Continuum percolation in the intrinsically secure communications graph

The intrinsically secure communications graph (iS-graph) is a random graph which captures the connections that can be securely established over a large-scale network, in the presence of eavesdroppers. It is based on principles of information-theoretic security, widely accepted as the strictest notion of security. In this paper, we are interested in characterizing the global properties of the iS-graph in terms of percolation on the infinite plane. We prove the existence of a phase transition in the Poisson iS-graph, whereby an unbounded component of securely connected nodes suddenly arises as we increase the density of legitimate nodes. Our work shows that long-range communication in a wireless network is still possible when a secrecy constraint is present.

[1]  Moe Z. Win,et al.  A Mathematical Theory of Network Interference and Its Applications , 2009, Proceedings of the IEEE.

[2]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[3]  D. Stoyan,et al.  Stochastic Geometry and Its Applications , 1989 .

[4]  S. Wolf,et al.  From weak to strong information-theoretic key agreement , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).

[5]  M. Penrose On a continuum percolation model , 1991, Advances in Applied Probability.

[6]  Olle Häggström,et al.  Nearest neighbor and hard sphere models in continuum percolation , 1996, Random Struct. Algorithms.

[7]  Jeffrey G. Andrews,et al.  Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.

[8]  E. N. Gilbert,et al.  Random Plane Networks , 1961 .

[9]  Moe Z. Win,et al.  Wireless physical-layer security: The case of colluding eavesdroppers , 2009, 2009 IEEE International Symposium on Information Theory.

[10]  H. Poincaré,et al.  Percolation ? , 1982 .

[11]  R. Meester,et al.  Continuum percolation: References , 1996 .

[12]  Martin Haenggi The secrecy graph and some of its properties , 2008, 2008 IEEE International Symposium on Information Theory.

[13]  M.Z. Win,et al.  Physical-layer security in stochastic wireless networks , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[14]  Can Emre Koksal,et al.  On Secrecy Capacity Scaling in Wireless Networks , 2012, IEEE Trans. Inf. Theory.

[15]  Moe Z. Win,et al.  Secure Communication in Stochastic Wireless Networks , 2010, ArXiv.

[16]  P. Thiran,et al.  Percolation in the signal to interference ratio graph , 2006, Journal of Applied Probability.

[17]  Pedro C. Pinto Intrinsically secure communication in large-scale wireless networks , 2010 .

[18]  R. Peierls On Ising's model of ferromagnetism , 1936, Mathematical Proceedings of the Cambridge Philosophical Society.