Super Critical and Sub Critical Regimes of Percolation with Secure Communication

Computer Science – Information Theory

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

Percolation in an information-theoretically secure graph is considered where both the legitimate and the eavesdropper nodes are distributed as Poisson point processes. For both the path-loss and the path-loss plus fading model, upper and lower bounds on the minimum density of the legitimate nodes (as a function of the density of the eavesdropper nodes) required for non-zero probability of having an unbounded cluster are derived. The lower bound is universal in nature, i.e. the constant does not depend on the density of the eavesdropper nodes.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Super Critical and Sub Critical Regimes of Percolation with Secure Communication does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Super Critical and Sub Critical Regimes of Percolation with Secure Communication, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Super Critical and Sub Critical Regimes of Percolation with Secure Communication will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-417951

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.