skip to main content
10.1145/1374618.1374631acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
research-article

Construction algorithms for k-connected m-dominating sets in wireless sensor networks

Published:26 May 2008Publication History

ABSTRACT

A Connected Dominating Set (CDS) working as a virtual backbone is an effective way to decrease the overhead of routing in a wireless sensor network. Furthermore, a k-Connected m-Dominating Set (kmCDS) is necessary for fault tolerance and routing flexibility. Some approximation algorithms have been proposed to construct a kmCDS. However, most of them only consider some special cases where k = 1,2 or k ≤ m, or are not easy to implement, or have high message complexity. In this paper, we propose a novel distributed algorithm LDA with low message complexity to construct a kmCDS for general k and m whose size is guaranteed to be within a small constant factor of the optimal solution when the maximum node degree is a constant. We also propose one centralized algorithm ICGA with a constant performance ratio to construct a kmCDS. Theoretical analysis as well as simulation results are shown to evaluate the proposed algorithms.

References

  1. J. Wu and H. Li, On Calculating Connected Dominating Set for Efficient Routing in Ad Hoc Wireless Networks, Proc. Third Intl. Workshop Discrete Algorithms and Methods for Mobile Computing and Comm., 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Das and V. Bharghavan, Routing in Ad-Hoc Networks Using Minimum Connected Dominating Sets, Proc. IEEE Intl. Conf. Comm., 1997.Google ScholarGoogle ScholarCross RefCross Ref
  3. K. M. Alzoubi, P.-J. Wan, and O. Frieder, New Distributed Algorithm for Connected Dominating Set in Wireless Ad Hoc Networks, Proc. IEEE Hawaii Intl. Conf. System Sciences, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Dai and J. Wu, An Extended Localized Algorithm for Connected Dominating Set Formation in Ad Hoc Wireless Networks, IEEE Trans. Parallel and Distributed Systems, 15(10):908--920, Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks, Wireless Network, 8(5):481--494, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P.-J. Wan, K. M. Alzoubi and O. Frieder, Distributed Construction of Connected Dominating Sets in Wireless Ad Hoc Networks, IEEE INFOCOM, 2002.Google ScholarGoogle Scholar
  7. Y. Li, S. Zhu, My T. Thai, and D.-Z. Du, Localized Construction of Connected Dominating Set in Wireless Networks, NSF International Workshop on Theoretical Aspects of Wireless Ad Hoc, Sensor and Peer-to-Peer Networks, Chicago, June 2004.Google ScholarGoogle Scholar
  8. X. Cheng, M. Ding, D. Du and X. Jia, Virtual Backbone Construction in Multihop Ad Hoc Wireless Networks, Wireless Communnications and Mobile Computing, 6(2):183--190, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. F. Dai and J. Wu, On Constructing k-Connected k-Dominating Set in Wireless Network, IEEE International Parallel & Distributed Processing Symposium, 2005 . Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. F. Wang, M. T. Thai, D.-Z. Du, 2-connected Virtual Backbone in Wireless Network, Accpeted by IEEE Transactions on Wireless Communications, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. W. Shang, F. Yao, P. Wan, and X. Hu, Algorithms for Minimum m-Connected k-Dominating Set Problem, COCOA 2007, LNCS 4616, pp. 182--190, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. T. Thai, N. Zhang, R. Tiwari and X. Xu, On approximation algorithms of k-connected m-dominating sets in disk graphs, Accepted by Theoretical Computer Science, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Y. Wu, F. Wang, M. T. Thai and Y. Li, Constructing k-Connected m-Dominating Sets in Wireless Sensor Networks, Military Communications Conference, Orlando, FL, October 29-31, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  14. D. Kim, Y. Wu, Y. Li, F. Zou and D.-Zhu Du, Constructing Energy Efficient Connected Dominating Sets with Bounded Diameters in Wireless Networks, submitted to IEEE Transactions on Parallel and Distributed Systems, 2007.Google ScholarGoogle Scholar
  15. T. H. Cormen, C. E. Leiserson, R. L. Rivest and C. Stein, Introduction to Algorithms, ISBN 0-262-03293-7, MIT Press, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. B. West, Introduction to Graph Theory (Second Edition), Prentice-Hall, Inc. ISBN 0-13-014400-2, 2001.Google ScholarGoogle Scholar
  17. J. Cheriyan and R.Thurimella, Fast algorithms for k-shredders and k-node connectivity augmentation, Journal of Algorithms 33:15--50, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Construction algorithms for k-connected m-dominating sets in wireless sensor networks

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                MobiHoc '08: Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
                May 2008
                474 pages
                ISBN:9781605580739
                DOI:10.1145/1374618

                Copyright © 2008 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 26 May 2008

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate296of1,843submissions,16%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader