Skip to main content

Showing 1–50 of 63 results for author: Yagan, O

.
  1. arXiv:2311.02319  [pdf, other

    cs.IT

    On the Robustness, Connectivity and Giant Component Size of Random K-out Graphs

    Authors: Eray Can Elumar, Mansi Sood, Osman Yağan

    Abstract: Random K-out graphs are garnering interest in designing distributed systems including secure sensor networks, anonymous crypto-currency networks, and differentially-private decentralized learning. In these security-critical applications, it is important to model and analyze the resilience of the network to node failures and adversarial captures. Motivated by this, we analyze how the connectivity p… ▽ More

    Submitted 4 November, 2023; originally announced November 2023.

    Comments: arXiv admin note: text overlap with arXiv:2103.01471

  2. arXiv:2211.07479  [pdf, other

    cs.SI

    Spreading processes with population heterogeneity over multi-layer networks

    Authors: Yurun Tian, Osman Yagan

    Abstract: It's been controversial whether re-opening school will facilitate viral spread among household communities with mitigation strategies such as mask-wearing in place. In this work, we propose an epidemiological model that explores the viral transmission over the multi-layer contact network composed of the school layer and community layer with population heterogeneity on mask-wearing behavior. We der… ▽ More

    Submitted 15 November, 2022; v1 submitted 14 November, 2022; originally announced November 2022.

    Comments: Submitted to ICC 2023

  3. arXiv:2210.05051  [pdf, other

    physics.soc-ph cs.SI eess.SY

    Spreading Processes with Mutations over Multi-layer Networks

    Authors: Mansi Sood, Anirudh Sridhar, Rashad Eletreby, Chai Wah Wu, Simon A. Levin, H. Vincent Poor, Osman Yagan

    Abstract: A key scientific challenge during the outbreak of novel infectious diseases is to predict how the course of the epidemic changes under different countermeasures that limit interaction in the population. Most epidemiological models do not consider the role of mutations and heterogeneity in the type of contact events. However, pathogens have the capacity to mutate in response to changing environment… ▽ More

    Submitted 24 January, 2023; v1 submitted 10 October, 2022; originally announced October 2022.

  4. arXiv:2203.01295  [pdf, other

    cs.NI cs.SI

    Dynamic Coupling Strategy for Interdependent Network Systems Against Cascading Failures

    Authors: I-Cheng Lin, Carlee Joe-Wong, Osman Yagan

    Abstract: Cascading failures are a common phenomenon in complex networked systems where failures at only a few nodes may trigger a process of sequential failure. We applied a flow redistribution model to investigate the robustness against cascading failures in modern systems carrying flows/loads (i.e. power grid, transportation system, etc.) that contain multiple interdependent networks. In such a system, t… ▽ More

    Submitted 2 March, 2022; originally announced March 2022.

  5. arXiv:2110.04398  [pdf, ps, other

    cs.SI physics.soc-ph

    The Role of Masks in Mitigating Viral Spread on Networks

    Authors: Yurun Tian, Anirudh Sridhar, Chai Wah Wu, Simon A. Levin, Kathleen M. Carley, H. Vincent Poor, Osman Yagan

    Abstract: Masks have remained an important mitigation strategy in the fight against COVID-19 due to their ability to prevent the transmission of respiratory droplets between individuals. In this work, we provide a comprehensive quantitative analysis of the impact of mask-wearing. To this end, we propose a novel agent-based model of viral spread on networks where agents may either wear no mask or wear one of… ▽ More

    Submitted 6 June, 2023; v1 submitted 8 October, 2021; originally announced October 2021.

    Comments: Accepted at Physical Review E

  6. Best-Arm Identification in Correlated Multi-Armed Bandits

    Authors: Samarth Gupta, Gauri Joshi, Osman Yağan

    Abstract: In this paper we consider the problem of best-arm identification in multi-armed bandits in the fixed confidence setting, where the goal is to identify, with probability $1-δ$ for some $δ>0$, the arm with the highest mean reward in minimum possible samples from the set of arms $\mathcal{K}$. Most existing best-arm identification algorithms and analyses operate under the assumption that the rewards… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

    Journal ref: IEEE Journal on Selected Areas in Information Theory (Volume: 2, Issue: 2, June 2021)

  7. arXiv:2103.01471  [pdf, other

    cs.IT

    On the Connectivity and Giant Component Size of Random K-out Graphs Under Randomly Deleted Nodes

    Authors: Eray Can Elumar, Mansi Sood, Osman Yagan

    Abstract: Random K-out graphs, denoted $\mathbb{H}(n;K)$, are generated by each of the $n$ nodes drawing $K$ out-edges towards $K$ distinct nodes selected uniformly at random, and then ignoring the orientation of the arcs. Recently, random K-out graphs have been used in applications as diverse as random (pairwise) key predistribution in ad-hoc networks, anonymous message routing in crypto-currency networks,… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

  8. arXiv:2012.08009  [pdf, other

    cs.LG cs.AI

    Bandit-based Communication-Efficient Client Selection Strategies for Federated Learning

    Authors: Yae Jee Cho, Samarth Gupta, Gauri Joshi, Osman Yağan

    Abstract: Due to communication constraints and intermittent client availability in federated learning, only a subset of clients can participate in each training round. While most prior works assume uniform and unbiased client selection, recent work on biased client selection has shown that selecting clients with higher local losses can improve error convergence speed. However, previously proposed biased sel… ▽ More

    Submitted 14 December, 2020; originally announced December 2020.

  9. arXiv:2011.04208  [pdf, other

    cs.SI physics.soc-ph

    Analysis of the Impact of Mask-wearing in Viral Spread: Implications for COVID-19

    Authors: Yurun Tian, Anirudh Sridhar, Osman Yagan, H. Vincent Poor

    Abstract: Masks are used as part of a comprehensive strategy of measures to limit transmission and save lives during the COVID-19 pandemic. Research about the impact of mask-wearing in the COVID-19 pandemic has raised formidable interest across multiple disciplines. In this paper, we investigate the impact of mask-wearing in spreading processes over complex networks. This is done by studying a heterogeneous… ▽ More

    Submitted 9 November, 2020; originally announced November 2020.

    Comments: Submitted to the 2021 American Control Conference

  10. arXiv:2009.01610  [pdf, other

    cs.IT math.PR

    Existence and Size of the Giant Component in Inhomogeneous Random K-out Graphs

    Authors: Mansi Sood, Osman Yagan

    Abstract: Random K-out graphs are receiving attention as a model to construct sparse yet well-connected topologies in distributed systems including sensor networks, federated learning, and cryptocurrency networks. In response to the growing heterogeneity in emerging real-world networks, where nodes differ in resources and requirements, inhomogeneous random K-out graphs, denoted by $H(n;μ,K_n)$, were propose… ▽ More

    Submitted 29 July, 2021; v1 submitted 1 September, 2020; originally announced September 2020.

    Comments: In 9th IEEE Conference on Decision and Control. arXiv admin note: substantial text overlap with arXiv:1911.05147

  11. arXiv:2006.10638  [pdf, other

    cs.IT math.CO math.PR

    Tight Bounds for Connectivity of Random K-out Graphs

    Authors: Mansi Sood, Osman Yagan

    Abstract: Random K-out graphs are used in several applications including modeling by sensor networks secured by the random pairwise key predistribution scheme, and payment channel networks. The random K-out graph with $n$ nodes is constructed as follows. Each node draws an edge towards $K$ distinct nodes selected uniformly at random. The orientation of the edges is then ignored, yielding an undirected graph… ▽ More

    Submitted 18 June, 2020; originally announced June 2020.

  12. arXiv:2001.07467  [pdf, ps, other

    eess.SP

    IRS-Assisted Millimeter Wave Communications: Joint Power Allocation and Beamforming Design

    Authors: Yue Xiu, Yang Zhao, Yang Liu, Jun Zhao, Osman Yagan, Ning Wei

    Abstract: Intelligent reflecting surface (IRS) technology offers more feasible propagation paths for millimeter-wave (mmWave) communication systems to overcome blockage than existing technologies. In this paper, we consider a downlink wireless system with the IRS and formulate a joint power allocation and beamforming design problem to maximize the weighted sum-rate, which is a multi-variable optimization pr… ▽ More

    Submitted 24 December, 2020; v1 submitted 21 January, 2020; originally announced January 2020.

    Journal ref: 2021 IEEE Wireless Communications and Networking Conference (WCNC) Workshops

  13. arXiv:1911.05147  [pdf, other

    cs.IT cs.CR math.CO math.PR

    On the Strength of Connectivity of Inhomogeneous Random K-out Graphs

    Authors: Mansi Sood, Osman Yağan

    Abstract: Random graphs are an important tool for modelling and analyzing the underlying properties of complex real-world networks. In this paper, we study a class of random graphs known as the inhomogeneous random K-out graphs which were recently introduced to analyze heterogeneous sensor networks secured by the pairwise scheme. In this model, first, each of the $n$ nodes is classified as type-1 (respectiv… ▽ More

    Submitted 27 February, 2020; v1 submitted 12 November, 2019; originally announced November 2019.

  14. Multi-Armed Bandits with Correlated Arms

    Authors: Samarth Gupta, Shreyas Chaudhari, Gauri Joshi, Osman Yağan

    Abstract: We consider a multi-armed bandit framework where the rewards obtained by pulling different arms are correlated. We develop a unified approach to leverage these reward correlations and present fundamental generalizations of classic bandit algorithms to the correlated setting. We present a unified proof technique to analyze the proposed algorithms. Rigorous analysis of C-UCB (the correlated bandit v… ▽ More

    Submitted 10 September, 2021; v1 submitted 6 November, 2019; originally announced November 2019.

    Comments: A special case of the model studied in this paper is presented in arXiv:1808.05904

    Journal ref: IEEE Transactions on Information Theory, 2021

  15. On Connectivity and Robustness in Random Intersection Graphs

    Authors: Jun Zhao, Osman Yagan, Virgil Gligor

    Abstract: Random intersection graphs have received much attention recently and been used in a wide range of applications ranging from key predistribution in wireless sensor networks to modeling social networks. For these graphs, each node is equipped with a set of objects in a random manner, and two nodes have an undirected edge in between if they have at least one object in common. In this paper, we invest… ▽ More

    Submitted 2 November, 2019; originally announced November 2019.

    Comments: published in IEEE Transactions on Automatic Control. arXiv admin note: text overlap with arXiv:1409.5995

  16. arXiv:1908.09826  [pdf, ps, other

    eess.SP cs.IT math.CO math.PR

    Secure Connectivity of Heterogeneous Wireless Sensor Networks Under a Heterogeneous On-Off Channel Model

    Authors: Rashad Eletreby, Osman Yagan

    Abstract: In this paper, we investigate the secure connectivity of wireless sensor networks utilizing the heterogeneous random key predistribution scheme, where each sensor node is classified as class-$i$ with probability $μ_i$ for $i=1,\ldots,r$ with $μ_i>0$ and $\sum_{i=1}^r μ_i=1$. A class-$i$ sensor is given $K_i$ cryptographic keys selected uniformly at random from a key pool of size $P$. After deploym… ▽ More

    Submitted 20 August, 2019; originally announced August 2019.

    Comments: Submitted. arXiv admin note: text overlap with arXiv:1604.00460, arXiv:1610.07576

  17. arXiv:1907.08049  [pdf, other

    cs.IT math.CO math.PR

    Towards $k$-connectivity in Heterogeneous Sensor Networks under Pairwise Key Predistribution

    Authors: Mansi Sood, Osman Yağan

    Abstract: We study the secure and reliable connectivity of wireless sensor networks under the heterogeneous pairwise key predistribution scheme. This scheme was recently introduced as an extension of the random pairwise key predistribution scheme of Chan et al. to accommodate networks where the constituent sensors have different capabilities or requirements for security and connectivity. For simplicity, we… ▽ More

    Submitted 18 July, 2019; originally announced July 2019.

    Comments: To appear in IEEE GLOBECOM 2019

  18. arXiv:1811.08070  [pdf, ps, other

    physics.soc-ph

    Optimizing Robustness against Cascading Failures under Max-Load Targeted Attack

    Authors: Omur Ozel, Bruno Sinopoli, Osman Yagan

    Abstract: Motivated by reliability of networks in critical infrastructures, we consider optimal robustness of a class of flow networks against a \textit{targeted} attack, namely max-load targeted attack, that triggers cascading failures due to removal of largest load carrying portion of lines. The setup involves a network of $N$ lines with initial loads $L_1, \ldots, L_N$, drawn from independent and identic… ▽ More

    Submitted 26 March, 2019; v1 submitted 19 November, 2018; originally announced November 2018.

  19. arXiv:1810.09921  [pdf, other

    math.CO math.PR

    Connectivity of inhomogeneous random K-out graphs

    Authors: Rashad Eletreby, Osman Yağan

    Abstract: We propose inhomogeneous random K-out graphs $\mathbb{H}(n; \pmbμ, \pmb{K}_n)$, where each of the $n$ nodes is assigned to one of $r$ classes independently with a probability distribution $\pmbμ = \{μ_1, \ldots, μ_r\}$. In particular, each node is classified as class-$i$ with probability $μ_i>0$, independently. Each class-$i$ node selects $K_{i,n}$ distinct nodes uniformly at random from among all… ▽ More

    Submitted 3 June, 2019; v1 submitted 23 October, 2018; originally announced October 2018.

    Comments: Journal Version. Submitted

  20. arXiv:1810.08164  [pdf, other

    stat.ML cs.LG

    A Unified Approach to Translate Classical Bandit Algorithms to the Structured Bandit Setting

    Authors: Samarth Gupta, Shreyas Chaudhari, Subhojyoti Mukherjee, Gauri Joshi, Osman Yağan

    Abstract: We consider a finite-armed structured bandit problem in which mean rewards of different arms are known functions of a common hidden parameter $θ^*$. Since we do not place any restrictions of these functions, the problem setting subsumes several previously studied frameworks that assume linear or invertible reward functions. We propose a novel approach to gradually estimate the hidden $θ^*$ and use… ▽ More

    Submitted 3 February, 2021; v1 submitted 18 October, 2018; originally announced October 2018.

    Journal ref: IEEE Journal on Selected Areas of Information Theory 2020

  21. arXiv:1810.04545  [pdf, other

    physics.soc-ph cs.SI

    The Effects of Evolutionary Adaptations on Spreading Processes in Complex Networks

    Authors: Rashad Eletreby, Yong Zhuang, Kathleen M. Carley, Osman Yağan, H. Vincent Poor

    Abstract: A common theme among the proposed models for network epidemics is the assumption that the propagating object, i.e., a virus or a piece of information, is transferred across the nodes without going through any modification or evolution. However, in real-life spreading processes, pathogens often evolve in response to changing environments and medical interventions and information is often modified b… ▽ More

    Submitted 2 November, 2019; v1 submitted 10 October, 2018; originally announced October 2018.

    Comments: Submitted

  22. arXiv:1808.05904  [pdf, other

    stat.ML cs.LG

    Correlated Multi-armed Bandits with a Latent Random Source

    Authors: Samarth Gupta, Gauri Joshi, Osman Yağan

    Abstract: We consider a novel multi-armed bandit framework where the rewards obtained by pulling the arms are functions of a common latent random variable. The correlation between arms due to the common random source can be used to design a generalized upper-confidence-bound (UCB) algorithm that identifies certain arms as $non-competitive$, and avoids exploring them. As a result, we reduce a $K$-armed bandi… ▽ More

    Submitted 29 January, 2019; v1 submitted 17 August, 2018; originally announced August 2018.

  23. arXiv:1808.05334  [pdf, other

    cs.LG cs.IT stat.ML

    Active Distribution Learning from Indirect Samples

    Authors: Samarth Gupta, Gauri Joshi, Osman Yağan

    Abstract: This paper studies the problem of {\em learning} the probability distribution $P_X$ of a discrete random variable $X$ using indirect and sequential samples. At each time step, we choose one of the possible $K$ functions, $g_1, \ldots, g_K$ and observe the corresponding sample $g_i(X)$. The goal is to estimate the probability distribution of $X$ by using a minimum number of such sequential samples.… ▽ More

    Submitted 15 August, 2018; originally announced August 2018.

    Comments: Allerton Conference on Communication, Control and Computing, 2018

  24. arXiv:1807.08064  [pdf, other

    physics.soc-ph eess.SY

    Modeling and Analysis of Cascading Failures in Interdependent Cyber-Physical Systems

    Authors: Yingrui Zhang, Osman Yagan

    Abstract: Integrated cyber-physical systems (CPSs), such as the smart grid, are increasingly becoming the underpinning technology for major industries. A major concern regarding such systems are the seemingly unexpected large-scale failures, which are often attributed to a small initial shock getting escalated due to intricate dependencies within and across the individual counterparts of the system. In this… ▽ More

    Submitted 20 July, 2018; originally announced July 2018.

  25. arXiv:1807.00454  [pdf, other

    physics.soc-ph cs.SI

    Multi-Stage Complex Contagions in Random Multiplex Networks

    Authors: Yong Zhuang, Osman Yağan

    Abstract: Complex contagion models have been developed to understand a wide range of social phenomena such as adoption of cultural fads, the diffusion of belief, norms, and innovations in social networks, and the rise of collective action to join a riot. Most existing works focus on contagions where individuals' states are represented by {\em binary} variables, and propagation takes place over a single isol… ▽ More

    Submitted 3 July, 2018; v1 submitted 2 July, 2018; originally announced July 2018.

  26. arXiv:1804.01351  [pdf, other

    physics.soc-ph eess.SY

    Attack vulnerability of power systems under an equal load redistribution model

    Authors: Talha Cihad Gulcu, Vaggos Chatziafratis, Yingrui Zhang, Osman Yagan

    Abstract: This paper studies the vulnerability of flow networks against adversarial attacks. In particular, consider a power system (or, any system carrying a physical flow) consisting of $N$ transmission lines with initial loads $L_1, \ldots , L_N$ and capacities $C_1, \ldots, C_N$, respectively; the capacity $C_i$ defines the maximum flow allowed on line $i$. Under an equal load redistribution model, wher… ▽ More

    Submitted 4 April, 2018; originally announced April 2018.

    Comments: to appear at IEEE/ACM Transactions on Networking

  27. Robustness of flow networks against cascading failures under partial load redistribution

    Authors: Omur Ozel, Bruno Sinopoli, Osman Yagan

    Abstract: We study the robustness of flow networks against cascading failures under a partial load redistribution model. In particular, we consider a flow network of $N$ lines with initial loads $L_1, \ldots, L_N$ and free-spaces (i.e., redundant space) $S_1, \ldots, S_N$ that are independent and identically distributed with joint distribution $P_{LS}(x,y)=\mathbb{P}(L \leq x, S \leq y)$. The capacity… ▽ More

    Submitted 8 October, 2018; v1 submitted 21 February, 2018; originally announced February 2018.

    Journal ref: Phys. Rev. E 98, 042306 (2018)

  28. Cascading failures in interdependent systems under a flow redistribution model

    Authors: Yingrui Zhang, Alex Arenas, Osman Yağan

    Abstract: Robustness and cascading failures in interdependent systems has been an active research field in the past decade. However, most existing works use percolation-based models where only the largest component of each network remains functional throughout the cascade. Although suitable for communication networks, this assumption fails to capture the dependencies in systems carrying a flow (e.g., power… ▽ More

    Submitted 20 December, 2017; v1 submitted 5 September, 2017; originally announced September 2017.

    Journal ref: Phys. Rev. E 97, 022307 (2018)

  29. arXiv:1701.03758  [pdf, ps, other

    cs.SI cs.DM math.PR

    Counting triangles, tunable clustering and the small-world property in random key graphs (Extended version)

    Authors: Osman Yağan, Armand M. Makowski

    Abstract: Random key graphs were introduced to study various properties of the Eschenauer-Gligor key predistribution scheme for wireless sensor networks (WSNs). Recently this class of random graphs has received much attention in contexts as diverse as recommender systems, social network modeling, and clustering and classification analysis. This paper is devoted to analyzing various properties of random key… ▽ More

    Submitted 13 January, 2017; originally announced January 2017.

    Comments: 16 pages. Submitted. arXiv admin note: text overlap with arXiv:0910.0499

  30. arXiv:1612.02466  [pdf, ps, other

    cs.NI math.PR

    Secure and reliable connectivity in heterogeneous wireless sensor networks

    Authors: Rashad Eletreby, Osman Yağan

    Abstract: We consider wireless sensor networks secured by the heterogeneous random key predistribution scheme under an on/off channel model. The heterogeneous random key predistribution scheme considers the case when the network includes sensor nodes with varying levels of resources, features, or connectivity requirements; e.g., regular nodes vs. cluster heads, but does not incorporate the fact that wireles… ▽ More

    Submitted 24 October, 2016; originally announced December 2016.

    Comments: Submitted to IEEE International Conference on Communications 2017 (ICC 2017). substantial text overlap with arXiv:1611.02733, arXiv:1611.02675, arXiv:1610.07576

  31. arXiv:1611.02733  [pdf, ps, other

    cs.CR cs.IT math.PR

    Minimum node degree in inhomogeneous random key graphs with unreliable links

    Authors: Rashad Eletreby, Osman Yağan

    Abstract: We consider wireless sensor networks under a heterogeneous random key predistribution scheme and an on-off channel model. The heterogeneous key predistribution scheme has recently been introduced by Yağan - as an extension to the Eschenauer and Gligor scheme - for the cases when the network consists of sensor nodes with varying level of resources and/or connectivity requirements, e.g., regular nod… ▽ More

    Submitted 24 October, 2016; originally announced November 2016.

    Comments: In proceedings of the IEEE International Symposium on Information Theory (ISIT) 2016. arXiv admin note: substantial text overlap with arXiv:1610.07576, arXiv:1611.02675

  32. arXiv:1611.02675  [pdf, ps, other

    cs.CR cs.NI math.PR math.ST

    $k$-connectivity of inhomogeneous random key graphs with unreliable links

    Authors: Rashad Eletreby, Osman Yağan

    Abstract: We consider secure and reliable connectivity in wireless sensor networks that utilize a heterogeneous random key predistribution scheme. We model the unreliability of wireless links by an on-off channel model that induces an Erdős-Rényi graph, while the heterogeneous scheme induces an inhomogeneous random key graph. The overall network can thus be modeled by the intersection of both graphs. We pre… ▽ More

    Submitted 24 October, 2016; originally announced November 2016.

    Comments: Submitted to IEEE Transactions on Mobile Computing

  33. arXiv:1610.07590  [pdf, ps, other

    cs.IT

    On the Network Reliability Problem of the Heterogeneous Key Predistribution Scheme

    Authors: Rashad Eletreby, Osman Yağan

    Abstract: We consider the network reliability problem in wireless sensor networks secured by the heterogeneous random key predistribution scheme. This scheme generalizes Eschenauer-Gligor scheme by considering the cases when the network comprises sensor nodes with varying level of resources; e.g., regular nodes vs. cluster heads. The scheme induces the inhomogeneous random key graph, denoted… ▽ More

    Submitted 24 October, 2016; originally announced October 2016.

    Comments: In proceedings of the 55th IEEE Conference on Decision and Control (CDC 2016). arXiv admin note: substantial text overlap with arXiv:1604.00460, arXiv:1610.07576

  34. arXiv:1610.07576  [pdf, ps, other

    cs.IT

    Node Isolation of Secure Wireless Sensor Networks under a Heterogeneous Channel Model

    Authors: Rashad Eletreby, Osman Yağan

    Abstract: We investigate the secure connectivity of wireless sensor networks under a heterogeneous random key predistribution scheme and a heterogeneous channel model. In particular, we study a random graph formed by the intersection of an inhomogeneous random key graph with an inhomogeneous Erdős-Rényi graph. The former graph is naturally induced by the heterogeneous random key predistribution scheme while… ▽ More

    Submitted 24 October, 2016; originally announced October 2016.

    Comments: In Proceedings of the 54th Annual Allerton Conference on Communication, Control, and Computing. arXiv admin note: text overlap with arXiv:1604.00460

  35. arXiv:1608.08237  [pdf, other

    physics.soc-ph cs.SI

    Clustering determines the dynamics of complex contagions in multiplex networks

    Authors: Yong Zhuang, Alex Arenas, Osman Yağan

    Abstract: We present the mathematical analysis of generalized complex contagions in clustered multiplex networks for susceptible-infected-recovered (SIR)-like dynamics. The model is intended to understand diffusion of influence, or any other spreading process implying a threshold dynamics, in setups of interconnected networks with significant clustering. The contagion is assumed to be general enough to acco… ▽ More

    Submitted 29 August, 2016; originally announced August 2016.

  36. arXiv:1604.00460  [pdf, ps, other

    math.OC math.PR

    Connectivity of Wireless Sensor Networks Secured by Heterogeneous Key Predistribution Under an On/Off Channel Model

    Authors: Rashad Eletreby, Osman Yağan

    Abstract: We investigate the connectivity of a wireless sensor network secured by the heterogeneous key predistribution scheme under an independent on/off channel model. The heterogeneous scheme induces an inhomogeneous random key graph, denoted by $\mathbb{K}(n;\pmbμ,\pmb{K},P)$ and the on/off channel model induces an Erdős-Rényi graph, denoted by $\mathbb{H}(n,α)$. Hence, the overall random graph modeling… ▽ More

    Submitted 5 October, 2017; v1 submitted 2 April, 2016; originally announced April 2016.

  37. arXiv:1602.07763  [pdf, ps, other

    physics.soc-ph cs.SI physics.data-an

    Optimizing the robustness of electrical power systems against cascading failures

    Authors: Yingrui Zhang, Osman Yagan

    Abstract: Electrical power systems are one of the most important infrastructures that support our society. However, their vulnerabilities have raised great concern recently due to several large-scale blackouts around the world. In this paper, we investigate the robustness of power systems against cascading failures initiated by a random attack. This is done under a simple yet useful model based on global an… ▽ More

    Submitted 24 February, 2016; originally announced February 2016.

    Comments: 18 pages including 2 pages of supplementary file, 5 figures

    Journal ref: Scientific Reports 6, Article number: 27625 (2016)

  38. arXiv:1510.02939  [pdf, ps, other

    math.PR

    On the Eschenauer-Gligor key predistribution scheme under on-off communication channels: The absence of isolated nodes (Extended version)

    Authors: Armand M. Makowski, Osman Yağan

    Abstract: We consider the Eschenauer-Gligor key predistribution scheme under the condition of partial visibility with i.i.d. on-off links between pairs of nodes. This situation is modeled as the intersection of two random graphs, namely a random key graph and an Erdős-Rényi (ER) graph. For this class of composite random graphs we give various improvements on a recent result by Yağan [IEEE Transactions on In… ▽ More

    Submitted 10 October, 2015; originally announced October 2015.

    Comments: Extended version of a paper appeared in Allerton 2015

  39. arXiv:1509.03909  [pdf, other

    physics.soc-ph cs.SI

    Information Propagation in Clustered Multilayer Networks

    Authors: Yong Zhuang, Osman Yağan

    Abstract: In today's world, individuals interact with each other in more complicated patterns than ever. Some individuals engage through online social networks (e.g., Facebook, Twitter), while some communicate only through conventional ways (e.g., face-to-face). Therefore, understanding the dynamics of information propagation among humans calls for a multi-layer network model where an online social network… ▽ More

    Submitted 13 September, 2015; originally announced September 2015.

  40. Zero-one laws for connectivity in inhomogeneous random key graphs

    Authors: Osman Yagan

    Abstract: We introduce a new random key predistribution scheme for securing heterogeneous wireless sensor networks. Each of the n sensors in the network is classified into r classes according to some probability distribution μ = {μ_1 , . . . , μ_r }. Before deployment, a class-i sensor is assigned K_i cryptographic keys that are selected uniformly at random from a common pool of P keys. Once deployed, a pai… ▽ More

    Submitted 10 August, 2015; originally announced August 2015.

    Comments: Paper submitted to IEEE Transactions on Information Theory

    Journal ref: IEEE Transactions on Information Theory 62(8):4559-4574, August 2016

  41. arXiv:1508.00545  [pdf, ps, other

    cs.CR cs.DM cs.IT math.PR physics.soc-ph

    Connectivity in Secure Wireless Sensor Networks under Transmission Constraints

    Authors: Jun Zhao, Osman Yağan, Virgil Gligor

    Abstract: In wireless sensor networks (WSNs), the Eschenauer-Gligor (EG) key pre-distribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure WSNs with the EG scheme have been extensively investigated, few results address physical transmission constraints. These constraints reflect real-world implementations of WSNs in which two sensors have to be withi… ▽ More

    Submitted 3 August, 2015; v1 submitted 3 August, 2015; originally announced August 2015.

    Comments: Full version of a paper published in Annual Allerton Conference on Communication, Control, and Computing (Allerton) 2014

  42. arXiv:1504.03728  [pdf, ps, other

    physics.soc-ph cs.SI physics.data-an

    Robustness of power systems under a democratic fiber bundle-like model

    Authors: Osman Yağan

    Abstract: We consider a power system with $N$ transmission lines whose initial loads (i.e., power flows) $L_1, \ldots, L_N$ are independent and identically distributed with $P_L(x)$. The capacity $C_i$ defines the maximum flow allowed on line $i$, and is assumed to be given by $C_i=(1+α)L_i$, with $α>0$. We study the robustness of this power system against random attacks (or, failures) that target a $p$-{\e… ▽ More

    Submitted 14 April, 2015; originally announced April 2015.

    Comments: 12 pages, 6 figures

    Journal ref: Physical Review E 91, 062811, June 2015

  43. arXiv:1504.03161  [pdf, ps, other

    cs.DM cs.CR cs.SI math.CO physics.soc-ph

    Random intersection graphs and their applications in security, wireless communication, and social networks

    Authors: Jun Zhao, Osman Yağan, Virgil Gligor

    Abstract: Random intersection graphs have received much interest and been used in diverse applications. They are naturally induced in modeling secure sensor networks under random key predistribution schemes, as well as in modeling the topologies of social networks including common-interest networks, collaboration networks, and actor networks. Simply put, a random intersection graph is constructed by assigni… ▽ More

    Submitted 11 February, 2015; originally announced April 2015.

    Comments: This is an invited paper in Information Theory and Applications Workshop (ITA) 2015

  44. arXiv:1502.00405  [pdf, ps, other

    physics.soc-ph cs.DM cs.SI math.CO math.PR

    Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs

    Authors: Jun Zhao, Osman Yağan, Virgil Gligor

    Abstract: Uniform random intersection graphs have received much interest and been used in diverse applications. A uniform random intersection graph with $n$ nodes is constructed as follows: each node selects a set of $K_n$ different items uniformly at random from the same pool of $P_n$ distinct items, and two nodes establish an undirected edge in between if and only if they share at least one item. For such… ▽ More

    Submitted 2 February, 2015; originally announced February 2015.

  45. arXiv:1502.00404   

    physics.soc-ph cs.DM cs.SI math.CO math.PR

    A curious gap in one-dimensional geometric random graphs between connectivity and the absence of isolated node

    Authors: Jun Zhao, Osman Yağan, Virgil Gligor

    Abstract: One-dimensional geometric random graphs are constructed by distributing $n$ nodes uniformly and independently on a unit interval and then assigning an undirected edge between any two nodes that have a distance at most $r_n$. These graphs have received much interest and been used in various applications including wireless networks. A threshold of $r_n$ for connectivity is known as… ▽ More

    Submitted 18 February, 2015; v1 submitted 2 February, 2015; originally announced February 2015.

    Comments: Similar (yet slightly weaker) results were already proved by Appel and Russo in their 1997 paper in Advances in Applied Probability and their 2002 paper in Statistics and Probability Letters

  46. arXiv:1502.00400  [pdf, ps, other

    physics.soc-ph cs.DM cs.SI math.CO math.PR

    k-Connectivity of Random Key Graphs

    Authors: Jun Zhao, Osman Yağan, Virgil Gligor

    Abstract: Random key graphs represent topologies of secure wireless sensor networks that apply the seminal Eschenauer-Gligor random key predistribution scheme to secure communication between sensors. These graphs have received much attention and also been used in diverse application areas beyond secure sensor networks; e.g., cryptanalysis, social networks, and recommender systems. Formally, a random key gra… ▽ More

    Submitted 2 February, 2015; originally announced February 2015.

  47. arXiv:1502.00395  [pdf, ps, other

    physics.soc-ph cs.DM cs.SI math.CO math.PR

    Threshold Functions in Random s-Intersection Graphs

    Authors: Jun Zhao, Osman Yağan, Virgil Gligor

    Abstract: Random $s$-intersection graphs have recently received considerable attention in a wide range of application areas. In such a graph, each vertex is equipped with a set of items in some random manner, and any two vertices establish an undirected edge in between if and only if they have at least $s$ common items. In particular, in a uniform random $s$-intersection graph, each vertex independently sel… ▽ More

    Submitted 2 February, 2015; originally announced February 2015.

  48. arXiv:1501.01826   

    cs.CR cs.DM cs.IT

    Designing Securely and Reliably Connected Wireless Sensor Networks

    Authors: Jun Zhao, Osman Yağan, Virgil Gligor

    Abstract: In wireless sensor networks, the $q$-composite key predistribution scheme is a widely recognized way to secure communications. Although connectivity properties of secure sensor networks with the $q$-composite scheme have been studied in the literature, few results address physical transmission constraints since it is challenging to analyze the network connectivity in consideration of both the $q$-… ▽ More

    Submitted 5 August, 2015; v1 submitted 8 January, 2015; originally announced January 2015.

    Comments: A critical error is found in the paper

  49. arXiv:1409.6022  [pdf, ps, other

    math.CO cs.DM cs.SI math.PR physics.soc-ph

    Exact Analysis of k-Connectivity in Secure Sensor Networks with Unreliable Links

    Authors: Jun Zhao, Osman Yağan, Virgil Gligor

    Abstract: The Eschenauer--Gligor (EG) random key predistribution scheme has been widely recognized as a typical approach to secure communications in wireless sensor networks (WSNs). However, there is a lack of precise probability analysis on the reliable connectivity of WSNs under the EG scheme. To address this, we rigorously derive the asymptotically exact probability of $k$-connectivity in WSNs employing… ▽ More

    Submitted 6 February, 2015; v1 submitted 21 September, 2014; originally announced September 2014.

    MSC Class: 05C80; 60B20 ACM Class: G.2.2; C.2.1

  50. arXiv:1409.6021  [pdf, ps, other

    math.CO cs.DM cs.SI math.PR physics.soc-ph

    On $k$-connectivity and minimum vertex degree in random $s$-intersection graphs

    Authors: Jun Zhao, Osman Yağan, Virgil Gligor

    Abstract: Random $s$-intersection graphs have recently received much interest in a wide range of application areas. Broadly speaking, a random $s$-intersection graph is constructed by first assigning each vertex a set of items in some random manner, and then putting an undirected edge between all pairs of vertices that share at least $s$ items (the graph is called a random intersection graph when $s=1$). A… ▽ More

    Submitted 18 November, 2014; v1 submitted 21 September, 2014; originally announced September 2014.

    Comments: This paper appears in ACM-SIAM Meeting on Analytic Algorithmics and Combinatorics (ANALCO) 2015, a conference co-located with ACM-SIAM Symposium on Discrete Algorithms (SODA) 2015

    MSC Class: 05C80; 60B20 ACM Class: G.2.2; C.2.1