TY - GEN
T1 - Maximum throughput of clandestine relay
AU - He, Ting
AU - Tong, Lang
AU - Swami, Ananthram
PY - 2009
Y1 - 2009
N2 - The maximum throughput of relaying information flows while concealing their presence is studied. The concealment is achieved by embedding transmissions of information flows into truly independent transmission schedules that resemble the normal transmission behaviors without any flow. Such embedding may reduce the throughput for delay-sensitive flows, and the paper provides a quantitative characterization of the level of reduction. Under a strict or average delay constraint, the maximum normalized throughput is measured by the efficiency of the optimal relay algorithms that embed the most flow into given transmission schedules. Exact analytical solutions and closed-form approximations are derived for renewal schedules, verified by simulations on both synthetic traffic and traces. The results reveal general relationships between the clandestine throughput and system parameters including delay constraints, traffic load, and traffic distributions. In particular, the throughput is found to be negatively related to the burstiness of the cover traffic. Moreover, simulations show that the throughputs of renewal traffic with certain powerlaw interarrival distributions can closely approximate those of actual traces.
AB - The maximum throughput of relaying information flows while concealing their presence is studied. The concealment is achieved by embedding transmissions of information flows into truly independent transmission schedules that resemble the normal transmission behaviors without any flow. Such embedding may reduce the throughput for delay-sensitive flows, and the paper provides a quantitative characterization of the level of reduction. Under a strict or average delay constraint, the maximum normalized throughput is measured by the efficiency of the optimal relay algorithms that embed the most flow into given transmission schedules. Exact analytical solutions and closed-form approximations are derived for renewal schedules, verified by simulations on both synthetic traffic and traces. The results reveal general relationships between the clandestine throughput and system parameters including delay constraints, traffic load, and traffic distributions. In particular, the throughput is found to be negatively related to the burstiness of the cover traffic. Moreover, simulations show that the throughputs of renewal traffic with certain powerlaw interarrival distributions can closely approximate those of actual traces.
UR - http://www.scopus.com/inward/record.url?scp=77949574715&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77949574715&partnerID=8YFLogxK
U2 - 10.1109/ALLERTON.2009.5394874
DO - 10.1109/ALLERTON.2009.5394874
M3 - Conference contribution
AN - SCOPUS:77949574715
SN - 9781424458714
T3 - 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
SP - 1082
EP - 1089
BT - 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
T2 - 2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
Y2 - 30 September 2009 through 2 October 2009
ER -