Abstract
The primary goal of information security is to ensure the confidentiality, integrity, authenticity, and availability of information. Availability is often relegated to a discussion of denial of service attacks on network resources. Another form of denying availability is to prevent communication through the use of traditional jamming techniques. At the United States Air Force Academy Center for Information Security, we have been working on a new algorithm, BBC, which is based on a new type of coding theory known as concurrent codes that is resistant to traditional jamming techniques. While the formal definition and proofs of concurrent codes can be daunting, the algorithm’s effectiveness can be easily conveyed and appreciated through visual demonstration. This paper briefly introduces concurrent codes and describes an interactive applet that visually demonstrates the algorithm’s effectiveness in a noisy environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schweitzer, D., Baird, L., Bahn, W. (2008). Visually Understanding Jam Resistant Communication. In: Goodall, J.R., Conti, G., Ma, KL. (eds) VizSEC 2007. Mathematics and Visualization. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78243-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-78243-8_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78242-1
Online ISBN: 978-3-540-78243-8
eBook Packages: Computer ScienceComputer Science (R0)