MURAL - Maynooth University Research Archive Library



    A Tutorial-Cum-Survey on Percolation Theory With Applications in Large-Scale Wireless Networks


    ElSawy, Hesham, Zhaikhan, Ainur, Kishk, Mustafa A. and Alouini, Mohamed-Slim (2024) A Tutorial-Cum-Survey on Percolation Theory With Applications in Large-Scale Wireless Networks. IEEE Communications Surveys & Tutorials, 26 (1). pp. 428-460. ISSN 2373-745X

    [thumbnail of A_Tutorial-Cum-Survey_on_Percolation_Theory_With_Applications_in_Large-Scale_Wireless_Networks.pdf]
    Preview
    Text
    A_Tutorial-Cum-Survey_on_Percolation_Theory_With_Applications_in_Large-Scale_Wireless_Networks.pdf
    Available under License Creative Commons Attribution Non-commercial Share Alike.

    Download (13MB) | Preview

    Abstract

    Connectivity is an important key performance indicator and a focal point of research in large-scale wireless networks. Due to path-loss attenuation of electromagnetic waves, direct wireless connectivity is limited to proximate devices. Nevertheless, connectivity among distant devices can still be attained through a sequence of consecutive multi-hop communication links, which enables routing and disseminating legitimate information across wireless ad hoc networks. Multihop connectivity is also foundational for data aggregation in the Internet of things (IoT) and cyberphysical systems (CPS). On the downside, multi-hop wireless transmissions increase susceptibility to eavesdropping and enable malicious network attacks. Hence, security-aware network connectivity is required to maintain communication privacy, detect and isolate malicious devices, and thwart the spreading of illegitimate traffic (e.g., viruses, worms, falsified data, illegitimate control, etc.). In 5G and beyond networks, an intricate balance between connectivity, privacy, and security is a necessity due to the proliferating IoT and CPS, which are featured with massive number of wireless devices that can directly communicate together (e.g., device-to-device, machine-tomachine, and vehicle-to-vehicle communication). In this regards, graph theory represents a foundational mathematical tool to model the network physical topology. In particular, random geometric graphs (RGGs) capture the inherently random locations and wireless interconnections among the spatially distributed devices. Percolation theory is then utilized to characterize and control distant multi-hop connectivity on network graphs. Recently, percolation theory over RGGs has been widely utilized to study connectivity, privacy, and security of several types of wireless networks. The impact and utilization of percolation theory are expected to further increase in the IoT/CPS era, which motivates this tutorial. Towards this end, we first introduce the preliminaries of graph and percolation theories in the context of wireless networks. Next, we overview and explain their application to various types of wireless networks.
    Item Type: Article
    Keywords: Wireless communications; large-scale networks; random graph theory; percolation theory; stochastic geometry;
    Academic Unit: Faculty of Science and Engineering > Electronic Engineering
    Item ID: 20617
    Identification Number: 10.1109/COMST.2023.3336194
    Depositing User: IR Editor
    Date Deposited: 26 Sep 2025 11:46
    Journal or Publication Title: IEEE Communications Surveys & Tutorials
    Publisher: IEEE
    Refereed: Yes
    Related URLs:
    URI: https://mural.maynoothuniversity.ie/id/eprint/20617
    Use Licence: This item is available under a Creative Commons Attribution Non Commercial Share Alike Licence (CC BY-NC-SA). Details of this licence are available here

    Repository Staff Only (login required)

    Item control page
    Item control page

    Downloads

    Downloads per month over past year

    Origin of downloads