An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication

被引:4
|
作者
Kaveh, Masoud [1 ]
Falahati, Abolfazl [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Elect Engn, Tehran 1311416846, Iran
关键词
Dolphin whistle; Improved Merkle hash tree; Secure underwater acoustic communication (UWAC); TP309; TN929; 3; PERFORMANCE ANALYSIS;
D O I
10.1631/FITEE.2000043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, bionic signals have been used to achieve covert underwater acoustic communication (UWAC) with high signal-to-noise ratios (SNRs) over transmission systems. A high SNR allows the attackers to proceed with their mischievous goals and makes transmission systems vulnerable against malicious attacks. In this paper we propose an improved Merkle hash tree based secure scheme that can resist current underwater attacks, i.e., replay attack, fabricated message attack, message-altering attack, and analyst attack. Security analysis is performed to prove that the proposed scheme can resist these types of attacks. Performance evaluations show that the proposed scheme can meet UWAC limitations due to its efficiency regarding energy consumption, communication overhead, and computation cost.
引用
收藏
页码:1010 / 1019
页数:10
相关论文
共 50 条
  • [1] An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication基于改进Merkle哈希树的仿生水声通信安全方案
    Masoud Kaveh
    Abolfazl Falahati
    [J]. Frontiers of Information Technology & Electronic Engineering, 2021, 22 : 1010 - 1019
  • [2] An Efficient RSU Authentication Scheme based on Merkle Hash Tree for VANETs
    Moni, Shafika Showkat
    Manivannan, D.
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [3] Secure Underwater Acoustic Communication Based on a Robust Key Generation Scheme
    Liu, Yicong
    Jing, Jiwu
    Yang, Jun
    [J]. ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 1839 - +
  • [4] Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices
    Kumari, Swati
    Singh, Maninder
    Singh, Raman
    Tewari, Hitesh
    [J]. KNOWLEDGE-BASED SYSTEMS, 2022, 253
  • [5] An improved convolution Merkle tree-based blockchain electronic medical record secure storage scheme
    Zhu, Hegui
    Guo, Yujia
    Zhang, Libo
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
  • [6] An FPGA Accelerator for Hash Tree Generation in the Merkle Signature Scheme
    Shoufan, Abdulhadi
    [J]. RECONFIGURABLE COMPUTING: ARCHITECTURES, TOOLS AND APPLICATIONS, 2010, 5992 : 145 - 156
  • [7] Merkle Hash Tree based Deduplication in Cloud Storage
    Li, Chaoling
    Chen, Yue
    [J]. MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6223 - 6227
  • [8] Combining Merkle Hash Tree and Chaotic Cryptography for Secure Data Fusion in IoT
    Nesa, Nashreen
    Banerjee, Indrajit
    [J]. TRANSACTIONS ON COMPUTATIONAL SCIENCE XXXV: SPECIAL ISSUE ON SIGNAL PROCESSING AND SECURITY IN DISTRIBUTED SYSTEMS, 2020, 11960 : 85 - 105
  • [9] Certificate revocation system implementation based on the Merkle hash tree
    Jose L. Muñoz
    Jordi Forne
    Oscar Esparza
    Miguel Soriano
    [J]. International Journal of Information Security, 2004, 2 (2) : 110 - 124
  • [10] Bionic Camouflage Underwater Acoustic Communication Based on Sea Lion Sounds
    Jia, Yichao
    Liu, Guangjie
    Zhang, Lihua
    [J]. FOURTH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND INFORMATION SCIENCES (CCAIS 2015), 2015, : 332 - 336