Physical Layer Security against an Informed Eavesdropper in Underwater Acoustic Channels: Reconciliation and Privacy Amplification

George Sklivanitis, Konstantinos Pelekanakis, S. Yildirim, R. Petroccia, J. Alves, D. Pados
{"title":"Physical Layer Security against an Informed Eavesdropper in Underwater Acoustic Channels: Reconciliation and Privacy Amplification","authors":"George Sklivanitis, Konstantinos Pelekanakis, S. Yildirim, R. Petroccia, J. Alves, D. Pados","doi":"10.1109/UComms50339.2021.9598159","DOIUrl":null,"url":null,"abstract":"We propose a strategy for generating the same crypto-key between two trusted underwater acoustic nodes (Alice and Bob) without revealing it to an eavesdropper (Eve). Our work builds upon the results of [1] where a methodology for generating a string of bits for Alice, Bob and Eve based on channel feature extraction and quantization is discussed. In this paper, we aim to reconcile the respective bits of Alice and Bob while minimizing the information leaked to Eve. To this end, we examine various Reed Solomon (RS) codes and measure the reconciliation rate of Alice, Bob and Eve. Additionally, we propose the Secure Hash Algorithm-3 (SHA-3) as means to eliminate any information that Eve acquires during reconciliation. We evaluate our reconciliation and privacy amplification strategies with bits generated from real underwater acoustic channel probe exchanges between Alice and Bob and Bellhop-simulated channels for Eve. Our analysis confirms that appropriate combinations of channel features and RS codes lead to a computationally secure generation of a 256-bit crypto-key according to the principles of the National Institute of Standards and Technology (NIST), even if Eve is informed about the RS encoder and the SHA-3 function.","PeriodicalId":371411,"journal":{"name":"2021 Fifth Underwater Communications and Networking Conference (UComms)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Fifth Underwater Communications and Networking Conference (UComms)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UComms50339.2021.9598159","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

We propose a strategy for generating the same crypto-key between two trusted underwater acoustic nodes (Alice and Bob) without revealing it to an eavesdropper (Eve). Our work builds upon the results of [1] where a methodology for generating a string of bits for Alice, Bob and Eve based on channel feature extraction and quantization is discussed. In this paper, we aim to reconcile the respective bits of Alice and Bob while minimizing the information leaked to Eve. To this end, we examine various Reed Solomon (RS) codes and measure the reconciliation rate of Alice, Bob and Eve. Additionally, we propose the Secure Hash Algorithm-3 (SHA-3) as means to eliminate any information that Eve acquires during reconciliation. We evaluate our reconciliation and privacy amplification strategies with bits generated from real underwater acoustic channel probe exchanges between Alice and Bob and Bellhop-simulated channels for Eve. Our analysis confirms that appropriate combinations of channel features and RS codes lead to a computationally secure generation of a 256-bit crypto-key according to the principles of the National Institute of Standards and Technology (NIST), even if Eve is informed about the RS encoder and the SHA-3 function.
水声信道中针对知情窃听者的物理层安全:和解与隐私放大
我们提出一种策略,在两个可信的水声节点(Alice和Bob)之间生成相同的加密密钥,而不会将其泄露给窃听者(Eve)。我们的工作建立在[1]的结果之上,其中讨论了基于信道特征提取和量化为Alice, Bob和Eve生成一串比特的方法。在本文中,我们的目标是调和Alice和Bob各自的比特,同时最小化泄露给Eve的信息。为此,我们研究了各种里德·所罗门码,并测量了爱丽丝、鲍勃和夏娃的和解率。此外,我们提出了安全哈希算法-3 (SHA-3)作为消除Eve在和解过程中获得的任何信息的手段。我们用Alice和Bob之间的真实水声通道探针交换和Eve的bellhop模拟通道产生的比特来评估我们的和解和隐私放大策略。我们的分析证实,根据美国国家标准与技术研究所(NIST)的原则,即使Eve被告知RS编码器和SHA-3功能,信道特征和RS代码的适当组合也会导致256位加密密钥的计算安全生成。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信