Skip to main content

Key Managements of Underwater Acoustic Communication Environments

  • Conference paper
  • First Online:
Information Security Applications (WISA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10763))

Included in the following conference series:

  • 1019 Accesses

Abstract

In the underwater environment, it is difficult to use the RF signal used on the ground due to the characteristics of the medium different from the terrestrial. Therefore, when communicating with each node, acoustic communication is performed instead. Since the acoustic communication environment is poor in various aspects such as transmission speed and bandwidth compared to RF communication, it is difficult to apply the existing security method used in RF communication as it is. In this paper, we propose a key management method between entities considering underwater environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Park, M.: UW-AKE: lightweight authentication and key establishment protocol for underwater acoustic sensor networks (2016)

    Google Scholar 

  2. Yun, C.: Ticket-based authentication protocol for underwater wireless sensor network (2016)

    Google Scholar 

  3. Ibragimov, M.: CCM-UW security modes for low-band underwater acoustic sensor networks

    Google Scholar 

  4. Kim, H., Lee, J., Yi, O.: Proposal of piecewise key management design considering capability of underwater communication nodes (2017)

    Google Scholar 

  5. Urunov, K., Namgung, J.-I., Park, S.-H.: Custody transfer of bundle layer in security mechanism for underwater internet of things (UIoT) (2015)

    Google Scholar 

  6. Chan, H.: Random key predistribution schemes for sensor networks (2003)

    Google Scholar 

  7. TTAK.KO-06.0352.: Underwater Acoustic Communication Network System Overview and Requirements (2013)

    Google Scholar 

  8. TTAK.OT-06.0048.: Message Structure for Underwater Acoustic Modem (2014)

    Google Scholar 

  9. Raazi, S.M.K.R.: Key management schemes of wireless sensor networks: a survey

    Google Scholar 

  10. Fu, J.B., Li, Q.L., Li, S., Ssanyu, L.: A modified Q-composite random key predistribution scheme based on kryptograph (2010)

    Google Scholar 

Download references

Acknowledgments

The work is a part of the results of the research “Development of the wide-band underwater mobile communication systems” supported by Ministry of Oceans and Fisheries, Korea.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Hyunki Kim , Jaehoon Lee or Okyeon Yi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, H., Lee, J., Yi, O. (2018). Key Managements of Underwater Acoustic Communication Environments. In: Kang, B., Kim, T. (eds) Information Security Applications. WISA 2017. Lecture Notes in Computer Science(), vol 10763. Springer, Cham. https://doi.org/10.1007/978-3-319-93563-8_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93563-8_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93562-1

  • Online ISBN: 978-3-319-93563-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics