Skip to main content

Advertisement

Log in

Sleeping on the Job: Energy-Efficient and Robust Broadcast for Radio Networks

  • Published:
Algorithmica Aims and scope Submit manuscript

Abstract

We address the problem of minimizing power consumption when broadcasting a message from one node to all the other nodes in a radio network. To enable power savings for such a problem, we introduce a compelling new data streaming problem which we call the Bad Santa problem. Our results on this problem apply for any situation where: (1) a node can listen to a set of n nodes, out of which at least half are non-faulty and know the correct message; and (2) each of these n nodes sends according to some predetermined schedule which assigns each of them its own unique time slot. In this situation, we show that in order to receive the correct message with probability 1, it is necessary and sufficient for the listening node to listen to a \(\Theta(\sqrt{n})\) expected number of time slots. Moreover, if we allow for repetitions of transmissions so that each sending node sends the message O(log  n) times (i.e. in O(log  n) rounds each consisting of the n time slots), then listening to O(log  n) expected number of time slots suffices. We show that this is near optimal.

We describe an application of our result to the popular grid model for a radio network. Each node in the network is located on a point in a two dimensional grid, and whenever a node sends a message m, all awake nodes within L distance r receive m. In this model, up to \(t<\frac{r}{2}(2r+1)\) nodes within any 2r+1 by 2r+1 square in the grid can suffer Byzantine faults. Moreover, we assume that the nodes that suffer Byzantine faults are chosen and controlled by an adversary that knows everything except for the random bits of each non-faulty node. This type of adversary models worst-case behavior due to malicious attacks on the network; mobile nodes moving around in the network; or static nodes losing power or ceasing to function. Let n=r(2r+1). We show how to solve the broadcast problem in this model with each node sending and receiving an expected \(O(n\log^{2}{|m|}+\sqrt{n}|m|)\) bits where |m| is the number of bits in m, and, after broadcasting a fingerprint of m, each node is awake only an expected \(O(\sqrt{n})\) time slots. Moreover, for t≤(1−ε)(r/2)(2r+1), for any constant ε>0, we can achieve an even better energy savings. In particular, if we allow each node to send O(log  n) times, we achieve reliable broadcast with each node sending O(nlog 2|m|+(log  n)|m|) bits and receiving an expected O(nlog 2|m|+(log  n)|m|) bits and, after broadcasting a fingerprint of m, each node is awake for only an expected O(log  n) time slots. Our results compare favorably with previous protocols that required each node to send Θ(|m|) bits, receive Θ(n|m|) bits and be awake for Θ(n) time slots.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Wang, Q., Hempstead, M., Yang, W.: A realistic power consumption model for wireless sensor network devices. In: 3rd Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) (2006)

  2. Feeney, L.M., Nilsson, M.: Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In: INFOCOM (2001)

  3. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D.E., Pister, K.S.J.: System architecture directions for networked sensors. In: 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 93–104 (2000)

  4. Wang, L., Xiao, Y.: A survey of energy-efficient scheduling mechanisms in sensor networks. Mob. Netw. Appl. 11, 723–740 (2006)

    Article  Google Scholar 

  5. Bhandari, V., Vaidya, N.H.: On reliable broadcast in a radio network. In: 24th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 138–147 (2005)

  6. Bhandari, V., Vaidya, N.H.: On reliable broadcast in a radio network: a simplified characterization. Technical Report, CSL, UIUC, May 2005

  7. Koo, C.-Y., Bhandhari, V., Katz, J., Vaidya, N.: Reliable broadcast in radio networks: the bounded collision case. In: 25th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 258–264 (2006)

  8. Koo, C.-Y.: Broadcast in radio networks tolerating byzantine adversarial behavior. In: 23rd Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 275–282 (2004)

  9. Stinson, D.R.: Cryptography: Theory and Practice, 3rd edn. Chapman & Hall, London (2006)

    MATH  Google Scholar 

  10. Bhandari, V., Vaidya, N.H.: Reliable broadcast in wireless networks with probabilistic failures. In: INFOCOM, pp. 715–723 (2007)

  11. Gilbert, S., Guerraoui, R., Newport, C.C.: Of malicious motes and suspicious sensors: on the efficiency of malicious interference in wireless networks. In: International Conference on Principles of Distributed Systems (OPODIS), pp. 215–229 (2006)

  12. Chockler, G., Demirbas, M., Gilbert, S., Newport, C., Nolte, T.: Consensus and collision detectors in wireless ad hoc networks. In: 24th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 197–206 (2005)

  13. Kranakis, E., Krizanc, D., Pelc, A.: Fault-tolerant broadcasting in radio networks. J. Algorithms 39(1), 47–67 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  14. Pelc, A., Peleg, D.: Broadcasting with locally bounded Byzantine faults. Inf. Process. Lett. 93(3), 109–115 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  15. Gąsieniec, L., Kantor, E., Kowalski, D.R., Peleg, D., Su, C.: Time efficient k-shot broadcasting in known topology radio networks. Distrib. Comput. 21(2), 117–127 (2008)

    Article  Google Scholar 

  16. Henzinger, M., Raghavan, P., Rajagopalan, S.: Computing on data streams. Technical Report SRC-TN-1998-011, Digital Systems Research Center (1998)

  17. Muthukrishnan, S.: Data Streams: Algorithms and Applications. Now Publishers, Hanover (2005)

    MATH  Google Scholar 

  18. Munro, I., Paterson, M.: Selection and sorting with limited storage. Theor. Comput. Sci. 12, 315–323 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  19. Guha, S., McGregor, A.: Approximate quantiles and the order of the stream. In: ACM Symposium on Principles of Database Systems, pp. 273–279 (2006)

  20. Guha, S., McGregor, A.: Lower bounds for quantile estimation in random-order and multi-pass streaming. In: 34th International Colloquium on Automata, Languages and Programming (2007)

  21. Alon, N., Matias, Y., Szegedy, M.: The space complexity of approximating the frequency moments. In: 28th Annual ACM Symposium on Theory of Computing (STOC), pp. 20–29 (1996)

  22. Demaine, E., López-Ortiz, A., Munro, I.: Frequency estimation of internet packet streams with limited space. In: 10th Annual European Symposium on Algorithms (ESA), pp. 348–360 (2002)

  23. Cormode, G., Korn, F., Muthukrishnan, S., Srivastava, D.: Space- and time-efficient deterministic algorithms for biased quantiles over data streams. In: 25th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 263–272 (2006)

  24. King, V., Phillips, C., Saia, J., Young, M.: Sleeping on the job: energy-efficient and robust broadcast for radio networks. In: 27th ACM Symposium on Principles of Distributed Computing (PODC), pp. 243–252 (2008)

  25. Yao, A.: Probabilistic computations: toward a unified measure of complexity. In: 18th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 222–227 (1977)

  26. Saia, J., Young, M.: Reducing communication costs in robust peer-to-peer networks. Inf. Process. Lett. 106(4), 152–158 (2008)

    MathSciNet  MATH  Google Scholar 

  27. Yüksel, K., Kaps, J.-P., Sunar, B.: Universal hash functions for emerging ultra-low-power networks. In: Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS) (2004)

  28. Lee, H.R., Choi, Y.J., Kim, H.W.: Implementation of tinyhash based on hash algorithm for sensor network. In: World Academy of Science, Engineering and Technology (WASET), pp. 135–139 (2005)

  29. Cooprider, N., Archer, W., Eide, E., Gay, D., Regehr, J.: Efficient memory safety for TinyOS. In: Sensys’07: ACM International Conference on Embedded Networked Sensor Systems, pp. 205–218 (2007)

  30. Zeinalipour-Yazti, D., Neema, S.C., Kalogeraki, V., Gunopulos, D., Najjar, W.: Data acquisition in sensor networks with large memories. In: 21st International Conference on Data Engineering Workshops, p. 1188 (2005)

  31. Piotrowski, K., Langendoerfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 169–176 (2006)

  32. Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: 3rd International Conference on Pervasive Computing and Communications, pp. 324–328 (2005)

  33. Gehrke, J., Madden, S.: Query processing in sensor networks. IEEE Per. Comput. 3(1), 46–55 (2004)

    Article  Google Scholar 

  34. Watfa, M., Daher, W., Al Azar, H.: A sensor network data aggregation technique. Int. J. Comput. Theory Eng. 1(1), 19–26 (2009)

    Google Scholar 

  35. Lam, E.Y., Lui, K.-S., Tam, V.W.L.: Image and video processing in wireless sensor networks. Multidimens. Syst. Signal Process. 20(2), 99–100 (2009)

    Article  Google Scholar 

  36. Zheng, J.Y., Sinha, S.: Line cameras for monitoring and surveillance sensor networks. In: 15th International Conference on Multimedia, pp. 433–442 (2007)

  37. Muraleedharan, R., Osadciw, L.A., Yan, Y.: Resource optimization in distributed biometric recognition using wireless sensor networks. Multidimens. Syst. Signal Process. 20(2), 165–182 (2009)

    Article  MATH  Google Scholar 

  38. Herman, T., Tixeuil, S.: A distributed TDMA slot assignment algorithm for wireless sensor networks. In: Algorithmic Aspects of Wireless Sensor Networks, vol. 3121, pp. 45–58 (2004)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maxwell Young.

Additional information

Part of this work was done while M. Young was a student at the University of New Mexico.

Rights and permissions

Reprints and permissions

About this article

Cite this article

King, V., Phillips, C., Saia, J. et al. Sleeping on the Job: Energy-Efficient and Robust Broadcast for Radio Networks. Algorithmica 61, 518–554 (2011). https://doi.org/10.1007/s00453-010-9422-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00453-010-9422-0

Keywords

Navigation