Skip to main content

Advertisement

Log in

A greedy algorithm for the minimum \(2\)-connected \(m\)-fold dominating set problem

  • Published:
Journal of Combinatorial Optimization Aims and scope Submit manuscript

Abstract

To save energy and alleviate interference in a wireless sensor network, connected dominating set (CDS) has been proposed as the virtual backbone. Since nodes may fail due to accidental damage or energy depletion, it is desirable to construct a fault tolerant CDS, which can be modeled as a \(k\)-connected \(m\)-fold dominating set \(((k,m)\)-CDS for short): a subset of nodes \(C\subseteq V(G)\) is a \((k,m)\)-CDS of \(G\) if every node in \(V(G)\setminus C\) is adjacent with at least \(m\) nodes in \(C\) and the subgraph of \(G\) induced by \(C\) is \(k\)-connected.In this paper, we present an approximation algorithm for the minimum \((2,m)\)-CDS problem with \(m\ge 2\). Based on a \((1,m)\)-CDS, the algorithm greedily merges blocks until the connectivity is raised to two. The most difficult problem in the analysis is that the potential function used in the greedy algorithm is not submodular. By proving that an optimal solution has a specific decomposition, we managed to prove that the approximation ratio is \(\alpha +2(1+\ln \alpha )\), where \(\alpha \) is the approximation ratio for the minimum \((1,m)\)-CDS problem. This improves on previous approximation ratios for the minimum \((2,m)\)-CDS problem, both in general graphs and in unit disk graphs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Bondy JA, Murty USR (2008) Graph theory. Springer, New York

    Book  MATH  Google Scholar 

  • Cheng X, Huang X, Li D, Wu W, Du D-Z (2003) A polynomial-time approximation scheme for minimum connected dominating set in ad hoc wireless networks. Networks 42:202–208

    Article  MathSciNet  MATH  Google Scholar 

  • Dai F, Wu J (2006) On constructing \(k\)-connected \(k\)-dominating set in wireless ad hoc and sensor networks. J Parallel Distrib Comput 66:947–958

    Article  MATH  Google Scholar 

  • Das B, Bharghavan V (1997) Routing in ad hoc networks using minimum connected dominating sets. In: ICC’97, Montreal, Canada, pp 376–380.

  • Du D.-Z, Graham R.L, Pardalos P.M, Wan P.-J, Wu W, Zhao W (2008) Analysis of greedy approximation with nonsubmodular potential functions. In: Proceedings of the 19th ACMSIAM Symposium on Discrete Algorithms, pp 167–175.

  • Du D-Z, Ko K-I, Hu X (2012) Design and analysis of approximation algorithms. Springer, New York

    Book  MATH  Google Scholar 

  • Du D-Z, Wan P-J (2012) Connected dominating set: theory and applications. Springer, New York

    MATH  Google Scholar 

  • Ephremides A, Wieselthier J, Baker D (1987) A design concept for reliable mobile radio networks with frequency hopping signaling. Proc IEEE 759:56–73

    Article  Google Scholar 

  • Fleischer L, Jain K, Williamson DP (2006) Iterative rounding 2-approximation algorithms for minimum-cost vertex connectivity problems. J Comput Syst Sci 72:838–867

    Article  MathSciNet  MATH  Google Scholar 

  • Garey MR, Johnson DS (1979) Computers and intractability: a guide to the theory of NP-completeness. Freeman, New York

    MATH  Google Scholar 

  • Gropl C, Hougardy S, Nierhoff T, Promel HJ (2001) Approximation algorithms for the Steiner tree problem in graphs. In: Du D-Z, Cheng X (eds) Steiner trees in industries. Kluwer, Dordrecht, pp 235–279

    Chapter  Google Scholar 

  • Guha S, Khuller S (1998) Approximation algorithms for connected dominating sets. Algorithmica 20:374–387

    Article  MathSciNet  MATH  Google Scholar 

  • Guha S, Khuller S (1999) Improved methods for approximating node weighted Steiner trees and connected dominating sets. Inf Comput 150:57–74

    Article  MathSciNet  MATH  Google Scholar 

  • Kim D, Wang W, Li X, Zhang Z (2010)Wu W. A new constant factor approximation for computing \(3\)-connected \(m\)-dominating sets in homogeneous wireless networks. In: IEEE INFOCOM, pp 1–9.

  • Li D, Liu L, Yang H (2009) Minimum connected \(r\)-hop \(k\)-dominating set in wireless networks. Discrete Math Algorithms Appl 1:45–58

    Article  MathSciNet  MATH  Google Scholar 

  • Li Y, Wu Y, Ai C, Beyah R (2012) On the construction of \(k\)-connected \(m\)-dominating sets in wireless networks. J Comb Optim 23:118–139

    Article  MathSciNet  MATH  Google Scholar 

  • Misra S, Hong S, Xue G, Tang J (2010) Constrained realy node placement in wireless sensor networks: formulation and approximations. IEEE/ACM Trans Netw 18:434–447

    Article  Google Scholar 

  • Nutov Z (2010) Approximating Steiner networks with node-weights. SIAM J Comput 39:3001–3022

    Article  MathSciNet  MATH  Google Scholar 

  • Ruan L, Du H, Jia X, Wu W, Li Y, Ko K (2004) A greedy approximation for minimum connected dominating sets. Theor Comput Sci 329:325–330

    Article  MathSciNet  MATH  Google Scholar 

  • Shang W, Yao F, Wan P-J, Hu X (2008) On minimum \(m\)-connected \(k\)-dominating set problem in unit disc graphs. J Comb Optim 16:99–106

    Article  MathSciNet  MATH  Google Scholar 

  • Thai MT, Zhang N, Tiwari R, Xu X (2007) On approximation algorithms of \(k\)-connected \(m\)-dominating sets in disk graphs. Theor Comput Sci 385:49–59

    Article  MathSciNet  MATH  Google Scholar 

  • Vazirani VV (2001) Approximation algorithms. Springer, New York

    MATH  Google Scholar 

  • Wan P-J, Alzoubi KM, Frieder O (2004) Distributed construction of connected dominating set in wireless ad hoc networks. ACM/Springer Mob Netw Appl 9:141–149

    Article  Google Scholar 

  • Wang F, Thai MT, Du D-Z (2009) On the construction of 2-connected virtual backbone in wireless networks. IEEE Trans Wirel Commun 8:1230–1237

    Article  Google Scholar 

  • Wang W, Kim D, An M, Gao W, Li X, Zhang, Wu W (2012) On construction of quality fault-tolerant virtual backbone in wireless networks. IEEE/ACM Trans Netw. doi:10.1109/TNET.2012.2227791.

  • Wu Y, Wang F, Thai M.T, Li Y.(2007) Constructing \(k\)-connected \(m\)-dominating sets in wireless sensor networks. In: Military communications conference, Orlando, FL

  • Yang D, Misra S, Fang X, Xue G, Zhang J (2012) Two-tiered constrained relay node placement in wireless sensor networks: computational complexity and efficient approximations. IEEE Trans Mob Comput 11:1399–1411

    Article  Google Scholar 

  • Zelikovsky A (1996) Better approximation bounds for the network and euclidean Steiner tree problems. Technical report CS-96-06, Department of Computer Science, University of Vir- ginia, Charlottesville

  • Zhang Z, Gao X, Wu W, Du D-Z (2009) A PTAS for minimum connected dominating set in 3-dimensional wireless sensor networks. J Glob Optim 45:451–458

    Article  MathSciNet  MATH  Google Scholar 

  • Zhang Z, Liu Q, Li D (2009) Two algorithms for connected \(r\)-hop \(k\)-dominationg set. Discrete Math Algorithms Appl 1:485–498

    Article  MathSciNet  MATH  Google Scholar 

  • Zhou J, Zhang Z, Wu W, Xing X. A Greedy algorithm for the fault-tolerant connected dominating set in a general graph. J. Combinatorial, Optimization. doi:10.1007/s10878-013-9638-4.

Download references

Acknowledgments

Yishuo Shi is supported by XJGRI2013012. Zhao Zhang is supported by NSFC (61222201), SRFDP (20126501110001), and Xinjiang Talent Project (2013711011). Weili Wu is supported by National Science Foundation of USA under Grants CNS0831579 and CCF0728851.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhao Zhang.

Appendix

Appendix

In the appendix, we point out the flaw in the analysis for the \((2,m)\)-CDS algorithm on UDG presented in Shang et al. (2008). The algorithm is divided into three steps.

Step 1. Find a maximal independent set \(I_0\). Connect \(I_0\) by adding a set of connectors \(C\). Let \(C_{1,1}=I_0\cup C\) be the resulting \((1,1)\)-CDS.

Step 2. For \(j=1,\ldots ,m-1\), recursively find a maximal independent set \(I_j\) in \(G-(C_{1,1}\cup I_1\cup \ldots \cup I_{j-1})\). Let \(C_{1,m}=C_{1,1}\cup I_1\cup \ldots \cup I_{m-1}\). Then \(C_{1,m}\) is a \((1,m)\)-CDS with \(|C_{1,m}|\le \alpha _m opt\), where \(\alpha _m=5+5/m\) for \(m\le 5\) and \(7\) for \(m>5\).

Step 3. Under the assumption that \(m\ge 2\), for any \((1,m)\)-CDS, there exists a block-bridge with at most two inner nodes the addition of which strictly reduces the number of blocks. By recursively adding such block-bridges, one finally obtains a \((2,m)\)-CDS \(D\).

Clearly, the number of blocks in \(C_{1,m}\) is at most \(|C_{1,m}|-1\). Hence \(|D|\le |C_{1,m}|+2(|C_{1,m}|-1)<3|C_{1,m}|\). Since \(|C_{1,m}|\le \alpha _m opt\), we have \(|D|\le 3\alpha _m\), which is \(15+\frac{15}{m}\) for \(2\le m\le 5\) and \(21\) for \(m>5\).

The flaw in Shang et al. (2008) is as follows. It was proved that Step 2 does not increase the number of cut vertices. Hence the authors use \(|D|\le |C_{1,m}|+2(|C_{1,1}|-1)\) to get their claimed approximation ratio. The problem is: Step 2 does not increase the number of cut vertices, but adding block-bridge in Step 3 might not strictly reduce the number of cut vertices (this can be seen by considering a star); Step 3 strictly reduces the number of blocks, but the number of blocks in \(C_{1,m}\) might be larger than that in \(C_{1,1}\).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shi, Y., Zhang, Y., Zhang, Z. et al. A greedy algorithm for the minimum \(2\)-connected \(m\)-fold dominating set problem. J Comb Optim 31, 136–151 (2016). https://doi.org/10.1007/s10878-014-9720-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10878-014-9720-6

Keywords

Navigation