DocumentCode :
2850119
Title :
Percolation in the secrecy graph
Author :
Sarkar, Amites ; Haenggi, Martin
Author_Institution :
Dept. of Math., Western Washington Univ., Bellingham, WA, USA
fYear :
2011
fDate :
6-11 Feb. 2011
Firstpage :
1
Lastpage :
6
Abstract :
Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely in the presence of eavesdroppers. In the case of infinite networks, a critical parameter is the maximum density of eavesdroppers that can be accommodated while still guaranteeing an infinite component in the network, i.e., the percolation threshold. We focus on the case where the location of the nodes and the eavesdroppers are given by Poisson point processes. We present bounds for different types of percolation, including in-, out- and undirected percolation.
Keywords :
graph theory; radio networks; stochastic processes; telecommunication security; Poisson point process; eavesdroppers; maximum density; nodes; percolation; percolation threshold; secrecy constraints; secrecy graph; wireless networks; Computational modeling; Face; Lattices; Mathematical model; Random variables; Upper bound;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory and Applications Workshop (ITA), 2011
Conference_Location :
La Jolla, CA
Print_ISBN :
978-1-4577-0360-7
Type :
conf
DOI :
10.1109/ITA.2011.5743576
Filename :
5743576
Link To Document :
بازگشت