DocumentCode
1456440
Title
Percolation and Connectivity in the Intrinsically Secure Communications Graph
Author
Pinto, Pedro C. ; Win, Moe Z.
Author_Institution
Lab. for Inf. & Decision Syst., Massachusetts Inst. of Technol., Cambridge, MA, USA
Volume
58
Issue
3
fYear
2012
fDate
3/1/2012 12:00:00 AM
Firstpage
1716
Lastpage
1730
Abstract
The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper aims to characterize the global properties of the iS-graph in terms of (1) percolation on the infinite plane, and (2) full connectivity on a finite region. First, for the Poisson iS-graph defined on the infinite plane, the existence of a phase transition is proven, whereby an unbounded component of connected nodes suddenly arises as the density of legitimate nodes is increased. This shows that long-range secure communication is still possible in the presence of eavesdroppers. Second, full connectivity on a finite region of the Poisson iS-graph is considered. The exact asymptotic behavior of full connectivity in the limit of a large density of legitimate nodes is characterized. Then, simple, explicit expressions are derived in order to closely approximate the probability of full connectivity for a finite density of legitimate nodes. These results help clarify how the presence of eavesdroppers can compromise long-range secure communication.
Keywords
Poisson equation; approximation theory; graph theory; probability; radio networks; telecommunication security; Poisson iS-graph; approximation; eavesdroppers; governmental networks; intrinsically secure communication graph; large-scale network; legitimate node density; long-range secure communication; military networks; probability; random graph; secret information; wireless medium; Communication system security; Couplings; Face; Security; Signal to noise ratio; Wireless networks; Connectivity; percolation; physical-layer security; stochastic geometry; wireless networks;
fLanguage
English
Journal_Title
Information Theory, IEEE Transactions on
Publisher
ieee
ISSN
0018-9448
Type
jour
DOI
10.1109/TIT.2011.2173726
Filename
6157079
Link To Document