Show simple item record

dc.contributor.authorPinto, Pedro C.
dc.contributor.authorWin, Moe Z.
dc.date.accessioned2013-09-24T18:25:52Z
dc.date.available2013-09-24T18:25:52Z
dc.date.issued2012-03
dc.date.submitted2011-07
dc.identifier.issn0018-9448
dc.identifier.issn1557-9654
dc.identifier.urihttp://hdl.handle.net/1721.1/80910
dc.description.abstractThe ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper aims to characterize the global properties of the iS-graph in terms of (1) percolation on the infinite plane, and (2) full connectivity on a finite region. First, for the Poisson iS-graph defined on the infinite plane, the existence of a phase transition is proven, whereby an unbounded component of connected nodes suddenly arises as the density of legitimate nodes is increased. This shows that long-range secure communication is still possible in the presence of eavesdroppers. Second, full connectivity on a finite region of the Poisson iS-graph is considered. The exact asymptotic behavior of full connectivity in the limit of a large density of legitimate nodes is characterized. Then, simple, explicit expressions are derived in order to closely approximate the probability of full connectivity for a finite density of legitimate nodes. These results help clarify how the presence of eavesdroppers can compromise long-range secure communication.en_US
dc.description.sponsorshipMassachusetts Institute of Technology. Institute for Soldier Nanotechnologiesen_US
dc.description.sponsorshipUnited States. Office of Naval Research (Presidential Early Career Award for Scientists and Engineers N00014-09-1-0435)en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant ECS-0636519)en_US
dc.language.isoen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1109/tit.2011.2173726en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alike 3.0en_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/en_US
dc.sourcearXiven_US
dc.titlePercolation and Connectivity in the Intrinsically Secure Communications Graphen_US
dc.typeArticleen_US
dc.identifier.citationPinto, Pedro C., and Moe Z. Win. “Percolation and Connectivity in the Intrinsically Secure Communications Graph.” IEEE Transactions on Information Theory 58, no. 3 (March 2012): 1716-1730.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Laboratory for Information and Decision Systemsen_US
dc.contributor.mitauthorPinto, Pedro C.en_US
dc.contributor.mitauthorWin, Moe Z.en_US
dc.relation.journalIEEE Transactions on Information Theoryen_US
dc.eprint.versionOriginal manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsPinto, Pedro C.; Win, Moe Z.en_US
dc.identifier.orcidhttps://orcid.org/0000-0002-8573-0488
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record