8,339 research outputs found

    On the strengths of connectivity and robustness in general random intersection graphs

    Full text link
    Random intersection graphs have received much attention for nearly two decades, and currently have a wide range of applications ranging from key predistribution in wireless sensor networks to modeling social networks. In this paper, we investigate the strengths of connectivity and robustness in a general random intersection graph model. Specifically, we establish sharp asymptotic zero-one laws for kk-connectivity and kk-robustness, as well as the asymptotically exact probability of kk-connectivity, for any positive integer kk. The kk-connectivity property quantifies how resilient is the connectivity of a graph against node or edge failures. On the other hand, kk-robustness measures the effectiveness of local diffusion strategies (that do not use global graph topology information) in spreading information over the graph in the presence of misbehaving nodes. In addition to presenting the results under the general random intersection graph model, we consider two special cases of the general model, a binomial random intersection graph and a uniform random intersection graph, which both have numerous applications as well. For these two specialized graphs, our results on asymptotically exact probabilities of kk-connectivity and asymptotic zero-one laws for kk-robustness are also novel in the literature.Comment: This paper about random graphs appears in IEEE Conference on Decision and Control (CDC) 2014, the premier conference in control theor

    Connectivity in Secure Wireless Sensor Networks under Transmission Constraints

    Full text link
    In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be within a certain distance from each other to communicate. In this paper, we present zero-one laws for connectivity in WSNs employing the EG scheme under transmission constraints. These laws help specify the critical transmission ranges for connectivity. Our analytical findings are confirmed via numerical experiments. In addition to secure WSNs, our theoretical results are also applied to frequency hopping in wireless networks.Comment: Full version of a paper published in Annual Allerton Conference on Communication, Control, and Computing (Allerton) 201
    • …
    corecore