2008
DOI: 10.1145/1365815.1365817
|View full text |Cite
|
Sign up to set email alerts
|

RaWMS - Random Walk Based Lightweight Membership Service for Wireless Ad Hoc Networks

Abstract: This paper presents RaWMS, a novel lightweight random membership service for ad hoc networks. The service provides each node with a partial uniformly chosen view of network nodes. Such a membership service is useful, e.g., in data dissemination algorithms, lookup and discovery services, peer sampling services, and complete membership construction. The design of RaWMS is based on a novel reverse random walk (RW) sampling technique. The paper includes a formal analysis of both the reverse RW sampling technique a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
67
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(67 citation statements)
references
References 45 publications
(54 reference statements)
0
67
0
Order By: Relevance
“…A generic framework for presenting gossip protocols was proposed in [19], and in particular highlighted the advantages of designing gossiping protocols using a pull-push approach for higher reliability. This framework was later extended to ad-hoc networks in [2], [10]. An example of a protocol for ad-hoc networks that uses a pull-push approach and is easily expressed in the above framework is [27].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A generic framework for presenting gossip protocols was proposed in [19], and in particular highlighted the advantages of designing gossiping protocols using a pull-push approach for higher reliability. This framework was later extended to ad-hoc networks in [2], [10]. An example of a protocol for ad-hoc networks that uses a pull-push approach and is easily expressed in the above framework is [27].…”
Section: Related Workmentioning
confidence: 99%
“…Loosely speaking, the three most common techniques for obtaining this in ad-hoc networks are probabilistic flooding, e.g., [14], [26], in which the decision of a node to rebroadcast depends on some locally computable probabilistic mechanism, counter based approaches (and its derivatives such as distance-based and location-based forwarding), e.g., [6], [14], [40], [41], in which rebroadcasting a message depends on the number of retransmissions the node hears in its neighborhood, and lazy gossip [19], [22], in which nodes periodically gossip with their neighbors about the ids of messages they have received and request missing messages from them. 2 Previous analysis of probabilistic flooding [14], [33] has taught us that in order to obtain reasonable reliability level in a fixed probability protocol, one has to set the forwarding probability to very high values. The latter means that for very high reliability, this scheme becomes almost as wasteful as flooding.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Distributed algorithms that maintain a list of k n neighbors selected at random has been recently investigated with reference to ad hoc networks in [2]. The authors introduce an algorithm (that we indicate as reverse sampling) that, transposed in our environment, consists in replacing one of the neighbors with the one that executed a two-way session m token passing events ago, the m parameter being around 10 for very large networks.…”
Section: Algorithmmentioning
confidence: 99%
“…To secure this operation the data passed during directories synchronization must be authenticated: requirement iv) gives the basis for this. Concerning directory synchronization, the interested reader finds an applicable result in [1]. We do not discuss further the issue, that falls outside the scope of this paper.…”
Section: A Case Studymentioning
confidence: 99%