73 research outputs found

    On the Role of Mobility for Multi-message Gossip

    Full text link
    We consider information dissemination in a large nn-user wireless network in which kk users wish to share a unique message with all other users. Each of the nn users only has knowledge of its own contents and state information; this corresponds to a one-sided push-only scenario. The goal is to disseminate all messages efficiently, hopefully achieving an order-optimal spreading rate over unicast wireless random networks. First, we show that a random-push strategy -- where a user sends its own or a received packet at random -- is order-wise suboptimal in a random geometric graph: specifically, Ω(n)\Omega(\sqrt{n}) times slower than optimal spreading. It is known that this gap can be closed if each user has "full" mobility, since this effectively creates a complete graph. We instead consider velocity-constrained mobility where at each time slot the user moves locally using a discrete random walk with velocity v(n)v(n) that is much lower than full mobility. We propose a simple two-stage dissemination strategy that alternates between individual message flooding ("self promotion") and random gossiping. We prove that this scheme achieves a close to optimal spreading rate (within only a logarithmic gap) as long as the velocity is at least v(n)=ω(logn/k)v(n)=\omega(\sqrt{\log n/k}). The key insight is that the mixing property introduced by the partial mobility helps users to spread in space within a relatively short period compared to the optimal spreading time, which macroscopically mimics message dissemination over a complete graph.Comment: accepted to IEEE Transactions on Information Theory, 201

    A label based routing protocol for wireless sensor networks

    Full text link
    One of the challenging issues in wireless sensor networks is to acquire, process, and transmit information using the least amount of battery power; In response to this problem, a novel routing scheme for wireless sensor networks, called Information Dissemination via Label Forwarding (IDLF) , is presented. IDLF consists of three information exchanging stages. In the first stage, a label is disseminated by a source. After a sink receives the label, it replies a request to the source. By exchanging a label and request, a data path between a source and sink is formed. Finally, an actual data is transmitted through the data path. Transmitting labels and requests, instead of actual data, reduces the redundant transmissions of data packets, and thus achieves energy savings; In addition to IDLF, four energy management schemes---directional forwarding, minimum transmission around the sink, battery threshold value, and differential coding---are proposed. We compare IDLF with flooding and another wireless routing protocol named SPIN. The simulation results show that the IDLF together with four energy management schemes can save a significant amount of energy compared to the other two routings

    LightChain: A DHT-based Blockchain for Resource Constrained Environments

    Get PDF
    As an append-only distributed database, blockchain is utilized in a vast variety of applications including the cryptocurrency and Internet-of-Things (IoT). The existing blockchain solutions have downsides in communication and storage efficiency, convergence to centralization, and consistency problems. In this paper, we propose LightChain, which is the first blockchain architecture that operates over a Distributed Hash Table (DHT) of participating peers. LightChain is a permissionless blockchain that provides addressable blocks and transactions within the network, which makes them efficiently accessible by all the peers. Each block and transaction is replicated within the DHT of peers and is retrieved in an on-demand manner. Hence, peers in LightChain are not required to retrieve or keep the entire blockchain. LightChain is fair as all of the participating peers have a uniform chance of being involved in the consensus regardless of their influence such as hashing power or stake. LightChain provides a deterministic fork-resolving strategy as well as a blacklisting mechanism, and it is secure against colluding adversarial peers attacking the availability and integrity of the system. We provide mathematical analysis and experimental results on scenarios involving 10K nodes to demonstrate the security and fairness of LightChain. As we experimentally show in this paper, compared to the mainstream blockchains like Bitcoin and Ethereum, LightChain requires around 66 times less per node storage, and is around 380 times faster on bootstrapping a new node to the system, while each LightChain node is rewarded equally likely for participating in the protocol
    corecore