Hash-based paging and location update using Bloom filters

被引:8
|
作者
Mutaf, P [1 ]
Castelluccia, C [1 ]
机构
[1] INRIA Rhone Alpes, Planete Team, F-38334 Saint Ismier, France
来源
MOBILE NETWORKS & APPLICATIONS | 2004年 / 9卷 / 06期
关键词
bloom filters; concurrent paging; false location update; IP paging; MIPv6;
D O I
10.1023/B:MONE.0000042501.94708.b2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We develop and analyze a hash-based paging and location update technique that reduces the paging cost in cellular systems. By applying a Bloom filter, the terminal identifier field of a paging message is coded to page a number of terminals concurrently. A small number of terminals may wake up and send what we call "false location updates" although they are not being paged. We compare the total number of paging and false location update messages with the cost of the standard paging procedure. Fortunately, the false location update probabilities can be made very small, and important bandwidth gains can be expected. The larger the size of the terminal identifier, the less probable are false location updates. Therefore, hash-based paging especially shows promise for IP paging in mobile IPv6 networks with 128-bit mobile host addresses.
引用
收藏
页码:627 / 631
页数:5
相关论文
共 50 条
  • [1] Hash-Based Paging and Location Update Using Bloom Filters
    Pars Mutaf
    Claude Castelluccia
    Mobile Networks and Applications, 2004, 9 : 627 - 631
  • [2] A Hash-based Scalable IP lookup using Bloom and Fingerprint Filters
    Yu, Heeyeol
    Mahapatra, Rabi
    Bhuyan, Laxmi
    2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 264 - +
  • [3] A scalable hash-based mobile agent location mechanism
    Kastidou, G
    Pitoura, E
    Samaras, G
    23RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2003, : 472 - 477
  • [4] Hash-based signature revisited
    Lingyun Li
    Xianhui Lu
    Kunpeng Wang
    Cybersecurity, 5
  • [5] Hash-based encryption system
    Peyravian, M
    Roginsky, A
    Zunic, N
    COMPUTERS & SECURITY, 1999, 18 (04) : 345 - 350
  • [6] Shorter hash-based signatures
    Pereira, Geovandro C. C. F.
    Puodzius, Cassius
    Barreto, Paulo S. L. M.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 : 95 - 100
  • [7] Hash-based IP traceback
    Snoeren, AC
    Partridge, C
    Sanchez, LA
    Jones, CE
    Tchakountio, F
    Kent, ST
    Strayer, WT
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (04) : 3 - 14
  • [8] Hash-based signature revisited
    Li, Lingyun
    Lu, Xianhui
    Wang, Kunpeng
    CYBERSECURITY, 2022, 5 (01)
  • [9] Aggregating and Thresholdizing Hash-based Signatures using STARKs
    Khaburzaniya, Irakliy
    Chalkias, Konstantinos
    Lewi, Kevin
    Malvai, Harjasleen
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 393 - 407
  • [10] Lightweight Paging based on Location Update Intervals in LTE Network
    Hashimoto, Takeshi
    Kubo, Takeshi
    Kitatsuji, Yoshinori
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,