Proceedings of 9th Annual Computer Security Applications Conference
DOI: 10.1109/csac.1993.315448
|View full text |Cite
|
Sign up to set email alerts
|

Transmission schedules to prevent traffic analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(23 citation statements)
references
References 2 publications
0
23
0
Order By: Relevance
“…The idea of a fixed schedule was previously presented by Newman-Wolfe and Venkatraman [7], [8] and by Radosavljevic and Hajek [9]. However, references [7] and [8] focus on the case of a fully connected network and do not exploit the wireless network topology to schedule simultaneous, noninterfering transmissions across the network to increase the throughput.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The idea of a fixed schedule was previously presented by Newman-Wolfe and Venkatraman [7], [8] and by Radosavljevic and Hajek [9]. However, references [7] and [8] focus on the case of a fully connected network and do not exploit the wireless network topology to schedule simultaneous, noninterfering transmissions across the network to increase the throughput.…”
Section: Introductionmentioning
confidence: 99%
“…However, references [7] and [8] focus on the case of a fully connected network and do not exploit the wireless network topology to schedule simultaneous, noninterfering transmissions across the network to increase the throughput. A different approach to anonymity in wireless networks vis-à-vis a global eavesdropper was presented by [10], where each node generates a random transmission schedule, statistically independent of the session and of the schedules of other nodes in the network.…”
Section: Introductionmentioning
confidence: 99%
“…Very little research has been done on protecting encrypted Internet Protocol links against traffic analysis, despite warnings about the threat posed against standard protocols like IPSec [6] and TLS. Venkatraman and Newman-Wolfe [55,70] have looked at imposing traffic schedules to minimize information leaked as well as covert channels. Ways to analyse the cost and anonymity provided by such systems is presented in [54].…”
Section: Resisting Traffic Analysis On the Internetmentioning
confidence: 99%
“…The other is the covert communication that Alice has to Eve. A way to stop the covert communication would be for the anonymizing device to pad [15,16,17,26,27] messages so that it would appear to Eve that both Alice and Clueless are transmitting a message. This inefficiency might be tolerated in such an ideal situation as Case 2.1, but such a strategy must be called into question when it comes to real traffic.…”
Section: Two Special Cases Of Scenario 2: -Alice Alone and With And mentioning
confidence: 99%
“…perfect anonymity can inadvertently introduce covert communication channels. We do not discuss "fixes" to the covert channel problem as has been done in traffic analysis of network communications [16,17,26,27,28]. Rather, our interest is in measuring the covert channel capacity.…”
Section: Introductionmentioning
confidence: 99%