Brief Encounters with a Random Key Graph

نویسنده

  • Virgil D. Gligor
چکیده

Random key graphs, also called uniform random intersection graphs, have been used for modeling a variety of different applications since their introduction in wireless sensor networks. In this paper, we review some of their recent applications and suggest several new ones, under the full visibility assumption; i.e., under the assumption that all nodes are within communication range of each other. We also suggest further research in determining the connectivity properties of random key graphs when limited visibility is more realistic; e.g., graph nodes can communicate only with a subset of other nodes due to range restrictions or link failures. The notion of the random key graph (a.k.a. “uniform random intersection graph” [1]) was introduced for probabilistic key pre-distribution in wireless sensor networks [2]. Recently, these graphs have been used for a variety of different applications, such as clustering analysis [3], recommender systems using collaborative filtering [4], and cryptanalysis of hash functions [5]. While random key graphs are not Erdös-Renyi random graphs (e.g., the probabilities that graph edges exist are not necessarily independent), they have similar connectivity properties under the assumption of “full visibility”; i.e., they obey a similar “zero-one” law as Erdös-Renyi graphs for some scaling of their parameters, whenever each node is within communication range of other nodes [6, 7]. Recommender Systems Using Collaborative Filtering. Marbach [4] illustrates an application of random-key-graph connectivity for the modeling of recommender systems with collaborative filtering. In his model, there are N users and a pool of PN objects. Each of the N users picks a set of KN distinct objects uniformly and randomly from the pool, and ranks each object, where KN < PN . A recommender class C is defined as a set of users that gives the same ranking to any particular object that is ranked by at least one user of the set. This implies that (1) every subset of users in class C that rank a common object assigns the same ranking to that object, and (2) not every user in class C ranks all objects ranked by others in C; i.e., there exist users in class C that have not ranked objects ranked by others in class C. A recommender system with collaborative filtering predicts the ranking a user would give an object that the user has not ranked, but that has been ranked by some other users in class C. However, to enable such predictions, the membership

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Random Graphs and Complex Networks

In this first chapter, we give an introduction to random graphs and complex networks. We discuss examples of realworld networks and their empirical properties, and give a brief introduction to the kinds of models that we investigate in the book. Further, we introduce the key elements of the notation that is used throughout the book.

متن کامل

A Brief Introduction to Hamilton Cycles in Random Graphs

We survey results concerning Hamilton cycles in random graphs. Specifically, we focus on existence results for general and regular graphs, and discuss algorithms for finding Hamilton cycles and solving related problems (that succeed with high probability).

متن کامل

Sampling from social networks’s graph based on topological properties and bee colony algorithm

In recent years, the sampling problem in massive graphs of social networks has attracted much attention for fast analyzing a small and good sample instead of a huge network. Many algorithms have been proposed for sampling of social network’ graph. The purpose of these algorithms is to create a sample that is approximately similar to the original network’s graph in terms of properties such as de...

متن کامل

On random graphs associated with a pairwise key distribution scheme

The pairwise key distribution scheme of Chan et al. was proposed as an alternative to the key distribution scheme of Eschenauer and Gligor to enable network security in wireless sensor networks. We consider the random graph induced by this pairwise scheme under the assumption of full visibility, and show the existence of a zero-one law for graph connectivity.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009