Joint Monitoring and Routing in Wireless Sensor Networks Using Robust Identifying Codes | Mobile Networks and Applications Skip to main content
Log in

Joint Monitoring and Routing in Wireless Sensor Networks Using Robust Identifying Codes

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Wireless Sensor Networks (WSNs) provide an important means of monitoring the physical world, but their limitations present challenges to fundamental network services such as routing. In this work we utilize an abstraction of WSNs based on the theory of identifying codes. This abstraction has been useful in recent literature for a number of important monitoring problems, such as localization and contamination detection. In our case, we use it to provide a joint infrastructure for efficient and robust monitoring and routing in WSNs. Specifically, we make use of efficient and distributed algorithm for generating robust identifying codes, an NP-hard problem, with a logarithmic performance guarantee based on a reduction to the set k-multicover problem. We also show how this same identifying-code infrastructure provides a natural labeling that can be used for near-optimal routing with very small routing tables. We provide experimental results for various topologies that illustrate the superior performance of our approximation algorithms over previous identifying code heuristics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13
Figure 14

Similar content being viewed by others

References

  1. Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D (2002) Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. In: ASPLOS-X: proceedings of the 10th international conference on architectural support for programming languages and operating systems, San Jose, 5–9 October 2002, pp 96–107

  2. Tolle G, Polastre J, Szewczyk R, Culler D, Turner N, Tu K, Burgess S, Dawson T, Buonadonna P, Gay D, Hong W (2005) A macroscope in the redwoods. In: SenSys ’05: proceedings of the 3rd international conference on embedded networked sensor systems. IEEE, Los Alamitos, pp 51–63

    Chapter  Google Scholar 

  3. Xu N, Rangwala S, Chintalapudi K, Ganesan D, Broad A, Govindan R, Estrin D (2004) A wireless sensor network for structural monitoring. In: SenSys ’04: Proceedings of the 2nd international conference on embedded networked sensor systems. IEEE, Los Alamitos

    Google Scholar 

  4. Sensicast Systems, Inc. (2005) Pump monitoring at a nuclear generating station [Online]. http://www.sensicast.com/solutions/casestudys.php

  5. Ray S, Ungrangsi R, Pellegrinin FD, Trachtenberg A, Starobinski D (2003) Robust location detection in emergency sensor networks. In: Proceedings INFOCOM, April. IEEE, Piscataway, pp 1044–1053

    Google Scholar 

  6. Ray S, Starobinski D, Trachtenberg A, Ungrangsi R (2004) Robust location detection with sensor networks. IEEE J Sel Areas Commun 22(6):1016–1025, August (Special Issue on Fundamental Performance Limits of Wireless Sensor Networks)

    Article  Google Scholar 

  7. Berger-Wolf T, Hart W, Saia J (2003) Discrete sensor placement problems in distribution networks. In: SIAM conference on mathematics for industry, Toronto, October 2003

  8. Berger-Wolf T, Hart W, Saia J (2005) Discrete sensor placement problems in distribution networks. J Math Comput Model 42(13):1385–1396

    Article  MATH  MathSciNet  Google Scholar 

  9. Karpovsky MG, Chakrabarty K, Levitin LB (1998) A new class of codes for identification of vertices in graphs. IEEE Trans Inf Theory 44(2):599–611, March

    Article  MATH  MathSciNet  Google Scholar 

  10. Charon I, Hudry O, Lobstein A (2003) Minimizing the size of an identifying or locating-dominating code in a graph is NP-hard. Theor Comp Sci 290(3):2109–2120

    Article  MATH  MathSciNet  Google Scholar 

  11. Charon I, Hudry O, Lobstein A (2002) Identifying and locating-dominating codes: NP-completeness results for directed graphs. IEEE Trans Inf Theory 48(8):2192–2200, August

    Article  MATH  MathSciNet  Google Scholar 

  12. Moncel J (2006) On graphs of n vertices having an identifying code of cardinality \({\left\lceil {log_2(n+1)} \right\rceil}\). Discrete Appl Math 154(14):2032–2039

    Article  MATH  MathSciNet  Google Scholar 

  13. Laifenfeld M (2008) Localization and identification in networks using robust identifying codes. In: Information theory and application workshop, San Diego, 27 January–1 February 2008

  14. Laifenfeld M, Trachtenberg A (2008) Identifying codes and covering problems. IEEE Trans Inf Theory 54:3929–3950

    Article  MathSciNet  Google Scholar 

  15. Laifenfeld M, Trachtenberg A, Cohen R, Starobinski D (2007) Joint monitoring and routing in wireless sensor networks using robust identifying codes. In: IEEE broadnets 2007, September. IEEE, Piscataway, pp 197–206

    Google Scholar 

  16. Moncel J, Frieze A, Martin R, Ruszink M, Smyth C (2005) Identifying codes in random networks. In: IEEE international symposium on information theory, Adelaide, 4–9 September 2005

  17. Cormen T, Leiserson C, Rivest R, Stein C (2001) Introduction to algorithms. MIT, Cambridge

    MATH  Google Scholar 

  18. Johnson DS (1974) Approximation algorithms for combinatorial problems. J Comput Syst Sci 9:256–278

    Article  MATH  Google Scholar 

  19. Feige U (1998) A threshold of ln n for approximating set cover. J ACM 45(4):634–652

    Article  MATH  MathSciNet  Google Scholar 

  20. Vazirani V (2001) Approximation algorithms. Springer, Heidelberg

    Google Scholar 

  21. Laifenfeld M, Trachtenberg A (2005) Disjoint identifying codes for arbitrary graphs. In: IEEE international symposium on information theory, Adelaide, 4–9 September 2005

  22. Rajagopalan S, Vazirani V (1998) Primal-dual RNC approximation algorithms for set cover and covering integer programs. SIAM J Comput 28:525–540

    Article  MATH  MathSciNet  Google Scholar 

  23. Bartal Y, Byers JW, Raz D (1997) Global optimization using local information with applications to flow control. In: IEEE symposium on foundations of computer science, October, pp 303–312. [Online]. citeseer.ist.psu.edu/bartal97global.html

  24. Kuhn F, Wattenhofer R (2003) Constant-time distributed dominating set approximation. In: Proceedings of the 22nd ACM symposium on principles of distributed computing (PODC’03), pp 25–32, July. [Online]. citeseer.ist.psu.edu/kuhn03constanttime.html

  25. Müller T, Sereni J-S (2007) Identifying and locating-dominating codes in (random) geometric networks. Comb Probab Comput (ITI Series 2006-323 and KAM-DIMATIA Series 2006-797)

  26. Peleg D, Upfal E (1989) A tradeoff between space and efficiency for routing tables. J ACM 36:510–530

    Article  MATH  MathSciNet  Google Scholar 

  27. Thorup M, Zwick U (2001) Compact routing schemes. In: Proceedings of the thirteenth annual ACM symposium on parallel algorithms and architectures. ACM, New York, pp 1–10

    Chapter  Google Scholar 

  28. Cowen L (2001) Compact routing with minimum stretch. J Algorithms 38(1):170–183

    Article  MATH  MathSciNet  Google Scholar 

  29. Gavoille C (1999) A survey on interval routing schemes. Theor Comput Sci 249:217–253

    MathSciNet  Google Scholar 

  30. Jeremy Blum AT, Ding M Cheng, X (2004) Connected dominating set in sensor networks and MANETs. In: Du D-Z, Pardalos P (eds) Handbook of combinatorial optimization. Kluwer, Dordrecht

    Google Scholar 

  31. Wu J, Li H (2001) A dominating-set-based routing scheme in ad hoc wireless networks. Telecommun Syst 18:13–36

    Article  MATH  Google Scholar 

  32. Wu J (2002) Dominating-set-based routing in ad hoc wireless networks. In: Stojmenovic I (ed) Handbook of wireless networks and mobile computing. Wiley, New York

    Google Scholar 

  33. Chen Y, Liestman A, Liu J (2004) Clustering algorithms for ad hoc wireless networks. In: Ad hoc and sensor networks. [Online]. citeseer.ist.psu.edu/chen04clustering.html

  34. Yu J, Chong P (2005) A survey of clustering schemes for mobile ad hoc networks. IEEE Commun Surv Tutor 7:32–48

    Article  Google Scholar 

  35. Honkala I, Karpovsky M, Levitin L (2006) On robust and dynamic identifying codes. IEEE Trans Inf Theory 52(2):599–612, February

    Article  MathSciNet  Google Scholar 

  36. Abraham I, Malkhi D (2004) Compact routing on euclidean metrics. In: 23rd ACM symposium on principles of distributed computing (PODC 2004). ACM, New York

    Google Scholar 

Download references

Acknowledgements

This material is based, in part, upon work supported by the National Science Foundation under Grants 0132802, CCF-0729158, CCR-0133521 and CNS-0435312.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Moshe Laifenfeld.

Appendix

Appendix

We provide here the proof of Theorem 5. Recall that G(n,p) = (V,E ) is a random graph of n vertices where the existence of an edge between any pair of distinct vertices is determined independently and in random with probability p.

Proof of Theorem 5

The proof is based on developing the probability that a subset of size c is not a robust identifying code and showing that this probability goes to zero asymptotically in n. But first we show that the expression for c can always be made feasible under the settings of the theorem, namely that c ≤ n.

Observe that log1/q = log(1 + (1/q − 1)) ≥ (1/q − 1) − \(\frac{1}{2}(1/q-1)^2= (1/q -1)[1-\frac{1}{2}(1/q-1)]\geq \frac{1}{2}(1/q-1)\), where the last inequality follows from the fact that 0.5 ≤ q ≤ 1. If r ≤ O(logloglogn) then the bound on c can be upper bounded by

$$\begin{array}{lll} &&{\kern-7pt} \frac{2\log n+2r\log \log n}{\log 1/q}\\ &&{\kern5pt} \leq \frac{4q\left(\log n+r\log \log n\right)}{1-q}\\ &&{\kern5pt} \leq \frac{4q\left(\log n+O(\log\log\log n)\log \log n\right)}{1-q}\\ &&{\kern5pt} \leq \frac{O(\log n)}{1-q} \end{array}$$

Since \(1-q\geq \Omega\left(\frac{\log n}{n}\right)\), it follows that there exist constants K > K 0 > 0 such that for large enough n, \(1-q\geq \frac{K_0\log n}{n}\), and for large enough K our assertion that c ≤ n can be made true.

We next show that any subset of size c is almost surely an r-robust identifying code. Fix \({\ensuremath{\mathbb{C}} }\) to be a code of size c and let q = p 2 + (1 − p)2 be the probability that a codeword in \({\ensuremath{\mathbb{C}} }\) does not distinguish between a pair of vertices in V, namely the probability that the codeword doesn’t appear in the pair’s difference set. In the rest of the proof we develop an upper bound on the probability that \({\ensuremath{\mathbb{C}} }\) is not an r-robust identifying code and show that for a certain size c it goes to zero asymptotically in n.

By Lemma 1 if \({\ensuremath{\mathbb{C}} }\) is not r-robust then there must be a pair of distinct vertices u,v ∈ V, for which the difference set under \({\ensuremath{\mathbb{C}} }\) has at most 2r elements. The probability of such an event, Pe(u,v), depends whether either u or v, or both are in \({\ensuremath{\mathbb{C}} }\):

  1. 1)

    Both u,v are in \({\ensuremath{\mathbb{C}} }\). There are two possibilities here that need to be addressed separately; either there is an edge between u and v, and hence there can be at most 2r distinguishing codewords from the remaining c − 2 codewords, namely \(Pe(u,v|u,v\in{\ensuremath{\mathbb{C}} },(u,v)\in E)=p\sum_{i=0}^{2r} {c-2 \choose i}(1-q)^i q^{c-2-i}\), or there is no edge between u and v, implying that both u and v are already in the distinguishing set; therefore there can be at most 2r − 2 additional distinguishing codewords from the remaining c − 2 codewords, namely \(Pe(u,v|u,v\in{\ensuremath{\mathbb{C}} },(u,v)\not\in E)=(1-p)\sum_{i=0}^{2r-2} {c-2 \choose i}(1-q)^i q^{c-2-i}\). In total we have:

    $$\begin{array}{lll}Pe(u,v|u,v\in{\ensuremath{\mathbb{C}} })&=&\sum\limits_{i=0}^{2r-2} {c-2 \choose i}(1-q)^i q^{c-2-i}\\ &&+\,p\sum\limits_{i=2r+1}^{2r} {c-2 \choose i}(1-q)^i q^{c-2-i}. \end{array}$$
  2. 2)

    Exactly one of u,v is in \({\ensuremath{\mathbb{C}} }\). Similarly to the previous case there are two possibilities here depending whether an edge between the two vertices exists. In total the probability Pe is given by

    $$\begin{array}{lll}Pe(u,v||{\{{u,v}\}}\cap{\ensuremath{\mathbb{C}} }|=1)&=&\sum\limits_{i=0}^{2r-1} {c-1 \choose i}(1-q)^i q^{c-1-i}\\ &&+\,p {c-1 \choose 2r}(1-q)^{2r}q^{c-1-2r}. \end{array}$$
  3. 3)

    Neither u nor v are in \({\ensuremath{\mathbb{C}} }\). Here there are at most 2r distinguishing codewords in \({\ensuremath{\mathbb{C}} }\).

    $$Pe(u,v|u,v\notin {\ensuremath{\mathbb{C}} })=\sum\limits_{i=0}^{2r} {c \choose i}(1-q)^i q^{c-i}.$$

We use the union bound to set an upper bound on the probability that \({\ensuremath{\mathbb{C}} }\) is not an r-robust identifying code:

$$\begin{array}{lll}P(\mbox{${\ensuremath{\mathbb{C}} }$ is not $r$-robust})&\leq& {c \choose 2}Pe(u,v|u,v\in{\ensuremath{\mathbb{C}} })\\&&+\,(n-c)c Pe(u,v||{\{{u,v}\}}\cap{\ensuremath{\mathbb{C}} }|=1)\\&&+\,{n-c \choose 2}Pe(u,v|u,v\notin {\ensuremath{\mathbb{C}} })\\ &\leq& 3n^2q^{c-2}\sum\limits_{i=0}^{2r} {c \choose i}\left(\frac{1-q}{q}\right)^i\\ &\leq& 3n^2q^{c-2}\frac{\left(\frac{c(1-q)}{q}\right)^{2r}-1}{\frac{c(1-q)}{q}-1}\\ &\leq& 3n^2q^{c-2}\frac{\left(\frac{c(1-q)}{q}\right)^{2r}}{\frac{c(1-q)}{q}-1}. \end{array}$$

Next consider a code \({\ensuremath{\mathbb{C}} }\) of size \(c=\frac{2\log n+(2r-1+\epsilon)\log \log n}{\log 1/q}\) for arbitrary small ϵ > 0, and r = O(logloglogn).

Under this selection of parameters we show that the following equations holds:

$$q^c=n^{-2}(\log n)^{-2r+1-\epsilon}$$
(3)
$$c^{2r}\leq O\left(\left(\frac{2}{\log (1/q)}\right)^{2r}(\log n)^{2r}\right)$$
(4)
$$\frac{1-q}{\log{1/q}}=\Theta(1)$$
(5)
$$c(1-q)\geq\Omega(\log n).$$
(6)

Equation 3 is straightforward.

To see why Eq. 4 is true observe that

$$\begin{array}{lll}c^{2r}&=&\left(\frac{2}{\log (1/q)}\right)^{2r} (\log n)^{2r}\left(1+O\left(\frac{\log\log n}{\log n}\right)\right)^{2r}\\ &\leq &\left(\frac{2}{\log (1/q)}\right)^{2r}(\log n)^{2r}e^{O(1)}. \end{array}$$

Equation 5 follows form the fact that 0.5 ≤ q ≤ 1 and hence \(\frac{0.5}{\log 2}\leq\frac{1-q}{\log{1/q}}=\frac{1-q}{\sum_{i=1} \frac{(1-q)^i}{i}}=\frac{1}{1+\sum_{i=1}\frac{(1-q)^i}{i+1}} \leq 1\).

Finally Eq. 6 follows from a directs substitution of c in Eq. 5.

We can use these equations to complete the proof by further bounding the probability that \({\ensuremath{\mathbb{C}} }\) is not an r-robust identifying code:

$$\begin{array}{lll}P(\mbox{${\ensuremath{\mathbb{C}} }$ is not $r$-robust})&\leq& O\left((\log n)^{1-\epsilon}\frac{\left(\frac{2(1-q)}{q\log (1/q)}\right)^{2r}}{cq(1-q)-q^2}\right)\\ &\leq& (\log n)^{1-\epsilon}\frac{(O(1))^{2r}}{\Omega(\log n)}\\ &\leq& O\left(\frac{\log \log n}{(\log n)^{\epsilon}}\right)=o(1). \end{array}$$

Rights and permissions

Reprints and permissions

About this article

Cite this article

Laifenfeld, M., Trachtenberg, A., Cohen, R. et al. Joint Monitoring and Routing in Wireless Sensor Networks Using Robust Identifying Codes. Mobile Netw Appl 14, 415–432 (2009). https://doi.org/10.1007/s11036-008-0105-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-008-0105-x

Keywords

Navigation