Percolation and Connectivity in the Intrinsically Secure Communications Graph

The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the ph...

Full description

Bibliographic Details
Main Authors: Pinto, Pedro C. (Contributor), Win, Moe Z. (Contributor)
Other Authors: Massachusetts Institute of Technology. Laboratory for Information and Decision Systems (Contributor)
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers (IEEE), 2013-09-24T18:25:52Z.
Subjects:
Online Access:Get fulltext
LEADER 02323 am a22002293u 4500
001 80910
042 |a dc 
100 1 0 |a Pinto, Pedro C.  |e author 
100 1 0 |a Massachusetts Institute of Technology. Laboratory for Information and Decision Systems  |e contributor 
100 1 0 |a Pinto, Pedro C.  |e contributor 
100 1 0 |a Win, Moe Z.  |e contributor 
700 1 0 |a Win, Moe Z.  |e author 
245 0 0 |a Percolation and Connectivity in the Intrinsically Secure Communications Graph 
260 |b Institute of Electrical and Electronics Engineers (IEEE),   |c 2013-09-24T18:25:52Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/80910 
520 |a The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper aims to characterize the global properties of the iS-graph in terms of (1) percolation on the infinite plane, and (2) full connectivity on a finite region. First, for the Poisson iS-graph defined on the infinite plane, the existence of a phase transition is proven, whereby an unbounded component of connected nodes suddenly arises as the density of legitimate nodes is increased. This shows that long-range secure communication is still possible in the presence of eavesdroppers. Second, full connectivity on a finite region of the Poisson iS-graph is considered. The exact asymptotic behavior of full connectivity in the limit of a large density of legitimate nodes is characterized. Then, simple, explicit expressions are derived in order to closely approximate the probability of full connectivity for a finite density of legitimate nodes. These results help clarify how the presence of eavesdroppers can compromise long-range secure communication. 
520 |a Massachusetts Institute of Technology. Institute for Soldier Nanotechnologies 
520 |a United States. Office of Naval Research (Presidential Early Career Award for Scientists and Engineers N00014-09-1-0435) 
520 |a National Science Foundation (U.S.) (Grant ECS-0636519) 
546 |a en_US 
655 7 |a Article 
773 |t IEEE Transactions on Information Theory