Continuum percolation in the intrinsically secure communications graph

The intrinsically secure communications graph (iS-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence of eavesdroppers. It is based on principles of information-theoretic security, widely accepted as the strictest notio...

Full description

Bibliographic Details
Main Authors: Pinto, Pedro C., Win, Moe Z.
Other Authors: Massachusetts Institute of Technology. Department of Aeronautics and Astronautics
Format: Article
Language:en_US
Published: Institute of Electrical and Electronics Engineers 2011
Online Access:http://hdl.handle.net/1721.1/66699
https://orcid.org/0000-0002-8573-0488
_version_ 1811069705987817472
author Pinto, Pedro C.
Win, Moe Z.
author2 Massachusetts Institute of Technology. Department of Aeronautics and Astronautics
author_facet Massachusetts Institute of Technology. Department of Aeronautics and Astronautics
Pinto, Pedro C.
Win, Moe Z.
author_sort Pinto, Pedro C.
collection MIT
description The intrinsically secure communications graph (iS-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence of eavesdroppers. It is based on principles of information-theoretic security, widely accepted as the strictest notion of security. In this paper, we are interested in characterizing the global properties of the iS-graph in terms of percolation on the infinite plane. We prove the existence of a phase transition in the Poisson iS-graph, whereby an unbounded component of securely connected nodes suddenly arises as we increase the density of legitimate nodes. Our work shows that long-range communication in a wireless network is still possible when a secrecy constraint is present.
first_indexed 2024-09-23T08:14:38Z
format Article
id mit-1721.1/66699
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T08:14:38Z
publishDate 2011
publisher Institute of Electrical and Electronics Engineers
record_format dspace
spelling mit-1721.1/666992022-09-30T08:34:27Z Continuum percolation in the intrinsically secure communications graph Pinto, Pedro C. Win, Moe Z. Massachusetts Institute of Technology. Department of Aeronautics and Astronautics Massachusetts Institute of Technology. Laboratory for Information and Decision Systems Win, Moe Z. Pinto, Pedro C. Win, Moe Z. The intrinsically secure communications graph (iS-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence of eavesdroppers. It is based on principles of information-theoretic security, widely accepted as the strictest notion of security. In this paper, we are interested in characterizing the global properties of the iS-graph in terms of percolation on the infinite plane. We prove the existence of a phase transition in the Poisson iS-graph, whereby an unbounded component of securely connected nodes suddenly arises as we increase the density of legitimate nodes. Our work shows that long-range communication in a wireless network is still possible when a secrecy constraint is present. MIT/Army Institute for Soldier Nanotechnologies United States. Office of Naval Research (Presidential Early Career Award for Scientists and engineers (PECASE) N00014-09-1-0435) National Science Foundation (U.S.) (grant ECCS-0901034) 2011-11-01T14:34:19Z 2011-11-01T14:34:19Z 2010-10 Article http://purl.org/eprint/type/ConferencePaper 978-1-4244-6016-8 978–1–4244–6017–5 http://hdl.handle.net/1721.1/66699 Pinto, Pedro C., and Moe Z. Win. “Continuum percolation in the intrinsically secure communications graph.” ISITA2010, IEEE, Taichung, Taiwan, October 17-20, 2010, 349-354. https://orcid.org/0000-0002-8573-0488 en_US http://dx.doi.org/10.1109/ISITA.2010.5649155 2010 International Symposium on Information Theory and its Applications (ISITA) Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. application/pdf Institute of Electrical and Electronics Engineers IEEE
spellingShingle Pinto, Pedro C.
Win, Moe Z.
Continuum percolation in the intrinsically secure communications graph
title Continuum percolation in the intrinsically secure communications graph
title_full Continuum percolation in the intrinsically secure communications graph
title_fullStr Continuum percolation in the intrinsically secure communications graph
title_full_unstemmed Continuum percolation in the intrinsically secure communications graph
title_short Continuum percolation in the intrinsically secure communications graph
title_sort continuum percolation in the intrinsically secure communications graph
url http://hdl.handle.net/1721.1/66699
https://orcid.org/0000-0002-8573-0488
work_keys_str_mv AT pintopedroc continuumpercolationintheintrinsicallysecurecommunicationsgraph
AT winmoez continuumpercolationintheintrinsicallysecurecommunicationsgraph