The effect of eavesdroppers on network connectivity: A secrecy graph approach

Satashu Goel, Vaneet Aggarwal, Aylin Yener, A. Robert Calderbank

    Research output: Contribution to journalArticlepeer-review

    21 Scopus citations


    This paper investigates the effect of eavesdroppers on network connectivity, using a wiretap model and percolation theory. The wiretap model captures the effect of eavesdroppers on link security. A link exists between two nodes only if the secrecy capacity of that link is positive. Network connectivity is defined in a percolation sense, i.e., connectivity exists if an infinite connected component exists in the corresponding secrecy graph. We consider uncertainty in location of eavesdroppers, which is modeled directly at the network level as correlated failures in the secrecy graph. Our approach attempts to bridge the gap between physical layer security under uncertain channel state information and network level connectivity under secrecy constraints. For square and triangular lattice secrecy graphs, we obtain bounds on the percolation threshold, which is the critical value of the probability of occurrence of an eavesdropper, above which network connectivity does not exist. For Poisson secrecy graphs, degree distribution and mean value of upper and lower bounds on node degree are obtained. Further, inner and outer bounds on the achievable region for network connectivity are obtained. Both analytic and simulation results show that uncertainty in location of eavesdroppers has a dramatic effect on network connectivity in a secrecy graph.

    Original languageEnglish (US)
    Article number5759739
    Pages (from-to)712-724
    Number of pages13
    JournalIEEE Transactions on Information Forensics and Security
    Issue number3 PART 1
    StatePublished - Sep 2011

    All Science Journal Classification (ASJC) codes

    • Safety, Risk, Reliability and Quality
    • Computer Networks and Communications


    Dive into the research topics of 'The effect of eavesdroppers on network connectivity: A secrecy graph approach'. Together they form a unique fingerprint.

    Cite this