Eavesdropping attacks in underwater acoustic networks

Qiu Wang, Hong-Ning Dai, Xuran Li, Hao Wang

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

2 Citations (Scopus)

Abstract

This paper investigates the eavesdropping attacks in underwater acoustic networks (UANets). In particular, we propose an analytical framework to model the eavesdropping attacks in UANets in terms of the eavesdropping probability. Results of extensive simulations match the analytical results, indicating the effectiveness and accuracy of our model. Besides, we also find that the eavesdropping probability in UANets heavily depends on the underwater acoustic channel characterizing by the acoustic signal frequency, the spreading factor and the distance between the transmitter and the eavesdropper. This study provides useful insights that will help us to design anti-eavesdropping schemes with a better protection on the confidential communications.

Original languageEnglish
Title of host publication2015 10th International Conference on Information, Communications and Signal Processing, ICICS 2015
PublisherIEEE
Number of pages5
Edition1st
ISBN (Electronic)9781467372183
DOIs
Publication statusPublished - 2 Dec 2015
Event10th International Conference on Information, Communications and Signal Processing, ICICS 2015 - Singapore, Singapore
Duration: 2 Dec 20154 Dec 2015
https://ieeexplore.ieee.org/xpl/conhome/7454592/proceeding (Conference proceedings)

Publication series

NameInternational Conference on Information, Communications and Signal Processing, ICICS

Conference

Conference10th International Conference on Information, Communications and Signal Processing, ICICS 2015
Country/TerritorySingapore
CitySingapore
Period2/12/154/12/15
Internet address

Scopus Subject Areas

  • Computer Networks and Communications
  • Information Systems
  • Signal Processing

User-Defined Keywords

  • Security
  • Eavesdropping
  • Underwater acoustic networks

Fingerprint

Dive into the research topics of 'Eavesdropping attacks in underwater acoustic networks'. Together they form a unique fingerprint.

Cite this