DocumentCode
3237204
Title
Maximum throughput of clandestine relay
Author
He, Ting ; Tong, Lang ; Swami, Ananthram
Author_Institution
IBM T.J. Watson Res. Center, Hawthorne, NY, USA
fYear
2009
fDate
Sept. 30 2009-Oct. 2 2009
Firstpage
1082
Lastpage
1089
Abstract
The maximum throughput of relaying information flows while concealing their presence is studied. The concealment is achieved by embedding transmissions of information flows into truly independent transmission schedules that resemble the normal transmission behaviors without any flow. Such embedding may reduce the throughput for delay-sensitive flows, and the paper provides a quantitative characterization of the level of reduction. Under a strict or average delay constraint, the maximum normalized throughput is measured by the efficiency of the optimal relay algorithms that embed the most flow into given transmission schedules. Exact analytical solutions and closed-form approximations are derived for renewal schedules, verified by simulations on both synthetic traffic and traces. The results reveal general relationships between the clandestine throughput and system parameters including delay constraints, traffic load, and traffic distributions. In particular, the throughput is found to be negatively related to the burstiness of the cover traffic. Moreover, simulations show that the throughputs of renewal traffic with certain power-law interarrival distributions can closely approximate those of actual traces.
Keywords
security of data; telecommunication congestion control; telecommunication security; clandestine relay; clandestine throughput; closed-form approximation; concealment; delay-sensitive flow; embedding transmission; information flow; maximum normalized throughput; maximum throughput; optimal relay algorithm; power law interarrival distribution; renewal traffic; synthetic traffic; traffic distributions; transmission schedules; Delay; Government; Helium; Information analysis; Relays; Scheduling algorithm; Telecommunication traffic; Throughput; Timing; Traffic control; Anonymous networking; Clandestine relay; Information flow/Relayed traffic flow; Intrusion detection;
fLanguage
English
Publisher
ieee
Conference_Titel
Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on
Conference_Location
Monticello, IL
Print_ISBN
978-1-4244-5870-7
Type
conf
DOI
10.1109/ALLERTON.2009.5394874
Filename
5394874
Link To Document