A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Online computation and competitive analysis
Online computation and competitive analysis
The broadcast storm problem in a mobile ad hoc network
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
AMRoute: ad hoc multicast routing protocol
Mobile Networks and Applications
Manycast: exploring the space between anycast and multicast in ad hoc networks
Proceedings of the 9th annual international conference on Mobile computing and networking
Revisiting the TTL-based controlled flooding search: optimality and randomization
Proceedings of the 10th annual international conference on Mobile computing and networking
Flood search under the California Split rule
Operations Research Letters
Energy efficient searching in delay-tolerant wireless sensor networks
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
Empirical evaluation of querying mechanisms for unstructured wireless sensor networks
ACM SIGCOMM Computer Communication Review
Parsimonious flooding in dynamic graphs
Proceedings of the 28th ACM symposium on Principles of distributed computing
Using Heterogeneity to Enhance Random Walk-based Queries
Journal of Signal Processing Systems
BF-chord: an improved lookup protocol to chord based on Bloom Filter for wireless P2P
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Coverage based expanding ring search for dense wireless sensor networks
HiPC'08 Proceedings of the 15th international conference on High performance computing
Level biased random walk for information discovery in wireless sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
On the scalability of expanding ring search for dense wireless sensor networks
Journal of Parallel and Distributed Computing
Energy efficient and low latency biased walk techniques for search in wireless sensor networks
Journal of Parallel and Distributed Computing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Comparison of efficient random walk strategies for wireless multi-hop networks
Computer Communications
Collaborative anomaly-based detection of large-scale internet attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Querying dynamic wireless sensor networks with non-revisiting random walks
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Hi-index | 0.00 |
In this paper, we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching for a destination node in a mobile ad hoc network, querying for a piece of desired data in a wireless sensor network, and searching for a shared file in an unstructured peer-to-peer network. We consider the class of controlled flooding search strategies where query/search packets are broadcast and propagated in the network until a preset time-to-live (TTL) value carried in the packet expires. Every unsuccessful search attempt, signified by a timeout at the origin of the search, results in an increased TTL value (i.e., larger search area) and the same process is repeated until the object is found. The primary goal of this study is to find search strategies (i.e., sequences of TTL values) that will minimize the cost of such searches associated with packet transmissions. Assuming that the probability distribution the object location is not known a priori, we derive search strategies that minimize the search cost in the worst-case, via a performance measure in the form of the competitive ratio between the average search cost of a strategy and that of an omniscient observer. This ratio is shown in prior work to be asymptotically (as the network size grows to infinity) lower bounded by 4 among all deterministic search strategies. In this paper, we show that by using randomized strategies (i.e., successive TTL values are chosen from certain probability distributions rather than deterministic values), this ratio is asymptotically lower bounded by e. We derive an optimal strategy that achieves this lower bound, and discuss its performance under other criteria. We further introduce a class of randomized strategies that are sub-optimal but potentially more useful in practice.