2015
DOI: 10.1109/tpds.2014.2316159
|View full text |Cite
|
Sign up to set email alerts
|

BlindDate: A Neighbor Discovery Protocol

Abstract: Many wireless applications urgently demand an efficient neighbor discovery protocol to build up bridges connecting user themselves or to some service providers. However, due to intrinsic constraints of wireless devices, e.g., limited energy and error of clock synchronization, there is still absence of effective and efficient neighbor discovery protocols in the literature. In this work, we propose neighbor discovery protocols for the following two problems. First, we study Asynchronous Symmetry Neighbor Discove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
27
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(27 citation statements)
references
References 19 publications
(14 reference statements)
0
27
0
Order By: Relevance
“…Two different types of slots, called static and dynamic slots, are used in BlindDate [16]. The static slot is approximately the same as the anchor slot in Searchlight.…”
Section: Related Workmentioning
confidence: 99%
“…Two different types of slots, called static and dynamic slots, are used in BlindDate [16]. The static slot is approximately the same as the anchor slot in Searchlight.…”
Section: Related Workmentioning
confidence: 99%
“…The author also claims that striped probing is helpful to reduce worstcase latency, which has inspired us to transmit more beacons to reduce probes. BlindDate [9] achieves an even lower latency bound by adding two extra beacons, giving us the intuition that beacons are not necessarily placed in wakeup slots.…”
Section: Related Workmentioning
confidence: 99%
“…To eliminate the long tail with worst-case latency bounded, deterministic discovery protocols are proposed subsequently. The representative ones are Quorum [5], Disco [6], U-Connect [7], SearchLight [8], BlindDate [9], Hello [10], Hedis and Todis [11], which have continuously pushed the boundary of neighbor discovery protocol research.…”
Section: Introductionmentioning
confidence: 99%
“…Indirect collaborative mechanisms are application-speci c and di cult to compare quantitatively, since nodes in geographical proximity, but not direct neighbors in the network, can be discovered by such schemes. erefore, in this paper we focus on direct schemes, which can be further classi ed into i) quorum-based [10], ii) prime number-based [11] [12], iii) dynamic listen slot [13] [14], iv) xed listen slot [15] [16], and v) stochastic [17]. ese schemes can work on one or multiple frequency channels [18] [19] [20], and they all follow a similar principle of dividing time into slots and le ing the node to be active in a slot based on a schedule de ned by the respective algorithm.…”
Section: Neighbor Discovery In a Nutshellmentioning
confidence: 99%
“…Searchlight [14] is an example of such an approach, where a node has a static slot in the beginning of each cycle and an active slot shi ed one slot to the right in each consecutive cycle. Similarly, Blinddate [13] uses one static slot in each cycle and two dynamic listen slots, one shi ed to the right and one to the le in each consecutive cycle. A xed schedule can also be used for listen slots.…”
Section: Neighbor Discovery In a Nutshellmentioning
confidence: 99%