Adapting distributed hash tables for mobile ad hoc networks

被引:7
|
作者
Heer, T [1 ]
Goetz, S [1 ]
Rieche, S [1 ]
Wehrle, K [1 ]
机构
[1] Univ Tubingen, Wilhelm Schickard Inst Comp Sci, Protocol Engn & Distributed Syst Grp, Tubingen, Germany
来源
FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS | 2006年
关键词
D O I
10.1109/PERCOMW.2006.16
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While unstructured P2P systems have been embraced widely in mobile ad-hoc networks (MANETs), the applicability of structured approaches like Distributed Hash Tables (DHTs) to such settings remains controversial. Existing research delivers promising empirical results addressing the concerns about performance, complexity, and reliability, but does not analyze the principles of combining DHTs and MANETs. This paper identifies and discusses the fundamental implications of non-infrastructural networks for DHTs and analyzes solutions to these challenges.
引用
收藏
页码:173 / +
页数:2
相关论文
共 50 条
  • [1] Bridging Distributed Hash Tables in wireless ad-hoc networks
    Cheng, Lawrence
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 5159 - 5163
  • [2] Distributed and dynamic Voronoi overlays for coverage detection and distributed hash tables in ad-hoc networks
    Carbunar, B
    Grama, A
    Vitek, J
    TENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 549 - 556
  • [3] CHR:: a distributed hash table for wireless ad hoc networks
    Araújo, F
    Rodrigues, L
    Kaiser, J
    Liu, C
    Mitidieri, C
    25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2005, : 407 - 413
  • [4] Distributed Firewall in Mobile Ad Hoc Networks
    Filipek, Jozef
    Hudec, Ladislav
    2015 IEEE 13TH INTERNATIONAL SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI), 2015, : 233 - 238
  • [5] A Distributed Simulator of Mobile Ad Hoc Networks
    Shu, Xiaowei
    Wang, Hao
    Xu, Zhou
    Ning, Kaiwen
    Wu, Guowei
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT III, 2022, 13473 : 165 - 177
  • [6] TYPHOON: mobile distributed hash tables
    Hsiao, HC
    King, CT
    Wang, CW
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2005, 65 (02) : 191 - 206
  • [7] Authentication employing neighbor tables in mobile ad hoc networks
    Azzabi, Dorsaf
    Tanaka, Kunihito
    Yamamoto, Ushio
    Onozato, Yoshikuni
    WINSYS 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS, 2008, : 47 - 52
  • [8] A distributed trust mechanism for mobile ad hoc networks
    Sen, Jaydip
    Chowdhury, Piyah Roy
    Sengupta, Indranil
    2006 INTERNATIONAL SYMPOSIUM ON AD HOC AND UBIQUITOUS COMPUTING, 2007, : 60 - +
  • [9] Distributed proximity maintenance in ad hoc mobile networks
    Gao, J
    Guibas, LJ
    Nguyen, A
    DISTRIBUTED COMPUTING IN SENSOR SYSTEMS, PROCEEDINGS, 2005, 3560 : 4 - 19
  • [10] Distributed event notification for mobile Ad Hoc networks
    Skjelsvik, Katrine Stemland
    Goebel, Vera
    Plagemann, Thomas
    IEEE Distributed Systems Online, 2004, 5 (08):