-
Connectivity in Secure Wireless Sensor Networks under Transmission Constraints
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be withi…
▽ More
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be within a certain distance from each other to communicate. In this paper, we present zero-one laws for connectivity in WSNs employing the EG scheme under transmission constraints. These laws help specify the critical transmission ranges for connectivity. Our analytical findings are confirmed via numerical experiments. In addition to secure WSNs, our theoretical results are also applied to frequency hopping in wireless networks.
△ Less
Submitted 3 August, 2015; v1 submitted 3 August, 2015;
originally announced August 2015.
-
Random intersection graphs and their applications in security, wireless communication, and social networks
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
Random intersection graphs have received much interest and been used in diverse applications. They are naturally induced in modeling secure sensor networks under random key predistribution schemes, as well as in modeling the topologies of social networks including common-interest networks, collaboration networks, and actor networks. Simply put, a random intersection graph is constructed by assigni…
▽ More
Random intersection graphs have received much interest and been used in diverse applications. They are naturally induced in modeling secure sensor networks under random key predistribution schemes, as well as in modeling the topologies of social networks including common-interest networks, collaboration networks, and actor networks. Simply put, a random intersection graph is constructed by assigning each node a set of items in some random manner and then putting an edge between any two nodes that share a certain number of items.
Broadly speaking, our work is about analyzing random intersection graphs, and models generated by composing it with other random graph models including random geometric graphs and Erdős-Rényi graphs. These compositional models are introduced to capture the characteristics of various complex natural or man-made networks more accurately than the existing models in the literature. For random intersection graphs and their compositions with other random graphs, we study properties such as ($k$-)connectivity, ($k$-)robustness, and containment of perfect matchings and Hamilton cycles. Our results are typically given in the form of asymptotically exact probabilities or zero-one laws specifying critical scalings, and provide key insights into the design and analysis of various real-world networks.
△ Less
Submitted 11 February, 2015;
originally announced April 2015.
-
Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
Uniform random intersection graphs have received much interest and been used in diverse applications. A uniform random intersection graph with $n$ nodes is constructed as follows: each node selects a set of $K_n$ different items uniformly at random from the same pool of $P_n$ distinct items, and two nodes establish an undirected edge in between if and only if they share at least one item. For such…
▽ More
Uniform random intersection graphs have received much interest and been used in diverse applications. A uniform random intersection graph with $n$ nodes is constructed as follows: each node selects a set of $K_n$ different items uniformly at random from the same pool of $P_n$ distinct items, and two nodes establish an undirected edge in between if and only if they share at least one item. For such graph denoted by $G(n, K_n, P_n)$, we present the following results in this paper. First, we provide an exact analysis on the probabilities of $G(n, K_n, P_n)$ having a perfect matching and having a Hamilton cycle respectively, under $P_n = ω\big(n (\ln n)^5\big)$ (all asymptotic notation are understood with $n \to \infty$). The analysis reveals that just like ($k$-)connectivity shown in prior work, for both properties of perfect matching containment and Hamilton cycle containment, $G(n, K_n, P_n)$ also exhibits phase transitions: for each property above, as $K_n$ increases, the limit of the probability that $G(n, K_n, P_n)$ has the property increases from $0$ to $1$. Second, we compute the phase transition widths of $G(n, K_n, P_n)$ for $k$-connectivity (KC), perfect matching containment (PMC), and Hamilton cycle containment (HCC), respectively. For a graph property $R$ and a positive constant $a < \frac{1}{2}$, with the phase transition width $d_n(R, a)$ defined as the difference between the minimal $K_n$ ensuring $G(n, K_n, P_n)$ having property $R$ with probability at least $1-a$ or $a$, we show for any positive constants $a<\frac{1}{2}$ and $k$: (i) If $P_n=Ω(n)$ and $P_n=o(n\ln n)$, then $d_n(KC, a)$ is either $0$ or $1$ for each $n$ sufficiently large. (ii) If $P_n=Θ(n\ln n)$, then $d_n(KC, a)=Θ(1)$. (iii) If $P_n=ω(n\ln n)$, then $d_n(KC, a)=ω(1)$. (iv) If $P_n=ω\big(n (\ln n)^5\big)$, $d_n(PMC, a)$ and $d_n(HCC, a)$ are both $ω(1)$.
△ Less
Submitted 2 February, 2015;
originally announced February 2015.
-
A curious gap in one-dimensional geometric random graphs between connectivity and the absence of isolated node
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
One-dimensional geometric random graphs are constructed by distributing $n$ nodes uniformly and independently on a unit interval and then assigning an undirected edge between any two nodes that have a distance at most $r_n$. These graphs have received much interest and been used in various applications including wireless networks. A threshold of $r_n$ for connectivity is known as…
▽ More
One-dimensional geometric random graphs are constructed by distributing $n$ nodes uniformly and independently on a unit interval and then assigning an undirected edge between any two nodes that have a distance at most $r_n$. These graphs have received much interest and been used in various applications including wireless networks. A threshold of $r_n$ for connectivity is known as $r_n^{*} = \frac{\ln n}{n}$ in the literature. In this paper, we prove that a threshold of $r_n$ for the absence of isolated node is $\frac{\ln n}{2 n}$ (i.e., a half of the threshold $r_n^{*}$). Our result shows there is a curious gap between thresholds of connectivity and the absence of isolated node in one-dimensional geometric random graphs; in particular, when $r_n$ equals $\frac{c\ln n}{ n}$ for a constant $c \in( \frac{1}{2}, 1)$, a one-dimensional geometric random graph has no isolated node but is not connected. This curious gap in one-dimensional geometric random graphs is in sharp contrast to the prevalent phenomenon in many other random graphs such as two-dimensional geometric random graphs, Erdős-Rényi graphs, and random intersection graphs, all of which in the asymptotic sense become connected as soon as there is no isolated node.
△ Less
Submitted 18 February, 2015; v1 submitted 2 February, 2015;
originally announced February 2015.
-
k-Connectivity of Random Key Graphs
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
Random key graphs represent topologies of secure wireless sensor networks that apply the seminal Eschenauer-Gligor random key predistribution scheme to secure communication between sensors. These graphs have received much attention and also been used in diverse application areas beyond secure sensor networks; e.g., cryptanalysis, social networks, and recommender systems. Formally, a random key gra…
▽ More
Random key graphs represent topologies of secure wireless sensor networks that apply the seminal Eschenauer-Gligor random key predistribution scheme to secure communication between sensors. These graphs have received much attention and also been used in diverse application areas beyond secure sensor networks; e.g., cryptanalysis, social networks, and recommender systems. Formally, a random key graph with $n$ nodes is constructed by assigning each node $X_n$ keys selected uniformly at random from a pool of $Y_n$ keys and then putting an undirected edge between any two nodes sharing at least one key. Considerable progress has been made in the literature to analyze connectivity and $k$-connectivity of random key graphs, where $k$-connectivity of a graph ensures connectivity even after the removal of $k$ nodes or $k$ edges. Yet, it still remains an open question for $k$-connectivity in random key graphs under $X_n \geq 2$ and $X_n = o(\sqrt{\ln n})$ (the case of $X_n=1$ is trivial). In this paper, we answer the above problem by providing an exact analysis of $k$-connectivity in random key graphs under $X_n \geq 2$.
△ Less
Submitted 2 February, 2015;
originally announced February 2015.
-
Threshold Functions in Random s-Intersection Graphs
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
Random $s$-intersection graphs have recently received considerable attention in a wide range of application areas. In such a graph, each vertex is equipped with a set of items in some random manner, and any two vertices establish an undirected edge in between if and only if they have at least $s$ common items. In particular, in a uniform random $s$-intersection graph, each vertex independently sel…
▽ More
Random $s$-intersection graphs have recently received considerable attention in a wide range of application areas. In such a graph, each vertex is equipped with a set of items in some random manner, and any two vertices establish an undirected edge in between if and only if they have at least $s$ common items. In particular, in a uniform random $s$-intersection graph, each vertex independently selects a fixed number of items uniformly at random from a common item pool, while in a binomial random $s$-intersection graph, each item in some item pool is independently attached to each vertex with the same probability.
For binomial/uniform random $s$-intersection graphs, we establish threshold functions for perfect matching containment, Hamilton cycle containment, and $k$-robustness, where $k$-robustness is in the sense of Zhang and Sundaram [IEEE Conf. on Decision & Control '12]. We show that these threshold functions resemble those of classical Erdős-Rényi graphs, where each pair of vertices has an undirected edge independently with the same probability.
△ Less
Submitted 2 February, 2015;
originally announced February 2015.
-
Exact Analysis of k-Connectivity in Secure Sensor Networks with Unreliable Links
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
The Eschenauer--Gligor (EG) random key predistribution scheme has been widely recognized as a typical approach to secure communications in wireless sensor networks (WSNs). However, there is a lack of precise probability analysis on the reliable connectivity of WSNs under the EG scheme. To address this, we rigorously derive the asymptotically exact probability of $k$-connectivity in WSNs employing…
▽ More
The Eschenauer--Gligor (EG) random key predistribution scheme has been widely recognized as a typical approach to secure communications in wireless sensor networks (WSNs). However, there is a lack of precise probability analysis on the reliable connectivity of WSNs under the EG scheme. To address this, we rigorously derive the asymptotically exact probability of $k$-connectivity in WSNs employing the EG scheme with unreliable links represented by independent on/off channels, where $k$-connectivity ensures that the network remains connected despite the failure of any $(k-1)$ sensors or links. Our analytical results are confirmed via numerical experiments, and they provide precise guidelines for the design of secure WSNs that exhibit a desired level of reliability against node and link failures.
△ Less
Submitted 6 February, 2015; v1 submitted 21 September, 2014;
originally announced September 2014.
-
On $k$-connectivity and minimum vertex degree in random $s$-intersection graphs
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
Random $s$-intersection graphs have recently received much interest in a wide range of application areas. Broadly speaking, a random $s$-intersection graph is constructed by first assigning each vertex a set of items in some random manner, and then putting an undirected edge between all pairs of vertices that share at least $s$ items (the graph is called a random intersection graph when $s=1$). A…
▽ More
Random $s$-intersection graphs have recently received much interest in a wide range of application areas. Broadly speaking, a random $s$-intersection graph is constructed by first assigning each vertex a set of items in some random manner, and then putting an undirected edge between all pairs of vertices that share at least $s$ items (the graph is called a random intersection graph when $s=1$). A special case of particular interest is a uniform random $s$-intersection graph, where each vertex independently selects the same number of items uniformly at random from a common item pool. Another important case is a binomial random $s$-intersection graph, where each item from a pool is independently assigned to each vertex with the same probability. Both models have found numerous applications thus far including cryptanalysis, and the modeling of recommender systems, secure sensor networks, online social networks, trust networks and small-world networks (uniform random $s$-intersection graphs), as well as clustering analysis, classification, and the design of integrated circuits (binomial random $s$-intersection graphs).
In this paper, for binomial/uniform random $s$-intersection graphs, we present results related to $k$-connectivity and minimum vertex degree. Specifically, we derive the asymptotically exact probabilities and zero-one laws for the following three properties: (i) $k$-vertex-connectivity, (ii) $k$-edge-connectivity and (iii) the property of minimum vertex degree being at least $k$.
△ Less
Submitted 18 November, 2014; v1 submitted 21 September, 2014;
originally announced September 2014.
-
On the strengths of connectivity and robustness in general random intersection graphs
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
Random intersection graphs have received much attention for nearly two decades, and currently have a wide range of applications ranging from key predistribution in wireless sensor networks to modeling social networks. In this paper, we investigate the strengths of connectivity and robustness in a general random intersection graph model. Specifically, we establish sharp asymptotic zero-one laws for…
▽ More
Random intersection graphs have received much attention for nearly two decades, and currently have a wide range of applications ranging from key predistribution in wireless sensor networks to modeling social networks. In this paper, we investigate the strengths of connectivity and robustness in a general random intersection graph model. Specifically, we establish sharp asymptotic zero-one laws for $k$-connectivity and $k$-robustness, as well as the asymptotically exact probability of $k$-connectivity, for any positive integer $k$. The $k$-connectivity property quantifies how resilient is the connectivity of a graph against node or edge failures. On the other hand, $k$-robustness measures the effectiveness of local diffusion strategies (that do not use global graph topology information) in spreading information over the graph in the presence of misbehaving nodes. In addition to presenting the results under the general random intersection graph model, we consider two special cases of the general model, a binomial random intersection graph and a uniform random intersection graph, which both have numerous applications as well. For these two specialized graphs, our results on asymptotically exact probabilities of $k$-connectivity and asymptotic zero-one laws for $k$-robustness are also novel in the literature.
△ Less
Submitted 21 September, 2014;
originally announced September 2014.
-
On Topological Properties of Wireless Sensor Networks under the q-Composite Key Predistribution Scheme with On/Off Channels
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
The q-composite key predistribution scheme [1] is used prevalently for secure communications in large-scale wireless sensor networks (WSNs). Prior work [2]-[4] explores topological properties of WSNs employing the q-composite scheme for q = 1 with unreliable communication links modeled as independent on/off channels. In this paper, we investigate topological properties related to the node degree i…
▽ More
The q-composite key predistribution scheme [1] is used prevalently for secure communications in large-scale wireless sensor networks (WSNs). Prior work [2]-[4] explores topological properties of WSNs employing the q-composite scheme for q = 1 with unreliable communication links modeled as independent on/off channels. In this paper, we investigate topological properties related to the node degree in WSNs operating under the q-composite scheme and the on/off channel model. Our results apply to general q and are stronger than those reported for the node degree in prior work even for the case of q being 1. Specifically, we show that the number of nodes with certain degree asymptotically converges in distribution to a Poisson random variable, present the asymptotic probability distribution for the minimum degree of the network, and establish the asymptotically exact probability for the property that the minimum degree is at least an arbitrary value. Numerical experiments confirm the validity of our analytical findings.
△ Less
Submitted 20 August, 2014;
originally announced August 2014.
-
Analysis of complex contagions in random multiplex networks
Authors:
Osman Yagan,
Virgil Gligor
Abstract:
We study the diffusion of influence in random multiplex networks where links can be of $r$ different types, and for a given content (e.g., rumor, product, political view), each link type is associated with a content dependent parameter $c_i$ in $[0,\infty]$ that measures the relative bias type-$i$ links have in spreading this content. In this setting, we propose a linear threshold model of contagi…
▽ More
We study the diffusion of influence in random multiplex networks where links can be of $r$ different types, and for a given content (e.g., rumor, product, political view), each link type is associated with a content dependent parameter $c_i$ in $[0,\infty]$ that measures the relative bias type-$i$ links have in spreading this content. In this setting, we propose a linear threshold model of contagion where nodes switch state if their "perceived" proportion of active neighbors exceeds a threshold τ. Namely, a node connected to $m_i$ active neighbors and $k_i-m_i$ inactive neighbors via type-$i$ links will turn active if $\sum{c_i m_i}/\sum{c_i k_i}$ exceeds its threshold τ. Under this model, we obtain the condition, probability and expected size of global spreading events. Our results extend the existing work on complex contagions in several directions by i) providing solutions for coupled random networks whose vertices are neither identical nor disjoint, (ii) highlighting the effect of content on the dynamics of complex contagions, and (iii) showing that content-dependent propagation over a multiplex network leads to a subtle relation between the giant vulnerable component of the graph and the global cascade condition that is not seen in the existing models in the literature.
△ Less
Submitted 8 June, 2012; v1 submitted 2 April, 2012;
originally announced April 2012.