• DocumentCode
    3237204
  • Title

    Maximum throughput of clandestine relay

  • Author

    He, Ting ; Tong, Lang ; Swami, Ananthram

  • Author_Institution
    IBM T.J. Watson Res. Center, Hawthorne, NY, USA
  • fYear
    2009
  • fDate
    Sept. 30 2009-Oct. 2 2009
  • Firstpage
    1082
  • Lastpage
    1089
  • Abstract
    The maximum throughput of relaying information flows while concealing their presence is studied. The concealment is achieved by embedding transmissions of information flows into truly independent transmission schedules that resemble the normal transmission behaviors without any flow. Such embedding may reduce the throughput for delay-sensitive flows, and the paper provides a quantitative characterization of the level of reduction. Under a strict or average delay constraint, the maximum normalized throughput is measured by the efficiency of the optimal relay algorithms that embed the most flow into given transmission schedules. Exact analytical solutions and closed-form approximations are derived for renewal schedules, verified by simulations on both synthetic traffic and traces. The results reveal general relationships between the clandestine throughput and system parameters including delay constraints, traffic load, and traffic distributions. In particular, the throughput is found to be negatively related to the burstiness of the cover traffic. Moreover, simulations show that the throughputs of renewal traffic with certain power-law interarrival distributions can closely approximate those of actual traces.
  • Keywords
    security of data; telecommunication congestion control; telecommunication security; clandestine relay; clandestine throughput; closed-form approximation; concealment; delay-sensitive flow; embedding transmission; information flow; maximum normalized throughput; maximum throughput; optimal relay algorithm; power law interarrival distribution; renewal traffic; synthetic traffic; traffic distributions; transmission schedules; Delay; Government; Helium; Information analysis; Relays; Scheduling algorithm; Telecommunication traffic; Throughput; Timing; Traffic control; Anonymous networking; Clandestine relay; Information flow/Relayed traffic flow; Intrusion detection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication, Control, and Computing, 2009. Allerton 2009. 47th Annual Allerton Conference on
  • Conference_Location
    Monticello, IL
  • Print_ISBN
    978-1-4244-5870-7
  • Type

    conf

  • DOI
    10.1109/ALLERTON.2009.5394874
  • Filename
    5394874