2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks 2008
DOI: 10.1109/sahcn.2008.86
|View full text |Cite
|
Sign up to set email alerts
|

Immunity-Based Epidemic Routing in Intermittent Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Authors introduce the idea of immunity to improve the basic Epidemic Routing strategy in [48]. Each node maintains a list of delivered messages, called the immunity list.…”
Section: Nonknowledge-based Routing Protocolsmentioning
confidence: 99%
“…Authors introduce the idea of immunity to improve the basic Epidemic Routing strategy in [48]. Each node maintains a list of delivered messages, called the immunity list.…”
Section: Nonknowledge-based Routing Protocolsmentioning
confidence: 99%
“…Moreover, the use of anti-packets, which are usually small in size, reduce the number of bundles that are exchanged in each encounter. Example protocols that employ this optimization include epidemic with immunity [12] and P-Q epidemic [10]. In epidemic with immunity [12], nodes deliver and drop bundles according to two lists: m-list and i-list.…”
Section: B Optimizationsmentioning
confidence: 99%
“…Example protocols that employ this optimization include epidemic with immunity [12] and P-Q epidemic [10]. In epidemic with immunity [12], nodes deliver and drop bundles according to two lists: m-list and i-list. The m-list is similar to the summary bundles vector in pure epidemic, which records received bundles.…”
Section: B Optimizationsmentioning
confidence: 99%
“…e main drawback of the Epidemic scheme is its high overhead. Many schemes are proposed to decrease the overhead in Epidemic-based approaches by limiting the number of message replicas [14][15][16]. An effective scheme to control replication spread is the vaccine [17].…”
Section: Introductionmentioning
confidence: 99%