2008 IEEE International Symposium on Information Theory 2008
DOI: 10.1109/isit.2008.4595045
|View full text |Cite
|
Sign up to set email alerts
|

On the random graph induced by a random key predistribution scheme under full visibility

Abstract: We consider the random graph induced by the random key predistribution scheme of Eschenauer and Gligor under the assumption of full visibility. We show the existence of a zero-one law for the absence of isolated nodes, and complement it by a Poisson convergence for the number of isolated nodes. Leveraging earlier results and analogies with Erdős-Renyi graphs, we explore similar results for the property of graph connectivity.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
20
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
4
1

Relationship

4
6

Authors

Journals

citations
Cited by 22 publications
(21 citation statements)
references
References 16 publications
1
20
0
Order By: Relevance
“…sufficiently large, and the random key graph does not degenerate into a complete graph under a strongly admissible scaling. Finally, in Lemma 7.3 we show that (22) suffices to imply…”
Section: A Roadmap For the Proof Of Theorem 41mentioning
confidence: 76%
“…sufficiently large, and the random key graph does not degenerate into a complete graph under a strongly admissible scaling. Finally, in Lemma 7.3 we show that (22) suffices to imply…”
Section: A Roadmap For the Proof Of Theorem 41mentioning
confidence: 76%
“…When c > 1, we have lim n→∞ γ n = ∞ and Theorem III.1 gives the one-law (16), hence the one-law part of (23) holds. On the other hand, with 0 < c < 1, lim n→∞ γ n = −∞ and Theorem III.3 yields the zero-law (18), hence the zero-law part of (23), if the additional conditions (20) or (21) hold. We now show that this additional condition is superfluous for the zero-law to hold; this is a consequence of the Principle of Subsubsequences [9] -In what follows a subsequence k → n k is simply any non-decreasing mapping N 0 → N 0 : k → n k such that lim k→∞ n k = ∞:…”
Section: The Main Resultsmentioning
confidence: 99%
“…In [Liu and Ning 2003], the authors improve on the work in [Eschenauer and Gligor 2002] by taking advantage of node location information to improve key connectivity. Critical thresholds on connectivity of the random Deployment Aware Node Compromise Spread · 27 graph induced by the random key predistribution scheme are investigated by the authors in [Yagan and Makowski 2008]. In [Du et al 2004], the authors discuss a key management scheme based on node deployment knowledge.…”
Section: Related Workmentioning
confidence: 99%