2015
DOI: 10.13052/jcsm2245-1439.411
|View full text |Cite
|
Sign up to set email alerts
|

Torrent-Based Dissemination in Infrastructure-Less Wireless Networks

Abstract: Content dissemination in peer-to-peer mobile ad-hoc networks is subject to disruptions due to erratic link performance and intermittent connectivity. Distributed protocols such as BitTorrent are now ubiquitously used for content dissemination in wired Internet-scale networks, but are not infrastructure-less, which makes them unsuitable for MANETs. Our approach (called SISTO) is a fully distributed and torrent-based solution, with four key features: (i) freedom from any reliance on infrastructure; (ii) network … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…When a trusted metadata server is present, it is relatively easy to manage the access rights [41]; the server checks if the user is allowed to access the file before distributing the location. In a full P2P network [38,25], with untrusted nodes and pieces of data that are publicly accessible, managing access rights poses a different challenge. The main challenge a delegation mechanism to distribute access rights to users or to the nodes that we want to allow permission to process the data; a performance comparison with a solution based on key splitting, including the impact of network limitations on each method.…”
Section: Introductionmentioning
confidence: 99%
“…When a trusted metadata server is present, it is relatively easy to manage the access rights [41]; the server checks if the user is allowed to access the file before distributing the location. In a full P2P network [38,25], with untrusted nodes and pieces of data that are publicly accessible, managing access rights poses a different challenge. The main challenge a delegation mechanism to distribute access rights to users or to the nodes that we want to allow permission to process the data; a performance comparison with a solution based on key splitting, including the impact of network limitations on each method.…”
Section: Introductionmentioning
confidence: 99%