Visible to the public On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack

TitleOn the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Publication TypeConference Paper
Year of Publication2020
AuthorsAman, W., Haider, Z., Shah, S. W. H., Rahman, M. M. Ur, Dobre, O. A.
Conference NameICC 2020 - 2020 IEEE International Conference on Communications (ICC)
Date PublishedJune 2020
PublisherIEEE
ISBN Number978-1-7281-5089-5
KeywordsAcoustic Fingerprints, artificial neural network, Artificial neural networks, authentication, authentication constraints, channel coding, composability, effective capacity, feature-based authentication, gradient methods, gradient-descent technique, GTJ method, Human Behavior, impersonation attack, Kuiper belt, malicious data, malicious node, Markov chain, Markov processes, neural nets, probability, pubcrawl, quality-of-service, resilience, Resiliency, state-transition probabilities, telecommunication computing, telecommunication security, threshold-based decoding error model, underwater acoustic, underwater acoustic channel, underwater acoustic communication, UWA channel, wireless channels
Abstract

This paper investigates the impact of authentication on effective capacity (EC) of an underwater acoustic (UWA) channel. Specifically, the UWA channel is under impersonation attack by a malicious node (Eve) present in the close vicinity of the legitimate node pair (Alice and Bob); Eve tries to inject its malicious data into the system by making Bob believe that she is indeed Alice. To thwart the impersonation attack by Eve, Bob utilizes the distance of the transmit node as the feature/fingerprint to carry out feature-based authentication at the physical layer. Due to authentication at Bob, due to lack of channel knowledge at the transmit node (Alice or Eve), and due to the threshold-based decoding error model, the relevant dynamics of the considered system could be modelled by a Markov chain (MC). Thus, we compute the state-transition probabilities of the MC, and the moment generating function for the service process corresponding to each state. This enables us to derive a closed-form expression of the EC in terms of authentication parameters. Furthermore, we compute the optimal transmission rate (at Alice) through gradient-descent (GD) technique and artificial neural network (ANN) method. Simulation results show that the EC decreases under severe authentication constraints (i.e., more false alarms and more transmissions by Eve). Simulation results also reveal that the (optimal transmission rate) performance of the ANN technique is quite close to that of the GTJ method.

URLhttps://ieeexplore.ieee.org/document/9149395
DOI10.1109/ICC40277.2020.9149395
Citation Keyaman_effective_2020