Privacy-preserving routing protocols in wireless networks frequently utilize additional artificial traffic to hide the
source-destination identities of the communicating pair. Usually, the addition of artificial traffic is done heuristically with no
guarantees that the transmission cost, latency, etc., are optimized in every network topology.