论文标题
在模仿攻击下水下声学渠道的有效能力
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
论文作者
论文摘要
本文研究了身份验证对水下声学(UWA)渠道有效能力(EC)的影响。具体而言,UWA频道在合法节点对(Alice and Bob)附近存在的恶意节点(EVE)处于模仿攻击中;夏娃试图通过使鲍勃相信自己确实是爱丽丝来将其恶意数据注入系统。为了挫败夏娃的模仿攻击,鲍勃利用传输节点作为特征/指纹的距离在物理层上进行基于特征的身份验证。由于BOB的身份验证,由于在发送节点(Alice或EVE)上缺乏通道知识,并且由于基于阈值的解码误差模型,因此所考虑系统的相关动力学可以由Markov链(MC)建模。因此,我们计算MC的状态转变概率,以及与每个状态相对应的服务过程的时刻生成函数。这使我们能够从身份验证参数方面得出EC的封闭式表达。此外,我们通过渐变(GD)技术和人工神经网络(ANN)方法计算最佳传输速率(在爱丽丝)。仿真结果表明,在严重的身份验证约束下(即更多的错误警报和EVE的更多传输)下降。仿真结果还表明,ANN技术的(最佳传输速率)性能非常接近GD方法。
This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the impersonation attack by Eve, Bob utilizes the distance of the transmit node as the feature/fingerprint to carry out feature-based authentication at the physical layer. Due to authentication at Bob, due to lack of channel knowledge at the transmit node (Alice or Eve), and due to the threshold-based decoding error model, the relevant dynamics of the considered system could be modelled by a Markov chain (MC). Thus, we compute the state-transition probabilities of the MC, and the moment generating function for the service process corresponding to each state. This enables us to derive a closed-form expression of the EC in terms of authentication parameters. Furthermore, we compute the optimal transmission rate (at Alice) through gradient-descent (GD) technique and artificial neural network (ANN) method. Simulation results show that the EC decreases under severe authentication constraints (i.e., more false alarms and more transmissions by Eve). Simulation results also reveal that the (optimal transmission rate) performance of the ANN technique is quite close to that of the GD method.