Visually Understanding Jam Resistant Communication [chapter]

D. Schweitzer, L. Baird, W. Bahn
VizSEC 2007  
The primary goal of information security is to ensure the confidentiality, integrity, authenticity, and availability of information. Availability is often relegated to a discussion of denial of service attacks on network resources. Another form of denying availability is to prevent communication through the use of traditional jamming techniques. At the United States Air Force Academy Center for Information Security, we have been working on a new algorithm, BBC, which is based on a new type of
more » ... ding theory known as concurrent codes that is resistant to traditional jamming techniques. While the formal definition and proofs of concurrent codes can be daunting, the algorithm's effectiveness can be easily conveyed and appreciated through visual demonstration. This paper briefly introduces concurrent codes and describes an interactive applet that visually demonstrates the algorithm's effectiveness in a noisy environment.
doi:10.1007/978-3-540-78243-8_12 dblp:conf/vizsec/SchweitzerBB07 fatcat:fhhqalo66vcghdfxw52jl3w3qm