Optimizing BLE-Like Neighbor Discovery

نویسندگان

چکیده

Neighbor discovery (ND) protocols are used for establishing a first contact between multiple wireless devices. The energy consumption and latency of this procedure determined by the parametrization protocol. In most existing protocols, reception transmission temporally coupled. Such schemes referred to as slotted , which problem finding optimized parametrizations has been studied thoroughly in literature. However, slotted approaches not efficient applications new devices join network gradually only joining master node need run ND protocol simultaneously. For example, is typically case IoT scenarios or bluetooth low (BLE) piconets. Here, xmlns:xlink="http://www.w3.org/1999/xlink">slotless that decouple can achieve significantly lower worst-case latencies than ones. paper, we study slotless, BLE-like schedule receptions transmissions independently using periodic intervals (PI). class optimal parameter values remain unknown. To address this, propose an optimization framework PI-based translates any specified duty-cycle (and therefore budget) into set values. We show resulting from one variant our proposed scheme when receiver discovers transmitter, no other – neither nor slotless guarantee given scenario. Since utilizes channel more aggressively beacons will collide frequently. Hence, due collisions, rate successful discoveries gracefully decreases larger numbers discovering each also configuring BLE just BLE- xmlns:xlink="http://www.w3.org/1999/xlink">like protocols). Though it clear whether minimize BLE, reasonably be guaranteed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analytical and Experimental Performance Evaluation of BLE Neighbor Discovery Process Including Non-Idealities of Real Chipsets

The purpose of this paper is to evaluate from a real perspective the performance of Bluetooth Low Energy (BLE) as a technology that enables fast and reliable discovery of a large number of users/devices in a short period of time. The BLE standard specifies a wide range of configurable parameter values that determine the discovery process and need to be set according to the particular applicatio...

متن کامل

Compact neighbor discovery

We present a stateless defense against the Neighbor Discovery Denial-of-Service (ND-DoS) attack in IPv6. The ND-DoS attack consists of remotely flooding a target subnet with bogus packets destined for random interface identifiers; a different one for each malicious packet. The 128-bit IPv6 address reserves its 64 low-order bits for the interface ID. Consequently, the malicious packets are very ...

متن کامل

Secure Neighbor Discovery Working

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as refer...

متن کامل

Operational Neighbor Discovery Problems

In IPv4, subnets are generally small, made just large enough to cover the actual number of machines on the subnet. In contrast, the default IPv6 subnet size is a /64, a number so large it covers trillions of addresses, the overwhelming number of which will be unassigned. Consequently, simplistic implementations of Neighbor Discovery (ND) can be vulnerable to deliberate or accidental denial of s...

متن کامل

Extensions to IPv6 Neighbor Discovery for Inverse Discovery Specification

Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes extensions t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Mobile Computing

سال: 2022

ISSN: ['2161-9875', '1536-1233', '1558-0660']

DOI: https://doi.org/10.1109/tmc.2020.3028270