Distribution of Cell Area in Bounded Poisson Voronoi Tessellations with Application to Secure Local Connectivity

Poisson Voronoi tessellations have been used in modeling many types of systems across different sciences, from geography and astronomy to telecommunications. The existing literature on the statistical properties of Poisson Voronoi cells is vast, however, little is known about the properties of Voronoi cells located close to the boundaries of a compact domain. In a domain with boundaries, some Voronoi cells would be naturally clipped by the boundary, and the cell area falling inside the deployment domain would have different statistical properties as compared to those of non-clipped Voronoi cells located in the bulk of the domain. In this paper, we consider the planar Voronoi tessellation induced by a homogeneous Poisson point process of intensity $\lambda\!>\!0$ in a quadrant, where the two half-axes represent boundaries. We show that the mean cell area is less than $\lambda^{-1}$ when the seed is located exactly at the boundary, and it can be larger than $\lambda^{-1}$ when the seed lies close to the boundary. In addition, we calculate the second moment of cell area at two locations for the seed: (i) at the corner of a quadrant, and (ii) at the boundary of the half-plane. We illustrate that the two-parameter Gamma distribution, with location-dependent parameters calculated using the method of moments, can be of use in approximating the distribution of cell area. As a potential application, we use the Gamma approximations to study the degree distribution for secure connectivity in wireless sensor networks deployed over a domain with boundaries.

[1]  László Györfi,et al.  On the measure of Voronoi cells , 2015, Journal of Applied Probability.

[2]  Frederic Paik Schoenberg,et al.  The distribution of Voronoi cells generated by Southern California earthquake epicenters , 2007 .

[3]  Tong-Xing Zheng,et al.  Physical Layer Security in Random Cellular Networks , 2016, SpringerBriefs in Computer Science.

[4]  T. Mattfeldt Stochastic Geometry and Its Applications , 1996 .

[5]  Zhisheng Niu,et al.  Optimal Combination of Base Station Densities for Energy-Efficient Two-Tier Heterogeneous Cellular Networks , 2013, IEEE Transactions on Wireless Communications.

[6]  J. Møller Random tessellations in ℝ d , 1989, Advances in Applied Probability.

[7]  P. N. Rathie On the volume distribution of the typical Poisson–Delaunay cell , 1992, Journal of Applied Probability.

[8]  Andrew Hayen,et al.  Areas of components of a Voronoi polygon in a homogeneous Poisson process in the plane , 2002, Advances in Applied Probability.

[9]  van Marie-Colette Lieshout,et al.  An introduction to planar random tessellation models , 2012 .

[10]  W. Boschin,et al.  Finding galaxy clusters using Voronoi tessellations , 2001, astro-ph/0101411.

[11]  J. Wejchert,et al.  On the distribution of cell areas in a Voronoi network , 1986 .

[12]  Kenneth A. Brakke,et al.  Statistics of Random Plane Voronoi Tessellations , 2006 .

[13]  L. Meijering,et al.  INTERFACE AREA, EDGE LENGTH, AND NUMBER OF VERTICES IN CRYSTAL AGGREGATES WITH RANDOM NUCLEATION , 2014 .

[14]  M. Abramowitz,et al.  Handbook of Mathematical Functions With Formulas, Graphs and Mathematical Tables (National Bureau of Standards Applied Mathematics Series No. 55) , 1965 .

[15]  Jeffrey G. Andrews,et al.  A Tractable Approach to Coverage and Rate in Cellular Networks , 2010, IEEE Transactions on Communications.

[16]  Stewart K. Kurtz,et al.  Properties of a three-dimensional Poisson-Voronoi tesselation: A Monte Carlo study , 1992 .

[17]  B. Kempenaers,et al.  Thiessen polygons as a model for animal territory estimation , 2014 .

[18]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[19]  K. Matchev,et al.  Identifying phase-space boundaries with Voronoi tessellations , 2016, 1606.02721.

[20]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks—Part I: Connectivity , 2012, IEEE Transactions on Information Forensics and Security.

[21]  F. Baccelli,et al.  On a coverage process ranging from the Boolean model to the Poisson–Voronoi tessellation with applications to wireless communications , 2001, Advances in Applied Probability.

[22]  Martin Haenggi The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.

[23]  Dong-Ming Yan,et al.  Efficient computation of clipped Voronoi diagram for mesh generation , 2013, Comput. Aided Des..

[24]  S. K. Kurtz,et al.  Properties of a three-dimensional poisson-voronoi tesselation: A Monte Carlo study , 1993 .

[25]  Michele Cappellari,et al.  Voronoi binning: Optimal adaptive tessellations of multi-dimensional data , 2009, 0912.1303.

[26]  M. Tanemura Statistical Distributions of Poisson Voronoi Cells in Two and Three Dimensions , 2003 .

[27]  R. Macpherson,et al.  Statistical topology of three-dimensional Poisson-Voronoi cells and cell boundary networks. , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.

[28]  Wade Trappe,et al.  The challenges facing physical layer security , 2015, IEEE Communications Magazine.

[29]  Z. Néda,et al.  On the size-distribution of Poisson Voronoi cells , 2004, cond-mat/0406116.

[30]  E. Gilbert Random Subdivisions of Space into Crystals , 1962 .

[31]  Doojin Kim,et al.  Edge detecting new physics the Voronoi way , 2015, 1506.04141.

[32]  Lutz Muche,et al.  Distributional properties of the three-dimensional Poisson Delaunay cell , 1996 .

[33]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[34]  D. Crespo,et al.  Cell size distribution in random tessellations of space. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.