Title :
Percolation and Connectivity in the Intrinsically Secure Communications Graph
Author :
Pinto, Pedro C. ; Win, Moe Z.
Author_Institution :
Lab. for Inf. & Decision Syst., Massachusetts Inst. of Technol., Cambridge, MA, USA
fDate :
3/1/2012 12:00:00 AM
Abstract :
The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper aims to characterize the global properties of the iS-graph in terms of (1) percolation on the infinite plane, and (2) full connectivity on a finite region. First, for the Poisson iS-graph defined on the infinite plane, the existence of a phase transition is proven, whereby an unbounded component of connected nodes suddenly arises as the density of legitimate nodes is increased. This shows that long-range secure communication is still possible in the presence of eavesdroppers. Second, full connectivity on a finite region of the Poisson iS-graph is considered. The exact asymptotic behavior of full connectivity in the limit of a large density of legitimate nodes is characterized. Then, simple, explicit expressions are derived in order to closely approximate the probability of full connectivity for a finite density of legitimate nodes. These results help clarify how the presence of eavesdroppers can compromise long-range secure communication.
Keywords :
Poisson equation; approximation theory; graph theory; probability; radio networks; telecommunication security; Poisson iS-graph; approximation; eavesdroppers; governmental networks; intrinsically secure communication graph; large-scale network; legitimate node density; long-range secure communication; military networks; probability; random graph; secret information; wireless medium; Communication system security; Couplings; Face; Security; Signal to noise ratio; Wireless networks; Connectivity; percolation; physical-layer security; stochastic geometry; wireless networks;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2011.2173726