Percolation and Connectivity in the Intrinsically Secure Communications Graph - Computer Science > Information TheoryReportar como inadecuado




Percolation and Connectivity in the Intrinsically Secure Communications Graph - Computer Science > Information Theory - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

Abstract: The ability to exchange secret information is critical to many commercial,governmental, and military networks. The intrinsically secure communicationsgraph iS-graph is a random graph which describes the connections that can besecurely established over a large-scale network, by exploiting the physicalproperties of the wireless medium. This paper aims to characterize the globalproperties of the iS-graph in terms of: i percolation on the infinite plane,and ii full connectivity on a finite region. First, for the Poisson iS-graphdefined on the infinite plane, the existence of a phase transition is proven,whereby an unbounded component of connected nodes suddenly arises as thedensity of legitimate nodes is increased. This shows that long-range securecommunication is still possible in the presence of eavesdroppers. Second, fullconnectivity on a finite region of the Poisson iS-graph is considered. Theexact asymptotic behavior of full connectivity in the limit of a large densityof legitimate nodes is characterized. Then, simple, explicit expressions arederived in order to closely approximate the probability of full connectivityfor a finite density of legitimate nodes. The results help clarify how thepresence of eavesdroppers can compromise long-range secure communication.



Autor: Pedro C. Pinto, Moe Z. Win

Fuente: https://arxiv.org/







Documentos relacionados