Interception of Bio-Mimicking Underwater Acoustic Communications Signals

Tamir Mishali, Paolo Casari, Roee Diamant

Research output: Contribution to journalArticlepeer-review

Abstract

We describe a biomimicking (BM) interception scheme tailored to underwater acoustic communications (UACs), which aims at separating authentic and BM signals. Our interceptor leverages the expected stability of the BM sources, as opposed to vocalizations by marine fauna, which are expected to move fast and rapidly change orientation. Consequently, the channel impulse response (CIR) of the link between a receiver and a BM source is expected to be much more stable than those corresponding to actual vocalizations. We quantify this stability by testing the randomness of the representation of the CIRs. The latter are represented by two similarity metrics: 1) the cross-correlation and 2) the sample entropy between adjacent CIRs features. We offered two interception measures: 1) testing the similarity between a Gaussian distribution and the distribution of the similarity measures using the Kullback-Leibler divergence (KLD) criteria for quantification and 2) the minimum number of clusters to effectively segment the similarity measures as a point cloud. Results from simulations for artificial signals mimicking dolphin whistles and the outcomes of a lake trial demonstrate the effectiveness of our BM interceptor.

Original languageEnglish
Pages (from-to)27620-27634
Number of pages15
JournalIEEE Internet of Things Journal
Volume11
Issue number16
DOIs
StatePublished - 2024

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Biomimicking (BM)
  • dolphin whistles
  • interception
  • physical layer security
  • underwater acoustic communications (UACs)

ASJC Scopus subject areas

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Interception of Bio-Mimicking Underwater Acoustic Communications Signals'. Together they form a unique fingerprint.

Cite this