As underwater acoustic communication technologies become mature and underwater networks evolve into reliable solutions for data communications, authenticating transmitted data turns from an option to a necessity. In this paper, we explore physical-layer authentication for an underwater acoustic networks with mobile devices. We choose the power-weighted average of the channel taps' arrival delay as the main authentication feature. We then develop a Kalman filter approach to track the evolution of this feature in the presence of mobility. The filter computes an innovation metric for each new transmission, which is processed to determine if a signal originates from a legitimate network node. Simulation results obtained from a dataset generated with Bellhop show that our authentication mechanism successfully distinguishes between legitimate and impersonating transmitters. Moreover, we show that linearly combining innovation readings from multiple sensors yields a good low-complexity classifier, and assess the impact of the transmitter speed on the authentication performance.

Physical Layer Authentication in Underwater Acoustic Networks with Mobile Devices

Casari P.;Ardizzon F.;Tomasin S.
2022

Abstract

As underwater acoustic communication technologies become mature and underwater networks evolve into reliable solutions for data communications, authenticating transmitted data turns from an option to a necessity. In this paper, we explore physical-layer authentication for an underwater acoustic networks with mobile devices. We choose the power-weighted average of the channel taps' arrival delay as the main authentication feature. We then develop a Kalman filter approach to track the evolution of this feature in the presence of mobility. The filter computes an innovation metric for each new transmission, which is processed to determine if a signal originates from a legitimate network node. Simulation results obtained from a dataset generated with Bellhop show that our authentication mechanism successfully distinguishes between legitimate and impersonating transmitters. Moreover, we show that linearly combining innovation readings from multiple sensors yields a good low-complexity classifier, and assess the impact of the transmitter speed on the authentication performance.
2022
ACM International Conference Proceeding Series
9781450399524
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/3472273
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact