• DocumentCode
    2455652
  • Title

    Percolation in the secrecy graph: Bounds on the critical probability and impact of power constraints

  • Author

    Sarkar, Amites ; Haenggi, Martin

  • Author_Institution
    Dept. of Math., Western Washington Univ., Bellingham, WA, USA
  • fYear
    2011
  • fDate
    16-20 Oct. 2011
  • Firstpage
    673
  • Lastpage
    677
  • Abstract
    Secrecy graphs model the connectivity of wireless networks under secrecy constraints. Directed edges in the graph are present whenever a node can talk to another node securely in the presence of eavesdroppers. In the case of infinite networks, a critical parameter is the maximum density of eavesdroppers that can be accommodated while still guaranteeing an infinite component in the network, i.e., the percolation threshold. We focus on the case where the location of the nodes and the eavesdroppers are given by Poisson point processes, with and without power constraints. We present bounds for different types of percolation, including in-, out - and undirected percolation.
  • Keywords
    directed graphs; network theory (graphs); probability; radio networks; stochastic processes; telecommunication security; Poisson point processes; critical probability; directed graph edges; percolation threshold; power constraints; secrecy graph model; wireless networks; Educational institutions; Electronic mail; Mathematical model; Probability; USA Councils; Upper bound; Wireless networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory Workshop (ITW), 2011 IEEE
  • Conference_Location
    Paraty
  • Print_ISBN
    978-1-4577-0438-3
  • Type

    conf

  • DOI
    10.1109/ITW.2011.6089582
  • Filename
    6089582