DocumentCode :
3237204
Title :
Maximum throughput of clandestine relay
Author :
He, Ting ; Tong, Lang ; Swami, Ananthram
Author_Institution :
IBM T.J. Watson Res. Center, Hawthorne, NY, USA
fYear :
2009
fDate :
Sept. 30 2009-Oct. 2 2009
Firstpage :
1082
Lastpage :
1089
Abstract :
The maximum throughput of relaying information flows while concealing their presence is studied. The concealment is achieved by embedding transmissions of information flows into truly independent transmission schedules that resemble the normal transmission behaviors without any flow. Such embedding may reduce the throughput for delay-sensitive flows, and the paper provides a quantitative characterization of the level of reduction. Under a strict or average delay constraint, the maximum normalized throughput is measured by the efficiency of the optimal relay algorithms that embed the most flow into given transmission schedules. Exact analytical solutions and closed-form approximations are derived for renewal schedules, verified by simulations on both synthetic traffic and traces. The results reveal general relationships between the clandestine throughput and system parameters including delay constraints, traffic load, and traffic distributions. In particular, the throughput is found to be negatively related to the burstiness of the cover traffic. Moreover, simulations show that the throughputs of renewal traffic with certain power-law interarrival distributions can closely approximate those of actual traces.
Keywords :
security of data; telecommunication congestion control; telecommunication security; clandestine relay; clandestine throughput; closed-form approximation; concealment; delay-sensitive flow; embedding transmission; information flow; maximum normalized throughput; maximum throughput; optimal relay algorithm; power law interarrival distribution; renewal traffic; synthetic traffic; traffic distributions; transmission schedules; Delay; Government; Helium; Information analysis; Relays; Scheduling algorithm; Telecommunication traffic; Throughput; Timing; Traffic control; Anonymous networking; Clandestine relay; Information flow/Relayed traffic flow; Intrusion detection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on
Conference_Location :
Monticello, IL
Print_ISBN :
978-1-4244-5870-7
Type :
conf
DOI :
10.1109/ALLERTON.2009.5394874
Filename :
5394874
Link To Document :
بازگشت