dc.contributor.author | Pinto, Pedro C. | |
dc.contributor.author | Win, Moe Z. | |
dc.date.accessioned | 2013-09-24T18:25:52Z | |
dc.date.available | 2013-09-24T18:25:52Z | |
dc.date.issued | 2012-03 | |
dc.date.submitted | 2011-07 | |
dc.identifier.issn | 0018-9448 | |
dc.identifier.issn | 1557-9654 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/80910 | |
dc.description.abstract | The ability to exchange secret information is critical to many commercial, governmental, and military networks. The intrinsically secure communications graph (iS-graph) is a random graph which describes the connections that can be securely established over a large-scale network, by exploiting the physical properties of the wireless medium. This paper aims to characterize the global properties of the iS-graph in terms of (1) percolation on the infinite plane, and (2) full connectivity on a finite region. First, for the Poisson iS-graph defined on the infinite plane, the existence of a phase transition is proven, whereby an unbounded component of connected nodes suddenly arises as the density of legitimate nodes is increased. This shows that long-range secure communication is still possible in the presence of eavesdroppers. Second, full connectivity on a finite region of the Poisson iS-graph is considered. The exact asymptotic behavior of full connectivity in the limit of a large density of legitimate nodes is characterized. Then, simple, explicit expressions are derived in order to closely approximate the probability of full connectivity for a finite density of legitimate nodes. These results help clarify how the presence of eavesdroppers can compromise long-range secure communication. | en_US |
dc.description.sponsorship | Massachusetts Institute of Technology. Institute for Soldier Nanotechnologies | en_US |
dc.description.sponsorship | United States. Office of Naval Research (Presidential Early Career Award for Scientists and Engineers N00014-09-1-0435) | en_US |
dc.description.sponsorship | National Science Foundation (U.S.) (Grant ECS-0636519) | en_US |
dc.language.iso | en_US | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en_US |
dc.relation.isversionof | http://dx.doi.org/10.1109/tit.2011.2173726 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike 3.0 | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
dc.source | arXiv | en_US |
dc.title | Percolation and Connectivity in the Intrinsically Secure Communications Graph | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Pinto, Pedro C., and Moe Z. Win. “Percolation and Connectivity in the Intrinsically Secure Communications Graph.” IEEE Transactions on Information Theory 58, no. 3 (March 2012): 1716-1730. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Laboratory for Information and Decision Systems | en_US |
dc.contributor.mitauthor | Pinto, Pedro C. | en_US |
dc.contributor.mitauthor | Win, Moe Z. | en_US |
dc.relation.journal | IEEE Transactions on Information Theory | en_US |
dc.eprint.version | Original manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dspace.orderedauthors | Pinto, Pedro C.; Win, Moe Z. | en_US |
dc.identifier.orcid | https://orcid.org/0000-0002-8573-0488 | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |