IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications 2007
DOI: 10.1109/infcom.2007.194
|View full text |Cite
|
Sign up to set email alerts
|

Data Persistence in Large-Scale Sensor Networks with Decentralized Fountain Codes

Abstract: It may not be feasible for sensor networks monitoring nature and inaccessible geographical regions to include powered sinks with Internet connections. We consider the scenario where sinks are not present in large-scale sensor networks, and unreliable sensors have to collectively resort to storing sensed data over time on themselves. At a time of convenience, such cached data from a small subset of live sensors may be collected by a centralized (possibly mobile) collector. In this paper, we propose a decentrali… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
163
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 122 publications
(163 citation statements)
references
References 16 publications
0
163
0
Order By: Relevance
“…The dynamic and self-organizing nature of large-scale distributed systems brings more challenges to this issue. Over the past few years, numerous methods and techniques have been proposed for monitoring, modeling, detecting failures [8,9,10], and various schemes have been developed to improve the availability and the system resiliency [11,12,13,14,15] to provide reliable services.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The dynamic and self-organizing nature of large-scale distributed systems brings more challenges to this issue. Over the past few years, numerous methods and techniques have been proposed for monitoring, modeling, detecting failures [8,9,10], and various schemes have been developed to improve the availability and the system resiliency [11,12,13,14,15] to provide reliable services.…”
Section: Related Workmentioning
confidence: 99%
“…This school of approaches mainly focuses on network anomaly and dynamic failure and is not beneficial to normal cases. Some other recently proposed algorithms also address the reliability problems of overlay networks [11,12,13,14], but they treat all the nodes equally without distinguishing the "critical" nodes from the ordinary ones. Indeed, critical nodes do exist in all sorts of distributed systems, such as critical nodes in service [16], in data or resources [11], and in topology.…”
Section: Related Workmentioning
confidence: 99%
“…A decentralized implementation of Fountain codes for distributed data storage that uses geographic routing was proposed by Dimakis et al [15,16]. Another approach that uses random walks with traps to disseminate the source packets throughout the network was proposed by Lin et al [52]. A technique called growth codes to increase data persistence in wireless sensor networks by increasing the amount of information that can be recovered at the sink was introduced by Kamara et al [43].…”
Section: Notesmentioning
confidence: 99%
“…Collecting any subset of Raptor packets slightly larger than the size of the distributed network data content is sufficient for successful data recovery with high probability. As opposed to recently proposed node-centric distributed rateless coding schemes, where network nodes are responsible for collecting information packets and performing rateless encoding [5]- [7], the proposed approach is packetcentric as the encoding task is controlled by the Raptor packets themselves. Creating Raptor packets is a two-step procedure that corresponds to precoding and LT-coding step in standard Raptor codes.…”
Section: Introductionmentioning
confidence: 99%
“…It is applicable in many networking scenarios such as data gathering [5], data persistence [4] or distributed network storage [3][6] [7]. The efficiency of the proposed scheme is shown to approach closely the performance of centralized Raptor codes.…”
Section: Introductionmentioning
confidence: 99%