When and How to Aggregate Message Authentication Codes on Lossy Channels?

E Wagner, M Serror, K Wehrle, M Henze - International Conference on …, 2024 - Springer
Aggregation of message authentication codes (MACs) is a proven and efficient method to
preserve valuable bandwidth in resource-constrained environments: Instead of appending a …

Performance Analysis of a WPCN-Based Underwater Acoustic Communication System

R Xing, Y Zhang, Y Feng, F Ji - Journal of Marine Science and …, 2023 - mdpi.com
Underwater acoustic communication (UWAC) has a wide range of applications, including
marine environment monitoring, disaster warning, seabed terrain exploration, and oil …

Design and Implementation of a Gateway Buoy for the Underwater-IoT

G Schneider, M Goetz, I Nissen - 2023 IEEE 48th Conference …, 2023 - ieeexplore.ieee.org
In this paper, we propose a concept, design, and implementation of a moored buoy, that is
equipped with under-water and radio modems, allowing it to function as a gateway between …

The JANUS Underwater Communications Standard: From Promulgation to Present

R Petroccia, J Alves - OCEANS 2024-Singapore, 2024 - ieeexplore.ieee.org
JANUS is a NATO standard (STANAG 4748)[1] and is the first internationally adopted digital
underwater acoustic communications standard. In a nutshell, it is a simple and robust …

On Real-Time Underwater Acoustic Communication with a Prototype Modem Implementation

H Dol, K Blom, M Colin - OCEANS 2024-Singapore, 2024 - ieeexplore.ieee.org
This study highlights a specific use case of underwater acoustic communication where the
(soft) real-time requirement has relatively low impact on the system and communication …

Experimental Demonstrations of CATL, the Collaborative Autonomy Tasking Layer

MWG van Riet, J Alves, G Arcieri… - OCEANS 2023 …, 2023 - ieeexplore.ieee.org
This paper describes the continued efforts on the development of and experiments
conducted with CATL (Collaborative Autonomy Tasking Layer). CATL aims to enable …

Madtls: Fine-grained middlebox-aware end-to-end security for industrial communication

E Wagner, D Heye, M Serror, I Kunze… - Proceedings of the 19th …, 2024 - dl.acm.org
Industrial control systems increasingly rely on middlebox functionality such as intrusion
detection or in-network processing. However, traditional end-to-end security protocols …