2015
DOI: 10.1007/978-3-319-23237-9_22
|View full text |Cite
|
Sign up to set email alerts
|

Fragmented-Iterated Bloom Filters for Routing in Distributed Event-Based Sensor Networks

Abstract: Named Data Networks provide a clean-slate redesign of the Future Internet for efficient content distribution. Because Internet of Things are expected to compose a significant part of Future Internet, most content will be managed by constrained devices. Such devices are often equipped with limited CPU, memory, bandwidth, and energy supply. However, the current Named Data Networks design neglects the specific requirements of Internet of Things scenarios and many data structures need to be further optimised. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…The I(FIB)F structure [12] uses iterated Bloom filters, and can complete the search procedure without accessing the off-chip memory since an I(FIB)F is constructed for each output face, as opposed to a single FIB that defines the next-hop. An I(FIB)F consists of d iterated Bloom filters (IBF) [29] with iterated hash functions. In order to construct an I(FIB)F, a m-bit standard BF is split in d IBFs of m/d bits.…”
Section: Fib Lookup Algorithms Applying Bloom Filtersmentioning
confidence: 99%
“…The I(FIB)F structure [12] uses iterated Bloom filters, and can complete the search procedure without accessing the off-chip memory since an I(FIB)F is constructed for each output face, as opposed to a single FIB that defines the next-hop. An I(FIB)F consists of d iterated Bloom filters (IBF) [29] with iterated hash functions. In order to construct an I(FIB)F, a m-bit standard BF is split in d IBFs of m/d bits.…”
Section: Fib Lookup Algorithms Applying Bloom Filtersmentioning
confidence: 99%
“…We note that by computing h 2 using the second strategy computing resources are saved because we profit from the previous computed hash. Iterative Bloom Filters (IBFs) [4] take advantage of the properties of iterative hash functions. The strategy followed by IBFs is to split the m bit-positions of a Standard BF to save the same number of elements n. Then, a Standard BF [5] may be split in d IBFs of m/d bit-positions and n elements.…”
Section: Iterated Bloom Filtersmentioning
confidence: 99%