ارتباطات زیرآبی پنهان و امن مبتنی بر سوت دلفین و درخت مرکل

نوع مقاله : مقاله پژوهشی

نویسندگان

دانشکده مهندسی برق، دانشگاه علم و صنعت ایران

چکیده

شرایط و چالش‌های منحصر به فرد موجود در کانال‌های زیرآبی موجب می‌شود تا ارتباطات در این محیط در مقابل حملات بدخواهانه بسیار آسیب‌پذیر باشند. لذا در سال‌های اخیر استفاده از سیگنال‌های زیستی مانند سوت دلفین به منظور ایجاد ارتباطات پنهان و همچین به منظور استفاده از خواص فرکانسی بسیار مناسب این سیگنال‌ها در زیر آب، پیشنهاد شده است. اما در این روش نیز نمی‌توان به ارتباطات امن کامل در محیط زیر آب رسید، زیرا این سیگنال‌های در همه آب‌ها موجود نبوده و یا در حالتی بدتر، ممکن است دشمن به تجهیزاتی مجهز باشد که به هر طریقی قادر به آشکارسازی این سیگنال‌ها در زیر آب باشد. لذا در این مقاله، روشی مبتنی بر درخت مرکل به هدف فراهم نمودن ارتباطی امن در همه حالت‌ها متناسب با ویژگی‌های محیط زیرآبی ارائه می‌شود تا در مقابل حملات ممکن در این محیط از جمله حمله بازپخش، حمله ارسال پیام‌های جعلی، حمله تحلیل پیام و حمله اصلاح پیام مقاوم باشد. تحلیل‌های امنیتی، نشان می‌دهند که روش ارائه شده در این مقاله در برابر همه حملات ذکر شده امن کامل بوده و سه شرط مهم تصدیق صحت، محرمانگی و بی‌عیبی پیام را برآورده می‌سازد. همچنین در بخش ارزیابی عملکرد این روش ثابت می‌شود که روش ارائه شده با توجه به محدودیت‌های محیط زیرآب، بسیار مناسب بوده و نسبت روش‌های سنتی رمزنگاری، عملکرد بهینه‌تری را در دو مولفه سربار مخابراتی و هزینه‌های محاسباتی از خود به جای می‌گذارد.

کلیدواژه‌ها


عنوان مقاله [English]

Covert and Secure Underwater Acoustic Communication using Merkle Hash Tree and Dolphin Whistle

نویسندگان [English]

  • Seyyed Mohammadreza Mousavi Mirkalaei
  • Masoud Kaveh
چکیده [English]

The unique characteristics of the Underwater Acoustic Communication (UWAC) channel cause the UWAC systems to be very vulnerable to the malicious attacks. So, the bionic-based UWAC has been used due to its good covert performance, and its suitable frequency and correlation properties. It may not be covert in all the underwater environments, or an adversary can detect the message anyway. Therefore, this paper aims at proposing an improved Merkle hash tree based secure scheme that can resist the current possible underwater attacks, i.e., the replay attack, the fabricated message attack, the message altering attack, and the analyst attack. The security analysis indicates that the proposed scheme is resilient to the mentioned attacks. Also, the performance evaluations show that the proposed scheme is proportional to the UWAC limitations due to its efficiency in terms of energy consumption, communication overhead, and computation cost.

کلیدواژه‌ها [English]

  • Bionic Signals
  • Covert and Secure UWAC
  • Dolphin Whistle
  • Malicious Attacks
  • Merkle Hash Tree
   [1]      A. Falahati, B. Woodward, and S. C. Bateman, “Underwater Acoustic Channel Models for 4800 b/s QPSK Signals,” IEEE J. Oceanic Engineering, vol. 19, no. 1, pp. 12-20, 1991.##
   [2]      A. Zielinski, Y. Yoon, and L. Wu, “Performance Analysis of Digital Acoustic Communication in a Shallow Water Channel,” IEEE J. Oceanic Engineering, vol. 20, no. 4, pp. 293-299, 1995.##
   [3]      P. A. Walree and R. Otnes, “Ultrawideband Underwater Acoustic Communication Channels,” IEEE J. Oceanic Engineering, vol. 38, no. 4, pp. 678-688, 2013.##
   [4]      A. C. Singer, J. K. Nelson, and S. S. Kozat, “Signal Processing for Underwater Acoustic Communications,” IEEE Communication Magazine, vol. 47, no. 1, pp. 90-96, 2009.##
   [5]      T. C. Yang, “Correlation-Based Decision-Feedback Equalizer for Underwater Acoustic Communications,” IEEE J. Oceanic Engineering, vol. 30, no. 4, pp. 865-880, 2005.##
   [6]      S. Hwang and P. Schniter, “Efficient Multicarrier Communication for Highly Spread Underwater Acoustic Channels,” IEEE J. Selected Areas in Communications, vol. 26, no. 9, pp. 1674-1683, 2008.##
   [7]      M. Stojanovic and J. Preisig, “Underwater Acoustic Communication Channels: Propagation Models and Statistical Characterization,” IEEE Communication Magazine, vol. 47, no. 1, pp. 84-89, 2009.##
   [8]      M. khishe, M. R. Mosavi, and M. Kaveh, “Improved Migration Models of Biogeography-Based Optimization for Sonar Dataset Classification by using Neural Network,” J. Applied Acoustics, vol. 118, no. 3, pp. 15-29, 2017.##
   [9]      J. Ling, H. He, J. Li, and W. Roberts, “Covert Underwater Acoustic Communications: Transceiver Structures, Waveform Designs and Associated Performances,” IEEE Conf. Oceans 2010 MTS/IEEE Seattle, pp. 1-10, 2010.##
[10]      J. Ling, H. He, J. Li, and W. Roberts, “Covert Underwater Acoustic Communications,” J. Acoust. Soc. Am., vol. 128, no. 5, pp. 2898-2909. 2010.##
[11]      G. Leus and P. A. Walree, “Multiband OFDM for Covert Acoustic Communications,” IEEE J. Selected Areas in Communications, vol. 26, no. 9, pp. 1662-1673, 2008.##
[12]      G. Leus, P. Van Walree, J. Boschma, C. Fanciullacci, H. Gerritsen, and P. Tusoni, “Covert Underwater Communications with Multiband OFDM,” IEEE Conf. Oceans, pp. 1-8, 2008.##
[13]      Z. Hijaz, and V. S. Frost, “Exploiting OFDM Systems for Covert Communication,” in Military Communications Conference, pp. 2149-2155, 2010.##
[14]      P. Van Walree, E. Sangfelt, and G. Leus, “Multicarrier Spread Spectrum for Covert Acoustic Communications,” IEEE Conf. Oceans, pp. 264-271, 2008.##
[15]      T. C. Yang and W. B. Yang, “Low Probability of Detection Underwater Acoustic Communications using              Direct-Sequence Spread Spectrum,” J. Acoust. Soc. Am, vol. 124, no. 6, pp. 3632-3647, 2008.##
[16]      T. C. Yang and W. B. Yang, “Performance Analysis of Direct-Sequence Spread-Spectrum Underwater Acoustic Communications with Low Signal-to-Noise-Ratio Input Signals,” J. Acoust. Soc. Am, vol. 123, no. 2, pp. 842-855, 2008.##
[17]      S. Liu, G. Qiao, and A. Ismail, “Covert Underwater Acoustic Communication using Dolphin Sounds,” J. Acoust. Soc. Am, vol. 133, no. 4, pp. 300-306, 2013.##
[18]      Y. Jia, G. Liu, and L. Zhang, “Bionic Camouflage Underwater Acoustic Communication based on Sea Lion Sounds,” International Conf. Control, Automation and Information Sciences, pp. 1-5, 2015.##
[19]      X, Han, J, Yin, P. Du, and X. Zhang, “Experimental Demonstration of Underwater Acoustic Communication Using Bionic Signals,” J. Applied Acoustics, vol. 78, no. 2, pp. 7-10. 2014.##
[20]      B. K. Branstetter, J. S. Trickey, K. Bakhtiari, A. Black, and H. Aihara, “Auditory Masking Patterns in Bottlenose Dolphins (Tursiops Truncatus) with Natural, Anthropogenic, and Synthesized Noise,” J. Acoust. Soc. Am, vol. 133, no. 3, pp. 1811-1819, 2013.##
[21]      C. Capus, A. Y. Pailhas, K. Brown, and D. M. Lane, “Bio-Inspired Wideband Sonar Signals based on Observations of The Bottlenose Dolphin (Tursiops Truncatus),” J. Acoust. Soc. Am, vol. 121, no. 1, pp. 594-605, 2007.##
[22]      S. Liu, G. Qiao, Y. Yu, L. Zhang, and T. Chen, “Biologically Inspired Covert Underwater Acoustic Communication using High Frequency Dolphin Clicks,” IEEE Conf. Oceans, pp. 1-5, 2013.##
[23]      L. Songzuo, M. Tianlong, and Q. Gang, “Bionic Communication by Dolphin Whistle with           Continuous-Phase based on MSK Modulation,” International Conf. Signal Processing, pp. 1-5, 2016.##
[24]      R. Aubauerb and W. W. L. Au, “Phantom Echo Generation: A New Technique for Investigating Dolphin Echolocation,” J. Acoust. Soc. Am, vol. 104, no. 3, pp. 1164-1169, 1998.##
[25]      M. W. Muller, J. S. Allen, and W. W. L. Au, “Time-Frequency Analysis and Modeling of The Backscatter of Categorized Dolphin Echolocation Clicks for Target Discrimination,” J. Acoust. Soc. Am, vol. 124, no. 1, pp. 656-665, 2008.##
[26]      R. M. López and C. Bazúa, “Who Is Whistling? Localizing and Identifying Phonating Dolphins in Captivity,” J. Applied Acoustics, vol. 71, pp. 1057-1062, 2010.##
[28]      Y. Huang, S. Zhou, Z. Shi, and L. Lai, “Channel Frequency Response based Secret Key Generation in Underwater Acoustic Systems,” IEEE Trans. Wireless Communications, vol. 15, no. 9, pp. 5875-5888, 2016.##
[29]      H. Kulhandjian, T. Melodia, and D. Koutsonikolas, “Securing Underwater Acoustic Communications through Analog Network Coding,” Proc. SECON, pp. 1-9, 2014.##
[30]      B. G. Mobasseri and R. S. Lynch, “Information Embedding in Sonar by Modifications of Time-Frequency Properties,” IEEE J. Oceanic Engineering, vol. 41, no. 1, pp. 139-154, 2016.##
[31]      M. C. Domingo, “Securing Underwater Wireless Communication Networks,” IEEE Communication Magazine, vol. 8, no. 1, pp. 22-28, 2011.##
[32]      G. Han, J. Jiang, N. Sun, and L. Shu, “Secure Communication for Underwater Acoustic Sensor Networks,” IEEE Communication Magazine, vol. 53, no. 8, pp. 54-60, 2015.##
[33]      G. Dini and A. L. Duca, “A Secure Communication Suite for Underwater Acoustic Sensor Networks,”             Sensors- Basel, vol. 12, no. 11, pp. 133-58, 2012.##
[34]      Y. Chen, Y. Lin, and S. Lee, “A Mobicast Routing Protocol in Underwater Sensor Networks,” IEEE Conf. Wireless Communications and Networking, pp. 510-515, 2011.##
 [35]      S. Misra, S. Dash, M. Khatua, A.V. Vasilakos, and M. S. Obaidat, “Jamming in Underwater Sensor Networks: Detection and Mitigation,” IET Commun., vol. 6, no. 14, pp. 2178-88, 2012.##
[36]      X. Lu and Z. Yonghua, “Modeling The Wormhole Attack in Underwater Sensor Network,” IEEE 8th International Conf. Wireless Communications, Networking and Mobile Computing, pp. 1-4, 2012.##
[37]      Y. Luo, L. Pu, Z. Peng, and Z. Shi, “RSS-Based Secret Key Generation in Underwater Acoustic Networks: Advantages, Challenges, and Performance Improvements,” IEEE Communication Magazine, vol. 54, no. 2, pp. 32-38, 2016.##
[38]      C. Lal, R. Petrocci, M. Conti, and J. Alves, “Secure Underwater Acoustic Networks: Current and Future Research Directions,” IEEE 3th Conf. Underwater Communications and Networking, pp. 1-5, 2016.##
[39]      H. Li, Y. He, X. Cheng, H. Zhu, and L. Sun, “Security and Privacy in Localization for Underwater Sensor Networks,” IEEE Communication Magazine, vol. 53, no. 11, pp. 56-62, 2015.##
[40]      G. Ateniese, et al., “SecFUN: Security Framework for Underwater Acoustic Sensor Networks,” IEEE 3th Conf. Oceans, pp. 1-9, 2015.##
[41]      M. Ahmed, M. Salleh, and M. Channa, “Routing Protocols Based on Node Mobility for Underwater Wireless Sensor Network: A Survey,” J. Network and Computer Applications, vol. 78, pp. 242-252, 2017.##
[42]      Y. Chen, and Y. Lin, “Mobicast Routing Protocol for Underwater Sensor Networks,” IEEE Sensors Jounal, vol. 13, no. 2, pp. 737-749, 2013.##
[43]      R. Merkle, “Protocols for Public Key Cryptosystems,” in Proc. IEEE Symp. Security and Privacy, pp. 122-134, 1980.##
[44]      H. Li, R. Lu, L. Zhou, B. Yang, and X. Shen, “An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid,” IEEE Systems Journal, vol. 8, no. 2, pp. 655-663, 2014.##
[45]      Y. Liu, C. Cheng, T. Gu, T. Jiang, and X. Li, “A Lightweight Authenticated Communication Scheme for Smart Grid,” IEEE Sensors Jounal, vol. 16, no. 3, pp. 836-842, 2015.##
[46]      N. Ferguson, R. Schroeppel, and D. Whiting, “A Simple Algebraic Representation of Rijndael,” in Proc. Sel. Areas Cryptogr., pp. 103-111, 2001.##
[47]      R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems,” Commun. of the ACM, pp. 120-126, 1978.##
[48]      W. Diffie, and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Information Theory, vol. 22, no. 6, 1976.##
[49]      W. Dai, Crypto++ 5.6.2 Benchmarks 2013. [Online]. Available: http:// www.cryptopp.com/.##
[50]      E. Shafiee, M. R. Mosavi and M. Moazedi, “Detection of Spoofing Attack Based on Multi-Layer Neural Network in Single-Frequency GPS Receivers”, Journal of Electronical & Cyber Defence, Vol. 3, No. 1, pp.69-80, 2015. (in persian).##