TY - GEN
T1 - Authentication of Underwater Acoustic Transmissions via Machine Learning Techniques
AU - Bragagnolo, L.
AU - Ardizzon, F.
AU - Laurenti, N.
AU - Casari, P.
AU - Diamant, R.
AU - Tomasin, S.
N1 - Publisher Copyright: © 2021 IEEE.
PY - 2021
Y1 - 2021
N2 - We consider the problem of discriminating a legitimate transmitter from an impersonating attacker in an underwater acoustic network under a physical layer security framework. In particular, we utilize features of the underwater acoustic channel such as the number of taps, the delay spread, and the received power. In the absence of a reliable statistical model of the underwater channel, we turn to a machine learning technique to extract the feature statistics and utilize them to distinguish between legitimate and fake transmissions. Numerical results show how, using only four channel features as input of either a neural network or an autoencoder, we achieve a good trade off between false alarm and detection rates. Moreover, cooperative techniques fusing soft decision statistics from multiple trusted nodes further outperform the discrimination capability of each separate node. Data from a sea trial carried out in Israeli eastern Mediterranean waters demonstrate the applicability of our approach.
AB - We consider the problem of discriminating a legitimate transmitter from an impersonating attacker in an underwater acoustic network under a physical layer security framework. In particular, we utilize features of the underwater acoustic channel such as the number of taps, the delay spread, and the received power. In the absence of a reliable statistical model of the underwater channel, we turn to a machine learning technique to extract the feature statistics and utilize them to distinguish between legitimate and fake transmissions. Numerical results show how, using only four channel features as input of either a neural network or an autoencoder, we achieve a good trade off between false alarm and detection rates. Moreover, cooperative techniques fusing soft decision statistics from multiple trusted nodes further outperform the discrimination capability of each separate node. Data from a sea trial carried out in Israeli eastern Mediterranean waters demonstrate the applicability of our approach.
KW - Authentication
KW - Physical layer security
KW - Underwater acoustic channel
UR - http://www.scopus.com/inward/record.url?scp=85123737891&partnerID=8YFLogxK
U2 - 10.1109/COMCAS52219.2021.9629031
DO - 10.1109/COMCAS52219.2021.9629031
M3 - Conference contribution
T3 - 2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems, COMCAS 2021
SP - 255
EP - 260
BT - 2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems, COMCAS 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems, COMCAS 2021
Y2 - 1 November 2021 through 3 November 2021
ER -