HOME JOURNALS CONTACT

Information Technology Journal

Year: 2010 | Volume: 9 | Issue: 5 | Page No.: 864-876
DOI: 10.3923/itj.2010.864.876
Approximation Two Independent Sets Based Connected Dominating Set Construction Algorithm for Wireless Sensor Networks
Z. Liu, B. Wang and Q. Tang

Abstract: In WSNs (Wireless Sensor Networks), an optimized way of prolonging the networks lifetime and flooding packets is to find the minimum CDS (Connected Dominating Set). In this study, a new method called ATISA (Approximation Two Independent Sets based Algorithm) for constructing CDS is proposed. The ATISA has three stages. The first stage is constructing a connected set CS (connected set) and the second stage is constructing a connected dominating set CDS and the third stage is pruning the redundant dominators of CDS. The performance ratio of ATISA is approximately (9.67+19nk) when the number of nodes is bigger enough and the message complexity is O(n). Compared with some famous CDS construction algorithms, ATISA constructs the CDS with the smallest size.

Fulltext PDF Fulltext HTML

How to cite this article
Z. Liu, B. Wang and Q. Tang, 2010. Approximation Two Independent Sets Based Connected Dominating Set Construction Algorithm for Wireless Sensor Networks. Information Technology Journal, 9: 864-876.

Keywords: WSN, algorithm, virtual backbone, connected set and CDS

INTRODUCTION

In wireless sensor network, all nodes are energy constrained and designing an energy efficient routing is very important (Dai et al., 2009). Clustering routing protocol is a kind of energy efficient routing (Zhou and Meng, 2008), while using a virtual backbone to organize the nodes and perform an efficient routing is a better way.

A Connected Dominating Set (CDS) is a kind of virtual backbone and design an algorithm for constructing the CDS with the minimum size is a hot issue in recent years. The CDS problem can be defined as follows: find a minimum size subset S of nodes, such that the sub-graph induced by S is connected and S forms a dominating set. This problem is shown to be NP-hard (Jeremy et al., 2004).

In WSN, the routing process can be restricted to the reduced graph formed by the CDS, every node form the CDS will be considered as a gateway and only the gateway needs to keep routing information. However, an important aspect is how to select an optimal CDS.

The CDS construction algorithms are mainly classified into two classes, which are Unit Disk Graph (UDG) based algorithms and Disk Graphs with Bidirectional links (DGB) based algorithms (Thai et al., 2007). In UDG and DGB, the link between any pair of nodes is bidirectional.

In this study, a new CDS construction algorithm ATISA is proposed. This algorithm can be implemented in both UDG and DGB. ATISA has three stages. The first stage is constructing a connected set, which are composed of two independent sets. The second stage is an assistant process, which makes the Connected Set (CS) to dominate all the nodes in the network and thus a Connected Dominating Set (CDS) is constructed. The last stage is a pruning process, which reduces the size of the CDS. The performance ratio of ATISA is given and the properties of the CDS are analyzed. In the performance evaluation, ATISA is compared with some classic algorithms (Wan et al., 2002; Thai et al., 2007; Yingchang et al., 2009; Wu and Li, 1999).

Some CDS construction algorithms are introduced. Because the link between any two neighboring nodes in UDG and DGB is bidirectional and most of the CDS construction algorithms are based on the bidirectional links, thus the algorithms designed in UDG can be easily extended to DGB.

In the graph G(V, E), C(C ⊆ V), is a subset of V. If any node u(u ε V) is either in C or adjacent to one node in C, then C is one of the dominating set of G(V, E). Besides if there is at least one path between any pair of nodes in C, then C is one of the connected dominating set (CDS) of G(V, E). Independent Set (IS (IS ⊆ V)) is a subset of V. In IS, any pair of nodes is disconnected. Given an Independent Set (IS), if any one node v(vεV-IS) is added into the IS, there will be a pair of nodes connected, then the IS is a Maximum Independent Set (MIS). In MIS, any pair of nodes is disconnected and any node not belonging to MIS is adjacent to at least one node in MIS.

In Jeremy et al. (2004), Blum et al. introduced a lot of approximation MCDS algorithms in sensor networks and MANETs. Blum point out that the two algorithms, Guha and Khuller (1998) have motivated many designs of CDS construction algorithms. One of the algorithms (Guha and Khuller, 1998) is growing a spanning tree in a single phase and the other is growing separate components in the first phase and connecting the components together in the second phase.

Some distributed approximation MCDS algorithms are proposed by Alzoubi et al. (2002a), Wan et al. (2002) and Alzoubi et al. (2002b), the distance between any pair of complementary subsets in the constructed MIS is exactly two hops. A rooted spanning tree is constructed at first and all of the nodes in the network have their tree levels, respectively. The level of the root is 0. If the parent node’s level is i, then the child’s level is i+1. All nodes have to get their neighbors information. The algorithm has two phases and the first phase is constructing a MIS and the lowest level is the dominators election criterion. The second phase is CDS construction phase, where the connectors are selected. If a black node receives an INVITE message from a gray neighbor, it immediately chooses the gray node as its parent and the gray node becomes a connector. This algorithm has the performance ratio 8opt+1. The message complexity is O(n log n) and the time complexity is O(n). The algorithm proposed by Wan et al. (2002) has two phases and in the first phase the dominator selection is based on the lower level neighbors’ states. If all of a white node’s lower level neighbors are marked gray, then the white node becomes a dominator immediately. In the second phase, the gray node with the maximum dominator nodes degree is selected as the connector. The performance ratio is 8opt-2. The time complexity is O(n) and the message complexity is O(n log n). Alzoubi et al. (2002a) proposed a more complex algorithm containing two phases. The first phase is constructing a MIS and the second phase is finding some connectors with more complex steps. The performance ratio is 192opt+48. The time complexity is O(n) and the message complexity is O(n).

Li et al. (2004, 2005), Thai et al. (2007), proposed some distributed connected dominating set construction algorithms. A greedy algorithm called S-MIS is proposed. S-MIS has two phases. In the first phase, the MIS construction algorithm is described by Wan et al. (2002). The second phase is the main contribution of Li et al. (2005) and in this phase, black-blue component is proposed, which is a connected component of the sub-graph induced only by black and blue nodes and by ignoring connections between blue nodes. The black node is the dominator of the first phase and the blue node is the dominator of the second phase. In the second phase, a greedy algorithm is used to find some gray nodes adjacent to at least 2 black nodes in different black-blue components. The performance of S-MIS is (5.8+In 4)opt+1.2. Thai et al. (2007) proposed two algorithms called TFA and TSA, respectively. TFA is an extension of S-MIS in the DGB and the algorithm codes are not changed, which explain that the algorithms implemented in UDG can be easily extended in DGB. The second algorithm TSA is an improved algorithm for TFA. TSA has two phases and in the first phase, an MIS is constructed by choosing the nodes with the biggest radius as the dominators. The size of MIS constructed by TSA is smaller than that constructed by TFA. The second phases of TFA and TSA are the same. The performance ratio of TFA is (K+2+In K)opt and TSA’s performance ratio is not introduced by Thai et al. (2007). A one-phase based CDS construction algorithm is proposed by Li et al. (2004). The algorithm is better at maintenance since there is no need to build a tree or select a leader. In this algorithm, each node needs to know the connectivity information within its 2-hop neighborhood. If a node has the smallest 2-hop number of neighbors, it becomes a dominator1 and broadcasts a BLACK message. If a node u receives a BLACK message from a node w and if u has already received a notification that there is a 2-hop black neighbor v sent by a neighbor m and w has not been connected to v yet, then u and m become dominator 2 nodes and connect node v and w. The dominator1 nodes form an MIS and the performance ratio of the algorithm is172opt+43. The time complexity is O(Δ) and message complexity is O(nΔ2), where Δ is the maximum degree.

Many MIS based algorithms were reported by Das and Bharghavan (1997), Raei et al. (2008, 2009), Rai et al. (2009), Zeng et al. (2006), Funke et al. (2006), Yingchang et al. (2009), Wu and Li (1999) and Dai and Wu (2004) are mainly have two stages. The first stage is constructing a MIS and the second stage is finding some connectors to connect the nodes in MIS and finally get a CDS. The CDS construction algorithms can have different criterions. The criterion is the node degree as reported by Das and Bharghavan (1997), Raei et al. (2008) and Rai et al. (2009) . For example, Das and Bharghavan (1997) mentioned the node degree is the number of the unmarked neighbors in the first stage and in the second stage, the node degree is the number of unmarked nodes adjacent to the non-fragment nodes. The algorithm reported by Das and Bharghavan (1997) has the performance ratio 2H(Δ)+1. The time and message complexities are O(n+|C|Δ) and O(n|C|+m+n log n) respectively. The criterion for constructing a CDS is a timer, which is based on the transmission ranges of nodes (Raei et al., 2009). The criterion is the weight of node and the weight is composed of the node degree and the battery power. In (Funke et al., 2006; Yingchang et al., 2009), the criterion is the node id. The node with the largest id will become a dominator (Funke et al., 2006), while the node with the smallest id will become a dominator (Yingchang et al., 2009).

The algorithms described above are all MIS based. There are also some non-MIS based algorithms reported by Jie et al. (2008), Dai and Wu (2004) and Rong et al. (2009).

Jie et al. (2008) and Dai and Wu (2004) proposed some distributed algorithms in UDG and DGB. A very simple marking process is proposed. In the marking process every node v exchanges its open neighbor set N(v) with its neighbors and if there exist two unconnected neighbors, v will mark itself . All the marked nodes form a CDS. The CDS constructed in the first phase contains many redundant nodes. Jie et al. (2008) proposed two prune algorithms called Rule-1 and Rule-2 to delete some redundant marked nodes. The performance ratio is not given by Wu and Li (1999), but in (Wan et al., 2002) the performance ratio of this algorithm is proved O(n), where n is the number of nodes. The message complexity is Θ(m), where m is the number of edges in the unit-disk graph. The time complexity is O(Δ)3, where Δ is the maximum degree. Dai and Wu (2004) proposed an extended algorithm for the algorithm by Wu and Li (1999). The marking process is the same as Wu and Li (1999), but the pruning process is improved and denoted by Rule-k. Based on the Rule-k, the size of the final constructed CDS is reduced. A hierarchical graph is constructed at first and then the essential nodes are determinate in the graph according to the Rule-1 by Rong et al. (2009). After the essential nodes determination phase is ended, there are some redundant dominators, which are deleted according to the Rule-2 by Rong et al. (2009). The performance ratio of the algorithm by Rong et al. (2009) is O(log n).

The objectives of the algorithms described above are minimizing the size of the CDS. But in some researches such as (Donghyn et al., 2009; Thai et al., 2008; Feng et al., 2009; Shuhui et al., 2008; Jie et al., 2006, 2008; Adjih et al., 2005; Yu et al., 2006; Ivan et al., 2002; Jie and Fai, 2006), the objectives of CDS construction are not or not only minimizing the size of the CDS. For example, in Donghyn et al. (2009), Kim et al. proposed two centralized algorithms. The two algorithms have the constant performance ratios of the size and diameter of the constructed CDS. The diameter of the CDS is a new term considered for the constructed CDS. Thai et al. (2008) proposed a constant approximation algorithm for the Strongly Connected Dominating Set (SCDS) problem. Feng et al. (2009), proposed a new algorithm CDSA to construct a 2-connected virtual backbone. CDSA can resist the failure of one node. Shuhui et al. (2008) and Jie et al. (2008) developed a notation of directional network backbone by using the directional antenna model and then formed the problem of constructing a directional connected dominating set (DCDS). Jie et al. (2008) also proposed a localized heuristic algorithm as well as two extensions of the algorithm for constructing a DCDS by Shuhui et al. (2008).

NETWORK MODEL AND PRELIMINARY WORK

This study assumes that N sensor nodes are randomly scattered in a two-dimensional square field:

This network is a static deployed network. It means sensor nodes do not move any more after deployment
Sensor nodes have different transmission ranges.
The nodes can get their position coordinates through GPS or location algorithms
After the establishment phase of the topology, the network is duty-cycle based
The link between any pair of nodes is bidirectional and the neighbor set of a node is defined by Rule 1

Rule 1: If and only if d(u, v)<min{ru, rv}, node v is a neighbor of u and node u is a neighbor of v.

In the CDS construction process, there are three states, which are white state, gray state and black state. The white state is the initial state and in the beginning, all the nodes are marked white.

Before describing the centralized and distributed algorithms, we introduce some symbols in Table 1. The nodes in networks have three state, they are white nodes, black nodes and gray nodes.

Table 1: Symbols definitions

Fig. 1: The size of the tree constructed in the first stage

White nodes are the nodes which are in the initial state. The black nodes are backbone nodes in CDS and the gray nodes are non-backbone nodes (Fig. 1). Every node has some levels, ids, levels and positions.

The dominator selection has different criterions such as node id, the residual energy, the node degree, distance, etc, according to the applications. In this study, in order to minimize the size of the constructed CDS, the distance is adopted as the dominator selection criterion.

ALGORITHM DESCRIPTION

Here, we describe the ATISA. The ATISA has two kinds of implementations: centralized implementation and distributed implementation. In the beginning, the preliminary work is introduced and then we introduce the centralized algorithm and the distributed algorithm of ATISA.

Centralized implementation: We first define some temporary notations which will be used later. The initial node denoted by init is determined randomly. NB denotes the set of the black nodes generated in the latest round and TB is a temporary set storing the black nodes. In the beginning NB and TB are empty.

The centralized algorithm has three stages, which are CS (Connecting Set) construction stage, CDS (Connecting Dominating Set) construction stage and pruning stage. In the beginning, B and G are empty. W includes all the nodes.

In the centralized implementation, there are three algorithms. In the centralized algorithm 1, the initial node is selected randomly and the algorithm executed several rounds. In each round, some black nodes are generated and the newly generated black nodes are put into the set NB and deleted from the set W. The nodes in NB will select the independent farthest neighbors as their children respectively and put the children into a temporary set TB. Meanwhile, the nodes in NB will calculate the neighbors adjacent to two black nodes and put the nodes into the set G. After several rounds, there are no black nodes generated in the network and the first stage is ended. The algorithm is shown as follows:

Centralized Algorithm 1: The first stage algorithm

When there are no new black nodes generated, the first stage is ended. The generated black node set is a connected set. But the connected set cannot dominate all the nodes in the network sometimes. The next stage constructs a connected dominating set.

Here, all nodes in W wait their neighbors messages and get their neighbors’ states information. If a white node has black neighbors it will select the black neighbor with the minimum id as its dominator and change its state into gray. If a white node only has the gray neighbors, it will send an invite message to the gray neighbor with the minimum id and change its state into gray. The algorithm is shown as follows:

Centralized Algorithm 2: The second stage algorithm

The second stage constructs a connected dominating set and all the nodes are either black or gray and there is no white node left in the network. But there are some redundant black nodes in the network and in the third stage the redundant black nodes are deleted.

In the third stage, if a black node with no children and if the neighbors of the black node are all adjacent to at least two black nodes (include the black node itself), then the black node is put into G and deleted from B. The algorithm is shown as follows:

Centralized Algorithm 3: The third stage algorithm

Distributed implementation: In the distributed implementation, all the nodes exchange their positions information with their neighbors and put their one-hop neighbors information into set N, respectively at first and then all of the nodes have to exchange their neighbors information with their neighbors and get their two-hop neighbors information.

Algorithms in the first stage: In the first stage, all nodes are initialized white. Before the first stage ended, there are white nodes, gray nodes and black nodes.

In the first stage, if a node is a black node, it will calculate its farthest independent neighbors and put the neighbors into the corresponding set and then broadcast a BCMSG containing the independent neighbors in the network. If a black node has no white neighbor and has obtained its children black nodes, the black node will do nothing. Before calculate the farthest independent neighbors, a black node should wait for a period of time and get all of the latest neighbors information. If a node is a gray node, it will update its black neighbor set according to the BMSGs it received. If a node is a white node, it will do something according to the message it received. If a white node receives a BCMSG and it is included in the message, it will mark itself black and put the black node where the BCMSG comes from into the corresponding set and then broadcast a BMSG. If a white node receives a BMSG, it will update its corresponding sets and check whether it has received two or more black messages. If it has received two or more black messages, it will change its stage into gray and broadcast a GMSG. If a white node receives a GMSG, it only updates its corresponding sets. The algorithm is shown as follows:

Distributed Algorithm 1: The first stage algorithm

If there are no new black nodes generated, the first stage is ended. When the first stage is ended, the white nodes which have received only one black message should change their states into gray.

The algorithms executed in the first stage can make most of the network nodes change their states into either black or gray. Sometimes there are little white nodes left after the first stage. The black nodes generated in the first stage construct a connected set (CS), but the CS is not a dominating set sometimes. In the second stage, the connected dominating set (CDS) is constructed.

Algorithms in the second stage: In the second stage, there are black nodes, gray nodes and sometimes white nodes in the network. In order to make the constructed set in the first stage dominating all the nodes, the white nodes should select some gray nodes as black nodes. Only white nodes can change their states into gray and only gray nodes can change their states into black in this stage.

In this stage, if a node is a white node, it will check whether its BN is empty. If it’s BN is empty, it will check whether its GN is empty. If it GN is not empty and BN is empty, it will broadcast a GMSG and send an IMSG to the node with the minimum id in GN and change its state into gray. If a white node’s BN is not empty, it will change its state into gray and broadcast a GMSG. At the same time, the white nodes update their corresponding sets according to the messages they have received such as GMSG, BMSG. If a node is a gray node, if it receives an IMSG, it will change its state into black and broadcast a BMSG and then send an IMSG to a black neighbor with the minimum id. At the same time, a gray node should update its corresponding sets according to the messages it has received such as BMSG, GMSG and IMSG. If a node is a black node, it only updates its corresponding sets according to the messages it has received. The algorithm is shown as follows:

Distributed Algorithm 2: The second stage algorithm

When there are no white nodes left, the second stage is ended. In this stage, the black nodes construct a Connected Dominating Set (CDS). But the CDS has some redundant nodes, which should be deleted in the next stage.

Algorithms in the third stage: In the third stage, the redundant black nodes are deleted. This stage contains two sub-stages, which are generating schedule stage and deleting redundant black nodes stage. The first sub-stage generates a schedule for all the leaf black nodes. All the leaf black nodes are allocated their time slots in the schedule, respectively. If a node is a black node without children, it will broadcast an ISMSG to its parent and then wait the SMSG from its parent. If a node is a black node with children, it waits the ISMSGs from all the children and if it has received all the ISMSGs from its children, it will fuse all the information in the ISMSGs into a new ISMSG, which will be sent to its parent. The algorithm is shown as follow:

Distributed Algorithm 3-I: The third stage algorithm I

In the algorithm described above, all leaf black nodes send their ids to the root by sending the ISMSGs. The non-leaf black nodes fuse all the ISMSGs from its children and send a new ISMSG to their parent nodes, respectively. The new ISMSG contains the ids of the leaf black nodes of the branch where the black node sending the new ISMSG stays. The root black node allocates the time slots according to the leaf nodes’ ids. The leaf node with the minimum id has the first time slot in the schedule and the node with the maximum id has the last time slot in the schedule. When all the leaf nodes receive the schedule, they can get their time slot from the schedule, respectively and execute the second sub-stage algorithm in the corresponding time slot. If a time slot of a black node without children arrives, the black node will broadcast an IBSMSG to request all the neighbors’ black neighbor set information. If the black node receives all the reply messages (BSMSGs) from its neighbors, it will calculate the number of the black neighbors of every neighbor. If every neighbor has at least two black neighbors, the black node changes its state into gray and broadcast a GMSG. The algorithm in this sub-stage is shown as follows:

Distributed Algorithm 3-II: The third stage algorithm II

In the second sub-stage, only the leaf black nodes execute the algorithm described above and all the other nodes only receive the messages and update the neighbors’ information according to the messages they have received.

THEORETICAL ANALYSIS

We first give the maximum number of independent neighbors in both heterogeneous and homogeneous network and then introduce the size of the connected set constructed in the first stage. Finally the properties of the connected set as well as the approximation performance ratio and the message complexity of CDS are analyzed.

The maximum number of independent neighbors: According to Thai et al. (2007), the maximum number of independent neighbors is described by the following equation:

(1)

In Eq. 1, k = rmax/rmin. If k → 1, the network tend to be a homogeneous network, where the transmission radii are the same. According to Eq. 1, the maximum number of independent neighbors of the homogeneous network is 5 and if k → l, the maximum number of independent neighbors of the heterogeneous network which tend to be a homogeneous network tend to be zero, which contradicts the Eq. 1. In order to unify the description of the maximum number of independent neighbors of the homogeneous and heterogeneous network, we give the following equation:

(2)

In Eq. 2, K is bigger than the bounds in Eq. 1 and if k → l, the K in Eq. 2 is tend to 5, which is the first case in Eq. 1. Thus, the Eq. 2 is a bound for UDG and DGB.

The size of CT: According to the first stage algorithm, the constructed connected set sometimes can not dominate all the nodes in the network, thus the second stage should be adopted to make the connected set to be a connected dominating set. But the connected set can dominate most of the network nodes, when the nodes number is big enough. In other words, if the number of nodes is bigger than a critical value, the connected set can dominate all most all the nodes in the network.

Let rmax and rmin represent the maximum radius and the minimum radius, respectively. M represents the side length of the square area. N represents the number of nodes in the network. Assume all the nodes are uniformly distributed in the network area. The average occupied size of one node is:

(3)

The excepted transmission radius is:

(4)

The size of excepted coverage area is:

(5)

The average covered node number is:

(6)

In order to make the network have approximately full coverage, a node in the network should have at least K neighbors. In other words, if a node covers at least K neighbor nodes and itself, the network can have big enough number of node and the connected set can dominate all most all the nodes. So, the following equation is got:

(7)

According to Eq. 2-6, the following relationship is deducted:

(8)

If the number of nodes satisfies the condition in Eq. 8, the connected set can dominate approximately all the nodes in the network. The performance simulation is shown in Fig. 1.

Properties
Lemma 1:
Given a connected graph, the set constructed by ATISA is a connected dominating tree.

Proof: Assume there are some white nodes denoted by A, B, C left in the network after the connected dominating set constructed by ATISA. According to the construction algorithm, A and B and C has no gray neighbors and black neighbors, or they will invite some nodes to be black nodes and join into the set. Thus A, B and C are isolated and the original graph is not connected, which contradicts the conditions. So, the set is a Dominating Set (DS).

According to ATISA, the black nodes generated in the first stage can communicate with the root, because they are derived from the root. Any generated black node in the second stage can communicate with the black node generated in the first stage, because the first generated black node in the second stage is the gray node. Thus, any pair of black nodes can communicate with each. Because any gray node is dominated by one or more black nodes, so any pair of nodes is connected. So, the tree constructed by ATISA is a Connected Set (CS).

Because all the black nodes have their parent or children respectively and the set constructed by ATISA is a connected dominating set, thus the set constructed by ATISA is a Connected Dominating Tree (CDT). The set constructed by the first stage of ATISA is a Connected Tree (CT) and the set constructed by the first and second stage is a CDT.

Lemma 2: Any black node has only one parent black node.

Proof: Assume a black node A has two or more parent black nodes. A should receive two or more black messages before it becomes a black node and according to ATISA, if a white node receives two black messages, it will become a gray node, thus A is a gray node, which contradicts that A is a black node in the network.

Lemma 3: in the CT, any two black nodes which are not parent child relation are not adjacent.

Proof: Assume two black nodes denoted by A and B. They are not parent child relation but adjacent with each other. Before A and B become the black nodes, they should receive their parent black node’s message. Because they are adjacent, at least one of them should receive a black message from the other. Thus, one of them should receive two black messages and become a gray node, which contradicts that A and B are black nodes.

Black nodes in the network have their levels, respectively and the level of black node is either even or odd.

Lemma 4: In the CT, any two even level or odd level black nodes are not adjacent.

Proof: According to lemma 3, in the CT, any black node can only adjacent with its parent black node and children black nodes. In other words, if a black node with even level, its parent black node and children black nodes have odd levels. Thus, any two even level or odd level black nodes are not adjacent.

Theorem 1: The CT is composed of two independent sets.

Proof: according to lemma 4, any black node in the connected tree has either even level or odd level. Thus, the connected tree is composed of two black nodes sets, which are even level black node set and odd level black node set. Because any two even level or odd level black nodes are not adjacent, thus the even level black node set and odd level black node set are both independent sets. We use Even Independent Set (EIS) and Odd Independent Set (OIS) denote the even level black node set and odd level black node set, respectively.

Performance ratio: The performance ratio analysis is based on Eq. 8. In other words, if the number of nodes is bigger than the critical value, the constructed tree in the first stage can approximately dominate all of the network nodes and the black nodes generated in the second stage can be ignored. So, the size of CDS constructed in the first and second stages of ATISA is approximately equal to the size of the tree constructed in the first stage of ATISA.

Because the size of CDS constructed ATISA is smaller than that of the tree constructed in the first and second stage and the size of the tree constructed in the first stage is approximately equal to that of the tree constructed in the first and second stage, so we only need to analyze the performance ratio of the tree constructed in the first stage, which is bigger than the performance ratio of ATISA.

According to Yingchang et al. (2009), we give the following equation:

(9)

According to Yingchang et al. (2009), there are two cases:

Case 1: If a black node i does not have a parent the biggest number of children black nodes it can generate is 5+10nk.

Case 2: if a black node i has a parent the biggest number of children black nodes it can generate is 4+7nk.

Yingchang et al. (2009), the size of a maximum independent set S satisfies the following condition:

(10)

(11)

In Eq. 11 and 10, t represents the number of black nodes belonging to case 1 and opt-t represents the number of black nodes belonging to case 2. opt represents an optimal solution of the CDS problem. Thus, the size of S satisfies:

(12)

Because EIS and OIS are independent sets and S is a maximum independent set and the size of CDS constructed by ATISA is approximately bounded by the size of the tree constructed in the first stage, so we have:

(13)

(14)

(15)

Thus, the performance ratio is:

(16)

So, the approximate ratio<o(n).

Message complexity: According to the algorithm in the first stage of ATISA, every black nodes at most broadcasts 2 black messages and every gray nodes at most broadcasts 1 gray messages. The sum of the black nodes and gray nodes in this stage is not bigger than n, which is the total number of nodes. Thus, the total number of messages in the first stage is not bigger than 2n.

According to the algorithm in the second stage of ATISA, every white nodes at most broadcasts an invite parent message and a gray message and every gray nodes at most broadcasts a black message and an invite message. The sum of the gray nodes and white nodes are bounded by 2n, thus the total number of messages in the second stage is not bigger than 4n.

According to the algorithm in the third stage of ATISA, every black nodes at most broadcasts 4 messages and every gray nodes at most broadcasts 5+10nk messages. The sum of black nodes and gray nodes is not bigger than n. Thus, the total number of messages in the third stage is not bigger than (5+10nk)n.

So, the total number of messages of ATISA is not bigger than (11+10nk)n. The message complexity is o(n).

PERFORMANCE EVALUATION

Here, the performance of ATISA is simulated in the MATLAB7 (Hahn and Valentine, 2010). We did the project in 2010 between January and February and completed this project under the guidance of Professor Wang in control theory laboratory.

We compare the size of CDS constructed by ATISA with four algorithms: Wu’s Algorithm (Wu and Li (1999)(denoted by WUA), Wang’s Algorithm (Wan et al., 2002) (denoted by WAA), the first algorithm of Xiang’s algorithms in (Yingchang et al., 2009) (denoted by XA) and the first algorithm of Thai’s algorithms in (Li et al., 2004) (denoted by TFA).

In the simulation, we simulate the size of the tree constructed in the first stage of ATISA at first. And then we compare the size of CDS constructed by ATISA with that of WUA, WAA, XA and TFA. According to Thai et al. (2007), the following network parameters may affect the algorithm performance: the number of nodes, the ratio of the largest transmission range to the smallest transmission range and the node density.

Before simulation, we define some symbols: M representing the side length of the square network area, N representing the number of nodes, rmin representing the minimum transmission radius, rmax representing the maximum transmission radius. Every point in all the simulated figures is simulated 50 times and the results of the 50 times are averaged.

The size of CT: Here, we define 5 scenarios. M is set to 200 m in the 5 scenarios. (Rmin, rmax) is set to (45, 90), (50, 60), (40, 120), (50, 50), (60, 61), respectively and according to Eq. 8, the critical number of nodes are 57, 41, 57, 30, 22, respectively. N varies from 22 to 66. In order to introduce the size of the tree constructed in the first stage, the number of the nodes which are not dominated by the tree (the number of white nodes when the first stage is ended) is shown in the simulation process.

Figure 2 shows that if the number of nodes in the network is bigger than the critical value in Eq. 8, the average white nodes number is very little when the first stage is ended. In the 5 scenarios, if the number of nodes is bigger than their respective critical values, the average white nodes number is less than 1 when the first stage is ended. So, if the number of nodes in the network is bigger than the critical value, the tree constructed in the first stage can dominate almost all the nodes in the network and the number of the black nodes generated in the second stage can be ignored.

Number of nodes: Here, the network area is 200*200 m. In order to simulate the size of CDS in UDG and DGB, we design two scenarios. At the first scenario, (rmin, rmax) is set to (60, 60) and the number of nodes varies from 20 to 200, while at the second scenario, (rmin, rmax) is set to (30, 90) and the number of nodes varies from 20 to 200.

Figure 3 shows that the size of the CDS constructed by ATISA is the smallest.

Figure 4 also shows that the size of the CDS constructed by ATISA is the smallest.

Fig. 2: The size of the CDS at the first scenario

Fig. 3: The size of the CDS at the first scenario

Fig. 4: The size of the CDS at the second scenario

Fig. 5: The relationship between the size of the CDS and k

And the result in Fig. 4 presents the size of CDS increases as the number of nodes increases, which is because as the number of nodes increases the more dominators are needed to dominate the nodes in the network. The increment of ATISA is smaller than that of any one algorithm of WUA, WAA, XA and TFA. This is because ATISA adopts the distance as the criterion for selecting the children nodes. The number of dominators is mainly determined by the transmission radii and the side length of the network area, which is simulated in the next sections.

Transmission radii: The network area is set to 400*400 m. The number of nodes is set to 100. (rmin, rmax) is set to (100, 100), (100, 200), (100, 300), (100, 400), (100, 500), (100, 600), (100, 700), (100, 800), (100, 900), (100, 1000). Thus k = rmin/rmax varies from 1 to 10. We compare the size of CDS of ATISA with that of WUA, WAA, XA and TSA.

The simulation result show that the number of dominators decreases as the k increases. This is because the k increasing makes the radii to increase and a dominator will dominate more nodes in the network. Thus the size of CDS decreases as the k increases.

Figure 5 also shows that ATISA has the smallest size of CDS at the most of the time compared with the four algorithms.

Node density: We set the number of nodes to 50. The side length of the network area varies from 400 to 1400 m and the step is 50 m. The maximum transmission radius is set to 600 m and the minimum transmission radius is set to 200 m.

Figure 6 shows that the number of dominators increases as the node density decreases. This is because the node density decreasing makes a dominator to dominate less number of nodes in the network and thus more dominators are needed.

Fig. 6: The relationship between the CDS size and node density

Table 2: Performance comparison

And when the side length of the network area is 1000, the CDS size of WUA, WAA, XA, TSA and ATISA are 15, 11, 14, 10 and 6. No matter the size of the density, the size of ATISA’s CDS is the smallest among the five compared algorithms.

DISCUSSION

In this study, we have proposed a simple and efficient algorithm for constructing connected dominating set in wireless sensor networks. A simulation has been conducted to compare our proposed algorithm with Wu and Li (1999), Wan et al. (2002), Yingchang et al. (2009) and Li et al. (2004) in term of the size of connected dominating set generated. In all the cases, our algorithm has the smallest size of CDS.

The performance comparison of some reviews algorithms is shown in Table 2.

Message complexity and approximate ratio are two important factors to measure the quality of the CDS algorithm. So we can conclude form Table 2 that our approach outperforms the list approach.

ACKNOWLEDGMENTS

This study is supported by two grants from the National Natural Science Foundation of China (No. 60773190, No. 60802002).

REFERENCES

  • Hahn, B.H. and D.T. Valentine, 2010. Essential MATLAB for Engineers and Scientists. 4th Edn., Elsevier, USA


  • Jeremy, B., D. Min, T. Andrew and C. Xiuzhen, 2004. Connected Dominating Set in Sensor Networks and MANETs. In: Handbook of Combinatorial Optimization, Du, D.Z. and P. Pardalos (Eds.). Springer, USA., pp: 329-369


  • Adjih, C., P. Jacquet and L. Viennot, 2005. Computing connected dominated sets with multipoint relays. Ad Hoc Sen. Networks, 1: 27-39.
    Direct Link    


  • Dai, F. and J. Wu, 2004. An extended localized algorithms for connected dominating set formation in ad hoc wireless networks. IEEE Trans. Parallel Distributed Syst., 15: 908-920.
    CrossRef    


  • Raei, H., M. Sarram, F. Adibniya and F. Tashtarian, 2008. Optimal distributed algorithm for minimum connected dominating sets in wireless sensor networks. Proceedings of the 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Sept. 29-Oct. 2, Atlanta, GA., pp: 695-700.


  • Raei, H., M.A. Fathi, A. Akhlaghi and B. Ahmadipoor, 2009. A new distributed algorithm for virtual backbone in wireless sensor networks with different transmission ranges. Proceeding of the IEEE/ACS International Conference on Computer Systems and Applications, May 10-13, USA., pp: 983-988.


  • Alzoubi, K., P.J. Wan and O. Frieder, 2002. New distributed algorithm for connected dominating set in wireless ad hoc networks. Proceedings of the 35th Annual Hawaii International Conference on System Sciences, Jan. 7-10, Washington, DC., USA., pp: 3849-3855.


  • Zhou, K., L. Meng, Z. Xu, G. Li and J. Hua, 2008. A dynamic clustering-based-routing algorithm for wireless sensor networks. Inform. Technol. J., 7: 694-697.
    Direct Link    


  • Kim, D., Y. Wu, Y. Li, F. Zou and D.Z. Du, 2009. Constructing minimum connected dominating sets with bounded diameters in wireless networks. IEEE Trans. Parallel Distributed Syst., 20: 147-157.
    CrossRef    


  • Alzoubi, K.M., P.J. Wan and O. Frieder, 2002. Message-optimal connected dominating sets in mobile ad hoc networks. Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, June 9-11, Lausanne, Switzerland, pp: 157-164.


  • Li, Y., M.T. Thai, F. Wang, C.W. Yi, P.J. Wang and D.Z. Du, 2005. On greedy construction of connected dominating sets in wireless networks. Wireless Commun. Mobile Comput., 5: 927-932.
    CrossRef    Direct Link    


  • Rai, M., S. Verma and S. Tapaswi, 2009. A heuristic for minimum connected dominating set with local repair for wireless sensor networks. Proceedings of the 8th International Conference on Networks, March 1-6, Washington, DC., USA., pp: 106-111.


  • Thai, M.T., F. Wang, D. Liu, S. Zhu and D.Z. Du, 2007. Connected dominating sets in wireless networks with different transmission ranges. IEEE Trans. Mobile Comput., 6: 721-730.
    CrossRef    


  • Thai, M.T., R. Tiwari and D.Z. Du, 2008. On construction of virtual backbone in wireless ad hoc networks with unidirectional links. IEEE Trans. Mobile Comput., 7: 1098-1109.
    CrossRef    


  • Funke, S., A. Kesselman, U. Meyer and M. Segal, 2006. A simple improved distributed algorithm for minimum CDS in unit disk graphs. ACM Trans. Sensor Networks, 2: 444-453.
    CrossRef    


  • Guha, S. and S. Khuller, 1998. Approximation algorithms for connected dominating sets. Algorithmica, 20: 374-387.
    CrossRef    


  • Stojmenovic, I., M. Seddigh and J. Zunic, 2002. Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks. IEEE Trans. Parallel Distributed Syst., 13: 14-25.
    CrossRef    


  • Feng, W., M.T. Thai and D. Ding-Zhu, 2009. On the construction of 2-connected virtual backbone in wireless networks. IEEE Trans. Wireless Commun., 8: 1230-1237.
    CrossRef    


  • Wu, J. and H. Li, 1999. On calculating connected dominating set for efficient routing in ad hoc wireless networks. Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, August 20, 1999, Seattle, WA., USA., pp: 7-14.


  • Wu, J., W. Lou and F. Dai, 2006. Extended multipoint relays to determine connected dominating sets in manets. IEEE Trans. Comput., 55: 334-347.
    CrossRef    


  • Jie, W., D. Fei and Y. Shuhui, 2008. Iterative local solutions for connected dominating sets in ad hoc wireless networks. IEEE Trans. Comput., 57: 702-715.
    CrossRef    


  • Jie, W. and D. Fai, 2006. Virtual backbone construction in MANETs using adjustable transmission ranges. IEEE Trans. Mobile Comput., 5: 1188-1200.
    CrossRef    


  • Wang, Y., W. Wang and X.Y. Li, 2006. Efficient distributed low-cost backbone formation for wireless networks. IEEE Trans. Parallel Distributed Syst., 17: 681-693.
    CrossRef    


  • Xie, R., D. Qi, Y. Li and J.Z. Wang, 2009. A novel distributed MCDS approximation algorithm for wireless sensor networks. Wireless Commun. Mobile Comput., 9: 427-437.
    CrossRef    Direct Link    


  • Yingchang, X., X. Kai, C. Wei, E.K. Park and R. Shmuel, 2009. Distributed virtual backbone construction in sensor networks with asymmetric links. Wireless Commun. Mobile Comput.,
    CrossRef    


  • Shuhui, Y., W. Jie and D. Fei, 2008. Efficient directional network backbone construction in mobile Ad Hoc networks. IEEE Trans. Parallel Distributed Syst., 19: 1601-1613.
    CrossRef    


  • Zeng, Y., X. Jia and Y. He, 2006. Energy efficient distributed connected dominating sets construction in wireless sensor networks. Proceedings of the International Conference on Wireless Communications and Mobile Computing, July 3-6, Vancouver, British Columbia, Canada, pp: 797-802.


  • Li, Y., S. Zhu, M.T. Thai and D.Z. Du, 2004. Localized construction of connected dominating set in wireless networks. Proceedings of US Nat'l Science Foundation Int'l Workshop Theoretical Aspects of Wireless Ad Hoc, Sensor and Peer-to-Peer Networks.


  • Wan, P.J., K.M. Alzoubi and O. Frieder, 2002. Distributed construction of connected dominating set in wireless ad hoc networks. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies, June 23-27, 2002, New York, USA., pp: 1597-1604.


  • Das, B. and V. Bharghavan, 1997. Routing in Ad-Hoc networks using minimum connected dominating sets. Proceedings of the IEEE International Conference on Communications, June 8-12, 1997, Montreal, Que, pp: 376-380.


  • Dai, Z., Z. Li, B. Wang and Q. Tang, 2009. An energy-aware cluster-based routing protocol for wireless sensor and actor network. Inform. Technol. J., 8: 1044-1048.
    CrossRef    Direct Link    

  • © Science Alert. All Rights Reserved