Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links

Similar documents
Connected Dominating Sets in Wireless Networks with Different Transmission Ranges

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Algorithms for Minimum m-connected k-dominating Set Problem

Algorithms for minimum m-connected k-tuple dominating set problem

On minimum m-connected k-dominating set problem in unit disc graphs

IN WIRELESS SENSOR NETWORKS

Connected Dominating Sets in Wireless Networks with Different Transmission Ranges

An Approximation Algorithm for Connected Dominating Set in Ad Hoc Networks

A Constant Factor Distributed Algorithm for Computing Connected Dominating Sets in Wireless Sensor Networks

Minimum connected dominating sets and maximal independent sets in unit disk graphs

Approximating Node-Weighted Multicast Trees in Wireless Ad-Hoc Networks

Constructing weakly connected dominating set for secure clustering in distributed sensor network

Agreedy approximation for minimum connected dominating sets

Extended Dominating Set and Its Applications in Ad Hoc Networks Using Cooperative Communication

Approximating Fault-Tolerant Steiner Subgraphs in Heterogeneous Wireless Networks

Chapter 8 DOMINATING SETS

Randomized Algorithms for Approximating a Connected Dominating Set in Wireless Sensor Networks

Chapter 8 DOMINATING SETS

Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks

Connected Dominating Set in Sensor Networks and MANETs

Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks

Chapter 6 DOMINATING SETS

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

On connected domination in unit ball graphs

A DISTRIBUTED TOPOLOGY CONTROL ALGORITHM FOR MANETS

Polynomial-Time Approximation Scheme for Minimum Connected Dominating Set in Ad Hoc Wireless Networks. Technical Report

arxiv: v2 [cs.ds] 25 Jan 2017

Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks

Distributed Data Aggregation Scheduling in Wireless Sensor Networks

EFFICIENT DISTRIBUTED ALGORITHMS FOR TOPOLOGY CONTROL PROBLEM WITH SHORTEST PATH CONSTRAINTS

Algorithm and Complexity of Disjointed Connected Dominating Set Problem on Trees

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

The Dominating Set Problem: (a few) variants and results

The 3-Steiner Root Problem

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Solution for Homework set 3

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

Learning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs

The Encoding Complexity of Network Coding

Weakly-Connected Dominating Sets and Sparse Spanners in Wireless Ad Hoc Networks

Distributed approximation algorithms in unit-disk graphs

Fault Tolerant Topology Control for One-to-All Communications in Symmetric Wireless Networks

Edge-Based Beaconing Schedule in Duty- Cycled Multihop Wireless Networks

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

Algorithmic Problems Related to Internet Graphs

Computing optimal total vertex covers for trees

Dual Power Management for Network Connectivity in Wireless Sensor Networks

An approximation algorithm for a bottleneck k-steiner tree problem in the Euclidean plane

1 The Traveling Salesperson Problem (TSP)

Total dominating set based algorithm for connected dominating set in Ad hoc wireless networks

Dual-Based Approximation Algorithms for Cut-Based Network Connectivity Problems

Revisiting Connected Dominating Sets: An Optimal Local Algorithm?

Constructing a Load-Balanced Virtual Backbone in Wireless Sensor Networks

ANALYZE AND EVALUATE THE IMPLEMENTATION OF CDS ALGORITHMS USING THE MOBILE AGENT.. 1 RAFAT AHMED ALHANANI, 2 JAAFAR ABOUCHABAKA, 3 RAFALIA NAJAT

FOUR EDGE-INDEPENDENT SPANNING TREES 1

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1

Sensor Scheduling for k-coverage in Wireless Sensor Networks

Number Theory and Graph Theory

Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

Complementary Graph Coloring

An improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1, a, Guoqiang LI 1, b Li LIU 1, c

Efficient Self Protection Algorithms for Wireless Sensor Networks

An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks

These notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models.

Bottleneck Steiner Tree with Bounded Number of Steiner Vertices

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

On approximate optimal dual power assignment for biconnectivity and edge-biconnectivity

Anonymous Self-Stabilizing Distributed Algorithms for Connected Dominating Set in a Network Graph

Theorem 2.9: nearest addition algorithm

An Eternal Domination Problem in Grids

Network monitoring: detecting node failures

A 2k-Kernelization Algorithm for Vertex Cover Based on Crown Decomposition

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

CME 305: Discrete Mathematics and Algorithms Instructor: Reza Zadeh HW#3 Due at the beginning of class Thursday 02/26/15

Efficient Aggregation Scheduling in Multihop Wireless Sensor Networks with SINR Constraints

An Extended Localized Algorithm for Connected Dominating Set Formation in Ad Hoc Wireless Networks

Clustering Using Graph Connectivity

Progress Towards the Total Domination Game 3 4 -Conjecture

Approximability Results for the p-center Problem

Discrete mathematics

Algorithmic aspects of k-domination in graphs

Maintaining CDS in Mobile Ad Hoc Networks

Outline. Introduction. Outline. Introduction (Cont.) Introduction (Cont.)

On 2-Subcolourings of Chordal Graphs

On Two Combinatorial Optimization Problems in Graphs: Grid Domination and Robustness

Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks

On the Parameterized Max-Leaf Problems: Digraphs and Undirected Graphs

Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-hoc Sensor Networks

The geometric generalized minimum spanning tree problem with grid clustering

Chordal Graphs: Theory and Algorithms

Graph Representations and Traversal

Sharp lower bound for the total number of matchings of graphs with given number of cut edges

Advanced Methods in Algorithms HW 5

An efficient implementation of the greedy forwarding strategy

Efficient Algorithm for the Paired-Domination Problem in Convex Bipartite Graphs

PERFECT MATCHING THE CENTRALIZED DEPLOYMENT MOBILE SENSORS THE PROBLEM SECOND PART: WIRELESS NETWORKS 2.B. SENSOR NETWORKS OF MOBILE SENSORS

Byzantine Consensus in Directed Graphs

Transcription:

Strongly Connected Dominating Sets in Wireless Sensor Networks with Unidirectional Links Ding-Zhu Du 1,MyT.Thai 1,YingshuLi 2,DanLiu 1, and Shiwei Zhu 1 1 Department of Computer Science and Engineering, University of Minnesota, 200 Union Street, Minneapolis, MN 55455, USA {dzd, mythai, danliu, zhu}@cs.umn.edu 2 Department of Computer Science, Georgia State University, 34 Peachtree Street, Atlanta, GA 30303, USA yli@cs.gsu.edu Abstract. A Connected Dominating Set (CDS) can serve as a virtual backbone for a wireless sensor network since there is no fixed infrastructure or centralized management in wireless sensor networks. With the help of CDS, routing is easier and can adapt quickly to network topology changes. The CDS problem has been studied extensively in undirected graphs, especially in unit disk graphs, in which each sensor node has the same transmission range. However, in practice, the transmission ranges of all nodes are not necessarily to be equal. In this paper, we model a network as a disk graph where unidirectional links are considered and introduce the Strongly Connected Dominating Set (SCDS) problem in disk graphs. We propose two constant approximation algorithms for the SCDS problem and compare their performances through the theoretical analysis. Keywords: Strongly Connected Dominating Set, Disk Graph, Wireless Sensor Network, Virtual Backbone, Directed Graph. 1 Introduction Recent advances in technology have made possible the creation of Wireless Sensor Networks (WSNs). WSNs can be used in a wide-range of potential applications both in military and people s daily lives. In WSNs, there is no fixed or pre-defined infrastructure. Nodes in WSNs communicate via a shared medium, either through a single hop or multiple hops. Although there is no physical backbone infrastructure, a virtual backbone can be formed by constructing a Connected Dominating Set (CDS). Given an undirected graph G =(V,E), a subset V V is a CDS of G if for each node u V, u is either in V or there exists a node v V such that uv E and the subgraph induced by V, i.e., G(V ), is connected. The nodes in the CDS are called dominators, other nodes are called dominatees. With the help of CDS, routing is easier and can adapt quickly to network topology changes. To reduce the traffic during communication and simplify the connectivity management, it is desirable to construct a Minimum CDS (MCDS). X. Zhou et al. (Eds.): APWeb 2006, LNCS 3841, pp. 13 24, 2006. c Springer-Verlag Berlin Heidelberg 2006

14 D.-Z. Du et al. Fig. 1. A Disk Graph Representing a Network The CDS problem has been studied intensively in Unit Disk Graph (UDG), in which each node has a same transmission range. The MCDS problem in UDG has been shown to be NP-hard. To build a CDS, most of the current algorithms first find a Maximal Independent Set (MIS) I of G and then connect all the nodes in I to have a CDS. The independent set I is a subset of V such that for any two nodes u, v I, uv / E. In other words, the nodes in I are pairwise nonadjacent. A maximal independent set is an independent set such that no more nodes can be added to remain the non-adjacency property. The most relevant related work using this scheme are in [3] and [4]. In [3], Wan et al. proposed the first distributed algorithm with the performance ratio of 8. Later, Li et al. proposed a better algorithm with the performance ratio of (4.8 + ln 5) by constructing a Steiner tree when connecting all the nodes in I [4]. However, in practice, the transmission ranges of all the nodes are not necessarily to be equal. In this case, a wireless ad hoc network can be modelled using a directed graph G =(V,E). The nodes in V are located in a Euclidean plane and each node v i V has a transmission range r i [r min,r max ]. A directed edge (v i,v j ) E if and only if d(v i,v j ) r i where d(v i,v j ) denotes the Euclidean distance between v i and v j. Such graphs are called Disk Graphs (DG). An edge (v i,v j ) is unidirectional if (v i,v j ) E and (v j,v i ) / E. Anedge(v i,v j ) is bidirectional if both (v i,v j )and(v j,v i )areine, i.e., d(v i,v j ) min{r i,r j }. In other words, the edge (v i,v j ) is bidirectional if v i is in the disk D j centered at v j with radius r j and v j is in the disk D i centered at v i with radius r i.figure1 gives an example of a DG representing a network. In Figure 1, the dotted circles represent the transmission ranges and the directed edges represent the unidirectional links in G while the undirected edges represent the bidirectional links. In this paper, we study the Strongly Connected Dominating Set (SCDS) problem in directed disk graphs. Given a directed graph G =(V,E), a subset S V is a Dominating Set (DS) of G if for any node u V, u S or there exists v S such that (v, u) E. S is strongly connected if for every pair u and v S, there exists a directed path from u to v in the directed graph induced by S, i.e., G(S). Formally, the SCDS problem can be defined as follows: Definition 1. Strongly Connected Dominating Set (SCDS) Problem: Given a directed disk graph G =(V,E), find a subset S V with minimum size, such that the subgraph induced by S, calledg(s) is strongly connected and S forms a dominating set in G.

Strongly Connected Dominating Sets in Wireless Sensor Networks 15 The SCDS problem is NP-hard since the MCDS problem in UDG is NPhard and UDG is a special case of DG. Note that in directed graphs, an MIS is not necessary a DS. Hence we cannot find an MIS and connect it to construct a SCDS. Instead, we need to find a DS directly and then connect it to form a SCDS. Based on this approach, we present two constant approximation algorithms for computing a minimum SCDS in DG, called Connected Dominating Set using the Breath First Search tree (CDS-BFS) and Connected Dominating Set using the Minimum Nodes Steiner tree (CDS-MNS) algorithms. The main differences of these two algorithm are the construction to connect the obtained dominating set. To guarantee that the graph G has a solution for the SCDS problem, we assume that G is a strongly connected graph. The remainder of this paper is organized as follows. Section 2 describes the related research work on the CDS problem, both in undirected and directed graphs. The CDS-BFS algorithm and its theoretical analysis are discussed in section 3. Section 4 presents the CDS-MNS algorithm as well as shows the performance ratio of CDS-MNS and its improvements over the previous algorithm. Finally, Section 5 ends the paper with conclusions and some future work. 2 Related Work The CDS problem in wireless sensor networks has been studied extensively in undirected graphs. Algorithms that construct a CDS can be divided into two categories based on their algorithm designs: centralized algorithms and decentralized algorithms. The centralized algorithms usually yield a smaller CDS with a better performance ratio than that of decentralized algorithms. The decentralized algorithms can be further divided into two categories: distributed algorithms and localized algorithms. In distributed algorithms, the decision process is decentralized. In the localized algorithms, the decision process is not only distributed but also requires only a constant number of communication rounds. Based on the network models, these algorithms can be classified into two types: directed graphs and undirected graphs. For undirected graphs, they can be further divided into three categories: general undirected graphs, unit disk graphs, anddisk graphs. When modelling a network as a general undirected graph G, the algorithm s performance ratio is related to where is the maximum degree of G. When modelling a network as a unit disk graph, the performance ratio is constant due to the special geometric structure of UDG. In directed graphs, to our knowledge, there is only one work to find a SCDS [10]. In [10], the authors presented a localized algorithm to construct a SCDS using the marking process. The authors did not present the analysis of the performance ratio. In undirected graphs, several work have been studied in recent research literature. In [6], Guha and Khuller first proposed two polynomial time algorithms to construct a CDS in a general undirected graph G. These algorithms are greedy and centralized. The first one has an approximation ratio of 2(H( )+1)where H is a harmonic function. The idea of this algorithm is to build a spanning tree

16 D.-Z. Du et al. T rooted at the node that has a maximum degree and grow T until all nodes are added to T. The non-leaf nodes in T form a CDS. In particular, all the nodes in a given network are white initially. The greedy function that the algorithm uses to add the nodes into T is the number of the white neighbors of each node or a pair of nodes. The one with the largest such number is marked black and its neighbors are marked grey. These nodes (black and grey nodes) are then added into T.The algorithm stops when no white node exists in G. The second algorithm is an improvement of the first one. This algorithm consist of two phases. The first phase is to construct a dominating set and the second phase is to connect the dominating set using a Steinter tree algorithm. With such improvement, the second algorithm has a performance ratio of H( ) + 2. In [7], Ruan et al. introduced another centralized and greedy algorithm of which the approximation ratio is (2 + ln ). For the localized algorithms, Wu and Li [8] proposed a simple algorithm that can quickly determine a CDS based on the connectivity information within the 2-hops neighbors. This approach uses a marking process. In particular, each node is marked true if it has two unconnected neighbors. All the marked nodes form a CDS. The authors also introduced some dominant pruning rules to reduce the size of the CDS. In [3], the authors showed that the performance ratio of [8] is within a factor of O(n) wheren is the number of the nodes in a network. For UDG, most of the proposed algorithms are distributed algorithms, of which the main approach is to find a Maximal Independent Set (MIS) and then to connect this set. Note that in an undirected graph, an MIS is also a dominating set (DS). In [3], the authors proposed a distributed algorithm for a CDS problem in UDG. This algorithm consists of two phases and has a constant approximation ratio of 8. The algorithm first constructs a spanning tree. Then each node in a tree is examined to find an MIS for the first phase. All the nodes in an MIS are colored black. At the second phase, more nodes are added (color blue) to connect those black nodes. Later, Cardei et al. presented another 2-phase distributed algorithm for a CDS in UDG. This algorithm has the same performance ratio of 8. However, the improvement over [3] is the message complexity. The root does not need to wait for the COMPLETE message from the furthest nodes. Recently, Li et al. proposed another distributed algorithm with a better approximation ratio, which is (4.8 + ln 5) [4]. This algorithm also has two phases. At the first phase, an MIS is found. At the second phase, a Steiner tree algorithm is used to connect the MIS. The Steiner tree algorithm takes the property which is that any node in UDG is adjacent to at most 5 independent nodes into consideration. For the localized algorithms, in [9], Alzoubi et al. proposed a localized 2-phase algorithms with the performance ratio of 192. At the first phase, an MIS is constructed using the one-hop neighbors information. Specifically, once a node knows that it has the smallest ID within its neighbors, it becomes a dominator. At the second phase, the dominators are responsible for identifying a path to connect the MIS. In [2], Li et al. proposed another localized algorithm with the performance ratio of 172. This localized algorithm has only 1 phase. A node marks itself as a dominator if it can cover the most white nodes compared to its 2-hop neighbors.

Strongly Connected Dominating Sets in Wireless Sensor Networks 17 For undirected disk graphs, Thai et al. recently have proposed three constant centralized algorithms which can be implemented as distributed algorithms [1]. These algorithms use a similar approach as in UDG, that is to find an MIS and then to connect it. However, the authors in [1] took the different transmission rages of nodes in networks into consideration. None of the above work has studied the SCDS problem in directed disk graphs. The SCDS problem in directed disk graphs is very practical since nodes in wireless ad hoc networks usually have different transmission ranges. Hence a node u in a given network can communicate directly with node v but node v might not be able to communicate directly with node u. Motivated by this, we study the SCDS problem and present two approximation algorithms in the next two sections. 3 The CDS-BFS Algorithm In this section, we introduce the Connected Dominating Set using Breath First Search tree (CDS-BFS) algorithm to construct a SCDS of a directed disk graph G =(V,E). We then analyze its performance ratio based on the geometric characteristics of disk graphs. Let us first begin this section with some graph theoretic notations that are used throughout this paper. For an arbitrary vertex v V, let N (v) be the set of its incoming neighbors, i.e., N (v) ={u (u, v) E}. Let N [v] =N (v) {v} be the set of closed in-coming neighbors of v. Likewise, let N + (v) be the set of its outgoing neighbors, i.e., N + (v) ={u (v, u) E} and N + [v] denote the set of the closed out-going neighbors of v. 3.1 Algorithm Description The CDS-BFS algorithm has two stages. At the first stage, we find the Dominating Set (DS) S of G using a greedy method shown in Algorithm 1. Specifically, as described in Algorithm 1, at each iteration, we find a node u which has the largest transmission range in V and color it black. Remove the closed out-going neighbors of u from V, i.e, V = V N + [u]. Note that a node u is added to S if and only if the constructed S so far does not dominate u yet. Clearly, the set of black nodes S forms a DS of G. At the second stage, two Breath First Search (BFS) trees are constructed to connect S. Lets denote a node with the largest transmission range in S and v i,i=1...p be the other nodes in S. LetT f (s) =(V f,e f ) denote a forward tree rooted at s such that there exists a directed path from s to all v i,i=1...p. Also let T b (s) =(V b,e b ) denote a backward tree rooted at s such that for any node v i,i =1...p, there exists a directed path from v i to s. Note that the graph H that is the union of two such trees is a feasible solution to our SCDS problem. In other words, the graph H containing all the nodes in S and H is strongly connected. First, construct a BFS tree T 1 of G rooted at s. LetL j,j =1...l be the set of nodes at level j in T 1 where l is the depth of T 1.NotethatL 0 = {s}. Ateach

18 D.-Z. Du et al. Algorithm 1 Find a Dominating Set 1: INPUT: A directed disk graph G =(V,E) 2: OUTPUT: A dominating set S 3: S = 4: while V do 5: Find a node u V with the largest radius r u and color u black 6: S = S {u} 7: V = V N + [u] 8: end while 9: Return S level j, lets j be the black nodes in L j, i.e, S j = L j S, and S j be the non-black nodes in L j, i.e., S j = L j S j.weconstructt f (s) as follows. Initially, T f (s) has only one node s. At each iteration j, for each node u S j, we find a node v such that v N (u) L j 1.Ifv is not black, color it blue. In other words, we need to find a node v such that v is an in-coming neighbor of u in G and v is in the previous level of u in T 1.Addv to T f (s) wherev is the parent of u. This process stops when j = l. Next, we need to identify the parents of all the blue nodes. Similarly, at each iteration j, for each blue node u S j, find a node v N (u) S j 1 and set v as the parent of u in T f (s). If no such black v exists, select a blue node in N (u) S j 1.ThusT f (s) consists of all the black and blue nodes and there is a directed path from s to all the other nodes in S. Now, we need to find the T b (s). First, construct a graph G =(V,E )where E = {(u, v) (v, u) E}. In other words, we reverse all the edges in G to obtain G. Next, we build the second BFS tree T 2 of G rooted at s. Then follow the above procedure to find a T f (s) such that there exists a directed path from s to all the other nodes in S. Then reverse all the edges in T f (s) backtotheir original directions, we have T b (s). Hence H = T f (s) T b (s) is the strongly connected subgraph where all the nodes in H form a SCDS. The construction of the CDS-BFS tree is described in Algorithm 2. 3.2 Theoretical Analysis Lemma 1. For any two black nodes u and v in S, d(u, v) >r min. Proof. This is trivial. Without loss of generality, assume that r u >r v >= r min. Algorithm 1 would mark u as a black node before v. Assume that d(u, v) r min, then v N + (u). Hence v cannot be black, contradicting our assumption. Lemma 2. In a directed disk graph G =(V,E), the size of any dominating set S is upper bounded by where k = r max r min 2.4(k + 1 2 )2 opt +3.7(k + 1 2 )2 and opt is the size of the optimal solution of the SCDS problem.

Strongly Connected Dominating Sets in Wireless Sensor Networks 19 Algorithm 2 CDS-BFS 1: INPUT: A directed disk graph G =(V,E) 2: OUTPUT: A Strongly Connected Dominating Set C 3: Find a DS S using Algorithm 1 4: Choose node s S such that r s is maximum 5: Construct a BFS tree T 1 of G rooted at s 6: Construct a tree T f (s) such that there exists a directed path in T f (s) froms to all other nodes in S as follows: 7: for j =1tol do 8: L j is a set of nodes in T 1 at level j 9: S j = L j S; S j = L j S j; T f (s) ={s} 10: for each node u S j do 11: select v (N (u) L j 1) andsetv as a parent of u. Ifv is not black, color v blue 12: end for 13: end for 14: for j =1tol do 15: for each blue node u S j do 16: if N (u) S j 1 then 17: select v (N (u) S j 1) andsetv as a parent of u. 18: else 19: select v (N (u) S j 1) andsetv as a parent of u. 20: end if 21: end for 22: end for 23: Reverse all edges in G to obtain G 24: Construct a BFS tree T 2 of G rooted at s 25: Construct a tree T f (s) such that there exists a directed path in T f (s) froms to all other nodes in S 26: Reverse all edges back to their original directions, then T f (s) becomet b (s) where there exists a directed path from all other nodes in S to s 27: H = T f (s) T b (s) 28: Return all nodes in H Proof. Due to space limitation, the detailed proof is omitted. The basic idea of this proof is as follows. From Lemma 1, the set of all the disks centered at the nodes in S with radius r min /2 are disjoint. Thus the size of any DS bounded by the maximum number of disks with radius r min /2packingintheareacovered by the optimal SCDS. Theorem 1. The CDS-BFS algorithm produces a SCDS with the size bounded by 12(k + 1 2 )2 opt +18.5(k + 1 2 )2 where k = rmax r min. Proof. Let C denote the SCDS obtained from the CDS-BFS algorithm. Let B T f and B T b bethebluenodesint f (s) andt b (s) respectively. We have:

20 D.-Z. Du et al. C = B T f + B T b + S 5 S C 5[2.4(k + 1 2 )2 opt +3.7(k + 1 2 )2 ] C 12(k + 1 2 )2 opt +18.5(k + 1 2 )2 Corollary 1. If the maximum and minimum transmission ranges are bounded, then the CDS-BFS algorithm has an approximation factor of O(1). 4 The CDS-MSN Algorithm In the previous section, we use the bread first search tree to construct the tree interconnecting all the black nodes in S. This scheme is simple and fast. However, we can reduce the size of the obtained SCDS further by reducing the number of the blue nodes which are used to connect all the black nodes. In other words, we need to construct a tree with the minimum number of blue nodes to interconnect all the black nodes. The problem can be formally defined as follows: Definition 2. Directed Steiner tree with Minimum Steiner Nodes (DSMSN): GivenadirectedgraphG = (V,E) and a set of nodes S V called terminals, construct a directed Steiner tree T rooted at s V such that there exists a directed path from s to all the terminals in T and the number of the Steiner nodes is minimum. Note that a Steiner node is a node in T but not a terminal. In the SCDS problem context, Steiner nodes are also the blue nodes. Once we solve the DSMSN problem, we can use this solution to solve the SCDS problem. Initially, all the nodes in S are black and the other nodes in V are white. First, let us introduce the following definitions. Definition 3. Spider: A spider is defined as a directed tree having at most one white node of out-degree more than two and the other nodes are either black or blue. Such a white node is called a root of the spider. A v-spider is a spider rooted at a white node v. Each directed path from v to a leaf is called a leg. Note that all the nodes in each leg except v are either blue or black. Definition 4. Contracting Operation: Let U be a set of out-going neighbors of all the black and blue nodes in a v-spider. To contract a v-spider, for each white node u U, create a directed edge (v, u). We then delete all the black and blue nodes in the v-spider and color v blue. Figure 2 shows an example of a spider contracting operation. To solve the DSMSN problem, we repeatedly find a v-spider such that this spider has a maximum number of black and blue nodes and then contract this spider. The detail of this algorithm is described in Algorithm 3. The correctness of Algorithm 3 is obvious. Since this algorithm is a solution of the DSMSN problem, we are now ready to introduce the CDS-MSN algorithm.

Strongly Connected Dominating Sets in Wireless Sensor Networks 21 s s 1 v 1 v 2 4 6 Contracting 2 7 3 5 8 7 3 8 Fig. 2. A Spider Contracting Operation Algorithm 3 DSMSN(G, s, S) 1: INPUT: Graph G =(V,E), a root s, a set of black nodes S 2: OUTPUT: A tree T rooted at s interconnecting all nodes in S 3: T = ; 4: while The number black and blue nodes in G>1 do 5: Find a white node v such that v-spider has the most number of black and blue nodes 6: Contracting this v-spider and update G 7: end while 8: Construct T from the set of black and blue nodes 4.1 Algorithm Description The CDS-MSN algorithm consists of two stages. Similar to the CDS-BFS algorithm, the CDS-MSN constructs the dominating set S using Algorithm 1 at the first stage. At the second stage, the DSMSN algorithm as shown in Algorithm 3 is deployed to find a strongly connected dominating set. Choose s S such that r s is the largest. Note that all the nodes in S except s are black and the other nodes in V are white. Similar to the CDS-BFS algorithm, we need to construct T f (s) andt b (s). Let S = S {s}. T f (s) is constructed by calling algorithm DSMSN(G, s, S ). Next, construct a graph G =(V,E ) such that an edge (u, v) isine if and only if the edge (v, u) isine. Thenwe call the algorithm DSMSN(G,s,S )toobtainatreet f (s). Then reverse all the edges in T f (s) back to their original directions, we have a tree T b (s). The union of these two trees is our solution to the SCDS problem. The main steps of the CDS-MSN algorithm are described in Algorithm 4. 4.2 Theoretical Analysis Lemma 3. Given a directed disk graph G = (V,E), for any arbitrary node v V, we have N + (v) S (2k +1) 2 where k = r max /r min.

22 D.-Z. Du et al. Algorithm 4 CDS-MSN 1: INPUT: A directed graph G =(V,E) 2: OUTPUT: A strongly connected dominating set C 3: Find a DS S using Algorithm 1 4: Choose node s S that r s is maximum 5: S = S {s} 6: All nodes in S are black, others are white 7: T f (s) =DSMSN(G, s, S ) 8: Reverse all edges in G to obtain G 9: All nodes in S are black, others are white 10: T f (s) =DSMSN(G,s,S ) 11: Reverse all edges in T f (s) toobtaint b (s) 12: H = T f (s) T b (s) 13: Return all nodes in H Proof. Recall that N + (v) is a set of out-going neighbors of v and S is a dominating set of G. Letv be a node with the largest transmission range. From Lemma 1, we have d(u, v) r min where u, v S. Hence the size of N + (v) S is bounded by the maximum number of disjoint disks with radius r min /2packing in the disk centered at v with radius of r max + r min /2. We have: N + (v) S π(r max + r min /2) 2 π(r min /2) 2 (2k +1) 2 Let T be an optimal tree when connecting a given set S and C(T )isthe number of the Steiner nodes in T.AlsoletB be a set of blue nodes in T where T is the solution of the DSMSN problem obtained from Algorithm 3, we have the following lemma: Lemma 4. The size of B is at most (1 + 2 ln(2k +1))C(T ) Proof. Let n = S and p = B. LetG i be the graph G at the iteration i after a spider contracting operation. Let v i,i=1...p be the blue nodes in the order of appearance in Algorithm 3 and let a i be the number of the black and blue nodes in G i.alsoletc(ti ) be the optimal solution of G i.ifn = 1, then the lemma is trivial. Assume that n 2, thus C(T ) 1. Since at each iteration i, wepicka white node v such that the v-spider has the maximum number of black and blue a nodes, the number of black and blue nodes in v-spider must be at least i C(Ti ). Thus we have: a i+1 a i a i C(Ti ) a i a i C(T ) Note that a p = 1 hence a p C(T ). Also, initially, a 0 = n>c(t ). Then there exists h, 1 h p such that a h C(T )anda h+1 <C(T ). Thus we have:

Strongly Connected Dominating Sets in Wireless Sensor Networks 23 a h a h 1 a ( h 1 C(T ) a h 1 1 1 ) ( C(T a h 2 1 1 ) 2 ) C(T... ) ( a h a 0 1 1 ) h C(T a 0 e h C(T ) ) The last step uses the fact that ln(1 x) x. Therefore, e h a C(T ) 0 h C(T ) ln a 0 n ln a h C(T 2ln(2k +1) ) The last step uses Lemma 3. We conclude that B = p h + a h+1 (1 + 2 ln(2k +1))C(T ) Theorem 2. The CDS-MNS algorithm produces a SCDS with size bounded by: (2.4(k + 1 2 )2 +2+4ln(2k +1))opt +3.7(k + 1 2 )2 where k = rmax r min Proof. Let C denote the SCDS obtained from the CDS-BFS algorithm. Let B T f and B T b bethebluenodesint f (s) andt b (s) respectively. From Lemma 3 and 4, we have: C = S + B T f + B T b 2.4(k + 1 2 )2 opt +3.7(k + 1 2 )2 +2(1+2ln(2k +1))opt a h C (2.4(k + 1 2 )2 +2+4ln(2k +1))opt +3.7(k + 1 2 )2 Corollary 2. If the maximum and minimum transmission ranges are bounded, then the CDS-MSN algorithm has an approximation factor of O(1). 5 Conclusions In this paper, we have studied the Strongly Connected Dominating Set (SCDS) problem in directed disk graphs where both unidirectional and bidirectional links are considered. The directed disk graphs can be used to model wireless sensor networks where nodes have different transmission ranges. We have proposed two approximation algorithms and shown that the obtained SCDS is within a constant factor of the optimal SCDS. The main approach in our algorithms is to construct a dominating set and then connect them. Through the theoretical analysis, we have shown that using a Steiner tree with the minimum number of Steiner nodes to interconnect the dominating set can help to reduce the size of the SCDS. In order for a node u to send data using the SCDS C, a node u is not only dominated by some nodes in C but also has an out-going neighbor in C. Thus we are interested to study this problem in the future.

24 D.-Z. Du et al. References 1. M. T. Thai, F. Wang, D. Liu, S. Zhu, and D.-Z. Du, Connected Dominating Sets in Wireless Networks with Different Transmission Ranges, Manuscript, 2005. 2. Y. Li, S. Zhu, M. T. Thai, and D.-Z. Du, Localized Construction of Connected Dominating Set in Wireless Networks, NSF International Workshop on Thoretical Aspects of Wireless Ad Hoc, Sensor and Peer-to-Peer Networks, 2004. 3. P.-J. Wan, K. M. Alzoubi, and O. Frieder, Distributed Construction on Connected Dominating Set in Wireless Ad Hoc Networks, Proceedings of the Conference of the IEEE Communications Society (INFOCOM), 2002. 4.Y.Li,M.T.Thai,F.Wang,C.-W.Yi,P.-J.Wang,andD.-Z.Du, OnGreedy Construction of Connected Dominating Sets in Wireless Networks, Special issue of Wireless Communications and Mobile Computing (WCMC), 2005. 5. M. Cardei, M.X. Cheng, X. Cheng, and D.-Z. Du, Connected Domination in Ad Hoc Wireless Networks, Proceedings of the Sixth International Conference on Computer Science and Informatics (CSI), 2002. 6. S. Guha and S. Khuller, Approximation Algorithms for Connected Dominating Sets, Algorithmica, vol. 20, pp. 374 387, 1998 7. L. Ruan, H. Du, X. Jia, W. Wu, Y. Li, and L.-I. Ko, A Greedy Approximation for Minimum Connected Dominating Sets, Theoretical Computer Science, 2005. To appear 8. J. Wu and H. Li, On Calculating Connected Dominating Sets for Efficient Routing in Ad Hoc Wireless Networks, Proceedings of the Third International Workshop Discrete Algorithms and Methods for Mobile Computing and Comm., 1999. 9. K.M. Alzoubi, P.-J. Wang, and O. Frieder, Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks, Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC), 2002. 10. F. Dai and J. Wu, An Extended Localized Algorithms for Connected Dominating Set Formation in Ad Hoc Wireless Networks, IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 10, October 2004