2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) 2012
DOI: 10.1109/wowmom.2012.6263685
|View full text |Cite
|
Sign up to set email alerts
|

CBFR: Bloom filter routing with gradual forgetting for tree-structured wireless sensor networks with mobile nodes

Abstract: Abstract-In tree-structured data collection sensor networks, packets are routed towards a sink node by iteratively choosing a node's immediate parent node as the next hop. It is however beyond the scope of these routing protocols to transfer messages along the reverse path, i.e., from the sink to individual nodes in the network. In this paper, we present CBFR, a novel routing scheme that builds upon collection protocols to enable efficient point-to-point communication. We propose the use of spaceefficient data… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…A hierarchy of BFs were used by the sink, cluster head ports, and each cluster head itself to filter out unpromising transmissions [50]. Particularly, in tree-structured data collection WSNs, packets are routed towards a sink node [51]. Each node in the collection tree stores the addresses of its direct and indirect child nodes in its local BF.…”
Section: B Packet Routing and Forwardingmentioning
confidence: 99%
“…A hierarchy of BFs were used by the sink, cluster head ports, and each cluster head itself to filter out unpromising transmissions [50]. Particularly, in tree-structured data collection WSNs, packets are routed towards a sink node [51]. Each node in the collection tree stores the addresses of its direct and indirect child nodes in its local BF.…”
Section: B Packet Routing and Forwardingmentioning
confidence: 99%
“…In case multiple hash functions are being used, the input data is combined with index of the hash function (similar to the notion of a cryptographic salt) prior to hashing. Bob Jenkins' hash has particularly been chosen because of its speed and its minimal resource demand on motes [21]. In order to add a destination address to the BF, we take the output of each hash function modulo the size of the Bloom filter and set the resulting bit offsets in the BF.…”
Section: Bloom Filter Dimensioning and Beaconing Energy Consumptionmentioning
confidence: 99%
“…Some works have adressed this problem from different perspectives [14,15,16,17]. [14] presents CBFR, a routing scheme that builds upon collection protocols to enable point-to-point communication. Each node in the collection tree stores the addresses of its direct and indirect child nodes using Bloom filters to save memory space.…”
Section: Related Workmentioning
confidence: 99%
“…To solve this problem, they propose a new address assignment and routing scheme for LT WSN. [14] presents CBFR, a routing scheme that builds upon collection protocols to enable point-to-point communication. To do that, each node in the collection tree stores the addresses of its There are several studies evaluating the specification and operation of the RPL protocol.…”
Section: Related Workmentioning
confidence: 99%