Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Bootstrapping a Hop-Optimal Network in the Weak Sensor Model

  • Conference paper
Algorithms – ESA 2005 (ESA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3669))

Included in the following conference series:

  • 2309 Accesses

Abstract

Sensor nodes are very weak computers that get distributed at random on a surface. Once deployed, they must wake up and form a radio network. Sensor network bootstrapping research thus has three parts: one must model the restrictions on sensor nodes; one must prove that the connectivity graph of the sensors has a subgraph that would make a good network; and one must give a distributed protocol for finding such a network subgraph that can be implemented on sensor nodes.

Although many particular restrictions on sensor nodes are implicit or explicit in many papers, there remain many inconsistencies and ambiguities from paper to paper. The lack of a clear model means that solutions to the network-bootstrapping problem in both the theory and systems literature all violate constraints on sensor nodes. For example, random geometric graph results on sensor networks predict the existence of subgraphs on the connectivity graph with good route-stretch, but these results do not address the degree of such a graph, and sensor networks must have constant degree. Furthermore, proposed protocols for actually finding such graphs require that nodes have too much memory, whereas others assume the existence of a contention-resolution mechanism.

We present a formal Weak Sensor Model that summarizes the literature on sensor node restrictions, taking the most restrictive choices when possible. We show that sensor connectivity graphs have low-degree subgraphs with good hop-stretch, as required by the Weak Sensor Model. Finally, we give a Weak Sensor Model-compatible protocol for finding such graphs. Ours is the first network initialization algorithm that is implementable on sensor nodes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bar-Yehuda, R., Goldreich, O., Itai, A.: On the time-complexity of broadcast in multi-hop radio networks: An exponential gap between determinism and randomization. Journal of Computer and System Sciences 45, 104–126 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  2. Blough, D.M., Leoncini, M., Resta, G., Santi, P.: The k-neigh protocol for symmetric topology control in ad hoc networks. In: MobiHoc (2003)

    Google Scholar 

  3. Ferraguto, F., Mambrini, G., Panconesi, A., Petrioli, C.: A new approach to device discovery and scatternet formation in bluetooth networks. In: Proc. of IPDPS (2004)

    Google Scholar 

  4. Goel, A., Krishnamachari, B., Rai, S.: Sharp thresholds for monotone properties in random geometric graphs. In: Proc. of STOC (2004)

    Google Scholar 

  5. Gupta, P., Kumar, P.R.: Critical power for asymptotic connectivity in wireless networks. In: Stochastic Analysis, Control, Optimization and Applications. Birkhäuser, Basel (1998)

    Google Scholar 

  6. Kumar, V.S.A., Marathe, M.V., Parthasarathy, S., Srinivasan, A.: End-to-end packet-scheduling in wireless ad-hoc networks. In: SODA (2004)

    Google Scholar 

  7. Law, C., Siu, K.-Y.: A Bluetooth scatternet formation algorithm. In: Proceedings of the IEEE Symposium on Ad Hoc Wireless Networks (November 2001)

    Google Scholar 

  8. Moscibroda, T., Wattenhofer, R.: Maximal independent sets in radio networks. In: PODC (2005)

    Google Scholar 

  9. Muthukrishnan, S., Pandurangan, G.: The bin-covering technique for thresholding random geometric graph properties. In: Proc. of ACM-SODA (2005)

    Google Scholar 

  10. Nakano, K., Olariu, S.: Energy-efficient initialization protocols for radio networks with no collision detection. In: Proc. of ICPP (2000)

    Google Scholar 

  11. Roberts, L.G.: Aloha packet system with and without slots and capture. Computer Communication Review 5(2), 28–42 (1975)

    Article  Google Scholar 

  12. Schmidt, G.: The butterfly parallel processor. In: Proc. of ICS, pp. 362–365 (1987)

    Google Scholar 

  13. Sohrabi, K., Gao, J., Ailawadhi, V., Pottie, G.J.: Protocols for self-organization of a wireless sensor network. IEEE Personal Communications 7(5), 16–27 (2000)

    Article  Google Scholar 

  14. Song, W., Wang, Y., Li, X., Frieder, O.: Localized algorithms for energy efficient topology in wireless ad hoc networks. In: MobiHoc (2004)

    Google Scholar 

  15. Wang, Z., Thomas, R.J., Haas, Z.: Bluenet - A new scatternet formation algorithm. In: HICSS (2002)

    Google Scholar 

  16. Zaruba, G.V., Basagni, S., Chlamtac, I.: Bluetrees - Scatternet formation to enable Bluetooth-based ad hoc networks. In: Proc. of IEEE ICC (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Farach-Colton, M., Fernandes, R.J., Mosteiro, M.A. (2005). Bootstrapping a Hop-Optimal Network in the Weak Sensor Model. In: Brodal, G.S., Leonardi, S. (eds) Algorithms – ESA 2005. ESA 2005. Lecture Notes in Computer Science, vol 3669. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11561071_73

Download citation

  • DOI: https://doi.org/10.1007/11561071_73

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29118-3

  • Online ISBN: 978-3-540-31951-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics