Skip to main content

The effect of eavesdroppers on network connectivity: A secrecy graph approach

Publication ,  Journal Article
Goel, S; Aggarwal, V; Yener, A; Calderbank, AR
Published in: IEEE Transactions on Information Forensics and Security
September 1, 2011

This paper investigates the effect of eavesdroppers on network connectivity, using a wiretap model and percolation theory. The wiretap model captures the effect of eavesdroppers on link security. A link exists between two nodes only if the secrecy capacity of that link is positive. Network connectivity is defined in a percolation sense, i.e., connectivity exists if an infinite connected component exists in the corresponding secrecy graph. We consider uncertainty in location of eavesdroppers, which is modeled directly at the network level as correlated failures in the secrecy graph. Our approach attempts to bridge the gap between physical layer security under uncertain channel state information and network level connectivity under secrecy constraints. For square and triangular lattice secrecy graphs, we obtain bounds on the percolation threshold, which is the critical value of the probability of occurrence of an eavesdropper, above which network connectivity does not exist. For Poisson secrecy graphs, degree distribution and mean value of upper and lower bounds on node degree are obtained. Further, inner and outer bounds on the achievable region for network connectivity are obtained. Both analytic and simulation results show that uncertainty in location of eavesdroppers has a dramatic effect on network connectivity in a secrecy graph. © 2011 IEEE.

Duke Scholars

Published In

IEEE Transactions on Information Forensics and Security

DOI

ISSN

1556-6013

Publication Date

September 1, 2011

Volume

6

Issue

3 PART 1

Start / End Page

712 / 724

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 46 Information and computing sciences
  • 40 Engineering
  • 09 Engineering
  • 08 Information and Computing Sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Goel, S., Aggarwal, V., Yener, A., & Calderbank, A. R. (2011). The effect of eavesdroppers on network connectivity: A secrecy graph approach. IEEE Transactions on Information Forensics and Security, 6(3 PART 1), 712–724. https://doi.org/10.1109/TIFS.2011.2148714
Goel, S., V. Aggarwal, A. Yener, and A. R. Calderbank. “The effect of eavesdroppers on network connectivity: A secrecy graph approach.” IEEE Transactions on Information Forensics and Security 6, no. 3 PART 1 (September 1, 2011): 712–24. https://doi.org/10.1109/TIFS.2011.2148714.
Goel S, Aggarwal V, Yener A, Calderbank AR. The effect of eavesdroppers on network connectivity: A secrecy graph approach. IEEE Transactions on Information Forensics and Security. 2011 Sep 1;6(3 PART 1):712–24.
Goel, S., et al. “The effect of eavesdroppers on network connectivity: A secrecy graph approach.” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3 PART 1, Sept. 2011, pp. 712–24. Scopus, doi:10.1109/TIFS.2011.2148714.
Goel S, Aggarwal V, Yener A, Calderbank AR. The effect of eavesdroppers on network connectivity: A secrecy graph approach. IEEE Transactions on Information Forensics and Security. 2011 Sep 1;6(3 PART 1):712–724.

Published In

IEEE Transactions on Information Forensics and Security

DOI

ISSN

1556-6013

Publication Date

September 1, 2011

Volume

6

Issue

3 PART 1

Start / End Page

712 / 724

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 46 Information and computing sciences
  • 40 Engineering
  • 09 Engineering
  • 08 Information and Computing Sciences