CSDL Home IEEE Transactions on Dependable and Secure Computing 2011 vol.8 Issue No.06 - November/December
Issue No.06 - November/December (2011 vol.8)
Vadim Drabkin , Technion - Israel Institute of Technology, Haifa
Roy Friedman , Technion - Israel Institute of Technology, Haifa
Gabriel Kliot , Microsoft Research, Redmond
Marc Segal , Technion - Israel Institute of Technology, Haifa
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TDSC.2010.54
Reliable broadcast is a basic service for many collaborative applications as it provides reliable dissemination of the same information to many recipients. This paper studies three common approaches for achieving scalable reliable broadcast in ad hoc networks, namely probabilistic flooding, counter-based broadcast, and lazy gossip. The strength and weaknesses of each scheme are analyzed, and a new protocol that combines these three techniques, called RAPID, is developed. Specifically, the analysis in this paper focuses on the trade-offs between reliability (percentage of nodes that receive each message), latency, and the message overhead of the protocol. Each of these methods excel in some of these parameters, but no single method wins in all of them. This motivates the need for a combined protocol that benefits from all of these methods and allows to trade between them smoothly. Interestingly, since the RAPID protocol only relies on local computations and probability, it is highly resilient to mobility and failures and even selfish behavior. By adding authentication, it can even be made malicious tolerant. Additionally, the paper includes a detailed performance evaluation by simulation. The simulations confirm that RAPID obtains higher reliability with low latency and good communication overhead compared with each of the individual methods.
Reliable broadcast, probabilistic broadcast, fault tolerance, ad hoc networks.
Vadim Drabkin, Roy Friedman, Gabriel Kliot, Marc Segal, "On Reliable Dissemination in Wireless Ad Hoc Networks", IEEE Transactions on Dependable and Secure Computing, vol.8, no. 6, pp. 866-882, November/December 2011, doi:10.1109/TDSC.2010.54