{"id":"https://openalex.org/W2508145702","doi":"https://doi.org/10.1109/isit.2016.7541741","title":"Connectivity in inhomogeneous random key graphs","display_name":"Connectivity in inhomogeneous random key graphs","publication_year":2016,"publication_date":"2016-07-01","ids":{"openalex":"https://openalex.org/W2508145702","doi":"https://doi.org/10.1109/isit.2016.7541741","mag":"2508145702"},"language":"en","primary_location":{"id":"doi:10.1109/isit.2016.7541741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2016.7541741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064066193","display_name":"Osman Ya\u011fan","orcid":"https://orcid.org/0000-0002-7057-2966"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Osman Ya\u011fan","raw_affiliation_strings":["Department of ECE, Carnegie Mellon University, Pittsburgh, PA 15213, USA","Department of ECE, Carnegie Mellon University, Pittsburgh, PA"],"affiliations":[{"raw_affiliation_string":"Department of ECE, Carnegie Mellon University, Pittsburgh, PA 15213, USA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"Department of ECE, Carnegie Mellon University, Pittsburgh, PA","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5064066193"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":0.6073,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.72912221,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"2459","last_page":"2463"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9584000110626221,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.954800009727478,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5901020765304565},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5687110424041748},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4675264358520508},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.4367053508758545},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.43541383743286133},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4286194443702698},{"id":"https://openalex.org/keywords/random-graph","display_name":"Random graph","score":0.41270604729652405},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.40363916754722595},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.38850927352905273},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.3673563003540039},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3490734398365021},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34314286708831787},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3150113821029663},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.29739320278167725},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19221961498260498},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10586130619049072}],"concepts":[{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5901020765304565},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5687110424041748},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4675264358520508},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.4367053508758545},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.43541383743286133},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4286194443702698},{"id":"https://openalex.org/C47458327","wikidata":"https://www.wikidata.org/wiki/Q910404","display_name":"Random graph","level":3,"score":0.41270604729652405},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.40363916754722595},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.38850927352905273},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.3673563003540039},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3490734398365021},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34314286708831787},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3150113821029663},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29739320278167725},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19221961498260498},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10586130619049072}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit.2016.7541741","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit.2016.7541741","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W188357332","https://openalex.org/W390146837","https://openalex.org/W630423399","https://openalex.org/W1519188191","https://openalex.org/W1733162348","https://openalex.org/W1866877808","https://openalex.org/W2028486074","https://openalex.org/W2041282222","https://openalex.org/W2060271434","https://openalex.org/W2061726431","https://openalex.org/W2063090892","https://openalex.org/W2089421240","https://openalex.org/W2099466541","https://openalex.org/W2107866581","https://openalex.org/W2109721434","https://openalex.org/W2112209432","https://openalex.org/W2116269350","https://openalex.org/W2117984332","https://openalex.org/W2121278461","https://openalex.org/W2138359578","https://openalex.org/W2143536181","https://openalex.org/W2159653238","https://openalex.org/W2161308157","https://openalex.org/W2165958223","https://openalex.org/W2196704028","https://openalex.org/W2336717666","https://openalex.org/W2950850272","https://openalex.org/W3098141196","https://openalex.org/W3098413816","https://openalex.org/W3100228290","https://openalex.org/W3102943465","https://openalex.org/W3211513184","https://openalex.org/W4231918995","https://openalex.org/W6677374569","https://openalex.org/W6681151506"],"related_works":["https://openalex.org/W2086397253","https://openalex.org/W2133122801","https://openalex.org/W600422426","https://openalex.org/W2007156430","https://openalex.org/W3081478936","https://openalex.org/W2785612136","https://openalex.org/W1975451135","https://openalex.org/W1988224651","https://openalex.org/W2096179639","https://openalex.org/W2099529706"],"abstract_inverted_index":{"We":[0,101],"consider":[1],"a":[2,29,45,63,70,83,136],"new":[3],"random":[4,61,98,176],"key":[5,84,99],"predistribution":[6],"scheme":[7],"for":[8,166],"securing":[9],"heterogeneous":[10],"wireless":[11],"sensor":[12,47],"networks.":[13],"Each":[14],"of":[15,65,72,90,135,142],"the":[16,20,106,133,140,167,174],"n":[17,144],"sensors":[18,73,143],"in":[19,85,132],"network":[21,92],"is":[22,48,93,123,130,150],"classified":[23],"into":[24],"r":[25],"classes":[26],"according":[27],"to":[28,152,172],"probability":[30],"distribution":[31],"\u03bc":[32],"=":[33],"{\u03bc":[34],"<sub":[35,39,51,111,115],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[36,40,52,112,116],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1</sub>":[37,113],",...\u03bc":[38],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">r</sub>":[41,117],"}":[42,118],"Before":[43],"deployment,":[44],"class-i":[46],"assigned":[49],"K":[50],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">i</sub>":[53],"cryptographic":[54],"keys":[55],"that":[56,120],"are":[57],"selected":[58],"uniformly":[59],"at":[60],"from":[62],"pool":[64],"P":[66,108],"keys.":[67],"Once":[68],"deployed,":[69],"pair":[71],"can":[74],"communicate":[75],"securely":[76],"if":[77,80],"and":[78,109,154,162],"only":[79],"they":[81],"have":[82],"common.":[86],"The":[87,128],"communication":[88],"topology":[89],"this":[91,121],"modeled":[94],"by":[95,158],"an":[96],"inhomogeneous":[97],"graph.":[100,178],"establish":[102],"scaling":[103],"conditions":[104],"on":[105],"parameters":[107],"{K":[110],",...,K":[114],"so":[119],"graph":[122],"connected":[124],"with":[125,139],"high":[126],"probability.":[127],"result":[129,149],"given":[131,157],"form":[134],"zero-one":[137],"law":[138],"number":[141],"growing":[145],"unboundedly":[146],"large.":[147],"Our":[148],"shown":[151],"complement":[153],"improve":[155],"those":[156],"Godehardt":[159],"et":[160,164],"al.":[161,165],"Zhao":[163],"same":[168],"model,":[169],"therein":[170],"referred":[171],"as":[173],"general":[175],"intersection":[177]},"counts_by_year":[{"year":2016,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
