[1] A. Falahati, B. Woodward, and S. C. Bateman, “Underwater Acoustic Channel Models for 4800 b/s QPSK Signals,” IEEE J. Oceanic Engineering, vol. 19, no. 1, pp. 12-20, 1991.##
[2] A. Zielinski, Y. Yoon, and L. Wu, “Performance Analysis of Digital Acoustic Communication in a Shallow Water Channel,” IEEE J. Oceanic Engineering, vol. 20, no. 4, pp. 293-299, 1995.##
[3] P. A. Walree and R. Otnes, “Ultrawideband Underwater Acoustic Communication Channels,” IEEE J. Oceanic Engineering, vol. 38, no. 4, pp. 678-688, 2013.##
[4] A. C. Singer, J. K. Nelson, and S. S. Kozat, “Signal Processing for Underwater Acoustic Communications,” IEEE Communication Magazine, vol. 47, no. 1, pp. 90-96, 2009.##
[5] T. C. Yang, “Correlation-Based Decision-Feedback Equalizer for Underwater Acoustic Communications,” IEEE J. Oceanic Engineering, vol. 30, no. 4, pp. 865-880, 2005.##
[6] S. Hwang and P. Schniter, “Efficient Multicarrier Communication for Highly Spread Underwater Acoustic Channels,” IEEE J. Selected Areas in Communications, vol. 26, no. 9, pp. 1674-1683, 2008.##
[7] M. Stojanovic and J. Preisig, “Underwater Acoustic Communication Channels: Propagation Models and Statistical Characterization,” IEEE Communication Magazine, vol. 47, no. 1, pp. 84-89, 2009.##
[8] M. khishe, M. R. Mosavi, and M. Kaveh, “Improved Migration Models of Biogeography-Based Optimization for Sonar Dataset Classification by using Neural Network,” J. Applied Acoustics, vol. 118, no. 3, pp. 15-29, 2017.##
[9] J. Ling, H. He, J. Li, and W. Roberts, “Covert Underwater Acoustic Communications: Transceiver Structures, Waveform Designs and Associated Performances,” IEEE Conf. Oceans 2010 MTS/IEEE Seattle, pp. 1-10, 2010.##
[10] J. Ling, H. He, J. Li, and W. Roberts, “Covert Underwater Acoustic Communications,” J. Acoust. Soc. Am., vol. 128, no. 5, pp. 2898-2909. 2010.##
[11] G. Leus and P. A. Walree, “Multiband OFDM for Covert Acoustic Communications,” IEEE J. Selected Areas in Communications, vol. 26, no. 9, pp. 1662-1673, 2008.##
[12] G. Leus, P. Van Walree, J. Boschma, C. Fanciullacci, H. Gerritsen, and P. Tusoni, “Covert Underwater Communications with Multiband OFDM,” IEEE Conf. Oceans, pp. 1-8, 2008.##
[13] Z. Hijaz, and V. S. Frost, “Exploiting OFDM Systems for Covert Communication,” in Military Communications Conference, pp. 2149-2155, 2010.##
[14] P. Van Walree, E. Sangfelt, and G. Leus, “Multicarrier Spread Spectrum for Covert Acoustic Communications,” IEEE Conf. Oceans, pp. 264-271, 2008.##
[15] T. C. Yang and W. B. Yang, “Low Probability of Detection Underwater Acoustic Communications using Direct-Sequence Spread Spectrum,” J. Acoust. Soc. Am, vol. 124, no. 6, pp. 3632-3647, 2008.##
[16] T. C. Yang and W. B. Yang, “Performance Analysis of Direct-Sequence Spread-Spectrum Underwater Acoustic Communications with Low Signal-to-Noise-Ratio Input Signals,” J. Acoust. Soc. Am, vol. 123, no. 2, pp. 842-855, 2008.##
[17] S. Liu, G. Qiao, and A. Ismail, “Covert Underwater Acoustic Communication using Dolphin Sounds,” J. Acoust. Soc. Am, vol. 133, no. 4, pp. 300-306, 2013.##
[18] Y. Jia, G. Liu, and L. Zhang, “Bionic Camouflage Underwater Acoustic Communication based on Sea Lion Sounds,” International Conf. Control, Automation and Information Sciences, pp. 1-5, 2015.##
[19] X, Han, J, Yin, P. Du, and X. Zhang, “Experimental Demonstration of Underwater Acoustic Communication Using Bionic Signals,” J. Applied Acoustics, vol. 78, no. 2, pp. 7-10. 2014.##
[20] B. K. Branstetter, J. S. Trickey, K. Bakhtiari, A. Black, and H. Aihara, “Auditory Masking Patterns in Bottlenose Dolphins (Tursiops Truncatus) with Natural, Anthropogenic, and Synthesized Noise,” J. Acoust. Soc. Am, vol. 133, no. 3, pp. 1811-1819, 2013.##
[21] C. Capus, A. Y. Pailhas, K. Brown, and D. M. Lane, “Bio-Inspired Wideband Sonar Signals based on Observations of The Bottlenose Dolphin (Tursiops Truncatus),” J. Acoust. Soc. Am, vol. 121, no. 1, pp. 594-605, 2007.##
[22] S. Liu, G. Qiao, Y. Yu, L. Zhang, and T. Chen, “Biologically Inspired Covert Underwater Acoustic Communication using High Frequency Dolphin Clicks,” IEEE Conf. Oceans, pp. 1-5, 2013.##
[23] L. Songzuo, M. Tianlong, and Q. Gang, “Bionic Communication by Dolphin Whistle with Continuous-Phase based on MSK Modulation,” International Conf. Signal Processing, pp. 1-5, 2016.##
[24] R. Aubauerb and W. W. L. Au, “Phantom Echo Generation: A New Technique for Investigating Dolphin Echolocation,” J. Acoust. Soc. Am, vol. 104, no. 3, pp. 1164-1169, 1998.##
[25] M. W. Muller, J. S. Allen, and W. W. L. Au, “Time-Frequency Analysis and Modeling of The Backscatter of Categorized Dolphin Echolocation Clicks for Target Discrimination,” J. Acoust. Soc. Am, vol. 124, no. 1, pp. 656-665, 2008.##
[26] R. M. López and C. Bazúa, “Who Is Whistling? Localizing and Identifying Phonating Dolphins in Captivity,” J. Applied Acoustics, vol. 71, pp. 1057-1062, 2010.##
[28] Y. Huang, S. Zhou, Z. Shi, and L. Lai, “Channel Frequency Response based Secret Key Generation in Underwater Acoustic Systems,” IEEE Trans. Wireless Communications, vol. 15, no. 9, pp. 5875-5888, 2016.##
[29] H. Kulhandjian, T. Melodia, and D. Koutsonikolas, “Securing Underwater Acoustic Communications through Analog Network Coding,” Proc. SECON, pp. 1-9, 2014.##
[30] B. G. Mobasseri and R. S. Lynch, “Information Embedding in Sonar by Modifications of Time-Frequency Properties,” IEEE J. Oceanic Engineering, vol. 41, no. 1, pp. 139-154, 2016.##
[31] M. C. Domingo, “Securing Underwater Wireless Communication Networks,” IEEE Communication Magazine, vol. 8, no. 1, pp. 22-28, 2011.##
[32] G. Han, J. Jiang, N. Sun, and L. Shu, “Secure Communication for Underwater Acoustic Sensor Networks,” IEEE Communication Magazine, vol. 53, no. 8, pp. 54-60, 2015.##
[33] G. Dini and A. L. Duca, “A Secure Communication Suite for Underwater Acoustic Sensor Networks,” Sensors- Basel, vol. 12, no. 11, pp. 133-58, 2012.##
[34] Y. Chen, Y. Lin, and S. Lee, “A Mobicast Routing Protocol in Underwater Sensor Networks,” IEEE Conf. Wireless Communications and Networking, pp. 510-515, 2011.##
[35] S. Misra, S. Dash, M. Khatua, A.V. Vasilakos, and M. S. Obaidat, “Jamming in Underwater Sensor Networks: Detection and Mitigation,” IET Commun., vol. 6, no. 14, pp. 2178-88, 2012.##
[36] X. Lu and Z. Yonghua, “Modeling The Wormhole Attack in Underwater Sensor Network,” IEEE 8th International Conf. Wireless Communications, Networking and Mobile Computing, pp. 1-4, 2012.##
[37] Y. Luo, L. Pu, Z. Peng, and Z. Shi, “RSS-Based Secret Key Generation in Underwater Acoustic Networks: Advantages, Challenges, and Performance Improvements,” IEEE Communication Magazine, vol. 54, no. 2, pp. 32-38, 2016.##
[38] C. Lal, R. Petrocci, M. Conti, and J. Alves, “Secure Underwater Acoustic Networks: Current and Future Research Directions,” IEEE 3th Conf. Underwater Communications and Networking, pp. 1-5, 2016.##
[39] H. Li, Y. He, X. Cheng, H. Zhu, and L. Sun, “Security and Privacy in Localization for Underwater Sensor Networks,” IEEE Communication Magazine, vol. 53, no. 11, pp. 56-62, 2015.##
[40] G. Ateniese, et al., “SecFUN: Security Framework for Underwater Acoustic Sensor Networks,” IEEE 3th Conf. Oceans, pp. 1-9, 2015.##
[41] M. Ahmed, M. Salleh, and M. Channa, “Routing Protocols Based on Node Mobility for Underwater Wireless Sensor Network: A Survey,” J. Network and Computer Applications, vol. 78, pp. 242-252, 2017.##
[42] Y. Chen, and Y. Lin, “Mobicast Routing Protocol for Underwater Sensor Networks,” IEEE Sensors Jounal, vol. 13, no. 2, pp. 737-749, 2013.##
[43] R. Merkle, “Protocols for Public Key Cryptosystems,” in Proc. IEEE Symp. Security and Privacy, pp. 122-134, 1980.##
[44] H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, “An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid,” IEEE Systems Journal, vol. 8, no. 2, pp. 655-663, 2014.##
[45] Y. Liu, C. Cheng, T. Gu, T. Jiang, and X. Li, “A Lightweight Authenticated Communication Scheme for Smart Grid,” IEEE Sensors Jounal, vol. 16, no. 3, pp. 836-842, 2015.##
[46] N. Ferguson, R. Schroeppel, and D. Whiting, “A Simple Algebraic Representation of Rijndael,” in Proc. Sel. Areas Cryptogr., pp. 103-111, 2001.##
[47] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Commun. of the ACM, pp. 120-126, 1978.##
[48] W. Diffie, and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Information Theory, vol. 22, no. 6, 1976.##
[49] W. Dai, Crypto++ 5.6.2 Benchmarks 2013. [Online]. Available: http://
www.cryptopp.com/.##
[50] E. Shafiee, M. R. Mosavi and M. Moazedi, “Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers”, Journal of Electronical & Cyber Defence, Vol. 3, No. 1, pp.69-80, 2015. (in persian).##