By Topic

Hiding traffic flow in communication networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
B. Radosavljevic ; Dept. of Electr. & Comput. Eng., Illinois Univ., Urbana, IL, USA ; B. Hajek

The authors consider hiding traffic flow on a communication network from an outside eavesdropper. It is assumed that the eavesdropper can detect transmissions, but cannot understand the encrypted messages being sent. The solution proposed for the network is to choose a transmitter activation schedule independent of the traffic demand, and to use this schedule for all data transfers. For the spread spectrum broadcast model, the authors analyze the cost of using this scheme, as reflected in a possible reduction of throughput

Published in:

Military Communications Conference, 1992. MILCOM '92, Conference Record. Communications - Fusing Command, Control and Intelligence., IEEE

Date of Conference:

11-14 Oct 1992