Hash-based paging and location update using Bloom filters

被引:8
|
作者
Mutaf, P [1 ]
Castelluccia, C [1 ]
机构
[1] INRIA Rhone Alpes, Planete Team, F-38334 Saint Ismier, France
来源
MOBILE NETWORKS & APPLICATIONS | 2004年 / 9卷 / 06期
关键词
bloom filters; concurrent paging; false location update; IP paging; MIPv6;
D O I
10.1023/B:MONE.0000042501.94708.b2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We develop and analyze a hash-based paging and location update technique that reduces the paging cost in cellular systems. By applying a Bloom filter, the terminal identifier field of a paging message is coded to page a number of terminals concurrently. A small number of terminals may wake up and send what we call "false location updates" although they are not being paged. We compare the total number of paging and false location update messages with the cost of the standard paging procedure. Fortunately, the false location update probabilities can be made very small, and important bandwidth gains can be expected. The larger the size of the terminal identifier, the less probable are false location updates. Therefore, hash-based paging especially shows promise for IP paging in mobile IPv6 networks with 128-bit mobile host addresses.
引用
收藏
页码:627 / 631
页数:5
相关论文
共 50 条
  • [41] A new hash-based authentication protocol for RFID using varying identifiers
    Li, Shu
    Yang, Xi
    Liang, Ping-yuan
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2112 - 2116
  • [42] Hash-Based TPM Signatures for the Quantum World
    Ando, Megumi
    Guttman, Joshua D.
    Papaleo, Alberto R.
    Scire, John
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 77 - 94
  • [43] Fast hash-based signatures on constrained devices
    Rohde, Sebastian
    Eisenbarth, Thomas
    Dahmen, Erik
    Buchmann, Johannes
    Paar, Christof
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2008, 5189 : 104 - +
  • [44] Analysis of a Proposed Hash-Based Signature Standard
    Katz, Jonathan
    SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 261 - 273
  • [45] A Comparison of Hash-Based Methods for Trajectory Clustering
    Rayatidamavandi, Maede
    Zhuang, Yu
    Rahnamay-Naeini, Mahshid
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 107 - 112
  • [46] A hash-based pseudonymization infrastructure for RFID systems
    Henrici, Dirk
    Goetze, Joachim
    Mueller, Paul
    SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
  • [47] Hash-Based Virtual Hierarchies for Scalable Location Service in Mobile Ad-hoc Networks
    Wei Wang
    Chinya V. Ravishankar
    Mobile Networks and Applications, 2009, 14 : 625 - 637
  • [48] Hash-tree PCA: accelerating PCA with hash-based grouping
    Lkhagvadorj Battulga
    Sang-Hyun Lee
    Aziz Nasridinov
    Kwan-Hee Yoo
    The Journal of Supercomputing, 2020, 76 : 8248 - 8264
  • [49] A secure searchable encryption scheme for cloud using hash-based indexing
    Andola, Nitish
    Prakash, Sourabh
    Yadav, Vijay Kumar
    Raghav
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2022, 126 : 119 - 137
  • [50] Counter-Terrorism Video Analysis Using Hash-Based Algorithms
    Garcia-Retuerta, David
    Bartolome, Alvaro
    Chamoso, Pablo
    Corchado, Juan Manuel
    ALGORITHMS, 2019, 12 (05):