TY - GEN
T1 - Hiding traffic flow in communication networks
AU - Radosavljevic, B.
AU - Hajek, B.
N1 - Publisher Copyright:
© 1992 IEEE.
PY - 1992
Y1 - 1992
N2 - The authors consider hiding traffic flow on a communication network from an outside eavesdropper. It is assumed that the eavesdropper can detect transmissions, but cannot understand the encrypted messages being sent. The solution proposed for the network is to choose a transmitter activation schedule independent of the traffic demand, and to use this schedule for all data transfers. For the spread spectrum broadcast model, the authors analyze the cost of using this scheme, as reflected in a possible reduction of throughput.
AB - The authors consider hiding traffic flow on a communication network from an outside eavesdropper. It is assumed that the eavesdropper can detect transmissions, but cannot understand the encrypted messages being sent. The solution proposed for the network is to choose a transmitter activation schedule independent of the traffic demand, and to use this schedule for all data transfers. For the spread spectrum broadcast model, the authors analyze the cost of using this scheme, as reflected in a possible reduction of throughput.
UR - http://www.scopus.com/inward/record.url?scp=84964477407&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84964477407&partnerID=8YFLogxK
U2 - 10.1109/MILCOM.1992.244116
DO - 10.1109/MILCOM.1992.244116
M3 - Conference contribution
AN - SCOPUS:84964477407
T3 - Proceedings - IEEE Military Communications Conference MILCOM
SP - 1096
EP - 1100
BT - Military Communications Conference, MILCOM 1992
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 1992 Military Communications Conference, MILCOM 1992
Y2 - 11 October 1992 through 14 October 1992
ER -