DocumentCode :
3560816
Title :
The Effect of Eavesdroppers on Network Connectivity: A Secrecy Graph Approach
Author :
Goel, Shivani ; Aggarwal, V. ; Yener, A. ; Calderbank, A.R.
Author_Institution :
Wireless Commun. & Networking Lab., Pennsylvania State Univ., University Park, PA, USA
Volume :
6
Issue :
3
fYear :
2011
Firstpage :
712
Lastpage :
724
Abstract :
This paper investigates the effect of eavesdroppers on network connectivity, using a wiretap model and percolation theory. The wiretap model captures the effect of eavesdroppers on link security. A link exists between two nodes only if the secrecy capacity of that link is positive. Network connectivity is defined in a percolation sense, i.e., connectivity exists if an infinite connected component exists in the corresponding secrecy graph. We consider uncertainty in location of eavesdroppers, which is modeled directly at the network level as correlated failures in the secrecy graph. Our approach attempts to bridge the gap between physical layer security under uncertain channel state information and network level connectivity under secrecy constraints. For square and triangular lattice secrecy graphs, we obtain bounds on the percolation threshold, which is the critical value of the probability of occurrence of an eavesdropper, above which network connectivity does not exist. For Poisson secrecy graphs, degree distribution and mean value of upper and lower bounds on node degree are obtained. Further, inner and outer bounds on the achievable region for network connectivity are obtained. Both analytic and simulation results show that uncertainty in location of eavesdroppers has a dramatic effect on network connectivity in a secrecy graph.
Keywords :
computer network security; graph theory; lattice theory; network theory (graphs); probability; stochastic processes; Poisson secrecy graph; degree distribution; lattice secrecy graph; link security; network connectivity; percolation theory; physical layer security; uncertain channel state information; wiretap model; Electronic mail; Lattices; Security; USA Councils; Uncertainty; Upper bound; Connectivity; Poisson; eavesdropper; lattice; percolation; physical layer security; secrecy graph;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
Conference_Location :
5/2/2011 12:00:00 AM
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2011.2148714
Filename :
5759739
Link To Document :
بازگشت