{"id":16782,"date":"2025-04-03T09:27:50","date_gmt":"2025-04-03T12:27:50","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=16782"},"modified":"2025-04-03T09:27:50","modified_gmt":"2025-04-03T12:27:50","slug":"los-drones-ahora-pueden-escuchar-mensajes-submarinos","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=16782","title":{"rendered":"Los drones ahora pueden escuchar mensajes submarinos"},"content":{"rendered":"<p>Investigadores de\u00a0Princeton\u00a0y\u00a0el MIT\u00a0han desarrollado un m\u00e9todo para interceptar comunicaciones submarinas desde el aire, desafiando creencias arraigadas sobre la seguridad de las transmisiones submarinas. El equipo cre\u00f3 un dispositivo que utiliza un radar para interceptar se\u00f1ales ac\u00fasticas submarinas, o sonar, decodificando las diminutas vibraciones que estas producen en la superficie del agua.<\/p>\n<hr \/>\n<p><strong>Cross-medium eavesdropping technology challenges long-held assumptions about the security of underwater communications.<\/strong><\/p>\n<p data-slot-rendered-content=\"true\">Researchers from\u00a0<a href=\"https:\/\/scitechdaily.com\/tag\/princeton-university\/\" target=\"_blank\" rel=\"noopener\">Princeton<\/a>\u00a0and\u00a0<a href=\"https:\/\/scitechdaily.com\/tag\/mit\/\" target=\"_blank\" rel=\"noopener\"><span class=\"glossaryLink\" tabindex=\"0\" role=\"link\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemTitle&gt;MIT&lt;\/div&gt;&lt;div class=glossaryItemBody&gt;MIT is an acronym for the Massachusetts Institute of Technology. It is a prestigious private research university in Cambridge, Massachusetts that was founded in 1861. It is organized into five Schools: architecture and planning; engineering; humanities, arts, and social sciences; management; and science. MIT&amp;#039;s impact includes many scientific breakthroughs and technological advances. Their stated goal is to make a better world through education, research, and innovation.&lt;\/div&gt;\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\">MIT<\/span><\/a>\u00a0have developed a method to intercept underwater communications from the air, challenging long-standing beliefs about the security of underwater transmissions.<\/p>\n<p>The team created a device that uses radar to eavesdrop on underwater acoustic signals, or sonar, by decoding the tiny vibrations those signals produce on the water\u2019s surface. In principle, the technique could also roughly identify the location of an underwater transmitter, the researchers said.<\/p>\n<p>In a paper presented at ACM MobiCom on November 20, the team described the technology and proposed strategies to defend against the new type of eavesdropping it enables. They successfully demonstrated the system on Lake Carnegie, a small man-made lake in Princeton. While applying this method in the open ocean presents far greater challenges, the researchers believe it could be achieved with substantial engineering advancements.<\/p>\n<p>The researchers said their intention is not only to alert people to the vulnerability of underwater transmissions, but also to detail methods that can be used to prevent interceptions.<\/p>\n<p>\u201cI\u2019m hoping that some of the countermeasure strategies that we propose will be picked up by people who design acoustic transmitters for underwater communication,\u201d said Yasaman Ghasempour, assistant professor of electrical and computer engineering and the study\u2019s principal investigator.<\/p>\n<p>Transmitting messages between underwater and airborne devices was considered technically infeasible until researchers from MIT developed a system to do so in 2018. But the MIT technique relied on cooperation between the air and sea parties \u2014 sharing data rates, frequencies, and other key technical details in advance. At the time, it wasn\u2019t clear whether this technique could be used to intercept private messages from non-cooperative underwater transmitters.<\/p>\n<figure id=\"attachment_16784\" aria-describedby=\"caption-attachment-16784\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"size-large wp-image-16784\" src=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2025\/04\/SURF-Experiment-at-Lake-Carnegie-1024x767.jpg\" alt=\"\" width=\"790\" height=\"592\" srcset=\"https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2025\/04\/SURF-Experiment-at-Lake-Carnegie-1024x767.jpg 1024w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2025\/04\/SURF-Experiment-at-Lake-Carnegie-300x225.jpg 300w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2025\/04\/SURF-Experiment-at-Lake-Carnegie-768x575.jpg 768w, https:\/\/www.fie.undef.edu.ar\/ceptm\/wp-content\/uploads\/2025\/04\/SURF-Experiment-at-Lake-Carnegie.jpg 1258w\" sizes=\"(max-width: 790px) 100vw, 790px\" \/><figcaption id=\"caption-attachment-16784\" class=\"wp-caption-text\">Researchers tested their eavesdropping system at Lake Carnegie in Princeton using only off-the-shelf, commercially available equipment, proving that it works in real-world environments. Credit: Princeton University\/Poorya Mollahosseini<\/figcaption><\/figure>\n<p>Collaborating with the MIT group, Ghasempour and her Princeton team explored the security implications of the technology and developed a way to decipher the same kinds of messages without knowing any of those technical details.<\/p>\n<p>The researchers said the ability to intercept underwater communications from the air poses a wide array of security risks. They said an adversary could use the technology to intercept sensitive information transmitted by climate monitoring sensors, oil and gas rigs, and even submarines.<\/p>\n<p>\u201cThis work shows that sensitive information can be leaked in ways that previously haven\u2019t been considered,\u201d said Poorya Mollahosseini, a graduate student at Princeton and the paper\u2019s co-lead author with Sayed Saad Afzal, a graduate student at MIT.<\/p>\n<p><strong>How are underwater communications protected?<\/strong><\/p>\n<p>The security of underwater communications relies heavily on the inability of sound traveling underwater to penetrate the surface, the researchers said. Signals that carry information are transmitted underwater as sound waves. Because water and air have very different densities, the water\u2019s surface acts as a barrier for sound. When underwater sound waves hit the surface, they mostly just bounce off.<\/p>\n<p data-slot-rendered-content=\"true\">In 2018, the MIT group realized that the impact of the sound waves on the water\u2019s surface leaves a sort of fingerprint of tiny vibrations that correspond to the underwater signal. The team used a radar mounted on a drone to read the surface vibrations and deployed algorithms to detect the pattern, decode the signal, and extract the message.<\/p>\n<p>\u201cUnderwater-to-air communications is one of the most difficult long-standing problems in our field,\u201d said Fadel Adib, associate professor of media arts and sciences at MIT and co-author on the new paper. \u201cIt was exciting \u2013 and surprising \u2013 to see our method succeed in decoding underwater messages from the tiny vibrations they caused on the surface.\u201d<\/p>\n<p>But for the technique to work, the MIT team\u2019s system required knowledge of certain physical parameters, such as the transmission\u2019s frequency and modulation type, in advance.<\/p>\n<p>Building on this development, the team at Princeton used a similar method to detect the surface vibrations, but developed new algorithms that capitalize on the differences between radar and sonar to uncover those physical parameters. That allowed the researchers to decode the message without cooperation from the underwater transmitter.<\/p>\n<p>Using an inexpensive commercial drone and radar, the researchers tested their method in a swimming pool. The researchers deployed a speaker under the water and, as swimmers provided interference, flew a drone over the surface. The drone repeatedly sent brief radar chirps toward the water. When the radar signals bounced off the water\u2019s surface, they revealed the pattern of vibrations from the sound waves for the system to detect and decode.<\/p>\n<p>The researchers also used a boom-mounted radar for tests in a real-world environment at Carnegie Lake in Princeton. They found that the system could figure out the unknown parameters and decode messages from the speaker, even with interference from wind and waves. In fact, it could determine the modulation type, one of the most important parameters, with 97.58%\u00a0<span class=\"glossaryLink\" tabindex=\"0\" role=\"link\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemTitle&gt;accuracy&lt;\/div&gt;&lt;div class=glossaryItemBody&gt;How close the measured value conforms to the correct value.&lt;\/div&gt;\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\">accuracy<\/span>.<\/p>\n<p>\u201cWe wanted to show that this could be done with off-the-shelf, basic equipment,\u201d Ghasempour said. \u201cImagine what someone could do with a more sophisticated radar.\u201d<\/p>\n<p>They found that the design parameters of an underwater communication link greatly impact its susceptibility to such attacks. Some types of modulation, for example, are easier to figure out than others. The paper provides recommendations on ways to design transmitters that are more resistant to eavesdropping. Ghasempour said that she hopes to follow up to provide more suggestions for ways to protect against these kinds of attacks.<\/p>\n<p>The article,\u00a0<a href=\"https:\/\/www.mit.edu\/~fadel\/papers\/SURF-mobicom24.pdf\" target=\"_blank\" rel=\"noopener\">SURF: Eavesdropping on Underwater Communications from the Air<\/a>, was presented Nov. 20 at ACM MobiCom in Washington, D.C. Support for the research was provided in part by the National Science Foundation, the Office of Naval Research, and\u00a0<span class=\"glossaryLink\" tabindex=\"0\" role=\"link\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemTitle&gt;Princeton University&lt;\/div&gt;&lt;div class=glossaryItemBody&gt;Founded in 1746, Princeton University is a private Ivy League research university in Princeton, New Jersey and the fourth-oldest institution of higher education in the United States. It provides undergraduate and graduate instruction in the humanities, social sciences, natural sciences, and engineering.&lt;\/div&gt;\" data-gt-translate-attributes=\"[{&quot;attribute&quot;:&quot;data-cmtooltip&quot;, &quot;format&quot;:&quot;html&quot;}]\">Princeton University<\/span>\u2019s Project X Innovation Fund.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/scitechdaily.com\/not-so-secure-drones-can-now-listen-to-underwater-messages\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/scitechdaily.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Investigadores de\u00a0Princeton\u00a0y\u00a0el MIT\u00a0han desarrollado un m\u00e9todo para interceptar comunicaciones submarinas desde el aire, desafiando creencias arraigadas sobre la seguridad de las transmisiones submarinas. El equipo&hellip; <\/p>\n","protected":false},"author":1,"featured_media":16783,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[18,2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/16782"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16782"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/16782\/revisions"}],"predecessor-version":[{"id":16785,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/16782\/revisions\/16785"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/16783"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}