Advertisement

VizSEC 2007 pp 175-186 | Cite as

Visually Understanding Jam Resistant Communication

  • D. Schweitzer
  • L. Baird
  • W. Bahn
Part of the Mathematics and Visualization book series (MATHVISUAL)

Abstract

The primary goal of information security is to ensure the confidentiality, integrity, authenticity, and availability of information. Availability is often relegated to a discussion of denial of service attacks on network resources. Another form of denying availability is to prevent communication through the use of traditional jamming techniques. At the United States Air Force Academy Center for Information Security, we have been working on a new algorithm, BBC, which is based on a new type of coding theory known as concurrent codes that is resistant to traditional jamming techniques. While the formal definition and proofs of concurrent codes can be daunting, the algorithm’s effectiveness can be easily conveyed and appreciated through visual demonstration. This paper briefly introduces concurrent codes and describes an interactive applet that visually demonstrates the algorithm’s effectiveness in a noisy environment.

Keywords

Shared Secret Message Space Spread Spectrum Communication Legitimate Signal Encode Message 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • D. Schweitzer
    • 1
  • L. Baird
    • 1
  • W. Bahn
    • 1
  1. 1.United States Air Force AcademyUSA

Personalised recommendations