skip to main content
10.1145/1287791.1287800acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article

Detecting the presence of nodes in MANETs

Published: 14 September 2007 Publication History

Abstract

While mobility in the sense of node movement has been an intensively studied aspect of mobile ad-hoc networks (MANETs), another aspect of mobility has not yet been subjected to systematic research: nodes may not only move around but also enter and leave the network. In fact, many proposed protocols for MANETs exhibit worst-case behavior when an intended communication partner is currently not present. Therefore, knowing whether a given node is currently present in the network can often help to avoid unnecessary overhead. In this paper, we present a solution to the presence detection problem. Our method uses a Bloom filter-based beaconing mechanism to aggregate and distribute information about the presence of network nodes. Analytical and simulation results show interesting properties of presence detection in wireless multihop environments and underline the effectiveness and practical applicability of our approach.

References

[1]
B. H. Bloom. Space/Time Trade-offs in Hash Coding with Allowable Errors. Communications of the ACM, 3(7):422--426, July 1970.
[2]
K. Cheng, M. Iwaihara, L. Xiang, and K. Ushijima. Efficient Web Profiling by Time-Decaying Bloom Filters. Database Society of Japan Letters, 4(1):137--140, June 2005.
[3]
K. Cheng, L. Xiang, M. Iwaihara, H. Xu, and M. M. Mohania. Time-Decaying Bloom Filters for Data Streams with Skewed Distributions. In RIDE-SDMA '05: Proceedings of the 15th International Workshop on Research Issues in Data Engineering: Stream Data Mining and Applications, pages 63--69, Apr. 2005.
[4]
N. Eagle and A. Pentland. Social Serendipity: Mobilizing Social Software. IEEE Pervasive Computing, 4(2):28--34, Apr. 2005.
[5]
L. Fan, P. Cao, J. Almeida, and A. Z. Broder. Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. IEEE/ACM Transactions on Networking, 8(3):281--293, June 2000.
[6]
R. Gilbert, K. Johnson, S. Wu, B. Y. Zhao, and H. Zheng. Location Independent Compact Routing for Wireless Networks. In MobiShare '06: Proceedings of the 1st International Workshop on Decentralized Resource Sharing in Mobile Computing and Networking, pages 57--59, July 2006.
[7]
S. Giordano and M. Hamdi. Mobility Management: The Virtual Home Region. Technical Report SSC/1999/037, EPFL-ICA, Lausanne, Switzerland, Oct. 1999.
[8]
P. Gupta and P. R. Kumar. The Capacity of Wireless Networks. IEEE Transactions on Information Theory, 46(2):388--404, Mar. 2000.
[9]
L. E. Holmquist, J. Falk, and J. Wigström. Supporting Group Collaboration with Interpersonal Awareness Devices. Springer Personal and Ubiquitous Computing, 3(1/2):13--21, Mar. 1999.
[10]
Y. Iwatani. Love: Japanese Style. Wired News, online, http://www.wired.com/news/culture/0,1284,12899,00.html, June 1998.
[11]
P. Jacquet, P. Mühlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot. Optimized Link State Routing Protocol. In INMIC '01: Proceedings of the 5th IEEE International Multi Topic Conference, pages 62--68, Dec. 2001.
[12]
D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In T. Imielinski and H. F. Korth, editors, Mobile Computing, pages 153--181. Kluwer Academic Publishers, Norwell, MA, USA, Jan. 1996.
[13]
W. Kiess, H. Füβler, J. Widmer, and M. Mauve. Hierarchical Location Service for Mobile Ad-Hoc Networks. ACM Mobile Computing and Communications Review, 8(4):47--58, Oct. 2004.
[14]
C. Lee, S. Yoon, E. Kim, and A. Helal. An Efficient Service Propagation Scheme for Large-Scale MANETs. In MPAC '06: Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad-Hoc Computing, pages 9--12, Nov. 2006.
[15]
C. Lindemann and O. P. Waldhorst. Effective Dissemination of Presence Information in Highly Partitioned Mobile Ad Hoc Networks. In SECON '06: Proceedings of the 3rd IEEE ComSoc Conference on Sensor, Mesh and Ad Hoc Communications and Networks, Sept. 2006.
[16]
R. Morris, J. Jannotti, F. Kaashoek, J. Li, and D. S. J. DeCouto. CarNet: A Scalable Ad Hoc Wireless Network System. In Proceedings of the 9th ACM SIGOPS European Workshop, pages 61--65, Sept. 2000.
[17]
The Network Simulator ns-2, version 2.30. Online, http://www.isi.edu/nsnam/ns/.
[18]
C. E. Perkins and E. M. Royer. Ad-hoc On-Demand Distance Vector Routing. In WMCSA '99: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pages 90--100, Feb. 1999.
[19]
S. C. Rhea and J. Kubiatowicz. Probabilistic Location and Routing. In INFOCOM '02: Proceedings of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies, volume 3, pages 1248--1257, June 2002.
[20]
I. Stojmenovic. Home Agent Based Location Update and Destination Search Schemes in Ad Hoc Wireless Networks. Technical Report TR-99-10, University of Ottawa, Sept. 1999.
[21]
M. Terry, E. D. Mynatt, K. Ryall, and D. Leigh. Social Net: Using Patterns of Physical Proximity Over Time to Infer Shared Interests. In CHI '02: Extended Abstracts on Human Factors in Computing Systems, pages 816--817, Apr. 2002.

Cited By

View all
  • (2011)Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc NetworkApplied Informatics and Communication10.1007/978-3-642-23214-5_31(233-240)Online publication date: 2011
  • (2009)Node presence detection with reduced overheadProceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services10.5555/1688899.1688904(33-40)Online publication date: 2-Feb-2009
  • (2009)Node presence detection with reduced overhead2009 Sixth International Conference on Wireless On-Demand Network Systems and Services10.1109/WONS.2009.4801831(37-44)Online publication date: Feb-2009
  • Show More Cited By

Index Terms

  1. Detecting the presence of nodes in MANETs

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CHANTS '07: Proceedings of the second ACM workshop on Challenged networks
        September 2007
        108 pages
        ISBN:9781595937377
        DOI:10.1145/1287791
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 14 September 2007

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. MANETs
        2. mobile ad-hoc networks
        3. presence detection
        4. soft state bloom filter

        Qualifiers

        • Article

        Conference

        MobiCom/MobiHoc '07
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 61 of 159 submissions, 38%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)1
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 18 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2011)Protecting Flow Design for DoS Attack and Defense at the MAC Layer in Mobile Ad Hoc NetworkApplied Informatics and Communication10.1007/978-3-642-23214-5_31(233-240)Online publication date: 2011
        • (2009)Node presence detection with reduced overheadProceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services10.5555/1688899.1688904(33-40)Online publication date: 2-Feb-2009
        • (2009)Node presence detection with reduced overhead2009 Sixth International Conference on Wireless On-Demand Network Systems and Services10.1109/WONS.2009.4801831(37-44)Online publication date: Feb-2009
        • (2009)Content registration in VANETs— saving bandwidth through node cooperation2009 IEEE 34th Conference on Local Computer Networks10.1109/LCN.2009.5355053(661-668)Online publication date: Oct-2009

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media