-
On the Robustness, Connectivity and Giant Component Size of Random K-out Graphs
Authors:
Eray Can Elumar,
Mansi Sood,
Osman Yağan
Abstract:
Random K-out graphs are garnering interest in designing distributed systems including secure sensor networks, anonymous crypto-currency networks, and differentially-private decentralized learning. In these security-critical applications, it is important to model and analyze the resilience of the network to node failures and adversarial captures. Motivated by this, we analyze how the connectivity p…
▽ More
Random K-out graphs are garnering interest in designing distributed systems including secure sensor networks, anonymous crypto-currency networks, and differentially-private decentralized learning. In these security-critical applications, it is important to model and analyze the resilience of the network to node failures and adversarial captures. Motivated by this, we analyze how the connectivity properties of random K-out graphs vary with the network parameters $K$, the number of nodes ($n$), and the number of nodes that get failed or compromised ($γ_n$). In particular, we study the conditions for achieving \emph{connectivity} {with high probability} and for the existence of a \emph{giant component} with formal guarantees on the size of the largest connected component in terms of the parameters $n,~K$, and $γ_n$. Next, we analyze the property of \emph{$r$-robustness} which is a stronger property than connectivity and leads to resilient consensus in the presence of malicious nodes. We derive conditions on $K$ and $n$ under which the random K-out graph achieves r-robustness with high probability. We also provide extensive numerical simulations and compare our results on random K-out graphs with known results on Erdős-Rényi (ER) graphs.
△ Less
Submitted 4 November, 2023;
originally announced November 2023.
-
Spreading processes with population heterogeneity over multi-layer networks
Authors:
Yurun Tian,
Osman Yagan
Abstract:
It's been controversial whether re-opening school will facilitate viral spread among household communities with mitigation strategies such as mask-wearing in place. In this work, we propose an epidemiological model that explores the viral transmission over the multi-layer contact network composed of the school layer and community layer with population heterogeneity on mask-wearing behavior. We der…
▽ More
It's been controversial whether re-opening school will facilitate viral spread among household communities with mitigation strategies such as mask-wearing in place. In this work, we propose an epidemiological model that explores the viral transmission over the multi-layer contact network composed of the school layer and community layer with population heterogeneity on mask-wearing behavior. We derive analytical expressions for three key epidemiological quantities: the probability of emergence, the epidemic threshold, and the expected epidemic size. In particular, we show how the aforementioned quantities depend on the structure of the multi-layer contact network, viral transmission dynamics, and the distribution of the different types of masks within the population. Through extensive simulations, our analytical results show near-perfect agreement with the simulation results with a limited number of nodes. Utilizing the model, we study the impact of the opening/closure of the school layer on the viral transmission dynamics with various mask-wearing scenarios. Interestingly, we found that it's safe to open the school layer with the proper proportion of good-quality masks in the population. Moreover, we validate the theory of the trade-off between source-control and self-protection over a single layer by Tian et al on our multi-layer setting. We conclude that even on a multi-layer network, it's of great significance to treat the spreading process as two distinct phases in mind when considering mitigation strategies. Besides, we would like to remark that our model of spreading process over multi-layer networks with population heterogeneity can also be applied to various other domains, such as misinformation control.
△ Less
Submitted 15 November, 2022; v1 submitted 14 November, 2022;
originally announced November 2022.
-
Spreading Processes with Mutations over Multi-layer Networks
Authors:
Mansi Sood,
Anirudh Sridhar,
Rashad Eletreby,
Chai Wah Wu,
Simon A. Levin,
H. Vincent Poor,
Osman Yagan
Abstract:
A key scientific challenge during the outbreak of novel infectious diseases is to predict how the course of the epidemic changes under different countermeasures that limit interaction in the population. Most epidemiological models do not consider the role of mutations and heterogeneity in the type of contact events. However, pathogens have the capacity to mutate in response to changing environment…
▽ More
A key scientific challenge during the outbreak of novel infectious diseases is to predict how the course of the epidemic changes under different countermeasures that limit interaction in the population. Most epidemiological models do not consider the role of mutations and heterogeneity in the type of contact events. However, pathogens have the capacity to mutate in response to changing environments, especially caused by the increase in population immunity to existing strains and the emergence of new pathogen strains poses a continued threat to public health. Further, in light of differing transmission risks in different congregate settings (e.g., schools and offices), different mitigation strategies may need to be adopted to control the spread of infection. We analyze a multi-layer multi-strain model by simultaneously accounting for i) pathways for mutations in the pathogen leading to the emergence of new pathogen strains, and ii) differing transmission risks in different congregate settings, modeled as network-layers. Assuming complete cross-immunity among strains, namely, recovery from any infection prevents infection with any other (an assumption that will need to be relaxed to deal with COVID-19 or influenza), we derive the key epidemiological parameters for the proposed multi-layer multi-strain framework. We demonstrate that reductions to existing network-based models that discount heterogeneity in either the strain or the network layers can lead to incorrect predictions for the course of the outbreak. In addition, our results highlight that the impact of imposing/lifting mitigation measures concerning different contact network layers (e.g., school closures or work-from-home policies) should be evaluated in connection with their effect on the likelihood of the emergence of new pathogen strains.
△ Less
Submitted 24 January, 2023; v1 submitted 10 October, 2022;
originally announced October 2022.
-
Dynamic Coupling Strategy for Interdependent Network Systems Against Cascading Failures
Authors:
I-Cheng Lin,
Carlee Joe-Wong,
Osman Yagan
Abstract:
Cascading failures are a common phenomenon in complex networked systems where failures at only a few nodes may trigger a process of sequential failure. We applied a flow redistribution model to investigate the robustness against cascading failures in modern systems carrying flows/loads (i.e. power grid, transportation system, etc.) that contain multiple interdependent networks. In such a system, t…
▽ More
Cascading failures are a common phenomenon in complex networked systems where failures at only a few nodes may trigger a process of sequential failure. We applied a flow redistribution model to investigate the robustness against cascading failures in modern systems carrying flows/loads (i.e. power grid, transportation system, etc.) that contain multiple interdependent networks. In such a system, the coupling coefficients between networks, which determine how much flows/loads are redistributed between networks, are a key factor determining the robustness to cascading failures. We derive recursive expressions to characterize the evolution of such a system under dynamic network coupling. Using these expressions, we enhance the robustness of interdependent network systems by dynamically adjusting the coupling coefficients based on current system situations, minimizing the subsequent failures. The analytical and simulation results show a significant improvement in robustness compared to prior work, which considers only fixed coupling coefficients. Our proposed Step-wise Optimization (SWO) method not only shows good performance against cascading failures, but also offers better computational complexity, scalability to multiple networks, and flexibility to different attack types. We show in simulation that SWO provides robustness against cascading failures for multiple different network topologies.
△ Less
Submitted 2 March, 2022;
originally announced March 2022.
-
The Role of Masks in Mitigating Viral Spread on Networks
Authors:
Yurun Tian,
Anirudh Sridhar,
Chai Wah Wu,
Simon A. Levin,
Kathleen M. Carley,
H. Vincent Poor,
Osman Yagan
Abstract:
Masks have remained an important mitigation strategy in the fight against COVID-19 due to their ability to prevent the transmission of respiratory droplets between individuals. In this work, we provide a comprehensive quantitative analysis of the impact of mask-wearing. To this end, we propose a novel agent-based model of viral spread on networks where agents may either wear no mask or wear one of…
▽ More
Masks have remained an important mitigation strategy in the fight against COVID-19 due to their ability to prevent the transmission of respiratory droplets between individuals. In this work, we provide a comprehensive quantitative analysis of the impact of mask-wearing. To this end, we propose a novel agent-based model of viral spread on networks where agents may either wear no mask or wear one of several types of masks with different properties (e.g., cloth or surgical). We derive analytical expressions for three key epidemiological quantities: the probability of emergence, the epidemic threshold, and the expected epidemic size. In particular, we show how the aforementioned quantities depend on the structure of the contact network, viral transmission dynamics, and the distribution of the different types of masks within the population. Through extensive simulations, we then investigate the impact of different allocations of masks within the population and trade-offs between the outward efficiency and inward efficiency of the masks. Interestingly, we find that masks with high outward efficiency and low inward efficiency are most useful for controlling the spread in the early stages of an epidemic, while masks with high inward efficiency but low outward efficiency are most useful in reducing the size of an already large spread. Lastly, we study whether degree-based mask allocation is more effective in reducing the probability of epidemic as well as epidemic size compared to random allocation. The result echoes the previous findings that mitigation strategies should differ based on the stage of the spreading process, focusing on source control before the epidemic emerges and on self-protection after the emergence.
△ Less
Submitted 6 June, 2023; v1 submitted 8 October, 2021;
originally announced October 2021.
-
Best-Arm Identification in Correlated Multi-Armed Bandits
Authors:
Samarth Gupta,
Gauri Joshi,
Osman Yağan
Abstract:
In this paper we consider the problem of best-arm identification in multi-armed bandits in the fixed confidence setting, where the goal is to identify, with probability $1-δ$ for some $δ>0$, the arm with the highest mean reward in minimum possible samples from the set of arms $\mathcal{K}$. Most existing best-arm identification algorithms and analyses operate under the assumption that the rewards…
▽ More
In this paper we consider the problem of best-arm identification in multi-armed bandits in the fixed confidence setting, where the goal is to identify, with probability $1-δ$ for some $δ>0$, the arm with the highest mean reward in minimum possible samples from the set of arms $\mathcal{K}$. Most existing best-arm identification algorithms and analyses operate under the assumption that the rewards corresponding to different arms are independent of each other. We propose a novel correlated bandit framework that captures domain knowledge about correlation between arms in the form of upper bounds on expected conditional reward of an arm, given a reward realization from another arm. Our proposed algorithm C-LUCB, which generalizes the LUCB algorithm utilizes this partial knowledge of correlations to sharply reduce the sample complexity of best-arm identification. More interestingly, we show that the total samples obtained by C-LUCB are of the form $\mathcal{O}\left(\sum_{k \in \mathcal{C}} \log\left(\frac{1}δ\right)\right)$ as opposed to the typical $\mathcal{O}\left(\sum_{k \in \mathcal{K}} \log\left(\frac{1}δ\right)\right)$ samples required in the independent reward setting. The improvement comes, as the $\mathcal{O}(\log(1/δ))$ term is summed only for the set of competitive arms $\mathcal{C}$, which is a subset of the original set of arms $\mathcal{K}$. The size of the set $\mathcal{C}$, depending on the problem setting, can be as small as $2$, and hence using C-LUCB in the correlated bandits setting can lead to significant performance improvements. Our theoretical findings are supported by experiments on the Movielens and Goodreads recommendation datasets.
△ Less
Submitted 10 September, 2021;
originally announced September 2021.
-
On the Connectivity and Giant Component Size of Random K-out Graphs Under Randomly Deleted Nodes
Authors:
Eray Can Elumar,
Mansi Sood,
Osman Yagan
Abstract:
Random K-out graphs, denoted $\mathbb{H}(n;K)$, are generated by each of the $n$ nodes drawing $K$ out-edges towards $K$ distinct nodes selected uniformly at random, and then ignoring the orientation of the arcs. Recently, random K-out graphs have been used in applications as diverse as random (pairwise) key predistribution in ad-hoc networks, anonymous message routing in crypto-currency networks,…
▽ More
Random K-out graphs, denoted $\mathbb{H}(n;K)$, are generated by each of the $n$ nodes drawing $K$ out-edges towards $K$ distinct nodes selected uniformly at random, and then ignoring the orientation of the arcs. Recently, random K-out graphs have been used in applications as diverse as random (pairwise) key predistribution in ad-hoc networks, anonymous message routing in crypto-currency networks, and differentially-private federated averaging. In many applications, connectivity of the random K-out graph when some of its nodes are dishonest, have failed, or have been captured is of practical interest. We provide a comprehensive set of results on the connectivity and giant component size of $\mathbb{H}(n;K_n,γ_n)$, i.e., random K-out graph when $γ_n$ of its nodes, selected uniformly at random, are deleted. First, we derive conditions for $K_n$ and $n$ that ensure, with high probability (whp), the connectivity of the remaining graph when the number of deleted nodes is $γ_n=Ω(n)$ and $γ_n=o(n)$, respectively. Next, we derive conditions for $\mathbb{H}(n;K_n,γ_n)$ to have a giant component, i.e., a connected subgraph with $Ω(n)$ nodes, whp. This is also done for different scalings of $γ_n$ and upper bounds are provided for the number of nodes outside the giant component. Simulation results are presented to validate the usefulness of the results in the finite node regime.
△ Less
Submitted 1 March, 2021;
originally announced March 2021.
-
Bandit-based Communication-Efficient Client Selection Strategies for Federated Learning
Authors:
Yae Jee Cho,
Samarth Gupta,
Gauri Joshi,
Osman Yağan
Abstract:
Due to communication constraints and intermittent client availability in federated learning, only a subset of clients can participate in each training round. While most prior works assume uniform and unbiased client selection, recent work on biased client selection has shown that selecting clients with higher local losses can improve error convergence speed. However, previously proposed biased sel…
▽ More
Due to communication constraints and intermittent client availability in federated learning, only a subset of clients can participate in each training round. While most prior works assume uniform and unbiased client selection, recent work on biased client selection has shown that selecting clients with higher local losses can improve error convergence speed. However, previously proposed biased selection strategies either require additional communication cost for evaluating the exact local loss or utilize stale local loss, which can even make the model diverge. In this paper, we present a bandit-based communication-efficient client selection strategy UCB-CS that achieves faster convergence with lower communication overhead. We also demonstrate how client selection can be used to improve fairness.
△ Less
Submitted 14 December, 2020;
originally announced December 2020.
-
Analysis of the Impact of Mask-wearing in Viral Spread: Implications for COVID-19
Authors:
Yurun Tian,
Anirudh Sridhar,
Osman Yagan,
H. Vincent Poor
Abstract:
Masks are used as part of a comprehensive strategy of measures to limit transmission and save lives during the COVID-19 pandemic. Research about the impact of mask-wearing in the COVID-19 pandemic has raised formidable interest across multiple disciplines. In this paper, we investigate the impact of mask-wearing in spreading processes over complex networks. This is done by studying a heterogeneous…
▽ More
Masks are used as part of a comprehensive strategy of measures to limit transmission and save lives during the COVID-19 pandemic. Research about the impact of mask-wearing in the COVID-19 pandemic has raised formidable interest across multiple disciplines. In this paper, we investigate the impact of mask-wearing in spreading processes over complex networks. This is done by studying a heterogeneous bond percolation process over a multi-type network model, where nodes can be one of two types (mask-wearing, and not-mask-wearing). We provide analytical results that accurately predict the expected epidemic size and probability of emergence as functions of the characteristics of the spreading process (e.g., transmission probabilities, inward and outward efficiency of the masks, etc.), the proportion of mask-wearers in the population, and the structure of the underlying contact network. In addition to the theoretical analysis, we also conduct extensive simulations on random networks. We also comment on the analogy between the mask-model studied here and the multiple-strain viral spreading model with mutations studied recently by Eletreby et al.
△ Less
Submitted 9 November, 2020;
originally announced November 2020.
-
Existence and Size of the Giant Component in Inhomogeneous Random K-out Graphs
Authors:
Mansi Sood,
Osman Yagan
Abstract:
Random K-out graphs are receiving attention as a model to construct sparse yet well-connected topologies in distributed systems including sensor networks, federated learning, and cryptocurrency networks. In response to the growing heterogeneity in emerging real-world networks, where nodes differ in resources and requirements, inhomogeneous random K-out graphs, denoted by $H(n;μ,K_n)$, were propose…
▽ More
Random K-out graphs are receiving attention as a model to construct sparse yet well-connected topologies in distributed systems including sensor networks, federated learning, and cryptocurrency networks. In response to the growing heterogeneity in emerging real-world networks, where nodes differ in resources and requirements, inhomogeneous random K-out graphs, denoted by $H(n;μ,K_n)$, were proposed recently. Motivated by practical settings where establishing links is costly and only a bounded choice of $K_n$ is feasible ($K_n = O(1)$), we study the size of the largest connected sub-network of $H(n;μ,K_n)$, We first show that the trivial condition of $K_n \geq 2$ for all $n$ is sufficient to ensure that $H(n;μ,K_n)$, contains a giant component of size $n-O(1)$ whp. Next, to model settings where nodes can fail or get compromised, we investigate the size of the largest connected sub-network in $H(n;μ,K_n)$, when $d_n$ nodes are selected uniformly at random and removed from the network. We show that if $d_n=O(1)$, a giant component of size $n- \OO(1)$ persists for all $K_n \geq 2$ whp. Further, when $d_n=o(n)$ nodes are removed from $H(n;μ,K_n)$, the remaining nodes contain a giant component of size $n(1-o(1))$ whp for all $K_n \geq 2$. We present numerical results to demonstrate the size of the largest connected component when the number of nodes is finite.
△ Less
Submitted 29 July, 2021; v1 submitted 1 September, 2020;
originally announced September 2020.
-
Tight Bounds for Connectivity of Random K-out Graphs
Authors:
Mansi Sood,
Osman Yagan
Abstract:
Random K-out graphs are used in several applications including modeling by sensor networks secured by the random pairwise key predistribution scheme, and payment channel networks. The random K-out graph with $n$ nodes is constructed as follows. Each node draws an edge towards $K$ distinct nodes selected uniformly at random. The orientation of the edges is then ignored, yielding an undirected graph…
▽ More
Random K-out graphs are used in several applications including modeling by sensor networks secured by the random pairwise key predistribution scheme, and payment channel networks. The random K-out graph with $n$ nodes is constructed as follows. Each node draws an edge towards $K$ distinct nodes selected uniformly at random. The orientation of the edges is then ignored, yielding an undirected graph. An interesting property of random K-out graphs is that they are connected almost surely in the limit of large $n$ for any $K \geq2$. This means that they attain the property of being connected very easily, i.e., with far fewer edges ($O(n)$) as compared to classical random graph models including Erdős-Rényi graphs ($O(n \log n)$). This work aims to reveal to what extent the asymptotic behavior of random K-out graphs being connected easily extends to cases where the number $n$ of nodes is small. We establish upper and lower bounds on the probability of connectivity when $n$ is finite. Our lower bounds improve significantly upon the existing results, and indicate that random K-out graphs can attain a given probability of connectivity at much smaller network sizes than previously known. We also show that the established upper and lower bounds match order-wise; i.e., further improvement on the order of $n$ in the lower bound is not possible. In particular, we prove that the probability of connectivity is $1-Θ({1}/{n^{K^2-1}})$ for all $K \geq 2$. Through numerical simulations, we show that our bounds closely mirror the empirically observed probability of connectivity.
△ Less
Submitted 18 June, 2020;
originally announced June 2020.
-
IRS-Assisted Millimeter Wave Communications: Joint Power Allocation and Beamforming Design
Authors:
Yue Xiu,
Yang Zhao,
Yang Liu,
Jun Zhao,
Osman Yagan,
Ning Wei
Abstract:
Intelligent reflecting surface (IRS) technology offers more feasible propagation paths for millimeter-wave (mmWave) communication systems to overcome blockage than existing technologies. In this paper, we consider a downlink wireless system with the IRS and formulate a joint power allocation and beamforming design problem to maximize the weighted sum-rate, which is a multi-variable optimization pr…
▽ More
Intelligent reflecting surface (IRS) technology offers more feasible propagation paths for millimeter-wave (mmWave) communication systems to overcome blockage than existing technologies. In this paper, we consider a downlink wireless system with the IRS and formulate a joint power allocation and beamforming design problem to maximize the weighted sum-rate, which is a multi-variable optimization problem. To solve the problem, we propose a novel alternating manifold optimization based beamforming algorithm. Simulation results show that our proposed optimization algorithm outperforms existing algorithms significantly in improving the weighted sum-rate of the wireless communication system.
△ Less
Submitted 24 December, 2020; v1 submitted 21 January, 2020;
originally announced January 2020.
-
On the Strength of Connectivity of Inhomogeneous Random K-out Graphs
Authors:
Mansi Sood,
Osman Yağan
Abstract:
Random graphs are an important tool for modelling and analyzing the underlying properties of complex real-world networks. In this paper, we study a class of random graphs known as the inhomogeneous random K-out graphs which were recently introduced to analyze heterogeneous sensor networks secured by the pairwise scheme. In this model, first, each of the $n$ nodes is classified as type-1 (respectiv…
▽ More
Random graphs are an important tool for modelling and analyzing the underlying properties of complex real-world networks. In this paper, we study a class of random graphs known as the inhomogeneous random K-out graphs which were recently introduced to analyze heterogeneous sensor networks secured by the pairwise scheme. In this model, first, each of the $n$ nodes is classified as type-1 (respectively, type-2) with probability $0<μ<1$ (respectively, $1-μ)$ independently from each other. Next, each type-1 (respectively, type-2) node draws 1 arc towards a node (respectively, $K_n$ arcs towards $K_n$ distinct nodes) selected uniformly at random, and then the orientation of the arcs is ignored. From the literature on homogeneous K-out graphs wherein all nodes select $K_n$ neighbors (i.e., $μ=0$), it is known that when $K_n \geq2$, the graph is $K_n$-connected asymptotically almost surely (a.a.s.) as $n$ gets large. In the inhomogeneous case (i.e., $μ>0$), it was recently established that achieving even 1-connectivity a.a.s. requires $K_n=ω(1)$. Here, we provide a comprehensive set of results to complement these existing results. First, we establish a sharp zero-one law for $k$-connectivity, showing that for the network to be $k$-connected a.a.s., we need to set $K_n = \frac{1}{1-μ}(\log n +(k-2)\log\log n + ω(1))$ for all $k=2, 3, \ldots$. Despite such large scaling of $K_n$ being required for $k$-connectivity, we show that the trivial condition of $K_n \geq 2$ for all $n$ is sufficient to ensure that inhomogeneous K-out graph has a connected component of size $n-O(1)$ whp.
△ Less
Submitted 27 February, 2020; v1 submitted 12 November, 2019;
originally announced November 2019.
-
Multi-Armed Bandits with Correlated Arms
Authors:
Samarth Gupta,
Shreyas Chaudhari,
Gauri Joshi,
Osman Yağan
Abstract:
We consider a multi-armed bandit framework where the rewards obtained by pulling different arms are correlated. We develop a unified approach to leverage these reward correlations and present fundamental generalizations of classic bandit algorithms to the correlated setting. We present a unified proof technique to analyze the proposed algorithms. Rigorous analysis of C-UCB (the correlated bandit v…
▽ More
We consider a multi-armed bandit framework where the rewards obtained by pulling different arms are correlated. We develop a unified approach to leverage these reward correlations and present fundamental generalizations of classic bandit algorithms to the correlated setting. We present a unified proof technique to analyze the proposed algorithms. Rigorous analysis of C-UCB (the correlated bandit version of Upper-confidence-bound) reveals that the algorithm ends up pulling certain sub-optimal arms, termed as non-competitive, only O(1) times, as opposed to the O(log T) pulls required by classic bandit algorithms such as UCB, TS etc. We present regret-lower bound and show that when arms are correlated through a latent random source, our algorithms obtain order-optimal regret. We validate the proposed algorithms via experiments on the MovieLens and Goodreads datasets, and show significant improvement over classical bandit algorithms.
△ Less
Submitted 10 September, 2021; v1 submitted 6 November, 2019;
originally announced November 2019.
-
On Connectivity and Robustness in Random Intersection Graphs
Authors:
Jun Zhao,
Osman Yagan,
Virgil Gligor
Abstract:
Random intersection graphs have received much attention recently and been used in a wide range of applications ranging from key predistribution in wireless sensor networks to modeling social networks. For these graphs, each node is equipped with a set of objects in a random manner, and two nodes have an undirected edge in between if they have at least one object in common. In this paper, we invest…
▽ More
Random intersection graphs have received much attention recently and been used in a wide range of applications ranging from key predistribution in wireless sensor networks to modeling social networks. For these graphs, each node is equipped with a set of objects in a random manner, and two nodes have an undirected edge in between if they have at least one object in common. In this paper, we investigate connectivity and robustness in a general random intersection graph model. Specifically, we establish sharp asymptotic zero-one laws for k-connectivity and k-robustness, as well as the asymptotically exact probability of k-connectivity, for any positive integer k. The k-connectivity property quantifies how resilient is the connectivity of a graph against node or edge failures, while k-robustness measures the effectiveness of local-information-based consensus algorithms (that do not use global graph topology information) in the presence of adversarial nodes. In addition to presenting the results under the general random intersection graph model, we consider two special cases of the general model, a binomial random intersection graph and a uniform random intersection graph, which both have numerous applications as well. For these two specialized graphs, our results on asymptotically exact probabilities of k-connectivity and asymptotic zero-one laws for k-robustness are also novel in the literature.
△ Less
Submitted 2 November, 2019;
originally announced November 2019.
-
Secure Connectivity of Heterogeneous Wireless Sensor Networks Under a Heterogeneous On-Off Channel Model
Authors:
Rashad Eletreby,
Osman Yagan
Abstract:
In this paper, we investigate the secure connectivity of wireless sensor networks utilizing the heterogeneous random key predistribution scheme, where each sensor node is classified as class-$i$ with probability $μ_i$ for $i=1,\ldots,r$ with $μ_i>0$ and $\sum_{i=1}^r μ_i=1$. A class-$i$ sensor is given $K_i$ cryptographic keys selected uniformly at random from a key pool of size $P$. After deploym…
▽ More
In this paper, we investigate the secure connectivity of wireless sensor networks utilizing the heterogeneous random key predistribution scheme, where each sensor node is classified as class-$i$ with probability $μ_i$ for $i=1,\ldots,r$ with $μ_i>0$ and $\sum_{i=1}^r μ_i=1$. A class-$i$ sensor is given $K_i$ cryptographic keys selected uniformly at random from a key pool of size $P$. After deployment, two nodes can communicate securely if they share at least one cryptographic key. We consider the wireless connectivity of the network using a heterogeneous on-off channel model, where the channel between a class-$i$ node and a class-$j$ node is on (respectively, off) with probability $α_{ij}$ (respectively, $1-α_{ij}$) for $i,j=1,\ldots,r$. Collectively, two sensor nodes are adjacent if they i) share a cryptographic key and ii) have a wireless channel in between that is on. We model the overall network using a composite random graph obtained by the intersection of inhomogeneous random key graphs (IRKG) $\mathbb{K}(n;\pmbμ,\pmb{K},P)$ with inhomogeneous Erdős-Rényi graphs (IERG) $\mathbb{G}(n;\pmbμ, \pmbα)$. The former graph is naturally induced by the heterogeneous random key predistribution scheme, while the latter is induced by the heterogeneous on-off channel model. More specifically, two nodes are adjacent in the composite graph if they are i) adjacent in the IRKG i.e., share a cryptographic key and ii) adjacent in the IERG, i.e., have an available wireless channel. We investigate the connectivity of the composite random graph and present conditions (in the form of zero-one laws) on how to scale its parameters so that it i) has no secure node which is isolated and ii) is securely connected, both with high probability when the number of nodes gets large. We also present numerical results to support these zero-one laws in the finite-node regime.
△ Less
Submitted 20 August, 2019;
originally announced August 2019.
-
Towards $k$-connectivity in Heterogeneous Sensor Networks under Pairwise Key Predistribution
Authors:
Mansi Sood,
Osman Yağan
Abstract:
We study the secure and reliable connectivity of wireless sensor networks under the heterogeneous pairwise key predistribution scheme. This scheme was recently introduced as an extension of the random pairwise key predistribution scheme of Chan et al. to accommodate networks where the constituent sensors have different capabilities or requirements for security and connectivity. For simplicity, we…
▽ More
We study the secure and reliable connectivity of wireless sensor networks under the heterogeneous pairwise key predistribution scheme. This scheme was recently introduced as an extension of the random pairwise key predistribution scheme of Chan et al. to accommodate networks where the constituent sensors have different capabilities or requirements for security and connectivity. For simplicity, we consider a heterogeneous network where each of the $n$ sensors is classified as type-1 (respectively, type-2) with probability $μ$ (respectively, $1-μ)$ where $0<μ<1$. Each type-1 (respectively, type-2) node selects 1 (respectively, $K_n$) other nodes uniformly at random to be paired with; according to the pairwise scheme each pair is then assigned a unique pairwise key so that they can securely communicate with each other. We establish critical conditions on $n, μ$, and $K_n$ such that the resulting network has minimum node degree of at least $k$ with high probability in the limit of large network size. Our result constitutes a zero-one law for the minimum node degree of the recently introduced inhomogeneous random K-out graph model. This constitutes a crucial step towards establishing a similar zero-one law for the $k$-connectivity of the graph; i.e., for the property that the network remains connected despite the failure of any $k-1$ nodes or links. We present numerical results that indicate the usefulness of our results in selecting the parameters of the scheme in practical settings with finite number of sensors.
△ Less
Submitted 18 July, 2019;
originally announced July 2019.
-
Optimizing Robustness against Cascading Failures under Max-Load Targeted Attack
Authors:
Omur Ozel,
Bruno Sinopoli,
Osman Yagan
Abstract:
Motivated by reliability of networks in critical infrastructures, we consider optimal robustness of a class of flow networks against a \textit{targeted} attack, namely max-load targeted attack, that triggers cascading failures due to removal of largest load carrying portion of lines. The setup involves a network of $N$ lines with initial loads $L_1, \ldots, L_N$, drawn from independent and identic…
▽ More
Motivated by reliability of networks in critical infrastructures, we consider optimal robustness of a class of flow networks against a \textit{targeted} attack, namely max-load targeted attack, that triggers cascading failures due to removal of largest load carrying portion of lines. The setup involves a network of $N$ lines with initial loads $L_1, \ldots, L_N$, drawn from independent and identical uniform distribution, and free-spaces or redundancies $S_1, \ldots, S_N$ to be allocated. In the failure propagation mechanism, a line fails initially due to attack and later due to overloading. The load that was carried at the moment of failing gets redistributed equally among all remaining lines in the system. We analyze robustness of this network against the max-load targeted attack that removes the largest load carrying $p$-fraction of the lines from the system. The system designer allocates $S_i$ as a stochastic function of the load in each line. Assuming an average available resource budget, we show that allocating all lines the free-spaces equally among nodes is optimal under some regulatory assumptions. We provide numerical results verifying that equal free-space allocation to all lines perform optimally in more general targeted attack scenarios.
△ Less
Submitted 26 March, 2019; v1 submitted 19 November, 2018;
originally announced November 2018.
-
Connectivity of inhomogeneous random K-out graphs
Authors:
Rashad Eletreby,
Osman Yağan
Abstract:
We propose inhomogeneous random K-out graphs $\mathbb{H}(n; \pmbμ, \pmb{K}_n)$, where each of the $n$ nodes is assigned to one of $r$ classes independently with a probability distribution $\pmbμ = \{μ_1, \ldots, μ_r\}$. In particular, each node is classified as class-$i$ with probability $μ_i>0$, independently. Each class-$i$ node selects $K_{i,n}$ distinct nodes uniformly at random from among all…
▽ More
We propose inhomogeneous random K-out graphs $\mathbb{H}(n; \pmbμ, \pmb{K}_n)$, where each of the $n$ nodes is assigned to one of $r$ classes independently with a probability distribution $\pmbμ = \{μ_1, \ldots, μ_r\}$. In particular, each node is classified as class-$i$ with probability $μ_i>0$, independently. Each class-$i$ node selects $K_{i,n}$ distinct nodes uniformly at random from among all other nodes. A pair of nodes are adjacent in $\mathbb{H}(n; \pmbμ, \pmb{K}_n)$ if at least one selects the other. Without loss of generality, we assume that $K_{1,n} \leq K_{2,n} \leq \ldots \leq K_{r,n}$. Earlier results on homogeneous random K-out graphs $\mathbb{H}(n; K_n)$, where all nodes select the same number $K$ of other nodes, reveal that $\mathbb{H}(n; K_n)$ is connected with high probability (whp) if $K_n \geq 2$ which implies that $\mathbb{H}(n; \pmbμ, \pmb{K}_n)$ is connected whp if $K_{1,n} \geq 2$. In this paper, we investigate the connectivity of inhomogeneous random K-out graphs $\mathbb{H}(n; \pmbμ, \pmb{K}_n)$ for the special case when $K_{1,n}=1$, i.e., when each class-$1$ node selects only one other node. We show that $\mathbb{H}\left(n;\pmbμ,\pmb{K}_n\right)$ is connected whp if $K_{r,n}$ is chosen such that $\lim_{n \to \infty} K_{r,n} = \infty$. However, any bounded choice of the sequence $K_{r,n}$ gives a positive probability of $\mathbb{H}\left(n;\pmbμ,\pmb{K}_n\right)$ being not connected. Simulation results are provided to validate our results in the finite node regime.
△ Less
Submitted 3 June, 2019; v1 submitted 23 October, 2018;
originally announced October 2018.
-
A Unified Approach to Translate Classical Bandit Algorithms to the Structured Bandit Setting
Authors:
Samarth Gupta,
Shreyas Chaudhari,
Subhojyoti Mukherjee,
Gauri Joshi,
Osman Yağan
Abstract:
We consider a finite-armed structured bandit problem in which mean rewards of different arms are known functions of a common hidden parameter $θ^*$. Since we do not place any restrictions of these functions, the problem setting subsumes several previously studied frameworks that assume linear or invertible reward functions. We propose a novel approach to gradually estimate the hidden $θ^*$ and use…
▽ More
We consider a finite-armed structured bandit problem in which mean rewards of different arms are known functions of a common hidden parameter $θ^*$. Since we do not place any restrictions of these functions, the problem setting subsumes several previously studied frameworks that assume linear or invertible reward functions. We propose a novel approach to gradually estimate the hidden $θ^*$ and use the estimate together with the mean reward functions to substantially reduce exploration of sub-optimal arms. This approach enables us to fundamentally generalize any classic bandit algorithm including UCB and Thompson Sampling to the structured bandit setting. We prove via regret analysis that our proposed UCB-C algorithm (structured bandit versions of UCB) pulls only a subset of the sub-optimal arms $O(\log T)$ times while the other sub-optimal arms (referred to as non-competitive arms) are pulled $O(1)$ times. As a result, in cases where all sub-optimal arms are non-competitive, which can happen in many practical scenarios, the proposed algorithms achieve bounded regret. We also conduct simulations on the Movielens recommendations dataset to demonstrate the improvement of the proposed algorithms over existing structured bandit algorithms.
△ Less
Submitted 3 February, 2021; v1 submitted 18 October, 2018;
originally announced October 2018.
-
The Effects of Evolutionary Adaptations on Spreading Processes in Complex Networks
Authors:
Rashad Eletreby,
Yong Zhuang,
Kathleen M. Carley,
Osman Yağan,
H. Vincent Poor
Abstract:
A common theme among the proposed models for network epidemics is the assumption that the propagating object, i.e., a virus or a piece of information, is transferred across the nodes without going through any modification or evolution. However, in real-life spreading processes, pathogens often evolve in response to changing environments and medical interventions and information is often modified b…
▽ More
A common theme among the proposed models for network epidemics is the assumption that the propagating object, i.e., a virus or a piece of information, is transferred across the nodes without going through any modification or evolution. However, in real-life spreading processes, pathogens often evolve in response to changing environments and medical interventions and information is often modified by individuals before being forwarded. In this paper, we investigate the evolution of spreading processes on complex networks with the aim of i) revealing the role of evolution on the threshold, probability, and final size of epidemics; and ii) exploring the interplay between the structural properties of the network and the dynamics of evolution. In particular, we develop a mathematical theory that accurately predicts the epidemic threshold and the expected epidemic size as functions of the characteristics of the spreading process, the evolutionary dynamics of the pathogen, and the structure of the underlying contact network. In addition to the mathematical theory, we perform extensive simulations on random and real-world contact networks to verify our theory and reveal the significant shortcomings of the classical mathematical models that do not capture evolution. Our results reveal that the classical, single-type bond-percolation models may accurately predict the threshold and final size of epidemics, but their predictions on the probability of emergence are inaccurate on both random and real-world networks. This inaccuracy sheds the light on a fundamental disconnect between the classical bond-percolation models and real-life spreading processes that entail evolution. Finally, we consider the case when co-infection is possible and show that co-infection could lead the order of phase transition to change from second-order to first-order.
△ Less
Submitted 2 November, 2019; v1 submitted 10 October, 2018;
originally announced October 2018.
-
Correlated Multi-armed Bandits with a Latent Random Source
Authors:
Samarth Gupta,
Gauri Joshi,
Osman Yağan
Abstract:
We consider a novel multi-armed bandit framework where the rewards obtained by pulling the arms are functions of a common latent random variable. The correlation between arms due to the common random source can be used to design a generalized upper-confidence-bound (UCB) algorithm that identifies certain arms as $non-competitive$, and avoids exploring them. As a result, we reduce a $K$-armed bandi…
▽ More
We consider a novel multi-armed bandit framework where the rewards obtained by pulling the arms are functions of a common latent random variable. The correlation between arms due to the common random source can be used to design a generalized upper-confidence-bound (UCB) algorithm that identifies certain arms as $non-competitive$, and avoids exploring them. As a result, we reduce a $K$-armed bandit problem to a $C+1$-armed problem, where $C+1$ includes the best arm and $C$ $competitive$ arms. Our regret analysis shows that the competitive arms need to be pulled $\mathcal{O}(\log T)$ times, while the non-competitive arms are pulled only $\mathcal{O}(1)$ times. As a result, there are regimes where our algorithm achieves a $\mathcal{O}(1)$ regret as opposed to the typical logarithmic regret scaling of multi-armed bandit algorithms. We also evaluate lower bounds on the expected regret and prove that our correlated-UCB algorithm achieves $\mathcal{O}(1)$ regret whenever possible.
△ Less
Submitted 29 January, 2019; v1 submitted 17 August, 2018;
originally announced August 2018.
-
Active Distribution Learning from Indirect Samples
Authors:
Samarth Gupta,
Gauri Joshi,
Osman Yağan
Abstract:
This paper studies the problem of {\em learning} the probability distribution $P_X$ of a discrete random variable $X$ using indirect and sequential samples. At each time step, we choose one of the possible $K$ functions, $g_1, \ldots, g_K$ and observe the corresponding sample $g_i(X)$. The goal is to estimate the probability distribution of $X$ by using a minimum number of such sequential samples.…
▽ More
This paper studies the problem of {\em learning} the probability distribution $P_X$ of a discrete random variable $X$ using indirect and sequential samples. At each time step, we choose one of the possible $K$ functions, $g_1, \ldots, g_K$ and observe the corresponding sample $g_i(X)$. The goal is to estimate the probability distribution of $X$ by using a minimum number of such sequential samples. This problem has several real-world applications including inference under non-precise information and privacy-preserving statistical estimation. We establish necessary and sufficient conditions on the functions $g_1, \ldots, g_K$ under which asymptotically consistent estimation is possible. We also derive lower bounds on the estimation error as a function of total samples and show that it is order-wise achievable. Leveraging these results, we propose an iterative algorithm that i) chooses the function to observe at each step based on past observations; and ii) combines the obtained samples to estimate $p_X$. The performance of this algorithm is investigated numerically under various scenarios, and shown to outperform baseline approaches.
△ Less
Submitted 15 August, 2018;
originally announced August 2018.
-
Modeling and Analysis of Cascading Failures in Interdependent Cyber-Physical Systems
Authors:
Yingrui Zhang,
Osman Yagan
Abstract:
Integrated cyber-physical systems (CPSs), such as the smart grid, are increasingly becoming the underpinning technology for major industries. A major concern regarding such systems are the seemingly unexpected large-scale failures, which are often attributed to a small initial shock getting escalated due to intricate dependencies within and across the individual counterparts of the system. In this…
▽ More
Integrated cyber-physical systems (CPSs), such as the smart grid, are increasingly becoming the underpinning technology for major industries. A major concern regarding such systems are the seemingly unexpected large-scale failures, which are often attributed to a small initial shock getting escalated due to intricate dependencies within and across the individual counterparts of the system. In this paper, we develop a novel interdependent system model to capture this phenomenon, also known as cascading failures. Our framework consists of two networks that have inherently different characteristics governing their intra-dependency: i) a cyber-network where a node is functional as long as it belongs to the largest connected (i.e., giant) component; and ii) a physical network where nodes are given an initial flow and a capacity, and failure of a node results with redistribution of its flow to the remaining nodes, upon which further failures might take place due to overloading (i.e., the flow of a node exceeding its capacity). Furthermore, it is assumed that these two networks are inter-dependent. For simplicity, we consider a one-to-one interdependency model where every node in the cyber-network is dependent upon and supports a single node in the physical network, and vice versa. We provide a thorough analysis of the dynamics of cascading failures in this interdependent system initiated with a random attack. The system robustness is quantified as the surviving fraction of nodes at the end of cascading failures, and is derived in terms of all network parameters involved (e.g., degree distribution, load/capacity distribution, failure size, etc.). Analytic results are supported through an extensive numerical study. Among other things, these results demonstrate the ability of our model to capture the unexpected nature of large-scale failures and provide insights on improving system robustness.
△ Less
Submitted 20 July, 2018;
originally announced July 2018.
-
Multi-Stage Complex Contagions in Random Multiplex Networks
Authors:
Yong Zhuang,
Osman Yağan
Abstract:
Complex contagion models have been developed to understand a wide range of social phenomena such as adoption of cultural fads, the diffusion of belief, norms, and innovations in social networks, and the rise of collective action to join a riot. Most existing works focus on contagions where individuals' states are represented by {\em binary} variables, and propagation takes place over a single isol…
▽ More
Complex contagion models have been developed to understand a wide range of social phenomena such as adoption of cultural fads, the diffusion of belief, norms, and innovations in social networks, and the rise of collective action to join a riot. Most existing works focus on contagions where individuals' states are represented by {\em binary} variables, and propagation takes place over a single isolated network. However, characterization of an individual's standing on a given matter as a binary state might be overly simplistic as most of our opinions, feelings, and perceptions vary over more than two states. Also, most real-world contagions take place over multiple networks (e.g., Twitter and Facebook) or involve {\em multiplex} networks where individuals engage in different {\em types} of relationships (e.g., acquaintance, co-worker, family, etc.). To this end, this paper studies {\em multi-stage} complex contagions that take place over multi-layer or multiplex networks. Under a linear threshold based contagion model, we give analytic results for the probability and expected size of \textit{global} cascades, i.e., cases where a randomly chosen node can initiate a propagation that eventually reaches a {\em positive} fraction of the whole population. Analytic results are also confirmed and supported by an extensive numerical study. In particular, we demonstrate how the dynamics of complex contagions is affected by the extra weight exerted by \textit{hyper-active} nodes and by the structural properties of the networks involved. Among other things, we reveal an interesting connection between the assortativity of a network and the impact of \textit{hyper-active} nodes on the cascade size.
△ Less
Submitted 3 July, 2018; v1 submitted 2 July, 2018;
originally announced July 2018.
-
Attack vulnerability of power systems under an equal load redistribution model
Authors:
Talha Cihad Gulcu,
Vaggos Chatziafratis,
Yingrui Zhang,
Osman Yagan
Abstract:
This paper studies the vulnerability of flow networks against adversarial attacks. In particular, consider a power system (or, any system carrying a physical flow) consisting of $N$ transmission lines with initial loads $L_1, \ldots , L_N$ and capacities $C_1, \ldots, C_N$, respectively; the capacity $C_i$ defines the maximum flow allowed on line $i$. Under an equal load redistribution model, wher…
▽ More
This paper studies the vulnerability of flow networks against adversarial attacks. In particular, consider a power system (or, any system carrying a physical flow) consisting of $N$ transmission lines with initial loads $L_1, \ldots , L_N$ and capacities $C_1, \ldots, C_N$, respectively; the capacity $C_i$ defines the maximum flow allowed on line $i$. Under an equal load redistribution model, where load of failed lines is redistributed equally among all remaining lines, we study the {\em optimization} problem of finding the best $k$ lines to attack so as to minimize the number of {\em alive} lines at the steady-state (i.e., when cascades stop). This is done to reveal the worst-case attack vulnerability of the system as well as to reveal its most vulnerable lines. We derive optimal attack strategies in several special cases of load-capacity distributions that are practically relevant. We then consider a modified optimization problem where the adversary is also constrained by the {\em total} load (in addition to the number) of the initial attack set, and prove that this problem is NP-Hard. Finally, we develop heuristic algorithms for selecting the attack set for both the original and modified problems. Through extensive simulations, we show that these heuristics outperform benchmark algorithms under a wide range of settings.
△ Less
Submitted 4 April, 2018;
originally announced April 2018.
-
Robustness of flow networks against cascading failures under partial load redistribution
Authors:
Omur Ozel,
Bruno Sinopoli,
Osman Yagan
Abstract:
We study the robustness of flow networks against cascading failures under a partial load redistribution model. In particular, we consider a flow network of $N$ lines with initial loads $L_1, \ldots, L_N$ and free-spaces (i.e., redundant space) $S_1, \ldots, S_N$ that are independent and identically distributed with joint distribution $P_{LS}(x,y)=\mathbb{P}(L \leq x, S \leq y)$. The capacity…
▽ More
We study the robustness of flow networks against cascading failures under a partial load redistribution model. In particular, we consider a flow network of $N$ lines with initial loads $L_1, \ldots, L_N$ and free-spaces (i.e., redundant space) $S_1, \ldots, S_N$ that are independent and identically distributed with joint distribution $P_{LS}(x,y)=\mathbb{P}(L \leq x, S \leq y)$. The capacity $C_i$ is the maximum load allowed on line $i$, and is given by $C_i=L_i + S_i$. When a line fails due to overloading, it is removed from the system and $(1-\varepsilon)$-fraction of the load it was carrying (at the moment of failing) gets redistributed equally among all remaining lines in the system; hence we refer to this as the {\it partial} load redistribution model. The rest (i.e., $\varepsilon$-fraction) of the load is assumed to be lost or absorbed, e.g., due to advanced circuitry disconnecting overloaded power lines or an inter-connected network/material absorbing a fraction of the flow from overloaded lines. We analyze the robustness of this flow network against random attacks that remove a $p$-fraction of the lines. Our contributions include (i) deriving the final fraction of alive lines $n_{\infty}(p,\varepsilon)$ for all $p, \varepsilon \in (0,1)$ and confirming the results via extensive simulations; (ii) showing that partial redistribution might lead to (depending on the parameter $0<\varepsilon \leq 1$) the order of transition at the critical attack size $p^{*}$ changing from first to second-order; and (iii) proving analytically that flow networks achieve maximum robustness (quantified by the area $\int_{0}^{1} n_{\infty}(p,\varepsilon) \mathrm{d}p$) when all lines have the same free-space regardless of their initial load. The optimality of equal free-space allocation is also confirmed on real-world data from the UK National Power Grid.
△ Less
Submitted 8 October, 2018; v1 submitted 21 February, 2018;
originally announced February 2018.
-
Cascading failures in interdependent systems under a flow redistribution model
Authors:
Yingrui Zhang,
Alex Arenas,
Osman Yağan
Abstract:
Robustness and cascading failures in interdependent systems has been an active research field in the past decade. However, most existing works use percolation-based models where only the largest component of each network remains functional throughout the cascade. Although suitable for communication networks, this assumption fails to capture the dependencies in systems carrying a flow (e.g., power…
▽ More
Robustness and cascading failures in interdependent systems has been an active research field in the past decade. However, most existing works use percolation-based models where only the largest component of each network remains functional throughout the cascade. Although suitable for communication networks, this assumption fails to capture the dependencies in systems carrying a flow (e.g., power systems, road transportation networks), where cascading failures are often triggered by redistribution of flows leading to overloading of lines. Here, we consider a model consisting of systems $A$ and $B$ with initial line loads and capacities given by $\{L_{A,i},C_{A,i}\}_{i=1}^{n}$ and $\{L_{B,i},C_{B,i}\}_{i=1}^{n}$, respectively. When a line fails in system $A$, $a$-fraction of its load is redistributed to alive lines in $B$, while remaining $(1-a)$-fraction is redistributed equally among all functional lines in $A$; a line failure in $B$ is treated similarly with $b$ giving the fraction to be redistributed to $A$. We give a thorough analysis of cascading failures of this model initiated by a random attack targeting $p_1$-fraction of lines in $A$ and $p_2$-fraction in $B$. We show that (i) the model captures the real-world phenomenon of unexpected large scale cascades and exhibits interesting transition behavior: the final collapse is always first-order, but it can be preceded by a sequence of first and second-order transitions; (ii) network robustness tightly depends on the coupling coefficients $a$ and $b$, and robustness is maximized at non-trivial $a,b$ values in general; (iii) unlike existing models, interdependence has a multi-faceted impact on system robustness in that interdependency can lead to an improved robustness for each individual network.
△ Less
Submitted 20 December, 2017; v1 submitted 5 September, 2017;
originally announced September 2017.
-
Counting triangles, tunable clustering and the small-world property in random key graphs (Extended version)
Authors:
Osman Yağan,
Armand M. Makowski
Abstract:
Random key graphs were introduced to study various properties of the Eschenauer-Gligor key predistribution scheme for wireless sensor networks (WSNs). Recently this class of random graphs has received much attention in contexts as diverse as recommender systems, social network modeling, and clustering and classification analysis. This paper is devoted to analyzing various properties of random key…
▽ More
Random key graphs were introduced to study various properties of the Eschenauer-Gligor key predistribution scheme for wireless sensor networks (WSNs). Recently this class of random graphs has received much attention in contexts as diverse as recommender systems, social network modeling, and clustering and classification analysis. This paper is devoted to analyzing various properties of random key graphs. In particular, we establish a zero-one law for the the existence of triangles in random key graphs, and identify the corresponding critical scaling. This zero-one law exhibits significant differences with the corresponding result in Erdos-Renyi (ER) graphs. We also compute the clustering coefficient of random key graphs, and compare it to that of ER graphs in the many node regime when their expected average degrees are asymptotically equivalent. For the parameter range of practical relevance in both wireless sensor network and social network applications, random key graphs are shown to be much more clustered than the corresponding ER graphs. We also explore the suitability of random key graphs as small world models in the sense of Watts and Strogatz.
△ Less
Submitted 13 January, 2017;
originally announced January 2017.
-
Secure and reliable connectivity in heterogeneous wireless sensor networks
Authors:
Rashad Eletreby,
Osman Yağan
Abstract:
We consider wireless sensor networks secured by the heterogeneous random key predistribution scheme under an on/off channel model. The heterogeneous random key predistribution scheme considers the case when the network includes sensor nodes with varying levels of resources, features, or connectivity requirements; e.g., regular nodes vs. cluster heads, but does not incorporate the fact that wireles…
▽ More
We consider wireless sensor networks secured by the heterogeneous random key predistribution scheme under an on/off channel model. The heterogeneous random key predistribution scheme considers the case when the network includes sensor nodes with varying levels of resources, features, or connectivity requirements; e.g., regular nodes vs. cluster heads, but does not incorporate the fact that wireless channel are unreliable. To capture the unreliability of the wireless medium, we use an on/off channel model; wherein, each wireless channel is either on (with probability $α$) or off (with probability $1-α$) independently. We present conditions (in the form of zero-one laws) on how to scale the parameters of the network model so that with high probability the network is $k$-connected, i.e., the network remains connected even if any $k-1$ nodes fail or leave the network. We also present numerical results to support these conditions in the finite-node regime.
△ Less
Submitted 24 October, 2016;
originally announced December 2016.
-
Minimum node degree in inhomogeneous random key graphs with unreliable links
Authors:
Rashad Eletreby,
Osman Yağan
Abstract:
We consider wireless sensor networks under a heterogeneous random key predistribution scheme and an on-off channel model. The heterogeneous key predistribution scheme has recently been introduced by Yağan - as an extension to the Eschenauer and Gligor scheme - for the cases when the network consists of sensor nodes with varying level of resources and/or connectivity requirements, e.g., regular nod…
▽ More
We consider wireless sensor networks under a heterogeneous random key predistribution scheme and an on-off channel model. The heterogeneous key predistribution scheme has recently been introduced by Yağan - as an extension to the Eschenauer and Gligor scheme - for the cases when the network consists of sensor nodes with varying level of resources and/or connectivity requirements, e.g., regular nodes vs. cluster heads. The network is modeled by the intersection of the inhomogeneous random key graph (induced by the heterogeneous scheme) with an Erdős-Rényi graph (induced by the on/off channel model). We present conditions (in the form of zero-one laws) on how to scale the parameters of the intersection model so that with high probability all of its nodes are connected to at least $k$ other nodes; i.e., the minimum node degree of the graph is no less than $k$. We also present numerical results to support our results in the finite-node regime. The numerical results suggest that the conditions that ensure $k$-connectivity coincide with those ensuring the minimum node degree being no less than $k$.
△ Less
Submitted 24 October, 2016;
originally announced November 2016.
-
$k$-connectivity of inhomogeneous random key graphs with unreliable links
Authors:
Rashad Eletreby,
Osman Yağan
Abstract:
We consider secure and reliable connectivity in wireless sensor networks that utilize a heterogeneous random key predistribution scheme. We model the unreliability of wireless links by an on-off channel model that induces an Erdős-Rényi graph, while the heterogeneous scheme induces an inhomogeneous random key graph. The overall network can thus be modeled by the intersection of both graphs. We pre…
▽ More
We consider secure and reliable connectivity in wireless sensor networks that utilize a heterogeneous random key predistribution scheme. We model the unreliability of wireless links by an on-off channel model that induces an Erdős-Rényi graph, while the heterogeneous scheme induces an inhomogeneous random key graph. The overall network can thus be modeled by the intersection of both graphs. We present conditions (in the form of zero-one laws) on how to scale the parameters of the intersection model so that with high probability i) all of its nodes are connected to at least $k$ other nodes; i.e., the minimum node degree of the graph is no less than $k$ and ii) the graph is $k$-connected, i.e., the graph remains connected even if any $k-1$ nodes leave the network. We also present numerical results to support these conditions in the finite-node regime. Our results are shown to complement and generalize several previous work in the literature.
△ Less
Submitted 24 October, 2016;
originally announced November 2016.
-
On the Network Reliability Problem of the Heterogeneous Key Predistribution Scheme
Authors:
Rashad Eletreby,
Osman Yağan
Abstract:
We consider the network reliability problem in wireless sensor networks secured by the heterogeneous random key predistribution scheme. This scheme generalizes Eschenauer-Gligor scheme by considering the cases when the network comprises sensor nodes with varying level of resources; e.g., regular nodes vs. cluster heads. The scheme induces the inhomogeneous random key graph, denoted…
▽ More
We consider the network reliability problem in wireless sensor networks secured by the heterogeneous random key predistribution scheme. This scheme generalizes Eschenauer-Gligor scheme by considering the cases when the network comprises sensor nodes with varying level of resources; e.g., regular nodes vs. cluster heads. The scheme induces the inhomogeneous random key graph, denoted $\mathbb{G}(n;\pmbμ,\pmb{K},P)$. We analyze the reliability of $\mathbb{G}(n;\pmbμ,\pmb{K},P)$ against random link failures. Namely, we consider $\mathbb{G}(n;\pmbμ,\pmb{K}, P,α)$ formed by deleting each edge of $\mathbb{G}(n;\pmbμ,\pmb{K},P)$ independently with probability $1-α$, and study the probability that the resulting graph i) has no isolated node; and ii) is connected. We present scaling conditions on $\pmb{K}$, $P$, and $α$ such that both events take place with probability zero or one, respectively, as the number of nodes gets large. We present numerical results to support these in the finite-node regime.
△ Less
Submitted 24 October, 2016;
originally announced October 2016.
-
Node Isolation of Secure Wireless Sensor Networks under a Heterogeneous Channel Model
Authors:
Rashad Eletreby,
Osman Yağan
Abstract:
We investigate the secure connectivity of wireless sensor networks under a heterogeneous random key predistribution scheme and a heterogeneous channel model. In particular, we study a random graph formed by the intersection of an inhomogeneous random key graph with an inhomogeneous Erdős-Rényi graph. The former graph is naturally induced by the heterogeneous random key predistribution scheme while…
▽ More
We investigate the secure connectivity of wireless sensor networks under a heterogeneous random key predistribution scheme and a heterogeneous channel model. In particular, we study a random graph formed by the intersection of an inhomogeneous random key graph with an inhomogeneous Erdős-Rényi graph. The former graph is naturally induced by the heterogeneous random key predistribution scheme while the latter graph constitutes a heterogeneous on/off channel model; wherein, the wireless channel between a class-$i$ node and a class-$j$ node is on with probability $α_{ij}$ independently. We present conditions (in the form of zero-one laws) on how to scale the parameters of the intersection model so that it has no isolated node with high probability as the number of nodes gets large. We also present numerical results to support these zero-one laws in the finite-node regime.
△ Less
Submitted 24 October, 2016;
originally announced October 2016.
-
Clustering determines the dynamics of complex contagions in multiplex networks
Authors:
Yong Zhuang,
Alex Arenas,
Osman Yağan
Abstract:
We present the mathematical analysis of generalized complex contagions in clustered multiplex networks for susceptible-infected-recovered (SIR)-like dynamics. The model is intended to understand diffusion of influence, or any other spreading process implying a threshold dynamics, in setups of interconnected networks with significant clustering. The contagion is assumed to be general enough to acco…
▽ More
We present the mathematical analysis of generalized complex contagions in clustered multiplex networks for susceptible-infected-recovered (SIR)-like dynamics. The model is intended to understand diffusion of influence, or any other spreading process implying a threshold dynamics, in setups of interconnected networks with significant clustering. The contagion is assumed to be general enough to account for a content-dependent linear threshold model, where each link type has a different weight (for spreading influence) that may depend on the content (e.g., product, rumor, political view) that is being spread. Using the generating functions formalism, we determine the conditions, probability, and expected size of the emergent global cascades. This analysis provides a generalization of previous approaches and is specially useful in problems related to spreading and percolation. The results present non trivial dependencies between the clustering coefficient of the networks and its average degree. In particular, several phase transitions are shown to occur depending on these descriptors. Generally speaking, our findings reveal that increasing clustering decreases the probability of having global cascades and their size, however this tendency changes with the average degree. There exists a certain average degree from which on clustering favours the probability and size of the contagion. By comparing the dynamics of complex contagions over multiplex networks and their monoplex projections, we demonstrate that ignoring link types and aggregating network layers may lead to inaccurate conclusions about contagion dynamics, particularly when the correlation of degrees between layers is high.
△ Less
Submitted 29 August, 2016;
originally announced August 2016.
-
Connectivity of Wireless Sensor Networks Secured by Heterogeneous Key Predistribution Under an On/Off Channel Model
Authors:
Rashad Eletreby,
Osman Yağan
Abstract:
We investigate the connectivity of a wireless sensor network secured by the heterogeneous key predistribution scheme under an independent on/off channel model. The heterogeneous scheme induces an inhomogeneous random key graph, denoted by $\mathbb{K}(n;\pmbμ,\pmb{K},P)$ and the on/off channel model induces an Erdős-Rényi graph, denoted by $\mathbb{H}(n,α)$. Hence, the overall random graph modeling…
▽ More
We investigate the connectivity of a wireless sensor network secured by the heterogeneous key predistribution scheme under an independent on/off channel model. The heterogeneous scheme induces an inhomogeneous random key graph, denoted by $\mathbb{K}(n;\pmbμ,\pmb{K},P)$ and the on/off channel model induces an Erdős-Rényi graph, denoted by $\mathbb{H}(n,α)$. Hence, the overall random graph modeling the WSN is obtained by the intersection of $\mathbb{K}(n;\pmbμ,\pmb{K},P)$ and $\mathbb{H}(n,α)$. We present conditions on how to scale the parameters of the intersecting graph with respect to the network size $n$ such that the graph i) has no isolated nodes and ii) is connected, both with high probability as the number of nodes gets large. Our results are supported by a simulation study demonstrating that i) despite their asymptotic nature, our results can in fact be useful in designing finite-node wireless sensor networks so that they achieve secure connectivity with high probability; and ii) despite the simplicity of the on/off communication model, the probability of connectivity in the resulting wireless sensor network approximates very well the case where the disk model is used.
△ Less
Submitted 5 October, 2017; v1 submitted 2 April, 2016;
originally announced April 2016.
-
Optimizing the robustness of electrical power systems against cascading failures
Authors:
Yingrui Zhang,
Osman Yagan
Abstract:
Electrical power systems are one of the most important infrastructures that support our society. However, their vulnerabilities have raised great concern recently due to several large-scale blackouts around the world. In this paper, we investigate the robustness of power systems against cascading failures initiated by a random attack. This is done under a simple yet useful model based on global an…
▽ More
Electrical power systems are one of the most important infrastructures that support our society. However, their vulnerabilities have raised great concern recently due to several large-scale blackouts around the world. In this paper, we investigate the robustness of power systems against cascading failures initiated by a random attack. This is done under a simple yet useful model based on global and equal redistribution of load upon failures. We provide a complete understanding of system robustness by i) deriving an expression for the final system size as a function of the size of initial attacks; ii) deriving the critical attack size after which system breaks down completely; iii) showing that complete system breakdown takes place through a first-order (i.e., discontinuous) transition in terms of the attack size; and iv) establishing the optimal load-capacity distribution that maximizes robustness. In particular, we show that robustness is maximized when the difference between the capacity and initial load is the same for all lines; i.e., when all lines have the same redundant space regardless of their initial load. This is in contrast with the intuitive and commonly used setting where capacity of a line is a fixed factor of its initial load.
△ Less
Submitted 24 February, 2016;
originally announced February 2016.
-
On the Eschenauer-Gligor key predistribution scheme under on-off communication channels: The absence of isolated nodes (Extended version)
Authors:
Armand M. Makowski,
Osman Yağan
Abstract:
We consider the Eschenauer-Gligor key predistribution scheme under the condition of partial visibility with i.i.d. on-off links between pairs of nodes. This situation is modeled as the intersection of two random graphs, namely a random key graph and an Erdős-Rényi (ER) graph. For this class of composite random graphs we give various improvements on a recent result by Yağan [IEEE Transactions on In…
▽ More
We consider the Eschenauer-Gligor key predistribution scheme under the condition of partial visibility with i.i.d. on-off links between pairs of nodes. This situation is modeled as the intersection of two random graphs, namely a random key graph and an Erdős-Rényi (ER) graph. For this class of composite random graphs we give various improvements on a recent result by Yağan [IEEE Transactions on Information Theory, 58(6):3821-3835, 2012] concerning zero-one laws for the absence of isolated nodes.
△ Less
Submitted 10 October, 2015;
originally announced October 2015.
-
Information Propagation in Clustered Multilayer Networks
Authors:
Yong Zhuang,
Osman Yağan
Abstract:
In today's world, individuals interact with each other in more complicated patterns than ever. Some individuals engage through online social networks (e.g., Facebook, Twitter), while some communicate only through conventional ways (e.g., face-to-face). Therefore, understanding the dynamics of information propagation among humans calls for a multi-layer network model where an online social network…
▽ More
In today's world, individuals interact with each other in more complicated patterns than ever. Some individuals engage through online social networks (e.g., Facebook, Twitter), while some communicate only through conventional ways (e.g., face-to-face). Therefore, understanding the dynamics of information propagation among humans calls for a multi-layer network model where an online social network is conjoined with a physical network. In this work, we initiate a study of information diffusion in a clustered multi-layer network model, where all constituent layers are random networks with high clustering. We assume that information propagates according to the SIR model and with different information transmissibility across the networks. We give results for the conditions, probability, and size of information epidemics, i.e., cases where information starts from a single individual and reaches a positive fraction of the population. We show that increasing the level of clustering in either one of the layers increases the epidemic threshold and decreases the final epidemic size in the whole system. An interesting finding is that information with low transmissibility spreads more effectively with a small but densely connected social network, whereas highly transmissible information spreads better with the help of a large but loosely connected social network.
△ Less
Submitted 13 September, 2015;
originally announced September 2015.
-
Zero-one laws for connectivity in inhomogeneous random key graphs
Authors:
Osman Yagan
Abstract:
We introduce a new random key predistribution scheme for securing heterogeneous wireless sensor networks. Each of the n sensors in the network is classified into r classes according to some probability distribution μ = {μ_1 , . . . , μ_r }. Before deployment, a class-i sensor is assigned K_i cryptographic keys that are selected uniformly at random from a common pool of P keys. Once deployed, a pai…
▽ More
We introduce a new random key predistribution scheme for securing heterogeneous wireless sensor networks. Each of the n sensors in the network is classified into r classes according to some probability distribution μ = {μ_1 , . . . , μ_r }. Before deployment, a class-i sensor is assigned K_i cryptographic keys that are selected uniformly at random from a common pool of P keys. Once deployed, a pair of sensors can communicate securely if and only if they have a key in common. We model the communication topology of this network by a newly defined inhomogeneous random key graph. We establish scaling conditions on the parameters P and {K_1 , . . . , K_r } so that this graph i) has no isolated nodes; and ii) is connected, both with high probability. The results are given in the form of zero-one laws with the number of sensors n growing unboundedly large; critical scalings are identified and shown to coincide for both graph properties. Our results are shown to complement and improve those given by Godehardt et al. and Zhao et al. for the same model, therein referred to as the general random intersection graph.
△ Less
Submitted 10 August, 2015;
originally announced August 2015.
-
Connectivity in Secure Wireless Sensor Networks under Transmission Constraints
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be withi…
▽ More
In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be within a certain distance from each other to communicate. In this paper, we present zero-one laws for connectivity in WSNs employing the EG scheme under transmission constraints. These laws help specify the critical transmission ranges for connectivity. Our analytical findings are confirmed via numerical experiments. In addition to secure WSNs, our theoretical results are also applied to frequency hop** in wireless networks.
△ Less
Submitted 3 August, 2015; v1 submitted 3 August, 2015;
originally announced August 2015.
-
Robustness of power systems under a democratic fiber bundle-like model
Authors:
Osman Yağan
Abstract:
We consider a power system with $N$ transmission lines whose initial loads (i.e., power flows) $L_1, \ldots, L_N$ are independent and identically distributed with $P_L(x)$. The capacity $C_i$ defines the maximum flow allowed on line $i$, and is assumed to be given by $C_i=(1+α)L_i$, with $α>0$. We study the robustness of this power system against random attacks (or, failures) that target a $p$-{\e…
▽ More
We consider a power system with $N$ transmission lines whose initial loads (i.e., power flows) $L_1, \ldots, L_N$ are independent and identically distributed with $P_L(x)$. The capacity $C_i$ defines the maximum flow allowed on line $i$, and is assumed to be given by $C_i=(1+α)L_i$, with $α>0$. We study the robustness of this power system against random attacks (or, failures) that target a $p$-{\em fraction} of the lines, under a democratic fiber bundle-like model. Namely, when a line fails, the load it was carrying is redistributed equally among the remaining lines. Our contributions are as follows: i) we show analytically that the final breakdown of the system always takes place through a first-order transition at the critical attack size $p^{\star}=1-\frac{E[L]}{\max\{P(L>x)(αx + E[L ~|~ L>x])\}}~~~$; ii) we derive conditions on the distribution $P_L(x)$ for which the first order break down of the system occurs abruptly without any preceding diverging rate of failure; iii) we provide a detailed analysis of the robustness of the system under three specific load distributions: Uniform, Pareto, and Weibull, showing that with the minimum load $L_{\textrm{min}}$ and mean load $E[L]$ fixed, Pareto distribution is the worst (in terms of robustness) among the three, whereas Weibull distribution is the best with shape parameter selected relatively large; iv) we provide numerical results that confirm our mean-field analysis; and v) we show that $p^{\star}$ is maximized when the load distribution is a Dirac delta function centered at $E[L]$, i.e., when all lines carry the same load; we also show that optimal $p^{\star}$ equals $\fracα{α+1}$. This last finding is particularly surprising given that heterogeneity is known to lead to high robustness against random failures in many other systems.
△ Less
Submitted 14 April, 2015;
originally announced April 2015.
-
Random intersection graphs and their applications in security, wireless communication, and social networks
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
Random intersection graphs have received much interest and been used in diverse applications. They are naturally induced in modeling secure sensor networks under random key predistribution schemes, as well as in modeling the topologies of social networks including common-interest networks, collaboration networks, and actor networks. Simply put, a random intersection graph is constructed by assigni…
▽ More
Random intersection graphs have received much interest and been used in diverse applications. They are naturally induced in modeling secure sensor networks under random key predistribution schemes, as well as in modeling the topologies of social networks including common-interest networks, collaboration networks, and actor networks. Simply put, a random intersection graph is constructed by assigning each node a set of items in some random manner and then putting an edge between any two nodes that share a certain number of items.
Broadly speaking, our work is about analyzing random intersection graphs, and models generated by composing it with other random graph models including random geometric graphs and Erdős-Rényi graphs. These compositional models are introduced to capture the characteristics of various complex natural or man-made networks more accurately than the existing models in the literature. For random intersection graphs and their compositions with other random graphs, we study properties such as ($k$-)connectivity, ($k$-)robustness, and containment of perfect matchings and Hamilton cycles. Our results are typically given in the form of asymptotically exact probabilities or zero-one laws specifying critical scalings, and provide key insights into the design and analysis of various real-world networks.
△ Less
Submitted 11 February, 2015;
originally announced April 2015.
-
Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
Uniform random intersection graphs have received much interest and been used in diverse applications. A uniform random intersection graph with $n$ nodes is constructed as follows: each node selects a set of $K_n$ different items uniformly at random from the same pool of $P_n$ distinct items, and two nodes establish an undirected edge in between if and only if they share at least one item. For such…
▽ More
Uniform random intersection graphs have received much interest and been used in diverse applications. A uniform random intersection graph with $n$ nodes is constructed as follows: each node selects a set of $K_n$ different items uniformly at random from the same pool of $P_n$ distinct items, and two nodes establish an undirected edge in between if and only if they share at least one item. For such graph denoted by $G(n, K_n, P_n)$, we present the following results in this paper. First, we provide an exact analysis on the probabilities of $G(n, K_n, P_n)$ having a perfect matching and having a Hamilton cycle respectively, under $P_n = ω\big(n (\ln n)^5\big)$ (all asymptotic notation are understood with $n \to \infty$). The analysis reveals that just like ($k$-)connectivity shown in prior work, for both properties of perfect matching containment and Hamilton cycle containment, $G(n, K_n, P_n)$ also exhibits phase transitions: for each property above, as $K_n$ increases, the limit of the probability that $G(n, K_n, P_n)$ has the property increases from $0$ to $1$. Second, we compute the phase transition widths of $G(n, K_n, P_n)$ for $k$-connectivity (KC), perfect matching containment (PMC), and Hamilton cycle containment (HCC), respectively. For a graph property $R$ and a positive constant $a < \frac{1}{2}$, with the phase transition width $d_n(R, a)$ defined as the difference between the minimal $K_n$ ensuring $G(n, K_n, P_n)$ having property $R$ with probability at least $1-a$ or $a$, we show for any positive constants $a<\frac{1}{2}$ and $k$: (i) If $P_n=Ω(n)$ and $P_n=o(n\ln n)$, then $d_n(KC, a)$ is either $0$ or $1$ for each $n$ sufficiently large. (ii) If $P_n=Θ(n\ln n)$, then $d_n(KC, a)=Θ(1)$. (iii) If $P_n=ω(n\ln n)$, then $d_n(KC, a)=ω(1)$. (iv) If $P_n=ω\big(n (\ln n)^5\big)$, $d_n(PMC, a)$ and $d_n(HCC, a)$ are both $ω(1)$.
△ Less
Submitted 2 February, 2015;
originally announced February 2015.
-
A curious gap in one-dimensional geometric random graphs between connectivity and the absence of isolated node
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
One-dimensional geometric random graphs are constructed by distributing $n$ nodes uniformly and independently on a unit interval and then assigning an undirected edge between any two nodes that have a distance at most $r_n$. These graphs have received much interest and been used in various applications including wireless networks. A threshold of $r_n$ for connectivity is known as…
▽ More
One-dimensional geometric random graphs are constructed by distributing $n$ nodes uniformly and independently on a unit interval and then assigning an undirected edge between any two nodes that have a distance at most $r_n$. These graphs have received much interest and been used in various applications including wireless networks. A threshold of $r_n$ for connectivity is known as $r_n^{*} = \frac{\ln n}{n}$ in the literature. In this paper, we prove that a threshold of $r_n$ for the absence of isolated node is $\frac{\ln n}{2 n}$ (i.e., a half of the threshold $r_n^{*}$). Our result shows there is a curious gap between thresholds of connectivity and the absence of isolated node in one-dimensional geometric random graphs; in particular, when $r_n$ equals $\frac{c\ln n}{ n}$ for a constant $c \in( \frac{1}{2}, 1)$, a one-dimensional geometric random graph has no isolated node but is not connected. This curious gap in one-dimensional geometric random graphs is in sharp contrast to the prevalent phenomenon in many other random graphs such as two-dimensional geometric random graphs, Erdős-Rényi graphs, and random intersection graphs, all of which in the asymptotic sense become connected as soon as there is no isolated node.
△ Less
Submitted 18 February, 2015; v1 submitted 2 February, 2015;
originally announced February 2015.
-
k-Connectivity of Random Key Graphs
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
Random key graphs represent topologies of secure wireless sensor networks that apply the seminal Eschenauer-Gligor random key predistribution scheme to secure communication between sensors. These graphs have received much attention and also been used in diverse application areas beyond secure sensor networks; e.g., cryptanalysis, social networks, and recommender systems. Formally, a random key gra…
▽ More
Random key graphs represent topologies of secure wireless sensor networks that apply the seminal Eschenauer-Gligor random key predistribution scheme to secure communication between sensors. These graphs have received much attention and also been used in diverse application areas beyond secure sensor networks; e.g., cryptanalysis, social networks, and recommender systems. Formally, a random key graph with $n$ nodes is constructed by assigning each node $X_n$ keys selected uniformly at random from a pool of $Y_n$ keys and then putting an undirected edge between any two nodes sharing at least one key. Considerable progress has been made in the literature to analyze connectivity and $k$-connectivity of random key graphs, where $k$-connectivity of a graph ensures connectivity even after the removal of $k$ nodes or $k$ edges. Yet, it still remains an open question for $k$-connectivity in random key graphs under $X_n \geq 2$ and $X_n = o(\sqrt{\ln n})$ (the case of $X_n=1$ is trivial). In this paper, we answer the above problem by providing an exact analysis of $k$-connectivity in random key graphs under $X_n \geq 2$.
△ Less
Submitted 2 February, 2015;
originally announced February 2015.
-
Threshold Functions in Random s-Intersection Graphs
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
Random $s$-intersection graphs have recently received considerable attention in a wide range of application areas. In such a graph, each vertex is equipped with a set of items in some random manner, and any two vertices establish an undirected edge in between if and only if they have at least $s$ common items. In particular, in a uniform random $s$-intersection graph, each vertex independently sel…
▽ More
Random $s$-intersection graphs have recently received considerable attention in a wide range of application areas. In such a graph, each vertex is equipped with a set of items in some random manner, and any two vertices establish an undirected edge in between if and only if they have at least $s$ common items. In particular, in a uniform random $s$-intersection graph, each vertex independently selects a fixed number of items uniformly at random from a common item pool, while in a binomial random $s$-intersection graph, each item in some item pool is independently attached to each vertex with the same probability.
For binomial/uniform random $s$-intersection graphs, we establish threshold functions for perfect matching containment, Hamilton cycle containment, and $k$-robustness, where $k$-robustness is in the sense of Zhang and Sundaram [IEEE Conf. on Decision & Control '12]. We show that these threshold functions resemble those of classical Erdős-Rényi graphs, where each pair of vertices has an undirected edge independently with the same probability.
△ Less
Submitted 2 February, 2015;
originally announced February 2015.
-
Designing Securely and Reliably Connected Wireless Sensor Networks
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
In wireless sensor networks, the $q$-composite key predistribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure sensor networks with the $q$-composite scheme have been studied in the literature, few results address physical transmission constraints since it is challenging to analyze the network connectivity in consideration of both the $q$-…
▽ More
In wireless sensor networks, the $q$-composite key predistribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure sensor networks with the $q$-composite scheme have been studied in the literature, few results address physical transmission constraints since it is challenging to analyze the network connectivity in consideration of both the $q$-composite scheme and transmission constraints together. These transmission constraints reflect real-world implementations of sensor networks in which two sensors have to be within a certain distance from each other to communicate. In this paper, we rigorously derive conditions for connectivity in sensor networks employing the $q$-composite scheme under transmission constraints. Furthermore, we extend the analysis to consider the unreliability of wireless links by modeling each link being independently active with some probability. Our results provide useful guidelines for designing securely and reliably connected sensor networks. We also present numerical experiments to confirm the analytical results.
△ Less
Submitted 5 August, 2015; v1 submitted 8 January, 2015;
originally announced January 2015.
-
Exact Analysis of k-Connectivity in Secure Sensor Networks with Unreliable Links
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
The Eschenauer--Gligor (EG) random key predistribution scheme has been widely recognized as a typical approach to secure communications in wireless sensor networks (WSNs). However, there is a lack of precise probability analysis on the reliable connectivity of WSNs under the EG scheme. To address this, we rigorously derive the asymptotically exact probability of $k$-connectivity in WSNs employing…
▽ More
The Eschenauer--Gligor (EG) random key predistribution scheme has been widely recognized as a typical approach to secure communications in wireless sensor networks (WSNs). However, there is a lack of precise probability analysis on the reliable connectivity of WSNs under the EG scheme. To address this, we rigorously derive the asymptotically exact probability of $k$-connectivity in WSNs employing the EG scheme with unreliable links represented by independent on/off channels, where $k$-connectivity ensures that the network remains connected despite the failure of any $(k-1)$ sensors or links. Our analytical results are confirmed via numerical experiments, and they provide precise guidelines for the design of secure WSNs that exhibit a desired level of reliability against node and link failures.
△ Less
Submitted 6 February, 2015; v1 submitted 21 September, 2014;
originally announced September 2014.
-
On $k$-connectivity and minimum vertex degree in random $s$-intersection graphs
Authors:
Jun Zhao,
Osman Yağan,
Virgil Gligor
Abstract:
Random $s$-intersection graphs have recently received much interest in a wide range of application areas. Broadly speaking, a random $s$-intersection graph is constructed by first assigning each vertex a set of items in some random manner, and then putting an undirected edge between all pairs of vertices that share at least $s$ items (the graph is called a random intersection graph when $s=1$). A…
▽ More
Random $s$-intersection graphs have recently received much interest in a wide range of application areas. Broadly speaking, a random $s$-intersection graph is constructed by first assigning each vertex a set of items in some random manner, and then putting an undirected edge between all pairs of vertices that share at least $s$ items (the graph is called a random intersection graph when $s=1$). A special case of particular interest is a uniform random $s$-intersection graph, where each vertex independently selects the same number of items uniformly at random from a common item pool. Another important case is a binomial random $s$-intersection graph, where each item from a pool is independently assigned to each vertex with the same probability. Both models have found numerous applications thus far including cryptanalysis, and the modeling of recommender systems, secure sensor networks, online social networks, trust networks and small-world networks (uniform random $s$-intersection graphs), as well as clustering analysis, classification, and the design of integrated circuits (binomial random $s$-intersection graphs).
In this paper, for binomial/uniform random $s$-intersection graphs, we present results related to $k$-connectivity and minimum vertex degree. Specifically, we derive the asymptotically exact probabilities and zero-one laws for the following three properties: (i) $k$-vertex-connectivity, (ii) $k$-edge-connectivity and (iii) the property of minimum vertex degree being at least $k$.
△ Less
Submitted 18 November, 2014; v1 submitted 21 September, 2014;
originally announced September 2014.