On security-aware transmission scheduling

Abstract

The problem of interest is to characterize to what extent nodes independently following certain transmission schedules can be hijacked to relay flows of information packets. Information flows can be embedded in given transmission schedules by properly adding delays and inserting dummy packets. Such hidden flows are usually indicators of network intrusion… (More)
DOI: 10.1109/ICASSP.2008.4517951

Topics

4 Figures and Tables

Slides referencing similar topics