133, no. 4, pp. 300-306, 2013.## [18] Y. Jia, G. Liu, and L. Zhang, “Bionic Camouflage Underwater Acoustic Communication based on Sea Lion Sounds,” International Conf. Control, Automation and Information Sciences, pp. 1-5, 2015.## [19] X, Han, J, Yin, P. Du, and X. Zhang, “Experimental Demonstration of Underwater Acoustic Communication Using Bionic Signals,” J. Applied Acoustics, vol. 78, no. 2, pp. 7-10. 2014.## [20] B. K. Branstetter, J. S. Trickey, K. Bakhtiari, A. Black, and H. Aihara, “Auditory Masking Patterns in Bottlenose Dolphins (Tursiops Truncatus) with Natural, Anthropogenic, and Synthesized Noise,” J. Acoust. Soc. Am, vol. 133, no. 3, pp. 1811-1819, 2013.## [21] C. Capus, A. Y. Pailhas, K. Brown, and D. M. Lane, “Bio-Inspired Wideband Sonar Signals based on Observations of The Bottlenose Dolphin (Tursiops Truncatus),” J. Acoust. Soc. Am, vol. 121, no. 1, pp. 594-605, 2007.## [22] S. Liu, G. Qiao, Y. Yu, L. Zhang, and T. Chen, “Biologically Inspired Covert Underwater Acoustic Communication using High Frequency Dolphin Clicks,” IEEE Conf. Oceans, pp. 1-5, 2013.## [23] L. Songzuo, M. Tianlong, and Q. Gang, “Bionic Communication by Dolphin Whistle with Continuous-Phase based on MSK Modulation,” International Conf. Signal Processing, pp. 1-5, 2016.## [24] R. Aubauerb and W. W. L. Au, “Phantom Echo Generation: A New Technique for Investigating Dolphin Echolocation,” J. Acoust. Soc. Am, vol. 104, no. 3, pp. 1164-1169, 1998.## [25] M. W. Muller, J. S. Allen, and W. W. L. Au, “Time-Frequency Analysis and Modeling of The Backscatter of Categorized Dolphin Echolocation Clicks for Target Discrimination,” J. Acoust. Soc. Am, vol. 124, no. 1, pp. 656-665, 2008.## [26] R. M. López and C. Bazúa, “Who Is Whistling? Localizing and Identifying Phonating Dolphins in Captivity,” J. Applied Acoustics, vol. 71, pp. 1057-1062, 2010.## [27] https://www.macaulaylibrary.org/## [28] Y. Huang, S. Zhou, Z. Shi, and L. Lai, “Channel Frequency Response based Secret Key Generation in Underwater Acoustic Systems,” IEEE Trans. Wireless Communications, vol. 15, no. 9, pp. 5875-5888, 2016.## [29] H. Kulhandjian, T. Melodia, and D. Koutsonikolas, “Securing Underwater Acoustic Communications through Analog Network Coding,” Proc. SECON, pp. 1-9, 2014.## [30] B. G. Mobasseri and R. S. Lynch, “Information Embedding in Sonar by Modifications of Time-Frequency Properties,” IEEE J. Oceanic Engineering, vol. 41, no. 1, pp. 139-154, 2016.## [31] M. C. Domingo, “Securing Underwater Wireless Communication Networks,” IEEE Communication Magazine, vol. 8, no. 1, pp. 22-28, 2011.## [32] G. Han, J. Jiang, N. Sun, and L. Shu, “Secure Communication for Underwater Acoustic Sensor Networks,” IEEE Communication Magazine, vol. 53, no. 8, pp. 54-60, 2015.## [33] G. Dini and A. L. Duca, “A Secure Communication Suite for Underwater Acoustic Sensor Networks,” Sensors- Basel, vol. 12, no. 11, pp. 133-58, 2012.## [34] Y. Chen, Y. Lin, and S. Lee, “A Mobicast Routing Protocol in Underwater Sensor Networks,” IEEE Conf. Wireless Communications and Networking, pp. 510-515, 2011.## [35] S. Misra, S. Dash, M. Khatua, A.V. Vasilakos, and M. S. Obaidat, “Jamming in Underwater Sensor Networks: Detection and Mitigation,” IET Commun., vol. 6, no. 14, pp. 2178-88, 2012.## [36] X. Lu and Z. Yonghua, “Modeling The Wormhole Attack in Underwater Sensor Network,” IEEE 8th International Conf. Wireless Communications, Networking and Mobile Computing, pp. 1-4, 2012.## [37] Y. Luo, L. Pu, Z. Peng, and Z. Shi, “RSS-Based Secret Key Generation in Underwater Acoustic Networks: Advantages, Challenges, and Performance Improvements,” IEEE Communication Magazine, vol. 54, no. 2, pp. 32-38, 2016.## [38] C. Lal, R. Petrocci, M. Conti, and J. Alves, “Secure Underwater Acoustic Networks: Current and Future Research Directions,” IEEE 3th Conf. Underwater Communications and Networking, pp. 1-5, 2016.## [39] H. Li, Y. He, X. Cheng, H. Zhu, and L. Sun, “Security and Privacy in Localization for Underwater Sensor Networks,” IEEE Communication Magazine, vol. 53, no. 11, pp. 56-62, 2015.## [40] G. Ateniese, et al., “SecFUN: Security Framework for Underwater Acoustic Sensor Networks,” IEEE 3th Conf. Oceans, pp. 1-9, 2015.## [41] M. Ahmed, M. Salleh, and M. Channa, “Routing Protocols Based on Node Mobility for Underwater Wireless Sensor Network: A Survey,” J. Network and Computer Applications, vol. 78, pp. 242-252, 2017.## [42] Y. Chen, and Y. Lin, “Mobicast Routing Protocol for Underwater Sensor Networks,” IEEE Sensors Jounal, vol. 13, no. 2, pp. 737-749, 2013.## [43] R. Merkle, “Protocols for Public Key Cryptosystems,” in Proc. IEEE Symp. Security and Privacy, pp. 122-134, 1980.## [44] H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, “An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid,” IEEE Systems Journal, vol. 8, no. 2, pp. 655-663, 2014.## [45] Y. Liu, C. Cheng, T. Gu, T. Jiang, and X. Li, “A Lightweight Authenticated Communication Scheme for Smart Grid,” IEEE Sensors Jounal, vol. 16, no. 3, pp. 836-842, 2015.## [46] N. Ferguson, R. Schroeppel, and D. Whiting, “A Simple Algebraic Representation of Rijndael,” in Proc. Sel. Areas Cryptogr., pp. 103-111, 2001.## [47] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Commun. of the ACM, pp. 120-126, 1978.## [48] W. Diffie, and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Information Theory, vol. 22, no. 6, 1976.## [49] W. Dai, Crypto++ 5.6.2 Benchmarks 2013. [Online]. Available: http:// www.cryptopp.com/.## [50] E. Shafiee, M. R. Mosavi and M. Moazedi, “Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers”, Journal of Electronical & Cyber Defence, Vol. 3, No. 1, pp.69-80, 2015. (in persian).## | ||
آمار تعداد مشاهده مقاله: 441 تعداد دریافت فایل اصل مقاله: 373 |