Strong minimum energy topology in wireless sensor networks: NP-completeness and heuristics
read more
Citations
Relay sensor placement in wireless sensor networks
Relay Node Placement in Wireless Sensor Networks
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation
Algorithmic aspects of topology control problems for ad hoc networks
References
Wireless Communications: Principles and Practice
Ad-hoc on-demand distance vector routing
Dynamic Source Routing in Ad Hoc Wireless Networks.
Dynamic Source Routing in Ad Hoc Wireless Networks
Introduction to algorithms: 4. Turtle graphics
Related Papers (5)
Frequently Asked Questions (16)
Q2. What have the authors stated for future works in "Strong minimum energy topology in wireless sensor networks: np-completeness and heuristics" ?
The authors plan to further explore along this direction and design and evaluate applicable heuristics with better performances for SMET. The authors also plan to study various extended SMET problems in the future. The authors believe that both of them are significant in helping to design long-lived and survivable sensor networks.
Q3. What is the threshold for a sensor to reach v?
3. The power function or the transmit power for sensor u to reach sensor v is denoted by t d , where d is the distance between u and v, t is the threshold which is a function of the signal-tonoise ratio at v, and is a constant that is related to path loss.
Q4. What are the two heuristics that are used to maintain a bidirectionally?
Their heuristics, MST and incremental power, seek to minimize the total transmit power to maintain a bidirectionally strongly connected topology.
Q5. How do the authors compute a k-connected graph?
The authors may wantto compute a k-connected graph (a graph with at leastk disjoint paths from any node to any other node), where k > 1 for network survivability; or, the authors simply ask for k ¼ 1.
Q6. What is the NP-Completeness proof for gSMET?
The authors are going to use the “unidirectional graph model” [17] in their NP-Completeness proof as the authors only consider bidirectional links, while [6] and [9] use the “directed graph model” [17], as they consider both unidirectional and directional links.
Q7. What is the MAC layer protocol for multihop system?
The promising network routing protocols for multihop system such as DSR [14] and AODV [20] assume 802.11 as their MAC layer protocol.
Q8. How many edges in the MST are there?
The authors need time OðnÞ to assign transmit power (there are n vertices and n 1 edges in the MST, and the authors need to examine each edge in the tree twice) after the MST is constructed.
Q9. What is the power of the connection between two devices?
In a sensor network or any other all-wireless network, the connection between any two devices is controlled by their transmit powers.
Q10. How do the authors build a global connected topology?
The authors build a globally connected topology from one node, selecting a node with minimum incremental power to add to the topology at each step.
Q11. What is the way to describe gSMET?
In other words, gSMET seeks a power assignment for an ad hoc network such that the total power is minimized and the topology is strongly connected.
Q12. What is the VC of G with size k?
It is clear that C is a VC of G with size k. tuNow, the authors are going to show that 3rPlanarVC is polynomial time Turing reducible to their SMET problem.
Q13. What is the heuristic for the SMET problem?
The authors also propose a 2-approximate heuristic to the following network optimization problem: Given a sensor network with fixed transmit power, compute the minimum number of relay sensors needed to maintain the global connectivity.
Q14. What is the degree of a vertex in a graph?
Each vertex v 2 V is incident to exactly one edge in , if v has a degree of 3 in G;or one or two edges in , if v has a degree of 2 in G. Theexample in Fig. 3 demonstrates this construction procedure.
Q15. How much is the variance of the incremental power heuristic?
To be specific, the maximum transmit power produced by incremental power heuristic is about 3.3 percent less than that by MST; and thevariance from MST is about 8.5 percent more than that from incremental power.
Q16. How many times did the authors run the two heuristics?
For each network size N (in their simulation, 10 N 100), the authors ran the two heuristics 100 times with different seeds for random number generator.