You are on page 1of 1

Hidden Traffic Flow: It is assumed that eavesdropper can detect the transmission, but can’t understand

the encrypted message being sent. Still eavesdropper can still deduce the information about the
network.

Ex: 1) Analyze traffic flow and detect the changes in traffic pattern.
2) Deduce the original sender of message.
3) Correlate traffic pattern with observable activities.

Thus hiding traffic flow technique has been used to protect the same. For that
Transmitter schedules Generator and link decision generator are used.

Input to TSG: 1) Network Topology


Input to LDG: 2) TSG, Network Topology and Traffic Demand.

For actual Traffic flow Link decision Generator are used, which is Hidden Traffic flow. And Eavesdropper
will only access TSG. By using this traffic flow is save.

Drawback: Reduced in the throughput, as its schedule in advance.

You might also like