Professional Documents
Culture Documents
Construction of Minimum Connected Dominating Set in
Construction of Minimum Connected Dominating Set in
Ad Hoc Networks
journal homepage: www.elsevier.com/locate/adhoc
a r t i c l e i n f o a b s t r a c t
Article history: In a wireless network, messages need to be sent on in an optimized way to preserve the
Received 11 June 2015 energy of the network. A minimum connected dominating set (MCDS) offers an optimized
Revised 31 January 2016
way of sending messages. However, MCDS construction is a NP-Hard problem. In this pa-
Accepted 1 February 2016
per, we propose a new degree-based greedy approximation algorithm named as Connected
Available online xxx
Pseudo Dominating Set Using 2 Hop Information (CPDS2HI), which reduces the CDS size
Keywords: as much as possible. Our method first constructs the CDS and then reduces its size further
Connected Dominating Set (CDS) by excluding some of the CDS nodes cleverly without any loss in coverage or connectivity.
Maximal independent set (MIS) The simulation results show that our method outperforms existing CDS construction algo-
Wireless sensor networks rithms in terms of both the CDS size and construction cost. CPDS2HI retains the current
Unit disk graph (UDG) best performance ratio of (4.8 + ln 5 )|opt | + 1.2, |opt| being the size of an optimal CDS of
Steiner Tree the network, and has the best time complexity of O(D), where D is the network diameter.
To the best of our knowledge this is the most time efficient and size-optimal CDS con-
struction algorithm. It has a linear message complexity of O(n), where n is the network
size and is the maximum degree of all the nodes.
© 2016 Elsevier B.V. All rights reserved.
http://dx.doi.org/10.1016/j.adhoc.2016.02.003
1570-8705/© 2016 Elsevier B.V. All rights reserved.
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
29 virtual backbone. In this article, we mainly focus on con- as Connected Pseudo Dominating Set Using 2-Hop 90
30 structing a size optimal Connected Dominating Set (CDS) Information (CPDS2HI) to construct smaller CDSs. The pre- 91
31 as a virtual backbone of the network. A CDS is more par- liminary version of our technique is described in [7]. Our 92
32 ticularly used as a data aggregation backbone in remote scheme CPDS2HI works in three phases. In the first phase, 93
33 data gathering applications to optimize network commu- a smaller maximal independent set (MIS), designated as a 94
34 nication, which in turn saves communication energy and pseudo-dominating set (PDS) is constructed. The dominat- 95
35 extends the network lifetime [2]. ing set is pseudo dominating set because some of the ele- 96
36 A Dominating Set of a network is a subset of nodes ments may be omitted in the final dominating set. The sec- 97
37 such that any node not in the subset is a neighbour of ond phase of our algorithm constructs an improved Steiner 98
38 some element of that subset. It forms a Connected Dom- Tree which interconnects the PDS nodes in an improved 99
39 inating Set, if the subgraph induced by this set is con- way. In the final phase, some of the selected PDS nodes are 100
40 nected. In a wireless network, as there is no fixed infras- excluded cleverly to reduce the CDS size further without 101
41 tructure and centralized management, a CDS can be used any connectivity or coverage loss. Through simulation we 102
42 as a virtual backbone or spine for efficient routing and also show that our proposed algorithm CPDS2HI, outper- 103
43 connectivity management in such networks [3]. The CDS forms all the existing CDS construction algorithms in terms 104
44 can receive a packet from any node in the network and of CDS size and construction costs. CPDS2HI retains the 105
45 can retransmit it to any other remote node. A node, which current best performance ratio of (4.8 + ln 5 )|opt | + 1.2, 106
46 is not in the CDS can send a message to any other node |opt| being the size of an optimal CDS of the network, and 107
47 through the CDS nodes. It first sends its message to one has the best time complexity of O(D), where D is the net- 108
48 of its neighbouring CDS nodes. Now, the search space for work diameter. To the best of our knowledge this is the 109
49 any route is reduced to the CDS. If the destination node most time efficient and size-optimal CDS construction al- 110
50 is within the CDS it can get the message directly, oth- gorithm. It also has a linear message complexity of O(n), 111
51 erwise it gets the message from one of its neighbouring where n is the network size and is the maximum degree 112
52 CDS nodes. Thus, during routing, broadcasting responsibil- of all the nodes. 113
53 ity lies only with the CDS nodes, instead of all the nodes One concern of using CDS as virtual backbone is the 114
54 in the network. As only the CDS nodes maintain routing in- nodes present in the CDS face the problem of early exhaus- 115
55 formation, we can save the storage space by reducing the tion of their battery life. To avoid this situation we need to 116
56 CDS size. A small sized CDS makes the routing easier, re- rotate the CDS periodically. So the proposed CDS construc- 117
57 duces the communication overhead, increases the conver- tion algorithm can be used in conjunction with CDS rota- 118
58 gence speed and simplifies connectivity management. So, it tion algorithms [5]. A customised rotation algorithm might 119
59 is desirable to construct a minimum connected dominating work better than a general one. However, evaluation of ro- 120
60 set (MCDS) of the network. However, computing MCDS is tation schemes and possible development of a customised 121
61 an NP-complete problem [4]. So, only polynomial time ap- rotation scheme is beyond the scope of the current work. 122
62 proximation algorithms are practical for finding out MCDS The rest of the article is organized as follows. Section 2 123
63 in wireless networks. For energy constrained wireless net- provides some preliminary definitions. In Section 3, we 124
64 works, an approximation algorithm should not only con- discuss related works on CDS construction. Section 4 lists 125
65 struct thinner CDSs, but also construct CDSs with low com- the motivation behind this work and its contributions. 126
66 putation and communication costs. Generally, the quality Section 5 explains our algorithm in detail. Section 6 pro- 127
67 of the CDS is measured by its approximation factor, which vides the analysis of our algorithm. Supporting simulation 128
68 is the ratio of its size to that of the MCDS. The construc- results are given in Section 7. Our conclusions are finally 129
69 tion cost is measured by overall message and time com- presented in Section 8. 130
70 plexities. The computation time of the CDS should also be
71 appreciably small in order to schedule speedy switches be-
72 tween disjoint CDSs to extend battery lifetime and opti- 2. Background 131
75 implemented in a distributed fashion, with the tradeoff of are relevant to our work. 133
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
146 made larger (i.e adding any other node would result in the the spanning tree, each node in the tree is labelled as ei- 203
147 set containing some adjacent nodes). ther a dominator or a dominatee. For UDGs, the algorithm 204
has an approximation factor of 8|opt | + 1, time complexity 205
148 Definition 2.4 (UNIT DISK GRAPH). A unit disk graph of O(n) and message complexity of O(nlog n), where |opt| 206
149 (UDG) is the intersection graph of a family of unit disks being the size of an optimal CDS in the network. Later, 207
150 (unit radii) in the Euclidean plane. It provides a graph the- the approximation factor was improved to 8|opt| by Cardei 208
151 oretic model for broadcast networks. Nodes in the network in [15]. Cardei’s distributed algorithm grows from a sin- 209
152 form the vertices of graph. Each vertex is at the centre of a gle leader and uses 1-hop connectivity information with 210
153 unit disk. An edge exists between two vertices u and v, if degree-based heuristics and degree aware optimization for 211
154 and only if the euclidean distance between u and v is less identifying Steiner nodes as connectors in the CDS con- 212
155 than one unit. The unit is chosen to represent the maxi- struction. The algorithm has O(n) message complexity and 213
156 mum communication distance of a node. O(n) time complexity. Alzoubi’s multiple leaders based 214
distributed approach [12] first constructs an MIS by com- 215
157 Definition 2.5 (STEINER TREE). A Steiner Tree in a graph
paring node IDs within a 1-hop neighbourhood without 216
158 G(V, E) for a given subset of vertices (terminals) I⊆V, is a
spanning a tree or selecting a leader. In the next phase, 217
159 tree interconnecting (known as tapping) all the terminals
the MIS nodes are interconnected to form a CDS. The al- 218
160 in I using a set of Steiner nodes in {V − I}.
gorithm has an approximation factor of 192|opt | + 48. In a 219
similar work [16], the authors reported a distributed algo- 220
161 3. Related work rithm with a performance ratio of 172. 221
Among all the approximation algorithms for distributed 222
162 The idea to use the CDS as a virtual backbone for rout- CDS construction in UDGs, Li’s S-MIS algorithm [17] and 223
163 ing was first proposed by Ephermides in 1987 [8]. Since Misra’s collaborative cover heuristic [18] achieve the best 224
164 then many algorithms using CDS construction have been approximation factor of (4.8 + ln5 )|opt | + 1.2. Both these 225
165 reported. The various approaches found in the literature on algorithms, first construct an MIS and then tap the MIS 226
166 the CDS construction problem can be classified as central- nodes through a Steiner Tree construction. The collabora- 227
167 ized algorithms, localized algorithms and distributed algo- tive cover heuristic [18] constructs the MIS using effective 228
168 rithms based on the network information they use. coverage as a metric. However, it has a high message com- 229
169 In 1998, Guha and Khullar [9] first proposed two cen- plexity of O(n2 ) and time complexity of O(n). Du et al. in 230
170 tralized greedy algorithms for CDS construction in general [19] proposed a polynomial-time constant approximation 231
171 graphs having approximation ratio of O(ln ), being the algorithm that leads to a CDS with bounded CDS size and 232
172 maximum degree of a node in the graph. The centralized guaranteed routing cost in terms of routing path length. 233
173 algorithms reported in [3,9] need global information of the In the CDS constructed by their algorithm, for each pair of 234
174 complete network, which makes them unsuitable for wire- vertices u and v there exists a routing path of maximum 235
175 less networks as there is no centralized control in a wire- length of seven times the shortest path between u and v. 236
176 less network. The algorithm produces the CDS of size less than or equal 237
177 Adjih [10] reported a localized algorithm for CDS con- to 148|opt | + 208 which is very high in comparison to col- 238
178 struction based on multipoint relays (MPR). However, to laborative cover [18]. 239
179 date no approximation analysis of that algorithm is known. Neiberg and Hurink [20] developed a local algorithm 240
180 Based on the MPR approach, several extensions have been where any vertex in the network itself decides whether or 241
181 reported, leading to localized MPR based CDS construction. not it is part of the dominating set depending only on the 242
182 However, the localized approaches provided in [10] are not vertices which are a constant number of hops away from 243
183 highly effective without an approximation factor to ensure it. Their polynomial time approximation scheme (PTAS) 244
184 an upper bound on CDS size. presents a theoretical method for computing a dominat- 245
185 The distributed approach is most widely used for CDS ing set of a connected UDG without the geometric em- 246
186 construction. Wu and Li [11] proposed a distributed CDS bedding of the graph in polynomial time with 1 + ap- 247
187 construction algorithm in which they first construct a triv- proximation ( > 0). The processing time of a vertex 248
188 ial CDS and then delete the redundant nodes based on two is bounded by a polynomial in the number of vertices 249
189 sets of pruning rules. The algorithm requires each node to present in its locality (i.e. the radius of the area that needs 250
190 have knowledge of its 2-hop neighbourhood. The perfor- to be explored). The better the approximation (smaller 251
191 mance ratio of Wu and Li’s algorithm as reported in [12] ) required, the larger will be the locality distance. This 252
192 is O(n), n being the network size. The performance ratio of in turn implies that the processing time for each ver- 253
193 distributed algorithms reported by Stojmenovic and Zunic tex increases and that the network messages may prop- 254
194 in [13] is also O(n), while that of Das and Bharghavan [3] agate uncontrollably far. Furthermore, the work also in- 255
195 is O(log n). None of these algorithms guarantee to gener- cludes the concept of a 2-separated collection. It empha- 256
196 ate a CDS of small size and also incur high message and sizes the fact that cardinality of the dominating set can be 257
197 time complexities. Most of the recent distributed CDS con- reduced if the topology is divided into local 2-separated 258
198 struction algorithms construct the CDS by first selecting collections, each separated from its nearest collection by 259
199 an MIS and then connecting the nodes in the MIS. Wan two intermediate hops. Our approach develops this con- 260
200 in [14] gave an ID based two phase single leader initiated cept and also investigates the trade-off required between 261
201 distributed algorithm to construct a CDS tree rooted at the the approximation ratio and the locality that needs to be 262
202 leader. They use a spanning tree. After the construction of surveyed. 263
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
Fig. 4. CDS formed by the black dominators and blue connectors selec-
simulation results. Besides this locality distance of two 439
tively discarding grey virtual-dominators. hops in our algorithm is sufficient to divide the connected 440
graph into 2-separated independent dominating sets (i.e. 441
neighbouring local smaller MISs separated from each other 442
12
by two intermediate hops). If we reduce the locality dis- 443
MIS by Collaborative Cover
tance further, then this will result in 1-separated local 444
PDS by CPDS2HI
11 MISs that will increase the approximation ratio. 445
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
Algorithm 2 Improved Steiner Tree Construction. dominatees covered by it can be covered by some other 496
dominators/connectors and its removal does not discon- 497
Input: A connected graph G(V, E ) with its PDS formed by
nect the CDS nodes. The CDS after discarding the redun- 498
black and grey nodes.
dant dominator(s) / virtual-dominator(s) still covers the 499
Output: CDS of the graph G(V, E ) formed by black, grey
entire network, as the downgraded nodes are covered by 500
and blue nodes.
their adjacent connectors. Based on this, we formulate our 501
1: All (black) dominators and (grey) virtual-dominators approach for the third phase in Algorithm 3. At the end of
form separate components (as isolated vertices).
2: Dominatees which are adjacent to the same component Algorithm 3 Removal of redundant dominators.
are rival dominatees. Input: A connected graph G(V, E ) with its CDS formed by
3: for all white dominatees u ∈ V − P DS do black, grey and blue nodes.
4: connection-load of u ← Number of independent com- Output: A probable smaller CDS of the graph G(V, E )
ponents adjacent to u. formed by black and blue nodes.
5: end for
6: i←1 1: for all (grey) virtual-dominators w ∈ V D do
7: repeat 2: if w is connected to the CDS by one connector or by
8: Roundi ← φ exactly two connectors that areadjacent to each other
9: for all white dominatees u ∈ V − P DS do then
10: if u satisfies any one of the following three condi- 3: C DS ← C DS − {w} {Omit virtual-dominator}
tions: 4: Change the color of w from grey to white
5: else
(i) Vertex u has a connection-load strictly higher than 6: Change the color of w from grey to black
each of its rival dominatees. 7: end if
(ii) The white rival dominatees of u has a connection- 8: end for
load lower than or sameas that of u, but u has 9: for all (black) dominators w ∈ D do
higher nodal degree than the rival dominatees with- 10: if All the dominatees of w are connected to some
the same connection-load other dominators/connectors then
(iii) None of the white rival dominatees of u has a 11: if w is connected to the CDS by one connector
connection-load higher thanthat of u and there ex- or by exactly two connectors that areadjacent to each
ists rival dominatees that have the same connection- other then
load and nodal degree as that of u, but u has the 12: C DS ← C DS − {w} {Omit dominator}
least node ID among them. 13: Change the color of w from black to white
then 14: end if
11: Add u to Roundi 15: end if
{u is selected as a connector from its white rival domina- 16: end for
tees in the ith round} 502
12: end if this phase, the CDS is the subgraph formed by the union 503
13: end for of the remaining black and blue nodes. All the other nodes 504
{Roundi contains connector(s) selected as Steiner nodes at are white. 505
the ith round} After getting the initial CDS shown in Fig. 4, we can re- 506
14: for all connectors v ∈ Roundi do duce the size of it by downgrading the virtual-dominator 6 507
15: Make connector v and the separate components, as it is connected to two connectors 7 & 8 which are ad- 508
that v connects, a single component. jacent. Therefore, node 6 is discarded from the CDS. The 509
16: Change color of v from white to blue nodes 4, 7, 8 and 10 form a CDS of size 4 even without 510
17: end for virtual-dominator 6. The CDS size obtained from collabora- 511
18: i←i+1 tive cover heuristic [18] for the same graph shown in Fig. 4 512
19: Update the connection-load of each of the remaining will be 5 or 7 depending on the choice of the leader to ini- 513
white nodes (if any). tiate the construction. 514
20: until all dominators and virtual-dominators in PDS are
in the same component 5.4. Working example 515
21: CDS ← connected component so formed with black,
grey and blue nodes In this subsection, we illustrate the complete working 516
{PDS nodes are joined to form a single component} procedure of our centralized algorithm CPDS2HI through a 517
network shown in Fig. 6(a). The nodes in the network are 518
randomly positioned. An edge between a pair of node indi- 519
cates that the nodes are within their communication range. 520
491 CDS is still connected and covers all the nodes of the net- Assume that the color of each node is white, each node’s 521
492 work. We know already a virtual-dominator does not cover 1-hop and 2-hop neighbours information is known. The 522
493 any uncovered node, so we can omit virtual-dominators step wise construction of PDS is shown in the Fig. 6(b)– 523
494 from the CDS if its removal does not disconnect the CDS (e). In the first round of this phase, node 1 becomes the 524
495 nodes. We can also omit a dominator from the CDS if the dominator and 23, 24 becomes virtual-dominators. Nodes 525
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
Lemma 6.1. All black and grey nodes resulting from PDS con- 549
struction (steps of Algorithm 1) forms an MIS. 550
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
582 the CDS by one connector. In this case w can be a domi- Since PDS is an MIS, it follows from Lemmas 6.5 and 6.6 635
583 natee because the connector can dominate it. (2) w is con- that: 636
584 nected to the CDS by two connectors and they are adja- |CDS| ≤ 3.8|opt | + 1.2 + (1 + ln 5 )|opt |
585 cent. In this case by removing w from the CDS does not
586 disconnect the CDS.
= (4.8 + ln 5 )|opt | + 1.2
587 The algorithm also removes some of the dominators Thus we conclude that the performance ratio of CPDS2HI 637
588 whose dominatees are connected to some other domina- is (4.8 + ln 5 )|opt | + 1.2. 638
589 tors or connectors. Let s be a dominator whose dominatees
Theorem 6.8. CPDS2HI has time complexity of O(D) time 639
590 are connected to some other dominators or connectors. So
and O(D) rounds, where D is the network diameter. 640
591 if s is connected to the CDS by one connector or s is con-
592 nected to the CDS by two connectors and they are adjacent Proof. In our PDS construction algorithm, multiple dom- 641
593 then similar to the above argument (for virtual dominator inators may be selected simultaneously. Each dominator 642
594 w) we know that s can be removed from the CDS without is chosen from its local 2-hop neighbourhood and all its 643
595 disconnecting the CDS. adjacent nodes become dominatees. Then the search for 644
next set of dominators, from the remaining white nodes 645
596 Theorem 6.4. Given a network, CPDS2HI determines the cor- in the locality, commences in the subsequent rounds. The 646
597 responding CDS in finite time. worst case time for the PDS construction is the maximum 647
time required to select the largest stretch of dominators 648
598 Proof. In Lemma 6.1 we proved that Algorithm 1 con-
and virtual-dominators, where each member is selected 649
599 structs an MIS. In each round of Algorithm 1, a posi-
one after another because the former choice of the dom- 650
600 tive number of nodes are removed from consideration, so
inator influences the choice of the next dominator. In the 651
601 the number of rounds is bounded. The process terminates
worst case, this longest stretch of dominators and virtual- 652
602 when all the remaining nodes have degree zero (and be-
dominators can exist along the network diameter, which is 653
603 come virtual dominators).
largest of all the shortest distances of the farthest nodes 654
604 Algorithm 2 starts with a PDS which is a dominat-
from the first set of chosen dominators. In the worst case 655
605 ing set of nodes (each considered as a separate compo-
as discussed, the number of rounds is at most O(D). There- 656
606 nent). Adding a positive number of connector nodes in
fore, the time complexity for PDS construction is O(D) time 657
607 each round preserves the dominating set property, strictly
and O(D) rounds. However, as multiple dominators can be 658
608 increases the size of one or more components so the num-
selected in each round, the average time complexity of this 659
609 ber of rounds is bounded. The connectors added may also
phase is much lower than O(D). 660
610 reduce the number of components, and since the origi-
In the Steiner Tree construction, multiple Steiner nodes 661
611 nal graph is connected, the process must terminate with a
are selected simultaneously. Each connector is selected to 662
612 dominating set forming a single component (hence a CDS).
connect the components surrounding it. By similar argu- 663
613 In phase 3, any virtual dominator or dominator re-
ment, Steiner Tree construction will also require O(D) time 664
614 moved from the CDS is chosen in such a way that the re-
and O(D) rounds. Finally, to remove the redundant dom- 665
615 duced CDS remains both connected and a dominating set.
inating nodes, each PDS nodes is checked once whether 666
616 All the virtual dominators and the dominators are consid-
to be removed or not from the PDS. So only one round 667
617 ered for downgradation to dominatee one at a time. As
is needed for this. Hence, the proposed algorithm has an 668
618 there are finite number of virtual dominators and domi-
overall time complexity of O(D) time and O(D) rounds. 669
619 nators, so it will take finite time.
Theorem 6.9. CPDS2HI has message complexity of O(n), 670
620 Lemma 6.5. In any unit disk graph, the size of every MIS is where n is the network size and is the maximum degree 671
621 upper-bounded by 3.8|opt | + 1.2, where |opt| is the size of of all the nodes. 672
622 the MCDS in this unit disk graph.
Proof. As CPDS2HI is a centralized algorithm it needs the 673
623 Proof. From the result reported in [27]. neighbourhood information of each node. At the sink node 674
(one node is chosen as the sink node) the consolidated 675
624 Lemma 6.6. The size of Steiner nodes obtained from CPDS2HI neighbourhood information of all the nodes is required. To 676
625 is at most (1 + ln 5 )|opt |, where |opt| is the size of any opti- construct the CDS of the entire network we run the Algo- 677
626 mal CDS. rithms 1–3 at the sink node. To find the neighbourhood 678
information of the whole network, each node should send 679
627 Proof. The proof follows directly from Theorem 2 of
a message (let it is Hello message) to its neighbours to no- 680
628 [17].
tify its presence. After getting the Hello messages from its 681
629 Theorem 6.7. CPDS2HI produces a CDS with size bounded by neighbours each node can construct the adjacency matrix. 682
630 (4.8 + ln 5 )|opt | + 1.2, where |opt| is the size of the MCDS. and send it to its neighbours. When a node gets the Adja- 683
cency matrix from its neighbour it updates the Adjacency 684
631 Proof. CPDS2HI in its first phase constructs the PDS as an matrix with it. If it finds any changes in it then it should 685
632 MIS. In the second phase it obtains the Steiner nodes. In send the updated Adjacency Matrix to its neighbours again. 686
633 the last phase it removes the redundant dominating nodes. By following this technique the sink node will get the fi- 687
634 Therefore, we have, nal Adjacency Matrix. In this process each node sends one 688
Hello message and a maximum of O() Adjacency Matri- 689
|CDS| ≤ |PDS| + |Steiner nodes| ces. So the total message complexity is O(n). 690
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
0.95 753
CDS size for the networks of sizes 20, 40, 60, 80 and 100. 754
The result shown in Fig. 11 demonstrates that CPDS2HI 755
outperforms the dominating tree construction technique 756
0.9 [14], 8-approximate CDS algorithm [15], S-MIS approach 757
[17], collaborative cover heuristic [18] and GOC-MCDS-D 758
[19] in identifying a smaller size CDS. The result shows 759
0.85 that our approach reduces the CDS size by 16% compared 760
to the previous best collaborative cover heuristic. Fur- 761
thermore, the S-MIS [17] algorithm involving Steiner Tree 762
construction and the degree-based 8-approximate CDS 763
50 100 150 200 250
algorithm [15] result in 29% and 34% higher CDS sizes re- 764
Network Size
spectively, when compared with CPDS2HI. Our proposed 765
Fig. 8. Ratio of ignored virtual-dominators to total virtual-dominators in algorithm is able to construct the smaller CDS because of 766
pseudo-dominating set for different network sizes. the tricks in Phases 2 and 3. In Phase 2, it constructs the 767
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
16
No. of rounds
20
14
12 15
10 10
50 100 150 200 250 50 100 150 200 250
Network Size No. of nodes
Fig. 9. Reduction in CDS size after discarding redundant dominators and Fig. 12. Performance comparison of number of rounds in CDS construc-
virtual-dominators post-Steiner Tree construction for different network tion.
sizes.
1
Collaborative Cover Steiner Tree by including the nodes which can connect 768
No of Steiner nodes/No of independent nodes
Network Size gorithms that first forms an MIS by different techniques 784
with the same trait that each MIS node is separated from 785
Fig. 10. Performance comparison of CDS construction algorithms. its nearest MIS node by exactly two hops, followed by 786
greedily interconnecting the MIS nodes. The dominating 787
Collaborative Cover tree construction technique [14], S-MIS approach [17] and 788
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
807 another important conclusion from this figure. The slope [9] S. Guha, S. Khuller, Approximation algorithms for connected domi- 866
808 of the curve representing CPDS2HI is significantly smaller nating sets, Algorithmica 20(4) (1998) 374–387. 867
[10] P.J.C. Adjih, L. Viennot, Computing connected dominated sets with 868
809 than that for 8-approximate CDS. This implies that as the multipoint relays, Ad Hoc Sens. Wirel. Netw. 9 (2005) 43. 869
810 network size increases, the corresponding increment in [11] J. Wu, H. Li, On calculating connected dominating set for efficient 870
811 the number of rounds is appreciably smaller for CPDS2HI routing in ad hoc wireless networks, in: Proceedings of the 3rd In- 871
ternational Workshop on Discrete Algorithms and Methods for Mo- 872
812 than other CDS construction techniques. bile Computing and Communications, ACM, 1999, pp. 7–14. 873
[12] P.J.W.K.M. Alzoubi, O. Frieder, Message-optimal connected dominat- 874
813 8. Conclusion ing sets in mobile ad hoc networks, in: Proceedings of the 3rd ACM 875
International Symposium on Mobile Ad Hoc Networking & Comput- 876
ing, ACM, 2002, pp. 157–164. 877
814 In this work, we study different approaches of con- [13] M.S.I. Stojmenovic, J. Zunic, Dominating sets and neighbour 878
815 structing a CDS in the wireless networks. We propose a elimination-based broadcasting algorithms in wireless networks, 879
IEEE Trans. Parallel Distrib. Syst. 13(1) (2002) 14–25. 880
816 new centralized degree-based greedy approximation algo-
[14] K.M.A.P.J. Wan, O. Frieder., Distributed construction of connected 881
817 rithm CPDS2HI. The CDS is constructed in three steps, dominating set in wireless ad hoc networks, in: Proceedings of 882
818 firstly by pseudo-dominating set (PDS) selection the PDS Twenty-First Annual Joint Conference of the IEEE Computer and 883
819 nodes are selected, then through an improved Steiner Tree Communications Societies, INFOCOM 2002, IEEE, 2002, pp. 1597– 884
1604. 885
820 construction technique the PDS nodes are connected and [15] X.C.M. Cardei, M.X. Cheng, D.Z. Du, Connected domination in multi- 886
821 finally, the redundant virtual-dominators and dominators hop ad hoc wireless networks, JCIS, Citeseer (2002) 251–255. 887
822 from the CDS are discarded. The simulation results show [16] M.T.T.Y. Li, S. Zhu, D.-Z. Du., Localized construction of connected 888
dominating set in wireless networks., in: Proceedings of NSF Inter- 889
823 that our algorithm constructs smaller sized CDSs in com- national Workshop on Thoretical Aspects of Wireless Ad Hoc, Sensor 890
824 parison to all other existing schemes for a wide variety and Peer-to-Peer Networks, 2004. 891
825 of distributions of sensor nodes. We have shown that the [17] F.W.C.-W.Y.P.-J.W.Y. Li, M.T. Thai, D.Z. Du, On greedy construction of 892
connected dominating sets in wireless networks., Wirel. Commun. 893
826 message and time complexity of our algorithm is O(n) Mobile Comput. 5(8) (2005) 927–932. 894
827 and O(D) respectively, where n is the network size, D is [18] R. Misra, C. Mandal, Minimum connected dominating set using a col- 895
828 the network diameter and is the maximum degree of all laborative cover heuristic for ad hoc sensor networks, IEEE Trans. 896
Parallel Distrib. Syst. 292–302 (2010) 292–302. 897
829 the nodes. The performance ratio of our reported algorithm
[19] H. Du, W. Wu, Q. Ye, D. Li, W. Lee, X. Xu, Cds-based virtual back- 898
830 is (4.8 + ln 5 )|opt | + 1.2, where |opt| is the size of any op- bone construction with guaranteed routing cost in wireless sensor 899
831 timal CDS. The results indicate that our algorithm out- networks, IEEE Trans. Parallel Distrib. Syst. 24 (4) (2013) 652–661. 900
[20] T. Nieberg, J. Hurink., A Ptas for the Minimum Dominating Set Prob- 901
832 performs all the existing approaches that were surveyed,
lem in Unit Disk Graphs, Springer (2006) 296–306. 902
833 in terms of CDS size and message complexity. Our algo- [21] L. Liu, Y. Song, H. Zhang, H. Ma, A.V. Vasilakos, Physarum optimiza- 903
834 rithm constructs the CDS once the topology information is tion: a biology-inspired algorithm for the Steiner tree problem in 904
835 known. It does not wait for the messages from other nodes networks, IEEE Trans. Comput. 64 (3) (2015) 819–832. 905
[22] J. Zhang, S.-M. Zhou, L. Xu, W. Wu, X. Ye, An efficient connected 906
836 in each stage of construction. Although the network model dominating set algorithm in WSNS based on the induced tree of the 907
837 used in the algorithm is UDG, our reported algorithm is crossed cube, Int. J. Appl. Math. Comput. Sci. 25 (2) (2015) 295–309. 908
838 applicable for CDS construction when hosts in a network [23] J. Yu, L. Jia, D. Yu, G. Li, X. Cheng, Minimum connected dominat- 909 Q3
ing set construction in wireless networks under the beeping model, 910
839 have different transmission ranges. 2015, pp. 972–980. 911
[24] A.-R. Hedar, R. Ismail, G.A. El Sayed, K.M.J. Khayyat, Two meta- 912
840 References heuristics for the minimum connected dominating set problem with 913
an application in wireless networks, in: Proceedings of 2015 3rd In- 914
841 [1] M.K.A. Salhieh, J. Weinmann, L. Schwiebert., Power efficient topolo- ternational Conference on Applied Computing and Information Tech- 915
842 gies for wireless sensor networks., in: Proceedings of International nology/2nd International Conference on Computational Science and 916
843 Conference on Parallel Processing, IEEE, 2001, pp. 156–163. Intelligence (ACIT-CSI), IEEE, 2015, pp. 355–362. 917
844 [2] R. Misra, C. Mandal, Ant-aggregation: ant colony algorithm for op- [25] L.W.D. Du, B. Xu, The euclidean bottleneck Steiner tree and Steiner 918
845 timal data aggregation in wireless sensor networks., in: Proceedings tree with minimum number of Steiner points, in: Computing and 919
846 of International Conference on Wireless and Optical Communications Combinatorics, Springer, 2001, pp. 509–518. 920
847 Networks, 2006 IFIP, IEEE, 2006, p. 5. [26] B. Awerbuch., Optimal distributed algorithms for minimum weight 921
848 [3] R.S.B. Das, V. Bharghavan, Routing in ad hoc networks using a spine, spanning tree, counting, leader election, and related problems, in: 922
849 in: Proceedings of Sixth International Conference on Computer Com- Proceedings of the Nineteenth Annual ACM Symposium on Theory 923
850 munications and Networks, 1997. Proceedings, IEEE, 1997, pp. 34–39. of Computing, ACM, 1987, pp. 230–240. 924
851 [4] C.J.C.B.N. Clark, D.S. Johnson, Unit disk graphs, Ann. Discret. Math. 48 [27] X.J.Y.L.W. Wu, H. Du, S.C.-H. Huang, Minimum connected dominat- 925
852 (1991) 165–177. ing sets and maximal independent sets in unit disk graphs, Theor. 926
853 [5] R. Misra, C. Mandal, Rotation of CDS via connected domatic partition Comput. Sci. 352(1) (2006) 1–7. 927
854 in ad hoc sensor networks., IEEE Trans. Mobile Comput. 8(4) (2009a)
855 488–499. Jasaswi Prasad Mohanty is a Ph.D. candidate 928
856 [6] R. Misra, C. Mandal, Efficient clusterhead rotation via domatic par- in the School of Information Technology, IIT 929
857 tition in self organizing sensor networks, Wirel. Commun. Mobile Kharagpur, India. He received his Master De- 930
858 Comput. 9(8) (2009b) 1040–1058. gree in Computer Science from Utkal University, 931
859 [7] A. Das, C. Mandal, C. Reade, M. Aasawat, An improved greedy con- Bhubaneswar, India in 2006. He is working as 932
860 struction of minimum connected dominating sets in wireless net- an Assistant Professor with the department of 933
861 works, in: Proceedings of Wireless Communications and Networking Computer Science and Engineering, Silicon In- 934
862 Conference (WCNC), 2011 IEEE, IEEE, 2011, pp. 790–795. stitute of Technology, Bhubaneswar, India. His 935
863 [8] J.E.W.A. Ephremides, D.J. Baker, A design concept for reliable mobile current research interests includes wireless net- 936
864 radio networks with frequency hopping signaling, in: Proceedings of works and algorithms. 937
865 the IEEE, 75(1), 1987, pp. 56–73.
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003
JID: ADHOC
ARTICLE IN PRESS [m3Gdc;February 22, 2016;13:24]
938 Chittaranjan Mandal received his Ph.D. from Ariyam Das received his B.E. degree (Hons) in 960
939 the Indian Institute of Technology (IIT), Kharag- Computer Science and Engineering from the Ja- 961
940 pur in 1997. He is currently working as a Pro- davpur University, India, in 2011. He held sev- 962
941 fessor with the department of Computer Sci- eral technical positions at Yahoo Research and 963
942 ence and Engineering and School of Informa- Development, Bangalore during 2011–2014. Cur- 964
943 tion Technology, IIT Kharagpur. Prior to joining rently he is working as an Assistant Professor 965
944 IIT, he served as a reader with Jadavpur Uni- in the Department of Computer Science & En- 966
945 versity, Calcutta. His research interests include gineering, Jadavpur University, Kolkata. His re- 967
946 networked systems, formal modeling and de- search interests include data mining, machine 968
947 sign and web technologies. Professor Mandal learning, information retrieval and wireless sen- 969
948 has been an Industrial Fellow of Kingston Uni- sor networks. 970
949 versity, London, U.K., since 20 0 0. He was a re-
950 cipient of a Royal Society Fellowship in 2006.
Please cite this article as: J.P. Mohanty et al., Construction of minimum connected dominating set in wireless sensor net-
works using pseudo dominating set, Ad Hoc Networks (2016), http://dx.doi.org/10.1016/j.adhoc.2016.02.003