Chapter 3 Clustering Wireless Sensor Nodes Using

Chapter 3
Clustering Wireless Sensor Nodes Using Caterpillar Graph
3. Introduction
A wireless sensor network is a collection of nodes organized into a cooperative
network [1].Currently, wireless sensor networks are beginning to be deployed at an
accelerated space. It is not unreasonable to expect that in 10-15 years that the world
will be covered with wireless sensor networks with access to them via the Internet.
This can be considered as the Internet becoming a physical network. This new
technology is exciting with unlimited potential for numerous application areas
including environmental, medical, military, transportation, entertainment, crisis
management, homeland defense, and smart spaces. Since a wireless sensor network is
a distributed real-time system a natural question is how many solutions from
distributed and real-time systems can be used in these new systems? Unfortunately,
very little prior work can be applied and new solutions are necessary in all areas of
the system. The main reason is that the set of assumptions underlying previous work
has changed dramatically. Most past distributed systems research has assumed that the
systems are wired, have unlimited power, are not real-time, have user interfaces such
as screens and mice, have a fixed set of resources, treat each node in the system as
very important and are location independent. In contrast, for wireless sensor networks,
the systems are wireless, have scarce power, are real-time, utilize sensors and
actuators as interfaces, have dynamically changing sets of resources, aggregate
behavior is important and location is critical. Many wireless sensor networks also
128
utilize minimal capacity devices which places a further strain on the ability to use past
solutions.
3.1 MAC
A medium access control (MAC) protocol coordinates actions over a shared channel.
The most commonly used solutions are contention-based. One general contentionbased strategy is for a node which has a message to transmit to test the channel to see
if it is busy, if not busy then it transmits, else if busy it waits and tries again later.
After colliding, nodes wait random amounts of time trying to avoid re-colliding. If
two or more nodes transmit at the same time there is a collision and all the nodes
colliding try again later. Many wireless MAC protocols also have a dozen mode
where nodes not involved with sending or receiving a packet in a given timeframe go
into sleep mode to save energy. Many variations exist on this basic scheme. In
general, most MAC protocols optimize for the general case and for arbitrary
communication patterns and workloads. However, a wireless sensor network has more
focused requirements that include a local unicast or broad cast , traffic is generally
from nodes to one or a few sinks (most traffic is then in one direction),have periodic
or rare communication and must consider energy consumption as a major factor. An
effective MAC protocol for wireless sensor networks must consume little power,
avoid collisions, be implemented with a small code size and memory requirements, be
efficient for a single application, and be tolerant to changing radio frequency and
networking conditions. One example of a good MAC protocol for wireless sensor
networks is B-MAC [2]. B-MAC is highly configurable and can be implemented with
129
a small code and memory size. It has an interface that allows choosing various
functionality and only that functionality as needed by a particular application. B-MAC
consists of four main parts: clear channel assessment (CCA), packet back off, link
layer acks, and low power listening. For CCA, B-MAC uses a weighted moving
average of samples when the channel is idle in order to assess the background noise
and better be able to detect valid packets and collisions. The packet back off time is
configurable and is chosen from a linear range as opposed to an exponential back off
scheme typically used in other distributed systems. This reduces delay and works
because of the typical communication patterns found in a wireless sensor network. BMAC also supports a packet by packet link layer acknowledgement. In this way only
important packets need pay the extra cost. A low power listening scheme is employed
where a node cycles between awake and sleep cycles. While awake it listens for a
long enough preambles to assess if it needs to stay awake or can return to sleep mode.
This scheme saves significant amounts of energy. Many MAC protocols use a request
to send (RTS) and clear to send (CTS) style of interaction. This works well for ad hoc
mesh networks where packet sizes are large (1000s of bytes). However, the overhead
of RTS-CTS packets to set up a packet transmission is not acceptable in wireless
sensor networks where packet sizes are on the order of 50 bytes. B-MAC, therefore,
does not use a RTS-CTS scheme. Recently, there has been new work on supporting
multi-channel wireless sensor networks. In these systems it is necessary to extend
MAC protocols to multi-channel MACs. One such protocol is MMSN[3] . These
protocols must support all the features found in protocols such as B-MAC, but must
also assign frequencies for each transmission. Consequently, multi-frequency MAC
130
protocols consist of two phases: channel assignment and access control. The details
for MMSN are quite complicated and are not described here. On the other hand, we
expect that more and more future wireless sensor networks will employ multiple
channels (frequencies). The advantages of multi-channel MAC protocols include
providing greater packet throughput and being able to transmit even in the presence of
a crowded spectrum.
3.1.1 Routing
Semantics may be that a single node closest to the geographic destination is to be the
unicast node. Second, the semantics could be that all nodes within some area around
the destination address should receive the message. This is an area multicast. Third, it
may only be necessary for any node, called any cast, in the destination area to receive
the message. The SPEED [4] protocol supports these 3 types of semantics. There is
also often a need to flood (multicast) to the entire network. Many routing schemes
exist for supporting efficient flooding.
Real-Time: For some applications, messages must arrive at a destination by a
deadline. Due to the high degree of uncertainty in WSN it is difficult to develop
routing algorithms with any guarantees. Protocols such as SPEED [5] and RAP [6]
use a notion of velocity to prioritize packet transmissions. Velocity is a nice metric
that combines the deadline and distance that a message must travel.
Mobility: Routing is complicated if either the message source or destination or both
are moving. Solutions include continuously updating local neighbor tables or
identifying proxy nodes which are responsible for keeping track of where nodes are.
131
Proxy nodes for a given node may also change as a node moves further and further
away from its original location.
Voids: Since WSN nodes have a limited transmission range, it is possible that for
some node in the routing path there are no forwarding nodes in the direction a
message is supposed to travel. Protocols like GPSR [7]. Solve this problem by
choosing some other node “not” in the correct direction in an effort to find a path
around the void.
Security: If adversaries exist, they can perpetrate a wide variety of attacks on the
routing algorithm including selective forwarding, black hole, Sybil, replays,
wormhole and denial of service attacks. Unfortunately, almost all WSN routing
algorithms have ignored security and are vulnerable to these attacks. Protocols such as
SPINS [8] have begun to address secure routing issues.
Congestion: Today, many WSN have periodic or infrequent traffic. Congestion does
not seem to be a big problem for such networks. However, congestion is a problem
for more demanding WSN and is expected to be a more prominent issue with larger
systems that might process audio, video and have multiple base stations (creating
more cross traffic). Even in systems with a single base station, congestion near the
base station is a serious problem since traffic converges at the base station. Solutions
use backpressure, reducing
132
3.2 Design Challenges
Several design challenges present themselves to designers of wireless sensor network
applications. The limited resources available to individual sensor nodes implies
designers must develop highly distributed, fault-tolerant, and energy efficient
applications in a small memory-footprint. Some features of wireless sensor nodes are:
1. Individual nodes in a wireless sensor network have limited computational power
and storage capacity. They operate on nonrenewable power sources and employ a
short-range transceiver to send and receive messages.
2. The number of nodes in a wireless sensor network can be several orders of
magnitude higher than in an ad hoc network. Thus, algorithm scalability is an
important design criterion for sensor network applications.
3. Sensor nodes are generally densely deployed in the area of interest. This dense
deployment can be leveraged by the application, since nodes in close proximity can
collaborate locally prior to relaying information back to the base station.
4. Sensor networks are prone to frequent topology changes. This is due to several
reasons, such as hardware failure, depleted batteries, intermittent radio interference,
environmental factors, or the addition of sensor nodes. As a result, applications
require a degree of inherent fault tolerance and the ability to reconfigure themselves
as the network topology evolves over time.
Wireless sensor networks do not employ a point-to-point communication paradigm
because they are usually not aware of the entire size of the network and nodes are not
uniquely identifiable. Consequently, it is not possible to individually address a
specific node. Paradigms, such as directed diffusion [9, 10] employ a data-centric
133
view of generated sensor data. Nodes request data by disseminating interests for this
named data throughout the network. Data that matches the criterion are relayed back
toward the querying node.
Even with the limitations individual sensor nodes possess and the design challenges
application developers face, several advantages exist for instrumenting an area with a
wireless sensor network [11].Due to the dense deployment of a greater number of
nodes, a higher level of fault tolerance is achievable in wireless sensor networks. .
Coverage of a large area is possible through the union of coverage of several small
sensors. Coverage of a particular area and terrain can be shaped as needed to
overcome any potential barriers or holes in the area under observation. It is possible to
incrementally extend coverage of the observed area and density by deploying
additional sensor nodes within the region of interest. An improvement in sensing
quality is achieved by combining multiple, independent sensor readings. Local
collaboration between nearby sensor nodes achieves a higher level of confidence in
observed phenomena. . Since nodes are deployed in close proximity to the sensed
event, this overcomes any ambient environmental factors that might otherwise
interfere with observation of the desired phenomenon.
3.2.1 Architecture
The wireless sensor network architecture is divided into distinct tiers Fig. 1. The
lowest level consists of autonomous motes, equipped with various sensors that
perform basic networking, computing, and sensing tasks. They are organized into a
local one-hop network and collectively identified as a sensor patch. One of the sensor
134
motes within the sensor patch serves as a gateway between the sensor patch and the
base station. It differs from other motes in that it is equipped with a high-gain antenna
able to transmit data over a 350-foot link to the base station. The gateway node is also
equipped with a solar panel and rechargeable battery in order to be able to operate
with a 100% duty cycle. Data relayed to the base station are stored in a database and
made available over the Internet.
Data
Service
Client
Internet
Gateway
Transit
network
Base
remote link
Gatewa
y node
Base
Sensor
Figure 1
135
3.3 Clustering
Clustering analysis is desirable in nearly any field of study where it is beneficial to
group data into similar sets depending on one’s objective in analyzing a set of data
one might define similarity between elements differently and thus a clustering process
could be optimized to provide numerous way of grouping a set of elements. In order
to create any sort of clustering algorithm and determine its effectiveness it is
necessary to find some way to quantity similarity between elements. When sensor
nodes are organized in clusters they could use either single hop or multi hop mode of
communication to send their data to their respective cluster heads. The sensor nodes
are randomly and uniformly distributed over the region and the nodes are organized in
clusters to take advantage of possible data aggregation at the cluster head nodes.
There are two types of nodes; cluster head nodes and sensor nodes. The cluster head
nodes act as the fusion points within the network. During each data gathering cycle
the sensor nodes send their sensed data to the closest cluster head node which perform
data aggregation. Then the cluster head directly transmits the aggregated data to a
base station. The sensor nodes have simple functionality, since they perform sensing
and relatively short-range communication. However the cluster head nodes are more
complex, since they coordinate MAC and routing within their cluster perform data
fusion and perform long range transmissions to the remote base station. The overall
system design problem involves determining the optimum number of cluster head
nodes the optimum node of communication within a cluster (Single hop or Multi
hop).Some of the objectives of the clustering nodes are as follows
136
•
Involves grouping nodes into clusters and electing a CH
•
Members of a cluster can communicate with their CH directly
•
CH can forward the aggregated data to the central base station through
other CHs
•
Clustering Objectives
•
Allows aggregation
•
Limits data transmission
•
Facilitate the reusability of the resources
•
CHs and gateway nodes can form a virtual backbone for intercluster
routing
•
Cluster structure gives the impression of a smaller and more stable
network
•
Improve network lifetime
•
Reduce network traffic and the contention for the channel
•
Data aggregation and updates take place in CHs
Various clustering algorithms have been proposed to organize sensor nodes in a
wireless sensor network into clusters. [1][2][3][4][5][6](Papers). Each aim to meet
certain needs of the system. This could provide a system having low clustering related
maintenance cost or energy efficient clusters to minimize energy consumption
suitable for sensor nodes with energy constraints or for load balancing to distribute
the workload of a network. The fig2 illustrates the concept of clusters.
137
Cluster member
Clusterhead
Gateway node
Intra - Cluster
Cross - Cluster
Figure 2
Wireless sensor networks are networks of wireless nodes that are deployed over an area for
the purpose of monitoring certain phenomena of interest. The nodes perform certain
measurements process the measured data and transmit the processed data to a base station
over a wireless channels. The base station collects data from all the nodes and analyzes this
data to draw conclusion about the activity in the area of interest. These networks are different
from the traditional wireless ad hoc networks. However, when nodes are organized in clusters
and when they use multi hop communication to reach the cluster head the nodes closer to a
cluster head have a higher load of relaying packets as compared to other nodes. However is
138
most sensor networks nodes are static consequently the nodes closer to the cluster head get
overburdened constantly. The cluster heads themselves have the extra burden of performing
long rang transmissions to the distant base station.
We consider a region to be covered by sensor nodes. The number of sensor nodes is
determined by the application requirements. Usually each sensor node has a sensing radius
and it is required that the sensor nodes provide coverage of the region with a high probability.
The sensing radius of each node depends on the phenomenon that is being sensed as well as
the sensing hardware of the node. Thus in general the required number of sensor nodes is
dictated by the application and hence we assume it to be a constant.
3.3.1 Clustering Algorithm
Consider a wireless network represented by a connected graph
vertex set
contains
nodes and
is the edge set. We assume that the
where the
nodes form
clusters in such a manner that the following assumptions are satisfied: . Each node
belongs to one and only one cluster.2. In each cluster, there is a node which is
adjacent to all the remaining nodes in the cluster. Such a node is called a cluster-head.
(If more than one such nodes exist, only one is chosen). Two clusters are called
adjacent (or neighbors) if there is a direct link joining them. Assume that through
some information exchange, a cluster-head knows all its neighboring clusters. In the
case that two clusters are joined by more than one links, we assume that the clusterheads of both clusters agree on a single such link being activated. The end nodes of
active links are called gateway nodes. The set of cluster-heads by our assumption is a
dominating set, i.e., a subset of nodes which are at most 1 hop away from any node.
139
The well-known minimum dominating set (MDS) problem seeks a dominating set of
minimum size, and has been proven to be
hence its degree
-hard. In the following, we describe
(i.e., the number of neighbors). Initially, a non-iterative
decentralized clustering algorithm for choosing a dominating set. Assume that each
node knows its one-hop neighbors, each node sets its own flag to , meaning that it
does not yet belong to any cluster. At a certain time, each node
length
at
drawn from an exponential distribution with rate
, it becomes a cluster-head. It sets its flag to
starts a timer with
If node ’s timer expires
, and broadcasts a “cluster
initialize” message to all its neighbors. Each of its neighbors with flag
signals its
intention to join the cluster by replying with a “cluster join” message. It also sets its
own flag to
and stops the timer. At the end, clusters satisfying the two properties
mentioned above are formed. The particular choice of timers ensures that high degree
nodes have more chances to become cluster-heads, somewhat like a greedy algorithm.
3.4 Graph Terminology
We use an undirected graph
with
edges and
snapshot of the wireless sensor network. Each node in
each edge in
nodes, to represent a
represents a mobile host, and
signifies that two hosts are within transmission range of each other.
The topology of
is the set of edges and nodes. Hence, when we say a node
movement changes the topology, we mean a change in the network that results in a
change in either
or . Specifically, an edge deletion occurs when two hosts lose
communication with each other, and an edge insertion occurs when two hosts move
140
into range of each other. A node deletion in isolation occurs when a host turns off its
power, and a node insertion in isolation occurs when a host turns on its power. By “in
isolation” we mean that no other change has occurred in the network. Because a node
insertion or deletion affects multiple edges, we process these changes to
as multiple
changes to . Finally, the most general node movement models the movement of a
host from one part of the network to another; hence, a node movement is a
combination of a node deletion from one part of
of
. The open neighborhood
transmission range of
and a node insertion in another part
of node
except for
itself. The closed neighborhood
includes , that is,
of
also
. With these definitions extended to subsets of
∈
, the open neighborhood of
neighborhood of
represents all hosts within
is
. The degree
neighborhood:
The maximum degree of
, and the closed
of v is the size of its open
is
∈
For
the purposes of analysis of overhead, we assume that a local broadcast takes
time (which is true if the MAC layer can schedule local broadcasts reliably). Given a
subgraph
of , the
–degree of
. The maximum degree of
is
, the number of ’s neighbors that are in
is denoted
. The diameter
of
is the
maximum number of edges contained in any simple path between two nodes in
The diameter of a subgraph
of
.
is denoted
We use an approximation to a minimum connected dominating set (MCDS). A
subset
is a dominating set if
. Let
be the subgraph induced by
is a connected dominating set if, in addition to
141
,
is
connected. Since finding an MCDS is an
-complete problem that is also hard to
approximate we present a distributed greedy MCDS approximation algorithm that is
similar to the algorithm in. The MCDS nodes are incidentally also the interior nodes
of a maximum leaf spanning tree.
We use the interior of this tree as the back bone. Thus, each node
dominator in
, denoted
spanning tree. The nodes of
.The set
∈
in
has a unique
is a maximum leaf
comprise the interior of this spanning tree, and the
edges of this spanning tree between nodes in
are called back bone edges. Wireless
sensor networks can be deployed for many application unlike wired networks or
cellular networks no physically backbone infrastructure is installed in wireless sensor
networks. A communication session is achieved either through a single hop if the
communication parties are close enough or through relating by intermediate nodes
otherwise. The topology of such wireless ad hoc network can be modeled as a unit
disk graph a geometric graph in which there is an edge between two nodes if and only
if there distance is at one unit as show in fig 3
Figure 3
142
Although a wireless sensor network has no physical backbone infrastructure a virtual
back bone can be formed by nodes in a connected dominating set of the corresponding
unit disk graph [6][7][8]. Such a virtual backbone plays a very important role in
routing, broadcasting, and connectivity managements in wireless sensor networks
3.4.1 Clustering Using Dominating Sets
A dominating set is a subset
of a graph
such that every vertex in
is either in
or adjacent to a vertex in
[12]. Dominating sets are widely used in clustering
networks [8]. Dominating sets can be classified into three main classes, Independent
Dominating Sets (IDS), Weakly Connected Dominating Sets (WCDS) and Connected
Dominating Sets (CDS) [13]
Independent Dominating Sets: IDS is a dominating set
of a graph
in which there
are no adjacent vertices.
Weakly Connected Dominating Sets (WCDS): A weakly induced sub graph
subset
of a graph
that contains the vertices of , their neighbors and all edges of
the original graph
with at least one endpoint in . A subset
dominating set, if
is dominating and
is a weakly-connected
is connected [14].
Connected Dominating Sets: A connected dominating set (CDS) is a subset
graph
such that
is a
forms a dominating set and
of a
is connected.
Clustering Using IDS: Baker and Ephremides [15] proposed an independent
dominating set algorithm called highest vertex ID. A very similar algorithm to the
highest id algorithm is the lowest id algorithm by Gerla and Tsai [16].”Gerla and
Tsai” developed another algorithm to find the independent dominating sets called the
143
highest degree algorithm. Although these algorithms are considered as important
algorithms, Chen et al. [17] proposed that these algorithms are not working correctly
for some graphs. To solve this incorrect operation, Chen et al developed the
-
distance independent dominating set algorithm.[18].
Clustering Using WCDS: Although independent dominating sets are suitable for
constructing optimum sized dominating sets, they have some deficiencies such as lack
of direct communication between cluster heads. In order to obtain the connectivity
between cluster heads, WCDSs can be used to construct clusters. A Dominating Set
Based Clustering Algorithm for Mobile Ad Hoc Networks 573. The WCDS was first
proposed for clustering in ad hoc networks by Chen and Liestman [19] called zonal
clustering.
Clustering Using CDS: CDS have many advantages in network applications such as
ease of broadcasting and constructing virtual backbones [20],however, when we try to
obtain a connected dominating set, we may have undesirable number of cluster heads.
So, in constructing connected dominating sets, our primary problem is to find a
minimal connected dominating set. Guha and Khuller [21] proposed two centralized
greedy algorithms for finding suboptimal connected dominating sets. Das and
Bharghavan [22] provided distributed implementations of Ghua and Khuller’s
algorithms [23]. Wu and Li [24] improved Das and Bhraghavan’s distributed
algorithm as a localized distributed algorithm for finding connected
and Ophir
Frieder [25] proposed a distributed algorithm for finding a CDS which constructs the
dominating set using the Maximal Independent Sets. Hui Liu, Yi Pan and Jiannong
Cao [26],”Improved Wu and Li’s algorithm” [27] by adding a third phase elimination.
144
In the additional third phase, the algorithm searches redundant cluster heads. A cluster
head is eliminated if it is dominated by two of its cluster head neighbors.
3.5 Caterpillar Graphs
A caterpillar graph
is a tree having a chordless path
, called the backbone
that contains at least one end point of every edge. Edges connecting the leaves with
the backbone are called hairs. In a complete caterpillar graph, each vertex of its
backbone has a nonempty set of hairs denoted by
with backbone
a complete caterpillar graph
.
Figure 4
We can use a simple graph
where
to represent an wireless sensor network,
represents a set of wireless mobile hosts and
edge between host pairs
represents a set of edges. An
indicates that both hosts
and
are within their
wireless transmitter ranges. To simplify our discussions, we assume all mobile hosts
are homogeneous i.e. their wireless transmitter ranges are the same. In other word, if
there is an edge
in E, it indicates
is within ’s range and
is within ’s
range. Thus the corresponding graph will be an undirected graph. The graph in fig3
represents the corresponding wireless sensor network.
145
Lemma 1 ([28]). If
is a chord less path with
vertices, then
≥
two
vertices
are twins in a graph if they have the same neighborhood. Jou et al [28] proved the
following properties.
Lemma 2. If
and
are twins in a graph
then
Lemma 3. If
is an induced subgraph of , then
Lemma 4. ([29]) For any two disjoint graphs
and
For each
of
,
) is the set of its
is an independent set but it
pendent vertices and
is not maximal in
Let
If same vertex of
belongs to a MIS then every vertex
) must belongs to it otherwise it is not maximal. As two vertices of
twins in
are
, we can construct them in to a single vertex, called hi, that represents
the whole set
. Let
be the construction group of
otherwise that is also a caterpillar graph with at most one pendent vertex at
each
the contraction graph of a complete caterpillar graph is also complete.
Here, we can deploy the wireless sensor nodes in the form of caterpillar graphs as
shown in the fig. 4.But our objective here is to retain the connected dominating set
from the caterpillar graphs. Because the nodes in the set of connected dominating set
are cluster heads which has many applications in wireless sensor networks.We are
using linear algorithm to retain connected dominating set (CDS).
146
3.6 Linear Algorithm
Efficient liner algorithm for the domination number of a tree designed by
Cockayne,S Goodman and S Hedetniemi Cock et al [30] proposed their “a liner
algorithm for finding the domination number
where
to three subsets
vertices and
consists of free vertices,
consists of bound
consists of required vertices. They have coined the one more term
called mixed domination
set in
is set of vertices
which contain all required
and which dominate all bound vertices i.e. every vertex
vertices i.e.
either in
of a tree”, Partitioning the tree in
or is adjacent to at least one vertex in
dominated by
but may be included in
mixed dominating set in
∈
is
. Free vertices need not be
in order to dominate bound vertices. The
such a set is called an
set of . Here we are applying
this algorithm on caterpillar graphs. Once we traced the algorithm on caterpillar graph
we get a a connected dominating set. Let us consider the algorithm.
Let the vertices of network
where
consists of free vertices,
be partitioned in to three subsets,
consists of bound vertices and
,
consist
required vertices. A mixed dominating set in G is set of vertices M which contains all
required vertices, i.e.
vertex
either in
not be dominated by
and which dominates all bound vertices, i.e. every
or is adjacent to at least one vertex in
but may be included in
The mixed domination number
set in ; such a set is called an
. Free vertices need
in order to dominate bound vertices.
is the minimum order of a mixed dominating
- set of .
147
The construction and correctness of the next algorithm is based on the following
theorem.
3.7 Theorem: [30] Let
be a tree having free, bound and required vertices
respectively. Let
be an end vertex of
which is adjacent to vertex .
Then
(i)
If
, then
(ii)
If
and
;
is the tree which results from deleting
as “required”, then
(iii)
If
and
(iv)
If
and
relabeling
Proof.(i) If
∈
;
, then
and if
is the tree which results from deleting
of
and
as “free”, then
, then since
is free it need not be dominated in mixed
dominating set of . Thus any mixed dominating set
dominating set of
and relabeling
i.e.
and let the free end vertex
also a mixed dominating set of
is mixed dominating set of
of
. Conversely, let
is also a mixed
be an
be a adjacent to vertex . Now if
On the other hand if
Thus in either case.
.
148
, the
then
set
is
(ii) The proof of this case, where the end vertex
must be dominated in any
case (i) i.e
if
is an
set of
which contains
which
is bound, is virtually identical to
- set of . In this case we can show that

then so is
. But this
–set
, i.e. there is an
must also be an
-set of
–set of
, in
is considered a required vertex.
(iii) The proof of this case is obvious and is omitted.
(iv) Let
be an
clearly,

Conversely let
– set of
is deleted and
is labeled ‘free’. Then
is a mixed dominating set of , i.e.
be an
consider two cases. If
similarly if
in
in which
- set of
is also in
then, since
. Since
, then
is free in
–
. In either case
conclude,
149
is required,
We need to
is mixed dominating set of
,
is also mixed dominating set
and with the previous inequality we
3.8 Algorithm DOMSET. To find a -Set, or
– Set, DOMSET, in a tree
T with free, bound and required vertices.
Step 0. [Initialize] Set DOMSET ← φ ;
Step 1. [Delete
← .
end vertices one at a time]
Do
Step 2. has a free end vertex
←
Step 3.set
adjacent to a vertex
–
Step 4. has a bound end vertex
Step 5.Relabel
as required;
←
Step 6.Set
adjacent to vertex
– .
Step7. has a required end vertex
←
Step 8.Set
Step 9.If
adjacent to a vertex
is bound then label
Step 10.Set
←
od
as free
–
Step11. [Process last vertex] If the last vertex
then
is not free
←
Grouping sensor nodes into clusters in order to achieve the network scalability
objective. Every cluster would have a leader often referred to as cluster head (CH).
Recently a number of clustering algorithm have been specifically designed for WSN.
These proposed clustering techniques widely vary depending on the node deployment.
In this algorithm we need to deploy sensors in the form of caterpillar graphs and
150
tracing the algorithm on caterpillar graphs finally it left with path which is itself a
connected dominating set and all the nodes in the connected dominating sets are
cluster heads (CH).A CH may also be just one of the sensors or a node that is richer in
resources. The cluster membership may be fixed or variable. In addition to supporting
network scalability. Clustering has numerous advantages It can localize the route set
up within the cluster and thus reduce the size of the routing table store at the
individual node.
3.9 Conclusion
We studied the problem of the design of wireless sensor networks from the point of
view of the caterpillar graphs retaining the connected dominating set (CDS) of
caterpillar graphs. The CDS is itself a cluster head of the sensor nodes. And we utilize
the exiting linear time algorithm for finding domination number of a tree. Applying
this algorithm systematically on caterpillar graphs we get a connected dominating set.
151
References
[1]J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and K. Pister, System
Architecture Directions for Networked Sensors, ASPLOS, November 2000.
[2]. J. Polastre, J. Hill and D. Culler, Versatile Low Power Media Access for Wireless
Sensor Networks,ACM SenSys, November 2004.
[3] G. Zhou, C. Huang, T. Yan, T. He and J. Stankovic, MMSN: Multi-Frequency
Media Access Control for Wireless Sensor Networks, Infocom, April 2006.
[4] T. He, J. Stankovic, C. Lu and T. Abdelzaher, A Spatiotemporal Communication
Protocol for Wireless Sensor Networks, IEEE Transactions on Parallel and
Distributed Systems, to appear
[5] T. He, J. Stankovic, C. Lu and T. Abdelzaher, A Spatiotemporal Communication
Protocol for Wireless
Sensor Networks, IEEE Transactions on Parallel and
Distributed Systems, to appear.
[6] J. Liu, M. Chu, J.J. Liu, J. Reich and F. Zhao, State-centric Programming for
Sensor and Actuator Network Systems, IEEE Pervasive Computing, October 2003.
[7]” B. Karp and H. T. Kung, GPSR: Greedy Perimeter Stateless Routing for Wireless
Sensor Networks,IEEE Mobicom, August 2000. ”
[8]
A. Perrig, R. Szewczyk, J. Tygar, V.Wen, and D. Culler, SPINS: Security
Protocols for Sensor Networks,ACM Journal of Wireless Networks, September 2002.
[9] C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed diffusion: A scalable
and robustcommunication paradigm for sensor networks. In Proceedings of the 6th
Annual International Conference on Mobile Computing and Networking, pages 56–
67, ACM Press,2000.
152
[10] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva. Directed
diffusion
for
wireless
sensor
networking.
IEEE/ACM
Transactions
on
Networking,11(1):2–16, 2003.
[11] J. Agre and L. Clare. An integrated architecture for cooperative sensing
networks. IEEE Computer, pages 106–108, May 2000..
[12]. West, D. : Introduction to Graph Theory, Second edition, Prentice Hall, Upper
Saddle River, N.J., (2001).
[13] Haynes, T., W., Hedetniemi, S., T. and Slater, P., J. : Domination in
Graphs,Advanced Topics, Marcel Dekker, Inc., (1998).
[14] Chen, Y., Z., P., Liestman, A., L. and Jiangchuan, L. : Clustering Algorithms for
Ad Hoc Wireless Networks, Nova Science Publishers, (2004).
[15] Baker, D. and Ephremides, A. : The Architectural Organization of a Mobile
Radio Network via a Distributed Algorithm, Communications, IEEE Transactions,
(1981), 29(11), 1694-1701.
[16]
Gerla, M. and Jack T., C., T. : Multicluster, Mobile, Multimedia Radio
Network,Wireless Networks, 1(3), (1995), 255-265.
[17] Chen, G., Nocetti, F.,G., Gonzalez and J.S., Stojmenovic, I. : Connectivity Based
K-Hop Clustering in Wireless Networks, System Sciences, Proc. of the 35th Annual
Hawaii International Conference, (2002), 2450-2459.
[18] Ohta, T., Inoue, S. and Kakuda, Y. : An Adaptive Multihop Clustering Scheme
for Highly Mobile Ad Hoc Networks, Proc. of 6th ISADS’03, (2003).
153
[19] Chen, Y., P. and Liestman, A., L. : A Zonal Algorithm for Clustering Ad Hoc
Networks, International Journal of Foundations of Computer Science, (2003),
14(2),305-322.
[20] Stojmenovic, I., Seddigh M. and Zunic, J. : Dominating Sets and Neighbor
Elimination-Based
Broadcasting
Algorithms
in
Wireless
Networks,
IEEE
Transactions on Parallel and Distributed Systems, (2002), 13, 14-25. ”
[21] Guha S. and Khuller, S. : Approximation Algorithms for Connected Dominating
Sets, Springer Verlag New York, LLC, ISSN: 0178-4617, (1998).
[22] Das, B. and Bharghavan, V. : Routing in Ad-Hoc Networks Using Minimum
Connected Dominating Sets, Communications, ICC97 Montreal, ’Towards the
Knowledge Millennium’, IEEE International Conference, (1997), 1, 376-380
[23]. Wu and Li [14],” Wu, J. and Li, H. : A Dominating-Set-Based Routing Scheme
in Ad Hoc Wireless Networks, Springer Science Business Media B.V., Formerly
Kluwer Academic Publishers B.V. ISSN: 1018-4864, (2001).
[24] Wu, J. and Li, H. : A Dominating-Set-Based Routing Scheme in Ad Hoc
Wireless Networks, Springer Science+Business Media B.V., Formerly Kluwer
Academic Publishers B.V. ISSN: 1018-4864, (2001).
[25] Wan, P., J., Alzoubi, K., M. and Frieder, O. : Distributed Construction of
Connected Dominating Set in Wireless Ad Hoc Networks, Springer Science+Business
Media B.V., Formerly Kluwer Academic Publishers B.V., , (2002), 9(2), 141-149
[26], “Liu, H., Pan, Y. and Cao, J. : An Improved Distributed Algorithm for
Connected Dominating Sets in Wireless Ad Hoc Networks, Parallel and Distributed
Processing and Applications, Proc. of the ISPA 2004, (2004), 340.
154
[27]Liu, H., Pan, Y. and Cao, J. : An Improved Distributed Algorithm for Connected
Dominating Sets in Wireless Ad Hoc Networks, Parallel and Distributed Processing
and Applications, Proc. of the ISPA 2004, (2004), 340.
[28] J.Liu, Maximal Independent Sets in Bipartite Graphs, Journal of Graph Theory
17(1993)495-507.
[29]M Hujter, Z. Tuza, The Number of Maximal Independent Sets In Triangle – Free
Graph, SIAM Journal on Discrete Mathematics 6(1993)284-288.
[30] E Cockayne,S. Goodman, and S.Hedetniemi, A Linear Algorithm for the
Domination Number of A Tree Volume 4,number 2 ,1975
155