Bloom-filter-aided redundancy elimination in opportunistic communications

Gwangwoo Park, Youngjun Shim, Insun Jang, Sangheon Pack

    Research output: Contribution to journalArticlepeer-review

    6 Citations (Scopus)

    Abstract

    Opportunistic communication is a promising solution to offload mobile data traffic by exchanging data among mobile devices without the aid of infrastructures. However, considerable redundant traffic can be transmitted in opportunistic communications. In this article, we introduce a protocol-independent redundancy elimination (RE) technique to reduce redundant data traffic at the packet level. Specifically, we propose a Bloom-filter-aided RE (BFRE) to further improve the performance of RE on opportunistic communication links. In BFRE, the receiver predicts the next consecutive data transmissions and delivers the compressed information to the sender by means of a Bloom filter. Then the sender can transmit small encoded packets, and the data traffic can be effectively reduced. Extensive simulation results demonstrate that BFRE can significantly reduce traffic and transmission time by 34 and 23 percent, respectively.

    Original languageEnglish
    Article number7422413
    Pages (from-to)112-119
    Number of pages8
    JournalIEEE Wireless Communications
    Volume23
    Issue number1
    DOIs
    Publication statusPublished - 2016 Feb

    Bibliographical note

    Funding Information:
    This work was supported in part by a National Research Foundation of Korea Grant funded by the Korean Government (NRF- 2014R1A2A1A12066986) and in part by the MSIP (Ministry of Science, ICT & Future Planning), Korea, under the ITRC support program (IITP-2015-H8501-15-1007) supervised by the IITP (Institute for Information & communications Technology Promotion).

    Publisher Copyright:
    © 2016 IEEE.

    ASJC Scopus subject areas

    • Computer Science Applications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Bloom-filter-aided redundancy elimination in opportunistic communications'. Together they form a unique fingerprint.

    Cite this