- About this Journal ·
- Abstracting and Indexing ·
- Aims and Scope ·
- Annual Issues ·
- Article Processing Charges ·
- Articles in Press ·
- Author Guidelines ·
- Bibliographic Information ·
- Citations to this Journal ·
- Contact Information ·
- Editorial Board ·
- Editorial Workflow ·
- Free eTOC Alerts ·
- Publication Ethics ·
- Reviewers Acknowledgment ·
- Submit a Manuscript ·
- Table of Contents
International Journal of Distributed Sensor Networks
Volume 2012 (2012), Article ID 274576, 11 pages
An Efficient Clustering Algorithm in Wireless Sensor Networks Using Cooperative Communication
1School of Computer Science and Technology, Soochow University, Suzhou 215006, China
2State Key Lab. for Novel Software Technology, Nanjing University, Nanjin 210093, China
Received 7 January 2012; Accepted 27 February 2012
Academic Editor: Hongli Xu
Copyright © 2012 Shukui Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Processing the gathered information efficiently is a key functionality for wireless sensor networks. In generally, the sensor networks often use in-network data aggregation and clustering to optimize network communication. The set of aggregating nodes forms a dominating set of the network graph. Finding the weakly connected dominating set (WCDS) is a promising approach for clustering the WSN. However, finding a minimum WCDS is NP-hard problem for most graphs, and a host of approximation algorithm has been proposed. The aim of the paper is to construct a minimum WCDS as a clustering scheme for WSN. Our clustering schemes construction algorithm includes two phases. First of all, we construct a maximal data aggregation tree (DAT) of the network. The second phase of the algorithm is to choose the nodes (called connectors) to make the WCDS connected. The correctness and performance of our algorithms are confirmed through theoretical analysis and comprehensive simulations.
A wireless sensor network (WSN) is a multihop wireless communication network. In WSN, each node assumes the role of a router and relays the packets toward the final destinations if a source cannot directly send the packets to a final destination due to the limitation of the radio transmission range. In addition, the energy efficiency is one of the major constraints in WSN. The network topology may also change unpredictably due to node failure, running out of power, or adding new nodes into the network. Most topology changes are localized within a small area of the network. Therefore, it is desirable to abstract the network structure as local changes which need not be seen by the entire network. This is done by using logical substructures called clusters. It is believed that clustering can dramatically improve a network’s broadband utilization and delivery ratio, extend network lifetime, and reduce packet retransmission . A natural method for forming clusters is based on the idea of graph domination . The most basic clustering methods that have been studied in ad hoc networks and WSN are based on the dominating sets (DSs). Moreover, among various existing clustering schemes, dominating set-based clustering [3, 4] is a promising approach.
The main advantage of dominating set-based clustering is that it simplifies the clustering process to the one in a smaller subnetwork generated from the connected dominating set (CDS). The efficiency of this approach depends largely on the process of finding and maintaining a CDS and the size of the corresponding sub-network. In addition, the CDS formation algorithm should be localized (i.e., based on local information) for low overhead and fast convergence. The research that works on selecting a minimum CDS has never been interrupted because of its dramatic contributions to wireless networks. Unfortunately, finding a minimum CDS is NP complete for most graphs, even if global information is available and no constraint .
In addition, in wireless channels, packets are usually dropped when the channel goes into deep fade and thus an outage occurs. In particular, the outage happens when instantaneous channel capacity falls below the amount of information carried in the packet . Recently, the cooperative communication technique was exploited to study energy management issues for ad hoc and sensor networks [7, 8]. Such as in , a network model using cooperative communication is developed to deal with broadcasting in ad hoc networks and WSN. Transmitting independent copies of a packet generates diversity and combats the effects of fading. The selected relay cooperates with one another if the direct transmission fails to the final destinations . Each relay will decide whether it can successfully decode the sources’ information based on its local channel information. The criterion used for successful decoding is that its local channel information can satisfy the condition where is the SNR . is the coefficient of the channels between th source and th relay. The above expression characterized the capacity region multiple access channels . Assume that the relays can satisfy the criterion and hence be able to decode the sources’ information correctly. By ordering the relay-destination channels, we denote the -qualified relays as , where. The study has shown that cooperative communication can potentially combine the following advantages: (1) the power saving provided by multihopping, (2) the spatial diversity provided by the antennas of separate mobile nodes, and (3) node cooperation can also lead to increased data rates [11, 12].
Motivated by cooperative communication in ad hoc networks and WSN, Alzoubi et al. proposed an algorithm for weakly connected dominating set (WCDS) based on a spanning tree . In this scheme, a maximal independent set (MIS) is elected such that each node in the MIS can be connected to the spanning tree via an extra node. Chen and Liestman [13, 14] proposed a zonal algorithm, in which the graph is divided into regions, a WCDS is constructed for each region, and adjustments are made along the borders of the regions to produce a WCDS for the whole graph. Their algorithm for the partitioning phase is partly based on a minimum spanning tree (MST) algorithm of Gallager et al. . Han and Jia  also proposed an area-based distributed algorithm for WCDS construction in ad hoc networks with constant approximation ratio, linear time, and message complexity. While it has a lower message complexity than the zonal algorithm proposed by Chen and Liestman, it outperforms the mentioned algorithm. Basagni et al.  presented a performance comparison of the protocols proposed for clustering and backbone formation in large scale ad hoc network. Wu  presented two distributed algorithms for finding a WCDS in ad hoc networks. The first algorithm was implemented by first electing a leader among the nodes, which was going to be the root of a spanning tree. The spanning tree is then traversed, and the dominator nodes are selected. But the distributed leader election is extremely expensive in practice and exhibits a very low degree of parallelism. The second algorithm first constructs a maximum independent set (MIS) by an iterative labeling strategy and then modifies the MIS by selecting one intermediate node between each pair of dominators separated by exactly three hops.
At present, the study of WCDS is not more. As mentioned different above, we consider the WCDS as a better method for clustering  an ad hoc network and WSN. In this paper, based on the characteristics of communication under the cooperative communication, we extend the dominative capability of nodes in the corresponding network, and we turn the clustering scheme construction problem of a cooperative network into the WCDS problem in the graph model of cooperative communication. A novel algorithm (called DAT-WCDS) to find WCDS for clustering in ad hoc networks and WSN is proposed. And their good performance is confirmed by simulations.
2. Preliminaries and Definitions
2.1. A Network Environment
In this paper, the aim of the proposed algorithm is to form a clustering scheme for the WSN by finding a connected dominating set problem. We consider a monitor area with wireless sensors, represented by the set randomly deployed. Each sensor node is equipped to learn its location coordinates such as its location information . It is not the purpose of this paper to define mechanisms to find this location. Without loss of generality, let us assume that nodes in the set belong to two dimensional planes as illustrated in Figure 1.
At first, the goal of the proposed algorithm is to construct the data aggregation tree (DAT) in this nodes network, where DAT is consisted of nodes called tree node, which is used to receive and aggregate data, the other () nodes are referred to as non-tree (NT) nodes. Each NT node senses its environmental parameter and reports it to its nearest tree node. The DAT is well spread over the entire WSN so that tree nodes are uniformly distributed on the network. In this way, it ensures that the attribute readings sent by NT nodes to the corresponding tree node incur a smaller hop count. For simplicity, we use (denoted by the dashed rectangle in Figure 1) to represent an event, and the event region is denoted by the area , where . Normally all the events are assumed to have already been sensed in the network by DAT. is defined as the portion of not occupied by any event, that is, .
2.2. Connected Dominating Set
For simplicity, we assume a simple and yet general enough model that is widely used in the community. Wireless sensor networks are modeled as unit disk graphs . Where, the vertices in represent the communication nodes. Let be a subset of vertices in . In the following, we use to denote the subgraph induced by . For a subgraph of , we use and to refer to the vertices and edges of ; respectively, we denote by the closed neighborhood of a vertex , that is,
Analogously, for , define the neighborhood of . In this context, we set , for , and we call the recursively defined kth neighborhood of , .
A normal transmission range , using the Euclidean distance , denoting the number of hops on a shortest path in between vertices and , where is also viewed as the transmission cost between and . This means that two vertices are connected by an edge if and only if ’s disk covers and ’s disk covers . Let be a shortest path between node and .
In graph theory, a dominating set (DS) of a graph is a subset , such that every vertex is either in or adjacent to a vertex of . A minimum DS (MDS) is a DS with the minimum cardinality . A subset is called independent if for every two vertices , there does not exist an edge . An independent set is called maximal if it cannot be extended by the addition of any other vertices from the graph. There is an important relationship between maximal independent sets and dominating sets in a graph; an independent set is also a dominating set if and only if it is a maximal independent set .
A CDS of a given graph is a dominating set whose induced subgraph, denoted , is connected, and a minimum CDS (MCDS) is a CDS with the minimum cardinality. A dominating set is a weakly connected dominating set (WCDS) of a graph , if the graph is a connected subgraph of . In other words, the weakly induced sub graph contains the vertex of , their neighbors, and all edges with at least one endpoint in .
Finding the minimum WCDS of the network graph is one of the most investigated methods for cluster formation in which a dominator node assumes the role of a cluster head, and its one-hop neighbors and 2-hop neighbors are assumed to be cluster members. The structure of the network graph can be simplified using WCDS and made more succinct for transmitting in ad hoc networks and WSN [15, 16].
In this paper, we focus on clustering mechanisms to elect a minimum and sufficient number of links to serve as the communication backbone of the network. Accordingly, the clustering approach to topology management can be modeled as the relevant minimum WCDS problem in graph theory.
2.3. Dominating Set Extension
In this subsection, we extend the dominative capabilities of nodes for finding a small WCDS for a WSN. Wu et al. proposed the notion of an extended dominating set (EDS) . A subset of is an EDS if every node of is (a) in the subset, (b) a regular neighbor of a node in , or (c) 2-hop neighbor of nodes in .
Dominative capabilities extension of nodes: each node is extended such that it dominates not only itself and its 1-hop distance neighbors fully, but also its 2-hop distance neighbors partly. For example, in Figure 2, the node dominates not only itself and nodes fully, but also nodes partly. This extension extends the dominative capability of a node from its 1-hop neighbors to its 2-hop distance neighbors.
In , they used a notion of contribution; each forward node contributes 1 to all its 1-hop neighbors, and 1/ to all its 2-hop neighbors. The effective contribution of to is ’s contribution to before the signal energy of reaches 1. The initial signal energy of each node is 0. A node is said to have the maximum effective contribution if it has the maximum total effective contribution to its neighbors and 2-hop neighbors. If we consider the contribution of each forward node as its dominative capability to all its neighbors, thus each forward node can fully dominate its 1-hop neighbors, and partly dominate its 2-hop neighbors. The following definitions will be used throughout the paper.
Definition 1. For any vertex is a dominator neighbor of if is a cluster-head (or dominator).
Definition 2. For a vertex , the 2-hop-independent neighbors of are , such that if , , then and are independent.
Definition 3. Let vertex be called as connector if it is common neighbor between dominators and , where is the 2-hop neighbor of .
2-hop WCDS is also a CDS. It requires that, for any two nodes with distance equal to 2, there exists at least one shortest path between them, whose intermediate node should be included in 2-hop WCDS. The formal definition is shown in details as follows.
Definition 4. The 2-hop shortest path weakly connected dominating set problem (2-hop WCDS) is to find a minimum-size node set such that(1) such that ,(2)the induced graph is connected, and(3), if , then .
We do not consider the situation of . The reason is that our WCDS aims to reduce transmission cost. When we select a WCDS, neighbors of must be known to during selecting process. As a result, when has a packet destined to , will not inform adjacent nodes in WCDS to help deliver the packet, because knows that can receive packets from directly and no consecutive forwarding will happen. However, once , consecutive forwardings are needed to deliver packages to the destination node. Thus, a good selection of forwarding nodes will influence on network performance greatly. We hope to select a CDS with minimum size, but keep the value of , through this CDS the same as that in original graph. It is the goal of WCDS. We redefine a node’s degree in details as follows.
Definition 5. The degree of a node is denoted by . Define the rank of node to be an ordered pair , where is the node degree and is the node ID of . We say that a node with rank has a higher order than a node with rank if , or and .
Definition 6. The “diameter” of a set of nodes in a graph is the maximum of the pairwise shortest paths between these nodes , where is the shortest number of hops needed to go from node to node in .
When WCDS is constructed, only nodes in WCDS may forward data. In broadcasting , nodes in WCDS can help spread data to the whole network. In routing, data will be sent to WCDS and be delivered via nodes in WCDS. Thus, how to construct a WCDS is closely related to the performance of WCDS-based broadcasting and routing. Our approach to establishing a minimal WCDS is based on two phases that implement the data aggregation tree (DAT) and WCDS elections, respectively. We discuss the construction of WCDS in the following sections.
3. Algorithm Description
The aim of the proposed algorithm is to construct a minimum WCDS as a clustering scheme for WSN. We employ a CDS in this paper since it can behave as the virtual backbone of a sensor network. Our clustering schemes construction algorithm includes two phases: DAT construction and then to select connectors to make the MIS nodes connected into a WCDS construction. In the first phase, we construct a maximal DAT of the network. The second phase of the algorithm is to choose the nodes (called connectors) to make the WCDS connected.
3.1. Construction of Data Aggregation Tree
We assume that each node knows the node ID and degree of all its 1-hop neighbors and 2-hop neighbors, this can be achieved through requiring each node to broadcast its node ID initially. After each node knows all its neighbors, it can broadcast its degree, one more round of “Hello” message is needed to construct 2-hop information.
Let the target region be , and sensor node set in the region be where is the position coordinate of the node , external of the target region is set , and DAT is definite as has where path is the greatest span path from node to node in graph , and its length is diameter . In this path, the minimum distance between each node is bigger or equals to the minimum distance in any other path from to , and the node number is the smallest in graph .
Dynamic topology has a significant impact on DAT algorithms. Two actions of a node lead to network topology changes: withdrawing and joining. Withdrawing refers to the functional termination of a node in the network, and it happens when a node fails, runs out of power, or exits from the network. Joining refers to the functional start of a node in the network, and it happens when a new node is added, or a node recovers from a failure. Moving of a node can be treated as two separate actions of withdrawing and joining if the node can be assumed to stop receiving and transmitting messages when in motion. To cover a broader range of situations, this paper assumes no special notification sent from the withdrawing or joining node. Relying on such notification, even if possible, imposes high expectation on the ability of nodes. The neighbors of a changing node must rely on other mechanisms to detect the changes.
The changing neighborhood resulted from a node withdrawing or joining affects the generated DAT. Generally, there are two methods to handle it: recalculating and updating. With the recalculating method, a distributed DAT algorithm starts at a fixed interval or is triggered by some event (e.g., when disconnection of the dominating set is detected), and a new DAT is generated from scratch. With the updating method, the DAT is maintained by updating a portion of the existing dominating set according to the topology changes. A practical strategy may use the updating method most of the time and use the recalculating method when necessary. This paper only discusses the updating method.
Let depth of the tree be . Algorithm 1 constructs a DAT with given depth. When a node chooses its two children, it will choose the two biggest span nodes, ensuring that the tree covers more target regions as far as possible. In the process of the multiple regressions, it can achieve the high accuracy. After the DAT is formed, in each subdomain all residual nodes send data to the nearest tree node away from themselves. In this paper, we used the literature  design method to construct the aggregation tree. That is, constructing process through three kinds of messages: Beacon, Probe, and Join. Figure 3 describes the process about the exchange of different signals to construct the tree. For more details, see literature .
After given data aggregation tree (DAT), a data communication operation consists of (possibly repeated) two phases: a propagation phase where the query demands are pushed down into the sensor network along the tree, and an transmission phase where the aggregated values are propagated up from the children to their parents.
3.2. Clustering Formation
In this section, a data aggregation tree-based algorithm (called DAT-WCDS) is proposed for clustering formation in WSN, which focuses on finding a WCDS problem in the network graph. In the algorithm, a special dominating set using a MIS of the network is constructed, and then a CDS is constructed to connect dominators and the other nodes.
Given be a DAT and is a dominating set of containing. It suffices to determine an independent set of vertices which is disjoint from and contains a neighbor of every vertex in , because a maximal independent set which contains but is disjoint from is clearly a dominating set of . A simple strategy to select the elements of is to root in some vertex in and to select a child of every vertex in which itself is not contained in .
If this strategy succeeds, then the selected vertices will clearly form an independent set. Nevertheless, this strategy fails in the presence of vertices in all children of which are also in . For such a vertex, we have to choose its parent. Working out the consequences of this reasoning leads to Algorithm 1 in the following sections.
We will hope that there are some dominator(s) and some dominatee(s) in maximal independent set of each layer of DAT. Here a connector node (a dominatee of a dominator ) is said to be redundant for the dominator if removing will not disconnect any of the 2-hop dominators of from . For every dominatee, it has at least one-dominator neighbor in the same or upper level. Thus, every dominator (except the root) has at least one dominator in the upper level within 2 hops. Using this property, we can ensure that all the data in the dominators can reach the root finally if every dominator transmits its data to some dominator in upper level within two hops. From another point of view, considering dominators in the decreasing order of their levels, a dominator in level aggregates data from all dominators in level or that are within two hops of leads to Algorithm 2 in the following sections.
In Algorithm 2, we only concentrate on communications between dominators. Since dominators cannot communicate directly, we have to rely on some dominates (NT node), each of which acts as a bridge between two dominators. The algorithm runs from lower level to upper level in DAT, every dominator will remain silent until the level where it locates begins running. When it is its turn, the dominator will try to gather all the data from other dominators in lower levels that have not been aggregated. If a dominator’s data have been collected before, then it is unnecessary to be collected again. After the end of the second phase, the algorithm has identified MIS and the connectors. Iteratively, the dominator nodes are picked which connects independent set nodes in different components. The following phases are performed to establish and form clusters
Initially, the sink creates an empty cluster associated with an unclustered node of . Each sensor transmits its position to the sink. To accomplish this step any efficient sensor routing algorithm can be used. Thus, the clustering algorithm is not bound to how the sink receives this information. If there is an unconnected node in the network, it cannot announce itself and thus will not be considered in the algorithm. Then, the sink finds the qualified unclustered nodes for joining to that first member. When no more nodes can be added to the cluster, the sink takes a new unclustered node and begins a new cluster. Then, each first member sends a packet to the members of his cluster notifying them about the cluster which they belong to. Each node is in one of the four states: unmarked, clustered-head (CH), cluster member (CM), and half-dominated. In the following, we describe the algorithm in detail.
Algorithm 3 is executed by the sink once upon deployment, and thus all nodes will become clustered. If a node joins to the network, it has to send its position () to the sink for announcing itself as a new node. The sink computes the highest rank of the new node and finds the first cluster that can accept it as a new member. Then, the sink sends a message to the first member in order that this node reorganizes the cluster with the new member. On the other hand, each node periodically sends a Hello message to the first member notifying that it is alive.
When a node dies, the first member will notify the rest of the members about the new cluster set and will reconfigure any parameter related to the cluster. The first member also periodically notifies to its cluster members about its availability. If a first-member dies, the cluster members will notify to the sink their availability to belong to another cluster or to create a new cluster. Note that the beaconing among cluster members implies low overhead since cluster sizes have few nodes.
4. Analysis of Algorithm
In the next subsections we first analyze the correctness of the algorithm and then analyze its complexity for running time and messages exchanged of the algorithm.
4.1. Correctness of the Algorithm
Theorem 7. The output of the proposed Algorithm 1 is a maximal independent set.
Proof. By contradiction, we consider the first execution of the while-loop in line 11 for which the vertex has no parent which does not belong to ; that is, either is the root of or the parent of belongs to .
Let denote the set of vertices from which can be reached from on a path of the form with , , , , and partner for . Note that is a child of . Let the set contain the parent of the parent of —the grandparent of for every vertex in . Let .
Let be a child of . Clearly, . If , then . If , then has a child which belongs to , and has a child which belongs to such that partner . Since is a path as in (1), we obtain, by the definition of , that . This implies that , and hence . Therefore, in both cases, , and all vertices which were dominated by in are still dominated by vertices in .
Let . Let be as in (1) with . Since , we have . If is a child of , then exactly the same argument as above implies that . Hence again all vertices which were dominated by in are still dominated by vertices in .
Altogether, we obtain that is a dominating set of which contradicts the assumption that is a minimum dominating set. By the claim, the while-loop in line 11 successfully adds to the set the parents of vertices in which do not belong to . By the condition for the while-loop in line 11, just before the execution of the while-loop in line 16, the set is independent, and every vertex with has at least one child which does not belong to and is nonadjacent to the vertices in . During the executions of the while-loop in line 16, only children of vertices in are added to , and this property is maintained throughout the remaining execution of Select. Hence, the while-loop in line 16 successfully adds to the set the children of vertices in which do not belong to such that after the last execution of the while-loop in line 16, the set is independent, disjoint from and . By the above remarks, the set defined in line 20 is an independent dominating set of which completes the proof.
Theorem 8. After the above two phases, the constructed DS is a WCDS of the whole graph.
Proof. After the first phase, Algorithm 1 constructs a DAT with the given depth. When a node chooses its two children, it will choose the two biggest span nodes, ensuring that the tree covers more target regions as far as possible. It is possible that there exist two dominators that are apart by at least 2 hops in the graph. However, these dominators are apart by at most 3 hops. According to the definition of WCDS, we know that the IDS constructed in the second phase is a WCDS. Although the second phase reduces the size of dominators, the connectivity is not destroyed. Therefore, after the two phases, the constructed IDS is a WCDS of the whole graph.
4.2. Complexity Analysis
Theorem 9. The algorithm DAT-WCDS has time complexity time and rounds, where is the network diameter and message complexity of , where is max degree of node in .
Proof. Assume that in a given unit disk the size of an MIS is always less than maximum degree of a node in ; therefore, . Each node sends at most two messages to become dominatee and at most messages per degree to update neighbor’s information and to get neighbors of the neighbor to become dominator. Thus, message complexity is , where is the maximum node degree.
While establishing the relationship between connectors and dominators, the message complexity is only size of CDS which is at most . Thus, in the message complexity of algorithm , each node is explored one by one, so the time complexity . The number of synchronous rounds is , where is network diameter, which is bounded by shortest distance of farthest node from a given leader.
5. Simulation and Discussion
In simulations, all algorithms in discussion are implemented by using MATLAB, and all nodes are randomly deployed in a square area . Every node uses a radio range , 60 units). The network size and node density determine the number of nodes () in the network. Node density is defined as the average number of nodes per unit area. Relative node density is defined as the number of neighbors per node. For example, given node density , , the relative node density is . Table 1 summarizes all the network configurations used in simulations.
5.1. Node Density
Node density determines how many neighbors a node can have. With a higher node density, a node has more neighbors to compete with to become a dominator. But after a node becomes a dominator, all its neighbors are covered as NT nodes. Usually, a node that can cover more neighbor nodes has a greater chance to become a dominator because of its greater degree. Thus, a new dominator will try to cover a new area of the network by given a connected network. Therefore, if the algorithm is well designed, the CDS size should be mainly determined by the network size and has less to do with the node density. Figures 4 and 5 show that DAT-WCDS generates CDS of almost the same size and the same diameter in networks with various node densities. But it takes longer time for the algorithm to converge in high-density networks (Figure 6).
5.2. Size of WCDS
Figure 4 shows the results when the node’s transmission range is set as 30 units and the number of nodes in the networks ranges from 20 to 160. When the transmission range increases, as more nodes may be connected, the network becomes denser. In this case, the size of WCDS only increases slightly as the size of the network increases. When the number of nodes in the network reaches 160, the number of nodes in the WCDS constructed by the DAT-WCDS algorithm is only about 31% of that constructed. The reason why our algorithm always outperforms is that for each pair of 2 hops is away cluster-heads adds one additional node to the WCDS, whereas our algorithm only “weakly connects” 2 hops away cluster-heads in different areas. We find that increasing the node’s transmission range can increase the coverage area of each node, and therefore, increasing the density of the network, which leads to a smaller size of the WCDS.
5.3. Comparison with Other Algorithms
The DAT-WCDS algorithm is compared with two multiple-phase CDS algorithms: ZS  and KM . However, KM does not generate smallest size CDS, but it converges fast. Therefore, KM here serves as a good comparison candidate as we will show various aspects of algorithms at different performance levels.
Figure 7 shows that, in terms of CDS size, DAT-WCDS performs better than KM and ZS. The connected dominating sets built by KM have smaller diameters in large networks (Figure 8), but the tradeoff is much greater dominator population. DAT-WCDS converges much faster than ZS, as illustrated in Figure 9. The DAT-WCDS algorithm always converges in no more than 11 rounds for a wide range of network sizes in our simulations. Here, each round of ZS is the time for generating a new layer of dominators. The convergence time of ZS is mainly affected by the network size and the node radio range.
In this paper, we extend the dominative capabilities of nodes, and a data aggregation tree-based algorithm called DAT-WCDS is proposed for clustering formation in WSN, which focuses on finding a WCDS problem in the network graph. Our clustering schemes construction algorithm includes two phases: DAT is constructed and a special dominating set using a MIS of the network is constructed, then selecting connectors to make the MIS nodes connected into a WCDS construction. The correctness and performance of our algorithms are confirmed through theoretical analysis and comprehensive simulations.
This work is supported by National Natural Science Foundation of China under Grants nos. 61070169 and 61170021, Natural Science Foundation of Jiangsu Province under Grant no. BK2011376 Specialized Research Foundation for the Doctoral Program of Higher Education of China no. 20103201110018, and Application Foundation Research of Suzhou of China no. SYG201118 and sponsored by Qing Lan Project.
- M. Agarwal, J. H. Cho, L. Gao, and J. Wu, “Energy efficient broadcast in wireless ad hoc networks with hitch-hiking,” in Proceeding of the 23rd AnnualJoint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), pp. 2096–2107, Hong Kong, March 2004.
- R. Rajaraman, “Topology control and routing in ad hoc networks: a survey,” SIGACT News, vol. 33, no. 2, pp. 60–73, 2002.
- J. Wu, “Extended dominating-set-based routing in ad hoc wireless networks with unidirectional links,” IEEE Transactions on Parallel and Distributed Systems, vol. 13, no. 9, pp. 866–881, 2002.
- K. M. Alzoubi, P.-J. Wan, and O. Frieder, “Message-optimal connected dominating sets in mobile ad hoc networks,” in Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc '02), pp. 157–164, Lausanne, Switzerland, June 2002.
- K. M. Alzoubi, W. Peng-Jun, and O. Frieder, “Distributed heuristics for connected dominating sets in wireless ad hoc networks,” Journal of Communications and Networks, vol. 4, no. 1, pp. 22–29, 2002.
- L. Ding, W. Wu, J. Willson, H. Du, W. Lee, and D.-Z. Du, “Efficient algorithms for topology control problem with routing cost constraints in wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 10, pp. 1601–1609, 2011.
- Y. Liang and V. V. Veeravalli, “Cooperative relay broadcast channels,” IEEE Transactions on Information Theory, vol. 53, no. 3, pp. 900–928, 2007.
- N. Jindal, U. Mitra, and A. Goldsmith, “Capacity of ad-hoc networks with node cooperation,” in Proceedings of the IEEE International Symposium on Information Theory (ISIT '04), pp. 271–272, July 2004.
- J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3062–3080, 2004.
- A. Nosratinia, T. E. Hunter, and A. Hedayat, “Cooperative communication in wireless networks,” IEEE Communications Magazine, vol. 42, no. 10, pp. 74–80, 2004.
- D. N. C. Tse, P. Viswanath, and L. Zheng, “Diversity-multiplexing tradeoff in multiple-access channels,” IEEE Transactions on Information Theory, vol. 50, no. 9, pp. 1859–1874, 2004.
- J. Wu, M. Cardei, F. Dai, and S. Yang, “Extended dominating set and its applications in ad hoc networks using cooperative communication,” IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 8, pp. 851–864, 2006.
- Y. P. Chen and A. L. Liestman, “Maintaining weakly-connected dominating sets for clustering ad hoc networks,” Ad Hoc Networks, vol. 3, no. 5, pp. 629–642, 2005.
- Y. P. Chen and A. L. Liestman , “A zonal algorithm for clustering ad hoc networks,” International Journal of Foundations of Computer Science, vol. 14, no. 2, pp. 305–322, 2003.
- R. G. Gallager, P. A. Humblet, and P. M. Spira, “A distributed algorithm for minimum-weight spanning trees,” ACM Transactions on Programming Languages and Systems, vol. 5, no. 1, pp. 66–77, 1983.
- B. Han and W. Jia, “Clustering wireless ad hoc networks with weakly connected dominating set,” Journal of Parallel and Distributed Computing, vol. 67, no. 6, pp. 727–737, 2007.
- S. Basagni, M. Mastrogiovanni, and C. Petrioli, “A performance comparison of protocols for clustering and backbone formation in large scale ad hoc networks,” in Proceeding of the IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MAHSS '04), pp. 70–79, October 2004.
- K. K. Chintalapudi and R. Govindan, “Localized edge detection in sensor fields,” in Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 59–70, May 2003.
- S.-K. Zhang, Z.-M. Cui, S.-R. Gong, Q. Liu, and J.-X. Fan, “A data aggregation algorithm based on splay tree for wireless sensor networks,” Journal of Computers, vol. 5, no. 4, pp. 492–499, 2010.
- D. Zhou, M.-T. Sun, and T.-H. Lai, “A timer-based protocol for connected dominating set construction in IEEE 802.11 multihop mobile ad hoc networks,” in Proceeding of the 5th Symposium on Applications and the Internet (SAINT '05), pp. 2–8, February 2005.
- K. M. Alzoubi, P.-J. Wan, and O. Frieder, “Maximal independent set, weakly connected dominating set, and induced spanners for mobile ad hoc networks,” International Journal of Foundations of Computer Science, vol. 14, no. 2, pp. 287–303, 2003.