Search Results

Now showing 1 - 10 of 20
Loading...
Thumbnail Image
Item

Exponential Moments for Planar Tessellations

2020, Jahnel, Benedikt, Tóbiás, András

In this paper we show existence of all exponential moments for the total edge length in a unit disk for a family of planar tessellations based on stationary point processes. Apart from classical tessellations such as the Poisson–Voronoi, Poisson–Delaunay and Poisson line tessellation, we also treat the Johnson–Mehl tessellation, Manhattan grids, nested versions and Palm versions. As part of our proofs, for some planar tessellations, we also derive existence of exponential moments for the number of cells and the number of edges intersecting the unit disk.

Loading...
Thumbnail Image
Item

Lower large deviations for geometric functionals

2020, Hirsch, Christian, Jahnel, Benedikt, Tóbiás, András

This work develops a methodology for analyzing large-deviation lower tails associated with geometric functionals computed on a homogeneous Poisson point process. The technique applies to characteristics expressed in terms of stabilizing score functions exhibiting suitable monotonicity properties. We apply our results to clique counts in the random geometric graph, intrinsic volumes of Poisson–Voronoi cells, as well as power-weighted edge lengths in the random geometric, k-nearest neighbor and relative neighborhood graph.

Loading...
Thumbnail Image
Item

Agent-based modeling and simulation for malware spreading in D2D networks

2022, Benomar, Ziyad, Ghribi, Chaima, Cali, Eli, Hinsen, Alexander, Jahnel, Benedikt

This paper presents a new multi-agent model for simulating malware propagation in device-to-device (D2D) 5G networks. This model allows to understand and analyze mobile malware-spreading dynamics in such highly dynamical networks. Additionally, we present a theoretical study to validate and benchmark our proposed approach for some basic scenarios that are less complicated to model mathematically and also to highlight the key parameters of the model. Our simulations identify critical thresholds for em no propagation and for em maximum malware propagation and make predictions on the malware-spread velocity as well as device-infection rates. To the best of our knowledge, this paper is the first study applying agent-based simulations for malware propagation in D2D.

Loading...
Thumbnail Image
Item

Gibbsianness and non-Gibbsianness for Bernoulli lattice fields under removal of isolated sites

2021, Jahnel, Benedikt, Külske, Christof

We consider the i.i.d. Bernoulli field μ p on Z d with occupation density p ∈ [0,1]. To each realization of the set of occupied sites we apply a thinning map that removes all occupied sites that are isolated in graph distance. We show that, while this map seems non-invasive for large p, as it changes only a small fraction p(1-p)2d of sites, there is p(d) <1 such that for all p ∈ (p(d), 1) the resulting measure is a non-Gibbsian measure, i.e., it does not possess a continuous version of its finite-volume conditional probabilities. On the other hand, for small p, the Gibbs property is preserved.

Loading...
Thumbnail Image
Item

Sharp phase transition for Cox percolation

2022, Hirsch, Christian, Jahnel, Benedikt, Muirhead, Stephen

We prove the sharpness of the percolation phase transition for a class of Cox percolation models, i.e., models of continuum percolation in a random environment. The key requirements are that the environment has a finite range of dependence, satisfies a local boundedness condition and can be constructed from a discrete iid random field, however the FKG inequality need not hold. The proof combines the OSSS inequality with a coarse-graining construction that allows us to compare different notions of influence.

Loading...
Thumbnail Image
Item

Malware propagation in urban D2D networks

2020, Hinsen, Alexander, Jahnel, Benedikt, Cali, Eli, Wary, Jean-Philippe

We introduce and analyze models for the propagation of malware in pure D2D networks given via stationary Cox--Gilbert graphs. Here, the devices form a Poisson point process with random intensity measure λ, Λ where Λ is stationary and given, for example, by the edge-length measure of a realization of a Poisson--Voronoi tessellation that represents an urban street system. We assume that, at initial time, a typical device at the center of the network carries a malware and starts to infect neighboring devices after random waiting times. Here we focus on Markovian models, where the waiting times are exponential random variables, and non-Markovian models, where the waiting times feature strictly positive minimal and finite maximal waiting times. We present numerical results for the speed of propagation depending on the system parameters. In a second step, we introduce and analyze a counter measure for the malware propagation given by special devices called white knights, which have the ability, once attacked, to eliminate the malware from infected devices and turn them into white knights. Based on simulations, we isolate parameter regimes in which the malware survives or is eliminated, both in the Markovian and non-Markovian setting.

Loading...
Thumbnail Image
Item

Connection intervals in multi-scale dynamic networks

2021, Hirsch, Christian, Jahnel, Benedikt, Cali, Elie

We consider a hybrid spatial communication system in which mobile nodes can connect to static sinks in a bounded number of intermediate relaying hops. We describe the distribution of the connection intervals of a typical mobile node, i.e., the intervals of uninterrupted connection to the family of sinks. This is achieved in the limit of many hops, sparse sinks and growing time horizons. We identify three regimes illustrating that the limiting distribution depends sensitively on the scaling of the time horizon.

Loading...
Thumbnail Image
Item

Phase transitions for chase-escape models on Poisson–Gilbert graphs

2020, Hinsen, Alexander, Jahnel, Benedikt, Cali, Elie, Wary, Jean-Philippe

We present results on phase transitions of local and global survival in a two-species model on Poisson–Gilbert graphs. Initially, there is an infection at the origin that propagates on the graph according to a continuous-time nearest-neighbor interacting particle system. The graph consists of susceptible nodes and nodes of a second type, which we call white knights. The infection can spread on susceptible nodes without restriction. If the infection reaches a white knight, this white knight starts to spread on the set of infected nodes according to the same mechanism, with a potentially different rate, giving rise to a competition of chase and escape. We show well-definedness of the model, isolate regimes of global survival and extinction of the infection and present estimates on local survival. The proofs rest on comparisons to the process on trees, percolation arguments and finite-degree approximations of the underlying random graphs.

Loading...
Thumbnail Image
Item

Agent-based simulations for coverage extensions in 5G networks and beyond

2022, Ghribi, Chaima, Cali, Eli, Hirsch, Christian, Jahnel, Benedikt

Device-to-device (D2D) communications is one of the key emerging technologies for the fifth generation (5G) networks and beyond. It enables direct communication between mobile users and thereby extends coverage for devices lacking direct access to the cellular infrastructure and hence enhances network capacity. D2D networks are complex, highly dynamic and will be strongly augmented by intelligence for decision making at both the edge and core of the network, which makes them particularly difficult to predict and analyze. Conventionally, D2D systems are evaluated, investigated and analyzed using analytical and probabilistic models (e.g., from stochastic geometry). However, applying classical simulation and analytical tools to such a complex system is often hard to track and inaccurate. In this paper, we present a modeling and simulation framework from the perspective of complex-systems science and exhibit an agent-based model for the simulation of D2D coverage extensions. We also present a theoretical study to benchmark our proposed approach for a basic scenario that is less complicated to model mathematically. Our simulation results show that we are indeed able to predict coverage extensions for multi-hop scenarios and quantify the effects of street-system characteristics and pedestrian mobility on the connection time of devices to the base station (BS). To our knowledge, this is the first study that applies agent-based simulations for coverage extensions in D2D.

Loading...
Thumbnail Image
Item

Limiting shape for first-passage percolation models on random geometric graphs

2021, Coletti, Cristian F., de Lima, Lucas R., Hinsen, Alexander, Jahnel, Benedikt, Valesin, Daniel R.

Let a random geometric graph be defined in the supercritical regime for the existence of a unique infinite connected component in Euclidean space. Consider the first-passage percolation model with independent and identically distributed random variables on the random infinite connected component. We provide sufficient conditions for the existence of the asymptotic shape and we show that the shape is an Euclidean ball. We give some examples exhibiting the result for Bernoulli percolation and the Richardson model. For the Richardson model we further show that it converges weakly to a branching process in the joint limit of large intensities and slow passing times.