Sangam: A Confluence of Knowledge Streams

Continuum percolation in the intrinsically secure communications graph

Show simple item record

dc.contributor Massachusetts Institute of Technology. Department of Aeronautics and Astronautics
dc.contributor Massachusetts Institute of Technology. Laboratory for Information and Decision Systems
dc.contributor Win, Moe Z.
dc.contributor Pinto, Pedro C.
dc.contributor Win, Moe Z.
dc.creator Pinto, Pedro C.
dc.creator Win, Moe Z.
dc.date 2011-11-01T14:34:19Z
dc.date 2011-11-01T14:34:19Z
dc.date 2010-10
dc.date.accessioned 2023-03-01T18:07:28Z
dc.date.available 2023-03-01T18:07:28Z
dc.identifier 978-1-4244-6016-8
dc.identifier 978–1–4244–6017–5
dc.identifier http://hdl.handle.net/1721.1/66699
dc.identifier Pinto, Pedro C., and Moe Z. Win. “Continuum percolation in the intrinsically secure communications graph.” ISITA2010, IEEE, Taichung, Taiwan, October 17-20, 2010, 349-354.
dc.identifier https://orcid.org/0000-0002-8573-0488
dc.identifier.uri http://localhost:8080/xmlui/handle/CUHPOERS/278838
dc.description The intrinsically secure communications graph (iS-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence of eavesdroppers. It is based on principles of information-theoretic security, widely accepted as the strictest notion of security. In this paper, we are interested in characterizing the global properties of the iS-graph in terms of percolation on the infinite plane. We prove the existence of a phase transition in the Poisson iS-graph, whereby an unbounded component of securely connected nodes suddenly arises as we increase the density of legitimate nodes. Our work shows that long-range communication in a wireless network is still possible when a secrecy constraint is present.
dc.description MIT/Army Institute for Soldier Nanotechnologies
dc.description United States. Office of Naval Research (Presidential Early Career Award for Scientists and engineers (PECASE) N00014-09-1-0435)
dc.description National Science Foundation (U.S.) (grant ECCS-0901034)
dc.format application/pdf
dc.language en_US
dc.publisher Institute of Electrical and Electronics Engineers
dc.relation http://dx.doi.org/10.1109/ISITA.2010.5649155
dc.relation 2010 International Symposium on Information Theory and its Applications (ISITA)
dc.rights Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use.
dc.source IEEE
dc.title Continuum percolation in the intrinsically secure communications graph
dc.type Article
dc.type http://purl.org/eprint/type/ConferencePaper


Files in this item

Files Size Format View
Win-2010-Contin ... e communications graph.pdf 194.4Kb application/pdf View/Open

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse