Search Results

Now showing 1 - 6 of 6
Loading...
Thumbnail Image
Item

Percolation and connection times in multi-scale dynamic networks

2021, Jahnel, Benedikt, Hirsch, Christian, Cali, Eli

We study the effects of mobility on two crucial characteristics in multi-scale dynamic networks: percolation and connection times. Our analysis provides insights into the question, to what extent long-time averages are well-approximated by the expected values of the corresponding quantities, i.e., the percolation and connection probabilities. In particular, we show that in multi-scale models, strong random effects may persist in the limit. Depending on the precise model choice, these may take the form of a spatial birth-death process or a Brownian motion. Despite the variety of structures that appear in the limit, we show that they can be tackled in a common framework with the potential to be applicable more generally in order to identify limits in dynamic spatial network models going beyond the examples considered in the present work.

Loading...
Thumbnail Image
Item

Agent-based modeling and simulation for malware spreading in D2D networks

2022, Benomar, Ziyad, Ghribi, Chaima, Cali, Eli, Hinsen, Alexander, Jahnel, Benedikt

This paper presents a new multi-agent model for simulating malware propagation in device-to-device (D2D) 5G networks. This model allows to understand and analyze mobile malware-spreading dynamics in such highly dynamical networks. Additionally, we present a theoretical study to validate and benchmark our proposed approach for some basic scenarios that are less complicated to model mathematically and also to highlight the key parameters of the model. Our simulations identify critical thresholds for em no propagation and for em maximum malware propagation and make predictions on the malware-spread velocity as well as device-infection rates. To the best of our knowledge, this paper is the first study applying agent-based simulations for malware propagation in D2D.

Loading...
Thumbnail Image
Item

Phase transitions for the Boolean model of continuum percolation for Cox point processes

2020, Jahnel, Benedikt, Tóbiás, András, Cali, Eli

We consider the Boolean model with random radii based on Cox point processes. Under a condition of stabilization for the random environment, we establish existence and non-existence of subcritical regimes for the size of the cluster at the origin in terms of volume, diameter and number of points. Further, we prove uniqueness of the infinite cluster for sufficiently connected environments.

Loading...
Thumbnail Image
Item

Phase transitions for chase-escape models on Gilbert graphs

2019, Hinsen, Alexander, Jahnel, Benedikt, Cali, Eli, Wary, Jean-Philippe

We present results on phase transitions of local and global survival in a two-species model on Gilbert graphs. At initial time there is an infection at the origin that propagates on the Gilbert graph according to a continuous-time nearest-neighbor interacting particle system. The Gilbert graph consists of susceptible nodes and nodes of a second type, which we call white knights. The infection can spread on susceptible nodes without restriction. If the infection reaches a white knight, this white knight starts to spread on the set of infected nodes according to the same mechanism, with a potentially different rate, giving rise to a competition of chase and escape. We show well-definedness of the model, isolate regimes of global survival and extinction of the infection and present estimates on local survival. The proofs rest on comparisons to the process on trees, percolation arguments and finite-degree approximations of the underlying random graphs.

Loading...
Thumbnail Image
Item

Agent-based simulations for coverage extensions in 5G networks and beyond

2022, Ghribi, Chaima, Cali, Eli, Hirsch, Christian, Jahnel, Benedikt

Device-to-device (D2D) communications is one of the key emerging technologies for the fifth generation (5G) networks and beyond. It enables direct communication between mobile users and thereby extends coverage for devices lacking direct access to the cellular infrastructure and hence enhances network capacity. D2D networks are complex, highly dynamic and will be strongly augmented by intelligence for decision making at both the edge and core of the network, which makes them particularly difficult to predict and analyze. Conventionally, D2D systems are evaluated, investigated and analyzed using analytical and probabilistic models (e.g., from stochastic geometry). However, applying classical simulation and analytical tools to such a complex system is often hard to track and inaccurate. In this paper, we present a modeling and simulation framework from the perspective of complex-systems science and exhibit an agent-based model for the simulation of D2D coverage extensions. We also present a theoretical study to benchmark our proposed approach for a basic scenario that is less complicated to model mathematically. Our simulation results show that we are indeed able to predict coverage extensions for multi-hop scenarios and quantify the effects of street-system characteristics and pedestrian mobility on the connection time of devices to the base station (BS). To our knowledge, this is the first study that applies agent-based simulations for coverage extensions in D2D.

Loading...
Thumbnail Image
Item

Malware propagation in urban D2D networks

2020, Hinsen, Alexander, Jahnel, Benedikt, Cali, Eli, Wary, Jean-Philippe

We introduce and analyze models for the propagation of malware in pure D2D networks given via stationary Cox--Gilbert graphs. Here, the devices form a Poisson point process with random intensity measure λ, Λ where Λ is stationary and given, for example, by the edge-length measure of a realization of a Poisson--Voronoi tessellation that represents an urban street system. We assume that, at initial time, a typical device at the center of the network carries a malware and starts to infect neighboring devices after random waiting times. Here we focus on Markovian models, where the waiting times are exponential random variables, and non-Markovian models, where the waiting times feature strictly positive minimal and finite maximal waiting times. We present numerical results for the speed of propagation depending on the system parameters. In a second step, we introduce and analyze a counter measure for the malware propagation given by special devices called white knights, which have the ability, once attacked, to eliminate the malware from infected devices and turn them into white knights. Based on simulations, we isolate parameter regimes in which the malware survives or is eliminated, both in the Markovian and non-Markovian setting.