The Embedding Capacity of Information Flows Under Renewal Traffic

被引:12
作者
Marano, Stefano [1 ,2 ]
Matta, Vincenzo [1 ,2 ]
He, Ting [3 ]
Tong, Lang [4 ]
机构
[1] Univ Salerno, Dept Informat & Elect Engn, I-84084 Fisciano, SA, Italy
[2] Univ Salerno, I-84084 Fisciano, SA, Italy
[3] IBM TJ Watson Res Ctr, Yorktown Hts, NY 10598 USA
[4] Cornell Univ, Dept Elect & Comp Engn, Ithaca, NY 14853 USA
基金
美国国家科学基金会;
关键词
Embedding capacity; information flow; intrusion detection and security; point processes and inference; Riemann-Hilbert problem; BROADCAST CHANNELS; COMMUNICATION; NETWORKS;
D O I
10.1109/TIT.2012.2227672
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given two independent point processes and a certain rule for matching points between them, what is the fraction of matched points over infinitely long streams? In many application contexts, e. g., secure networking, a meaningful matching rule is that of a maximum causal delay, and the problem is related to embedding a flow of packets in cover traffic such that no timing analysis can detect it. We study the best undetectable embedding policy and the corresponding maximum flow rate-that we call the embedding capacity-under the assumption that the cover traffic can be modeled as an arbitrary renewal process. We find that computing the embedding capacity requires the inversion of a very structured linear system that, for a broad range of renewal models encountered in practice, admits a fully analytical expression in terms of the renewal function of the processes. This result enables us to explore the properties of the embedding capacity, obtaining closed-form solutions for selected distribution families and a suite of sufficient conditions on the capacity ordering. We test our solution on real network traces, which shows a remarkable match for tight delay constraints. A gap between the predicted and the actual embedding capacities appears for looser constraints, and further investigation reveals that it is caused by inaccuracy of the renewal traffic model rather than of the solution itself.
引用
收藏
页码:1724 / 1739
页数:16
相关论文
共 48 条
[1]   Distributed Detection of Multi-Hop Information Flows With Fusion Capacity Constraints [J].
Agaskar, Ameya ;
He, Ting ;
Tong, Lang .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (06) :3373-3383
[2]  
[Anonymous], 2008, HDB INTEGRAL EQUAION, DOI DOI 10.1201/9781420010558
[3]  
[Anonymous], 1996, Stochastic Processes
[4]   Wiretap Channel With Secure Rate-Limited Feedback [J].
Ardestanizadeh, Ehsan ;
Franceschetti, Massimo ;
Javidi, Tara ;
Kim, Young-Han .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (12) :5353-5361
[5]  
Barlow R.E., 1996, MATH THEORY RELIABIL
[6]  
Billingsley Patrick, 1995, Probability and Measure
[7]  
Blum A., 2004, P C REC ADV INTR DET, P39
[8]   REMAINDER TERM ESTIMATES OF THE RENEWAL FUNCTION [J].
CARLSSON, H .
ANNALS OF PROBABILITY, 1983, 11 (01) :143-157
[9]   UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS [J].
CHAUM, DL .
COMMUNICATIONS OF THE ACM, 1981, 24 (02) :84-88
[10]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892