2015
DOI: 10.1016/j.comcom.2015.05.002
|View full text |Cite
|
Sign up to set email alerts
|

isBF: Scalable in-packet bloom filter based multicast

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0
3

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 10 publications
0
9
0
3
Order By: Relevance
“…Note that, due to the unavoidable hash conflicts (generating same hash value for diverse input elements), the membership query based on BF may incur false positive errors, i.e., wrongly indicating that a non-member element is a member of S. In Fig. 2, the query of x 5 returns positive because the bits at position 6, 8, and 11 are all 1, though x 5 S. Although BF incurs false positives, for many applications the space savings and constant locating time outweigh this drawback when the probability of false positive is small.…”
Section: A Framework Of Bloom Filtermentioning
confidence: 99%
See 2 more Smart Citations
“…Note that, due to the unavoidable hash conflicts (generating same hash value for diverse input elements), the membership query based on BF may incur false positive errors, i.e., wrongly indicating that a non-member element is a member of S. In Fig. 2, the query of x 5 returns positive because the bits at position 6, 8, and 11 are all 1, though x 5 S. Although BF incurs false positives, for many applications the space savings and constant locating time outweigh this drawback when the probability of false positive is small.…”
Section: A Framework Of Bloom Filtermentioning
confidence: 99%
“…Then the node forwards the packet to the neighbours which pass the membership test. Most-recently, endeavours have been made to improve the BF-enabled multicast routing in terms of scalability [5] [3] [43], loop mitigation [4], and flow leakage [3] [43]. Due to the limited bits in the header and the large number of nodes in the multicast tree, the in-packet BF incurs scalability to some extent.…”
Section: B Packet Routing and Forwardingmentioning
confidence: 99%
See 1 more Smart Citation
“…На начальном этапе эксплуатации после развертывания можно оценить различные характеристики интенсивности информационных, служебных пакетов, времена отклика на запросы, частоты нераспо-знанных и пропущенных сообщений. В связи с этим один из возможных подходов выявления аномально-го поведения -использование данных, отражающих состояния системы, которые могут быть применены в статистическом анализе [9,10].…”
Section: постановка задачиunclassified
“…Основываясь на особенностях функционирования беспроводных сенсорных сетей и применяя ре-комендуемые настройки, направленные на оптимизацию работы удаленного узла беспроводной сети, на-рушитель может реализовать атаку типа «широковещательный шторм» [9][10][11].…”
Section: постановка задачи исследованияunclassified