Percolation on the Information-Theoretically Secure Signal to Interference Ratio Graph
نویسندگان
چکیده
We consider a continuum percolation model consisting of two types of nodes, namely legitimate and eavesdropper nodes, distributed according to independent Poisson point processes (PPPs) in R2 of intensities λ and λE respectively. A directed edge from one legitimate node A to another legitimate node B exists provided the strength of the signal transmitted from node A that is received at node B is higher than that received at any eavesdropper node. The strength of the received signal at a node from a legitimate node depends not only on the distance between these nodes, but also on the location of the other legitimate nodes and an interference suppression parameter γ. The graph is said to percolate when there exists an infinite connected component.
منابع مشابه
Information Theoretic Security in Interference Networks
This work focuses on interference networks with secrecy constraints. For the two user channel, a scheme that allows users to cooperatively inject (decodable and undecodable) randomness is proposed. The results unveil the role of interference in secure network design. Next, the focus is shifted to arbitrarily high (but finite) number of users with asymptotically high signal to noise ratios. Util...
متن کاملDigital Binary Phase-shift Keyed Signal Detector
We have developed the effective algorithm for detecting digital binary phase-shift keyed signals. This algorithm requires a small number of arithmetic operations over the signal period. It can be relatively easy implemented based on the modern programmable logic devices. It also provides high interference immunity by identifying signal presence when signal-to-noise ratio is much less that its w...
متن کاملDirected Percolation in Wireless Networks with Interference and Noise
Previous studies of connectivity in wireless networks have focused on undirected geometric graphs. More sophisticated models such as Signal-to-Interference-and-Noise-Ratio (SINR) model, however, usually leads to directed graphs. In this paper, we study percolation processes in wireless networks modelled by directed SINR graphs. We first investigate interference-free networks, where we define fo...
متن کاملSuper Critical and Sub Critical Regimes of Percolation with Secure Communication
Percolation in an information-theoretically secure graph is considered where both the legitimate and the eavesdropper nodes are distributed as Poisson point processes. For both the path-loss and the path-loss plus fading model, upper and lower bounds on the minimum density of the legitimate nodes (as a function of the density of the eavesdropper nodes) required for non-zero probability of havin...
متن کاملPercolation in the Signal to Interference Ratio Graph
Continuum percolation models in which pairs of points of a two-dimensional Poisson point process are connected if they are within some range of each other have been extensively studied. This paper considers a variation in which a connection between two points depends not only on their Euclidean distance, but also on the positions of all other points of the point process. This model has been rec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Applied Probability
دوره 51 شماره
صفحات -
تاریخ انتشار 2014