8,339 research outputs found
On the strengths of connectivity and robustness in general random intersection graphs
Random intersection graphs have received much attention for nearly two
decades, and currently have a wide range of applications ranging from key
predistribution in wireless sensor networks to modeling social networks. In
this paper, we investigate the strengths of connectivity and robustness in a
general random intersection graph model. Specifically, we establish sharp
asymptotic zero-one laws for -connectivity and -robustness, as well as
the asymptotically exact probability of -connectivity, for any positive
integer . The -connectivity property quantifies how resilient is the
connectivity of a graph against node or edge failures. On the other hand,
-robustness measures the effectiveness of local diffusion strategies (that
do not use global graph topology information) in spreading information over the
graph in the presence of misbehaving nodes. In addition to presenting the
results under the general random intersection graph model, we consider two
special cases of the general model, a binomial random intersection graph and a
uniform random intersection graph, which both have numerous applications as
well. For these two specialized graphs, our results on asymptotically exact
probabilities of -connectivity and asymptotic zero-one laws for
-robustness are also novel in the literature.Comment: This paper about random graphs appears in IEEE Conference on Decision
and Control (CDC) 2014, the premier conference in control theor
Connectivity in Secure Wireless Sensor Networks under Transmission Constraints
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key
pre-distribution scheme is a widely recognized way to secure communications.
Although connectivity properties of secure WSNs with the EG scheme have been
extensively investigated, few results address physical transmission
constraints. These constraints reflect real-world implementations of WSNs in
which two sensors have to be within a certain distance from each other to
communicate. In this paper, we present zero-one laws for connectivity in WSNs
employing the EG scheme under transmission constraints. These laws help specify
the critical transmission ranges for connectivity. Our analytical findings are
confirmed via numerical experiments. In addition to secure WSNs, our
theoretical results are also applied to frequency hopping in wireless networks.Comment: Full version of a paper published in Annual Allerton Conference on
Communication, Control, and Computing (Allerton) 201
- …