Bloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks

J. Harshan, Amogh Vithalkar, Naman Jhunjhunwala, Manthan Kabra, Prafull Manav, Yih-Chun Hu
{"title":"Bloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks","authors":"J. Harshan, Amogh Vithalkar, Naman Jhunjhunwala, Manthan Kabra, Prafull Manav, Yih-Chun Hu","doi":"10.1109/WCNC45663.2020.9120640","DOIUrl":null,"url":null,"abstract":"A number of applications in next-generation multi-hop networks impose low-latency requirements on data transmission thereby necessitating the underlying relays to introduce negligible delay when forwarding the packets. While traditional relaying techniques such as amplify-and-forward may help the packets to satisfy latency-constraints, such strategies do not facilitate the destination in determining security threats, if any, during the packet’s journey. Inspired by the problem of relaying packets that have low-latency constraints, we revisit the design of provenance embedding algorithms to reduce delays on the packets and yet assist the destination in determining the provenance with no knowledge on the network topology. We propose a new class of provenance embedding techniques, referred to as double-edge (DE) embedding techniques, wherein a subset of the relay nodes in the path strategically skip the provenance embedding process to reduce the delays on the packets. Under the framework of DE embedding techniques, we propose a deterministic skipping strategy among the nodes such that the destination can recover the provenance of every packet. Using fixed-size bloom filters as tools to implement the double-edge embedding ideas, we propose upper bounds on the error-rates of the DE embedding technique as a function of the number of nodes in the network, number of hops, bloom filter size, and the number of hash functions used by each node. Subsequently, we demonstrate the efficacy of the DE embedding technique on a testbed of Digi XBee devices, and show that it outperforms competitive baselines both in terms of latency as well as error-rates.","PeriodicalId":415064,"journal":{"name":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE Wireless Communications and Networking Conference (WCNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCNC45663.2020.9120640","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

A number of applications in next-generation multi-hop networks impose low-latency requirements on data transmission thereby necessitating the underlying relays to introduce negligible delay when forwarding the packets. While traditional relaying techniques such as amplify-and-forward may help the packets to satisfy latency-constraints, such strategies do not facilitate the destination in determining security threats, if any, during the packet’s journey. Inspired by the problem of relaying packets that have low-latency constraints, we revisit the design of provenance embedding algorithms to reduce delays on the packets and yet assist the destination in determining the provenance with no knowledge on the network topology. We propose a new class of provenance embedding techniques, referred to as double-edge (DE) embedding techniques, wherein a subset of the relay nodes in the path strategically skip the provenance embedding process to reduce the delays on the packets. Under the framework of DE embedding techniques, we propose a deterministic skipping strategy among the nodes such that the destination can recover the provenance of every packet. Using fixed-size bloom filters as tools to implement the double-edge embedding ideas, we propose upper bounds on the error-rates of the DE embedding technique as a function of the number of nodes in the network, number of hops, bloom filter size, and the number of hash functions used by each node. Subsequently, we demonstrate the efficacy of the DE embedding technique on a testbed of Digi XBee devices, and show that it outperforms competitive baselines both in terms of latency as well as error-rates.
基于布隆滤波器的无线网络低延迟源嵌入方案
下一代多跳网络中的许多应用对数据传输提出了低延迟要求,因此需要底层中继在转发数据包时引入可忽略不计的延迟。虽然传统的中继技术(如放大转发)可以帮助数据包满足延迟约束,但这种策略不能帮助目的地在数据包的传输过程中确定安全威胁(如果有的话)。受具有低延迟约束的中继数据包问题的启发,我们重新审视了出处嵌入算法的设计,以减少数据包的延迟,并帮助目的地在不了解网络拓扑的情况下确定出处。我们提出了一类新的来源嵌入技术,称为双边缘(DE)嵌入技术,其中路径中的中继节点子集策略性地跳过来源嵌入过程以减少数据包的延迟。在DE嵌入技术的框架下,我们提出了一种节点间的确定性跳变策略,使目的地能够恢复每个数据包的来源。使用固定大小的布隆过滤器作为工具来实现双边嵌入思想,我们提出了DE嵌入技术错误率的上界,作为网络中节点数量、跳数、布隆过滤器大小和每个节点使用的哈希函数数量的函数。随后,我们在Digi XBee设备的测试平台上展示了DE嵌入技术的有效性,并表明它在延迟和错误率方面都优于竞争基准。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信