Research Article  Open Access
Energy Measure SemigraphBased Connected Edge Domination Routing Algorithm in Wireless Sensor Networks
Abstract
In wireless sensor networks (WSNs), batteries are used as power source which is limited, and replacement of the battery is difficult. Since communication between nodes consumes most of the node power, topologybased power control is essential for reducing energy consumption. It is necessary to use optimized topologybased energy control model, so the selected nodes are used to generate a virtual backbone, which reduces unwanted routing of data. The virtual backbone for optimized topology can be created by connected dominating set (CDS) of graph theory. However, generating the virtual backbone by using the CDS algorithm is an NPhard problem because of larger network size. To overcome this problem, in this paper, a novel distributed connected edge dominating setbased semigraph model (SCEDS) is proposed. The performance ratio of the proposed SCEDS is measured as (4 + ln∆′) opt, where opt represents the network size. The proposed SCEDS is implemented using the ns2 simulator and evaluated with conventional routing protocols such as AODV and DSDV. The results show that the proposed SCEDS approach increases throughput and network lifetime. Also, it reduces energy consumption and average number of hops required for data transmission.
1. Introduction
Wireless sensor networks (WSNs) have caught the eye of researchers, as a result of the major developments being made in the field of embedded systems [1, 2]. WSN refers to the group of dedicated sensor nodes which are spatially dispersed and deployed. Deployed sensors measure environmental conditions like temperature, pressure, humidity, and sound. WSNs are similar to wireless ad hoc networks because they do not rely on any fixed infrastructure, as formation of their network will be done spontaneously with wireless connectivity. In WSN, the most demanding task is the conservation of energy. The major work of sensor nodes is classified as sensing, processing the sensed data, and communicating the sensed information with the peers. Since the communication module consumes most of the sensor energy, it could be controlled by effective topology construction. But WSNs are ad hoc in nature, so this makes the task of topology construction and designing the routing protocols a challenging one. However, this can be achieved with virtual backbone overlay network modeling in WSN. In this model, the selected nodes are considered for virtual backbone construction, and CDS (connected dominating set) of graph theory is used for making the virtual backbone by considering the network as the graph and sensor nodes as the vertices of the graph [3, 4]. This is done because the CDS can extend the lifetime of the wireless network, thus keeping the energy depletion and deportation rate at a minimum.
An interconnected subset of nodes that are put up in the entire network to aid routing is called the virtual backbone [5, 6]. In WSNs, the nodes can use these backbones for communication between them since there is no established architecture for centralized control.
We can define a dominating set (DS) of a network as a small subset of nodes such that each node either belongs to the subset or to the neighbor of some elements in that subset. The CDS, which is formed by connecting the nodes of the DS, is essentially responsible for the passage of messages from one node to another. The source node, which is not a part of the CDS, may send its message to the nearby CDS nodes which in turn send it towards the destination node. In case if the destination node is a part of the CDS, it gets the message directly from a neighbor who belongs to the CDS.
One of the noticeable issues in WSN is data collision, which is caused by flooding centred routing protocols [7]. It can also be resolved by virtual backbone formation. In addition, another thriving research domain involves trying to minimize the size of the CDS. Since the size of the network is proportional to the energy competence and probability of transmission failure, the backbone network size should be kept smaller [8, 9].
In our earlier research [9], we proposed a semigraph contiguous prevalent set (SCPS) algorithm for the semigraph structure. In addition, the SCPS construction scheme maintains the best performance ratio:where opt is the size of any optimal adjacent dominating set (ADS) and is the maximum adjacent degree of all nodes of the network. Moreover, the SCPS algorithm has O(n^{2}) time complexity and O(n^{2} + n log n + n^{2}A) message complexity, where A is an ADS obtained using the SCPS algorithm.
This paper puts forth the idea of a new distributed connected edge dominating setbased semigraph model (SCEDS), which is responsible for engendering a size and power effective network formation. This executes the routing and reduces the control messages with fewer interventions. The distributed connected edge dominating set (CEDS) is constructed in a sparse network for the fixed node environment. This scheme is implemented in two stages and constructs the CEDS using a semigraph. The first phase involves the construction of an edge dominating set (EDS) in a disseminated manner, which is labelled as a pseudodominating set (PDS) as few of the elements may have been removed from the last dominating set. In the second phase, we construct a semigraphbased connected edge dominating set. This omits some of the selected PDS nodes to decrease the size of the CEDS with no deprivation in handling or connectivity. The results of the simulation exhibit SCEDS is a better solution than the already existing connected dominating set (CDS) construction algorithms in terms of size and construction costs. Based on the proposed algorithm, the performance ratio is . The time complexity can be measured as , where is the maximum number of edges in the semigraph model. The message complexity is measured as which is linear, where “n” is the total number of vertices and is the maximum edge degree of the semigraph.
The rest of the paper is organised as follows: Section 2 gives an overview of related work on the connected dominating set. Section 3 explains about the basics of semigraphbased virtual backbone construction. Section 4 gives insight into authors’ contribution. Section 5 elaborates the proposed semigraphbased connected edge dominating set construction. Optimality analysis of the proposed system is given in Section 6. The simulation environment along with results and discussion is given in Section 7. Section 8 explains the hardware implementation of the proposed SCEDS. Finally, Section 9 discusses conclusion and future work.
2. Related Work
In [10], the authors proposed a modified algorithm that can calculate the minimum connected dominating set for ad hoc networks. The results from the simulation show that the modified approach is capable of performing better than the approach which already exists for larger networks. In [11], greedy redundant connected dominating set (GRCDS) with greedy strategy was introduced in order to produce an optimal size of the CDS which has a time complexity of . Also, an algorithm pruning for connected dominating set (PCDS) was formulated to make the CDS a little smaller, with the time complexity of . This brings down the size of the CDS algorithm, at the cost of little performance time. In [12], an effective colourtheorybased energy efficient routing (CEER) algorithm which is based on a colourtheorybased dynamic localization (CDL) algorithm was put forward. The CEER focuses on picking those members of the cluster which are closer to the anchor. This is achieved by contrasting their RGB values. The sensor node which has the greatest level of energy is selected as the next hop. The results clearly exhibit that the proposed routing algorithm in comparison with the energy saving dynamic source routing (ESDSR) in mobile wireless sensor networks can nearly save up to 50–60% energy.
In [13], a distributed connected dominating set (CDS) construction algorithm was proposed in order to efficiently create a CDS in a single phase in large ad hoc networks. The distributed singlephase connected dominating set (DSPCDS) depends on its uniform processing in the single phase in terms of power, and any modifications in the network topology are handled easily without trouble. DSPCDS can use several parameters such as CDS size, diameter, and the number of rounds to converge to maintain the performance of the algorithm.
In [14], a novel approach based on the total dominating set and bipartite theory of graphs called TD algorithm was proposed. This constructs the CDS, a virtual backbone of ad hoc wireless networks. The TD algorithm stated that there exists an entirely substantiated connection between the total dominating set, the Ydominating set of the bipartite graph, and the CDS. It is also proven that this approach performs better than any other latest development while finding the solution to the dynamic problems faced in the graph optimization platform. This is verified by conducting simulation over various vital factors, including large transmission ranges and dense network area.
In [15], the authors proposed a new degreebased greedy approximation connected pseudodominating set using 2 Hop Information (CPDS2HI) which is centralized. It can be observed from the simulation that the algorithm is capable of building CDS that is smaller in size and with lesser message complexity in contrast to preexisting methods across a range of distribution of sensor nodes. In [16], the redundancy connected dominating set (RCDS), an efficient centralized algorithm, was proposed. This method constructed a relatively optimal connected dominating set on a virtual backbone network efficiently within . A relatively optimal connected dominating set can be constructed as follows: firstly, to get the MISs, we will have to build a simple sequence algorithm. Later, by including new nodes, a CDS can be constructed using maximal independent sets (MISs). CPDS2HI retains the performance ratio of , where being the size of the optimal CDS of the network.
In [17], a brand new distributed greedy approximation algorithm based on degrees was proposed. The time and message complexities of the algorithm were found to be and , respectively. The proposed algorithm generates size and power effective network by using the semigraphbased connected edge dominating set. The virtual backbone is constructed by selecting the nodes with the highest edge degree, and SCEDS reduces the control message overhead and transmission inference. Furthermore, the performance ratio of the proposed SCEDS is measured as , where represents the network size.
3. Semigraph Virtual Backbone Model
Representing wireless sensor network as a semigraph model improves the battery efficiency of the sensor node. Because of the reduced number of hops for effective routing, the flexibility of deploying nodes, identification of network obstacles, and the selection of cluster head and cluster formation are made with reduced complexity. Figure 1 shows the representation of the graph model, and Figure 2 shows the associated representation of the semigraph model. In Figure 2, a small circle in between two end vertices represents a middle vertex of any of the edge which will not be the middle vertex of any other edge . And the middle vertex of an edge is an end vertex of an edge . A small tangent to the circle will be drawn at the end of the edge .
In WSN, a semigraph corresponds to a network of nodes, where vertices set represents the sensor nodes and the set of edges represents the communication link between the sensor nodes. Any element in the edge set is defined as a nonempty subset with two or more vertices (aka the set).
A virtual backbone semigraph is obtained from the graph by reducing the cardinality of the edges.
The definitions used to frame the semigraph in the wireless sensor network are listed below.
Definition 1. (dominating set [18]). A dominating set (DS) for a graph is a subset such that each node in adjacent to at least one node in S.
Definition 2. (connected dominating set [19]). A connected dominating set (CDS) is a connected subgraph of a dominating set.
Definition 3. (semigraph [19]). A semigraph for the network is determined as for an edge and the node , and the edge degree for “E” is determined by the following function:where is the edge degree of a vertex .
For a given subset of , is the subsemigraph of SG induced by .
Definition 4. (maximum edge degree [20]). The maximum edge degree of edges of semigraph is represented as .
Definition 5. (edge dominating set (EDS) [20]). A set of edges in the semigraph is referred as the edge dominating set if it satisfies the condition that it should be adjacent to at least one edge in “F” from the edges in . The edge domination number of is the minimum cardinality of an edge dominant set of the semigraph SG.
Definition 6. (connected edge dominating set (CEDS) [21]). An EDS of a semigraph SG is a connected edge dominating set if the induced subsemigraph is connected. The minimum cardinality of a connected edge dominating set is denoted as (aka the connected edge domination number).
4. Motivations and Contributions
The researchers use virtual backbone construction for WSN infrastructure to reduce the unwanted routing of data. However, the virtual backbone generated by CDS is NPhard because of larger in size. To generate size and power effective network, a semigraphbased connected edge dominating set is constructed as a virtual backbone. By selecting the nodes with highest edge degree for backbone construction, SCEDS reduces the control message overhead and transmission inference. Furthermore, the performance ratio of the proposed SCEDS is measured as , where represents the network size framed using SCEDS.
The foremost contribution of the proposed SCEDS is mentioned below:(i)SCEDS is built by considering maximum edge degree nodes which create a persistent virtual backbone with availability of routes.(ii)A virtual backbone with smaller size is created even with random distribution of sensor nodes.(iii)The time complexity is measured as , where is the maximum number of edges in the semigraph model, and the message complexity is measured as .(iv)The proposed system has the best performance ratio , where represents the network size framed using SCEDS(v)The network performance of conventional routing protocols AODV and DSDV is analysed with the constructed SCEDS backbone using ns2 simulator.
5. Proposed SemigraphBased CEDS Construction
This section introduces a novel SCEDS algorithm for virtual backbone construction. The route discovery and path selection in the wireless sensor network were performed using the SCEDS construction algorithm. A simple edge degree algorithm is implemented to perform CEDS with lesser data packet complexity.
The construction of SCEDS was performed through two stages:(i)Generation of EDS.(ii)Development of SCEDS based on the semigraph structure.
The return variable provides the edge dominating sets for the input positions of wireless sensor network nodes. To finalize the EDS, the highest edge degree of first edges is added to . The above measured number is lower bound for [22]. The edges and vertices are framed in the network, and an interconnection between several edges was framed using the Algorithm 1, which finds the connected edge dominant set.

Theorem 1. is an EDS.
Let be the set of all edges obtained from Algorithm 2. Since is the lower bound for EDS, the line 11 of Algorithm 2 considers the highest edge degree of the first edges. Also, from line 14, each edge is adjacent to some edge in . Hence, is an EDS.
The value returned generates the possible number of connections between the edge dominant sets generated using Algorithm 2, whereas the nodes in the wireless sensor networks are grouped as a connected edge dominant set. The semigraph model provides many possible links between the nodes in the network. It helps frame an energyefficient shortest relaying path.

Theorem 2. is a CEDS.
Let be the set of edges obtained in line 9 of Algorithm 1. In the input of Algorithm 1, the set is an EDS which is the output of Algorithm 2. Furthermore, from the condition given in line 4 of Algorithm 1, is connected. Therefore, is a CEDS.
6. Optimality Analysis of the Proposed SCEDS
In the following section by using theorems, the performance ratio, time complexity, and message complexity of the proposed SCEDS are discussed.
Theorem 3. Let H be the SCEDS obtained from the CEDS construction algorithm.
Then, . In a semigraph S, represents size of any CEDS.
Proof. Let be the size of an EDS of a semigraph S. Then, from [21, 22], , where is the maximum edge degree of the network. In Algorithm 1 from line 4 to 6, to connect a node in , we add at least one edge so that the induced subsemigraph is connected.
Therefore,Hence, .
Theorem 4. is the time complexity of the SCEDS algorithm.
The complexity analysis of the proposed SCEDS algorithm (Algorithms 1 and 2) gives time complexity and message complexity and , respectively, where is the maximum edge degree of semigraph .
Proof. In Algorithm 2, the EDS is constructed with a time complexity [22], and in Algorithm 1, the CEDS is constructed with the same time complexity in semigraph S. Therefore, the time complexity of the proposed SCEDS construction algorithm is .
Next, the total number of messages is counted to find message complexity of the proposed SCEDS. The message complexity of EDS construction is [14], and on each edge, the condition given in the line 14 of Algorithm 2 is satisfied, for all nodes of the network. Also the message complexity of CEDS construction is [22], where is the maximum edge degree of the network. Hence, the total message complexity of the proposed SCEDS algorithm is
From equation (3), the upper bound for the SCEDS is , where represents the size of any CEDS. The performance ratio of the SCPS based on equation (1) is , where is the size of any optimal adjacent dominating set (ADS) and is the maximum adjacent degree of all nodes of the network [9]. For any semigraph with and , represent edge domination number and adjacent domination number of SG, and then [23]. Thus, we conclude that the performance ratio of SCEDS is .
7. Simulation of SCEDS Using ns2
The semigraphbased topology is constructed for wireless sensor network using the ns2 simulator [24]. The performance of the proposed semigraph topology is compared with the graph topology. To verify the efficiency of the proposed topology, conventional routing protocols like DSDV and AODV were used. The performance metrics like throughput, endtoend delay, packet delivery ratio, packet loss, overhead, and jitter are measured for the proposed system. The parameters for ns2 simulation are given in Table 1.

The performance of the proposed SCEDS is evaluated by measuring the various performance metrics with different combinations. Throughput is a measure of maximum bandwidth utilized by the network. The efficiency of the network is purely based on the increase in throughput. From Figure 3, the proposed semigraph model with AODV routing protocol provides the maximum throughput rate of 435 kB/s.
The DSDV routing protocol uses the tableoriented approach, in which identifying an alternate route causes delay. It may reduce the performance of the entire network. AODV, an ondemand routing protocol, provides a more efficient path in this situation. Moreover, the semigraph model assists the AODV protocol to frame multiple possible links between the sender and the receiver. The connected edge dominating set assists the network to mount a possible lowcost route to the destination, so the efficiency of the system increases with semigraph and AODV combination.
Endtoend delay is the measure of time taken by the data packet to reach the destination from the source node in a unidirectional communication mode. The endtoend delay and retransmission rate majorly affect the throughput of the network. Figure 4 shows the endtoend delay plot for the network. Here, AODV outperforms with the DSDV routing algorithm when it is evaluated on graph and semigraph topologies. Combining with the semigraph model, the AODV protocol provides an average delay of 0.0188 s. The graph model with the DSDV protocol provides the maximum delay of 0.0301 s. The packet delivery ratio (PDR) refers to the successful transmission of data between the communication ends. Packet loss causes retransmission which in turn increases the delay in the network. The PDR is directly affected by the number of retransmissions. Figure 5 shows the packet delivery ratio of the simulated environment. The delivery ratio is calculated by the rate of successful transmissions in the given initial simulation time. The semigraph with AODV routing protocol provides 97 percent delivery rate in WSN.
The congestion in the network increases when the signaltonoise ratio (SNR) increases. The SNR value is represented in decibel. When SNR increases, the bit error rate decreases. The bit error rate is the measure of the total number of bits transmitted with the error bits received due to congestion in the network. Figure 6 represents the bit error rate of the network with graph and semigraph implementation. A less bit error rate defines the quality of the channel and capability of the protocol to overcome the congestion in the network.
Endtoend delay describes the time taken by a packet that propagates from source to destination, whereas jitter measures the variation of delay between consecutive packet reception due to packet drop and increase in the bit error rate. The jitter may also be caused due to the imbalanced traffic in the network. The delay at the initial stage of transmission will not be the same always. The traffic at the middle or at the end of the path varies from other segments of the path. So the jitter plays an important role in measuring the quality of service in the network. Figure 7 shows the jitter measured in the network using the graph and semigraph model. The jitter is measured in the units of the millisecond. Increase in queue length may increase packet loss due to router buffer overflow. Increase in traffic proportionately increases the possibility of congestion in the network.
The packet loss ratio is the ratio between total number of packets transmitted and the successful reception of the same. Figure 8 shows the packet loss ratio (PLR) with respect to time. The average packet loss ratio is about 0.12 percent in the semigraph model with the AODV routing protocol. The retransmission rate and packet loss rate is higher when implementing the DSDV routing protocol. Packet loss leads to retransmission, which may not affect the throughput but increases the power consumption, which reduces the network lifetime.
The normalized routing overhead is the measure of the total number of routing control packets required per data packet in the transmission path. Here, the overhead is measured under varying queue length and shown in Figure 9. The increase in overhead increases the consumption of energy in the selected path. Generally, cost of the path is determined by calculating overhead incurred by the link. Changes in the overhead were measured about 0.12 seconds when comparing the AODV algorithm in semigraph model and graph model. The small increase in the overhead leads to increase in network power consumption. If the overhead and bit error rate increase together, it affects the network throughput which in turn leads to the overall performance degrade.
The energy consumption with varying queue size is given in Figure 10. Energy is measured in joules. Each packet transmitted consumes some joules of energy in the network. The consumption of energy increases when the same data packet is retransmitted several times due to the packet drop in the network.
Table 2 shows the average values of measured performance metrics for graph and semigraph model.

The proposed semigraph model with AODV routing protocol was developed as a hardware model to check the performance of the network in the realtime environmental condition. The transmission delay is calculated for hardware implementation and shown in Figure 11. The delay is compared with the semigraph model and the graph model with the AODV routing protocol.
8. Hardware Implementation of the Proposed SCEDS
The semigraph and graph models have been implemented in the hardware to measure the realtime performance. Nodes are created using PIC 16F877A microcontrollers. To generate the wireless link between nodes, Tarang P20 802.15.4 (a standard wireless transponder) is used. Ten nodes have been placed to form a network. Semigraph and graphbased topologies are constructed to check the response time of the node. Figure 12 shows the hardware setup.
The delay that is measured by varying packet sizes in the hardware environment is given in Table 3. The delay generated in the hardware environment is closely related to the simulated delay output. Due to the realtime environmental collisions, an additional delay will be generated than the simulated result.

The data rate measured between the sender and receiver node through the WiFi network is given in Table 4. The data rate is affected due to the flooding in the WiFi network. The sender and receiver nodes were placed in the fixed distance, and the data rate is recorded by transferring the data packet through the router node.

9. Conclusion
Virtual backbone construction for WSN infrastructure reduces the unwanted routing of data. However, the virtual backbone generated by CDS is NPhard because of larger in size. To overcome this problem, we proposed a novel distributed connected edge dominating setbased semigraph model (SCEDS) which generates size and power effective network. The proposed SCEDS method reduces the connected edge domination number . By taking edges for CEDS construction, the approximation ratio of proposed algorithm is , where represents the network size and is the maximum edge degree of the semigraph. The conventional wireless network protocols such as AODV and DSDV are simulated with two network topologies such as graph (CDS) and semigraph (SCEDS). This is implemented by using an ns2 simulator, and the parameters like remaining energy, bit error rate, jitter, throughput, endtoend delay, and packet delivery ratio are measured. The result shows the proposed SCEDS generates size and power effective network. In future, SCEDS can be extended to support fault tolerance with malicious nodes. [24]
Data Availability
There are no synthetic data used for this research.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
The authors wish to express their sincere thanks to SASTRA Deemed University, Thanjavur, India, for extending the infrastructural support needed to carry out this work.
References
 H.Y. Zhou, D.Y. Luo, Y. Gao, and D.C. Zuo, “Modeling of node energy consumption for wireless sensor networks,” Wireless Sensor Network, vol. 3, no. 1, pp. 18–23, 2011. View at: Publisher Site  Google Scholar
 G. Liu, Z. Li, X. Zhou, and S. Li, “Transmission power control for wireless sensor networks,” in Proceedings of the 2007 International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2007), vol. 12, no. 1, pp. 2596–2599, Shanghai, China, September 2007. View at: Publisher Site  Google Scholar
 D. Kim, Y. Wu, Y. Li, F. Zou, and D.Z. Du, “Constructing minimum connected dominating sets with bounded diameters in wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 2, pp. 147–157, 2009. View at: Publisher Site  Google Scholar
 R. Asgarnezhad and J. A. Torkestani, “Connected dominating set problem and its application to wireless sensor networks,” in Proceedings of the First International Conference on Advanced Communications and Computation (INFOCOMP '11), pp. 46–51, Barcelona, Spain, October 2011. View at: Google Scholar
 J. Yu, N. Wang, and G. Wang, “Constructing minimum extended weaklyconnected dominating sets for clustering in ad hoc networks,” Journal of Parallel and Distributed Computing, vol. 72, no. 1, pp. 35–47, 2012. View at: Publisher Site  Google Scholar
 R. Hou, W. Ren, and Y. Zhang, “A wireless sensor network clustering algorithm based on energy and distance,” in Proceedings of the 2009 Second International Workshop on Computer Science and Engineering (WCSE 2009), vol. 1, no. 6, pp. 439–442, Qingdao, China, October 2009. View at: Publisher Site  Google Scholar
 L. Ding, W. Wu, J. Willson, H. Du, W. Lee, and D. Z. Du, “Efficient algorithms for topology control problem with routing cost constraints in wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 10, pp. 1601–1609, 2011. View at: Publisher Site  Google Scholar
 A. Each and B. Edges, “Semigraphs : a generalization of combinatorial graphs that is different from hypergraphs,” Tech. Rep., Department of Science and Technololgy, Govt. of India, New Delhi, India, Project No. DST/MS/022/94, Department of Science and Technology. View at: Google Scholar
 S. Saravanan, R. Poovazhaki, and N. R. Shanker, “Cluster topology in WSN with SCPS for QoS,” Wireless Personal Communications, vol. 99, no. 3, pp. 1295–1314, 2018. View at: Publisher Site  Google Scholar
 M. Yadav, V. Rishiwal, G. Arora, and S. Makka, “Modified minimum connected dominating set formation for wireless adhoc networks,” Journal of Computing, vol. 1, no. 1, pp. 200–203, 2009. View at: Google Scholar
 D. Fu, L. Han, Z. Yang, and S. T. Jhang, “A greedy algorithm on constructing the minimum connected dominating set in wireless network,” International Journal of Distributed Sensor Networks, vol. 12, no. 7, 2016. View at: Publisher Site  Google Scholar
 T.J. Chang, K. Wang, and Y.L. Hsieh, “A colortheorybased energy efficient routing algorithm for mobile wireless sensor networks,” Computer Networks, vol. 52, no. 3, pp. 531–541, 2008. View at: Publisher Site  Google Scholar
 B. Yin, H. Shi, and Y. Shang, “An efficient algorithm for constructing a connected dominating set in mobile ad hoc networks,” Journal of Parallel and Distributed Computing, vol. 71, no. 1, pp. 27–39, 2011. View at: Publisher Site  Google Scholar
 S. Balaji, K. Kannan, and Y. B. Venkatakrishnan, “Total dominating set based algorithm for connected dominating set in Ad hoc wireless networks,” WSEAS Transactions on Mathematics, vol. 12, no. 12, pp. 1164–1172, 2013. View at: Google Scholar
 J. P. Mohanty, C. Mandal, C. Reade, and A. Das, “Construction of minimum connected dominating set in wireless sensor networks using pseudo dominating set,” Ad Hoc Networks, vol. 42, pp. 61–73, 2016. View at: Publisher Site  Google Scholar
 D. Fu, L. Han, L. Liu, Q. Gao, and Z. Feng, “An efficient centralized algorithm for connected dominating set on wireless networks,” Procedia Computer Science, vol. 56, pp. 162–167, 2015. View at: Publisher Site  Google Scholar
 J. P. Mohanty, C. Mandal, and C. Reade, “Distributed construction of minimum connected dominating set in wireless sensor network using twohop information,” Computer Networks, vol. 123, pp. 137–152, 2017. View at: Publisher Site  Google Scholar
 T. W. Haynes, S. T. Hedetniemi, and P. J. Slater, “Fundamentals of domination in graphs,” in Monographs and Textbooks in Pure and Applied Mathematics, vol. 208, Marcel Dekker, New York, NY, USA, 1998. View at: Google Scholar
 S. S. Kamath and R. S. Bhat, “Domination in semigraphs,” Electronic Notes in Discrete Mathematics, vol. 15, pp. 106–111, 2003. View at: Publisher Site  Google Scholar
 S. Mitchell and S. T. Hedetniemi, “Edge domination in trees,” in Proceedings of the 8th Southeastern Conference of Combinatorics, Graph Theory and Computing, pp. 489–509, Winnipeg, Canada, January 1977. View at: Google Scholar
 L. Ruan, H. Du, X. Jia, W. Wu, Y. Li, and K.I. Ko, “A greedy approximation for minimum connected dominating sets,” Theoretical Computer Science, vol. 329, no. 1–3, pp. 325–330, 2004. View at: Publisher Site  Google Scholar
 S. Guha and S. Khuller, “Approximation algorithms for connected dominating sets,” Algorithmica, vol. 20, no. 4, pp. 374–387, 1998. View at: Publisher Site  Google Scholar
 S. Saravanan and R. Poovazhaki, “Bounds on the edge domination number in semigraphs,” in Proceedings of the International Conference on Mathematical Sciences (ICMS2014), pp. 506–508, Chennai, India, July 2014. View at: Google Scholar
 http://ns2simulator.com/wirelesssensornetworkns2/.
Copyright
Copyright © 2019 T. Suriya Praba et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.