Abstract
Wireless Sensor Networks (WSNs) provide an important means of monitoring the physical world, but their limitations present challenges to fundamental network services such as routing. In this work we utilize an abstraction of WSNs based on the theory of identifying codes. This abstraction has been useful in recent literature for a number of important monitoring problems, such as localization and contamination detection. In our case, we use it to provide a joint infrastructure for efficient and robust monitoring and routing in WSNs. Specifically, we make use of efficient and distributed algorithm for generating robust identifying codes, an NP-hard problem, with a logarithmic performance guarantee based on a reduction to the set k-multicover problem. We also show how this same identifying-code infrastructure provides a natural labeling that can be used for near-optimal routing with very small routing tables. We provide experimental results for various topologies that illustrate the superior performance of our approximation algorithms over previous identifying code heuristics.
Similar content being viewed by others
References
Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D (2002) Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. In: ASPLOS-X: proceedings of the 10th international conference on architectural support for programming languages and operating systems, San Jose, 5–9 October 2002, pp 96–107
Tolle G, Polastre J, Szewczyk R, Culler D, Turner N, Tu K, Burgess S, Dawson T, Buonadonna P, Gay D, Hong W (2005) A macroscope in the redwoods. In: SenSys ’05: proceedings of the 3rd international conference on embedded networked sensor systems. IEEE, Los Alamitos, pp 51–63
Xu N, Rangwala S, Chintalapudi K, Ganesan D, Broad A, Govindan R, Estrin D (2004) A wireless sensor network for structural monitoring. In: SenSys ’04: Proceedings of the 2nd international conference on embedded networked sensor systems. IEEE, Los Alamitos
Sensicast Systems, Inc. (2005) Pump monitoring at a nuclear generating station [Online]. http://www.sensicast.com/solutions/casestudys.php
Ray S, Ungrangsi R, Pellegrinin FD, Trachtenberg A, Starobinski D (2003) Robust location detection in emergency sensor networks. In: Proceedings INFOCOM, April. IEEE, Piscataway, pp 1044–1053
Ray S, Starobinski D, Trachtenberg A, Ungrangsi R (2004) Robust location detection with sensor networks. IEEE J Sel Areas Commun 22(6):1016–1025, August (Special Issue on Fundamental Performance Limits of Wireless Sensor Networks)
Berger-Wolf T, Hart W, Saia J (2003) Discrete sensor placement problems in distribution networks. In: SIAM conference on mathematics for industry, Toronto, October 2003
Berger-Wolf T, Hart W, Saia J (2005) Discrete sensor placement problems in distribution networks. J Math Comput Model 42(13):1385–1396
Karpovsky MG, Chakrabarty K, Levitin LB (1998) A new class of codes for identification of vertices in graphs. IEEE Trans Inf Theory 44(2):599–611, March
Charon I, Hudry O, Lobstein A (2003) Minimizing the size of an identifying or locating-dominating code in a graph is NP-hard. Theor Comp Sci 290(3):2109–2120
Charon I, Hudry O, Lobstein A (2002) Identifying and locating-dominating codes: NP-completeness results for directed graphs. IEEE Trans Inf Theory 48(8):2192–2200, August
Moncel J (2006) On graphs of n vertices having an identifying code of cardinality \({\left\lceil {log_2(n+1)} \right\rceil}\). Discrete Appl Math 154(14):2032–2039
Laifenfeld M (2008) Localization and identification in networks using robust identifying codes. In: Information theory and application workshop, San Diego, 27 January–1 February 2008
Laifenfeld M, Trachtenberg A (2008) Identifying codes and covering problems. IEEE Trans Inf Theory 54:3929–3950
Laifenfeld M, Trachtenberg A, Cohen R, Starobinski D (2007) Joint monitoring and routing in wireless sensor networks using robust identifying codes. In: IEEE broadnets 2007, September. IEEE, Piscataway, pp 197–206
Moncel J, Frieze A, Martin R, Ruszink M, Smyth C (2005) Identifying codes in random networks. In: IEEE international symposium on information theory, Adelaide, 4–9 September 2005
Cormen T, Leiserson C, Rivest R, Stein C (2001) Introduction to algorithms. MIT, Cambridge
Johnson DS (1974) Approximation algorithms for combinatorial problems. J Comput Syst Sci 9:256–278
Feige U (1998) A threshold of ln n for approximating set cover. J ACM 45(4):634–652
Vazirani V (2001) Approximation algorithms. Springer, Heidelberg
Laifenfeld M, Trachtenberg A (2005) Disjoint identifying codes for arbitrary graphs. In: IEEE international symposium on information theory, Adelaide, 4–9 September 2005
Rajagopalan S, Vazirani V (1998) Primal-dual RNC approximation algorithms for set cover and covering integer programs. SIAM J Comput 28:525–540
Bartal Y, Byers JW, Raz D (1997) Global optimization using local information with applications to flow control. In: IEEE symposium on foundations of computer science, October, pp 303–312. [Online]. citeseer.ist.psu.edu/bartal97global.html
Kuhn F, Wattenhofer R (2003) Constant-time distributed dominating set approximation. In: Proceedings of the 22nd ACM symposium on principles of distributed computing (PODC’03), pp 25–32, July. [Online]. citeseer.ist.psu.edu/kuhn03constanttime.html
Müller T, Sereni J-S (2007) Identifying and locating-dominating codes in (random) geometric networks. Comb Probab Comput (ITI Series 2006-323 and KAM-DIMATIA Series 2006-797)
Peleg D, Upfal E (1989) A tradeoff between space and efficiency for routing tables. J ACM 36:510–530
Thorup M, Zwick U (2001) Compact routing schemes. In: Proceedings of the thirteenth annual ACM symposium on parallel algorithms and architectures. ACM, New York, pp 1–10
Cowen L (2001) Compact routing with minimum stretch. J Algorithms 38(1):170–183
Gavoille C (1999) A survey on interval routing schemes. Theor Comput Sci 249:217–253
Jeremy Blum AT, Ding M Cheng, X (2004) Connected dominating set in sensor networks and MANETs. In: Du D-Z, Pardalos P (eds) Handbook of combinatorial optimization. Kluwer, Dordrecht
Wu J, Li H (2001) A dominating-set-based routing scheme in ad hoc wireless networks. Telecommun Syst 18:13–36
Wu J (2002) Dominating-set-based routing in ad hoc wireless networks. In: Stojmenovic I (ed) Handbook of wireless networks and mobile computing. Wiley, New York
Chen Y, Liestman A, Liu J (2004) Clustering algorithms for ad hoc wireless networks. In: Ad hoc and sensor networks. [Online]. citeseer.ist.psu.edu/chen04clustering.html
Yu J, Chong P (2005) A survey of clustering schemes for mobile ad hoc networks. IEEE Commun Surv Tutor 7:32–48
Honkala I, Karpovsky M, Levitin L (2006) On robust and dynamic identifying codes. IEEE Trans Inf Theory 52(2):599–612, February
Abraham I, Malkhi D (2004) Compact routing on euclidean metrics. In: 23rd ACM symposium on principles of distributed computing (PODC 2004). ACM, New York
Acknowledgements
This material is based, in part, upon work supported by the National Science Foundation under Grants 0132802, CCF-0729158, CCR-0133521 and CNS-0435312.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
We provide here the proof of Theorem 5. Recall that G(n,p) = (V,E ) is a random graph of n vertices where the existence of an edge between any pair of distinct vertices is determined independently and in random with probability p.
Proof of Theorem 5
The proof is based on developing the probability that a subset of size c is not a robust identifying code and showing that this probability goes to zero asymptotically in n. But first we show that the expression for c can always be made feasible under the settings of the theorem, namely that c ≤ n.
Observe that log1/q = log(1 + (1/q − 1)) ≥ (1/q − 1) − \(\frac{1}{2}(1/q-1)^2= (1/q -1)[1-\frac{1}{2}(1/q-1)]\geq \frac{1}{2}(1/q-1)\), where the last inequality follows from the fact that 0.5 ≤ q ≤ 1. If r ≤ O(logloglogn) then the bound on c can be upper bounded by
Since \(1-q\geq \Omega\left(\frac{\log n}{n}\right)\), it follows that there exist constants K > K 0 > 0 such that for large enough n, \(1-q\geq \frac{K_0\log n}{n}\), and for large enough K our assertion that c ≤ n can be made true.
We next show that any subset of size c is almost surely an r-robust identifying code. Fix \({\ensuremath{\mathbb{C}} }\) to be a code of size c and let q = p 2 + (1 − p)2 be the probability that a codeword in \({\ensuremath{\mathbb{C}} }\) does not distinguish between a pair of vertices in V, namely the probability that the codeword doesn’t appear in the pair’s difference set. In the rest of the proof we develop an upper bound on the probability that \({\ensuremath{\mathbb{C}} }\) is not an r-robust identifying code and show that for a certain size c it goes to zero asymptotically in n.
By Lemma 1 if \({\ensuremath{\mathbb{C}} }\) is not r-robust then there must be a pair of distinct vertices u,v ∈ V, for which the difference set under \({\ensuremath{\mathbb{C}} }\) has at most 2r elements. The probability of such an event, Pe(u,v), depends whether either u or v, or both are in \({\ensuremath{\mathbb{C}} }\):
-
1)
Both u,v are in \({\ensuremath{\mathbb{C}} }\). There are two possibilities here that need to be addressed separately; either there is an edge between u and v, and hence there can be at most 2r distinguishing codewords from the remaining c − 2 codewords, namely \(Pe(u,v|u,v\in{\ensuremath{\mathbb{C}} },(u,v)\in E)=p\sum_{i=0}^{2r} {c-2 \choose i}(1-q)^i q^{c-2-i}\), or there is no edge between u and v, implying that both u and v are already in the distinguishing set; therefore there can be at most 2r − 2 additional distinguishing codewords from the remaining c − 2 codewords, namely \(Pe(u,v|u,v\in{\ensuremath{\mathbb{C}} },(u,v)\not\in E)=(1-p)\sum_{i=0}^{2r-2} {c-2 \choose i}(1-q)^i q^{c-2-i}\). In total we have:
$$\begin{array}{lll}Pe(u,v|u,v\in{\ensuremath{\mathbb{C}} })&=&\sum\limits_{i=0}^{2r-2} {c-2 \choose i}(1-q)^i q^{c-2-i}\\ &&+\,p\sum\limits_{i=2r+1}^{2r} {c-2 \choose i}(1-q)^i q^{c-2-i}. \end{array}$$ -
2)
Exactly one of u,v is in \({\ensuremath{\mathbb{C}} }\). Similarly to the previous case there are two possibilities here depending whether an edge between the two vertices exists. In total the probability Pe is given by
$$\begin{array}{lll}Pe(u,v||{\{{u,v}\}}\cap{\ensuremath{\mathbb{C}} }|=1)&=&\sum\limits_{i=0}^{2r-1} {c-1 \choose i}(1-q)^i q^{c-1-i}\\ &&+\,p {c-1 \choose 2r}(1-q)^{2r}q^{c-1-2r}. \end{array}$$ -
3)
Neither u nor v are in \({\ensuremath{\mathbb{C}} }\). Here there are at most 2r distinguishing codewords in \({\ensuremath{\mathbb{C}} }\).
$$Pe(u,v|u,v\notin {\ensuremath{\mathbb{C}} })=\sum\limits_{i=0}^{2r} {c \choose i}(1-q)^i q^{c-i}.$$
We use the union bound to set an upper bound on the probability that \({\ensuremath{\mathbb{C}} }\) is not an r-robust identifying code:
Next consider a code \({\ensuremath{\mathbb{C}} }\) of size \(c=\frac{2\log n+(2r-1+\epsilon)\log \log n}{\log 1/q}\) for arbitrary small ϵ > 0, and r = O(logloglogn).
Under this selection of parameters we show that the following equations holds:
Equation 3 is straightforward.
To see why Eq. 4 is true observe that
Equation 5 follows form the fact that 0.5 ≤ q ≤ 1 and hence \(\frac{0.5}{\log 2}\leq\frac{1-q}{\log{1/q}}=\frac{1-q}{\sum_{i=1} \frac{(1-q)^i}{i}}=\frac{1}{1+\sum_{i=1}\frac{(1-q)^i}{i+1}} \leq 1\).
Finally Eq. 6 follows from a directs substitution of c in Eq. 5.
We can use these equations to complete the proof by further bounding the probability that \({\ensuremath{\mathbb{C}} }\) is not an r-robust identifying code:
□
Rights and permissions
About this article
Cite this article
Laifenfeld, M., Trachtenberg, A., Cohen, R. et al. Joint Monitoring and Routing in Wireless Sensor Networks Using Robust Identifying Codes. Mobile Netw Appl 14, 415–432 (2009). https://doi.org/10.1007/s11036-008-0105-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-008-0105-x