stochastic geometry and random graphs for the analysis …mhaenggi/pubs/jsac09.pdfstochastic...

18
1 Stochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi, Senior Member, IEEE, Jeffrey G. Andrews, Senior Member, IEEE, Franc ¸ois Baccelli, Olivier Dousse, Member, IEEE, and Massimo Franceschetti, Member, IEEE (Invited Paper) Abstract—Wireless networks are fundamentally limited by the intensity of the received signals and by their interference. Since both of these quantities depend on the spatial location of the nodes, mathematical techniques have been developed in the last decade to provide communication-theoretic results accounting for the network’s geometrical configuration. Often, the location of the nodes in the network can be modeled as random, following for example a Poisson point process. In this case, different techniques based on stochastic geometry and the theory of random geometric graphs – including point process theory, percolation theory, and probabilistic combinatorics – have led to results on the connectivity, the capacity, the outage probability, and other fundamental limits of wireless networks. This tutorial article surveys some of these techniques, discusses their application to model wireless networks, and presents some of the main results that have appeared in the literature. It also serves as an introduction to the field for the other papers in this special issue. Index Terms—Tutorial, wireless networks, stochastic geometry, random geometric graphs, interference, percolation I. I NTRODUCTION Emerging classes of large wireless systems such as ad hoc and sensor networks and cellular networks with multihop cov- erage extensions have been the subject of intense investigation over the last decade. Classical methods of communication theory are generally insufficient to analyze these new types of networks for the following reasons: (i) The performance- limiting metric is the signal-to-interference-plus-noise-ratio (SINR) rather than the signal-to-noise-ratio (SNR). (ii) The interference is a function of the network geometry on which the path loss and the fading characteristics are dependent upon. (iii) The amount of uncertainty present in large wireless networks far exceeds the one present in point-to-point systems: it is impossible for each node to know or predict the locations and channels of all but perhaps a few other nodes. Two main tools have recently proved most helpful in cir- cumventing the above difficulties: stochastic geometry [1] and random geometric graphs [2], [3]. Stochastic geometry allows to study the average behavior over many spatial realizations of a network whose nodes are placed according to some probability distribution. Random geometric graphs capture the distance-dependence and randomness in the connectivity of the nodes. This paper provides an introduction to these mathematical tools and discusses some recent results that were enabled by them, with the objective of being a first-hand tutorial for the researcher interested in the field. A. The role of the geometry and the interference Since Shannon’s work [4], for the second half of the 20th century the SNR has been the main quantity of interest to communication engineers that determined the reliability and the maximum throughput that could be achieved in a communication system. In a wireless system, the SNR can vary among different users by as much as ten to hundreds of dBs due to differences in path loss, shadowing due to buildings and obstructions, fading due to constructive or destructive wave interference. The first-order contributor to this SNR variation is the path loss. In a cellular system for example, it is not uncommon for a user close to the base station to have a channel that is a million times (60 dB) stronger than the one of a user located near the cell’s edge. If the receivers are randomly located in space, then the different SNRs due to the different path losses between them and the base station can be modeled as having a spatial distribution. In a wireless network with many concurrent transmissions, the situation is even more complicated. In this case, the SINR becomes the relevant figure of merit for the system 1 . Not only the received signal power is random due to the random spatial distribution of the users, but also the interference power is governed by a number of stochastic processes including the random spatial distribution of the nodes, shadowing, and fading. The SINR for a receiver placed at the origin o in the 2 or 3-dimensional Euclidean space can be written as: SINR = S W + I , where I = i∈T P i h i (x i ) , (1) where S, W , and I are the desired signal, noise, and interfer- ence powers, respectively. The summation for I is taken over the set of all interfering transmitters T , P i is the transmit power, h i is a random variable that characterizes the cumu- lative effect of shadowing and fading, and is the path loss function, assumed to depend only on the distance x i from the origin of the interferer situated at position x i in space. Often is modeled as a power law, (x i )= k 0 x i α , or in environments where absorption is dominant, as an exponential law, (x i ) = k 0 exp(γ x i ), see [5], [6]. In a large system, the unknowns are T , h i , and x i , and perhaps P i , but it is the locations of the interfering nodes that most influence the SINR levels, and hence, the performance of the network. The 1 In many practical situations such as cellular networks and reasonably dense ad hoc networks, the noise is typically negligible and SIR can be used interchangeably with SINR without any appreciable loss of accuracy.

Upload: others

Post on 22-Mar-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

1

Stochastic Geometry and Random Graphs for theAnalysis and Design of Wireless Networks

Martin Haenggi,Senior Member, IEEE, Jeffrey G. Andrews,Senior Member, IEEE, Francois Baccelli,Olivier Dousse,Member, IEEE, and Massimo Franceschetti,Member, IEEE

(Invited Paper)

Abstract—Wireless networks are fundamentally limited by theintensity of the received signals and by their interference. Sinceboth of these quantities depend on the spatial location of thenodes, mathematical techniques have been developed in the lastdecade to provide communication-theoretic results accounting forthe network’s geometrical configuration. Often, the location ofthe nodes in the network can be modeled as random, followingfor example a Poisson point process. In this case, differenttechniques based onstochastic geometry and the theory of randomgeometric graphs – including point process theory, percolationtheory, and probabilistic combinatorics – have led to results onthe connectivity, the capacity, the outage probability, and otherfundamental limits of wireless networks. This tutorial articlesurveys some of these techniques, discusses their applicationto model wireless networks, and presents some of the mainresults that have appeared in the literature. It also servesasan introduction to the field for the other papers in this specialissue.

Index Terms—Tutorial, wireless networks, stochastic geometry,random geometric graphs, interference, percolation

I. I NTRODUCTION

Emerging classes of large wireless systems such as ad hocand sensor networks and cellular networks with multihop cov-erage extensions have been the subject of intense investigationover the last decade. Classical methods of communicationtheory are generally insufficient to analyze these new typesof networks for the following reasons: (i) The performance-limiting metric is the signal-to-interference-plus-noise-ratio(SINR) rather than the signal-to-noise-ratio (SNR). (ii) Theinterference is a function of thenetwork geometryon whichthe path loss and the fading characteristics are dependentupon. (iii) The amount of uncertainty present in large wirelessnetworks far exceeds the one present in point-to-point systems:it is impossible for each node to know or predict the locationsand channels of all but perhaps a few other nodes.

Two main tools have recently proved most helpful in cir-cumventing the above difficulties: stochastic geometry [1]andrandom geometric graphs [2], [3]. Stochastic geometry allowsto study the average behavior over many spatial realizationsof a network whose nodes are placed according to someprobability distribution. Random geometric graphs capturethe distance-dependence and randomness in the connectivityof the nodes. This paper provides an introduction to thesemathematical tools and discusses some recent results that wereenabled by them, with the objective of being a first-handtutorial for the researcher interested in the field.

A. The role of the geometry and the interference

Since Shannon’s work [4], for the second half of the 20thcentury the SNR has been the main quantity of interestto communication engineers that determined the reliabilityand the maximum throughput that could be achieved in acommunication system. In a wireless system, the SNR canvary among different users by as much as ten to hundreds ofdBs due to differences in path loss, shadowing due to buildingsand obstructions, fading due to constructive or destructivewave interference. The first-order contributor to this SNRvariation is the path loss. In a cellular system for example,it is not uncommon for a user close to the base station to havea channel that is a million times (60 dB) stronger than theone of a user located near the cell’s edge. If the receivers arerandomly located in space, then the different SNRs due to thedifferent path losses between them and the base station can bemodeled as having aspatial distribution.

In a wireless network with many concurrent transmissions,the situation is even more complicated. In this case, the SINRbecomes the relevant figure of merit for the system1. Notonly the received signal power is random due to the randomspatial distribution of the users, but also the interference poweris governed by a number of stochastic processes includingthe random spatial distribution of the nodes, shadowing, andfading. The SINR for a receiver placed at the origino in the2 or 3-dimensional Euclidean space can be written as:

SINR =S

W + I, where I =

i∈T

Pihiℓ(‖xi‖) , (1)

whereS, W , andI are the desired signal, noise, and interfer-ence powers, respectively. The summation forI is taken overthe set of all interfering transmittersT , Pi is the transmitpower,hi is a random variable that characterizes the cumu-lative effect of shadowing and fading, andℓ is the path lossfunction, assumed to depend only on the distance‖xi‖ fromthe origin of the interferer situated at positionxi in space.Oftenℓ is modeled as a power law,ℓ(‖xi‖) = k0‖xi‖−α, or inenvironments where absorption is dominant, as an exponentiallaw, ℓ(‖xi‖) = k0 exp(−γ‖xi‖), see [5], [6]. In a largesystem, the unknowns areT , hi, andxi, and perhapsPi, but itis the locations of the interfering nodes that most influencetheSINR levels, and hence, the performance of the network. The

1In many practical situations such as cellular networks and reasonablydense ad hoc networks, the noise is typically negligible andSIR can be usedinterchangeably with SINR without any appreciable loss of accuracy.

Page 2: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

2

interference is a function of the underlying node distribution(and mobility pattern for mobile networks) and the channelaccess scheme.

A key objective of this tutorial and special issue is to showthat the SINR in (1) can be characterized using stochastictechniques, and key related metrics such as outage probability,coverage, connectivity, and capacity can therefore be quanti-fied.

B. Historical background

Although there has been growing recent interest in the useof stochastic geometry and random graph theory to describewireless networks, some of the underlying approaches go back100 years, or more. Wireless network performance is mostlyinterference-limited, and a large number of users contribute tothe interference in vastly varying magnitudes, as described bythe interference function stated in (1), which is ashot noiseprocess. In one dimension, a shot noise process is defined as

I(x) =

∞∑

i=−∞

g(x − Xi), (2)

where{Xi} is a stationary Poisson process onR andg(x) isthe impulse response of a linear system. In its two-dimensionalgeneralization,x represents a point on the plane and thePoisson point process is onR2. Wheng(x) depends only onthe Euclidean norm‖x‖, it can be identified with the pathloss functionℓ(‖x‖), and I(x) is the aggregate interferencereceived at pointx in a wireless network, without fading.The shot noise process has been studied at least dating backto Campbell in 1909 [7], who characterized its mean andvariance, followed by Schottky in 1918 [8]. In addition, Riceperformed extensive investigations on the distribution ofI(x)from 1940 through 1970 [9]. Power law shot noise – mostrelevant here – was considered by Lowen and Teich in 1990[10].

Stochastic geometry has been used as a tool for characteriz-ing interference in wireless networks at least as early as 1978[11], and was further advanced by Sousa and Silvester in theearly 1990s [12]–[14]. At that time, two useful mathematicstexts were available to researchers: Stoyan et al.’s stochasticgeometry first edition in 1987 (see [1] for the second edition)and Kingman’s Poisson Processes [15]. In the late 1990’s,Ilow and Hatzinakos [16] characterized the impact of randomchannel effects – fading, shadowing, path loss, and combina-tions thereof – on the aggregate co-channel interference, whileBaccelli et al. also began developing tools primarily basedonPoisson Voronoi tesselations and Delaunay triangulationsforthe optimization of hierarchical networks [17], [18] and ofmobility management in cellular networks [19]. For a surveyon this line of research, see the forthcoming book chapter byZuyev [20].

In the past ten years, stochastic geometry and associatedtechniques have been applied and adapted to cellular systems[21]–[24], ultrawideband [25], cognitive radio [26]–[28], fem-tocells [29], [30], relay networks [31], and many other typesof wireless systems. However, perhaps the largest impact hasbeen in the area of ad hoc networks, which are fully distributed

and in which all participating nodes – both transmitters andreceivers – are randomly located. In such networks, it isimpossible even with unlimited overhead to control the SINRsof all users, due to the coupling of interference: if one userraises its power, it causes an interference increase to allother communicating pairs. In this case, characterizing the(stochastic) geometry of the network is of utmost importancesince it is the first-order determinant of the SINR.

The idea of modeling wireless networks using randomgraphs dates back to Gilbert [32], whose paper marks thestarting point for continuum percolation theory. He considereda random network formed by connecting points of a Poissonpoint process that are sufficiently close to each other. Usingthis model, he proved the existence of a critical connectiondistance above which an infinite chain of connected nodesforms and below which, in contrast, any connected componentis bounded. His investigations were based on prior work on thediscrete percolation model of Broadbent and Hammersley [33]and on the theory of branching processes [34]. Gilbert’s origi-nal model has undergone many generalizations, and continuumpercolation theory is now a rich mathematical field, see [2],[35]. Extensions most relevant to us consider graphs whichaccount for interference-limited communication. In this case,the graph connectivity depends on the SINR at differentnodes. These are studied in [36] and [37]. Another relevantgeneralization is the random connection model [38], whichis a random graph that can account for random connectionsdue to shadow fading effects; as well as nearest neighbornetwork models [39]. Finally, a coverage model for wirelessnetworks based on percolation theory was introduced in [40].A compendium of random graph results related to wirelesscommunications appears in [3]. Elements of random graphshave also proven to be useful to characterize the scalingbehavior of the capacity of wireless networks [41].

C. Paper overview and organization

In §II, we provide an overview of the key mathematicaltools, including point processes, random geometric graphs, andpercolation. In§III, the interference is characterized, and it isshown that the outage probability is a natural metric to studyin a spatially random wireless network. We then move to otherperformance metrics, such as the connectivity of the networkand its coverage in§IV, and the data-carrying capacity andarea spectral efficiency of the network in§V. We concludeby providing some additional applications of these results,including epidemic models, wireless security, and transmissionprotocol design. The notation and symbols used in the paperare listed in Table I.

II. M ATHEMATICAL PRELIMINARIES

Stochastic geometry [1] is a rich branch of applied prob-ability which allows the study of random phenomena on theplane or in higher dimensions. It is intrinsically related to thetheory of point processes [42]. Initially its development wasstimulated by applications in biology, astronomy and materialsciences. Nowadays, it is also used in image analysis and inthe context of communication networks.

Page 3: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

3

Symbol Definition/explanation[k] the set{1, 2, . . . , k}

Z, N integers, positive integersR, R

+ real numbers, positive real numbers1A(x) indicator functionu(x) , 1{x>0}(x) (unit step function)

d number of dimensions of the network#A cardinality ofAP(A) probability of eventAE(X) expectation of random variableX

LX (s) = E(e−sX) Laplace transform of random variableX| · | Lebesgue measure‖ · ‖ Euclidean norm

o origin in Rd

B a Borel subset ofR or Rd

B(x; r) ball of radiusr centered atxcd , πd/2/Γ(1 + d/2)

(volume of thed-dim. unit ball)α path loss exponent

FX (x) = P(X 6 x) distribution of random variableX (cdf)Φ = {Xi} ⊂ R

d point processΛ, λ counting measure and density forΦ

pc, λc critical probability, density for percolationh (power) fading random variable (E(h) = 1)

T ∈ R+ SIR or SINR threshold for successful communication

ǫ ∈ (0, 1) target outage probability for transmission capacityℓ : R → R

+ (isotropic) large-scale path loss functionW thermal noise

TABLE INOTATION AND SYMBOLS USED IN THE PAPER.

A. Point processes

The most basic objects studied in stochastic geometry arepoint processes. Visually, a point process can be depictedas a random collection of points in space. More formally, apoint process (PP) is a measurable mappingΦ from someprobability space to the space of point measures (a pointmeasure is a measure which is locally finite and which takesonly integer values) on some spaceE. Each such measure canbe represented as a discrete sum of Dirac measures onE:

Φ =∑

i

δXi .

The random variables{Xi}, which take their values inE arethe points ofΦ. Most often, the spaceE is the EuclideanspaceR

d of dimensiond ≥ 1. The intensity measureΛ ofΦ is defined asΛ(B) = EΦ(B) for Borel B, whereΦ(B)denotes the number of points inΦ ∩ B.

A few dichotomies concerning point processes on EuclideanspaceR

d are as follows:

• A PP can be simple or not. It is simple if the multiplicityof a point is at most one (no two points are at the samelocation).

• A PP can bestationaryor not. Stationarity holds if thelaw of the point process is invariant by translation.

• A PP can be Poisson or not. A formal definition of thePoisson point process (PPP) is given in the following sub-section. A PPP offers a handy computational frameworkfor different network quantities of interest.

– A PPP can be homogeneous or not. In the homo-geneous case, the density of the points is constantacross space.

– The homogeneous PPP is stationary and simple. Thismay be considered as the simplest (and most natural)point process.

– The framework for non-homogeneous PPPs is alsowell developed, although more technical than that ofthe homogeneous case. They can be used to modeldistributions of users which are not uniform acrossspace.

– There is also a comprehensive computational frame-work for stationary point processes which are notPoisson. This is Palm calculus (see below).

• A point process can beisotropicor not. Isotropy holds ifthe law of the PP is invariant to rotation. The homoge-neous PPP is isotropic. If a PP is isotropic and stationary,it is calledmotion-invariant.

• A PP can be marked or not; marks assign labels to thepoints of the process, and they are typically independentof the PP and i.i.d. The study of marked point processesmay require the handling of Palm calculus.

1) Poisson point processes:Let Λ be a locally finite mea-sure on some metric spaceE. A point processesΦ is Poissonon E if

• For all disjoint subsetsA1, · · · , An of E, the randomvariablesΦ(Ai) are independent;

• For all setsA of E, the random variablesΦ(A) arePoisson.

A key property states that conditionally on the fact thatΦ(A) = n, thesen points are independently (and uniformlyfor homogeneous PPP) located inA. This leads to an explicitrepresentation of the Laplace functional ofΦ. If E = R

d, thisLaplace functional is defined for general point processesΦ by

LΦ(f) , E

[

e−R

Rd f(x)Φ(dx)]

= E

[

e−P

X∈Φf(X)

]

,

wheref is a non-negative function onRd. In the Poisson case,

LΦ(f) = exp

(

−∫

Rd

(

1 − e−f(x))

Λ(dx)

)

. (3)

This is the basis for a large number of formulas like,e.g., thoseon the Laplace transform of the shot noise (or interference),see§III. Other appealing features of PPPs are their invarianceto a large number of key operations. In particular,

• The superposition of two or more independent PPPs(which is defined as the sum of the associated pointmeasures) is again a PPP; this can be extended todenumerable sums under some conditions.

• The independent thinning of a PPP is again a PPP;this can be extended to the case of location-dependentthinning, where a point is retained or not depending onits location.

• The point process obtained by displacing pointXi inde-pendently of everything else according to some Markovkernel K(Xi, ·) that defines the distribution of the dis-placed position of the pointXi yields another PPP; thisresult is often referred to as the displacement theorem.

In each case, the intensity of the resulting PPP can be obtainedin closed form from that of the initial PPP and the involvedtransformations (e.g., the thinning probability or the kernelK).

Page 4: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

4

If ρ(x, ·) is the probability density pertaining to the Markovkernel applied to a PPP of intensityλ(x) on R

d, the displacedpoints form a PPP of intensity

λ′(y) =

Rd

λ(x)ρ(x, y)dx .

In particular, if λ(x) is constantλ and ρ(x, y) is a functionof y − x only, thenλ′(y) = λ for all y.

A striking property of PPPs is Slivnyak’s theorem whichstates that the law ofΦ−δx conditional on the fact thatΦ hasa point atx is the same as the law ofΦ. In mathematical terms,the reduced Palm probabilityP x! of a PPP is the distributionof this Poisson point process itself. This is usually expressed asP x! = P , for all pointsx ∈ Φ. This means that the propertiesseen from a pointx ∈ R

d are the same whether we conditionon having a pointx ∈ Φ or not — if the point atx is notconsidered. For example, we have for the mean number ofpoints within distancer of x:

EΦ(B(x; r) \ {x}) = E

(

Φ(B(x; r) \ {x}) | x ∈ Φ)

= Λ(B(x; r)) ,

whereB(x; r) is the ball of radiusr centered atx.2) Stationary point processes:The theory of stationary

point processes is based on the concept of marks and on theMatthes definition of Palm probability [42], [43].

Roughly speaking, a mark of some point of a stationarypoint process is a quantity that “follows this point” whenthe collection of points is transported by a global translationoperation. For instance, the local configuration of neighborsof point X , which is defined as the collection of points in aball of radiusR centered atX , is a mark of this point. IfRis infinity, this mark is the universal mark ofX , namely ’thepoint process seen fromX ’.

The Palm probabilityP o of a stationary point process isthe law of this universal mark, which can be shown to be thesame for all points. It can be understood as the law of the pointprocess given that it has a point at the origin. As defined hereP o is a probability on the space of point measures.

Campbell’s formula for stationary point processes, which isa direct consequence of the last definition, states that whendenoting byΦ− x the global translation of all points ofΦ bythe vectorx, then

E

[

X∈Φ

f(X, Φ− X)

]

=

N

Rd

f(x, φ)λdxP o(dφ), (4)

where N is the space of simple point sequences, for allpositive functionsf(x, φ) of x ∈ R

d and φ a point measureon R

d. Hereλ is the intensity ofΦ, that is the mean numberof points per unit space. The last formula is the key toolfor computing the mean values of sums on the points of astationary point process. Applied to PPPs, they are particularlysimple. LetΦ be a stationary PPP of intensityλ on R

d. Thenfor non-negativef ,

E

(

X∈Φ

f(X)

)

= λ

Rd

f(x)dx (5)

and

var

(

X∈Φ

f(X)

)

= λ

Rd

f2(x)dx . (6)

These expressions can be used, for example, to calculate themean and variance of the interference in a network or todetermine the mean node degree.

Important examples of stationary point processes that leadto nice computational results include

• point processes with repulsion,e.g., Matern hard corepoint processes or determinantal point processes;

• point processes with attraction,e.g., Neyman-Scott clusterprocesses, permanental point processes [44] or Hawkespoint processes [45].

For more on this, see [1] and [42].

B. Boolean models and random geometric graphs

1) The germ–grain model:The most celebrated model ofstochastic geometry and the basic model of continuum per-colation is the Boolean or germ-grain model. In the simplestsetting, the Boolean model is based on a Poisson point processΦ, the points of which,{Xi}, are also calledgerms, and on anindependent sequence of i.i.d. compact sets{Ki} called thegrains. Formally, the Boolean model is

Ξ =⋃

i

(Xi + Ki)

whereXi + Ki = {Xi + y, y ∈ Ki}.The Poisson set of germs and the independence of the

grains make the Boolean model analytically tractable. It isoften considered as the null hypothesis in stochastic geometrymodeling.

Among the key results on this model, let us quote (from[1]):

• Coverage: the simplest coverage question is the distri-bution of the number of grains that intersect a givencompact set, for instance a given location of the space.This distribution is Poisson.

• Volume fraction: in the homogeneous case, what is thefraction of a big ball which is covered by grains? This canbe derived using the analysis of coverage and an ergodictheorem.

• Contact distribution: given that a location is not covered,what is the radius of the bigest ball (resp. length of thelongest segment of orientationθ) centered at this locationthat does not intersect any grain of the Boolean model?

These questions extend to many other models, either with non-Poisson germs, or with Poisson germs but grains that are noti.i.d. An interesting application in the context of networks isconsidered in [46], where the grains are SINR cells, namelythe region of the space around a transmitter where the SINRwith respect to this transmitter exceeds a given threshold.Herethe interference is the field created by the other points of thePoisson point process.

Page 5: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

5

2) Gilbert’s random disk graph:This is a model for wire-less networks that is a special case of the Boolean modeldescribed above, and is due to Gilbert [32]. Assume that thecompact sets described in the last subsection are all balls ofradiusr/2. We define the random disk graph of a Poisson pointΦ process of intensityλ with ranger, denoted asGλ,r as thegraph with nodes the points ofΦ and with edges betweenXandY if the two grains touch,i.e., if ‖X − Y ‖ ≤ r. This isthe most basic random geometric graph and a central object inrandom graph theory. The following questions are of particularinterest within this setting:

• Does this random graph has an infinite component? Thisis of course equivalent toΞ having an infinite component.This property is referred to aspercolation. A strikingresult is that there is a deterministic critical value0 <rc < ∞ such that whenr < rc, there is no such infinitecomponent with probability 1 (i.e., there is no percolationfor all realizations ofΦ), whereas whenr > rc, there isan infinite component with probability 1 (i.e., there ispercolation for all realizations ofΦ). This is proven in§IV-C.

• In case percolation occurs, what is the fraction of nodesincluded in the infinite component? In case of it does notoccurr, what is the typical size of a component?

The main tool for addressing these continuum percolationquestions is a reduction to discrete bond or site percolation.For more on the matter, see [3], [35], [47].

C. Voronoi tessellation

By definition, a tessellation is a collection of open, pairwisedisjoint polyhedra (polygons in the case ofR

2) whose closurescover the space, and which is locally finite (i.e., the numberof polyhedra intersecting any given compact set is finite).

Given a simple point measure (or point sequence)φ on Rd

and a pointx ∈ Rd, we define theVoronoi cellCx(φ) of the

point x ∈ Rd w.r.t. φ to be the set

Cx(φ) = {y ∈ Rd : ‖y − x‖ < inf

xi∈φ,xi 6=x‖y − xi‖} . (7)

For a simple point processΦ =∑

i δXi on Rd, we define

the Voronoi tessellationor mosaicgenerated byΦ to be themarked point process

V =∑

i

δ(Xi,CXi(Φ)−Xi) ,

whose marks are the Voronoi cells shifted to the origin.The Delaunay triangulationgenerated by a simple point

measureφ is a graph with the set of verticesφ and edgesconnecting eachy ∈ φ to any of its Voronoi neighbors.

The Delaunay triangulation of a Poisson point process is anobject of central importance in communications. In a regularperiodic (say hexagonal or triangular) grid it is obvious how todefine the neighbors of a given vertex. However, for irregularpatterns of points like a realization of a PPP, which is oftenused to model set of nodes in mobile ad hoc networks, thisnotion is much less evident. The Delaunay triangulation offerssome purely geometric definition of neighborhood in suchpatterns.

For quantitative properties of Poisson–Voronoi tessellations(mean cell size, mean number of sides of the cell, etc.)and Poisson–Delaunay graphs (mean degree, mean length ofa typical edge, mean size of a typical triangle) see,e.g.,[48]. In [17], [18], [49], Voronoi tessellation-based models ofcellular access network were considered to derive closed-formexpressions for the mean number of users in a cell, the meanlength of connections, and the total power received at the basestation.

III. I NTERFERENCECHARACTERIZATION AND OUTAGE

In this section we apply some of the techniques introducedabove to study the interference in large ad hoc networks andthe outage probability of any given link.

A. Interference

We start with the general question: what can be said of thetotal interference power measured at a pointx in the network,given by

I(x) ,∑

Y ∈Φt

ℓ(‖x − Y ‖) ,

where Φt is a point process of transmitters (assumed to beinterferers) onR2? Φt is typically a subset of a larger pointprocessΦ since it constitutes the nodes selected by the MACscheme to transmit concurrently. For example, if nodes in ahomogeneous PPP of intensity1 transmit independently andrandomly with probabilityp (slotted ALOHA), Φt is a PPPwith intensity p. Due to Slivnyak’s result (see§II-A1), I(x)does not depend on the given location where interferenceis measured; in particular, it does not matter whetherx ispart of the underlying point processΦ or not (as long as itscontribution toI is not considered ifΦt is conditioned onhaving a point atx).

As mentioned in§I-B, researchers have followed an analogyto shot noise processesto analyze the distributional propertiesof I(x) [9], [16], [50]. This analogy can be used to derive theLaplace transform of the interference as follows.

Let Φ , {Ri = ‖Xi‖} be the distances of the pointsof a d-dimensional uniform PPP of intensityµ from anarbitrary origin o. Then Φ is an inhomogeneous PPP withintensity functionλ(r) = µcddrd−1, where cd = |B(o, 1)|is the volume of thed-dimensional unit ball. Considering theinterference as a shot noise process (2), and also accountingfor the fading terms, we can identifyhrℓ(r) = hrr

−α for i.i.d.fadingh with the impulse response of the shot noise process.We would then like to calculate the Laplace transform

LI(s) , E[e−sI ] = E

[

R∈Φ

exp(

−shRR−α)

]

of the interference. This is a Laplace functional withf(r) =sℓ(r) = shrr

−α. The expectation is to be taken over bothΦ andh, but since the fading is assumed independent of thepoint process, the expectation overh can be moved inside the

Page 6: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

6

product, so we have from (3) (see also [61, Eqn. (3)])

LI(s) = exp

{

−∫ ∞

0

Eh[1 − e−shr−α

]λ(r)dr

}

= exp(

− µcdE[hδ]Γ(1 − δ)sδ)

, (8)

where δ , d/α. Note that this expression is only valid forδ < 1. So:

• For α 6 d, we haveI = ∞ a.s. This is a consequence ofthe cumulated interference from the many far transmitterswhose signal powers do not decay fast enough to keepthe interference power finite. For a finite network, theinterference would be finite.

• For α > d we haveI < ∞ a.s. butE(I) = ∞ due to thesingularity of the path loss law at the origin. Even if weconsider only the nearest interferer,E(I) is infinite. If abounded path loss law is used, all moments exist.

In the important case of Rayleigh fading,E[hδ] = Γ(1 + δ),so, using the properties of the gamma function, we obtain theclosed-form result

LI(s) = exp(

− µcdsδ πδ

sin(πδ)

)

.

So the interference has astable distributionwith character-istic exponentδ and dispersionµcdE[hδ]Γ(1−δ). Sinceδ < 1,I does not have any finite moments.

A closed-form expression for the interference distributiononly exists forδ = 1/2; this is the inverse Gaussian or Levydistribution, as has been established in [51].

Using the distribution of the distances to then-th nearestneighbor [52], the distributions of the interference (withoutfading) from then-th nearest neighbor are easily found. Thetail probabilities do not depend on the presence or type offading and are given by

P(In > x) ∼ 1

n!(λcd)

nx−nδ , x → ∞ .

This means thatE(Ipn) exists for p < nδ. For example, if

interference-canceling techniques are used and the interferencefrom thek nearest interferers can be cancelled, we needk > αin two-dimensional networks to have a finite second moment.

If the non-singular path loss modelℓ(x) = (1 + ‖x‖)−α

is used, the tail probability of the interference reflects the tailprobability of the fading process: If the fading has an expo-nential or power-law tail, so does the interference. This holdsfor general motion-invariant processes [53]. Other approachesto the singularity issue are given in this issue [54], [55].

B. Outage

An outageof a wireless link is said to occur when a packettransmission fails. In many situations, it is justified to equatethe outage event to the event thatSINR < T for some thresholdT that depends on the physical layer parameters such as rateof transmission, modulation, and coding. The complementaryprobability is the success probabilityps , P(SINR > T ).

In the case where the desired signalS is subject to Rayleighfading, we obtain for the success probability over a link of

distanceR

ps = P(S > T (W + I)) = exp

(

−TRαW

P

)

E(e−TRαI) ,

(9)whereP is the transmit power. The first term only dependson the noise (or SNR), while the second only depends on theinterference (or SIR). Focusing on this interference term wenotice that this is the Laplace transform of the interferenceevaluated ats = TRα. So, in ad-dim. interference-limitednetwork whose nodes are distributed as a uniform PPP ofintensity λ with ALOHA channel access with probabilityp,the success probability is given by (8), replacings by TRα:

ps = exp(

− λpcdRdE[hδ]Γ(1 − δ)T δ

)

(10)

Here we have used the fact that ALOHA channel accessperforms independent thinning of the PPP, which results ina PPP of lower intensity. The interferers’ channels may besubject to a different type of fading (or no fading), all thatmatters isE[hδ].

The equivalence of Laplace transforms and success proba-bilities has been pointed out in [56]–[58], and in [58] severalgeneralizations can be found.

C. Throughput

The transmission success probability in the previous subsec-tion is derived assuming that the desired transmitter transmitswhile the received listens. To optimize the network parameters,such as the ALOHA transmit probabilityp, the unconditionedsuccess probabilities must be considered. In the case ofALOHA and half-duplex transceivers, thespatial throughputis p(1 − p)ps(p). Finding the optimump means finding theoptimum trade-off between spatial reuse (a largerp resultsin a higher density of concurrent transmissions) and successprobabilities (a largerp results in higher interference and thus alower success probability). In [58], a related metric, thespatialdensity of successpps is optimized in function ofp. In somecases, the optimal value, which is known in closed form, doesnot depend on the intensityλ of the underlying point process.

The same framework can also be used to find the optimumvalue for the SINR thresholdT that maximizes thearea spec-tral efficiency. A larger T permits higher transmission rates(or spectral efficiencies if normalized by the bandwidth) butresults in lower success probabilities (see further discussionin §V-B). Similarly, theprobabilistic progress, usually definedas the product of distance times success probability can bemaximized by finding the optimum link distanceR [59].Choosing a largerR may increase the progress but comeswith the disadvantage of a lower success probability [60]. In[58], an expression for progress based on extremal shot noiseis derived, and in [61], the distribution and the mean valueof the throughput of a typical user (as given by Shannon’sformula) are given using Fourier transform techniques.

IV. PERCOLATION AND CONNECTIVITY

A. Introduction

Percolation theory was originally introduced to model theporosity of materials. It has since then developed into a lively

Page 7: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

7

branch of probability. More recently, percolation models havebeen used to model the connectivity of wireless multi-hopnetworks.

The main property of percolation models is that they exhibita phase transitionin their connectivity behavior: depending onsome (continuous) parameters, the components of the modelare either all finite (sub-critical case) or one giant componentforms (super-criticalcase). In the context of networking, sucha transition affects the performance of the system greatly:without a giant component, the network would be completelyfragmented and unusable. It is therefore of prime importanceto characterize the conditions under which the network issuper-critical. In this section, we cover some basics of per-colation theory, starting with the simplest models and prooftechniques, and then moving on to models that are moreappropriate for wireless networks.

Percolation theory deals mostly with models of infinite size.We start with these classical models and briefly address finitenetworks.

B. Discrete percolation: Bond percolation in infinite lattices

The bond percolation model is defined as follows: considerthe infinite square latticeZ2 and connect each pair of nearestneighbors independently with probabilityp. Then define thecomponent (orcluster) of the originC as the set of elements ofZ

2 that are connected to the origin by a sequence of adjacentedges. We define thepercolation probabilityas

θ(p) := P(#C = ∞).

The central result of percolation theory is the following:

Theorem 1 (Broadbent and Hammersley [33])Thereexists a number0 < pc < 1 such thatθ(p) = 0 for p < pc

and θ(p) > 0 for p > pc.

In the particular case of bond percolation onZ2, the exact

value ofpc is known to be1/2 [62]. Other specific cases andproperties ofθ(p) can be found in [47]. To prove Theorem 1,we need first to observe thatθ(p) is an increasing function.Although this is a very intuitive property, its proof is not sotrivial (see,e.g., [35, Ch. 2.2] for a general method). It is thenenough to prove that there exists some probabilityp1 > 0such thatθ(p1) = 0 and some probabilityp2 < 1 such thatθ(p2) > 0. The following two sections are devoted to findingp1 andp2.

1) Absence of percolation for small values ofp: We startfrom the observation that if the origin belongs to an infinitecluster, then for any integern, one can find in the lattice aself-avoiding path of lengthn starting at the origin. Thus wehave

θ(p) ≤ P(∃ a path of lengthn starting ato) ∀n . (11)

If all direct neighbors ofZ2 were connected by an edge, thenumberκ(n) of such path would be bounded from above by4·3n−1. Since edges are present with probabilityp, each of theseκ paths exists with probabilitypn. Using the union bound, wefind that

P(∃ a path of lengthn starting ato) ≤ 4p(3p)n−1.

Fig. 1. A realization of the bond percolation model onZ2 (plain lines) andits dual (dotted lines).

If p < 1/3, this quantity tends to zero whenn increases,so that (11) impliesθ(p) = 0. So we have established thatpc > 1/3.

2) Existence of an infinite cluster for sufficiently largep: Our proof relies on the classical Peierls argument [63].Consider the dual lattice ofZ2, which consists of vertices thatare shifted by half a unit in both directions, as depicted inFigure 1. An edge is placed between two direct neighbors ofthe dual lattice if it does not intersect an edge of the directlattice.

The key observation is that if a component is finite in theoriginal lattice, it is necessarily surrounded by a circuitin thedual lattice. To prove that a vertex (e.g., the origin) belongs toan infinite cluster with positive probability, it is thus enoughto show that the probability that a circuit surrounds the originin the dual lattice is less than one. Let us estimate the numberσ(n) of possible circuits of length2n that surround the origin:it is easy to see that it is bounded by

σ(n) ≤ (n − 1) · 32(n−1) .

Therefore, the probability that there exists a circuit around theorigin with all edges closed upper bounded by

P(closed circuit) ≤∞∑

n=2

(1 − p)2nσ(n)

=9(1 − p)4

[1 − 9(1 − p)2]2.

One can verify that whenp > 1 − 1/(2√

3) ≈ 0.71, theabove sum converges to a number smaller than one. As aconsequence, the origin belongs to an infinite cluster withpositive probability.

Note that since the existence of an infinite cluster does notdepend on the state of a finite number of edges, we can useKolmogorov’s zero-one law to conclude that the probabilitythat such a cluster exists is either zero or one (seee.g., [64]). Ifit was zero, then the origin would belong to an infinite clusteralso with probability zero. Therefore, wheneverθ(p) > 0, aninfinite cluster exists with probability one.

C. Continuum percolation: The random geometric graph

The basic random geometric graph or disk graphGλ,r, asdefined in§II-B2, relies on two assumptions: First, the nodes’location follows a two-dimensional Poisson point process.Second, each node can communicate directly to any othernode within a radiusr around it. The latter assumption comes

Page 8: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

8

from the following model: assume that nodes emit with acertain powerP and that this signal is attenuated over distanceaccording to a deterministic decreasing functionℓ(d). Assumealso that receivers can successfully receive data if the signalis at leastβ times stronger than the ambient noise, which haspowerW . Then the transmission radius is defined by

r , max{d :Pℓ(d)

W≥ β}. (12)

Similarly to the discrete model, we denote byθ(λ, r) theprobability that a node located at the origin belongs to aninfinite cluster. Due to its simplicity, the graphGλ,r can berescaled while keeping its connectivity properties. Indeed, if alldistances are divided byγ, the underlying PPP is transformedinto another Poisson process with intensityγ2λ. Thus, thegraphGγ2λ,r/γ has the same connectivity properties asGλ,r

and we haveθ(γ2λ, r/γ) = θ(λ, r).

As in the bond percolation model, we briefly explain a wayto show that a phase transition occurs inGλ,r.

1) Absence of an infinite cluster for small values ofλ:Consider a nodeo placed at the origin. We populate the setCof the nodes connected too step by step: at step zero, we setC = {o}. Then at each step, we add toC all nodes that sharean edge with an element ofC. As each node has on averageλπr2 edges, this process can be compared to a Galton-Watsonprocess [34] where each individual gives birth toλπr2 childrenin average. The difference is that in our process, the numberof nodes added at each step might be smaller, as some nodessharing edges with elements ofC might be already inC. It isknown that if the average number of children per individualin a Galton-Watson process is smaller than one, the processstops after a finite number of steps [34]. As our process growsmore slowly, it certainly stops in this case too. Therefore wehave that ifλ < 1/(πr2), the cluster of the origin is finite a.s.

2) Existence of a giant cluster for largeλ: We use amapping onto a bond percolation model: We divide the planeinto squares of sizec = r/2

√2 as shown in Figure 2. Each

square corresponds to a potential edge of the lattice, whichis added if at least one point of the Poisson process fallsinto this square. Thus, each edge is present with probabilityp = 1 − exp(−λc2), independently of the other edges. Asa consequence, ifλ ≥ log 2/c2, the edge percolation modelcontains an infinite cluster a.s.

Moreover, if two edges are adjacent, then by constructiontwo points of the Poisson process are located in squares thatshare at least at one corner. Therefore, the distance betweenthem is less than2

√2c = r, and they are connected in

Gλ,r. Accordingly, an infinite collection of connected edgescorresponds to an infinite set of connected points inGλ,r.We can thus conclude that ifλ ≥ log 2/c2, Gλ,r contains aninfinite cluster a.s.

The exact value of the critical densityλc(r) or critical radiusrc(λ) is unknown. Forλ = 1, the bounds1.1979 < rc <1.1988 were established with99.99% confidence in [65].

3) Generalization to the Boolean model:Gilbert’s randomgeometric graph is a particular case of the Boolean model (see§II-B). Let us consider a Boolean model of arbitrary dimension

2c

c

Fig. 2. On the left hand side, the division of the plane into squares. Onthe right hand side, each square is assigned to an edge of a bond percolationmodel (bold lines).

d where grains are balls whose radius is now random. It turnsout that for a suitable radius distribution, a phase transitionis observed at some critical germ density. Denoting byR the(random) radius of a ball, one can show [35] that whenever thedimension of the modeld is greater than one andE(R4) < ∞,there exists a critical value ofλ below which the union of theballs Ξ has only finite components and above which a giantcomponent forms.

D. Other models

In this section, we briefly describe other percolation modelsthat are relevant to communication networks. In all of them,the location of the nodes is modeled by a Poisson point processof densityλ over R

2. They differ only by the criterion usedfor adding edges between nodes.

1) Nearest-neighbors networks:In this model, each nodeconnects to itsk nearest neighbors. This model is for examplesuitable for a dense wireless network where nodes use powercontrol algorithm in order to be connected only to theirk firstneighbors.

An important property of this model is that the value ofλ does not affect the connectivity of the model (it is calleda scale-freemodel). Therefore, its only relevant parameter isk. One can show that there exists a critical value ofk forwhich a giant component forms, and below which only finiteclusters are observed. In two dimensions, the critical value isconjectured to bek = 3 [39].

2) Random connection model:This model is another gen-eralization of Gilbert’s model. For each pair of nodes, weconsider the distancex between them. Then we add an edgebetween them with probabilityg(x), whereg is a functionfrom R

+ to [0, 1] such that∫∞

0 xg(x)dx < ∞.This model takes some randomness of the wireless channel

into account: nodes connect to each other probabilistically,depending on their distances. The probability of failed connec-tion can for example model a shadow fading effect. Gilbert’soriginal model can be retrieved by settingg(x) = u(r − x).A similar phase transition as in Gilbert’s model can beobserved at some critical density of nodesλ [38]. One relevantquestion is how this critical density changes with the shapeofthe connection functiong(x). The work in [66] has shownthat under some spreading transformations ong, the critical

Page 9: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

9

density cannot increase. The spread-out limiting case has alsobeen worked out in [67], showing that in the case of verylong, unreliable connections, the critical density has a limitcorresponding to that of an independent branching process,i.e. the average degree of the corresponding random graph atthe percolation threshold tends to 1. Alternative proofs ofthesespreading results also appear in [68], [69].

3) Signal-to-interference ratio graph (STIRG) model:Theconnectivity criterion in (12) compares the received signal tothe ambient noise only. However, if several nodes are usingthe same channel, interference degrades the received signals.In the so-called STIRG model [36], [37], the SNR thresholdis replaced by an SINR threshold as in (9) so that the nodesXi, Xj ∈ Φ are connected by an edge if

Pℓ(‖Xi − Xj‖)W + γ (max{I(Xi); I(Xj)} − Pℓ(‖Xi − Xj‖))

≥ T,

whereI(Xi) =∑

Xk∈Φ\{Xi}Pℓ(‖Xi −Xk‖). This condition

ensures that the two nodes have a sufficiently high SINR toexchange data in both directions despite the interference of allthe other nodes. The factorγ ≤ 1 serves as a weight for theinterference term and models the gain of the spread spectrumscheme (if any).

This model differs from the others by the fact that if hasmore degrees of freedom. Clearly, whenγ = 0, the modelis equivalent to Gilbert’s model, and it percolates above thecritical node density for Gilbert’s graphλc. In the case ofattenuation function of bounded support, it has been shownin [36] that for large enoughλ one can chooseγ small enoughso that the model percolates. This result has been strengthenedin [37] to show that this is the case wheneverλ > λc andalso for attenuation functions of unbounded support. In otherwords, whenever the node density is super-critical (in Gilbert’ssense), the model can tolerate a certain amount of interferencebefore the giant component disappears. Figure 3 gives a picto-rial representation of this mathematical result obtained throughcomputer simulation, illustrating the parameter domain wherepercolation occurs for a power attenuation functionℓ(·) ofbounded support.

E. Connectivity in finite networks

In finite networks, there is of course no infinite cluster,and therefore no percolationstricto sensu. However, if oneconsiders a sufficiently large network, one expects to observea similar phenomenon: if the density of nodes is large enough,a component that contains a large fraction of the nodesshould emerge. The following theorem follows from [70] andconfirms this intuition in the case of Gilbert’s disk graph.

Theorem 2 Consider the restriction of a Boolean model to asquare of size

√n×√

n, whose connectivity graph is denotedby Gλ,r(n). Denote byCλ,r(η, n) the event that there exists inGλ,r(n) a component that contains at leastηn vertices. Thenwe have

limn→∞

P(Cλ,r(η, n)) =

{

1 if η < θ(λ, r)0 if η > θ(λ, r)

0

0.01

0.02

0.03

0.04

0.05

0.06

0.07

0 2 4 6 8 10 12

supercritical

subcritical

γ∗

λ

λc

Fig. 3. Percolation threshold of the STIRG model: in this figure, we evaluatedby simulation the region of the parameter space(λ, γ) where percolationoccurs (supercritical region).

As a consequence of the above theorem, sinceθ(λ, r) isnever equal to one, there is always a non-vanishing fractionof disconnected nodes in the network. However, if one lets theconnectivity ranger increase withn, the fraction of connectednodes can be made to converge to one. If the connectivityrange of the nodes is a functionr(n) of the number of nodes,the condition forasymptotic connectivity(i.e. the conditionunder which the probability that all nodes are connected tendsto one when then increases) is given by

r(n) =

log n

π+ c(n),

wherec(n) is any function such thatlimn→∞ c(n) = ∞. Thisresult can be deduced from [70] and has been published in itsexplicit form in [71]. A similar condition on the rate at whichp → 1 to observe full connectivity in a bond percolation modelon ann × n grid has been derived in [72].

Nearest-neighbor model:A similar result on asymptoticconnectivity has been derived for the nearest-neighbors model.The rate at which the number of neighborsk must increasewith n is [73]:

0.3043 logn ≤ k(n) ≤ 0.5139 logn .

In summary, tools from percolation theory and random ge-ometric graphs have enabled analytical studies of the connec-tivity properties of large ad hoc networks. While connectivityis a fundamental prerequisite for network operation, it doesnot guarantee any network throughput or capacity. The studyof the capacity of wireless networks is the topic of the nextsection.

V. CAPACITY AND SCALING LAWS

The capacity of a communication system is the maximumdata-rate in bits per second that can be reliably transferredfrom transmitter to receiver. In the strict information-theoreticsense, this is an unsurpassable upper bound that, in practice,can only be approached. In a single Tx-Rx link of unit

Page 10: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

10

bandwidth subject to AWGN, the capacity in bits per channeluse (i.e., bps/Hz) is given by the Shannon-Hartley formula:

log2

(

1 +S

W

)

, (13)

where, as before,S = Pℓ(r) and W are the received powerand Gaussian thermal noise at the receiver, respectively.

The situation becomes more complex in an ad hoc networkwith n Tx-Rx pairs, where the capacity is much more difficultto define and compute. The most general (and natural) descrip-tion is given by the so-calledcapacity region, which is ann×nmatrix C where thecij entry corresponds to the capacity fromnodei to nodej, which is also dependent on the signals beinggenerated by the remainingn − 1 transmitting nodes in thenetwork. These can either interfere with the communicationbetweeni and j, or be cooperative and aid communicationbetweeni and j. Clearly, due to the many possible waysof interaction, the capacity region of an ad hoc network isdifficult to characterize. Even for very small values ofn,such asn = 3, the capacity region has yet to be determined.Therefore, intermediate descriptive theories that fall short ofthe strict information-theoretic standard are needed, as pointedout in more detail in [74].

A. Capacity scaling laws

One attempt to simplify the problem came in 2000 by Guptaand Kumar [75]. Their approach was to introduce two mainsimplifications: on the one hand, they proposed to study thecase in which all the nodes in the network are required totransmit at the same bit-rate. This implies that the wholecapacity region reduces to a single scalar quantity. On theother hand, they proposed to compute only thescaling limit,i.e., the order-of growth of such a scalar quantity as the numberof nodes in the network increases. In addition, Gupta andKumar’s scaling law was also derived under some assumptionson the physics of propagation (i.e., channel gains that decayas a power law of the distance between transmitters andreceivers), and on some restrictions on the cooperation strategyemployed by the nodes (i.e., multi-hop operation and pairwisecoding and decoding at each hop). Their main result was theso-called square-root law, namely, asn increases the per-nodebit-rate decreases as1/

√n.

Due to their restrictive model, the result of Gupta and Ku-mar cannot be considered an unsurpassable bound in the strictinformation-theoretic sense. It does not allow sophisticatednetwork coding strategies but only point-to-point transmissionacross multiple hops, and it relies on a specific physicalpropagation model in which the signal power received atdistance‖x‖ from the transmitter is given byℓ(x) = ‖x‖−α.Under this model, at each hop the collective interference canbe approximated as Gaussian and its power added to the noiseterm W in (13). In this way, any point-to-point link in thenetwork from an arbitrary chosen origin to pointx ∈ R

2 cansupport a rate of

log2

(

1 +Phxℓ(‖x‖)W + I(x)

)

.

Since there is no a priori reason to operate the network ina multi-hop fashion and treat the interference termI(x) aspure noise, the square root law of Gupta and Kumar canin principle be surpassed. One can, for example, envisage anetwork strategy in which groups of nodes help each other,rather than interfere, by coherently summing their signalsatthe receiver.

Perhaps the main contribution of Gupta and Kumar hasbeen to show that such a simple geometric interference-based model can lead to meaningful insights on the capac-ity limitations of wireless networks operated with currentmulti-hop technologies. Furthermore, their paper showed thatstochastic geometry tools such as random Voronoi tessellationsand random geometric graphs can be used to analyze theperformance of network protocols.

Gupta and Kumar’s work sparked an enormous interestin the field. On one side, under the same restrictive model,simpler strategies achieving the same square root law havebeen proposed [41], [76]. The work in [41] is particularlyrelevant in the context of this paper, as it showed a connectionbetween protocol design and percolation theory. In that paper,the flow of information through the network is compared tothe number of disjoint paths crossing the network from sideto side in an underlying percolation model. It is shown that ina network of area proportional to the number of nodesn, thenumber of disjoint paths crossing the network area from sideto side in the underlying percolation model grows with

√n.

Hence, roughly speaking, the amount of information that canflow across the network is only of the order of

√n, and since

n nodes must share this flow, the1/√

n bound follows.On the other side, researchers were interested in discovering

whether the square root law holds in a more general context.Hence, they started to seek bounds on the capacity scalingthat were independent on the network operation strategy.This more general approach led to considerable success.Starting with the work of Xie and Kumar [77],information-theoretic scaling laws, independent of any strategy used forcommunication, have been established by many authors [78]–[82]. These arise from the application of the information-theoretic cut-set bound [83, Ch. 15] which allows one to boundthe total information flow across any network cut, allowingarbitrary cooperation among the nodes. Among these works,a short information-theoretic derivation of the square root lawrelying on geometric elements of spatial point processes isgiven in [80]. It is important to notice, that while essentiallyconfirming the square root law in a more general context, allthe results above still depend on the assumptions made on theelectromagnetic propagation process.

Indeed, more striking results appear in [84], and [81].These papers show that a much higher per-node bit-rate thanΘ(1/

√n) can be achieved in wireless networks by changing

the assumptions on the physical propagation process. Theseauthors introduce the presence of an additional source ofrandomness by adding fading. Under some assumptions onthe fading process and when the path loss exponentα issufficiently small, these authors describe node cooperationstrategies based on space-time codes which can achieve analmost constant per-node bit rate: a great improvement com-

Page 11: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

11

pared to Gupta and Kumar’s original bound! Hence, themain message of the above papers is that there is a gain tobe expected when adopting more complex node cooperationstrategies than simple multi-hop operation.

A recent additional effort has been made in [85], whichrecognizes that the strong dependence of information-theoreticresults on heuristic physical propagation models is somehowundesirable for a theory that seeks the fundamental limits ofcommunication. They showed that the square root law alsoarises from physical limitations dictated by Maxwell’s physicsof wave propagation, in conjunction to the information-theoretic cut-set bound. This result shows that the originalprediction of Gupta and Kumar is also due to a degrees-of-freedom limitation that is independent of empirical path-loss models and stochastic fading models. In other words,stochastic fading assumptions such as in [84], and [81] areopen to debate, as they can lead to non-physical results.

But does this lead to the conclusion that the sophisticatedcooperative strategies described in [84] and [81] do not leadto any improvement over multi-hop operation? The generalanswer is no. Recall that scaling results are only up to orderand pre-constants can make a huge difference in practice.Sophisticated cooperative communication schemes could cer-tainly improve upon nearest-neighbor routing. The preciseamount of this improvement, if any, remains unknown; it isonly known that this improvement vanishes asn grows [85].

B. Transmission capacity and area spectral efficiency

Although scaling laws provide significant insight on thelarge-scale performance of ad hoc networks, a finer viewof throughput limits is needed to understand how differenttechnologies and protocols affect the baseline performanceof distributed wireless networks. Many, even most, commu-nication design choices will have a significant effect on theachievable SINR and hence throughput, while not affectingthe scaling law. In this section, we show how stochasticgeometry and, in particular, the techniques for characterizinginterference and outage of§III, can be used to determine thearea spectral efficiency (ASE) in a specific ad hoc networkdesign; in other words, the number of bits per second per unitof bandwidth that can be transmitted in a given area.

The ASE is formalized by a metric termed thetransmissioncapacity, first proposed in [86], which is the maximum numberof bits per second sent by all users in the network per unitarea, subject to a constraint on outage probability relative to aSINR threshold. Formally, the transmission capacity is definedas

c(λ) , λǫ(1 − ǫ) (14)

measured in transmissions/area, whereλǫ is the maximumdensity of transmissions supported such thatP[SINR < T ] ≤ǫ, for an SINR targetT . Adding the per-user data rate (whichwould be on the order oflog2(1 + T ) bps/Hz) results in thearea spectral efficiency. Transmission capacity is used as thecapacity metric in a few papers in this issue [87], [88], anda more extensive tutorial on transmission capacity is availableonline [89].

There are some shortcomings of this metric, namely that it isusually a single-hop metric rather than end-to-end, presumes acommon SINR target and outage probability (conceptually likethe packet error rate), and is more the description of a giventechnology through its achieved SINR than of technology-independent fundamental limits. Nevertheless, it does capturekey aspects of capacity – “good” communication techniquesshould provide higher transmission capacity – and combinedwith a homogeneous Poisson distribution for the interferingnodes, yields superior analytical tractability to other networkthroughput metrics. We now provide the simplest baselinemodel for transmission capacity. The key aspects of the modelare as follows, with generalizations noted.

• Fixed transmit distanceR. Variable transmit distances canbe used but reduce the tractability: in general a loss factorof E[R2]/(E[R])2 is experienced if the transmit distanceR is a random variable [90].

• Single transmit and receive antennas. Multiple antennascan obviously increase the transmission capacity [60],[91]–[93].

• Homogeneous PPP for interferers, which implies anALOHA-type transmission scheme. Generalizations arenontrivial, but one to clustered PPPs has been undertaken[94], and exclusion regions are considered in [95].

• Interference is treated as noise, although it can in princi-ple be cancelled or suppressed by an appropriate receiverto get higher capacity [96]–[98].

The key to transmission capacity is outage probability,which for the case of Rayleigh fading can be exactly derived.Setting this equal to the outage probability targetǫ and solving(10) for λǫ (see (14)), the transmission capacity in this simplecase is (two-dimensional networks, thermal noise neglected)

co(ǫ) =(1 − ǫ) ln(1 − ǫ)

C(α)R2T 2/α=

ǫ

C(α)R2T 2/α+ Θ(ǫ2) , (15)

where C(α) = π1+2/α/ sin(2π/α). This simple expressionshows precisely how the number of supportable users in thenetwork depends on outage probability (about linearly, forlowoutage), path loss exponentα, and target SIRT (noise can beincluded at the expense of more bulky expressions).

If there is no fading – just large-scale path loss – it ispossible to get tight bounds but not an exact solution. Inthis case, bounds on the transmission capacity are as follows,where we have included the noise powerη and transmit powerρ for SNR = ρ/η

(α − 1)ǫ

απ

(

1

R2T 2/α+ SNR

2/α

)

+ Θ(ǫ2) ≤ co(ǫ)

≤ ǫ

π

(

1

R2T 2/α+ SNR

−2/α

)

+ Θ(ǫ2). (16)

Note the similarity between (15) and (16): they are withina small constant of each other, all the parameters are ofthe exact same order. Arbitrary fading distributions can beaccommodated at further loss of tractability [90], but againthere is no change in the first-order effects of the systemparameters.

Page 12: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

12

What is useful about the transmission capacity is thatit allows candidate technologies and design choices to becompared objectively, analytically, and fairly simply. For ex-ample, one might ask how adding spread spectrum modu-lation (CDMA) to the system would change the number ofsupportable users. The answer with the transmission capacitymetric is fairly immediate. With asynchronous binary direct-sequence spread spectrum (DSSS), the target SINR is effec-tively decreased to2T/3M at the cost of a bandwidth penaltyof M2. If frequency-hopping (FH) was used instead,Mindependent channels are created with an effective interferencedensity ofλ/M on each of them. With some straightforwardmanipulations it can be seen that the transmission capacitiesbecome

cDS(ǫ) =

(

3M

2

)2α

co(ǫ), cFH(ǫ) = Mco(ǫ) . (17)

The ratiocFH

cDS= k1M

1− 2α (18)

implies that frequency-hopping is a superior form of spreadspectrum in an ad hoc network, for example by a factor of√

M when α = 4. In principle, any modulation technique,multiple access or even scheduling protocol can be analyzedusing the transmission capacity metric to predict relativegains.

C. The road forward

Scaling laws on transport capacity and exact results ontransmission capacity both provide important views into thenetwork capabilities, but both presently fall short of providinga complete metric for the achievable network throughput.Future research should attempt to bridge this gap, by utilizingstochastic geometry to quantify end-to-end achievable rates.For example, each hop in the network can be considered tohave some outage probability, and an aggregation of suchstochastic links comprises an end-to-end connection in thenet-work, with some aggregate outage probability, achievable datarate, and queueing delays at relay nodes. A recent examplein this vein can be found in [99], where a delay-minimizingrouting strategy for ad hoc networks is proposed. The analysisis complicated by the spatial and temporal correlations thatexist in the interference due to the common randomness inthe nodes’ positions [100].

Another promising related approach is the increasing pop-ularity of erasure channels and erasure networks to model theperformance of links that are occasionally in outage [101].Al-though this has never been done, one can envision combiningemerging results on the capacity of wireless erasure networkswith outage (erasure) probabilities computed with the helpof stochastic geometry tools. Two important new techniquesfrom information theory for characterizing interference inwireless networks include the deterministic capacity [102] andthe degrees-of-freedom region [103]. These approaches bothrequire relative values for the channel gains of each link,

2Asynchronous binary sequences ofM ±1 bits have a cross-correlationvariance of 2

3M, perfectly synchronized sequences have1

Mwhich is actually

not as desirable.

which again may require stochastic geometry to characterizein a statistical sense for a typical node placement. In short,stochastic geometry can be viewed as a supplement and toolfor many approaches to determining network capacity.

When discussing the capacity in its information-theoreticsense, that is as an upper bound to the best possible networkthroughput, it is important to note that the capacity is not likelyto be achieved by a purely random choice of transmitters.Rather, capacity-approaching techniques will almost surelyrequire some degree of cooperation or at least coordinationamong the contending transmitters, which will degrade therelevance of the 2-D Poisson distribution upon which mostresults in this tutorial are based. As again highlighted inthe conclusions, particularly from the standpoint of under-standing network capacity, new stochastic geometric toolsthat go beyond a homogeneous PPP are urgently needed tobetter characterize networks with cognition and intelligenttransmission scheduling. Some recent results in this directioncan be found in [94], [104].

VI. OTHER APPLICATIONS: ROUTING, INFORMATION

PROPAGATION, POINT PROCESSES WITHFADING , AND

SECRECY

While the connectivity and capacity have been the mainapplications of stochastic geometry and random geometricgraphs to wireless networks, there have recently been otherproblems areas where these techniques have led to interestingresults. Some of them are briefly described in this section.

A. Routing

While many of the analytical results discussed so far focuson single-hop metrics (outage, single-hop throughput andprogress), recently progress has been made toward analyzingrouting protocols on a PPP using stochastic geometry toolsto evaluate the mean cost of the route and its fluctuations[105]. A typical example is that of greedy forward routingwhere a transmitter sends a packet to the nearest node whichis closer to the packet’s destination than the transmitter.Inthe Poisson case, the geometry of the associated routes canbe analyzed thanks to the locality of the definition of the nexthop [105]. Another approach is taken in [106] where nearest-neighbor routing in a sector pointed at the destination iscompared with routing schemes that use longer hops. In thesepapers, interference is not taken into account to determinethefeasibility of a link. A first attempt to combine routing withan SINR-based link model can be found in [107].

B. Epidemic models; first-passage percolation

Random geometric graphs are useful to model the propa-gation of information (or disease, fire, or anything else) ina network of randomly placed nodes. Here we briefly coversome broadcasting strategies and elements of first-passagepercolation.

We denote byG∗λ,r the graph obtained by adding a node

at the origin in the standard random geometric graphGλ,r.As explained in§II-A1, adding this point is equivalent toconditioningGλ,r on the presence of a node at the origin.

Page 13: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

13

1) Broadcasting in multi-hop networks:Consider the sce-nario where a message is to be broadcast in a static networkwhose connectivity is represented by the graphG∗

λ,r. Letus assume that the MAC layer prevents collisions perfectly,and that each nodes forwards the message when it receivesit for the first time (flooding). Under this algorithm, themessage propagates to the entire component to which thesource belongs. Therefore, the probability that the messagereaches an infinite number of nodes is equal to the probabilitythat the source belongs to an infinite clusterθ(λ, r).

a) Probabilistic broadcast (gossiping):The number oftransmission occurring in the above algorithm is exactly equalto the number of nodes who received the message. Thisnumber is unnecessarily large, since each transmission reachesall the neighbors of the sender. Thus, each node receives themessage from each neighbor while once would be enough.A strategy to reduce the number of transmission is to let thenodes forward the message only with a probabilityp < 1.

The decision whether to forward or not can be made by thenodes before the broadcast starts. Thus, in order to analyzethepropagation of the message, one can thin the point processand retain only the nodes who are willing to forward themessage (called hereafteractivenodes). We obtain a thinnedPPP of intensitypλ on which we can construct restricted graphGpλ,r. Thus the message originating at the origin reaches aninfinite number of nodes if the origin is active and belongsto an infinite cluster of the thinned graph. This happens withprobability θp(λ, r) := pθ(pλ, r), as the two conditions areindependent. As a consequence, if the original graphGλ,r issuper-critical, there is a critical value forp above which theprobabilityθp(λ, r) of a successfulbroadcast (i.e., a broadcastwhere an infinite number of nodes are reached) is strictlypositive.

The next value of interest is the fraction of nodes reached bythe message in case of a successful broadcast. Nodes reachedby the message include the active nodes that belong to theinfinite cluster inGpλ,r and the inactive nodes that are withindistancer from them. The fraction of nodes belonging to thelatter category can be computed as follows: Consider a locationx of R

2. If an active node were located atx, it would belongto the infinite cluster ofGpλ,r with probabilityθ(pλ, r). Thismeans that the pointx is within a distance less thanr froma node of the infinite cluster with that probability. Thus, thetotal fraction of nodes reached by the message is preciselyθ(pλ, r), which is a surprisingly simple result.

b) Other models: Probabilistic broadcasting has beenstudied in [108], and an extension to a model with collisionscan be found in [109].

Another variation of the gossiping algorithm, where nodesforward the message only if their node degree is less than acertain threshold, can be addressed using the STIRG modelpresented in§IV-D3 by using the step functionℓ(x) = 1 −u(x− r) as an attenuation function. A sophisticated algorithmto realize degree-dependent activation in a sensor networkcanbe found in [110], where the authors show the existence of aphase transition for the propagation of messages under theiralgorithm.

2) First-passage percolation:First-passage percolation is abranch of percolation theory that addresses the actual lengthof the shortest path in percolation models (seee.g., [111] foran introduction). It is useful to compute the propagation speedof messages in a multi-hop network.

a) Asymptotic shape:Consider the graphG∗λ,r, and de-

fine thehop distance(also calledchemical distance) betweentwo nodes as the number of hops on the shortest path betweenthem (or infinity if no such path exists). LetSk be the set ofnodes that are at distancek from the origin. We expect thatthe shape ofSk is relatively circular around the origin. Thefollowing theorem confirms this intuition:

Theorem 3 (see,e.g., [112]) There is aµ > 0 such that forany 0 < ε < 1 almost surely

Sk ⊂ B(o; (1 + ε)kµ)\B(o; (1 − ε)kµ)

for all sufficiently largek.

b) Blinking model:First-passage percolation can also beused to assess the speed of propagation of a message in adynamic model. An example is given in [113], where nodesalternate between active and sleep mode in a random andindependent fashion: At any instant, only a fractionf < 1 ofthe nodes are active, so that the connectivity graph isGfλ,r.As the message is emitted by the source, it instantaneouslypropagates to all active nodes that are connected to the source.If fλ is below the critical density, the initial propagation isa.s. limited to a finite number of nodes. Then, the propagationcontinues as further nodes switch to active mode. First-passagepercolation allows to show that in this case, the asymptoticshape the the area where the message has propagated after atime t is still circular for larget despite the sub-criticality ofthe graph at each instant.

In the ALOHA case, initial results on the propagation speedin interference-limited ad hoc networks can be found in [114],[115]. It is shown that a similar shape theorem holds as in theinterference-free case (Th. 3).

C. Point processes with fading

The path loss over a wireless link is well modeled by theproduct of a distance component (often called large-scale pathloss) and a fading component (called small-scale fading orshadowing). It is usually assumed that the distance part isdeterministic while the fading part is modeled as a randomprocess. This distinction, however, does not apply to manytypes of wireless networks, where the distance itself is subjectto uncertainty. In this case it may be beneficial to consider thedistance and fading uncertainty jointly,i.e., to define a PP thatincorporates both.

We introduce a framework that offers such a geometricalinterpretation of fading and some new insight into its effecton the network.

Let {Yi}, i ∈ N, be a stationary Poisson point process inRd

of intensity 1, and define thepath loss point process(beforefading) asΦ = {Xi , ‖Yi‖α} for a path loss exponentα.Let {h, h1, h2, . . .} be an iid stochastic process withh drawn

Page 14: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

14

−8 −6 −4 −2 0 2 4 6 8−8

−6

−4

−2

0

2

4

6

8

Fig. 4. A Poisson point process of intensity 1 in a16 × 16 square. Thereachable nodes by the center node are indicated by a bold× for a path gainthreshold ofs = 0.1, a path loss exponent ofα = 2, and Rayleigh fading(standard network). The circle indicates the range of successful transmission inthe non-fading case. Its radius is1/

√s ≈ 3.16, and there are aboutπ/s ≈ 31

nodes inside.

from a distributionF , Fh with unit mean and letΞ = {ξi ,Xi/hi} be thepath loss process with fading.

Assume that there is a transmitter at the origin, and allother nodes are receivers. So there is no interference, andthe network is purely noise-limited. Nodes can receive thetransmission if their path lossξi is smaller than1/s. Thesenodes are said to be connected to the origin. The processes ofconnected points are denoted byΦ and Ξ, respectively. So

Φ = {Xi ∈ Φ: ξi < 1/s} ; Ξ = Ξ ∩ [0, 1/s) .

Fig. 4 shows a PPP of intensity 1 in a16 × 16 square,with the nodes marked that can be reached from the center,assuming a path gain threshold ofs = 0.1. The disk showsthe maximum transmission distance in the non-fading case.

SinceΦ and Ξ are constructed from a uniform PPP usingmapping and independent random scaling (fading), the pro-cessesΦ, Φ, Ξ, andΞ are Poisson. We would like to find thenumber of connected nodes and their expected sum-distanceE(∑

X∈Φ X1/α) which may also be also termed thebroadcasttransport sum-distance.

1) Connectivity:Using the Nakagami-m fading model, wehave [116]

• Φ is Poisson withλ(x) = λ(x)(1−F (sx)) (independentthinning).

• With Nakagami-m fading, the numberN = Φ(R+) ofconnected nodes is Poisson with mean

ENm =cd

(ms)δ

Γ(δ + m)

Γ(m), (19)

where δ = d/α as before, and theconnectivity fadinggain, defined as the ratio of the expected numbers ofconnected nodes with and without fading, is

ENm

EN∞

=1

Γ(δ + m)

Γ(m)= E(hδ) . (20)

2) Broadcast transport sum-distance and capacity:Thebroadcast transport sum-distanceD, i.e., the expected sumover the all the distancesX1/α

i from the origin is defined as

Dm , E

X∈Φ

X1/α

. (21)

Using Campbell’s theorem (5), it can be shown that thebroadcast transport sum-distance for Nakagami-m fading is

Dm = cdδ

1

(ms)∆Γ(m + ∆)

Γ(m), (22)

where∆ = (d+1)/α and the (broadcast)fading gainDm/D∞

isDm

D∞=

1

m∆

Γ(m + ∆)

Γ(m)= E(h∆) . (23)

So the fading gainDm/D∞ is the∆-th moment ofh.To obtain the (broadcast) transport capacity, we may mul-

tiply D by the rate of transmissionR. Assuming at-capacitysignaling,R = log2(1 + s). When maximizing the productDR over R (or s), we find that an optimum rate only existsif ∆ 6 1. If ∆ > 1 (or α < d + 1), DR can be madearbitrarily large by letting the rate go to zero — irrespectiveof the transmit power! This follows fromR(s) = Θ(s) andD(s) = Θ(s−∆) as s → 0. So DR = Θ(s1−∆) whichdiverges if∆ > 1.

D. Secrecy

There has been growing interest in information-theoreticsecrecy in wireless networks. To study the impact of thesecrecy constraint on the connectivity of ad hoc networks, weintroduce a new type of random geometric graph, the so-calledsecrecy graph, that represents the network or communicationgraph including only links over which secure communicationis possible. We assume that a transmitter can choose the ratevery close to the capacity of the channel to the intendedreceiver, so that any eavesdropper further away than thereceiver cannot intercept the message. This translates into asimple geometric constraint for secrecy which is reflected inthe secrecy graph. Here we describe some of the properties ofthe secrecy graph.

Let Gr = (Φ, E) be a disk graph inRd (see§IV-C), whereΦ = {Xi} ⊂ R

d is a PPP of intensity 1 representing thelocations of the nodes, also referred to as the “good guys”.We can think of this graph as the unconstrained network graphthat includes all possible edges over the good guys couldcommunicate if there were no secrecy constraints.

Take another PPPΨ = {Yi} ⊂ Rd of intensityλ represent-

ing the locations of the eavesdroppers or “bad guys”. Theseare assumed to be known to the good guys.

Based onG, we define the following secrecy graphs:The directed secrecy graph:~G = (φ, ~E). Replace all edges

in E by two directional edges. Then remove all edges−−−→XiXj

for which Ψ (B(Xi; ‖Xi − Xj‖)) > 0, i.e., there is at leastone eavesdropper in the ball.

From this directed graph, two undirected graphs are derived:

Page 15: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

15

The basic secrecy graph:Gλ,r = (Φ, E), where the (undi-rected) edge setE is

E , {XiXj :−−−→XiXj ∈ ~E and

−−−→XjXi ∈ ~E} .

The enhanced secrecy graph:G′λ,r = (φ, E′), where

E′ , {XiXj :−−−→XiXj ∈ ~E or

−−−→XjXi ∈ ~E} .

With θ(λ, r) being the probability that the component inGλ,r containing the origin (or any arbitrary fixed node) isinfinite, we know from§IV-C that θ(0, r) > 0 for r > rc,whererc ≈ 1.198 is the critical radius for percolation of the(unrestricted) disk graph. For radii larger thanrc, we define

λc(r) , inf{λ : θ(λ, r) = 0} , r > rc, (24)

as the critical density for percolation on the secrecy graph.Some of the properties of these secrecy graphs can be

analytically determined, such as the out-degree in directionalgraph ~Gλ,∞ which turns out to be geometric with mean1/λ.This is easily seen if we consider the sequence of nearestneighbors ofo in the combined processΦ ∪ Ψ. Nout = n ifthe closestn are inΦ and the(n + 1)-st is in Ψ. Since theseare independent events,

P[Nout = n] =λ

1 + λ

(

1

1 + λ

)n

. (25)

The node degree distribution forr < ∞ can also be foundanalytically; it is a distribution that includes the Poisson andgeometric distributions as special cases. Asλ → 0 it is Poisson(standard disk graph), while forr → ∞ it is geometric (thisis the case considered above). Depending on the values ofrandλ, we can identify a power-limited and a secrecy-limitedoperating regime.

Further results and bounds on the percolation threshold forthe secrecy graph are given in [117]. It turns out thatλ = 0.15already makes percolation impossible. Hence a small densityof eavesdroppers can have a drastic impact on the connectivityproperties of the network.

VII. C ONCLUDING REMARKS

In this tutorial article we have argued that stochastic geom-etry and random graph theory are indispensable tools for theanalysis of wireless networks that allow analytical results on anumber of concrete and important problems. We have shownhow to apply these tools to model and quantify interference,connectivity, outage probability, throughput, and capacity ofwireless networks. We have also argued that there are manyother possible future applications of these techniques, a few ofwhich are mentioned in§VI, and in the accompanying specialissue, highly mobile wireless networks [118] and informationpropagation [119], [120] (also discussed in§VI).

Because the techniques presented in this paper haveemerged from the fields of applied probability, point processes,queueing theory, percolation theory, and are now being adaptedto the engineering arena, it is important that cross-disciplinarydialogues continue, in part through dedicated journal issues

like the present one and workshops like SpaSWiN3. We alsohope that an increasing number of engineering graduate pro-grams will offer formal classroom training in these methods.

Many important areas for future study remain. In orderto better model cooperative wireless networks – includingtechniques as basic as carrier sensing and as sophisticatedasinterference alignment and network coding – tractable resultsor approximations that go beyond the stationary Poissondistribution for the node locations are highly desirable butpresently lacking. The capacity of wireless networks is oneof the most important open problems in information theory,and stochastic geometry and random graphs appear destinedto play a key role in characterizing it, given the primacyof network geometry in determining interference and henceachievable rates. Present attempts at determining achievableend-to-end rates using these tools are still at an early stage.

ACKNOWLEDGEMENTS

The first two authors would like to acknowledge the sup-port of DARPA IPTO’s IT-MANET program through grantW911NF-07-1-0028.

REFERENCES

[1] D. Stoyan, W. Kendall, and J. Mecke,Stochastic Geometry and ItsApplications, 2nd Edition, 2nd ed. John Wiley and Sons, 1996.

[2] M. Penrose,Random Geometric Graphs. Oxford Studies in Probabil-ity, Oxford University Press, 2003, ISBN 0 19 850626 0.

[3] M. Franceschetti and R. Meester,Random Networks for Communi-cation: from Statistical Physics to Information Systems. CambridgeUniversity Press, 2007.

[4] C. Shannon, “A Mathematical Theory of Communication,”Bell SystemTechnical Journal, vol. 27, pp. 379–423, 623–656, Oct. 1948.

[5] M. Franceschetti, J. Bruck, and L. J. Schulman, “A randomwalk modelfor wave propagation,”IEEE Trans. on Antennas and Propagation,vol. 52, no. 5, pp. 1304–1317, May 2004.

[6] M. Franceschetti, “Stochastic rays pulse propagation,” IEEE Trans. onAntennas and Propagation, vol. 52, no. 10, pp. 2742–2752, Oct. 2004.

[7] N. Campbell, “The study of discontinuous phenomena,”MathematicalProceedings of the Cambridge Philosophy Society, vol. 15, pp. 117–136, 1909.

[8] W. Schottky, “Uber spontane Stromschwankungen in verschiedenenElektrizitatsleitern,”Annalen der Physik, vol. 57, pp. 541–567, 1918.

[9] S. O. Rice, “Mathematical analysis of random noise,”Bell SystemsTechnical Journal, vol. 23, pp. 282–332, 1944.

[10] S. B. Lowen and M. C. Teich, “Power-law shot noise,”IEEE Transac-tions on Information Theory, vol. 36, no. 6, pp. 1302–1318, November1990.

[11] S. Musa and W. Wasylkiwskyj, “Co-channel interferenceof spreadspectrum systems in a multiple user environment,”IEEE Transactionson Communications, vol. 26, no. 10, pp. 1405–1413, Oct 1978.

[12] E. S. Sousa and J. A. Silvester, “Optimum transmission ranges in adirect-sequence spread-spectrum multihop packet radio network,” IEEEJournal on Sel. Areas in Communications, vol. 8, no. 5, pp. 762–71,Jun. 1990.

[13] E. S. Sousa, “Interference modeling in a direct-sequence spread-spectrum packet radio network,”IEEE Trans. on Communications,vol. 38, no. 9, pp. 1475–1482, September 1990.

[14] ——, “Performance of a spread spectrum packet radio network linkon a Poisson field of interferers,”IEEE Transactions on InformationTheory, vol. 38, no. 6, pp. 1743–1754, November 1992.

[15] J. Kingman,Poisson Processes. Oxford, England: Oxford UniversityPress, 1993.

3The IEEE Workshop on Spatial Stochastic models for WirelessNetworks,www.spaswin.org, has been held annually in conjunction with WiOpt, theInternational Symposium on Modeling and Optimization in Mobile, Ad Hoc,and Wireless Networks, since 2005.

Page 16: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

16

[16] J. Ilow and D. Hatzinakos, “Analytical Alpha-stable Noise Modelingin a Poisson Field of Interferers or Scatterers,”IEEE Transactions onSignal Processing, vol. 46, no. 6, pp. 1601–1611, 1998.

[17] F. Baccelli, M. Klein, M. Lebourges, and S. Zuyev, “Stochastic geome-try and architecture of communication networks,”J. TelecommunicationSystems, vol. 7, no. 1, pp. 209–227, 1997.

[18] F. Baccelli and S. Zuyev, “Poisson-Voronoi spanning trees with appli-cations to the optimization of communication networks,”OperationsResearch, vol. 47, no. 4, pp. 619–631, 1999.

[19] ——, “Stochastic geometry models of mobile communication net-works,” in Frontiers in queueing. Boca Raton, FL: CRC Press, 1997,pp. 227–243.

[20] S. Zuyev, “Stochastic geometry and telecommunications networks,” inStochastic Geometry: Highlights, Interactions and New Perspectives,W. S. Kendall and I. Molchanov, Eds. Oxford University Press, 2009,(to appear).

[21] C. C. Chan and S. V. Hanly, “Calculating the outage probability ina CDMA network with spatial Poisson traffic,”IEEE Transactions onVehicular Technology, vol. 50, no. 1, pp. 183–204, 2001.

[22] F. Baccelli, B. Błaszczyszyn, and F. Tournois, “Downlink admis-sion/congestion control and maximal load in CDMA networks,” inProceedings, IEEE INFOCOM, 2003.

[23] X. Yang and A. Petropulu, “Co-channel interference modelling andanalysis in a Poisson field of interferers in wireless communications,”IEEE Trans. on Signal Processing, vol. 51, no. 1, pp. 64–76, Jan. 2003.

[24] F. Baccelli, B. Błaszczyszyn, and M. Karray, “Up and downlinkadmission/congestion control and maximal load in large homogeneousCDMA networks,” MONET, vol. 9, no. 6, pp. 605–617, December2004.

[25] P. Pinto, A. Giorgetti, M. Chiani, and M. Win, “A stochastic geometryapproach to coexistence in heterogeneous wireless networks,” IEEEJournal on Sel. Areas in Communications, 2009, this issue.

[26] C. Yin, L. Gao, and S. Cui, “Scaling laws for overlaid wire-less networks: A cognitive radio network vs. a primary network,”http://arxiv.org/abs/0805.1209.

[27] W. Ren, Q. Zhao, and A. Swami, “Power control in cognitive radionetworks: How to cross a multi-lane highway,”IEEE Journal on Sel.Areas in Communications, 2009, this issue.

[28] A. Ghasemi and E. Sousa, “Interference aggregation in spectrum-sensing cognitive wireless networks,”IEEE J. on Sel. Topics in SignalProcessing, vol. 2, no. 1, pp. 41–56, Feb. 2008.

[29] V. Chandrasekhar and J. G. Andrews, “Uplink capacity and interferenceavoidance for two-tier cellular networks,”IEEE Trans. on WirelessCommunications, to appear, 2009, http://arxiv.org/abs/cs/0702132v1.

[30] J. Zhang and J. G. Andrews, “Distributed antenna systems withrandomness,”IEEE Transactions on Wireless Communications, vol. 7,no. 9, pp. 3636–46, September 2008.

[31] O. Dousse, M. Franceschetti, and P. Thiran, “On the throughput scalingof wireless relay networks,”IEEE/ACM Trans. on Networking, vol. 14,no. 6, pp. 2756 – 2761, Jun. 2006.

[32] E. N. Gilbert, “Random plane networks,”SIAM J., vol. 9, pp. 533–543,1961.

[33] S. R. Broadbent and J. M. Hammersley, “Percolation processes i.crystals and mazes,” inProceedings of the Cambridge PhilosophicalSociety, 1957, pp. 629–641.

[34] T. E. Harris,The theory of branching processes. Dover, 2002.[35] R. Meester and R. Roy,Continuum percolation. Cambridge University

Press, 1996.[36] O. Dousse, F. Baccelli, and P. Thiran, “Impact of interferences on

connectivity of ad hoc networks,” inProc. IEEE Infocom, vol. 1, SanFrancisco, Apr. 2003, pp. 476–486, ISSN: 0743-166X.

[37] O. Dousse, M. Franceschetti, N. Macris, R. Meester, andP. Thiran,“Percolation in the signal to interference ratio graph,”Journal ofApplied Probability, vol. 43, no. 2, pp. 552–562, 2006.

[38] M. Penrose, “On a continuum percolation model,”Advances in AppliedProbability, vol. 23, no. 3, pp. 536–556, 1991.

[39] O. Haggstrom and R. Meester, “Nearest neighbor and hard spheremodels in continuum perolcation,”Random structures and algorithms,vol. 9, no. 3, pp. 295–315, 1996.

[40] L. Booth, J. Bruck, M. Franceschetti, and R. Meester, “Covering algo-rithms continuum percolation and the geometry of wireless networks,”Annals of Applied Probability, vol. 13, no. 2, pp. 722–741, May 2003.

[41] M. Franceschetti, O. Dousse, D. N. C. Tse, and P. Thiran,“Closing thegap in the capacity of wireless networks via percolation theory,” IEEETrans. on Info. Theory, vol. 53, no. 3, pp. 1009–1018, March 2007.

[42] D. Daley and D. V. Jones,An introduction to the theory of pointprocesses. New York: Springer, 1988.

[43] F. Baccelli and P. Bremaud,Elements of Queueing Theory. PalmMartingale Calculus and Stochastic Recurrences. Springer, 2003.

[44] B. Hough, M. Krishnapur, Y. Peres, and B. Virag, “Determinantalprocesses and independence,”Probability Surveys, vol. 3, 2006.

[45] P. Bremaud and L. Massoulie, “Power spectra of general shot noisesand hawkes point processes with a random excitation,”Advances inApplied Probability, vol. 34, no. 1, pp. 205–222, 2002.

[46] F. Baccelli and B. Błaszczyszyn, “On a coverage processrangingfrom the Boolean model to the Poisson Voronoi tessellation,withapplications to wireless communications,”Adv. Appl. Probab., vol. 33,pp. 293–323, 2001.

[47] G. Grimmett,Percolation. Springer, 1999.[48] J. Moller,Lectures on Random Voronoi Tessellations, ser. Lecture Notes

in Statistics. New York: Springer-Verlag, 94, vol. 87.[49] F. Baccelli, M. Klein, M. Lebourges, and S. Zuyev, “Stochastic geome-

try and architecture of communication networks,”J. TelecommunicationSystems, vol. 7, pp. 209–227, 1997.

[50] S. B. Lowen and M. C. Teich, “Power-law Shot Noise,”IEEE Trans-actions on Information Theory, vol. 36, no. 6, pp. 1302–1318, Nov.1990.

[51] E. S. Sousa and J. A. Silvester, “Optimum Transmission Ranges in aDirect-Sequence Spread-Spectrum Multihop Packet Radio Network,”IEEE J. Sel. Areas Commun., vol. 8, no. 5, pp. 762–771, Jun. 1990.

[52] M. Haenggi, “On Distances in Uniformly Random Networks,” IEEETrans. on Information Theory, vol. 51, no. 10, pp. 3584–3586, Oct.2005.

[53] R. K. Ganti and M. Haenggi, “Interference in Ad Hoc Networkswith General Motion-Invariant Node Distributions,” in2008 IEEEInternational Symposium on Information Theory (ISIT’08), Toronto,Canada, Jul. 2007.

[54] H. Inaltekin, M. Chiang, H. V. Poor, and S. Wicker, “The behavior ofunbounded path-loss models and the effect of singularity oncomputednetwork characteristics,”IEEE Journal on Sel. Areas in Communica-tions, 2009, this issue.

[55] R. Gowaikar and B. Hassibi, “Achievable throughput in two-scalewireless networks,”IEEE Journal on Sel. Areas in Communications,2009, this issue.

[56] J.-P. M. G. Linnartz, “Exact Analysis of the Outage Probability inMultiple-User Radio,”IEEE Trans. Commun., vol. 40, no. 1, pp. 20–23, Jan. 1992.

[57] M. Zorzi and S. Pupolin, “Optimum Transmission Ranges in MultihopPacket Radio Networks in the Presence of Fading,”IEEE Trans.Commun., vol. 43, no. 7, pp. 2201–2205, Jul. 1995.

[58] F. Baccelli, B. Blaszczyszyn, and P. Muhlethaler, “AnALOHA Pro-tocol for Multihop Mobile Wireless Networks,”IEEE Transactions onInformation Theory, vol. 52, no. 2, pp. 421–436, Feb. 2006.

[59] M. Haenggi, “Outage, Local Throughput, and Capacity ofRandomWireless Networks,” IEEE Transactions on Wireless Communica-tions, 2009, submitted. Available at http://www.nd.edu/∼mhaenggi/pubs/twc09.pdf.

[60] A. Hunter, J. G. Andrews, and S. Weber, “The transmission capacityof ad hoc networks with spatial diversity,”IEEE Trans. on WirelessCommunications, Dec. 2008.

[61] F. Baccelli, B. Błaszczyszyn, and P. Muhlethaler, “Stochastic analysisof spatial and opportunistic aloha,”IEEE Journal on Selected Areas inCommunications, 2009, this issue.

[62] P. D. Seymour and D. J. A. Welsh, “Percolation probabilities on thesquare lattice,”Ann. Discrete Math., vol. 3, pp. 227–245, 1978.

[63] R. E. Peierls, “On Ising’s ferromagnet model,”Proc. Cam. Phil. Soc.,vol. 32, pp. 477–481, 1936.

[64] G. R. Grimmett and D. Stirzaker,Probability and Random Processes.Oxford University Press, 1992.

[65] P. Balister, B. Bollobas, and M. Walters, “Continuum percolation withsteps in the square of the disc,”Random Structures and Algorithms,vol. 26, no. 4, pp. 392–403, Jul. 2005.

[66] M. Franceschetti, L. Booth, M. Cook, Meester, and J. Bruck, “Contin-uum percolation with unreliable and spread out connections,” Journalof Statistical Physics, vol. 118, no. 3-4, pp. 721–734, Feb. 2005.

[67] M. Penrose, “On the spread-out limit for bond and continuum percola-tion.” Annals of Applied Probability, vol. 3, no. 1, pp. 253–276., Sep.1993.

[68] B. Bollobas, S. Janson, and O. Riordan, “Spread-out percolation inRd.” Random Structures and Algorithms, vol. 31, no. 2, pp. 239 –246, Sep. 2007.

[69] P. Balister, B. Bollobas, and M. Walters, “Continuum percolation withsteps in an annulus,”Annals of Applied Probability, vol. 14, pp. 1869–1879., Sep. 2004.

Page 17: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

17

[70] M. Penrose and A. Pisztora, “Large deviations for discrete and contin-uous percolation,”Advances in Applied Probability, vol. 28, pp. 29–52,1996.

[71] P. Gupta and P. R. Kumar, “Critical power for asymptoticconnectivityin wireless networks,”Stochastic Analysis, Control, Optimization andApplications: A Volume in Honor of W.H. Fleming, 1998, edited byW.M. McEneany, G. Yin, and Q. Zhang, (Eds.) Birkhauser.

[72] M. Franceschetti and R. Meester, “Critical node lifetimes in randomnetworks via the Chen-Stein method,”IEEE Trans. on InformationTheory, vol. 52, no. 6, pp. 2831–2837, Jun. 2006.

[73] P. Balister, B. Bollobas, A. Sarkar, and M. Walters, “Connectivity ofrandomk-nearest neighbor graphs,”Adv. Appl. Prob., vol. 37, pp. 1–24,2005.

[74] J. G. Andrews, N. Jindal, M. Haenggi, R. Berry, S. Jafar,D. Guo,S. Shakkottai, R. Heath, M. Neely, S. Weber, and A. Yener, “RethinkingInformation Theory for Mobile Ad Hoc Networks,”IEEE Communi-cations Magazine, vol. 46, no. 12, pp. 94–101, Dec. 2008.

[75] P. Gupta and P. Kumar, “The capacity of wireless networks,” IEEETrans. on Info. Theory, vol. 46, no. 2, pp. 388–404, Mar. 2000.

[76] S. R. Kulkarni and P. Viswanath, “A deterministic approach to through-put scaling in wireless networks,”IEEE Trans. on Information Theory,vol. 50, no. 11, pp. 1041–1049, Jun. 2004.

[77] L. Xie and P. R. Kumar, “A network information theory forwirelesscommunication: Scaling laws and optimal operation,”IEEE Trans. onInfo. Theory, pp. 748–67, May 2004.

[78] A. Jovicic, P. Viswanath, and S. Kulkarni, “Upper bounds to transportcapacity of wireless networks,”IEEE Transactions on InformationTheory, vol. 50, no. 11, pp. 2555–2565, November 2004.

[79] O. Leveque and I. E. Teletar, “Information-theoretic upper bounds onthe capacity of large extended ad hoc wireless networks,”IEEE Trans.on Info. Theory, pp. 858–65, Mar. 2005.

[80] M. Franceschetti, “A note on Leveque and Telatar’s upper bound onthe capacity of wireless ad hoc networks,”IEEE Trans. on InformationTheory, vol. 53, no. 9, pp. 3207–3211, Sep. 2007.

[81] A. Ozgur, O. Leveque, and D. Tse, “Hierarchical cooperation achievesoptimal capacity scaling in ad hoc networks,”IEEE Trans. on Info.Theory, vol. 53, no. 10, pp. 3549–3572, Oct. 2007.

[82] F. Xue, L. Xie, and P. R. Kumar, “The transport capacity of wirelessnetworks over fading channels,”IEEE Trans. on Info. Theory, pp. 834–47, Mar. 2005.

[83] T. M. Cover and J. A. Thomas,Elements of Information Theory. JohnWiley & Sons, Inc., 1991.

[84] S. Aeron and V. Saligrama, “Wireless Ad hoc Networks: Strategies andScaling Laws for the fixed SNR Regime,”IEEE Trans. on InformationTheory, vol. 53, no. 6, pp. 2044–2059, Jun. 2007.

[85] M. Franceschetti, M. Migliore, and P. Minero, “The capacity of wirelessnetworks: Information-theoretic and physical limits,”IEEE Trans. onInfo. Theory, Submitted, available at: http://circuit.ucsd.edu/˜ massimo/.

[86] S. Weber, X. Yang, J. G. Andrews, and G. de Veciana, “Transmissioncapacity of wireless ad hoc networks with outage constraints,” IEEETrans. on Info. Theory, vol. 51, no. 12, pp. 4091–4102, Dec. 2005.

[87] K. Huang, V. K. N. Lau, and Y. Chen, “Spectrum sharing betweencellular and mobile ad hoc networks: Transmission-capacity trade-off,”IEEE Journal on Sel. Areas in Communications, 2009, this issue.

[88] V. Mordachev and S. Loyka, “On node density–outage probabilitytradeoff in wireless networks,”IEEE Journal on Sel. Areas in Commu-nications, 2009, this issue.

[89] S. Weber, J. G. Andrews, and N. Jindal, “Transmission capacity:applying stochastic geometry to uncoordinated ad hoc networks,”arxiv.org/abs/0809.0016.

[90] ——, “The effect of fading, channel inversion, and threshold schedul-ing on ad hoc networks,”IEEE Trans. on Info. Theory, vol. 53, no. 11,pp. 4127 – 4149, Nov. 2007.

[91] S. Govindasamy, D. W. Bliss, and D. H. Staelin, “Spectral efficiency insingle-hop ad-hoc wireless networks with interference using adaptiveantenna arrays,”IEEE Journal on Sel. Areas in Communications,vol. 25, no. 7, pp. 1358–69, Sep. 2007.

[92] N. Jindal, J. G. Andrews, and S. Weber, “Rethinking MIMOforwireless networks: Linear throughput increases with multiple receiveantennas,” inProc., IEEE Intl. Conf. on Communications, Dresden,Germany, Jun. 2009.

[93] K. Stamatiou, J. G. Proakis, and J. R. Zeidler, “Evaluation of MIMOtechniques in frequency hopped-multi-access ad hoc networks,” inProc., IEEE Globecom, Washington, D.C., Nov. 2007.

[94] R. K. Ganti and M. Haenggi, “Interference and outage in clusteredwireless ad hoc networks,”IEEE Trans. on Info. Theory, Accepted,available at arxiv.org/abs/0706.2434.

[95] A. Hasan and J. G. Andrews, “The guard zone in wireless adhocnetworks,” IEEE Trans. on Wireless Communications, vol. 6, no. 3,Mar. 2007.

[96] S. Weber, J. G. Andrews, X. Yang, and G. de Veciana, “Transmissioncapacity of wireless ad hoc networks with successive interferencecancellation,”IEEE Trans. on Info. Theory, vol. 53, no. 8, pp. 2799–2814, Aug. 2007.

[97] K. Huang, J. G. Andrews, R. W. Heath, D. Guo, and R. Berry,“Spatial interference cancellation for multi-antenna mobile ad hocnetworks,” IEEE Trans. on Info. Theory, Submitted, available atarxiv.org/abs/0804.0813.

[98] J. Blomer and N. Jindal, “Transmission capacity of wireless ad hocnetworks: Successive interference cancellation vs. jointdetection,” inProc., IEEE Intl. Conf. on Communications, Dresden, Germany, Jun.2009.

[99] K. Stamatiou, F. Rossetto, M. Haenggi, T. Javidi, J. R. Zeidler,and M. Zorzi, “A Delay-Minimizing Routing Strategy for WirelessMultihop Networks,” in2009 Workshop on Spatial Stochastic Modelsfor Wireless Networks (SpaSWiN’09), 2009.

[100] R. K. Ganti and M. Haenggi, “Spatial and Temporal Correlation of theInterference in ALOHA Ad Hoc Networks,”IEEE CommunicationsLetters, 2009, submitted. Available at http://arxiv.org/abs/0904.1444.

[101] A. F. Dana, R. Gowaikar, R. Palanki, B. Hassibi, and M. Effros,“Capacity of wireless erasure networks,”IEEE Trans. on Info. Theory,vol. 52, no. 3, pp. 789– 804, Mar. 2006.

[102] A. S. Avestimehr, S. Diggavi, and D. Tse, “A deterministic approachto wireless relay networks,” in2007 Allerton Conference, Sep. 2007.

[103] V. R. Cadambe and S. A. Jafar, “Interference alignmentand degreesof freedom of thek-user interference channel,”IEEE Trans. on Info.Theory, vol. 54, no. 8, pp. 3425–41, Aug. 2008.

[104] G. Alfano, M. Garetto, and E. Leonardi, “Capacity scaling of wirelessnetworks with inhomogeneous node density: Upper bounds,”IEEEJournal on Sel. Areas in Communications, 2009, this issue.

[105] F. Baccelli and C. Bordenave, “The radial spanning tree of a poissonpoint process,”Annals of Applied Probab., vol. 17, no. 1, pp. 305–359,2007.

[106] M. Haenggi, “On Routing in Random Rayleigh Fading Networks,”IEEE Transactions on Wireless Communications, vol. 4, no. 4, pp.1553–1562, Jul. 2005.

[107] F. Baccelli, B. Błaszczyszyn, and P. Muhlethaler, “On the performanceof time-space opportunistic routing in multihop mobile ad hoc net-works,” in 7th International Symposium on Modeling and Optimizationin Mobile, Ad Hoc, and Wireless Networks (WiOpt’09), Berlin, 2008.

[108] Z. J. Haas, J. Y. Halpern, and L. Li, “Gossip-based ad hoc routing,”IEEE/ACM Trans. Netw., vol. 14, no. 3, pp. 479–491, Jun. 2006.

[109] Y. Sasson, D. Cavin, and A. Schiper, “Probabilistic broadcast forflooding in wireless mobile ad hoc networks,” inProc. IEEE WCNC,New Orleans, Mar. 2003.

[110] P. B. Godfrey and D. Ratajczak, “Naps: scalable, robust topologymanagement in wireless ad hoc networks,” inProc. IPSN, 2004.

[111] H. Kesten, “Percolation theory and first passage percolation,” TheAnnals of Probability, vol. 15, no. 4, pp. 1231–1271, 1986.

[112] M. Deijfen, “Asymptotic shape in a continuum growth model,” Ad-vances in Applied Probability, vol. 35, no. 2, pp. 303–318, 2003.

[113] O. Dousse, P. Mannersalo, and P. Thiran, “Latency of wireless sensornetworks with uncoordinated power saving mechanisms,” inProc. ACMMobihoc, Tokyo, May 2004, pp. 109–120.

[114] R. K. Ganti and M. Haenggi, “Dynamic Connectivity and PacketPropagation Delay in ALOHA Wireless Networks,” in41st AsilomarConference on Signals, Systems, and Computers (Asilomar’07), PacificGrove, CA, Nov. 2007.

[115] ——, “Bounds on Information Propagation Delay in Interference-Limited ALOHA Networks,” in 2009 Workshop on Spatial StochasticModels for Wireless Networks (SpaSWiN’09), Seoul, Korea, Jun. 2009.

[116] M. Haenggi, “A Geometric Interpretation of Fading in Wireless Net-works: Theory and Applications,”IEEE Trans. on Information Theory,vol. 54, no. 12, pp. 5500–5510, Dec. 2008.

[117] ——, “The Secrecy Graph and Some of its Properties,” in2008 IEEEInternational Symposium on Information Theory (ISIT’08), Toronto,Canada, Jul. 2008.

[118] J. Wu, “On the connectivity of mobile linear networks with dynamicnode population and delay constraint,”IEEE Journal on Sel. Areas inCommunications, 2009, this issue.

[119] S. Kokalj-Filipovic, P. Spasojevic, and R. Yates, “Geographic datapropagation in location-unaware wireless sensor networks: A two-dimensional random walk analysis,”IEEE Journal on Sel. Areas inCommunications, 2009, this issue.

Page 18: Stochastic Geometry and Random Graphs for the Analysis …mhaenggi/pubs/jsac09.pdfStochastic Geometry and Random Graphs for the Analysis and Design of Wireless Networks Martin Haenggi,

18

[120] P. Jacquet, B. Mans, P. Muhlethaler, and G. Rodolakis,“Opportunisticrouting in wireless ad hoc networks: Upper bounds for the packetpropagation speed,”IEEE Journal on Sel. Areas in Communications,2009, this issue.

Martin Haenggi (S’95, M’99, SM’04) is an As-sociate Professor of Electrical Engineering at theUniversity of Notre Dame, Indiana, USA. He re-ceived the Dipl. Ing. (M.Sc.) and Ph.D. degrees inelectrical engineering from the Swiss Federal Insti-tute of Technology in Zurich (ETHZ) in 1995 and1999, respectively. After a postdoctoral year at theElectronics Research Laboratory at the University ofCalifornia in Berkeley, he joined the faculty of theelectrical engineering department at the Universityof Notre Dame in 2001. In 2007/08, he spent a

Sabbatical Year at the University of California at San Diego(UCSD). Forboth his M.Sc. and his Ph.D. theses, he was awarded the ETH medal, andhe received a CAREER award from the U.S. National Science Foundationin 2005. He served as a member of the Editorial Board of the ElsevierJournal of Ad Hoc Networks from 2005-2008 and as a Distinguished Lecturerfor the IEEE Circuits and Systems Society in 2005/06. Presently he isan Associate Editor the IEEE Transactions on Mobile Computing and theACM Transactions on Sensor Networks. He is the General Co-Chair (withJeff Andrews) of SpaSWiN 2009 and the author of an upcoming book onInterference in Large Wireless Networks (to appear in the Foundations andTrends Series at NOW Publishers). His scientific interests include networkingand wireless communications, with an emphasis on ad hoc and sensornetworks.

Jeffrey G. Andrews (S’98, M’02, SM’06) receivedthe B.S. in Engineering with High Distinction fromHarvey Mudd College in 1995, and the M.S. andPh.D. in Electrical Engineering from Stanford Uni-versity in 1999 and 2002, respectively. He is anAssociate Professor in the Department of Electri-cal and Computer Engineering at the University ofTexas at Austin, and the Director of the WirelessNetworking and Communications Group (WNCG),a research center of 15 faculty, 100 students, and10 industrial affiliates. He developed Code Division

Multiple Access (CDMA) systems at Qualcomm from 1995 to 1997, and hasconsulted for the WiMAX Forum, Microsoft, Palm, Ricoh, ADC,and NASA.

Dr. Andrews is a Senior Member of the IEEE, and served as an associateeditor for the IEEE Transactions on Wireless Communications from 2004-2008. He is the co-chair of the 2009 IEEE workshop on spatial stochasticmodels and the chair of the 2010 IEEE Communication Theory Workshop.He is co-author of Fundamentals of WiMAX (Prentice-Hall, 2007) and holderof the Earl and Margaret Brasfield Endowed Fellowship in Engineering at UTAustin, where he received the ECE department’s first annual High Gain awardfor excellence in research.

He received the National Science Foundation CAREER award in2007and is the Principal Investigator of a nine-university teamof 12 facultyin DARPA’s Information Theory for Mobile Ad Hoc Networks program.His research interests are in communication theory, information theory, andstochastic geometry applied to multiuser wireless systemssuch as ad hoc,mesh, femtocell and cooperative cellular networks.

Francois Baccelli’s research interests are in the the-ory of discrete event dynamical networks and in themodeling and performance evaluation of computerand communication systems. He coauthored morethan 100 publications in major international journalsand conferences, as well as a 1994 Springer Verlagbook on queueing theory, jointly with P. Bremaud,the second edition of which appeared in 2003, anda 1992 Wiley book on the max plus approach todiscrete event networks, with G. Cohen, G.J. Olsderand J.P. Quadrat.

He was the head of the Mistral Performance Evaluation research groupof INRIA Sophia Antipolis, France, from its creation to 1999. He was/is apartner in several European projects including IMSE (Esprit 2), ALAPEDES(TMR) and EURONGI (Network of Excellence), and was the coordinator ofthe BRA Qmips European project.

He is currently INRIA Directeur de Recherche in the ComputerScienceDepartment of Ecole Normale Superieure in Paris, where he started the TRECgroup (theorie des reseaux et communications) in 1999.

His current research interest are focused on the analysis oflarge wirelessnetworks and the design of scalable and reliable application layers based onthe current point to point transport mechanisms, and on the development ofnew tools for the modeling of protocols with spatial components in wirelessnetworks such as coverage and power control in CDMA and MAC protocolsin mobile had hoc networks.

Prof. Baccelli was awarded the 2002 France Telecom Prize andgot the IBMAward in 2003. He became a member of the French Academy of Sciences in2005.

Olivier Dousse (S’02-M’05) received his M.Sc. de-gree in Physics from the Swiss Federal Instituteof Technology at Lausanne, Switzerland (EPFL) in2000, and his Ph.D. degree in Communication Sys-tems from the same institution in 2005. From 2006to 2008, he was with Deutsche Telekom Laboratoriesin Berlin. He is currently a Principal Member ofResearch Staff at Nokia Research Center in Lau-sanne. His research interests are in stochastic modelsfor communication and social networks. He receivedthe honorable mention of the 2005 ACM Doctoral

Dissertation Competition, and he was awarded the Top 3 Student Prize of theEPFL Graduate School in communication systems in 2001. He was runner-upfor the IEEE-Infocom Best Paper Award in 2003.

Massimo Franceschettiis an associate professor inthe Department of Electrical and Computer Engi-neering of University of California at San Diego.He received the Laurea degree, magna cum laude,in Computer Engineering from the University ofNaples in 1997, and the M.S. and Ph.D. degrees inElectrical Engineering from the California Instituteof Technology in 1999, and 2003. Before joiningUCSD, he was a post-doctoral scholar at Universityof California at Berkeley for two years.

Prof. Franceschetti was awarded the C. H. WiltsPrize in 2003 for best doctoral thesis in Electrical Engineering at Caltech; theS. A. Schelkunoff award in 2005 for best paper in the IEEE Transactions onAntennas and Propagation; an NSF CAREER award in 2006, and anONRYoung Investigator award in 2007.

He has held visiting positions at at the Vrije Universiteit Amsterdam in theNetherlands, the Ecole Polytechnique Federale de Lausannein Switzerland,and the University of Trento in Italy.

He was on the guest editorial board of the IEEE Transactions on Infor-mation Theory, special issue on models, theory, and codes, for relaying andcooperation in communication networks; of the IEEE Journalon SelectedAreas in Communications, special issue on control and communications

His research interests are in communication systems theoryand include ran-dom networks, wave propagation in random media, wireless communication,and control over networks.