73 research outputs found
On the Role of Mobility for Multi-message Gossip
We consider information dissemination in a large -user wireless network in
which users wish to share a unique message with all other users. Each of
the users only has knowledge of its own contents and state information;
this corresponds to a one-sided push-only scenario. The goal is to disseminate
all messages efficiently, hopefully achieving an order-optimal spreading rate
over unicast wireless random networks. First, we show that a random-push
strategy -- where a user sends its own or a received packet at random -- is
order-wise suboptimal in a random geometric graph: specifically,
times slower than optimal spreading. It is known that this
gap can be closed if each user has "full" mobility, since this effectively
creates a complete graph. We instead consider velocity-constrained mobility
where at each time slot the user moves locally using a discrete random walk
with velocity that is much lower than full mobility. We propose a simple
two-stage dissemination strategy that alternates between individual message
flooding ("self promotion") and random gossiping. We prove that this scheme
achieves a close to optimal spreading rate (within only a logarithmic gap) as
long as the velocity is at least . The key
insight is that the mixing property introduced by the partial mobility helps
users to spread in space within a relatively short period compared to the
optimal spreading time, which macroscopically mimics message dissemination over
a complete graph.Comment: accepted to IEEE Transactions on Information Theory, 201
A label based routing protocol for wireless sensor networks
One of the challenging issues in wireless sensor networks is to acquire, process, and transmit information using the least amount of battery power; In response to this problem, a novel routing scheme for wireless sensor networks, called Information Dissemination via Label Forwarding (IDLF) , is presented. IDLF consists of three information exchanging stages. In the first stage, a label is disseminated by a source. After a sink receives the label, it replies a request to the source. By exchanging a label and request, a data path between a source and sink is formed. Finally, an actual data is transmitted through the data path. Transmitting labels and requests, instead of actual data, reduces the redundant transmissions of data packets, and thus achieves energy savings; In addition to IDLF, four energy management schemes---directional forwarding, minimum transmission around the sink, battery threshold value, and differential coding---are proposed. We compare IDLF with flooding and another wireless routing protocol named SPIN. The simulation results show that the IDLF together with four energy management schemes can save a significant amount of energy compared to the other two routings
LightChain: A DHT-based Blockchain for Resource Constrained Environments
As an append-only distributed database, blockchain is utilized in a vast
variety of applications including the cryptocurrency and Internet-of-Things
(IoT). The existing blockchain solutions have downsides in communication and
storage efficiency, convergence to centralization, and consistency problems. In
this paper, we propose LightChain, which is the first blockchain architecture
that operates over a Distributed Hash Table (DHT) of participating peers.
LightChain is a permissionless blockchain that provides addressable blocks and
transactions within the network, which makes them efficiently accessible by all
the peers. Each block and transaction is replicated within the DHT of peers and
is retrieved in an on-demand manner. Hence, peers in LightChain are not
required to retrieve or keep the entire blockchain. LightChain is fair as all
of the participating peers have a uniform chance of being involved in the
consensus regardless of their influence such as hashing power or stake.
LightChain provides a deterministic fork-resolving strategy as well as a
blacklisting mechanism, and it is secure against colluding adversarial peers
attacking the availability and integrity of the system. We provide mathematical
analysis and experimental results on scenarios involving 10K nodes to
demonstrate the security and fairness of LightChain. As we experimentally show
in this paper, compared to the mainstream blockchains like Bitcoin and
Ethereum, LightChain requires around 66 times less per node storage, and is
around 380 times faster on bootstrapping a new node to the system, while each
LightChain node is rewarded equally likely for participating in the protocol
- …