{"title":"信息论安全SINR图的渗透:上界和下界","authors":"R. Vaze, Srikanth K. Iyer","doi":"10.1109/WIOPT.2014.6850356","DOIUrl":null,"url":null,"abstract":"Connectivity in an information-theoretically secure graph is considered where both the legitimate and the eavesdropper nodes are distributed as Poisson point processes. To allow concurrent transmissions from multiple legitimate nodes, a signal-to-interference plus noise ratio secure graph is introduced, and its percolation (having an unbounded connected component) properties are studied. It is shown that for a fixed eavesdropper node density, percolation happens for large enough (but finite) legitimate node density and small enough interference suppression parameter of the legitimate nodes. Conversely, a concrete bound is obtained that shows that if the legitimate node density is below a fixed threshold, then the probability of percolation is zero.","PeriodicalId":381489,"journal":{"name":"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Percolation on the information theoretic secure SINR graph: Upper and lower bounds\",\"authors\":\"R. Vaze, Srikanth K. Iyer\",\"doi\":\"10.1109/WIOPT.2014.6850356\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Connectivity in an information-theoretically secure graph is considered where both the legitimate and the eavesdropper nodes are distributed as Poisson point processes. To allow concurrent transmissions from multiple legitimate nodes, a signal-to-interference plus noise ratio secure graph is introduced, and its percolation (having an unbounded connected component) properties are studied. It is shown that for a fixed eavesdropper node density, percolation happens for large enough (but finite) legitimate node density and small enough interference suppression parameter of the legitimate nodes. Conversely, a concrete bound is obtained that shows that if the legitimate node density is below a fixed threshold, then the probability of percolation is zero.\",\"PeriodicalId\":381489,\"journal\":{\"name\":\"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WIOPT.2014.6850356\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WIOPT.2014.6850356","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Percolation on the information theoretic secure SINR graph: Upper and lower bounds
Connectivity in an information-theoretically secure graph is considered where both the legitimate and the eavesdropper nodes are distributed as Poisson point processes. To allow concurrent transmissions from multiple legitimate nodes, a signal-to-interference plus noise ratio secure graph is introduced, and its percolation (having an unbounded connected component) properties are studied. It is shown that for a fixed eavesdropper node density, percolation happens for large enough (but finite) legitimate node density and small enough interference suppression parameter of the legitimate nodes. Conversely, a concrete bound is obtained that shows that if the legitimate node density is below a fixed threshold, then the probability of percolation is zero.