{"title":"Hiding traffic flow in communication networks","authors":"B. Radosavljevic, B. Hajek","doi":"10.1109/MILCOM.1992.244116","DOIUrl":null,"url":null,"abstract":"The authors consider hiding traffic flow on a communication network from an outside eavesdropper. It is assumed that the eavesdropper can detect transmissions, but cannot understand the encrypted messages being sent. The solution proposed for the network is to choose a transmitter activation schedule independent of the traffic demand, and to use this schedule for all data transfers. For the spread spectrum broadcast model, the authors analyze the cost of using this scheme, as reflected in a possible reduction of throughput.<<ETX>>","PeriodicalId":394587,"journal":{"name":"MILCOM 92 Conference Record","volume":"158 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"39","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 92 Conference Record","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.1992.244116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 39
Abstract
The authors consider hiding traffic flow on a communication network from an outside eavesdropper. It is assumed that the eavesdropper can detect transmissions, but cannot understand the encrypted messages being sent. The solution proposed for the network is to choose a transmitter activation schedule independent of the traffic demand, and to use this schedule for all data transfers. For the spread spectrum broadcast model, the authors analyze the cost of using this scheme, as reflected in a possible reduction of throughput.<>