two-tiered constrained relay node placement in wireless sensor
TRANSCRIPT
1
Two-Tiered Constrained Relay NodePlacement in Wireless Sensor Networks:Computational Complexity and Efficient
ApproximationsDejun Yang, Member, IEEE, Satyajayant Misra, Member, IEEE, Xi Fang, Member, IEEE,
Guoliang Xue, Fellow, IEEE, and Junshan Zhang, Senior Member, IEEE
AbstractโIn wireless sensor networks, relay node placement has been proposed to improve energy efficiency. In this paper, westudy two-tiered constrained relay node placement problems, where the relay nodes can be placed only at some pre-specifiedcandidate locations. To meet the connectivity requirement, we study the connected single-cover problem where each sensor nodeis covered by a base station or a relay node (to which the sensor node can transmit data), and the relay nodes form a connectednetwork with the base stations. To meet the survivability requirement, we study the 2-connected double-cover problem whereeach sensor node is covered by two base stations or relay nodes, and the relay nodes form a 2-connected network with the basestations. We study these problems under the assumption that ๐ โฅ 2๐ > 0, where ๐ and ๐ are the communication ranges ofthe relay nodes and the sensor nodes, respectively. We investigate the corresponding computational complexities, and proposenovel polynomial time approximation algorithms for these problems. Specifically, for the connected single-cover problem, ouralgorithms have ๐ช(1)-approximation ratios. For the 2-connected double-cover problem, our algorithms have ๐ช(1)-approximationratios for practical settings and ๐ช(ln๐)-approximation ratios for arbitrary settings. Experimental results show that the number ofrelay nodes used by our algorithms is no more than twice of that used in an optimal solution.
Index TermsโRelay node placement, wireless sensor networks, connectivity and survivability.
โฆ
1 INTRODUCTION
IN wireless sensor networks (WSNs), many low-cost and low-power sensor nodes (SNs)[1] sense the
environment and transmit sensed information overpossibly multiple hops to the base stations (BSs).Since energy conservation is a primary concern inWSNs, there has been extensive research on energyaware routing [5, 14, 20, 35]. To prolong networklifetime while meeting certain network specifications,researchers have proposed to deploy a small numberof relay nodes (RNs) in a WSN to communicate withthe SNs, BSs, and other RNs [2, 3, 6, 9, 13, 16, 18, 22,23, 34]. This is studied under the theme of relay nodeplacement.
In general, the relay node placement problem hasbeen studied from two perspectives, namely the rout-ing structure and the connectivity requirements. Thestudy based on the routing structure may be furtherclassified into single-tiered and two-tiered [9, 13, 23, 27].
โ Dejun Yang, Xi Fang, Guoliang Xue and Junshan Zhang are af-filiated with Arizona State University, Tempe, AZ 85287. E-mail:{dejun.yang, xi.fang, xue, junshan.zhang}@asu.edu.
โ Satyajayant Misra is affiliated with New Mexico State University, LasCruces, NM 88003. Email: [email protected].
โ This research was supported in part by NSF grant 0901451 and AROgrant W911NF-09-1-0467. The information reported here does notreflect the position or the policy of the federal government.
In single-tiered relay node placement, the SNs mayalso forward packets. In two-tiered relay node place-ment, the SNs transmit their sensed data to an RNor a BS, but do not forward packets for other nodes.The two-tiered network is essentially a cluster-basednetwork, where each RN acts as the cluster head in thecorresponding cluster. Extensive research efforts havebeen done on cluster-based networks, for example,energy-efficient cluster-based protocol designed byHeinzelman et al. [14], topology control presented byPan et al. [27], and clustering algorithms proposed byGupta and Younis [11], and Younis and Fahmy [35].The study based on connectivity requirements can beclassified into connected and survivable [2, 3, 13, 18, 36].For connected relay node placement, the placement ofRNs ensures the connectivity between the SNs andthe BSs. For survivable relay node placement, theplacement of RNs ensures the biconnectivity betweenthe SNs and the BSs.
Most of the previous works [2, 3, 6, 9, 12, 13,18, 22, 23, 32, 36] study unconstrained relay nodeplacement, in the sense that the RNs can be placedanywhere. In practice, however, there may be somephysical constraints on the placement of the RNs:e.g., there may be a lower bound on the distancebetween two nodes to reduce interference; or theremay be some forbidden regions where relay nodescannot be placed. For instance, in a WSN application
Digital Object Indentifier 10.1109/TMC.2011.126 1536-1233/11/$26.00 ยฉ 2011 IEEE
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
2
for monitoring an active volcano that is ready to erupt,the inside of the crater (where the temperature couldreach many thousand degrees) is a forbidden regionfor the placement of relay nodes (any nodes). In anutshell, there are many such practical applicationswhere the placement in general is constrained.
The relay node placement problem subject to for-bidden regions and the lower bound on internodedistances, is intrinsically more challenging, comparedto its unconstrained counterpart. Taking an initial steptowards solving this challenging problem, we studyconstrained relay node placement problems where theRNs can only be placed at a set of candidate locations.Our formulation can be viewed as an approximationto the aforementioned relay node placement problem,subject to the constraints of forbidden regions and thelower bound on internode distance in the followingsense. Instead of allowing the relay nodes to be placedanywhere outside of the forbidden regions and satis-fying the internode distance bound, we further restrictthe placement of the relay nodes to certain candidatelocations that are outside of the forbidden regions.The use of candidate locations simultaneously ap-proximates the constraints enforced by the forbiddenregions and the internode distance bound.
1.1 Main ContributionsIn this paper, we study the two-tiered constrained re-lay node placement problem, under both connectivityand survivability requirements. As discussed earlier,the two-tiered problem strongly resembles the realworld deployment of WSNs. Our main contributionsare summarized as follows:
โ To the best of our knowledge, this is the first workto study constrained relay node placement in thetwo-tiered model. The model under considerationassumes the usage of base stations, but it isstraightforward to extend our algorithms to thecases without base stations. Furthermore, it isassumed that the communication range of therelay nodes is at least twice of that of the sensornodes, without which the approximations of ouralgorithms may not hold, but this assumptionhas been shown to be valid for most scenarios ofHWSNs [13, 32] and adopted in [25, 36] as well.
โ We study the relay node placement problem withconnectivity requirement, named the connectedsingle-cover problem (1CSCP). In this problem, ourobjective is to place a minimum number of RNssuch that (1) each SN is covered by at least one BSor RN and (2) the RNs form a connected networkwith the BSs. We formulate the problem, proveits NP-hardness, and present a polynomial time๐ช(1)-approximation algorithm.
โ We study the relay node placement problem withsurvivability requirement, named the 2-connecteddouble-cover problem (2CDCP). In this problem,we intend to place a minimum number of RNs
such that (1) each SN is covered by at least twoBSs or RNs and (2) the RNs form a 2-connectednetwork with the BSs. We formulate the problem,study its computational complexity, and presentpolynomial time approximation algorithms. Ouralgorithms have ๐ช(1)-approximation ratios forpractical settings, where there is a constant boundon the number of candidate RN locations each SNcan be connected to, and ๐ช(ln๐)-approximationratios for arbitrary settings.
1.2 Paper OrganizationThe rest of the paper is organized as follows. InSection 2, we provide a brief literature survey. InSection 3, we present the preliminary definitions andlemmas. In Section 4, we study 1CSCP. In Section 5,we study 2CDCP. Section 6 presents linear program-ming formulations for efficiently computing lowerbounds on the optimal solutions of the relay nodeplacement problems. We present experimental resultsin Section 7 and conclude the paper in Section 8.
2 RELATED WORKIn this section, we briefly review the related work.Throughout, we will use ๐ and ๐ to denote thecommunication ranges of SNs and RNs, respectively.We will use ๐ = 1 to denote connectivity requirementand ๐ โฅ 2 to denote survivability requirement. Theproblems studied in this paper fall under the two-tiered classification. For the single-tiered classification,we refer interested readers to [2, 3, 6, 9, 12, 13, 18, 21โ23, 25, 32, 36].
The two-tiered relay node placement problem hasbeen studied by [9, 12, 13, 22, 23, 32, 36]. The two-tiered model applies well to the highly scalable clus-tered wireless sensor networks [11], wherein the RNsact as the cluster heads [11, 27, 34]. In the two-tieredproblems formulated by Hao et al. [13], an SN hasto connect to at least 2 RNs and the RNs need toform a 2-connected network, under the assumptionthat ๐ โฅ ๐. Sometimes, the SNs may be assigneddifferent power levels to minimize the total powerconsumption [4]. In [12], Han et al. studied relaynode placement in a heterogeneous WSN, where theSNs have different transmission radii. They presented๐ช(1)-approximation algorithms for given ๐ โฅ 2. Liu etal. [22] proposed two ๐ช(1)-approximation algorithmsfor the problem with ๐ = ๐ and ๐ = 2. Lloydand Xue [23] studied the problem for ๐ โฅ ๐ and๐ = 1, and proposed a (5 + ๐) algorithm, where๐ is any positive constant. Recently, Efrat et al. [9]improved it to PTAS [8]. Srinivas et al. [32] studiedthe problem of the maintenance of a mobile backboneusing the minimum number of backbone nodes giventhat ๐ โฅ 2๐ and ๐ = 1. Zhang et al. [36] studiedthe problem with ๐ โฅ ๐ and ๐ = 2 and presenteda (20 + ๐)-approximation algorithm when the BSs are
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
3
considered. To the best of our knowledge, our paperis the first work on two-tiered constrained relay nodeplacement.
3 DEFINITIONS AND PRELIMINARIESIn this section, we formally define the problems andpresent some basic lemmas to be used in later sec-tions. We consider a heterogeneous wireless sensornetwork (HWSN) consisting of three kinds of nodes:base stations (BSs), sensor nodes (SNs), and relay nodes(RNs). We are interested in the scenario where RNscan be placed only at certain candidate locations.Throughout this paper, we use โฌ to denote the set ofbase stations, ๐ฎ to denote the set of sensor nodes, and๐ณ to denote the set of candidate locations where relaynodes can be placed. We make the following assump-tions as in [13, 25, 32]. For given constants ๐ โฅ 2๐ > 0,the communication range of the SNs is ๐, that of theRNs is ๐ , and that of the BSs is much greater than๐ such that any two BSs can communicate directlywith each other (as they are connected, e.g., via eitherthe wired networks or the satellites). Note that theassumption ๐ โฅ 2๐ is valid for most scenarios ofHWSNs [13, 32]. For example, TelosB motes (possiblesensor nodes) have an outdoor transmission rangebetween 75m and 100m; IRIS motes (possible relaynodes) have an outdoor transmission range about300m; IEEE 802.11 routers (possible relay nodes) havean outdoor transmission range about 800m. We use๐(๐ฅ, ๐ฆ) to denote the Euclidean distance between twopoints ๐ฅ and ๐ฆ in the plane. We also use ๐ข to denotethe location of a node ๐ข, where it is unambiguous.
We are interested in a two-tiered set-up, wherethe SNs send the sensed data to an RN or a BSwithin distance ๐, while the RNs can forward receivedpackets to an RN or a BS within distance ๐ . We definethe hybrid communication graph (HCG) and the relaycommunication graph (RCG) in the following.
Definition 3.1: [Hybrid Communication Graph]Let ๐, ๐ , โฌ, ๐ฎ, and ๐ณ be given. Let โ be a subset of๐ณ . The hybrid communication graph ๐ป๐ถ๐บ(๐, ๐ ,โฌ,๐ฎ,โ)induced by the 5-tuple (๐, ๐ ,โฌ,๐ฎ,โ) is a directed graphwith vertex set ๐ = โฌโช๐ฎ โชโ and edge set ๐ธ definedas follows. For any two BSs ๐๐, ๐๐ โ โฌ, ๐ธ contains thebi-directed edge (๐๐, ๐๐). For an RN ๐ฆ โ โ and a node๐ฅ โ โฌ โชโ, ๐ธ contains the bi-directed edge (๐ฆ, ๐ฅ) if andonly if ๐(๐ฆ, ๐ฅ) โค ๐ . For an SN ๐ โ ๐ฎ and a node๐ฅ โ โ โช โฌ, ๐ธ contains the directed edge (๐ , ๐ฅ) if andonly if ๐(๐ , ๐ฅ) โค ๐. โก
Definition 3.2: [Relay Communication Graph] Let๐ , โฌ, and โ be given as in Definition 3.1. The relaycommunication graph ๐ ๐ถ๐บ(๐ ,โฌ,โ) induced by the 3-tuple (๐ ,โฌ,โ) is an undirected graph with vertex set๐ = โฌ โช โ and edge set ๐ธ defined as follows. Forany two BSs ๐๐, ๐๐ โ โฌ, ๐ธ contains the undirected edge(๐๐, ๐๐). For an RN ๐ฆ โ โ and a node ๐ฅ โ โฌ โช โ, ๐ธ
contains the undirected edge (๐ฆ, ๐ฅ) = (๐ฅ, ๐ฆ) if and onlyif ๐(๐ฆ, ๐ฅ) โค ๐ . โก
The HCG characterizes all possible pairwise com-munications between pairs of nodes. The RCG char-acterizes all possible communications between theRNs and/or BSs. We also define in the following theconcepts related to the weight and the relay size of anRCG. These concepts will be used later to establishrelationships between the weight of a subgraph andthe number of corresponding RNs. We use the follow-ing standard graph-theoretic notations: for a graph ๐บ,๐ (๐บ) denotes the vertex set of ๐บ and ๐ธ(๐บ) denotesthe edge set of ๐บ.
Definition 3.3: Let ๐บ = ๐ ๐ถ๐บ(๐ ,โฌ,๐ณ ) be a relaycommunication graph. Let โ be a given subset of ๐ณ .For each edge ๐ = (๐ข, ๐ฃ) in the ๐ ๐ถ๐บ, we define itsweight induced by โ (denoted by ๐คโ(๐)) as
๐คโ(๐) = โฃ{๐ข, ๐ฃ} โฉ (๐ณ โ โ)โฃ. (1)
Let โ be a subgraph of ๐บ. The weight of โ (denotedby ๐คโ(โ)) is defined as
๐คโ(โ) =โ
๐โ๐ธ(โ)
๐คโ(๐). (2)
The relay-size of โ (denoted by ๐โ(โ)) is defined as
๐โ(โ) = โฃ๐ (โ) โฉ (๐ณ โ โ)โฃ. (3)
We call ๐ a weight-0 edge if ๐คโ(๐) = 0, a weight-1 edgeif ๐คโ(๐) = 1, and a weight-2 edge if ๐คโ(๐) = 2. โก
The example in Fig. 1 illustrates Definition 3.3.
(a) HCG of the example (b) Deployed RNs for cover-ing the SNs
(c) RCG with weight on theedges
(d) A subgraph โ of ๐บ with๐โ(โ) = 2
Fig. 1: An example illustrating the concepts in Defi-nition 3.3. The hexagons represent the BSs, the circlesrepresent the SNs, and the squares represent the can-didate RN locations, of which the solid ones representthe deployed RNs for covering the SNs.
Lemma 3.1: Let โ be a subgraph of ๐ ๐ถ๐บ(๐ ,โฌ,๐ณ )and โ โ ๐ณ be a selected set of RNs. Assume thateach ๐ ๐ โ ๐ณ โ โ in โ has degree at least 2 (in โ),then ๐คโ(โ) โฅ 2 โ ๐โ(โ). โก
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
4
PROOF. This lemma can be proved by shifting theweight of an edge to its end nodes. We refer the readerto Lemma 2.1 in [25], while noting the followingdifferences. Instead of the HCG we consider an RCGhere, and instead of all RNs we consider only thosebelonging to ๐ณ โ โ.
We will also need the results stated in Lemma 3.2and Lemma 3.3. These lemmas have been proved byMisra et al. in [25, Lemma 2.2 and Lemma 2.3], westate them here without the proofs.
Lemma 3.2: Let ๐บ(๐,๐ธ) be an undirected 2-connected graph where โฃ๐ โฃ โฅ 3 and each edge๐ โ ๐ธ has a unit length ๐(๐) = 1. Let โ(๐,๐ธโฒ) bea minimum length 2-connected subgraph of ๐บ. Thenโฃ๐ธโฒโฃ โค 2โฃ๐ โฃ โ 3. โก
Lemma 3.3: Let ๐บ(๐,๐ธ) be an undirected con-nected graph where โฃ๐ โฃ โฅ 3 and each edge ๐ โ ๐ธ
has a unit length ๐(๐) = 1. Let โ(๐,๐ธโฒ) be a minimumlength connected subgraph of ๐บ such that two vertices๐ข and ๐ฃ are in the same 2-connected component ofโ if and only if they are in the same 2-connectedcomponent of ๐บ. Then โฃ๐ธโฒโฃ โค 2โฃ๐ โฃ โ 1. โก
As is standard, a polynomial time ๐ผ-approximationalgorithm for a minimization problem is an algorithm๐ธ that, for any instance of the problem, computes asolution that is at most ๐ผ times the optimal solutionto the instance, in time bounded by a polynomialin the input size of the instance [8]. Approximationalgorithm ๐ธ is also said to have an approximation ratioof ๐ผ. For graph-theoretic terms not defined in thispaper, we refer readers to the standard textbook [33].The terms nodes and vertices are used interchangeably,as well as terms links and edges. For concepts inalgorithms and the theory of computation, we referreaders to the standard textbooks [8, 10].
4 CONNECTED SINGLE-COVERIn this section, we study the connected single-coverproblem. Refer to the first paragraph in Section 3 forthe notations ๐, ๐ , โฌ, ๐ฎ, and ๐ณ .
4.1 Problem Definitions and NotationDefinition 4.1: [SCP] A subset โ โ ๐ณ is called a
single-cover (denoted by SC) of ๐ฎ if every SN in ๐ฎis within distance ๐ of โ โช โฌ. The size of the corre-sponding SC is โฃโโฃ. An SC of ๐ฎ is called a minimumsingle-cover (denoted by MSC) of ๐ฎ if it has the min-imum size among all SCs of ๐ฎ. The single-cover relaynode placement problem (denoted by SCP(๐,โฌ,๐ฎ,๐ณ )) for(๐,โฌ,๐ฎ,๐ณ ) seeks an MSC of ๐ฎ. โก
The SCP is closely related to the geometric disk hittingproblem (GDHP), defined formally in the following.
Definition 4.2: [GDHP] Given a set ๐ซ of points anda set ๐ of disks with radius ๐. A subset ๐ซ โฒ โ ๐ซ iscalled a hitting set if any disk in ๐ is hit by at least onepoint in ๐ซ โฒ, that is, the center of any disk is withindistance ๐ of at least one point in ๐ซ โฒ. The geometric
disk hitting problem (denoted by GDHP(๐,๐,๐ซ)) seeksa hitting set of minimum size. โก
Definition 4.3: [1CSCP] A subset โ โ ๐ณ is calleda connected single-cover (denoted by 1CSC) of ๐ฎ if (a)โ is a single-cover of ๐ฎ and (b) the relay communi-cation graph ๐ ๐ถ๐บ(๐ ,โฌ,โ) is connected. The size ofthe corresponding 1CSC is โฃโโฃ. A 1CSC is called aminimum connected single-cover (denoted by M1CSC)of ๐ฎ if it has the minimum size among all 1CSCsof ๐ฎ. The connected single-cover relay node placementproblem (denoted by 1CSCP) for (๐, ๐ ,โฌ,๐ฎ,๐ณ ) seeksan M1CSC of ๐ฎ. โก
Observe that existing studies [2, 6, 16, 18, 23, 32, 36]considered unconstrained relay node placement. Incontrast, our study here focuses on the connected sin-gle cover problem subject to constraints. The solutionsto some of the unconstrained problems may deploy anRN on top of an SN or another RN. In practice, thereare some physical constraints on the RN deployment.For example, there should be a minimum distancebetween two RNs to reduce interference. There mayalso be some forbidden regions where RNs cannot bedeployed. It is clear that our model is more practicalthan previous models. This work also differs from thework in [25], because we are studying a two-tierednetwork while [25] studied the single-tiered problem.
4.2 Computational ComplexityBefore designing algorithms for 1CSCP, we prove that1CSCP is NP-hard. We first prove that SCP is NP-hardby a reduction from GDHP, which is known to be NP-hard [24]. We then prove that 1CSCP is NP-hard by areduction from SCP.
Lemma 4.1: SCP is NP-hard. โก
PROOF. We prove this by reduction from GDHP. Letan instance โ1 of GDHP be given by (๐,๐,๐ซ). Aninstance โ2 of SCP is given by (๐,โฌ,๐ฎ,๐ณ ) where thesensor transmission range ๐ is the same as in โ1; theset of sensor nodes ๐ฎ is set to the centers of the disksin ๐; the set of relay candidate locations ๐ณ is set to ๐ซ ;and the set of base stations โฌ consists of a single point๐ that is not in any of the disks in ๐. This constructiontakes polynomial time. Moreover, a subset of ๐ซ is anoptimal solution to โ1 if and only it is an optimalsolution to โ2. This completes the proof.
Using the techniques in the proof of Lemma 4.1, wecan also construction a reduction from SCP to GDHP.More importantly, an ๐ผ-approximation algorithm forGDHP can be used as an ๐ผ-approximation algorithmfor SCP and vice versa.
Theorem 4.1: 1CSCP is NP-hard. โก
PROOF. Let an instance โ1 of SCP be given by(๐,โฌ,๐ฎ,๐ณ ), where โฌ = {๐1, . . . , ๐๐ต}, ๐ฎ = {๐ 1, . . . , ๐ ๐},๐ณ = {๐ฅ1, . . . , ๐ฅ๐ก}, and ๐ > 0. We constructan instance โ2 of 1CSCP by (๐, ๐ ,โฌ,๐ฎ,๐ณ ), where๐ = max1โค๐<๐โค๐ก โฃโฃ๐ฅ๐ โ ๐ฅ๐ โฃโฃ. This results in thesubgraph ๐บ(๐ ,๐ณ ) of the HCG to be a complete graph.
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
5
It is easy to see that a subset ๐ณ โฒ โ ๐ณ is an optimalsolution to โ1 if and only if it is an optimal solutionto โ2. Therefore, 1CSCP is NP-hard.
4.3 A Framework of Efficient Approximation Algo-rithms for 1CSCPIn this subsection, we present a framework of poly-nomial time approximation algorithms for 1CSCP.The framework decomposes 1CSCP into two sub-problems, outlined as follows. It first applies an al-gorithm ๐ธ for SCP to compute a single-cover โ๐ธ
of ๐ฎ with a small cardinality. It then applies an-other algorithm ๐น for the Steiner tree problem [17]to augment โ๐ธ by some other RNs โ๐น so that therelay communication graph ๐ ๐ถ๐บ(๐ ,โฌ,โ๐ธ โช โ๐น) isconnected. The union of โ๐ธ and โ๐น is output as aconnected single-cover of ๐ฎ.
Algorithm 1 Approximation for 1CSCP(๐, ๐ ,โฌ,๐ฎ,๐ณ )
Input: Set โฌ of BSs, set ๐ฎ of SNs, set ๐ณ of candidateRN locations, sensor node communication range๐ > 0, and relay node communication range ๐ โฅ2๐ > 0. An approximation algorithm ๐ธ for SCP,and an approximation algorithm ๐น for the Steinertree problem.
Output: A connected single-cover โ๐ธ โชโ๐น โ ๐ณ .1: Remove from ๐ฎ all SNs within distance ๐ from โฌ.
Apply algorithm ๐ธ to obtain a single-cover โ๐ธ of๐ฎ. Without loss of generality, we assume that โ๐ธ
is minimal, meaning that none of its proper subsetsis a single-cover of ๐ฎ.
2: Construct the relay communication graph ๐บ =๐ ๐ถ๐บ(๐ ,โฌ,๐ณ ).
3: if the nodes in โฌ โช โ๐ธ are not in the sameconnected component of ๐ ๐ถ๐บ(๐ ,โฌ,๐ณ ) then
4: Stop. The given instance of 1CSCP does nothave a feasible solution.
5: end if6: Assign edge weight in ๐บ as (1), with โ substituted
by โ๐ธ, i.e., for an edge (๐ฅ, ๐ฆ) in ๐บ, we have
๐คโ๐ธ(๐ฅ, ๐ฆ) = โฃ(๐ณ โ โ๐ธ) โฉ {๐ฅ, ๐ฆ}โฃ.
7: Apply algorithm ๐น to compute a low weightSteiner tree [17] ๐ฏ๐น of ๐ ๐ถ๐บ(๐ ,โฌ,๐ณ ), spanning thenode set โฌ โช โ๐ธ. Let the set of Steiner points inthe tree ๐ฏ๐น be โ๐น.
8: Output โ๐ธ,๐น = โ๐ธ โชโ๐น.
We illustrate the major steps of Algorithm 1 viathe example shown in Fig. 2. The instance has 2base stations (hexagons), 9 sensor nodes (circles), and18 candidate RN locations (squares). We also have๐ = 2๐. The nodes, as well as the hybrid communica-tion graph ๐ป๐ถ๐บ(๐, ๐ ,โฌ,๐ฎ,๐ณ ) are shown in Fig. 2(a),where we have omitted the directions of the SN-RNedges for clarity. Algorithm 1 performs the following
(a) ๐ป๐ถ๐บ of the instance
๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
(b) A single-cover
๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ
(c) A Steiner tree (d) Optimal solution
Fig. 2: (a) The ๐ป๐ถ๐บ for 2 BSs (hexagons), 9 SNs(circles), and 18 candidate RN locations (squares). (b)A feasible solution to SCP. (c) The resulting 1CSC,which uses 8 RNs. (d) The optimal solution, whichuses 7 RNs.
steps. In Line 1, we obtain a single-cover โ๐ธ of ๐ฎ,which contains 6 relay nodes, shown in Fig. 2(b). InLine 2, we construct the RCG, which is obtained bydeleting from the HCG in Fig. 2(a) all edges incidentfrom a sensor node. In Lines 3-5, we find that thenodes in โ๐ธโชโฌ are in the same connected component.In Line 6, we assign each edge a weight following(1). In Line 7, we obtain a Steiner tree spanningthe node set โ๐ธ โช โฌ, shown in Fig. 2(c). Here weused the MST-based approximation algorithm [19] toobtain the Steiner tree. The Steiner tree has two Steinernodes, leading to the use of two more relay nodes:โฃโ๐นโฃ = 2. Fig. 2(d) shows an M1CSC, which uses 7relay nodes. The solution produced by Algorithm 1uses 8 relay nodes, which is not optimal, but close tooptimal.
Theorem 4.2: The worst case running time of Algo-rithm 1 is ๐ช(๐๐ธ+๐๐น+ โฃโฌ โช๐ณ โฃ2), where ๐๐ธ and ๐๐น arethe time complexities of the approximation algorithms๐ธ and ๐น, respectively. Furthermore, we have:(a) 1๐ถ๐๐ถ๐ (๐, ๐ ,โฌ,๐ฎ,๐ณ ) has a feasible solution if
and only if ๐ฎ has a single-cover โ โ ๐ณ suchthat all nodes in โฌโชโ are in the same connectedcomponent of ๐ ๐ถ๐บ(๐ ,โฌ,๐ณ ).
(b) When 1๐ถ๐๐ถ๐ (๐, ๐ ,โฌ,๐ฎ,๐ณ ) has a feasible solu-tion, Algorithm 1 guarantees computing a con-nected single-cover โ๐ธ,๐น of ๐ฎ, which uses nomore than (๐ผ + 3.5๐ฝ) times the number ofRNs required in an optimal solution โ๐๐๐ก for1๐ถ๐๐ถ๐ (๐, ๐ ,โฌ,๐ฎ,๐ณ ), where ๐ผ and ๐ฝ are theapproximation ratios of ๐ธ and ๐น, respectively. โก
PROOF. Line 1 of Algorithm 1 computes a single-cover โ๐ธ of ๐ฎ in ๐๐ธ time. Line 2 constructs the RCGin ๐ช(โฃโฌ โช ๐ณ โฃ2) time. Using depth first search, Lines
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
6
3-5 can be accomplished in ๐ช(โฃโฌ โช ๐ณ โฃ2) time. Line6 assigns weights to the edges in the RCG, whichrequires ๐ช(โฃโฌ โช ๐ณ โฃ2) time. Line 7 requires ๐๐น time.This proves the time complexity of the algorithm.
The correctness of (a) follows from the definition of1CSCP. Therefore we only need to prove the correct-ness of (b).
Roadmap. We first show that Algorithm 1 is guar-anteed to find a connected single-cover when theinstance is feasible. We then prove the approximationratio of Algorithm 1, i.e., โฃโ๐ธ,๐นโฃ โค (๐ผ + 3.5๐ฝ)โฃโ๐๐๐กโฃ.To prove the ratio, we prove โฃโ๐ธโฃ โค ๐ผโฃโ๐๐๐กโฃ andโฃโ๐นโฃ โค 3.5๐ฝโฃโ๐๐๐กโฃ, respectively. The ratio then followsfrom the fact that โฃโ๐ธ,๐นโฃ = โฃโ๐ธโฃ+ โฃโ๐นโฃ.
The feasibility of the instance ensures that Line 1of Algorithm 1 can find a single-cover โ๐ธ of ๐ฎ. Letโ๐๐๐ก be an optimal solution to 1๐ถ๐๐ถ๐ (๐, ๐ ,โฌ,๐ฎ,๐ณ ).Then โ๐๐๐ก is a single-cover of ๐ฎ, and ๐ ๐ถ๐บ(๐ ,โฌ,โ๐๐๐ก)is connected. Since โ๐ธ is a minimal single-cover of๐ฎ, each node ๐ฆ โ โ๐ธ is within distance ๐ of an SN๐ โ ๐ฎ and ๐ is not within distance ๐ of โฌ. Note that๐ must be within distance ๐ of a node ๐ฆโฒ โ โ๐๐๐ก,as โ๐๐๐ก is a single-cover of ๐ฎ. Therefore ๐ฆ is eitherin โ๐๐๐ก or within distance ๐ + ๐ โค ๐ of a node (๐ฆโฒ
for example) in โ๐๐๐ก. Therefore ๐ ๐ถ๐บ(๐ ,โฌ,โ๐๐๐กโชโ๐ธ)is also connected. Hence Line 7 of Algorithm 1 isguaranteed to find a Steiner tree, thereby producinga connected single-cover โ๐ธ,๐น for the instance of1๐ถ๐๐ถ๐ (๐, ๐ ,โฌ,๐ฎ,๐ณ ).
In the following, we will prove that โฃโ๐ธ,๐นโฃ is nomore than (๐ผ + 3.5๐ฝ)โฃโ๐๐๐กโฃ. Let โ๐๐ ๐ be a minimumsingle-cover for the given instance. Then we musthave โฃโ๐๐ ๐โฃ โค โฃโ๐๐๐กโฃ, as every connected single-coveris a single-cover. Since ๐ธ has approximation ratio ๐ผ,we have
โฃโ๐ธโฃ โค ๐ผโฃโ๐๐ ๐โฃ โค ๐ผโฃโ๐๐๐กโฃ. (4)
Note that ๐ ๐ถ๐บ(๐ ,โฌ,โ๐ธ โช โ๐๐๐ก) is connected. Let๐ฏ๐๐๐ก be a minimum spanning tree of ๐ ๐ถ๐บ(๐ ,โฌ,โ๐ธ โชโ๐๐๐ก). Let ๐ฏ๐๐๐ be a minimum Steiner tree in๐ ๐ถ๐บ(๐ ,โฌ,๐ณ ) which connects all nodes in โฌ โช โ๐ธ.Then we have
๐คโ๐ธ(๐ฏ๐๐๐) โค ๐คโ๐ธ(๐ฏ๐๐๐ก). (5)
Since ๐น is a ๐ฝ-approximation algorithm, we have
๐คโ๐ธ(๐ฏ๐น) โค ๐ฝ๐คโ๐ธ(๐ฏ๐๐๐) โค ๐ฝ๐คโ๐ธ(๐ฏ๐๐๐ก). (6)
We can write ๐คโ๐ธ(๐ฏ๐๐๐ก) as ๐คโ๐ธ(๐ฏ๐๐๐ก) = ๐คโ๐ธ
1 (๐ฏ๐๐๐ก) +๐คโ๐ธ
2 (๐ฏ๐๐๐ก), where ๐คโ๐ธ
1 (๐ฏ๐๐๐ก) is the sum of the weightsof the weight-1 edges in ๐ฏ๐๐๐ก and ๐คโ๐ธ
2 (๐ฏ๐๐๐ก) is thesum of the weights of the weight-2 edges in ๐ฏ๐๐๐ก.Let ๐ข be any node in โ๐๐๐ก โ โ๐ธ. It follows fromthe geometric property of minimum spanning treesthat ๐ข is incident with at most 5 weight-1 edges in๐ฏ๐๐๐ก. Suppose, to the contrary, ๐ข is incident with 6weight-1 edges (๐ข, ๐ฃ1), (๐ข, ๐ฃ2), (๐ข, ๐ฃ3), (๐ข, ๐ฃ4), (๐ข, ๐ฃ5),and (๐ข, ๐ฃ6). Then we have {๐ฃ1, ๐ฃ2, . . . , ๐ฃ6} โ โฌ โช โ๐ธ,and ๐(๐ข, ๐ฃ๐) โค ๐ , 1 โค ๐ โค 6. Therefore there exist ๐ and
๐ (1 โค ๐ < ๐ โค 6) such that ๐(๐ฃ๐, ๐ฃ๐) โค ๐ . Replacingthe weight-1 edge (๐ข, ๐ฃ๐) by the weight-0 edge (๐ฃ๐, ๐ฃ๐)leads to a spanning tree of ๐ ๐ถ๐บ(๐ ,โฌ,โ๐ธโชโ๐๐๐ก) witha smaller weight than the weight of ๐๐๐๐ก, which is acontradiction. Therefore we have
๐คโ๐ธ
1 (๐ฏ๐๐๐ก) โค 5โฃโ๐๐๐กโฃ. (7)
Since ๐ฏ๐๐๐ก is a tree, it has at most โฃโ๐๐๐กโฃ โ 1 weight-2edges. Hence
๐คโ๐ธ
2 (๐ฏ๐๐๐ก) โค 2(โฃโ๐๐๐กโฃ โ 1). (8)
Therefore
๐คโ๐ธ(๐ฏ๐๐๐ก) โค 5โฃโ๐๐๐กโฃ+ 2(โฃโ๐๐๐กโฃ โ 1) = 7โฃโ๐๐๐กโฃ โ 2. (9)
Combining (6), (9), and Lemma 3.1, we have
โฃโ๐นโฃ โค1
2๐คโ๐ธ(๐ฏ๐น) โค
๐ฝ
2๐คโ๐ธ(๐ฏ๐๐๐ก) โค 3.5๐ฝโฃโ๐๐๐กโฃ. (10)
Combining (4) and (10), we have
โฃโ๐ธ,๐นโฃ = โฃโ๐ธโฃ+ โฃโ๐นโฃ โค (๐ผ + 3.5๐ฝ)โฃโ๐๐๐กโฃ. (11)
This proves the theorem.We further remark on the implication of this frame-
work. With different choices of algorithms ๐ธ and๐น, we will end up with approximation algorithmsfor 1CSCP with different approximation ratios andrunning times. For example, we can use the PTASfor GDHP of [26] as algorithm ๐ธ, and the (1 + ln 3
2 )-approximation algorithm of [31] as algorithm ๐น. Thiscombination leads to the following.
Corollary 4.1: The 1๐ถ๐๐ถ๐ (๐, ๐ ,โฌ,๐ฎ,๐ณ ) problemhas a polynomial time (6.43 + ๐)-approximationscheme. โก
Though the above combination gives a good ap-proximation ratio, the time complexity is high [7, 31].In our numerical study, we used the 22-approximationalgorithm for GDHP in [7] as algorithm ๐ธ, and the 2-approximation algorithm of [19] as algorithm ๐น. Thiscombination leads to the following.
Corollary 4.2: The 1๐ถ๐๐ถ๐ (๐, ๐ ,โฌ,๐ฎ,๐ณ ) problemhas a 29-approximation algorithm with a running timeof ๐ช(โฃ๐ณ โฃ2โฃ๐ฎโฃ4 + โฃโฌ โช ๐ณ โฃ2 log โฃโฌ โช ๐ณ โฃ). โก
We note that an alternative approach to this prob-lem could be to apply algorithm ๐น on a subgraph of๐ป๐ถ๐บ(๐, ๐ ,โฌ,๐ฎ,๐ณ ) without the SN-SN edges to obtaina connected single cover. However, since the numberof SNs that are connected to an RN cannot be boundedby a constant, proving a meaningful approximationratio for this approach is an open problem. Our bestsolution is the (6.43 + ๐)-approximation scheme.
5 TWO-CONNECTED DOUBLE-COVERIn this section, we study the 2-connected double-coverproblem. In this problem, we strengthen the coveragerequirement from single-cover to double-cover andthe connectivity requirement from connected to 2-connected. Since the connected single-cover problem
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
7
is NP-hard, we believe that the 2-connected double-cover problem is also NP-hard. Instead of concen-trating on the NP-hardness proof, we focus on thedesign of efficient approximation algorithms for thisproblem. As in Section 3, let โฌ be a set of base stations(BSs), ๐ฎ be a set of sensor nodes (SNs), and ๐ณ be aset of candidate RN locations. Let ๐ > 0 and ๐ โฅ 2๐be the communication range of the SNs, and that ofthe RNs, respectively.
5.1 Problem Definitions and NotationDefinition 5.1: [DCP] A subset โ โ ๐ณ is called
a double-cover (denoted by DC) of ๐ฎ if every SN iswithin distance ๐ of at least two nodes in โฌ โชโ. Thesize of the corresponding DC is โฃโโฃ. A DC is called aminimum double-cover (denoted by MDC) of ๐ฎ if it hasthe minimum size among all DCs of ๐ฎ. The double-cover relay node placement problem (denoted by DCP)for (๐, ๐ ,โฌ,๐ฎ,๐ณ ) seeks an MDC of ๐ฎ. โก
Definition 5.2: [2CDCP] A subset โ โ ๐ณ is calleda 2-connected double-cover (denoted by 2CDC) of ๐ฎif for every SN ๐ โ ๐ฎ there exists a pair of node-disjoint paths from ๐ to two base stations in the hybridcommunication graph ๐ป๐ถ๐บ(๐, ๐ ,โฌ,๐ฎ,โ). The size ofโ is โฃโโฃ. โ is called a minimum 2-connected double-cover (denoted by M2CDC) of ๐ฎ if it is a 2CDC of ๐ฎ,and has the minimum size among all 2CDCs of ๐ฎ.The 2-connected double-cover relay node placementproblem for (๐, ๐ ,โฌ,๐ฎ,๐ณ ) (denoted by 2CDCP) seeksan M2CDC of ๐ฎ. โก
The problem we are studying here is closely re-lated to the {0, 1, 2}-survivable network design problem(SNDP) defined in the following.
Definition 5.3: [{0, 1, 2}-SNDP] Let ๐บ = (๐,๐ธ) bean undirected graph with nonnegative weights on alledges ๐ โ ๐ธ. For each pair of vertices ๐ข, ๐ฃ โ ๐ , thereis a connectivity requirement ๐(๐ข, ๐ฃ) โ {0, 1, 2}. The{0, 1, 2}-survivable network design problem (SNDP) seeksa minimum weight subgraph โ of ๐บ such that for anytwo vertices ๐ข, ๐ฃ โ ๐ , โ contains at least ๐(๐ข, ๐ฃ) node-disjoint paths between ๐ข and ๐ฃ. โก
5.2 A Framework of Efficient Approximation Algo-rithms for 2CDCPWe present a general framework to solve 2CDCP,using an approximation algorithm ๐ธ for DCP, andan approximation algorithm ๐น for the {0, 1, 2}-SNDPproblem. The framework of polynomial time approx-imation algorithms has an approximation ratio of๐ผ + 5๐ฝ, where ๐ผ is the approximation ratio of ๐ธ, and๐ฝ is the approximation ratio of ๐น. Our framework for2CDCP is presented as Algorithm 2.
The major steps of our scheme are as follows. First,we apply the approximation algorithm ๐ธ to obtaina double cover โ๐ธ โ ๐ณ of ๐ฎ. This is accomplishedin Line 1 of the algorithm. In Line 2, we constructthe relay communication graph ๐บ = ๐ ๐ถ๐บ(๐ ,โฌ,๐ณ ).
Algorithm 2 Approximation for 2CDCP(๐, ๐ ,โฌ,๐ฎ,๐ณ )
Input: Set โฌ of BSs, set ๐ฎ of SNs, set ๐ณ of candidateRN locations, sensor node communication range๐ > 0, and relay node communication range๐ โฅ 2๐ > 0. An approximation algorithm ๐ธ forDCP, and an approximation algorithm ๐น for the{0, 1, 2}-๐๐๐ท๐ problem.
Output: A connected double-cover โ๐ธ โชโ๐น โ ๐ณ .1: Apply algorithm ๐ธ to obtain a double-cover โ๐ธ
of ๐ฎ. Without loss of generality, we assume thatโ๐ธ is minimal, meaning that none of its propersubsets is a double-cover of ๐ฎ.
2: Construct the relay communication graph ๐บ =๐ ๐ถ๐บ(๐ ,โฌ,๐ณ ).
3: if the nodes in โฌ โช โ๐ธ are not in the same 2-connected component of ๐ ๐ถ๐บ(๐ ,โฌ,๐ณ ) then
4: Stop. The given instance does not have a 2-connected double-cover.
5: end if6: Assign edge weight in ๐บ as in (1), with โ substi-
tuted by โ๐ธ, i.e., for an edge (๐ฅ, ๐ฆ) in ๐บ, we havethat
๐คโ๐ธ(๐ฅ, ๐ฆ) = โฃ(๐ณ โ โ๐ธ) โฉ {๐ฅ, ๐ฆ}โฃ.
For a node ๐ฅ and a node ๐ฆ ((๐ฅ, ๐ฆ) does not have tobe an edge), assign the connectivity requirementto be ๐(๐ฅ, ๐ฆ) = 2โ โฃ(๐ณ โ โ๐ธ) โฉ {๐ฅ, ๐ฆ}โฃ.
7: Apply algorithm ๐น to compute a low weight 2-connected subgraph โ๐น of ๐ ๐ถ๐บ(๐ ,โฌ,๐ณ ), span-ning the node set โฌ โช โ๐ธ. Let the set of addedrelay nodes in the solution to ๐น be โ๐น.
8: Output โ๐ธ,๐น = โ๐ธ โชโ๐น.
The given instance of the problem has a feasiblesolution if and only if all the nodes in โฌ โช โ๐ธ arein the same 2-connected component of ๐บ. Lines 3 to 5check whether there exists a 2-connected componentcontaining all the nodes in โฌ โช โ๐ธ. If there is nosuch 2-connected component, the algorithm stops. InLine 6, we assign non-negative edge weights to theedges in ๐บ according to (1). Then, in Line 7, weapply algorithm ๐น to compute a low cost 2-connectedsubgraph of ๐บ spanning all the nodes in โฌ โช โ๐ธ.Finally, Line 8 outputs the locations to place the RNs.
Theorem 5.1: The worst case running time of Algo-rithm 2 is ๐(๐๐ธ+๐๐น+ โฃโฌ โช๐ณ โฃ2), where ๐๐ธ and ๐๐น arethe time complexities of the approximation algorithms๐ธ and ๐น, respectively. Furthermore, we have:
(a) 2๐ถ๐ท๐ถ๐ (๐, ๐ ,โฌ,๐ฎ,๐ณ ) has a feasible solution ifand only if ๐ฎ has a double-cover โ โ ๐ณ suchthat all nodes in โฌโชโ are in the same 2-connectedcomponent of ๐ ๐ถ๐บ(๐ ,โฌ,๐ณ ).
(b) When 2๐ถ๐ท๐ถ๐ (๐, ๐ ,โฌ,๐ฎ,๐ณ ) has a feasible so-lution, Algorithm 2 guarantees computing a 2-connected double-cover of โ๐ธ,๐น of ๐ฎ, which usesno more than (๐ผ + 5๐ฝ) times the number of
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
8
RNs required in an optimal solution โ๐๐๐ก to2๐ถ๐ท๐ถ๐ (๐, ๐ ,โฌ,๐ฎ,๐ณ ), where ๐ผ and ๐ฝ are theapproximation ratios of ๐ธ and ๐น, respectively. โก
Before proceeding to prove Theorem 5.1, we needthe following lemma, which will be used to relate โฃโ๐นโฃto the number of RNs in the optimal solution.
Lemma 5.1: Let โ be a 2-connected double-cover of๐ฎ. Let โ๐ be a subset of โ such that โ๐ is a double-cover of ๐ฎ. Let โ๐ = โ โ โ๐. Assign edge weight in๐ ๐ถ๐บ(๐ ,โฌ,โ) such that the weight of edge (๐ฅ, ๐ฆ) is๐คโ๐(๐ฅ, ๐ฆ) = โฃโ๐ โฉ {๐ฅ, ๐ฆ}โฃ. Let โโ๐,โ๐
be a minimum2-connected subgraph connecting all nodes in โฌ โชโ.Then, for each node ๐ข โ โ๐, ๐ข is connected to at most5 nodes in โ๐, and at most one node in โฌ. โก
PROOF. For the proof, we refer the reader to theLemma 4.1 in [25], while noting the following differ-ences. The HCG there corresponds to the RCG here,with ๐ฎ there corresponding to โ here, and โ therecorresponding to โ๐๐๐ก โ โ here.
PROOF OF THEOREM 5.1: The proofs of the runningtime and Part (a) are similar to those of Theorem 4.2.Here we concentrate on the approximation ratio.
Roadmap. Following the same logic as in the proofof Theorem 4.2, we prove the ratio by proving โฃโ๐ธโฃ โค๐ผโฃโ๐๐๐กโฃ and โฃโ๐นโฃ โค 5๐ฝโฃโ๐๐๐กโฃ, respectively. The ratiothen follows from the fact that โฃโ๐ธ,๐นโฃ = โฃโ๐ธโฃ+ โฃโ๐นโฃ.
Recall that the set of RNs required by ๐ธ is โ๐ธ andthe set of extra RNs required by algorithm ๐น is โ๐น.
Let โ๐๐๐ก be an optimal solution to 2CDCP and โ๐๐๐
be an optimal solution to DCP. It is clear that โฃโ๐๐๐โฃ โคโฃโ๐๐๐กโฃ. As ๐ธ has approximation ratio ๐ผ, we have
โฃโ๐ธโฃ โค ๐ผโฃโ๐๐๐โฃ โค ๐ผโฃโ๐๐๐กโฃ. (12)
Let โ๐๐๐ be an optimal solution to the {0, 1, 2}-SNDPinstance that connects all nodes in โฌ โช โ๐ธ, and โ๐๐๐ก
be a solution that uses the optimal number of RNsrequired to solve 2CDCP. Since โ๐๐๐ก is a feasiblesolution to {0, 1, 2}-SNDP, and ๐น is a ๐ฝ-approximationalgorithm for {0, 1, 2}-SNDP, we have
๐คโ๐ธ(โ๐น) โค ๐ฝ โ ๐คโ๐ธ(โ๐๐๐) โค ๐ฝ โ ๐คโ๐ธ(โ๐๐๐ก). (13)
We need to find an upper bound on ๐คโ๐ธ(โ๐๐๐ก) us-ing a function of โฃโ๐๐๐กโฃ. Let ๐คโ๐ธ
2 (โ๐๐๐ก) denote thetotal weights of the weight-2 edges in โ๐๐๐ก, and let๐คโ๐ธ
1 (โ๐๐๐ก) denote the total weights of the weight-1edges in โ๐๐๐ก. We have
๐คโ๐ธ(โ๐๐๐ก) = ๐คโ๐ธ
2 (โ๐๐๐ก) + ๐คโ๐ธ
1 (โ๐๐๐ก). (14)
Let each RN in โ๐๐๐ก be incident with at most ฮ(โ๐๐๐ก)weight-1 edges in โ๐๐๐ก, we have
๐คโ๐ธ
1 (โ๐๐๐ก) โค โฃโ๐๐๐กโฃ โ ฮ(โ๐๐๐ก). (15)
Applying Lemma 3.3 to each of the connected com-ponents of the subgraph of โ๐๐๐ก induced by all the2-weight edges, we have
๐คโ๐ธ
2 (โ๐๐๐ก) โค 2 โ (2โฃโ๐๐๐กโฃ โ 1). (16)
It follows from Lemma 3.1 that
โฃโ๐นโฃ = ๐โ๐ธ(โ๐น) โค1
2๐คโ๐ธ(โ๐น) (17)
โค๐ฝ
2๐คโ๐ธ(โ๐๐๐ก) (18)
โค๐ฝ
2(4 + ฮ(โ๐๐๐ก))โฃโ๐๐๐กโฃ. (19)
It follows from Lemma 5.1 that
โฃโ๐นโฃ โค๐ฝ
2(4 + 6)โฃโ๐๐๐กโฃ โค 5๐ฝโฃโ๐๐๐กโฃ. (20)
Combining (12) and (20), we have
โฃโ๐ธ,๐นโฃ = โฃโ๐ธโฃ+ โฃโ๐นโฃ โค (๐ผ + 5๐ฝ)โฃโ๐๐๐กโฃ. (21)
This proves the theorem.We can use different combinations of ๐ธ and ๐น for
different purposes. Two examples are summarized inthe following two corollaries.
Corollary 5.1: The 2๐ถ๐ท๐ถ๐ problem has a ๐ช(lnn)-approximation algorithm with a polynomial runningtime. โก
PROOF: This is achieved by choosing ๐ธ as the ๐ช(ln ๐)-approximation algorithm by Rajagopalan et al. [28]and ๐น as the 3-approximation algorithm of Ravi etal. for the {0, 1, 2}-SNDP problem [29, 30].
In the study above, we have made no assumptionon the number of RNs that an SN can be connectedto. However, in many practical scenarios, the numberof RNs that an SN can be connected to is usuallybounded by a constant ๐ . In this case, a simple mod-ification to the constant frequency based algorithmin [15] will result in a constant-factor approximationalgorithm as stated in the following corollary.
Corollary 5.2: If the number of RNs that can beconnected to an SN is bounded by a constant ๐ ,then Algorithm 2 guarantees a feasible solution inpolynomial time, with a constant approximation ratio๐ + 5๐ฝ, where ๐ฝ is the approximation ratio of ๐น. โก
6 COMPUTATION OF LOWER BOUNDSNo algorithms have been developed for solving theproblem of two-tiered constrained relay node place-ment in the existing literature, because of its difficulty.Hence due to the lack of a more suitable comparison,we compare the results from our algorithms with thatobtained from Linear Program (LP) formulations of1CSCP and 2CDCP. We note that an LP can be solvedin polynomial time. Also, the solution to the LP ver-sion of the problem denoted by โ๐ฟ๐ , is a lower boundof the solution to the corresponding Integer LinearProgram (ILP) version. That is, โฃโ๐ฟ๐ โฃ โค โฃโ๐๐๐กโฃ. Thesuitability of the use of LP for comparison comes fromtwo facts. On one hand, if ๐ธ is an ๐ผ-approximationalgorithm for a problem, then โฃโ๐ธโฃ โค ๐ผ โ โฃโ๐ฟ๐ โฃ,consequently, โฃโ๐ธโฃ โค ๐ผ โ โฃโ๐๐๐กโฃ. On the other hand,solving the LP may take much less time in comparison
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
9
to solving the corresponding ILP, which may have anexponential running time.
Closely following the LP formulation in [25], weformulate the LPs for 1CSCP and 2CDCP as multi-commodity flow problems, with a flow originatingfrom each SN ๐ข (the source) to a fictitious sink ๐,which is connected to all BSs. The value of the floworiginating from the source is designated as f. For1CSCP, f = 1 and for 2CDCP f = 2.
min
โฃ๐ณ โฃโ
๐=1
๐ฅ๐ (22)
subject to,Requirements Constraints:๐ฅ๐ โ ๐พ๐๐ โฅ 0, โ๐ โ ๐ณ , โ๐ โ ๐ฎ (23)Source Constraints:โ
(๐,๐)โ๐ป๐ถ๐บ
๐๐๐๐ โโ
(๐,๐)โ๐ป๐ถ๐บ
๐๐๐๐ = f , โ๐ โ ๐ฎ (24)
Sink Constraints:โ
๐โโฌ
๐๐๐๐ โโ
๐โโฌ
๐๐๐๐ = f , โ๐ โ ๐ฎ (25)
Flow satisfaction constraints:โ
(๐,๐)โ๐ป๐ถ๐บ
๐๐๐๐ โ ๐พ๐๐ = 0, โ๐ โ ๐ฎ, โ๐ โ ๐ณ (26)
Flow conservation constraints:โ
(๐,๐)โ๐ป๐ถ๐บ
๐๐๐๐ โโ
(๐,๐)โ๐ป๐ถ๐บ
๐๐๐๐ = 0, โ๐ โ ๐ณ , โ๐ โ ๐ฎ (27)
โ
(๐,๐)โ๐ป๐ถ๐บโช(๐,๐)
๐๐๐๐ โโ
(๐,๐)โ๐ป๐ถ๐บโช(๐,๐)
๐๐๐๐ = 0, โ๐ โ โฌ, โ๐ โ ๐ฎ (28)
Bounds:๐๐๐๐ = 0, โ๐, ๐ โ โฌ, โ๐ โ ๐ฎ (29)0 โค ๐พ๐๐ , ๐๐๐๐ โค 1, โ ๐พ๐๐ , remaining ๐๐๐๐
โฒ๐ . (30)
The variable ๐ฅ๐ , ๐ = 1, . . . , โฃ๐ณ โฃ, is the flow variable,which represents the maximum flow of any commod-ity through the RN ๐ for the flow problem to besatisfied. It may be regarded as the fraction of theRN ๐ that is used in solving the relay node placementproblem. The variable ๐พ๐๐ , ๐ = 1, . . . , โฃ๐ฎโฃ, ๐ = 1, . . . , โฃ๐ณ โฃ,is the requirement variable. It represents the amountof flow from an SN ๐ required to pass through anRN ๐. To ensure that the coverage and/or connectivityrequirements are satisfied, the flow variables for eachRN have to satisfy the requirements constraints givenby Equation (23). The variable ๐๐๐๐ represents the flowof commodity ๐ from node ๐ to ๐. Equations (24)and (25) represent the source and the sink constraintsrespectively. The source flow constraints are easy tounderstand. The sink constraints are specified withrespect to the fictitious sink which is connected tothe BSs only. The flow satisfaction constraints, givenby Equation (26), enforce that the amount of flowof commodity ๐ flowing into an RN ๐ from nodesadjacent to it is exactly equal to the amount of flow
of ๐ that is required to flow through ๐. That is, ๐ doesnot create nor buffer any flow. Equations (27) and (28)represent the flow conservation at the RNs and theBSs respectively. Corresponding to each BS there isan additional edge connecting it to ๐ for the flowsto reach the destination. Equation (29) represents thebounds for the flow variables corresponding to theflow between the BSs. These flow variables are set tozero to ensure that each BS can only appear in at mostone path from a source to ๐.
7 EXPERIMENTAL RESULTSIn this section, we evaluate the performance of ouralgorithms through extensive experiments.
7.1 Network SetupAs in [18], [25] and [36], the set ๐ฎ of SNs wererandomly distributed in a square region. Two basestations were deployed randomly in the region. Fortransmission ranges, we set ๐ = 15 and ๐ = 30. For thecandidate RN locations, we considered two differentdistributions: grid distribution and random distribution.For grid distribution, the deployment region consistsof ๐พ ร ๐พ small squares each of side 10, with thecandidate RN locations being the (๐พ+1)2 grid points.For random distribution, the candidate RN locationswere randomly distributed in the deployment region.
We report two separate deployments of the SNs:the case where the density of the SNs in the regionincreases, and the case where the density is constant.We define the density as the ratio of the number ofSNs in the region to the area of the region. For theincreasing density case, we chose a constant regionof size 100 ร 100 sq. units. The number of candidateRN locations was (๐พ + 1)2 = 121, while the numberof SNs was varied from 20 to 120 in increments of20. For the constant density case, with the increase inthe number of SNs the size of the region increased. Westudied two sub-cases: density ๐1 = 0.005 and density๐2 = 0.01. For each density value, we used 7 differentnumbers of SNs. The deployment region sizes werechosen to be 40 ร 40, 50ร 50, . . . , 100ร 100, with thenumber of SNs ranging from 8 to 50 for ๐1, and 16 to100 for ๐2. For each setting the results were averagedover 10 test cases.
7.2 Algorithm SelectionTo evaluate the effectiveness of our frameworks, weimplemented Algorithm 1 and Algorithm 2. For Al-gorithm 1, we used the 22-approximation algorithmin [7] as ๐ธ and the 2-approximation algorithm in [19]as ๐น. Our choices were motivated by their fasterrunning times. The numerical results show that thesolutions produced are still within twice the optimumfor all of our test cases. We use ACS to denote thisimplementation of Algorithm 1. For Algorithm 2, we
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
10
used the 3-approximation algorithm in [29] as ๐น. Weimplemented two choices of ๐ธ for the set multicoverproblem: the greedy ๐ช(ln๐)-approximation algorithmin [28] (we use ALD to denote this combination),and the frequency-based algorithm in [15] (we useACD to denote this combination). To ensure rigorouscomparison, for each instance of 1CSCP and 2CDCPproblems that were solved by our algorithms, wealso solved the corresponding LP instance (for lowerbound) and evaluated the proximity of our solutionsto the optimal. We denote the solutions for 1CSCP and2CDCP as LPS and LPD respectively.
7.3 Performance MetricsThe performance metrics include the running time, thenumber of RNs used and Energy Efficiency. For simplic-ity, we only report energy consumption for 1CSCP.To measure energy cost on each SN, we assume thefollowing energy model. Assume the routing topologyis given by the โฃโฌโฃ trees rooted at the BSs which areinduced from the Steiner tree computed. For each SN๐ ๐, let ๐(๐ ๐) denote the number of ๐ ๐โs children in thetree. Let ๐(๐ ๐) denote ๐ ๐โs parent. We assume that theenergy consumption is an exponential function of thetransmission distance. Therefore the energy cost of ๐ ๐is ๐(๐ ๐) = โฃโฃ๐(๐ ๐), ๐ ๐โฃโฃ
๐พ โ (๐(๐ ๐)+1). Intuitively, the energycost of ๐ ๐ is equal to the product of the transmissionpower required to transmit to the next hop alongthe path to the BS and the number of SNs whosepaths pass through it (including itself). Throughoutour the experiments, we assume that ๐พ = 2. Wedefine the energy cost of the network as the maximumenergy consumption among all the SNs, because sucha sensor determines the lifetime of the network.
(a) Topology without relaynode placement
(b) Topology with relay nodeplacement
Fig. 3: Network topology with or without relay nodeplacement. For (a), the energy cost is 42 ร 2 = 32,which occurs at ๐ 4. For (b), the energy cost is 3.52ร1 =12.25, which occurs at ๐ 3.
Without the relay node placement, we assume thatthe routing topology is induced from a minimumspanning tree, where the weight between SN and SNor between SN and BS is set to the Euclidean distancebetween them, and the weight between a pair of BSsis set to 0. An example is shown in Fig. 3(a). With therelay node placement, each SN transmits to the closest
RN or BS directly. The energy cost can be computedsimilar as above. A corresponding example is shownin Fig. 3(b).
7.4 Illustration of Relay Node Placement
0 10 20 30 40 500
10
20
30
40
50
(a) ACS0 10 20 30 40 50
0
10
20
30
40
50
(b) OPTS
Fig. 4: RN placement for 1CSCP: grid distribution. Thenumbers of RNs used by ACS and OPTS are 6 and 4,respectively.
0 10 20 30 40 500
10
20
30
40
50
(a) ALD0 10 20 30 40 50
0
10
20
30
40
50
(b) ACD
0 10 20 30 40 500
10
20
30
40
50
(c) OPTD
Fig. 5: RN placement for 2CDCP: grid distribution.The numbers of RNs used by ALD, ACD and OPTDare 11, 11 and 9, respectively.
In this section, we illustrate the relay node place-ment obtained by different algorithms through Fig. 4to Fig. 7. Here, we solve 1CSCP and 2CDCP optimallyusing the LP formulation in Section 6 with integerconstraints, i.e., the ILP formulation. We denote theoptimal algorithms for 1CSCP and 2CDCP by ๐๐๐๐
and ๐๐๐๐ท, respectively. In each figure, the red starsrepresent the BSs, the yellow disks represent the SNs
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
11
0 10 20 30 40 500
10
20
30
40
50
(a) ACS0 10 20 30 40 50
0
10
20
30
40
50
(b) OPTS
Fig. 6: RN placement for 1CSCP: random distribution.The numbers of RNs used by ACS and OPTS are 6 and5, respectively.
0 10 20 30 40 500
10
20
30
40
50
(a) ALD0 10 20 30 40 50
0
10
20
30
40
50
(b) ACD
0 10 20 30 40 500
10
20
30
40
50
(c) OPTD
Fig. 7: RN placement for 2CDCP: random distribution.The numbers of RNs used by ALD, ACD and OPTDare 10, 10 and 9, respectively.
and the blue squares represent the RNs, of whichthe solid ones represent the deployed RNs. The circlecentered at the BS or the RN is of radius ๐. Thereforea SN within a circle can transmit to the correspondingBS or RN. The link between RN and RN or betweenRN and BS indicates that these two nodes are withinthe transmission range of each other. For all theexamples, the region size is 50ร 50. There are 2 BSs,25 SNs and 36 candidate RN locations distributed inthe deployment region.
7.5 Result AnalysisFor the case of increasing SN density, Fig. 8(a) andFig. 9(a) show the running time of ACS, ALD, andACD in the network with the grid RN distribution
and the random RN distribution, respectively. Sincethe running time of the algorithms is based on thenumber of edges (โฃ๐ธโฃ) and the number of vertices(โฃ๐ โฃ), the ๐-axis represents the average of โฃ๐ โฃ + โฃ๐ธโฃ,while the ๐ -axis represents the running time in sec-onds. The dashed blue line (diamond markers) showsthe running time of ACS. The solid red line (squaremarkers) and the dash-dot black line (star markers)show the running time of ALD and ACD respectively.In case of ALD and ACD, the running time decreasesat first and then increases for the grid RN distribu-tion. This is because, for the initial data point (20SNs), the RNs chosen as a cover are not connected,and connecting them with additional RNs increasesthe running time. However, with an increase in thenumber of SNs the number of RNs needed for acover becomes adequate to form a connected networkby themselves. With increasing number of SNs therunning time increases as it takes more time to finda cover. This also holds true for ACS. However, sinceACS is much faster than the other algorithms, it isnot obvious in the figure. The bigger dip and fasterincrease of the running time of ALD and ACD (for2CDCP) in comparison to that of ACS (for 1CSCP)is because of the use of the higher complexity SNDPalgorithm. For the random RN distribution case, wedo not observe the ๐ -shape in the running time curve.The reason is that, unlike the grid distribution, wherethe RNs are fixed at the grid points, the RNs in therandom distribution case are randomly distributed inthe region. It is highly likely to have a connected coverafter the first phase of the algorithm.
For the grid RN distribution case, Figs. 8(b) and 8(c)show the average number of RNs required by ACSand LPS, for solving 1CSCP, and by ALD, ACD, andLPD, for solving 2CDCP respectively. For the randomRN distribution case, the corresponding results areshown in Figs. 9(b) and 9(c). Both approximation algo-rithms perform pretty well in comparison to the lowerbound. The number of RNs obtained is never morethan twice the cost of the LP solution. Thus the resultsfrom our approximation algorithms are never morethan twice the optimal value. This indicates that ourapproximation algorithms perform very well. We notethat for 2CDCP, both the approximation algorithmshave the same results despite the disparities in theirapproximation ratios. This is because, the pathologicalcases where the ๐ช(ln๐) algorithm performs badlydo not occur in the square grid with random SNsdeployment. We will study this in the future.
For the case of constant density, we studied twosub-cases: density ๐1 = 0.005 and density ๐2 = 0.01.For each density value, we used 7 different numbersof SNs. The deployment region sizes were chosen tobe 40 ร 40, . . . , 100 ร 100, with the number of SNsranging from 8 to 50 for ๐1, and 16 to 100 for ๐2.Fig. 10(a) and Fig. 11(a) show the running times ofACS, ALD, and ACD for both the densities. For both
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
12
0.9 1 1.1 1.2 1.3 1.4x 10
4
0
5
10
15
20
25
|V|+|E|
Run
ning
tim
e (in
sec
s)
ACSALDACD
(a) running times of ACS, ALD, ACD
20 40 60 80 100 1200
5
10
15
20
25
Number of SNs
Num
ber
of R
Ns
used
LPSACS
(b) #RNs used by ACS, LPS
20 40 60 80 100 1200
10
20
30
40
Number of SNs
Num
ber
of R
Ns
used
LPDALDACD
(c) #RNs used by ALD, ACD, LPD
Fig. 8: Results for grid RN distribution with increasing SN density: 100ร 100 deployment region; โฃ๐ณ โฃ = 121;โฃ๐ฎโฃ = 20, 40, 60, 80, 100, 120.
1 1.1 1.2 1.3 1.4 1.5 1.6x 10
4
0
5
10
15
20
25
|V|+|E|
Run
ning
tim
e (in
sec
s)
ACSALDACD
(a) running times of ACS, ALD, ACD
20 40 60 80 100 1200
5
10
15
20
25
Number of SNs
Num
ber
of R
Ns
used
LPSACS
(b) #RNs used by ACS, LPS
20 40 60 80 100 1200
10
20
30
40
Number of SNs
Num
ber
of R
Ns
used
LPDALDACD
(c) #RNs used by ALD, ACD, LPD
Fig. 9: Results for random RN distribution with increasing SN density: 100ร100 deployment region; โฃ๐ณ โฃ = 121;โฃ๐ฎโฃ = 20, 40, 60, 80, 100, 120.
0 2000 4000 6000 8000 10000 12000 140000
5
10
15
20
|V|+|E|
Run
ning
tim
e (in
sec
s)
ACS(d=0.005)ALD(d=0.005)ACD(d=0.005)ACS(d=0.01)ALD(d=0.01)ACD(d=0.01)
(a) running times of ACS, ALD, ACD
40x40 50x50 60x60 70x70 80x80 90x90100x1000
5
10
15
20
Field Size (units x units)
Num
ber
of R
Ns
used
LPS(d=0.005)ACS(d=0.005)LPS(d=0.01)ACS(d=0.01)
(b) #RNs used by ACS, LPS
40x40 50x50 60x60 70x70 80x80 90x90100x1000
10
20
30
40
Field Size (units x units)
Num
ber
of R
Ns
used
LPD(d=0.005)ALD(d=0.005)ACD(d=0.050)LPD(d=0.01)ALD(d=0.01)ACD(d=0.01)
(c) #RNs used by ALD, ACD, LPD
Fig. 10: Results for grid RN distribution with constant SN density: seven different deployment regions, from40ร 40 to 100ร 100; two density values, ๐1 = 0.005 and ๐2 = 0.01.
2000 4000 6000 8000 10000 12000 14000 160000
5
10
15
20
|V|+|E|
Run
ning
tim
e (in
sec
s)
ACS(d=0.005)ALD(d=0.005)ACD(d=0.005)ACS(d=0.01)ALD(d=0.01)ACD(d=0.01)
(a) running times of ACS, ALD, ACD
40x40 50x50 60x60 70x70 80x80 90x90100x1000
5
10
15
20
25
Field Size (units x units)
Num
ber
of R
Ns
used
LPS(d=0.005)ACS(d=0.005)LPS(d=0.01)ACS(d=0.01)
(b) #RNs used by ACS, LPS
40x40 50x50 60x60 70x70 80x80 90x90100x1000
10
20
30
40
Field Size (units x units)
Num
ber
of R
Ns
used
LPD(d=0.005)ALD(d=0.005)ACD(d=0.050)LPD(d=0.01)ALD(d=0.01)ACD(d=0.01)
(c) #RNs used by ALD, ACD, LPD
Fig. 11: Results for random RN distribution with constant SN density: seven different deployment regions,from 40ร 40 to 100ร 100; two density values, ๐1 = 0.005 and ๐2 = 0.01.
densities, the algorithms for 1CSCP have low runningtime, while those for 2CDCP have higher runningtime, which is expected. The running times for theALD and ACD, increase with increasing โฃ๐ธโฃ + โฃ๐ โฃ
as more RNs are required for coverage and con-nectivity, thus taking more time. The running timefor ๐2 = 0.01 is less than that of ๐1 = 0.005, aswith increasing density, there is greater likelihood of
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
13
the RNs used for coverage to be connected as such.Figs. 10(b), 10(c), 11(b), and 11(c) show the numberof RNs required by various algorithms in differentexperiment settings. Again, our algorithms performremarkably well, never requiring more than twice thenumber of RNs in the optimal solution.
40x40 50x50 60x60 70x70 80x80 90x90 100x10030%
40%
50%
60%
70%
80%
90%
100%
Field Size (units x units)
Ene
rgy
Impr
ovem
ent (
%)
d=0.005d=0.01
(a) Constant density
20 40 60 80 100 12085%
90%
95%
100%
Number of SNs
Ene
rgy
Impr
ovem
ent (
%)
(b) Increasing density
Fig. 12: Grid distribution
40x40 50x50 60x60 70x70 80x80 90x90 100x10030%
40%
50%
60%
70%
80%
90%
100%
Field Size (units x units)
Ene
rgy
Impr
ovem
ent (
%)
d=0.005d=0.01
(a) Constant density
20 40 60 80 100 12085%
90%
95%
100%
Number of SNs
Ene
rgy
Impr
ovem
ent (
%)
(b) Increasing density
Fig. 13: Random distribution
For energy efficiency, we only compare the net-work without RNs deployed and the network withRNs deployed to solve 1CSCP. Figs. 12 and 13 showthe energy efficiency improvement by placing RNs.For the constant density case, we observe that theimprovement is increased with the increase of thefield size. The reason is that some SNs may needto forward data for more SNs when the field sizeis increased without RNs deployed. In the case withRNs deployed, the SNs can transmit to the closestRN and do not need to forward data for other SNs.For the increasing density case, we observe that theimprovement tends to keep consistent (the average
improvement varies within the range of width 3%).The reason is that although the SNs need to forwardthe data for more SNs, the transmission distances areshorten due to the increased SN density.
8 CONCLUSIONS AND OPEN PROBLEMSWe have studied the constrained relay node place-ment in a two-tiered wireless sensor network tomeet connectivity and survivability requirements. Forthe connected single-cover problem, we have pre-sented a framework of polynomial time approxi-mation algorithms with ๐ช(1)-approximation ratios.For the 2-connected double-cover problem, our algo-rithms have ๐ช(1)-approximation ratios for the prac-tical cases where each sensor node can be con-nected to only a constant number of relay nodes, and๐ช(ln ๐)-approximation ratios for the arbitrary cases.We have also presented linear programming basedlower bounds for the optimal solutions, which areused in the simulation studies. Simulation resultsshow that the solutions obtained by our algorithmsare always within twice that of the optimal solution.
There are still many open problems in this area.Although algorithms with guaranteed approximationratios were developed in this paper, one underlyingassumption in our model is that ๐ โฅ 2๐. It would beinteresting to study the two-tiered constrained relaynode placement problem without such an assumption.In addition, we have been tackling the relay nodeplacement problems by solving the coverage prob-lem and the connectivity problem separately. Alter-natively, one can develop an algorithm that considersboth coverage and connectivity jointly, which maylead to a tighter bound. Another direction is to extendour algorithms to more generic case, i.e., ๐-connected๐-cover problem, where ๐ โฅ 1 and ๐ โฅ 1.
REFERENCES[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci;
Wireless sensor networks: a survey; COMNET; Vol. 38(2002),pp. 393โ422.
[2] J. Bredin, E. Demaine, M. Hajiaghayi and D. Rus; Deployingsensor networks with guaranteed capacity and fault tolerance;Mobihocโ05; pp. 309-319.
[3] J. Bredin, E. Demaine, M. Hajiaghayi and D. Rus; Deployingsensor networks with guaranteed fault tolerance; IEEE/ACMTransactions on Networking; Vol. 18(2010), pp. 216โ228.
[4] P. Carmi and M.J. Katz; Power assignment in radio networkswith two power levels; Algorithmica; Vol. 47(2007), pp. 183โ201.
[5] P. Cheng, C.N. Chuah and X. Liu; Energy-aware node place-ment in wireless sensor networks; Globecomโ04; pp. 3210โ3214.
[6] X. Cheng, D.Z. Du, L. Wang and B. Xu; Relay sensor placementin wireless sensor networks; ACM/Springer WINETโ07;
[7] F. Claude, R. Dorrigiv, S. Durocher and R. Fraser; Practical dis-crete unit disk cover using an exact line-separable algorithm;ISAACโ09; pp. 45-54.
[8] T. Cormen, C. Leiserson, R. Rivest and C. Stein; Introduction toAlgorithms (2nd ed); MIT Press and McGraw-Hill, 2001.
[9] A. Efrat, Sandor P. Fekete, P. Gaddehosur, J. Mitchell, V. Pol-ishchuk and J. Suomela; Improved Approximation Algorithmsfor Relay Placement; ESAโ08; pp.356โ367.
[10] M.R. Garey and D.S. Johnson; Computers and Intractability: AGuide to the Theory of NP-Completeness; W.H Freeman and Co.,1979.
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
14
[11] G. Gupta and M. Younis; Fault tolerant clustering of wirelesssensor networks; WCNCโ03, pp. 1579โ1584.
[12] X. Han, X. Cao, E.L. Lloyd and C.-C. Shen; Fault-tolerant relaynode placement in heterogeneous wireless sensor networks;Infocomโ07, pp. 1667โ1675.
[13] B. Hao, J. Tang and G. Xue; Fault-tolerant relay node place-ment in wireless sensor networks: formulation and approxi-mation; HPSRโ04; pp. 246-250.
[14] W.B. Heinzelman, A.P. Chandrakasan and H. Balakrishnan;An application-specific protocol architecture for wireless mi-crosensor networks; IEEE Transactions on Wireless Communica-tions; Vol. 1(2002), pp. 660โ670.
[15] D.S. Hochbaum; Approximating covering and packing prob-lems: Set cover, vertex cover, independent set, and relatedproblems; in: D.S. Hochbaum (Ed.), Approximation Algorithmsfor NP-Hard Problems; PWS Publishing Co., Boston, MA, USA,1996, pp. 94-143.
[16] Y.T. Hou, Y. Shi, and H.D. Sherali; On energy provisioningand relay node placement for wireless sensor networks; IEEETransactions on Wireless Communications, Vol. 4(2005), pp. 2579โ2590.
[17] F.K. Hwang, D.S. Richards and P. Winter; The Steiner TreeProblem; Annals of Discrete Mathematics, 1992.
[18] A. Kashyap, S. Khuller and M. Shayman; Relay placementfor higher order connectivity in wireless sensor networks;Infocomโ06.
[19] L.T. Kou, G. Markowsky and L. Berman; A fast algorithm forSteiner trees; Acta Informatica; Vol. 15(1981); pp. 141โ145.
[20] Q. Li, J. Aslam, D. Rus; Online power-aware routing in wire-less ad-hoc networks; Mobicomโ01, pp. 97โ107.
[21] G. Lin and G. Xue; Steiner tree problem with minimum num-ber of Steiner points and bounded edge-length; InformationProcessing Letters; Vol. 69(1999), pp. 53-57.
[22] H. Liu, P.J. Wan and X.H. Jia; Fault-tolerant relay node place-ment in wireless sensor networks; LNCS; Vol. 3595(2005),pp. 230โ239.
[23] E. Lloyd and G. Xue; Relay node placement in wirelesssensor networks; IEEE Transactions on Computers; Vol. 56(2007),pp. 134โ138.
[24] W. Maass; On the complexity of nonconvex covering; SIAMJournal on Computing; Vol. 15(1986), pp. 453โ467.
[25] S. Misra, S. Hong, G. Xue and J. Tang; Constrained relaynode placement in wireless sensor networks: formulationand approximations; IEEE/ACM Transactions on Networking;Vol. 18(2010), pp. 434โ447.
[26] N. Mustafa and S. Ray; PTAS for geometric hitting set prob-lems via local search; SCGโ09; pp. 17-22.
[27] J. Pan, Y.T. Hou, L. Cai, Y. Shi, S.X. Shen; Topology control forwireless sensor networks; Mobicomโ03, pp. 286โ299.
[28] S. Rajagopalan and V. Vazirani; Primal-Dual RNC approxima-tion algorithms for set cover and covering integer programs;SIAM Journal on Computing; Vol. 28(1998), pp. 525โ540.
[29] R. Ravi and D.P. Williamson; An approximation al-gorithm for minimum-cost vertex-connectivity problems;Algorithmica;Vol.18(1997),pp.21-43.
[30] R. Ravi and D.P. Williamson; Erratum: an approximationalgorithm for minimum-cost vertex-connectivity problems; Al-gorithmica; Vol. 34(2002), pp.98โ107.
[31] G. Robins and A. Zelikovsky; Tighter bounds for graph Steinertree approximation; SIAM J. on Disc. Math.; Vol. 19(2005),pp. 122โ134.
[32] A. Srinivas, G. Zussman, and E. Modiano; Mobile backbonenetworksโConstruction and maintenance, Mobihocโ06, pp. 166โ177.
[33] D.B. West, Introduction to Graph Theory, Prentice Hall, 1996.[34] K. Xu, H. Hassanein, G. Takahara and Q. Wang; Relay node
deployment strategies in heterogeneous wireless sensor net-works: multiple-hop communication case; Seconโ05, pp. 575-585.
[35] O. Younis and S. Fahmy; Distributed clustering for ad-hoc sen-sor networks: a hybrid, energy-efficient approach; Infocomโ04;pp.269โ640.
[36] W. Zhang, G. Xue, and S. Misra; Fault-tolerant relay nodeplacement in wireless sensor networks: problems and algo-rithms; Infocomโ07; pp.1649โ1657.
Dejun Yang (Sโ08) received the B.S. fromPeking University, China, in 2007. Currentlyhe is a PhD student in the School of Comput-ing, Informatics, and Decision Systems Engi-neering (CIDSE) at Arizona State University.His research interests include game theory,graph algorithms, optimization in wirelesssensor networks, wireless mesh networksand social networks.
Satyajayant Misra (Mโ05) is an AssistantProfessor of Computer Science at New Mex-ico State University. He received his MScdegrees (2003) in physics and computer sci-ence from BITS, Pilani, India and his PhDdegree (2009) in computer science from theSchool of Computing and Informatics at Ari-zona State University. His research inter-ests are in wireless and social networks andinclude network security, optimization, andanalysis. He has served on the TPCs of
several international conferences and as reviewer for several inter-national journals and conferences.
Xi Fang (Sโ09) received the B.S. and M.S.degrees from Beijing University of Postsand Telecommunications, China, in 2005 and2008 respectively. Currently he is a Ph.Dstudent in the School of Computing, Infor-matics, and Decision Systems Engineeringat Arizona State University. His research in-terests include algorithm design and securityin wireless networks, optical networks andsocial networks.
Guoliang Xue (SMโ99-Fโ11) is a Professor ofComputer Science and Engineering at Ari-zona State University. He received the BSdegree (1981) in mathematics and the MSdegree (1984) in operations research fromQufu Normal University, Qufu, China, andthe PhD degree (1991) in computer sciencefrom the University of Minnesota, Minneapo-lis, USA. His research interests include sur-vivability, security, and resource allocationissues in networks ranging from optical net-
works to wireless mesh and sensor networks. He has publishedover 170 papers in these areas. He received the NSF ResearchInitiation Award in 1994, and has been continuously supported byfederal agencies including NSF and ARO. He is an Associate Editorof IEEE/ACM Transactions on Networking and IEEE Network, aswell as a past Associate Editor of IEEE Transactions on WirelessCommunications, and Computer Networks. He served as a TPC co-chair of IEEE INFOCOMโ2010, and is a Distinguished Lecturer of theIEEE Communications Society. He is a Fellow of the IEEE.
Junshan Zhang (Mโ00-SMโ06) received hisPh.D. degree from the School of ECE atPurdue University in 2000. He joined the EEDepartment at Arizona State University inAugust 2000, where he has been Professorsince 2010. His current research focuseson fundamental problems in information net-works and network science, including net-work optimization and management, networkinformation theory, and statistical learningand analysis. He is a recipient of the ONR
Young Investigator Award in 2005 and the NSF CAREER award in2003. He served as TPC co-chair for WICONโ2008 and IPCCCโ06,and general chair for IEEE Communication Theory Workshopโ2007.He will be TPC co-chair for INFOCOMโ2012. He co-authored a paperthat won IEEE ICCโ2008 best paper award. One of his papers wasselected as the INFOCOMโ2009 Best Paper Award Runner-up.
IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.