On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack

02/12/2020
by   Waqas Aman, et al.
0

This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the impersonation attack by Eve, Bob utilizes the distance of the transmit node as the feature/fingerprint to carry out feature-based authentication at the physical layer. Due to authentication at Bob, due to lack of channel knowledge at the transmit node (Alice or Eve), and due to the threshold-based decoding error model, the relevant dynamics of the considered system could be modelled by a Markov chain (MC). Thus, we compute the state-transition probabilities of the MC, and the moment generating function for the service process corresponding to each state. This enables us to derive a closed-form expression of the EC in terms of authentication parameters. Furthermore, we compute the optimal transmission rate (at Alice) through gradient-descent (GD) technique and artificial neural network (ANN) method. Simulation results show that the EC decreases under severe authentication constraints (i.e., more false alarms and more transmissions by Eve). Simulation results also reveal that the (optimal transmission rate) performance of the ANN technique is quite close to that of the GD method.

READ FULL TEXT

page 1

page 2

page 6

research
05/31/2018

Impersonation Detection in AWGN-limited Underwater Acoustic Sensor Networks

This work addresses the problem of impersonation detection in an underwa...
research
07/18/2019

Channel Impulse Response-based Physical Layer Authentication in a Diffusion-based Molecular Communication System

Consider impersonation attack by an active malicious nano node (Eve) on ...
research
04/02/2022

Countering Active Attacks on RAFT-based IoT Blockchain Networks

This paper considers an Internet of Thing (IoT) blockchain network consi...
research
10/19/2022

Effective Capacity of URLLC over Parallel Fading Channels with Imperfect Channel State Information

This paper investigates the effective capacity of a point-to-point ultra...
research
09/01/2020

Preventing Identity Attacks in RFID Backscatter Communication Systems: A Physical-Layer Approach

This work considers identity attack on a radio-frequency identification ...
research
06/07/2018

Cooperative Authentication in Underwater Acoustic Sensor Networks

With the growing use of underwater acoustic communication (UWAC) for bot...

Please sign up or login with your details

Forgot password? Click here to reset