DocumentCode
2455652
Title
Percolation in the secrecy graph: Bounds on the critical probability and impact of power constraints
Author
Sarkar, Amites ; Haenggi, Martin
Author_Institution
Dept. of Math., Western Washington Univ., Bellingham, WA, USA
fYear
2011
fDate
16-20 Oct. 2011
Firstpage
673
Lastpage
677
Abstract
Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely in the presence of eavesdroppers. In the case of infinite networks, a critical parameter is the maximum density of eavesdroppers that can be accommodated while still guaranteeing an infinite component in the network, i.e., the percolation threshold. We focus on the case where the location of the nodes and the eavesdroppers are given by Poisson point processes, with and without power constraints. We present bounds for different types of percolation, including in-, out - and undirected percolation.
Keywords
directed graphs; network theory (graphs); probability; radio networks; stochastic processes; telecommunication security; Poisson point processes; critical probability; directed graph edges; percolation threshold; power constraints; secrecy graph model; wireless networks; Educational institutions; Electronic mail; Mathematical model; Probability; USA Councils; Upper bound; Wireless networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory Workshop (ITW), 2011 IEEE
Conference_Location
Paraty
Print_ISBN
978-1-4577-0438-3
Type
conf
DOI
10.1109/ITW.2011.6089582
Filename
6089582
Link To Document