An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication

被引:4
|
作者
Kaveh, Masoud [1 ]
Falahati, Abolfazl [1 ]
机构
[1] Iran Univ Sci & Technol, Dept Elect Engn, Tehran 1311416846, Iran
关键词
Dolphin whistle; Improved Merkle hash tree; Secure underwater acoustic communication (UWAC); TP309; TN929; 3; PERFORMANCE ANALYSIS;
D O I
10.1631/FITEE.2000043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, bionic signals have been used to achieve covert underwater acoustic communication (UWAC) with high signal-to-noise ratios (SNRs) over transmission systems. A high SNR allows the attackers to proceed with their mischievous goals and makes transmission systems vulnerable against malicious attacks. In this paper we propose an improved Merkle hash tree based secure scheme that can resist current underwater attacks, i.e., replay attack, fabricated message attack, message-altering attack, and analyst attack. Security analysis is performed to prove that the proposed scheme can resist these types of attacks. Performance evaluations show that the proposed scheme can meet UWAC limitations due to its efficiency regarding energy consumption, communication overhead, and computation cost.
引用
收藏
页码:1010 / 1019
页数:10
相关论文
共 50 条
  • [21] Secure Communication for Underwater Acoustic Sensor Networks
    Han, Guangjie
    Jiang, Jinfang
    Sun, Ning
    Shu, Lei
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (08) : 54 - 60
  • [22] Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications
    Sudha, K. Swapna
    Jeyanthi, N.
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2367 - 2379
  • [23] Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications
    K. Swapna Sudha
    N. Jeyanthi
    [J]. Peer-to-Peer Networking and Applications, 2023, 16 : 2367 - 2379
  • [24] Experimental demonstration of underwater acoustic communication using bionic signals
    Han, Xiao
    Yin, Jingwei
    Du, Pengyu
    Zhang, Xiao
    [J]. APPLIED ACOUSTICS, 2014, 78 : 7 - 10
  • [25] A frequency hopping pattern inspired bionic underwater acoustic communication
    Qiao, Gang
    Ma, Tianlong
    Liu, Songzuo
    Bilal, Muhammad
    [J]. PHYSICAL COMMUNICATION, 2021, 46
  • [26] Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
    Jayaprakash, J. Stanly
    Balasubramanian, Kishore
    Sulaiman, Rossilawati
    Hasan, Mohammad Kamrul
    Parameshachari, B. D.
    Iwendi, Celestine
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 519 - 534
  • [27] Bionic Underwater Acoustic Communication by Mimicking Dolphin Whistle Based on Frequency Shift Keying
    Ma Tianlong
    Liu Songzuo
    Qiao Gang
    Pu Wangyi
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (06) : 2045 - 2053
  • [28] A Lightweight Secure Scheme for Underwater Wireless Acoustic Network
    Shi, Jia
    Wu, Jinqiu
    Zhao, Zhiwei
    Qi, Xiaofei
    Zhang, Wenbo
    Qiao, Gang
    Zuo, Dahong
    [J]. JOURNAL OF MARINE SCIENCE AND ENGINEERING, 2024, 12 (05)
  • [29] Improved Merkle Hash Tree-Based One-Time Signature Scheme for Capability-Enhanced Security Enforcing Architecture for Named Data Networking
    Varghese Jensy Babu
    M. Victor Jose
    [J]. Wireless Personal Communications, 2020, 115 : 557 - 574
  • [30] Improved Merkle Hash Tree-Based One-Time Signature Scheme for Capability-Enhanced Security Enforcing Architecture for Named Data Networking
    Babu, Varghese Jensy
    Jose, M. Victor
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (01) : 557 - 574