2018
DOI: 10.1088/1367-2630/aabe5f
|View full text |Cite
|
Sign up to set email alerts
|

Critical field-exponents for secure message-passing in modular networks

Abstract: We study secure message-passing in the presence of multiple adversaries in modular networks. We assume a dominant fraction of nodes in each module have the same vulnerability, i.e., the same entity spying on them. We find both analytically and via simulations that the links between the modules (interlinks) have effects analogous to a magnetic field in a spin-system in that for any amount of interlinks the system no longer undergoes a phase transition. We then define the exponents δ, which relates the order par… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
7
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 30 publications
1
7
1
Order By: Relevance
“…Similar to our earlier studies [18,27], we find that the parameter r, governing the fraction of interconnected nodes, has effects analogous to a magnetic field in a spin system, near criticality. This analogy can be seen through the facts that: (i) the non-zero fraction of interconnected nodes destroys the original phase transition point of the single module; (ii) critical exponents (defined below) of values derived from percolation theory can be used to characterize the effect of external field on S(p, r).…”
Section: Resultssupporting
confidence: 87%
“…Similar to our earlier studies [18,27], we find that the parameter r, governing the fraction of interconnected nodes, has effects analogous to a magnetic field in a spin system, near criticality. This analogy can be seen through the facts that: (i) the non-zero fraction of interconnected nodes destroys the original phase transition point of the single module; (ii) critical exponents (defined below) of values derived from percolation theory can be used to characterize the effect of external field on S(p, r).…”
Section: Resultssupporting
confidence: 87%
“…This is similar to the paradigm established in [1,20]; however, the introduction of community structure requires a nontrivial refined treatment of the probability partition to derive solvable self-consistency equations. It is tempting to consider a version of multivariate generating functions that have been used to deal with component based resilience in modular networks [30,8,10,33]. However, we find it cumbersome with a monolithic multivariate version and choose to track the interconnections separately from intraconnections in Gk-core percolation.…”
Section: Generating Function Formalismmentioning
confidence: 99%
“…Another example of the sensitivity to the definition of connectivity is the so called k-connected percolation [4,5] in which vertices are connected only if there exist at least k independent paths among them. Yet another example is color-avoiding percolation [6][7][8]. In these papers every vertex in a network is colored with one color out of a certain set of colors.…”
Section: Introductionmentioning
confidence: 99%
“…From a theoretical point of view, percolation on networks [9,10] exhibits a number of features which are rare or absent in more conventional models of percolation on lattices. Discontinuous phase transitions [11], phase transitions with Berezinskii-Kosterlitz-Thouless singularity [12], magnetic field effects [8], explosive percolation [13] or inequality of site and bond percolation [14] represent just some of the critical phenomena that naturally emerge in percolation on complex networks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation