TY - GEN
T1 - Topology-based Secret Key Generation for Underwater Acoustic Networks
AU - Diamant, Roee
AU - Casari, Paolo
AU - Tomasin, Stefano
N1 - Publisher Copyright: © 2021 IEEE.
PY - 2021
Y1 - 2021
N2 - We propose a method to let a source and a destination agree on a key that remains secret to a potential eavesdropper in an underwater acoustic network (UWAN). We generate the key from the propagation delay measured over a set of multihop routes: this harvests the randomness in the UWAN topology and turns the slow sound propagation in the water into an advantage for the key agreement protocol. Our scheme relies on a route discovery handshake. During this process, all intermediate relays accumulate message processing delays, so that both the source and the destination can compute the actual propagation delays along each route, and map this information to a string of bits. Finally, via a secret key agreement from the information-theoretic security framework, we obtain an equal set of bits at the source and destination, which is provably secret to a potential eavesdropper located away from both nodes. Our simulation results show that, even for small UWANs of 4 nodes, we obtain 11 secret bits per explored topology, and that the protocol is insensitive to an average node speed of up to 0.5 m/s.
AB - We propose a method to let a source and a destination agree on a key that remains secret to a potential eavesdropper in an underwater acoustic network (UWAN). We generate the key from the propagation delay measured over a set of multihop routes: this harvests the randomness in the UWAN topology and turns the slow sound propagation in the water into an advantage for the key agreement protocol. Our scheme relies on a route discovery handshake. During this process, all intermediate relays accumulate message processing delays, so that both the source and the destination can compute the actual propagation delays along each route, and map this information to a string of bits. Finally, via a secret key agreement from the information-theoretic security framework, we obtain an equal set of bits at the source and destination, which is provably secret to a potential eavesdropper located away from both nodes. Our simulation results show that, even for small UWANs of 4 nodes, we obtain 11 secret bits per explored topology, and that the protocol is insensitive to an average node speed of up to 0.5 m/s.
KW - Secret key agreement
KW - Sound speed
KW - Underwater acoustic networks
KW - Underwater security
UR - http://www.scopus.com/inward/record.url?scp=85123318512&partnerID=8YFLogxK
U2 - 10.1109/UComms50339.2021.9598062
DO - 10.1109/UComms50339.2021.9598062
M3 - Conference contribution
T3 - 2021 5th Underwater Communications and Networking Conference, UComms 2021
BT - 2021 5th Underwater Communications and Networking Conference, UComms 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 5th Underwater Communications and Networking Conference, UComms 2021
Y2 - 31 August 2021 through 2 September 2021
ER -