2008 International Conference on Information Processing in Sensor Networks (Ipsn 2008) 2008
DOI: 10.1109/ipsn.2008.64
|View full text |Cite
|
Sign up to set email alerts
|

Fountain Codes Based Distributed Storage Algorithms for Large-Scale Wireless Sensor Networks

Abstract: We consider large-scale networks with n nodes, out of which k are in possession, (e.g., have sensed or collected in some other way) k information packets. In the scenarios in which network nodes are vulnerable because of, for example, limited energy or a hostile environment, it is desirable to disseminate the acquired information throughout the network so that each of the n nodes stores one (possibly coded) packet and the original k source packets can be recovered later in a computationally simple way from any… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
70
1
3

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 47 publications
(74 citation statements)
references
References 16 publications
0
70
1
3
Order By: Relevance
“…The coding techniques overcome the problem of increasing amount of data when storing several copies. Two main storage classes are used for WSNs: Fountain Codes Based Distributed Storage (FCBDS) [63] and Raptor Codes Based Distributed Storage (RCBDS) [64].…”
Section: Data Storagementioning
confidence: 99%
See 2 more Smart Citations
“…The coding techniques overcome the problem of increasing amount of data when storing several copies. Two main storage classes are used for WSNs: Fountain Codes Based Distributed Storage (FCBDS) [63] and Raptor Codes Based Distributed Storage (RCBDS) [64].…”
Section: Data Storagementioning
confidence: 99%
“…In [63], the authors presented two redundant data storage schemes based on FCBDS. They considered a large scale wireless sensor network with n nodes and only k (k << n) sensors handling information.…”
Section: Data Storagementioning
confidence: 99%
See 1 more Smart Citation
“…Crepaldi et al and Rossi et al propose two different code dissemination protocols for wireless sensor network reprogramming, named FRP [45] and SYNAPSE [46]. These two protocols both adopt the code methodology called Fountain Code [47][48][49][50]. Ha et al prove that Luby Transform (LT) code [51] is also an implementation of Fountain Code.…”
Section: Network Reprogrammingmentioning
confidence: 99%
“…But the total message cost is O(n √ n) for uniformly randomly distributed sensors. Fountain codes and other erasure codes have been used for in-network coding [1,2,13,14] as well. These papers use random walk with the Metropolis algorithm to disseminate packets from data nodes.…”
Section: Related Workmentioning
confidence: 99%