dtnrg-4----Page:18
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18 

Given the resource-scarcity of DTNs, it would be counter-productive to perform typical traffic-flow analysis protection measures that are designed to disguise the legitimate traffic on the network, such as:
generating additional bogus traffic in addition to the legitimate traffic
Padding legitimate traffic to disguise the amount of traffic being transmitted
There is no provision for encrypting source or destination addresses to prevent disclosure of the communicating endpoints
the constraints of frequent disconnection and high round-trip times make the distribution of the key information that would be required for encryption and decryption of source and destination addresses at many hops throughout the network infeasible.
Traffic flow analysis is not provided
PPT Version