Applications of Random Intersection Graphs to Secure Sensor Networks – Connectivity Results
نویسندگان
چکیده
Random intersection graphs was introduced by SingerCohen [6]. These graphs have recently received considerable attention in the literature and been used in diverse applications [1,2,7–13]. In a general random intersection graph, each node is assigned a set of items in some random manner, and any two nodes establish an undirected edge in between if and only if they have at least a certain number of items in common. In this paper, we consider random s-intersection graphs defined as follows. In a random s-intersection graph with n nodes, each node selects Kn distinct items uniformly at random from the same item pool that has Pn different items, and any two nodes have an edge in between upon sharing at least s items, where 1 ≤ s ≤ Kn ≤ Pn holds, and Kn and Pn are functions of n for generality. We denote a random s-intersection graph by Gs(n,Kn, Pn). Random intersection graphs have numerous application areas including secure wireless sensor networks [8, 10, 11, 13], social networks [1], cryptanalysis [2], and clustering [12]. We detail the use of random intersection graphs to model secure sensor networks.
منابع مشابه
On k-Connectivity and Minimum Vertex Degree in Random s-Intersection Graphs
Random s-intersection graphs have recently received much interest in a wide range of application areas. Broadly speaking, a random s-intersection graph is constructed by first assigning each vertex a set of items in some random manner, and then putting an undirected edge between all pairs of vertices that share at least s items (the graph is called a random intersection graph when s = 1). A spe...
متن کاملRandom intersection graphs and their applications in security, wireless communication, and social networks
Random intersection graphs have received much interest and been used in diverse applications. They are naturally induced in modeling secure sensor networks under random key predistribution schemes, as well as in modeling the topologies of social networks including common-interest networks, collaboration networks, and actor networks. Simply put, a random intersection graph is constructed by assi...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کاملA zero-one law for k-connectivity in Random K-out graphs intersecting Erdős-Rényi Graphs
We investigate k-connectivity in secure wireless sensor networks under the random pairwise key predistribution scheme with unreliable links; a network is said to be kconnected if it remains connected despite the failure of any of its (k − 1) nodes or links. With wireless communication links modeled as independent on-off channels, this amounts to analyzing a random graph model formed by intersec...
متن کاملOn Connectivity in a General Random Intersection Graph
Abstract There has been growing interest in studies of general random intersection graphs. In this paper, we consider a general random intersection graphG(n,−→a ,−→ Kn, Pn) defined on a set Vn comprising n vertices, where−→a is a probability vector (a1, a2, . . . , am) and −→ Kn is (K1,n,K2,n, . . . ,Km,n). This graph has been studied in the literature [10,11,20,29] including a most recent work...
متن کامل