Hiding traffic flow in communication networks

B. Radosavljevic, B. Hajek

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The authors consider hiding traffic flow on a communication network from an outside eavesdropper. It is assumed that the eavesdropper can detect transmissions, but cannot understand the encrypted messages being sent. The solution proposed for the network is to choose a transmitter activation schedule independent of the traffic demand, and to use this schedule for all data transfers. For the spread spectrum broadcast model, the authors analyze the cost of using this scheme, as reflected in a possible reduction of throughput.

Original languageEnglish (US)
Title of host publicationMilitary Communications Conference, MILCOM 1992
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1096-1100
Number of pages5
ISBN (Electronic)078030585X
DOIs
StatePublished - 1992
Event1992 Military Communications Conference, MILCOM 1992 - San Diego, United States
Duration: Oct 11 1992Oct 14 1992

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM
Volume1992-October

Conference

Conference1992 Military Communications Conference, MILCOM 1992
Country/TerritoryUnited States
CitySan Diego
Period10/11/9210/14/92

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Hiding traffic flow in communication networks'. Together they form a unique fingerprint.

Cite this