Joint monitoring and routing in wireless sensor networks using robust identifying codes

Wireless Sensor Networks (WSNs) provide an important means of monitoring the physical world, but their limitations present challenges to fundamental network services such as routing. In this work we utilize an abstraction of WSNs based on the theory of identifying codes. This abstraction has been useful in recent literature for a number of important monitoring problems, such as localization and contamination detection. In our case, we use it to provide a joint infrastructure for efficient and robust monitoring and routing in WSNs. Specifically, we provide an efficient and distributed algorithm for generating robust identifying codes with a logarithmic performance guarantee based on a novel reduction to the set k-multicover problem; to the best of our knowledge, this is the first such guarantee for the robust identifying codes problem, which is known to be NP-hard. We also show how this same identifying-code infrastructure provides a natural labeling that can be used for near-optimal routing with very small routing tables. We provide experimental results for various topologies that illustrate the superior performance of our approximation algorithms over previous identifying code heuristics.

[1]  Jie Wu,et al.  Dominating-set-based routing in ad hoc wireless networks , 2002 .

[2]  Danny Raz,et al.  Global optimization using local information with applications to flow control , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[3]  David S. Johnson,et al.  Approximation algorithms for combinatorial problems , 1973, STOC.

[4]  David Starobinski,et al.  Robust location detection with sensor networks , 2004, IEEE Journal on Selected Areas in Communications.

[5]  Alan M. Frieze,et al.  Identifying codes in random networks , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[6]  Mark G. Karpovsky,et al.  On robust and dynamic identifying codes , 2006, IEEE Transactions on Information Theory.

[7]  Cyril Gavoille,et al.  A survey on interval routing , 2000, Theor. Comput. Sci..

[8]  Antoine Lobstein,et al.  Minimizing the size of an identifying or locating-dominating code in a graph is NP-hard , 2003, Theor. Comput. Sci..

[9]  Mikkel Thorup,et al.  Compact routing schemes , 2001, SPAA '01.

[10]  Ari Trachtenberg,et al.  Disjoint identifying-codes for arbitrary graphs , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[11]  Ittai Abraham,et al.  Compact routing on euclidian metrics , 2004, PODC '04.

[12]  Sylvain Gravier,et al.  Construction of Codes Identifying Sets of Vertices , 2005, Electron. J. Comb..

[13]  Antoine Lobstein,et al.  Identifying and locating-dominating codes: NP-Completeness results for directed graphs , 2002, IEEE Trans. Inf. Theory.

[14]  Eli Upfal,et al.  A trade-off between space and efficiency for routing tables , 1989, JACM.

[15]  Vijay V. Vazirani,et al.  Primal-Dual RNC Approximation Algorithms for Set Cover and Covering Integer Programs , 1999, SIAM J. Comput..

[16]  Deborah Estrin,et al.  A wireless sensor network For structural monitoring , 2004, SenSys '04.

[17]  Jie Wu,et al.  A Dominating-Set-Based Routing Scheme in Ad Hoc Wireless Networks , 2001, Telecommun. Syst..

[18]  M. Laifenfeld,et al.  Localization and identification in networks using robust identifying codes , 2008, 2008 Information Theory and Applications Workshop.

[19]  Wei Hong,et al.  A macroscope in the redwoods , 2005, SenSys '05.

[20]  Ari Trachtenberg,et al.  Identifying Codes and Covering Problems , 2008, IEEE Transactions on Information Theory.

[21]  Arthur L. Liestman,et al.  CLUSTERING ALGORITHMS FOR AD HOC WIRELESS NETWORKS , 2004 .

[22]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[23]  Mark G. Karpovsky,et al.  On a New Class of Codes for Identifying Vertices in Graphs , 1998, IEEE Trans. Inf. Theory.

[24]  Cheng-Shong Wu,et al.  Novel optimal real‐time admission control and buffer management for the Video‐On‐Demand (VOD) service , 2000, Telecommun. Syst..

[25]  Lenore Cowen,et al.  Compact routing with minimum stretch , 1999, SODA '99.

[26]  Francesco De Pellegrini,et al.  Robust location detection in emergency sensor networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[27]  Julien Moncel,et al.  On graphs on n vertices having an identifying code of cardinality [log2(n+1)] , 2006, Discret. Appl. Math..

[28]  P.H.J. Chong,et al.  A survey of clustering schemes for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[29]  Xiuzhen Cheng,et al.  Connected Dominating Set in Sensor Networks and MANETs , 2004 .

[30]  William E. Hart,et al.  Discrete sensor placement problems in distribution networks , 2005, Math. Comput. Model..

[31]  Roger Wattenhofer,et al.  Constant Time Distributed Dominating Set Approximation , 2022 .

[32]  Vijay V. Vazirani,et al.  Approximation Algorithms , 2001, Springer Berlin Heidelberg.

[33]  Yong Wang,et al.  Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.