• DocumentCode
    1004983
  • Title

    Fully pipelined bloom filter architecture

  • Author

    Paynter, Michael ; Kocak, Taskin

  • Author_Institution
    Dept. of Electr. & Electron. Engieering, Bristol Univ., Bristol
  • Volume
    12
  • Issue
    11
  • fYear
    2008
  • fDate
    11/1/2008 12:00:00 AM
  • Firstpage
    855
  • Lastpage
    857
  • Abstract
    Recently, we proposed a two-stage pipelined Bloom filter architecture to save power for network security applications. In this letter, we generalize the pipelined Bloom filter architecture to k-stage and show that significant power savings can be achieved by employing one hash function per stage. We analytically show that the expected power consumption and latency of the fully pipelined Bloom filter architecture will not be greater than that of the two hash functions and two clock cycles, respectively, however large the number of hash functions is. Furthermore, we discuss the worst-case performance of the proposed architecture.
  • Keywords
    data structures; filters; pipeline processing; power consumption; clock cycles; hash functions; network security; power consumption; power savings; two-stage pipelined Bloom filter; Clocks; Delay; Energy consumption; Filters; Hardware; Intrusion detection; Peer to peer computing; Routing; Telecommunication traffic; Testing; Bloom filters; low-power design; network intrusion detection;
  • fLanguage
    English
  • Journal_Title
    Communications Letters, IEEE
  • Publisher
    ieee
  • ISSN
    1089-7798
  • Type

    jour

  • DOI
    10.1109/LCOMM.2008.081176
  • Filename
    4685977