Percolation on the Information-Theoretically Secure Signal to Interference Ratio Graph

نویسندگان

  • Rahul Vaze
  • Srikanth K. Iyer
چکیده

We consider a continuum percolation model consisting of two types of nodes, namely legitimate and eavesdropper nodes, distributed according to independent Poisson point processes (PPPs) in R2 of intensities λ and λE respectively. A directed edge from one legitimate node A to another legitimate node B exists provided the strength of the signal transmitted from node A that is received at node B is higher than that received at any eavesdropper node. The strength of the received signal at a node from a legitimate node depends not only on the distance between these nodes, but also on the location of the other legitimate nodes and an interference suppression parameter γ. The graph is said to percolate when there exists an infinite connected component.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Theoretic Security in Interference Networks

This work focuses on interference networks with secrecy constraints. For the two user channel, a scheme that allows users to cooperatively inject (decodable and undecodable) randomness is proposed. The results unveil the role of interference in secure network design. Next, the focus is shifted to arbitrarily high (but finite) number of users with asymptotically high signal to noise ratios. Util...

متن کامل

Digital Binary Phase-shift Keyed Signal Detector

We have developed the effective algorithm for detecting digital binary phase-shift keyed signals. This algorithm requires a small number of arithmetic operations over the signal period. It can be relatively easy implemented based on the modern programmable logic devices. It also provides high interference immunity by identifying signal presence when signal-to-noise ratio is much less that its w...

متن کامل

Directed Percolation in Wireless Networks with Interference and Noise

Previous studies of connectivity in wireless networks have focused on undirected geometric graphs. More sophisticated models such as Signal-to-Interference-and-Noise-Ratio (SINR) model, however, usually leads to directed graphs. In this paper, we study percolation processes in wireless networks modelled by directed SINR graphs. We first investigate interference-free networks, where we define fo...

متن کامل

Super Critical and Sub Critical Regimes of Percolation with Secure Communication

Percolation in an information-theoretically secure graph is considered where both the legitimate and the eavesdropper nodes are distributed as Poisson point processes. For both the path-loss and the path-loss plus fading model, upper and lower bounds on the minimum density of the legitimate nodes (as a function of the density of the eavesdropper nodes) required for non-zero probability of havin...

متن کامل

Percolation in the Signal to Interference Ratio Graph

Continuum percolation models in which pairs of points of a two-dimensional Poisson point process are connected if they are within some range of each other have been extensively studied. This paper considers a variation in which a connection between two points depends not only on their Euclidean distance, but also on the positions of all other points of the point process. This model has been rec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Applied Probability

دوره 51  شماره 

صفحات  -

تاریخ انتشار 2014