two-tiered constrained relay node placement in wireless sensor

14
1 Two-Tiered Constrained Relay Node Placement in Wireless Sensor Networks: Computational Complexity and Ef๏ฌcient Approximations Dejun Yang, Member, IEEE, Satyajayant Misra, Member, IEEE, Xi Fang, Member, IEEE, Guoliang Xue, Fellow, IEEE, and Junshan Zhang, Senior Member, IEEE Abstractโ€”In wireless sensor networks, relay node placement has been proposed to improve energy ef๏ฌciency. In this paper, we study two-tiered constrained relay node placement problems, where the relay nodes can be placed only at some pre-speci๏ฌed candidate locations. To meet the connectivity requirement, we study the connected single-cover problem where each sensor node is covered by a base station or a relay node (to which the sensor node can transmit data), and the relay nodes form a connected network with the base stations. To meet the survivability requirement, we study the 2-connected double-cover problem where each sensor node is covered by two base stations or relay nodes, and the relay nodes form a 2-connected network with the base stations. We study these problems under the assumption that โ‰ฅ 2> 0, where and are the communication ranges of the relay nodes and the sensor nodes, respectively. We investigate the corresponding computational complexities, and propose novel polynomial time approximation algorithms for these problems. Speci๏ฌcally, for the connected single-cover problem, our algorithms have (1)-approximation ratios. For the 2-connected double-cover problem, our algorithms have (1)-approximation ratios for practical settings and (ln )-approximation ratios for arbitrary settings. Experimental results show that the number of relay nodes used by our algorithms is no more than twice of that used in an optimal solution. Index Termsโ€”Relay node placement, wireless sensor networks, connectivity and survivability. โœฆ 1 I NTRODUCTION I N wireless sensor networks (WSNs), many low- cost and low-power sensor nodes (SNs)[1] sense the environment and transmit sensed information over possibly multiple hops to the base stations (BSs). Since energy conservation is a primary concern in WSNs, there has been extensive research on energy aware routing [5, 14, 20, 35]. To prolong network lifetime while meeting certain network speci๏ฌcations, researchers have proposed to deploy a small number of relay nodes (RNs) in a WSN to communicate with the SNs, BSs, and other RNs [2, 3, 6, 9, 13, 16, 18, 22, 23, 34]. This is studied under the theme of relay node placement. In general, the relay node placement problem has been studied from two perspectives, namely the rout- ing structure and the connectivity requirements. The study based on the routing structure may be further classi๏ฌed into single-tiered and two-tiered [9, 13, 23, 27]. โˆ™ Dejun Yang, Xi Fang, Guoliang Xue and Junshan Zhang are af- ๏ฌliated with Arizona State University, Tempe, AZ 85287. E-mail: {dejun.yang, xi.fang, xue, junshan.zhang}@asu.edu. โˆ™ Satyajayant Misra is af๏ฌliated with New Mexico State University, Las Cruces, NM 88003. Email: [email protected]. โˆ™ This research was supported in part by NSF grant 0901451 and ARO grant W911NF-09-1-0467. The information reported here does not re๏ฌ‚ect the position or the policy of the federal government. In single-tiered relay node placement, the SNs may also forward packets. In two-tiered relay node place- ment, the SNs transmit their sensed data to an RN or a BS, but do not forward packets for other nodes. The two-tiered network is essentially a cluster-based network, where each RN acts as the cluster head in the corresponding cluster. Extensive research efforts have been done on cluster-based networks, for example, energy-ef๏ฌcient cluster-based protocol designed by Heinzelman et al. [14], topology control presented by Pan et al. [27], and clustering algorithms proposed by Gupta and Younis [11], and Younis and Fahmy [35]. The study based on connectivity requirements can be classi๏ฌed into connected and survivable [2, 3, 13, 18, 36]. For connected relay node placement, the placement of RNs ensures the connectivity between the SNs and the BSs. For survivable relay node placement, the placement of RNs ensures the biconnectivity between the SNs and the BSs. Most of the previous works [2, 3, 6, 9, 12, 13, 18, 22, 23, 32, 36] study unconstrained relay node placement, in the sense that the RNs can be placed anywhere. In practice, however, there may be some physical constraints on the placement of the RNs: e.g., there may be a lower bound on the distance between two nodes to reduce interference; or there may be some forbidden regions where relay nodes cannot be placed. For instance, in a WSN application Digital Object Indentifier 10.1109/TMC.2011.126 1536-1233/11/$26.00 ยฉ 2011 IEEE IEEE TRANSACTIONS ON MOBILE COMPUTING This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

Upload: others

Post on 03-Feb-2022

11 views

Category:

Documents


0 download

TRANSCRIPT

1

Two-Tiered Constrained Relay NodePlacement in Wireless Sensor Networks:Computational Complexity and Efficient

ApproximationsDejun Yang, Member, IEEE, Satyajayant Misra, Member, IEEE, Xi Fang, Member, IEEE,

Guoliang Xue, Fellow, IEEE, and Junshan Zhang, Senior Member, IEEE

Abstractโ€”In wireless sensor networks, relay node placement has been proposed to improve energy efficiency. In this paper, westudy two-tiered constrained relay node placement problems, where the relay nodes can be placed only at some pre-specifiedcandidate locations. To meet the connectivity requirement, we study the connected single-cover problem where each sensor nodeis covered by a base station or a relay node (to which the sensor node can transmit data), and the relay nodes form a connectednetwork with the base stations. To meet the survivability requirement, we study the 2-connected double-cover problem whereeach sensor node is covered by two base stations or relay nodes, and the relay nodes form a 2-connected network with the basestations. We study these problems under the assumption that ๐‘… โ‰ฅ 2๐‘Ÿ > 0, where ๐‘… and ๐‘Ÿ are the communication ranges ofthe relay nodes and the sensor nodes, respectively. We investigate the corresponding computational complexities, and proposenovel polynomial time approximation algorithms for these problems. Specifically, for the connected single-cover problem, ouralgorithms have ๐’ช(1)-approximation ratios. For the 2-connected double-cover problem, our algorithms have ๐’ช(1)-approximationratios for practical settings and ๐’ช(ln๐‘›)-approximation ratios for arbitrary settings. Experimental results show that the number ofrelay nodes used by our algorithms is no more than twice of that used in an optimal solution.

Index Termsโ€”Relay node placement, wireless sensor networks, connectivity and survivability.

โœฆ

1 INTRODUCTION

IN wireless sensor networks (WSNs), many low-cost and low-power sensor nodes (SNs)[1] sense the

environment and transmit sensed information overpossibly multiple hops to the base stations (BSs).Since energy conservation is a primary concern inWSNs, there has been extensive research on energyaware routing [5, 14, 20, 35]. To prolong networklifetime while meeting certain network specifications,researchers have proposed to deploy a small numberof relay nodes (RNs) in a WSN to communicate withthe SNs, BSs, and other RNs [2, 3, 6, 9, 13, 16, 18, 22,23, 34]. This is studied under the theme of relay nodeplacement.

In general, the relay node placement problem hasbeen studied from two perspectives, namely the rout-ing structure and the connectivity requirements. Thestudy based on the routing structure may be furtherclassified into single-tiered and two-tiered [9, 13, 23, 27].

โˆ™ Dejun Yang, Xi Fang, Guoliang Xue and Junshan Zhang are af-filiated with Arizona State University, Tempe, AZ 85287. E-mail:{dejun.yang, xi.fang, xue, junshan.zhang}@asu.edu.

โˆ™ Satyajayant Misra is affiliated with New Mexico State University, LasCruces, NM 88003. Email: [email protected].

โˆ™ This research was supported in part by NSF grant 0901451 and AROgrant W911NF-09-1-0467. The information reported here does notreflect the position or the policy of the federal government.

In single-tiered relay node placement, the SNs mayalso forward packets. In two-tiered relay node place-ment, the SNs transmit their sensed data to an RNor a BS, but do not forward packets for other nodes.The two-tiered network is essentially a cluster-basednetwork, where each RN acts as the cluster head in thecorresponding cluster. Extensive research efforts havebeen done on cluster-based networks, for example,energy-efficient cluster-based protocol designed byHeinzelman et al. [14], topology control presented byPan et al. [27], and clustering algorithms proposed byGupta and Younis [11], and Younis and Fahmy [35].The study based on connectivity requirements can beclassified into connected and survivable [2, 3, 13, 18, 36].For connected relay node placement, the placement ofRNs ensures the connectivity between the SNs andthe BSs. For survivable relay node placement, theplacement of RNs ensures the biconnectivity betweenthe SNs and the BSs.

Most of the previous works [2, 3, 6, 9, 12, 13,18, 22, 23, 32, 36] study unconstrained relay nodeplacement, in the sense that the RNs can be placedanywhere. In practice, however, there may be somephysical constraints on the placement of the RNs:e.g., there may be a lower bound on the distancebetween two nodes to reduce interference; or theremay be some forbidden regions where relay nodescannot be placed. For instance, in a WSN application

Digital Object Indentifier 10.1109/TMC.2011.126 1536-1233/11/$26.00 ยฉ 2011 IEEE

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

2

for monitoring an active volcano that is ready to erupt,the inside of the crater (where the temperature couldreach many thousand degrees) is a forbidden regionfor the placement of relay nodes (any nodes). In anutshell, there are many such practical applicationswhere the placement in general is constrained.

The relay node placement problem subject to for-bidden regions and the lower bound on internodedistances, is intrinsically more challenging, comparedto its unconstrained counterpart. Taking an initial steptowards solving this challenging problem, we studyconstrained relay node placement problems where theRNs can only be placed at a set of candidate locations.Our formulation can be viewed as an approximationto the aforementioned relay node placement problem,subject to the constraints of forbidden regions and thelower bound on internode distance in the followingsense. Instead of allowing the relay nodes to be placedanywhere outside of the forbidden regions and satis-fying the internode distance bound, we further restrictthe placement of the relay nodes to certain candidatelocations that are outside of the forbidden regions.The use of candidate locations simultaneously ap-proximates the constraints enforced by the forbiddenregions and the internode distance bound.

1.1 Main ContributionsIn this paper, we study the two-tiered constrained re-lay node placement problem, under both connectivityand survivability requirements. As discussed earlier,the two-tiered problem strongly resembles the realworld deployment of WSNs. Our main contributionsare summarized as follows:

โˆ™ To the best of our knowledge, this is the first workto study constrained relay node placement in thetwo-tiered model. The model under considerationassumes the usage of base stations, but it isstraightforward to extend our algorithms to thecases without base stations. Furthermore, it isassumed that the communication range of therelay nodes is at least twice of that of the sensornodes, without which the approximations of ouralgorithms may not hold, but this assumptionhas been shown to be valid for most scenarios ofHWSNs [13, 32] and adopted in [25, 36] as well.

โˆ™ We study the relay node placement problem withconnectivity requirement, named the connectedsingle-cover problem (1CSCP). In this problem, ourobjective is to place a minimum number of RNssuch that (1) each SN is covered by at least one BSor RN and (2) the RNs form a connected networkwith the BSs. We formulate the problem, proveits NP-hardness, and present a polynomial time๐’ช(1)-approximation algorithm.

โˆ™ We study the relay node placement problem withsurvivability requirement, named the 2-connecteddouble-cover problem (2CDCP). In this problem,we intend to place a minimum number of RNs

such that (1) each SN is covered by at least twoBSs or RNs and (2) the RNs form a 2-connectednetwork with the BSs. We formulate the problem,study its computational complexity, and presentpolynomial time approximation algorithms. Ouralgorithms have ๐’ช(1)-approximation ratios forpractical settings, where there is a constant boundon the number of candidate RN locations each SNcan be connected to, and ๐’ช(ln๐‘›)-approximationratios for arbitrary settings.

1.2 Paper OrganizationThe rest of the paper is organized as follows. InSection 2, we provide a brief literature survey. InSection 3, we present the preliminary definitions andlemmas. In Section 4, we study 1CSCP. In Section 5,we study 2CDCP. Section 6 presents linear program-ming formulations for efficiently computing lowerbounds on the optimal solutions of the relay nodeplacement problems. We present experimental resultsin Section 7 and conclude the paper in Section 8.

2 RELATED WORKIn this section, we briefly review the related work.Throughout, we will use ๐‘Ÿ and ๐‘… to denote thecommunication ranges of SNs and RNs, respectively.We will use ๐‘˜ = 1 to denote connectivity requirementand ๐‘˜ โ‰ฅ 2 to denote survivability requirement. Theproblems studied in this paper fall under the two-tiered classification. For the single-tiered classification,we refer interested readers to [2, 3, 6, 9, 12, 13, 18, 21โ€“23, 25, 32, 36].

The two-tiered relay node placement problem hasbeen studied by [9, 12, 13, 22, 23, 32, 36]. The two-tiered model applies well to the highly scalable clus-tered wireless sensor networks [11], wherein the RNsact as the cluster heads [11, 27, 34]. In the two-tieredproblems formulated by Hao et al. [13], an SN hasto connect to at least 2 RNs and the RNs need toform a 2-connected network, under the assumptionthat ๐‘… โ‰ฅ ๐‘Ÿ. Sometimes, the SNs may be assigneddifferent power levels to minimize the total powerconsumption [4]. In [12], Han et al. studied relaynode placement in a heterogeneous WSN, where theSNs have different transmission radii. They presented๐’ช(1)-approximation algorithms for given ๐‘˜ โ‰ฅ 2. Liu etal. [22] proposed two ๐’ช(1)-approximation algorithmsfor the problem with ๐‘… = ๐‘Ÿ and ๐‘˜ = 2. Lloydand Xue [23] studied the problem for ๐‘… โ‰ฅ ๐‘Ÿ and๐‘˜ = 1, and proposed a (5 + ๐œ–) algorithm, where๐œ– is any positive constant. Recently, Efrat et al. [9]improved it to PTAS [8]. Srinivas et al. [32] studiedthe problem of the maintenance of a mobile backboneusing the minimum number of backbone nodes giventhat ๐‘… โ‰ฅ 2๐‘Ÿ and ๐‘˜ = 1. Zhang et al. [36] studiedthe problem with ๐‘… โ‰ฅ ๐‘Ÿ and ๐‘˜ = 2 and presenteda (20 + ๐œ–)-approximation algorithm when the BSs are

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

3

considered. To the best of our knowledge, our paperis the first work on two-tiered constrained relay nodeplacement.

3 DEFINITIONS AND PRELIMINARIESIn this section, we formally define the problems andpresent some basic lemmas to be used in later sec-tions. We consider a heterogeneous wireless sensornetwork (HWSN) consisting of three kinds of nodes:base stations (BSs), sensor nodes (SNs), and relay nodes(RNs). We are interested in the scenario where RNscan be placed only at certain candidate locations.Throughout this paper, we use โ„ฌ to denote the set ofbase stations, ๐’ฎ to denote the set of sensor nodes, and๐’ณ to denote the set of candidate locations where relaynodes can be placed. We make the following assump-tions as in [13, 25, 32]. For given constants ๐‘… โ‰ฅ 2๐‘Ÿ > 0,the communication range of the SNs is ๐‘Ÿ, that of theRNs is ๐‘…, and that of the BSs is much greater than๐‘… such that any two BSs can communicate directlywith each other (as they are connected, e.g., via eitherthe wired networks or the satellites). Note that theassumption ๐‘… โ‰ฅ 2๐‘Ÿ is valid for most scenarios ofHWSNs [13, 32]. For example, TelosB motes (possiblesensor nodes) have an outdoor transmission rangebetween 75m and 100m; IRIS motes (possible relaynodes) have an outdoor transmission range about300m; IEEE 802.11 routers (possible relay nodes) havean outdoor transmission range about 800m. We use๐‘‘(๐‘ฅ, ๐‘ฆ) to denote the Euclidean distance between twopoints ๐‘ฅ and ๐‘ฆ in the plane. We also use ๐‘ข to denotethe location of a node ๐‘ข, where it is unambiguous.

We are interested in a two-tiered set-up, wherethe SNs send the sensed data to an RN or a BSwithin distance ๐‘Ÿ, while the RNs can forward receivedpackets to an RN or a BS within distance ๐‘…. We definethe hybrid communication graph (HCG) and the relaycommunication graph (RCG) in the following.

Definition 3.1: [Hybrid Communication Graph]Let ๐‘Ÿ, ๐‘…, โ„ฌ, ๐’ฎ, and ๐’ณ be given. Let โ„› be a subset of๐’ณ . The hybrid communication graph ๐ป๐ถ๐บ(๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,โ„›)induced by the 5-tuple (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,โ„›) is a directed graphwith vertex set ๐‘‰ = โ„ฌโˆช๐’ฎ โˆชโ„› and edge set ๐ธ definedas follows. For any two BSs ๐‘๐‘–, ๐‘๐‘— โˆˆ โ„ฌ, ๐ธ contains thebi-directed edge (๐‘๐‘–, ๐‘๐‘—). For an RN ๐‘ฆ โˆˆ โ„› and a node๐‘ฅ โˆˆ โ„ฌ โˆชโ„›, ๐ธ contains the bi-directed edge (๐‘ฆ, ๐‘ฅ) if andonly if ๐‘‘(๐‘ฆ, ๐‘ฅ) โ‰ค ๐‘…. For an SN ๐‘  โˆˆ ๐’ฎ and a node๐‘ฅ โˆˆ โ„› โˆช โ„ฌ, ๐ธ contains the directed edge (๐‘ , ๐‘ฅ) if andonly if ๐‘‘(๐‘ , ๐‘ฅ) โ‰ค ๐‘Ÿ. โ–ก

Definition 3.2: [Relay Communication Graph] Let๐‘…, โ„ฌ, and โ„› be given as in Definition 3.1. The relaycommunication graph ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,โ„›) induced by the 3-tuple (๐‘…,โ„ฌ,โ„›) is an undirected graph with vertex set๐‘‰ = โ„ฌ โˆช โ„› and edge set ๐ธ defined as follows. Forany two BSs ๐‘๐‘–, ๐‘๐‘— โˆˆ โ„ฌ, ๐ธ contains the undirected edge(๐‘๐‘–, ๐‘๐‘—). For an RN ๐‘ฆ โˆˆ โ„› and a node ๐‘ฅ โˆˆ โ„ฌ โˆช โ„›, ๐ธ

contains the undirected edge (๐‘ฆ, ๐‘ฅ) = (๐‘ฅ, ๐‘ฆ) if and onlyif ๐‘‘(๐‘ฆ, ๐‘ฅ) โ‰ค ๐‘…. โ–ก

The HCG characterizes all possible pairwise com-munications between pairs of nodes. The RCG char-acterizes all possible communications between theRNs and/or BSs. We also define in the following theconcepts related to the weight and the relay size of anRCG. These concepts will be used later to establishrelationships between the weight of a subgraph andthe number of corresponding RNs. We use the follow-ing standard graph-theoretic notations: for a graph ๐บ,๐‘‰ (๐บ) denotes the vertex set of ๐บ and ๐ธ(๐บ) denotesthe edge set of ๐บ.

Definition 3.3: Let ๐บ = ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ ) be a relaycommunication graph. Let โ„› be a given subset of ๐’ณ .For each edge ๐‘’ = (๐‘ข, ๐‘ฃ) in the ๐‘…๐ถ๐บ, we define itsweight induced by โ„› (denoted by ๐‘คโ„›(๐‘’)) as

๐‘คโ„›(๐‘’) = โˆฃ{๐‘ข, ๐‘ฃ} โˆฉ (๐’ณ โˆ– โ„›)โˆฃ. (1)

Let โ„‹ be a subgraph of ๐บ. The weight of โ„‹ (denotedby ๐‘คโ„›(โ„‹)) is defined as

๐‘คโ„›(โ„‹) =โˆ‘

๐‘’โˆˆ๐ธ(โ„‹)

๐‘คโ„›(๐‘’). (2)

The relay-size of โ„‹ (denoted by ๐œ‹โ„›(โ„‹)) is defined as

๐œ‹โ„›(โ„‹) = โˆฃ๐‘‰ (โ„‹) โˆฉ (๐’ณ โˆ– โ„›)โˆฃ. (3)

We call ๐‘’ a weight-0 edge if ๐‘คโ„›(๐‘’) = 0, a weight-1 edgeif ๐‘คโ„›(๐‘’) = 1, and a weight-2 edge if ๐‘คโ„›(๐‘’) = 2. โ–ก

The example in Fig. 1 illustrates Definition 3.3.

(a) HCG of the example (b) Deployed RNs for cover-ing the SNs

(c) RCG with weight on theedges

(d) A subgraph โ„‹ of ๐บ with๐œ‹โ„›(โ„‹) = 2

Fig. 1: An example illustrating the concepts in Defi-nition 3.3. The hexagons represent the BSs, the circlesrepresent the SNs, and the squares represent the can-didate RN locations, of which the solid ones representthe deployed RNs for covering the SNs.

Lemma 3.1: Let โ„‹ be a subgraph of ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ )and โ„› โŠ† ๐’ณ be a selected set of RNs. Assume thateach ๐‘…๐‘ โˆˆ ๐’ณ โˆ– โ„› in โ„‹ has degree at least 2 (in โ„‹),then ๐‘คโ„›(โ„‹) โ‰ฅ 2 โ‹… ๐œ‹โ„›(โ„‹). โ–ก

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

4

PROOF. This lemma can be proved by shifting theweight of an edge to its end nodes. We refer the readerto Lemma 2.1 in [25], while noting the followingdifferences. Instead of the HCG we consider an RCGhere, and instead of all RNs we consider only thosebelonging to ๐’ณ โˆ– โ„›.

We will also need the results stated in Lemma 3.2and Lemma 3.3. These lemmas have been proved byMisra et al. in [25, Lemma 2.2 and Lemma 2.3], westate them here without the proofs.

Lemma 3.2: Let ๐บ(๐‘‰,๐ธ) be an undirected 2-connected graph where โˆฃ๐‘‰ โˆฃ โ‰ฅ 3 and each edge๐‘’ โˆˆ ๐ธ has a unit length ๐‘™(๐‘’) = 1. Let โ„‹(๐‘‰,๐ธโ€ฒ) bea minimum length 2-connected subgraph of ๐บ. Thenโˆฃ๐ธโ€ฒโˆฃ โ‰ค 2โˆฃ๐‘‰ โˆฃ โˆ’ 3. โ–ก

Lemma 3.3: Let ๐บ(๐‘‰,๐ธ) be an undirected con-nected graph where โˆฃ๐‘‰ โˆฃ โ‰ฅ 3 and each edge ๐‘’ โˆˆ ๐ธ

has a unit length ๐‘™(๐‘’) = 1. Let โ„‹(๐‘‰,๐ธโ€ฒ) be a minimumlength connected subgraph of ๐บ such that two vertices๐‘ข and ๐‘ฃ are in the same 2-connected component ofโ„‹ if and only if they are in the same 2-connectedcomponent of ๐บ. Then โˆฃ๐ธโ€ฒโˆฃ โ‰ค 2โˆฃ๐‘‰ โˆฃ โˆ’ 1. โ–ก

As is standard, a polynomial time ๐›ผ-approximationalgorithm for a minimization problem is an algorithm๐”ธ that, for any instance of the problem, computes asolution that is at most ๐›ผ times the optimal solutionto the instance, in time bounded by a polynomialin the input size of the instance [8]. Approximationalgorithm ๐”ธ is also said to have an approximation ratioof ๐›ผ. For graph-theoretic terms not defined in thispaper, we refer readers to the standard textbook [33].The terms nodes and vertices are used interchangeably,as well as terms links and edges. For concepts inalgorithms and the theory of computation, we referreaders to the standard textbooks [8, 10].

4 CONNECTED SINGLE-COVERIn this section, we study the connected single-coverproblem. Refer to the first paragraph in Section 3 forthe notations ๐‘Ÿ, ๐‘…, โ„ฌ, ๐’ฎ, and ๐’ณ .

4.1 Problem Definitions and NotationDefinition 4.1: [SCP] A subset โ„› โŠ† ๐’ณ is called a

single-cover (denoted by SC) of ๐’ฎ if every SN in ๐’ฎis within distance ๐‘Ÿ of โ„› โˆช โ„ฌ. The size of the corre-sponding SC is โˆฃโ„›โˆฃ. An SC of ๐’ฎ is called a minimumsingle-cover (denoted by MSC) of ๐’ฎ if it has the min-imum size among all SCs of ๐’ฎ. The single-cover relaynode placement problem (denoted by SCP(๐‘Ÿ,โ„ฌ,๐’ฎ,๐’ณ )) for(๐‘Ÿ,โ„ฌ,๐’ฎ,๐’ณ ) seeks an MSC of ๐’ฎ. โ–ก

The SCP is closely related to the geometric disk hittingproblem (GDHP), defined formally in the following.

Definition 4.2: [GDHP] Given a set ๐’ซ of points anda set ๐’Ÿ of disks with radius ๐‘Ÿ. A subset ๐’ซ โ€ฒ โŠ† ๐’ซ iscalled a hitting set if any disk in ๐’Ÿ is hit by at least onepoint in ๐’ซ โ€ฒ, that is, the center of any disk is withindistance ๐‘Ÿ of at least one point in ๐’ซ โ€ฒ. The geometric

disk hitting problem (denoted by GDHP(๐‘Ÿ,๐’Ÿ,๐’ซ)) seeksa hitting set of minimum size. โ–ก

Definition 4.3: [1CSCP] A subset โ„› โŠ† ๐’ณ is calleda connected single-cover (denoted by 1CSC) of ๐’ฎ if (a)โ„› is a single-cover of ๐’ฎ and (b) the relay communi-cation graph ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,โ„›) is connected. The size ofthe corresponding 1CSC is โˆฃโ„›โˆฃ. A 1CSC is called aminimum connected single-cover (denoted by M1CSC)of ๐’ฎ if it has the minimum size among all 1CSCsof ๐’ฎ. The connected single-cover relay node placementproblem (denoted by 1CSCP) for (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ) seeksan M1CSC of ๐’ฎ. โ–ก

Observe that existing studies [2, 6, 16, 18, 23, 32, 36]considered unconstrained relay node placement. Incontrast, our study here focuses on the connected sin-gle cover problem subject to constraints. The solutionsto some of the unconstrained problems may deploy anRN on top of an SN or another RN. In practice, thereare some physical constraints on the RN deployment.For example, there should be a minimum distancebetween two RNs to reduce interference. There mayalso be some forbidden regions where RNs cannot bedeployed. It is clear that our model is more practicalthan previous models. This work also differs from thework in [25], because we are studying a two-tierednetwork while [25] studied the single-tiered problem.

4.2 Computational ComplexityBefore designing algorithms for 1CSCP, we prove that1CSCP is NP-hard. We first prove that SCP is NP-hardby a reduction from GDHP, which is known to be NP-hard [24]. We then prove that 1CSCP is NP-hard by areduction from SCP.

Lemma 4.1: SCP is NP-hard. โ–ก

PROOF. We prove this by reduction from GDHP. Letan instance โ„1 of GDHP be given by (๐‘Ÿ,๐’Ÿ,๐’ซ). Aninstance โ„2 of SCP is given by (๐‘Ÿ,โ„ฌ,๐’ฎ,๐’ณ ) where thesensor transmission range ๐‘Ÿ is the same as in โ„1; theset of sensor nodes ๐’ฎ is set to the centers of the disksin ๐’Ÿ; the set of relay candidate locations ๐’ณ is set to ๐’ซ ;and the set of base stations โ„ฌ consists of a single point๐‘ that is not in any of the disks in ๐’Ÿ. This constructiontakes polynomial time. Moreover, a subset of ๐’ซ is anoptimal solution to โ„1 if and only it is an optimalsolution to โ„2. This completes the proof.

Using the techniques in the proof of Lemma 4.1, wecan also construction a reduction from SCP to GDHP.More importantly, an ๐›ผ-approximation algorithm forGDHP can be used as an ๐›ผ-approximation algorithmfor SCP and vice versa.

Theorem 4.1: 1CSCP is NP-hard. โ–ก

PROOF. Let an instance โ„1 of SCP be given by(๐‘Ÿ,โ„ฌ,๐’ฎ,๐’ณ ), where โ„ฌ = {๐‘1, . . . , ๐‘๐ต}, ๐’ฎ = {๐‘ 1, . . . , ๐‘ ๐‘›},๐’ณ = {๐‘ฅ1, . . . , ๐‘ฅ๐‘ก}, and ๐‘Ÿ > 0. We constructan instance โ„2 of 1CSCP by (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ), where๐‘… = max1โ‰ค๐‘–<๐‘—โ‰ค๐‘ก โˆฃโˆฃ๐‘ฅ๐‘– โˆ’ ๐‘ฅ๐‘— โˆฃโˆฃ. This results in thesubgraph ๐บ(๐‘…,๐’ณ ) of the HCG to be a complete graph.

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

5

It is easy to see that a subset ๐’ณ โ€ฒ โŠ† ๐’ณ is an optimalsolution to โ„1 if and only if it is an optimal solutionto โ„2. Therefore, 1CSCP is NP-hard.

4.3 A Framework of Efficient Approximation Algo-rithms for 1CSCPIn this subsection, we present a framework of poly-nomial time approximation algorithms for 1CSCP.The framework decomposes 1CSCP into two sub-problems, outlined as follows. It first applies an al-gorithm ๐”ธ for SCP to compute a single-cover โ„›๐”ธ

of ๐’ฎ with a small cardinality. It then applies an-other algorithm ๐”น for the Steiner tree problem [17]to augment โ„›๐”ธ by some other RNs โ„›๐”น so that therelay communication graph ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,โ„›๐”ธ โˆช โ„›๐”น) isconnected. The union of โ„›๐”ธ and โ„›๐”น is output as aconnected single-cover of ๐’ฎ.

Algorithm 1 Approximation for 1CSCP(๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ )

Input: Set โ„ฌ of BSs, set ๐’ฎ of SNs, set ๐’ณ of candidateRN locations, sensor node communication range๐‘Ÿ > 0, and relay node communication range ๐‘… โ‰ฅ2๐‘Ÿ > 0. An approximation algorithm ๐”ธ for SCP,and an approximation algorithm ๐”น for the Steinertree problem.

Output: A connected single-cover โ„›๐”ธ โˆชโ„›๐”น โŠ† ๐’ณ .1: Remove from ๐’ฎ all SNs within distance ๐‘Ÿ from โ„ฌ.

Apply algorithm ๐”ธ to obtain a single-cover โ„›๐”ธ of๐’ฎ. Without loss of generality, we assume that โ„›๐”ธ

is minimal, meaning that none of its proper subsetsis a single-cover of ๐’ฎ.

2: Construct the relay communication graph ๐บ =๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ ).

3: if the nodes in โ„ฌ โˆช โ„›๐”ธ are not in the sameconnected component of ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ ) then

4: Stop. The given instance of 1CSCP does nothave a feasible solution.

5: end if6: Assign edge weight in ๐บ as (1), with โ„› substituted

by โ„›๐”ธ, i.e., for an edge (๐‘ฅ, ๐‘ฆ) in ๐บ, we have

๐‘คโ„›๐”ธ(๐‘ฅ, ๐‘ฆ) = โˆฃ(๐’ณ โˆ– โ„›๐”ธ) โˆฉ {๐‘ฅ, ๐‘ฆ}โˆฃ.

7: Apply algorithm ๐”น to compute a low weightSteiner tree [17] ๐’ฏ๐”น of ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ ), spanning thenode set โ„ฌ โˆช โ„›๐”ธ. Let the set of Steiner points inthe tree ๐’ฏ๐”น be โ„›๐”น.

8: Output โ„›๐”ธ,๐”น = โ„›๐”ธ โˆชโ„›๐”น.

We illustrate the major steps of Algorithm 1 viathe example shown in Fig. 2. The instance has 2base stations (hexagons), 9 sensor nodes (circles), and18 candidate RN locations (squares). We also have๐‘… = 2๐‘Ÿ. The nodes, as well as the hybrid communica-tion graph ๐ป๐ถ๐บ(๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ) are shown in Fig. 2(a),where we have omitted the directions of the SN-RNedges for clarity. Algorithm 1 performs the following

(a) ๐ป๐ถ๐บ of the instance

๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ

๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ

๏ฟฝ๏ฟฝ

๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ

๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ

๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ

(b) A single-cover

๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ

๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ

๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ

๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ

๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ

๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ๏ฟฝ

(c) A Steiner tree (d) Optimal solution

Fig. 2: (a) The ๐ป๐ถ๐บ for 2 BSs (hexagons), 9 SNs(circles), and 18 candidate RN locations (squares). (b)A feasible solution to SCP. (c) The resulting 1CSC,which uses 8 RNs. (d) The optimal solution, whichuses 7 RNs.

steps. In Line 1, we obtain a single-cover โ„›๐”ธ of ๐’ฎ,which contains 6 relay nodes, shown in Fig. 2(b). InLine 2, we construct the RCG, which is obtained bydeleting from the HCG in Fig. 2(a) all edges incidentfrom a sensor node. In Lines 3-5, we find that thenodes in โ„›๐”ธโˆชโ„ฌ are in the same connected component.In Line 6, we assign each edge a weight following(1). In Line 7, we obtain a Steiner tree spanningthe node set โ„›๐”ธ โˆช โ„ฌ, shown in Fig. 2(c). Here weused the MST-based approximation algorithm [19] toobtain the Steiner tree. The Steiner tree has two Steinernodes, leading to the use of two more relay nodes:โˆฃโ„›๐”นโˆฃ = 2. Fig. 2(d) shows an M1CSC, which uses 7relay nodes. The solution produced by Algorithm 1uses 8 relay nodes, which is not optimal, but close tooptimal.

Theorem 4.2: The worst case running time of Algo-rithm 1 is ๐’ช(๐‘‡๐”ธ+๐‘‡๐”น+ โˆฃโ„ฌ โˆช๐’ณ โˆฃ2), where ๐‘‡๐”ธ and ๐‘‡๐”น arethe time complexities of the approximation algorithms๐”ธ and ๐”น, respectively. Furthermore, we have:(a) 1๐ถ๐‘†๐ถ๐‘ƒ (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ) has a feasible solution if

and only if ๐’ฎ has a single-cover โ„› โŠ† ๐’ณ suchthat all nodes in โ„ฌโˆชโ„› are in the same connectedcomponent of ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ ).

(b) When 1๐ถ๐‘†๐ถ๐‘ƒ (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ) has a feasible solu-tion, Algorithm 1 guarantees computing a con-nected single-cover โ„›๐”ธ,๐”น of ๐’ฎ, which uses nomore than (๐›ผ + 3.5๐›ฝ) times the number ofRNs required in an optimal solution โ„›๐‘œ๐‘๐‘ก for1๐ถ๐‘†๐ถ๐‘ƒ (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ), where ๐›ผ and ๐›ฝ are theapproximation ratios of ๐”ธ and ๐”น, respectively. โ–ก

PROOF. Line 1 of Algorithm 1 computes a single-cover โ„›๐”ธ of ๐’ฎ in ๐‘‡๐”ธ time. Line 2 constructs the RCGin ๐’ช(โˆฃโ„ฌ โˆช ๐’ณ โˆฃ2) time. Using depth first search, Lines

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

6

3-5 can be accomplished in ๐’ช(โˆฃโ„ฌ โˆช ๐’ณ โˆฃ2) time. Line6 assigns weights to the edges in the RCG, whichrequires ๐’ช(โˆฃโ„ฌ โˆช ๐’ณ โˆฃ2) time. Line 7 requires ๐‘‡๐”น time.This proves the time complexity of the algorithm.

The correctness of (a) follows from the definition of1CSCP. Therefore we only need to prove the correct-ness of (b).

Roadmap. We first show that Algorithm 1 is guar-anteed to find a connected single-cover when theinstance is feasible. We then prove the approximationratio of Algorithm 1, i.e., โˆฃโ„›๐”ธ,๐”นโˆฃ โ‰ค (๐›ผ + 3.5๐›ฝ)โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ.To prove the ratio, we prove โˆฃโ„›๐”ธโˆฃ โ‰ค ๐›ผโˆฃโ„›๐‘œ๐‘๐‘กโˆฃ andโˆฃโ„›๐”นโˆฃ โ‰ค 3.5๐›ฝโˆฃโ„›๐‘œ๐‘๐‘กโˆฃ, respectively. The ratio then followsfrom the fact that โˆฃโ„›๐”ธ,๐”นโˆฃ = โˆฃโ„›๐”ธโˆฃ+ โˆฃโ„›๐”นโˆฃ.

The feasibility of the instance ensures that Line 1of Algorithm 1 can find a single-cover โ„›๐”ธ of ๐’ฎ. Letโ„›๐‘œ๐‘๐‘ก be an optimal solution to 1๐ถ๐‘†๐ถ๐‘ƒ (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ).Then โ„›๐‘œ๐‘๐‘ก is a single-cover of ๐’ฎ, and ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,โ„›๐‘œ๐‘๐‘ก)is connected. Since โ„›๐”ธ is a minimal single-cover of๐’ฎ, each node ๐‘ฆ โˆˆ โ„›๐”ธ is within distance ๐‘Ÿ of an SN๐‘  โˆˆ ๐’ฎ and ๐‘  is not within distance ๐‘Ÿ of โ„ฌ. Note that๐‘  must be within distance ๐‘Ÿ of a node ๐‘ฆโ€ฒ โˆˆ โ„›๐‘œ๐‘๐‘ก,as โ„›๐‘œ๐‘๐‘ก is a single-cover of ๐’ฎ. Therefore ๐‘ฆ is eitherin โ„›๐‘œ๐‘๐‘ก or within distance ๐‘Ÿ + ๐‘Ÿ โ‰ค ๐‘… of a node (๐‘ฆโ€ฒ

for example) in โ„›๐‘œ๐‘๐‘ก. Therefore ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,โ„›๐‘œ๐‘๐‘กโˆชโ„›๐”ธ)is also connected. Hence Line 7 of Algorithm 1 isguaranteed to find a Steiner tree, thereby producinga connected single-cover โ„›๐”ธ,๐”น for the instance of1๐ถ๐‘†๐ถ๐‘ƒ (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ).

In the following, we will prove that โˆฃโ„›๐”ธ,๐”นโˆฃ is nomore than (๐›ผ + 3.5๐›ฝ)โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. Let โ„›๐‘š๐‘ ๐‘ be a minimumsingle-cover for the given instance. Then we musthave โˆฃโ„›๐‘š๐‘ ๐‘โˆฃ โ‰ค โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ, as every connected single-coveris a single-cover. Since ๐”ธ has approximation ratio ๐›ผ,we have

โˆฃโ„›๐”ธโˆฃ โ‰ค ๐›ผโˆฃโ„›๐‘š๐‘ ๐‘โˆฃ โ‰ค ๐›ผโˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. (4)

Note that ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,โ„›๐”ธ โˆช โ„›๐‘œ๐‘๐‘ก) is connected. Let๐’ฏ๐‘œ๐‘๐‘ก be a minimum spanning tree of ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,โ„›๐”ธ โˆชโ„›๐‘œ๐‘๐‘ก). Let ๐’ฏ๐‘š๐‘–๐‘› be a minimum Steiner tree in๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ ) which connects all nodes in โ„ฌ โˆช โ„›๐”ธ.Then we have

๐‘คโ„›๐”ธ(๐’ฏ๐‘š๐‘–๐‘›) โ‰ค ๐‘คโ„›๐”ธ(๐’ฏ๐‘œ๐‘๐‘ก). (5)

Since ๐”น is a ๐›ฝ-approximation algorithm, we have

๐‘คโ„›๐”ธ(๐’ฏ๐”น) โ‰ค ๐›ฝ๐‘คโ„›๐”ธ(๐’ฏ๐‘š๐‘–๐‘›) โ‰ค ๐›ฝ๐‘คโ„›๐”ธ(๐’ฏ๐‘œ๐‘๐‘ก). (6)

We can write ๐‘คโ„›๐”ธ(๐’ฏ๐‘œ๐‘๐‘ก) as ๐‘คโ„›๐”ธ(๐’ฏ๐‘œ๐‘๐‘ก) = ๐‘คโ„›๐”ธ

1 (๐’ฏ๐‘œ๐‘๐‘ก) +๐‘คโ„›๐”ธ

2 (๐’ฏ๐‘œ๐‘๐‘ก), where ๐‘คโ„›๐”ธ

1 (๐’ฏ๐‘œ๐‘๐‘ก) is the sum of the weightsof the weight-1 edges in ๐’ฏ๐‘œ๐‘๐‘ก and ๐‘คโ„›๐”ธ

2 (๐’ฏ๐‘œ๐‘๐‘ก) is thesum of the weights of the weight-2 edges in ๐’ฏ๐‘œ๐‘๐‘ก.Let ๐‘ข be any node in โ„›๐‘œ๐‘๐‘ก โˆ– โ„›๐”ธ. It follows fromthe geometric property of minimum spanning treesthat ๐‘ข is incident with at most 5 weight-1 edges in๐’ฏ๐‘œ๐‘๐‘ก. Suppose, to the contrary, ๐‘ข is incident with 6weight-1 edges (๐‘ข, ๐‘ฃ1), (๐‘ข, ๐‘ฃ2), (๐‘ข, ๐‘ฃ3), (๐‘ข, ๐‘ฃ4), (๐‘ข, ๐‘ฃ5),and (๐‘ข, ๐‘ฃ6). Then we have {๐‘ฃ1, ๐‘ฃ2, . . . , ๐‘ฃ6} โŠ† โ„ฌ โˆช โ„›๐”ธ,and ๐‘‘(๐‘ข, ๐‘ฃ๐‘–) โ‰ค ๐‘…, 1 โ‰ค ๐‘– โ‰ค 6. Therefore there exist ๐‘– and

๐‘— (1 โ‰ค ๐‘– < ๐‘— โ‰ค 6) such that ๐‘‘(๐‘ฃ๐‘–, ๐‘ฃ๐‘—) โ‰ค ๐‘…. Replacingthe weight-1 edge (๐‘ข, ๐‘ฃ๐‘–) by the weight-0 edge (๐‘ฃ๐‘–, ๐‘ฃ๐‘—)leads to a spanning tree of ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,โ„›๐”ธโˆชโ„›๐‘œ๐‘๐‘ก) witha smaller weight than the weight of ๐‘‡๐‘œ๐‘๐‘ก, which is acontradiction. Therefore we have

๐‘คโ„›๐”ธ

1 (๐’ฏ๐‘œ๐‘๐‘ก) โ‰ค 5โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. (7)

Since ๐’ฏ๐‘œ๐‘๐‘ก is a tree, it has at most โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ โˆ’ 1 weight-2edges. Hence

๐‘คโ„›๐”ธ

2 (๐’ฏ๐‘œ๐‘๐‘ก) โ‰ค 2(โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ โˆ’ 1). (8)

Therefore

๐‘คโ„›๐”ธ(๐’ฏ๐‘œ๐‘๐‘ก) โ‰ค 5โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ+ 2(โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ โˆ’ 1) = 7โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ โˆ’ 2. (9)

Combining (6), (9), and Lemma 3.1, we have

โˆฃโ„›๐”นโˆฃ โ‰ค1

2๐‘คโ„›๐”ธ(๐’ฏ๐”น) โ‰ค

๐›ฝ

2๐‘คโ„›๐”ธ(๐’ฏ๐‘œ๐‘๐‘ก) โ‰ค 3.5๐›ฝโˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. (10)

Combining (4) and (10), we have

โˆฃโ„›๐”ธ,๐”นโˆฃ = โˆฃโ„›๐”ธโˆฃ+ โˆฃโ„›๐”นโˆฃ โ‰ค (๐›ผ + 3.5๐›ฝ)โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. (11)

This proves the theorem.We further remark on the implication of this frame-

work. With different choices of algorithms ๐”ธ and๐”น, we will end up with approximation algorithmsfor 1CSCP with different approximation ratios andrunning times. For example, we can use the PTASfor GDHP of [26] as algorithm ๐”ธ, and the (1 + ln 3

2 )-approximation algorithm of [31] as algorithm ๐”น. Thiscombination leads to the following.

Corollary 4.1: The 1๐ถ๐‘†๐ถ๐‘ƒ (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ) problemhas a polynomial time (6.43 + ๐œ–)-approximationscheme. โ–ก

Though the above combination gives a good ap-proximation ratio, the time complexity is high [7, 31].In our numerical study, we used the 22-approximationalgorithm for GDHP in [7] as algorithm ๐”ธ, and the 2-approximation algorithm of [19] as algorithm ๐”น. Thiscombination leads to the following.

Corollary 4.2: The 1๐ถ๐‘†๐ถ๐‘ƒ (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ) problemhas a 29-approximation algorithm with a running timeof ๐’ช(โˆฃ๐’ณ โˆฃ2โˆฃ๐’ฎโˆฃ4 + โˆฃโ„ฌ โˆช ๐’ณ โˆฃ2 log โˆฃโ„ฌ โˆช ๐’ณ โˆฃ). โ–ก

We note that an alternative approach to this prob-lem could be to apply algorithm ๐”น on a subgraph of๐ป๐ถ๐บ(๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ) without the SN-SN edges to obtaina connected single cover. However, since the numberof SNs that are connected to an RN cannot be boundedby a constant, proving a meaningful approximationratio for this approach is an open problem. Our bestsolution is the (6.43 + ๐œ–)-approximation scheme.

5 TWO-CONNECTED DOUBLE-COVERIn this section, we study the 2-connected double-coverproblem. In this problem, we strengthen the coveragerequirement from single-cover to double-cover andthe connectivity requirement from connected to 2-connected. Since the connected single-cover problem

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

7

is NP-hard, we believe that the 2-connected double-cover problem is also NP-hard. Instead of concen-trating on the NP-hardness proof, we focus on thedesign of efficient approximation algorithms for thisproblem. As in Section 3, let โ„ฌ be a set of base stations(BSs), ๐’ฎ be a set of sensor nodes (SNs), and ๐’ณ be aset of candidate RN locations. Let ๐‘Ÿ > 0 and ๐‘… โ‰ฅ 2๐‘Ÿbe the communication range of the SNs, and that ofthe RNs, respectively.

5.1 Problem Definitions and NotationDefinition 5.1: [DCP] A subset โ„› โŠ† ๐’ณ is called

a double-cover (denoted by DC) of ๐’ฎ if every SN iswithin distance ๐‘Ÿ of at least two nodes in โ„ฌ โˆชโ„›. Thesize of the corresponding DC is โˆฃโ„›โˆฃ. A DC is called aminimum double-cover (denoted by MDC) of ๐’ฎ if it hasthe minimum size among all DCs of ๐’ฎ. The double-cover relay node placement problem (denoted by DCP)for (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ) seeks an MDC of ๐’ฎ. โ–ก

Definition 5.2: [2CDCP] A subset โ„› โŠ† ๐’ณ is calleda 2-connected double-cover (denoted by 2CDC) of ๐’ฎif for every SN ๐‘  โˆˆ ๐’ฎ there exists a pair of node-disjoint paths from ๐‘  to two base stations in the hybridcommunication graph ๐ป๐ถ๐บ(๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,โ„›). The size ofโ„› is โˆฃโ„›โˆฃ. โ„› is called a minimum 2-connected double-cover (denoted by M2CDC) of ๐’ฎ if it is a 2CDC of ๐’ฎ,and has the minimum size among all 2CDCs of ๐’ฎ.The 2-connected double-cover relay node placementproblem for (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ) (denoted by 2CDCP) seeksan M2CDC of ๐’ฎ. โ–ก

The problem we are studying here is closely re-lated to the {0, 1, 2}-survivable network design problem(SNDP) defined in the following.

Definition 5.3: [{0, 1, 2}-SNDP] Let ๐บ = (๐‘‰,๐ธ) bean undirected graph with nonnegative weights on alledges ๐‘’ โˆˆ ๐ธ. For each pair of vertices ๐‘ข, ๐‘ฃ โˆˆ ๐‘‰ , thereis a connectivity requirement ๐‘(๐‘ข, ๐‘ฃ) โˆˆ {0, 1, 2}. The{0, 1, 2}-survivable network design problem (SNDP) seeksa minimum weight subgraph โ„‹ of ๐บ such that for anytwo vertices ๐‘ข, ๐‘ฃ โˆˆ ๐‘‰ , โ„‹ contains at least ๐‘(๐‘ข, ๐‘ฃ) node-disjoint paths between ๐‘ข and ๐‘ฃ. โ–ก

5.2 A Framework of Efficient Approximation Algo-rithms for 2CDCPWe present a general framework to solve 2CDCP,using an approximation algorithm ๐”ธ for DCP, andan approximation algorithm ๐”น for the {0, 1, 2}-SNDPproblem. The framework of polynomial time approx-imation algorithms has an approximation ratio of๐›ผ + 5๐›ฝ, where ๐›ผ is the approximation ratio of ๐”ธ, and๐›ฝ is the approximation ratio of ๐”น. Our framework for2CDCP is presented as Algorithm 2.

The major steps of our scheme are as follows. First,we apply the approximation algorithm ๐”ธ to obtaina double cover โ„›๐”ธ โŠ† ๐’ณ of ๐’ฎ. This is accomplishedin Line 1 of the algorithm. In Line 2, we constructthe relay communication graph ๐บ = ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ ).

Algorithm 2 Approximation for 2CDCP(๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ )

Input: Set โ„ฌ of BSs, set ๐’ฎ of SNs, set ๐’ณ of candidateRN locations, sensor node communication range๐‘Ÿ > 0, and relay node communication range๐‘… โ‰ฅ 2๐‘Ÿ > 0. An approximation algorithm ๐”ธ forDCP, and an approximation algorithm ๐”น for the{0, 1, 2}-๐‘†๐‘๐ท๐‘ƒ problem.

Output: A connected double-cover โ„›๐”ธ โˆชโ„›๐”น โŠ† ๐’ณ .1: Apply algorithm ๐”ธ to obtain a double-cover โ„›๐”ธ

of ๐’ฎ. Without loss of generality, we assume thatโ„›๐”ธ is minimal, meaning that none of its propersubsets is a double-cover of ๐’ฎ.

2: Construct the relay communication graph ๐บ =๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ ).

3: if the nodes in โ„ฌ โˆช โ„›๐”ธ are not in the same 2-connected component of ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ ) then

4: Stop. The given instance does not have a 2-connected double-cover.

5: end if6: Assign edge weight in ๐บ as in (1), with โ„› substi-

tuted by โ„›๐”ธ, i.e., for an edge (๐‘ฅ, ๐‘ฆ) in ๐บ, we havethat

๐‘คโ„›๐”ธ(๐‘ฅ, ๐‘ฆ) = โˆฃ(๐’ณ โˆ– โ„›๐”ธ) โˆฉ {๐‘ฅ, ๐‘ฆ}โˆฃ.

For a node ๐‘ฅ and a node ๐‘ฆ ((๐‘ฅ, ๐‘ฆ) does not have tobe an edge), assign the connectivity requirementto be ๐‘(๐‘ฅ, ๐‘ฆ) = 2โˆ’ โˆฃ(๐’ณ โˆ– โ„›๐”ธ) โˆฉ {๐‘ฅ, ๐‘ฆ}โˆฃ.

7: Apply algorithm ๐”น to compute a low weight 2-connected subgraph โ„‹๐”น of ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ ), span-ning the node set โ„ฌ โˆช โ„›๐”ธ. Let the set of addedrelay nodes in the solution to ๐”น be โ„›๐”น.

8: Output โ„›๐”ธ,๐”น = โ„›๐”ธ โˆชโ„›๐”น.

The given instance of the problem has a feasiblesolution if and only if all the nodes in โ„ฌ โˆช โ„›๐”ธ arein the same 2-connected component of ๐บ. Lines 3 to 5check whether there exists a 2-connected componentcontaining all the nodes in โ„ฌ โˆช โ„›๐”ธ. If there is nosuch 2-connected component, the algorithm stops. InLine 6, we assign non-negative edge weights to theedges in ๐บ according to (1). Then, in Line 7, weapply algorithm ๐”น to compute a low cost 2-connectedsubgraph of ๐บ spanning all the nodes in โ„ฌ โˆช โ„›๐”ธ.Finally, Line 8 outputs the locations to place the RNs.

Theorem 5.1: The worst case running time of Algo-rithm 2 is ๐‘‚(๐‘‡๐”ธ+๐‘‡๐”น+ โˆฃโ„ฌ โˆช๐’ณ โˆฃ2), where ๐‘‡๐”ธ and ๐‘‡๐”น arethe time complexities of the approximation algorithms๐”ธ and ๐”น, respectively. Furthermore, we have:

(a) 2๐ถ๐ท๐ถ๐‘ƒ (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ) has a feasible solution ifand only if ๐’ฎ has a double-cover โ„› โŠ† ๐’ณ suchthat all nodes in โ„ฌโˆชโ„› are in the same 2-connectedcomponent of ๐‘…๐ถ๐บ(๐‘…,โ„ฌ,๐’ณ ).

(b) When 2๐ถ๐ท๐ถ๐‘ƒ (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ) has a feasible so-lution, Algorithm 2 guarantees computing a 2-connected double-cover of โ„›๐”ธ,๐”น of ๐’ฎ, which usesno more than (๐›ผ + 5๐›ฝ) times the number of

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

8

RNs required in an optimal solution โ„›๐‘œ๐‘๐‘ก to2๐ถ๐ท๐ถ๐‘ƒ (๐‘Ÿ, ๐‘…,โ„ฌ,๐’ฎ,๐’ณ ), where ๐›ผ and ๐›ฝ are theapproximation ratios of ๐”ธ and ๐”น, respectively. โ–ก

Before proceeding to prove Theorem 5.1, we needthe following lemma, which will be used to relate โˆฃโ„›๐”นโˆฃto the number of RNs in the optimal solution.

Lemma 5.1: Let โ„› be a 2-connected double-cover of๐’ฎ. Let โ„›๐‘ be a subset of โ„› such that โ„›๐‘ is a double-cover of ๐’ฎ. Let โ„›๐‘› = โ„› โˆ– โ„›๐‘. Assign edge weight in๐‘…๐ถ๐บ(๐‘…,โ„ฌ,โ„›) such that the weight of edge (๐‘ฅ, ๐‘ฆ) is๐‘คโ„›๐‘(๐‘ฅ, ๐‘ฆ) = โˆฃโ„›๐‘› โˆฉ {๐‘ฅ, ๐‘ฆ}โˆฃ. Let โ„‹โ„›๐‘,โ„›๐‘›

be a minimum2-connected subgraph connecting all nodes in โ„ฌ โˆชโ„›.Then, for each node ๐‘ข โˆˆ โ„›๐‘›, ๐‘ข is connected to at most5 nodes in โ„›๐‘, and at most one node in โ„ฌ. โ–ก

PROOF. For the proof, we refer the reader to theLemma 4.1 in [25], while noting the following differ-ences. The HCG there corresponds to the RCG here,with ๐’ฎ there corresponding to โ„› here, and โ„› therecorresponding to โ„›๐‘œ๐‘๐‘ก โˆ– โ„› here.

PROOF OF THEOREM 5.1: The proofs of the runningtime and Part (a) are similar to those of Theorem 4.2.Here we concentrate on the approximation ratio.

Roadmap. Following the same logic as in the proofof Theorem 4.2, we prove the ratio by proving โˆฃโ„›๐”ธโˆฃ โ‰ค๐›ผโˆฃโ„›๐‘œ๐‘๐‘กโˆฃ and โˆฃโ„›๐”นโˆฃ โ‰ค 5๐›ฝโˆฃโ„›๐‘œ๐‘๐‘กโˆฃ, respectively. The ratiothen follows from the fact that โˆฃโ„›๐”ธ,๐”นโˆฃ = โˆฃโ„›๐”ธโˆฃ+ โˆฃโ„›๐”นโˆฃ.

Recall that the set of RNs required by ๐”ธ is โ„›๐”ธ andthe set of extra RNs required by algorithm ๐”น is โ„›๐”น.

Let โ„›๐‘œ๐‘๐‘ก be an optimal solution to 2CDCP and โ„›๐‘š๐‘‘๐‘

be an optimal solution to DCP. It is clear that โˆฃโ„›๐‘š๐‘‘๐‘โˆฃ โ‰คโˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. As ๐”ธ has approximation ratio ๐›ผ, we have

โˆฃโ„›๐”ธโˆฃ โ‰ค ๐›ผโˆฃโ„›๐‘š๐‘‘๐‘โˆฃ โ‰ค ๐›ผโˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. (12)

Let โ„‹๐‘š๐‘–๐‘› be an optimal solution to the {0, 1, 2}-SNDPinstance that connects all nodes in โ„ฌ โˆช โ„›๐”ธ, and โ„‹๐‘œ๐‘๐‘ก

be a solution that uses the optimal number of RNsrequired to solve 2CDCP. Since โ„‹๐‘œ๐‘๐‘ก is a feasiblesolution to {0, 1, 2}-SNDP, and ๐”น is a ๐›ฝ-approximationalgorithm for {0, 1, 2}-SNDP, we have

๐‘คโ„›๐”ธ(โ„‹๐”น) โ‰ค ๐›ฝ โ‹… ๐‘คโ„›๐”ธ(โ„‹๐‘š๐‘–๐‘›) โ‰ค ๐›ฝ โ‹… ๐‘คโ„›๐”ธ(โ„‹๐‘œ๐‘๐‘ก). (13)

We need to find an upper bound on ๐‘คโ„›๐”ธ(โ„‹๐‘œ๐‘๐‘ก) us-ing a function of โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. Let ๐‘คโ„›๐”ธ

2 (โ„‹๐‘œ๐‘๐‘ก) denote thetotal weights of the weight-2 edges in โ„‹๐‘œ๐‘๐‘ก, and let๐‘คโ„›๐”ธ

1 (โ„‹๐‘œ๐‘๐‘ก) denote the total weights of the weight-1edges in โ„‹๐‘œ๐‘๐‘ก. We have

๐‘คโ„›๐”ธ(โ„‹๐‘œ๐‘๐‘ก) = ๐‘คโ„›๐”ธ

2 (โ„‹๐‘œ๐‘๐‘ก) + ๐‘คโ„›๐”ธ

1 (โ„‹๐‘œ๐‘๐‘ก). (14)

Let each RN in โ„‹๐‘œ๐‘๐‘ก be incident with at most ฮ”(โ„‹๐‘œ๐‘๐‘ก)weight-1 edges in โ„‹๐‘œ๐‘๐‘ก, we have

๐‘คโ„›๐”ธ

1 (โ„‹๐‘œ๐‘๐‘ก) โ‰ค โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ โ‹…ฮ”(โ„‹๐‘œ๐‘๐‘ก). (15)

Applying Lemma 3.3 to each of the connected com-ponents of the subgraph of โ„‹๐‘œ๐‘๐‘ก induced by all the2-weight edges, we have

๐‘คโ„›๐”ธ

2 (โ„‹๐‘œ๐‘๐‘ก) โ‰ค 2 โ‹… (2โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ โˆ’ 1). (16)

It follows from Lemma 3.1 that

โˆฃโ„›๐”นโˆฃ = ๐œ‹โ„›๐”ธ(โ„‹๐”น) โ‰ค1

2๐‘คโ„›๐”ธ(โ„‹๐”น) (17)

โ‰ค๐›ฝ

2๐‘คโ„›๐”ธ(โ„‹๐‘œ๐‘๐‘ก) (18)

โ‰ค๐›ฝ

2(4 + ฮ”(โ„‹๐‘œ๐‘๐‘ก))โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. (19)

It follows from Lemma 5.1 that

โˆฃโ„›๐”นโˆฃ โ‰ค๐›ฝ

2(4 + 6)โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ โ‰ค 5๐›ฝโˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. (20)

Combining (12) and (20), we have

โˆฃโ„›๐”ธ,๐”นโˆฃ = โˆฃโ„›๐”ธโˆฃ+ โˆฃโ„›๐”นโˆฃ โ‰ค (๐›ผ + 5๐›ฝ)โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. (21)

This proves the theorem.We can use different combinations of ๐”ธ and ๐”น for

different purposes. Two examples are summarized inthe following two corollaries.

Corollary 5.1: The 2๐ถ๐ท๐ถ๐‘ƒ problem has a ๐’ช(lnn)-approximation algorithm with a polynomial runningtime. โ–ก

PROOF: This is achieved by choosing ๐”ธ as the ๐’ช(ln ๐‘›)-approximation algorithm by Rajagopalan et al. [28]and ๐”น as the 3-approximation algorithm of Ravi etal. for the {0, 1, 2}-SNDP problem [29, 30].

In the study above, we have made no assumptionon the number of RNs that an SN can be connectedto. However, in many practical scenarios, the numberof RNs that an SN can be connected to is usuallybounded by a constant ๐‘“ . In this case, a simple mod-ification to the constant frequency based algorithmin [15] will result in a constant-factor approximationalgorithm as stated in the following corollary.

Corollary 5.2: If the number of RNs that can beconnected to an SN is bounded by a constant ๐‘“ ,then Algorithm 2 guarantees a feasible solution inpolynomial time, with a constant approximation ratio๐‘“ + 5๐›ฝ, where ๐›ฝ is the approximation ratio of ๐”น. โ–ก

6 COMPUTATION OF LOWER BOUNDSNo algorithms have been developed for solving theproblem of two-tiered constrained relay node place-ment in the existing literature, because of its difficulty.Hence due to the lack of a more suitable comparison,we compare the results from our algorithms with thatobtained from Linear Program (LP) formulations of1CSCP and 2CDCP. We note that an LP can be solvedin polynomial time. Also, the solution to the LP ver-sion of the problem denoted by โ„›๐ฟ๐‘ƒ , is a lower boundof the solution to the corresponding Integer LinearProgram (ILP) version. That is, โˆฃโ„›๐ฟ๐‘ƒ โˆฃ โ‰ค โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. Thesuitability of the use of LP for comparison comes fromtwo facts. On one hand, if ๐”ธ is an ๐›ผ-approximationalgorithm for a problem, then โˆฃโ„›๐”ธโˆฃ โ‰ค ๐›ผ โ‹… โˆฃโ„›๐ฟ๐‘ƒ โˆฃ,consequently, โˆฃโ„›๐”ธโˆฃ โ‰ค ๐›ผ โ‹… โˆฃโ„›๐‘œ๐‘๐‘กโˆฃ. On the other hand,solving the LP may take much less time in comparison

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

9

to solving the corresponding ILP, which may have anexponential running time.

Closely following the LP formulation in [25], weformulate the LPs for 1CSCP and 2CDCP as multi-commodity flow problems, with a flow originatingfrom each SN ๐‘ข (the source) to a fictitious sink ๐‘‘,which is connected to all BSs. The value of the floworiginating from the source is designated as f. For1CSCP, f = 1 and for 2CDCP f = 2.

min

โˆฃ๐’ณ โˆฃโˆ‘

๐‘—=1

๐‘ฅ๐‘— (22)

subject to,Requirements Constraints:๐‘ฅ๐‘— โˆ’ ๐›พ๐‘–๐‘— โ‰ฅ 0, โˆ€๐‘— โˆˆ ๐’ณ , โˆ€๐‘– โˆˆ ๐’ฎ (23)Source Constraints:โˆ‘

(๐‘–,๐‘—)โˆˆ๐ป๐ถ๐บ

๐‘“๐‘–๐‘—๐‘– โˆ’โˆ‘

(๐‘—,๐‘–)โˆˆ๐ป๐ถ๐บ

๐‘“๐‘—๐‘–๐‘– = f , โˆ€๐‘– โˆˆ ๐’ฎ (24)

Sink Constraints:โˆ‘

๐‘—โˆˆโ„ฌ

๐‘“๐‘—๐‘‘๐‘– โˆ’โˆ‘

๐‘—โˆˆโ„ฌ

๐‘“๐‘‘๐‘—๐‘– = f , โˆ€๐‘– โˆˆ ๐’ฎ (25)

Flow satisfaction constraints:โˆ‘

(๐‘–,๐‘—)โˆˆ๐ป๐ถ๐บ

๐‘“๐‘–๐‘—๐‘˜ โˆ’ ๐›พ๐‘˜๐‘— = 0, โˆ€๐‘˜ โˆˆ ๐’ฎ, โˆ€๐‘— โˆˆ ๐’ณ (26)

Flow conservation constraints:โˆ‘

(๐‘–,๐‘—)โˆˆ๐ป๐ถ๐บ

๐‘“๐‘–๐‘—๐‘˜ โˆ’โˆ‘

(๐‘—,๐‘–)โˆˆ๐ป๐ถ๐บ

๐‘“๐‘—๐‘–๐‘˜ = 0, โˆ€๐‘— โˆˆ ๐’ณ , โˆ€๐‘˜ โˆˆ ๐’ฎ (27)

โˆ‘

(๐‘–,๐‘—)โˆˆ๐ป๐ถ๐บโˆช(๐‘‘,๐‘—)

๐‘“๐‘–๐‘—๐‘˜ โˆ’โˆ‘

(๐‘—,๐‘–)โˆˆ๐ป๐ถ๐บโˆช(๐‘—,๐‘‘)

๐‘“๐‘—๐‘–๐‘˜ = 0, โˆ€๐‘— โˆˆ โ„ฌ, โˆ€๐‘˜ โˆˆ ๐’ฎ (28)

Bounds:๐‘“๐‘–๐‘—๐‘˜ = 0, โˆ€๐‘–, ๐‘— โˆˆ โ„ฌ, โˆ€๐‘˜ โˆˆ ๐’ฎ (29)0 โ‰ค ๐›พ๐‘–๐‘— , ๐‘“๐‘–๐‘—๐‘˜ โ‰ค 1, โˆ€ ๐›พ๐‘–๐‘— , remaining ๐‘“๐‘–๐‘—๐‘˜

โ€ฒ๐‘ . (30)

The variable ๐‘ฅ๐‘— , ๐‘— = 1, . . . , โˆฃ๐’ณ โˆฃ, is the flow variable,which represents the maximum flow of any commod-ity through the RN ๐‘— for the flow problem to besatisfied. It may be regarded as the fraction of theRN ๐‘— that is used in solving the relay node placementproblem. The variable ๐›พ๐‘–๐‘— , ๐‘– = 1, . . . , โˆฃ๐’ฎโˆฃ, ๐‘— = 1, . . . , โˆฃ๐’ณ โˆฃ,is the requirement variable. It represents the amountof flow from an SN ๐‘– required to pass through anRN ๐‘—. To ensure that the coverage and/or connectivityrequirements are satisfied, the flow variables for eachRN have to satisfy the requirements constraints givenby Equation (23). The variable ๐‘“๐‘–๐‘—๐‘˜ represents the flowof commodity ๐‘˜ from node ๐‘– to ๐‘—. Equations (24)and (25) represent the source and the sink constraintsrespectively. The source flow constraints are easy tounderstand. The sink constraints are specified withrespect to the fictitious sink which is connected tothe BSs only. The flow satisfaction constraints, givenby Equation (26), enforce that the amount of flowof commodity ๐‘˜ flowing into an RN ๐‘— from nodesadjacent to it is exactly equal to the amount of flow

of ๐‘˜ that is required to flow through ๐‘—. That is, ๐‘— doesnot create nor buffer any flow. Equations (27) and (28)represent the flow conservation at the RNs and theBSs respectively. Corresponding to each BS there isan additional edge connecting it to ๐‘‘ for the flowsto reach the destination. Equation (29) represents thebounds for the flow variables corresponding to theflow between the BSs. These flow variables are set tozero to ensure that each BS can only appear in at mostone path from a source to ๐‘‘.

7 EXPERIMENTAL RESULTSIn this section, we evaluate the performance of ouralgorithms through extensive experiments.

7.1 Network SetupAs in [18], [25] and [36], the set ๐’ฎ of SNs wererandomly distributed in a square region. Two basestations were deployed randomly in the region. Fortransmission ranges, we set ๐‘Ÿ = 15 and ๐‘… = 30. For thecandidate RN locations, we considered two differentdistributions: grid distribution and random distribution.For grid distribution, the deployment region consistsof ๐พ ร— ๐พ small squares each of side 10, with thecandidate RN locations being the (๐พ+1)2 grid points.For random distribution, the candidate RN locationswere randomly distributed in the deployment region.

We report two separate deployments of the SNs:the case where the density of the SNs in the regionincreases, and the case where the density is constant.We define the density as the ratio of the number ofSNs in the region to the area of the region. For theincreasing density case, we chose a constant regionof size 100 ร— 100 sq. units. The number of candidateRN locations was (๐พ + 1)2 = 121, while the numberof SNs was varied from 20 to 120 in increments of20. For the constant density case, with the increase inthe number of SNs the size of the region increased. Westudied two sub-cases: density ๐‘‘1 = 0.005 and density๐‘‘2 = 0.01. For each density value, we used 7 differentnumbers of SNs. The deployment region sizes werechosen to be 40 ร— 40, 50ร— 50, . . . , 100ร— 100, with thenumber of SNs ranging from 8 to 50 for ๐‘‘1, and 16 to100 for ๐‘‘2. For each setting the results were averagedover 10 test cases.

7.2 Algorithm SelectionTo evaluate the effectiveness of our frameworks, weimplemented Algorithm 1 and Algorithm 2. For Al-gorithm 1, we used the 22-approximation algorithmin [7] as ๐”ธ and the 2-approximation algorithm in [19]as ๐”น. Our choices were motivated by their fasterrunning times. The numerical results show that thesolutions produced are still within twice the optimumfor all of our test cases. We use ACS to denote thisimplementation of Algorithm 1. For Algorithm 2, we

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

10

used the 3-approximation algorithm in [29] as ๐”น. Weimplemented two choices of ๐”ธ for the set multicoverproblem: the greedy ๐’ช(ln๐‘›)-approximation algorithmin [28] (we use ALD to denote this combination),and the frequency-based algorithm in [15] (we useACD to denote this combination). To ensure rigorouscomparison, for each instance of 1CSCP and 2CDCPproblems that were solved by our algorithms, wealso solved the corresponding LP instance (for lowerbound) and evaluated the proximity of our solutionsto the optimal. We denote the solutions for 1CSCP and2CDCP as LPS and LPD respectively.

7.3 Performance MetricsThe performance metrics include the running time, thenumber of RNs used and Energy Efficiency. For simplic-ity, we only report energy consumption for 1CSCP.To measure energy cost on each SN, we assume thefollowing energy model. Assume the routing topologyis given by the โˆฃโ„ฌโˆฃ trees rooted at the BSs which areinduced from the Steiner tree computed. For each SN๐‘ ๐‘–, let ๐‘(๐‘ ๐‘–) denote the number of ๐‘ ๐‘–โ€™s children in thetree. Let ๐‘(๐‘ ๐‘–) denote ๐‘ ๐‘–โ€™s parent. We assume that theenergy consumption is an exponential function of thetransmission distance. Therefore the energy cost of ๐‘ ๐‘–is ๐‘’(๐‘ ๐‘–) = โˆฃโˆฃ๐‘(๐‘ ๐‘–), ๐‘ ๐‘–โˆฃโˆฃ

๐›พ โ‹…(๐‘(๐‘ ๐‘–)+1). Intuitively, the energycost of ๐‘ ๐‘– is equal to the product of the transmissionpower required to transmit to the next hop alongthe path to the BS and the number of SNs whosepaths pass through it (including itself). Throughoutour the experiments, we assume that ๐›พ = 2. Wedefine the energy cost of the network as the maximumenergy consumption among all the SNs, because sucha sensor determines the lifetime of the network.

(a) Topology without relaynode placement

(b) Topology with relay nodeplacement

Fig. 3: Network topology with or without relay nodeplacement. For (a), the energy cost is 42 ร— 2 = 32,which occurs at ๐‘ 4. For (b), the energy cost is 3.52ร—1 =12.25, which occurs at ๐‘ 3.

Without the relay node placement, we assume thatthe routing topology is induced from a minimumspanning tree, where the weight between SN and SNor between SN and BS is set to the Euclidean distancebetween them, and the weight between a pair of BSsis set to 0. An example is shown in Fig. 3(a). With therelay node placement, each SN transmits to the closest

RN or BS directly. The energy cost can be computedsimilar as above. A corresponding example is shownin Fig. 3(b).

7.4 Illustration of Relay Node Placement

0 10 20 30 40 500

10

20

30

40

50

(a) ACS0 10 20 30 40 50

0

10

20

30

40

50

(b) OPTS

Fig. 4: RN placement for 1CSCP: grid distribution. Thenumbers of RNs used by ACS and OPTS are 6 and 4,respectively.

0 10 20 30 40 500

10

20

30

40

50

(a) ALD0 10 20 30 40 50

0

10

20

30

40

50

(b) ACD

0 10 20 30 40 500

10

20

30

40

50

(c) OPTD

Fig. 5: RN placement for 2CDCP: grid distribution.The numbers of RNs used by ALD, ACD and OPTDare 11, 11 and 9, respectively.

In this section, we illustrate the relay node place-ment obtained by different algorithms through Fig. 4to Fig. 7. Here, we solve 1CSCP and 2CDCP optimallyusing the LP formulation in Section 6 with integerconstraints, i.e., the ILP formulation. We denote theoptimal algorithms for 1CSCP and 2CDCP by ๐‘‚๐‘ƒ๐‘‡๐‘†

and ๐‘‚๐‘ƒ๐‘‡๐ท, respectively. In each figure, the red starsrepresent the BSs, the yellow disks represent the SNs

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

11

0 10 20 30 40 500

10

20

30

40

50

(a) ACS0 10 20 30 40 50

0

10

20

30

40

50

(b) OPTS

Fig. 6: RN placement for 1CSCP: random distribution.The numbers of RNs used by ACS and OPTS are 6 and5, respectively.

0 10 20 30 40 500

10

20

30

40

50

(a) ALD0 10 20 30 40 50

0

10

20

30

40

50

(b) ACD

0 10 20 30 40 500

10

20

30

40

50

(c) OPTD

Fig. 7: RN placement for 2CDCP: random distribution.The numbers of RNs used by ALD, ACD and OPTDare 10, 10 and 9, respectively.

and the blue squares represent the RNs, of whichthe solid ones represent the deployed RNs. The circlecentered at the BS or the RN is of radius ๐‘Ÿ. Thereforea SN within a circle can transmit to the correspondingBS or RN. The link between RN and RN or betweenRN and BS indicates that these two nodes are withinthe transmission range of each other. For all theexamples, the region size is 50ร— 50. There are 2 BSs,25 SNs and 36 candidate RN locations distributed inthe deployment region.

7.5 Result AnalysisFor the case of increasing SN density, Fig. 8(a) andFig. 9(a) show the running time of ACS, ALD, andACD in the network with the grid RN distribution

and the random RN distribution, respectively. Sincethe running time of the algorithms is based on thenumber of edges (โˆฃ๐ธโˆฃ) and the number of vertices(โˆฃ๐‘‰ โˆฃ), the ๐‘‹-axis represents the average of โˆฃ๐‘‰ โˆฃ + โˆฃ๐ธโˆฃ,while the ๐‘Œ -axis represents the running time in sec-onds. The dashed blue line (diamond markers) showsthe running time of ACS. The solid red line (squaremarkers) and the dash-dot black line (star markers)show the running time of ALD and ACD respectively.In case of ALD and ACD, the running time decreasesat first and then increases for the grid RN distribu-tion. This is because, for the initial data point (20SNs), the RNs chosen as a cover are not connected,and connecting them with additional RNs increasesthe running time. However, with an increase in thenumber of SNs the number of RNs needed for acover becomes adequate to form a connected networkby themselves. With increasing number of SNs therunning time increases as it takes more time to finda cover. This also holds true for ACS. However, sinceACS is much faster than the other algorithms, it isnot obvious in the figure. The bigger dip and fasterincrease of the running time of ALD and ACD (for2CDCP) in comparison to that of ACS (for 1CSCP)is because of the use of the higher complexity SNDPalgorithm. For the random RN distribution case, wedo not observe the ๐‘‰ -shape in the running time curve.The reason is that, unlike the grid distribution, wherethe RNs are fixed at the grid points, the RNs in therandom distribution case are randomly distributed inthe region. It is highly likely to have a connected coverafter the first phase of the algorithm.

For the grid RN distribution case, Figs. 8(b) and 8(c)show the average number of RNs required by ACSand LPS, for solving 1CSCP, and by ALD, ACD, andLPD, for solving 2CDCP respectively. For the randomRN distribution case, the corresponding results areshown in Figs. 9(b) and 9(c). Both approximation algo-rithms perform pretty well in comparison to the lowerbound. The number of RNs obtained is never morethan twice the cost of the LP solution. Thus the resultsfrom our approximation algorithms are never morethan twice the optimal value. This indicates that ourapproximation algorithms perform very well. We notethat for 2CDCP, both the approximation algorithmshave the same results despite the disparities in theirapproximation ratios. This is because, the pathologicalcases where the ๐’ช(ln๐‘›) algorithm performs badlydo not occur in the square grid with random SNsdeployment. We will study this in the future.

For the case of constant density, we studied twosub-cases: density ๐‘‘1 = 0.005 and density ๐‘‘2 = 0.01.For each density value, we used 7 different numbersof SNs. The deployment region sizes were chosen tobe 40 ร— 40, . . . , 100 ร— 100, with the number of SNsranging from 8 to 50 for ๐‘‘1, and 16 to 100 for ๐‘‘2.Fig. 10(a) and Fig. 11(a) show the running times ofACS, ALD, and ACD for both the densities. For both

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

12

0.9 1 1.1 1.2 1.3 1.4x 10

4

0

5

10

15

20

25

|V|+|E|

Run

ning

tim

e (in

sec

s)

ACSALDACD

(a) running times of ACS, ALD, ACD

20 40 60 80 100 1200

5

10

15

20

25

Number of SNs

Num

ber

of R

Ns

used

LPSACS

(b) #RNs used by ACS, LPS

20 40 60 80 100 1200

10

20

30

40

Number of SNs

Num

ber

of R

Ns

used

LPDALDACD

(c) #RNs used by ALD, ACD, LPD

Fig. 8: Results for grid RN distribution with increasing SN density: 100ร— 100 deployment region; โˆฃ๐’ณ โˆฃ = 121;โˆฃ๐’ฎโˆฃ = 20, 40, 60, 80, 100, 120.

1 1.1 1.2 1.3 1.4 1.5 1.6x 10

4

0

5

10

15

20

25

|V|+|E|

Run

ning

tim

e (in

sec

s)

ACSALDACD

(a) running times of ACS, ALD, ACD

20 40 60 80 100 1200

5

10

15

20

25

Number of SNs

Num

ber

of R

Ns

used

LPSACS

(b) #RNs used by ACS, LPS

20 40 60 80 100 1200

10

20

30

40

Number of SNs

Num

ber

of R

Ns

used

LPDALDACD

(c) #RNs used by ALD, ACD, LPD

Fig. 9: Results for random RN distribution with increasing SN density: 100ร—100 deployment region; โˆฃ๐’ณ โˆฃ = 121;โˆฃ๐’ฎโˆฃ = 20, 40, 60, 80, 100, 120.

0 2000 4000 6000 8000 10000 12000 140000

5

10

15

20

|V|+|E|

Run

ning

tim

e (in

sec

s)

ACS(d=0.005)ALD(d=0.005)ACD(d=0.005)ACS(d=0.01)ALD(d=0.01)ACD(d=0.01)

(a) running times of ACS, ALD, ACD

40x40 50x50 60x60 70x70 80x80 90x90100x1000

5

10

15

20

Field Size (units x units)

Num

ber

of R

Ns

used

LPS(d=0.005)ACS(d=0.005)LPS(d=0.01)ACS(d=0.01)

(b) #RNs used by ACS, LPS

40x40 50x50 60x60 70x70 80x80 90x90100x1000

10

20

30

40

Field Size (units x units)

Num

ber

of R

Ns

used

LPD(d=0.005)ALD(d=0.005)ACD(d=0.050)LPD(d=0.01)ALD(d=0.01)ACD(d=0.01)

(c) #RNs used by ALD, ACD, LPD

Fig. 10: Results for grid RN distribution with constant SN density: seven different deployment regions, from40ร— 40 to 100ร— 100; two density values, ๐‘‘1 = 0.005 and ๐‘‘2 = 0.01.

2000 4000 6000 8000 10000 12000 14000 160000

5

10

15

20

|V|+|E|

Run

ning

tim

e (in

sec

s)

ACS(d=0.005)ALD(d=0.005)ACD(d=0.005)ACS(d=0.01)ALD(d=0.01)ACD(d=0.01)

(a) running times of ACS, ALD, ACD

40x40 50x50 60x60 70x70 80x80 90x90100x1000

5

10

15

20

25

Field Size (units x units)

Num

ber

of R

Ns

used

LPS(d=0.005)ACS(d=0.005)LPS(d=0.01)ACS(d=0.01)

(b) #RNs used by ACS, LPS

40x40 50x50 60x60 70x70 80x80 90x90100x1000

10

20

30

40

Field Size (units x units)

Num

ber

of R

Ns

used

LPD(d=0.005)ALD(d=0.005)ACD(d=0.050)LPD(d=0.01)ALD(d=0.01)ACD(d=0.01)

(c) #RNs used by ALD, ACD, LPD

Fig. 11: Results for random RN distribution with constant SN density: seven different deployment regions,from 40ร— 40 to 100ร— 100; two density values, ๐‘‘1 = 0.005 and ๐‘‘2 = 0.01.

densities, the algorithms for 1CSCP have low runningtime, while those for 2CDCP have higher runningtime, which is expected. The running times for theALD and ACD, increase with increasing โˆฃ๐ธโˆฃ + โˆฃ๐‘‰ โˆฃ

as more RNs are required for coverage and con-nectivity, thus taking more time. The running timefor ๐‘‘2 = 0.01 is less than that of ๐‘‘1 = 0.005, aswith increasing density, there is greater likelihood of

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

13

the RNs used for coverage to be connected as such.Figs. 10(b), 10(c), 11(b), and 11(c) show the numberof RNs required by various algorithms in differentexperiment settings. Again, our algorithms performremarkably well, never requiring more than twice thenumber of RNs in the optimal solution.

40x40 50x50 60x60 70x70 80x80 90x90 100x10030%

40%

50%

60%

70%

80%

90%

100%

Field Size (units x units)

Ene

rgy

Impr

ovem

ent (

%)

d=0.005d=0.01

(a) Constant density

20 40 60 80 100 12085%

90%

95%

100%

Number of SNs

Ene

rgy

Impr

ovem

ent (

%)

(b) Increasing density

Fig. 12: Grid distribution

40x40 50x50 60x60 70x70 80x80 90x90 100x10030%

40%

50%

60%

70%

80%

90%

100%

Field Size (units x units)

Ene

rgy

Impr

ovem

ent (

%)

d=0.005d=0.01

(a) Constant density

20 40 60 80 100 12085%

90%

95%

100%

Number of SNs

Ene

rgy

Impr

ovem

ent (

%)

(b) Increasing density

Fig. 13: Random distribution

For energy efficiency, we only compare the net-work without RNs deployed and the network withRNs deployed to solve 1CSCP. Figs. 12 and 13 showthe energy efficiency improvement by placing RNs.For the constant density case, we observe that theimprovement is increased with the increase of thefield size. The reason is that some SNs may needto forward data for more SNs when the field sizeis increased without RNs deployed. In the case withRNs deployed, the SNs can transmit to the closestRN and do not need to forward data for other SNs.For the increasing density case, we observe that theimprovement tends to keep consistent (the average

improvement varies within the range of width 3%).The reason is that although the SNs need to forwardthe data for more SNs, the transmission distances areshorten due to the increased SN density.

8 CONCLUSIONS AND OPEN PROBLEMSWe have studied the constrained relay node place-ment in a two-tiered wireless sensor network tomeet connectivity and survivability requirements. Forthe connected single-cover problem, we have pre-sented a framework of polynomial time approxi-mation algorithms with ๐’ช(1)-approximation ratios.For the 2-connected double-cover problem, our algo-rithms have ๐’ช(1)-approximation ratios for the prac-tical cases where each sensor node can be con-nected to only a constant number of relay nodes, and๐’ช(ln ๐‘›)-approximation ratios for the arbitrary cases.We have also presented linear programming basedlower bounds for the optimal solutions, which areused in the simulation studies. Simulation resultsshow that the solutions obtained by our algorithmsare always within twice that of the optimal solution.

There are still many open problems in this area.Although algorithms with guaranteed approximationratios were developed in this paper, one underlyingassumption in our model is that ๐‘… โ‰ฅ 2๐‘Ÿ. It would beinteresting to study the two-tiered constrained relaynode placement problem without such an assumption.In addition, we have been tackling the relay nodeplacement problems by solving the coverage prob-lem and the connectivity problem separately. Alter-natively, one can develop an algorithm that considersboth coverage and connectivity jointly, which maylead to a tighter bound. Another direction is to extendour algorithms to more generic case, i.e., ๐‘˜-connected๐‘š-cover problem, where ๐‘˜ โ‰ฅ 1 and ๐‘š โ‰ฅ 1.

REFERENCES[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci;

Wireless sensor networks: a survey; COMNET; Vol. 38(2002),pp. 393โ€“422.

[2] J. Bredin, E. Demaine, M. Hajiaghayi and D. Rus; Deployingsensor networks with guaranteed capacity and fault tolerance;Mobihocโ€™05; pp. 309-319.

[3] J. Bredin, E. Demaine, M. Hajiaghayi and D. Rus; Deployingsensor networks with guaranteed fault tolerance; IEEE/ACMTransactions on Networking; Vol. 18(2010), pp. 216โ€“228.

[4] P. Carmi and M.J. Katz; Power assignment in radio networkswith two power levels; Algorithmica; Vol. 47(2007), pp. 183โ€“201.

[5] P. Cheng, C.N. Chuah and X. Liu; Energy-aware node place-ment in wireless sensor networks; Globecomโ€™04; pp. 3210โ€“3214.

[6] X. Cheng, D.Z. Du, L. Wang and B. Xu; Relay sensor placementin wireless sensor networks; ACM/Springer WINETโ€™07;

[7] F. Claude, R. Dorrigiv, S. Durocher and R. Fraser; Practical dis-crete unit disk cover using an exact line-separable algorithm;ISAACโ€™09; pp. 45-54.

[8] T. Cormen, C. Leiserson, R. Rivest and C. Stein; Introduction toAlgorithms (2nd ed); MIT Press and McGraw-Hill, 2001.

[9] A. Efrat, Sandor P. Fekete, P. Gaddehosur, J. Mitchell, V. Pol-ishchuk and J. Suomela; Improved Approximation Algorithmsfor Relay Placement; ESAโ€™08; pp.356โ€“367.

[10] M.R. Garey and D.S. Johnson; Computers and Intractability: AGuide to the Theory of NP-Completeness; W.H Freeman and Co.,1979.

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.

14

[11] G. Gupta and M. Younis; Fault tolerant clustering of wirelesssensor networks; WCNCโ€™03, pp. 1579โ€“1584.

[12] X. Han, X. Cao, E.L. Lloyd and C.-C. Shen; Fault-tolerant relaynode placement in heterogeneous wireless sensor networks;Infocomโ€™07, pp. 1667โ€“1675.

[13] B. Hao, J. Tang and G. Xue; Fault-tolerant relay node place-ment in wireless sensor networks: formulation and approxi-mation; HPSRโ€™04; pp. 246-250.

[14] W.B. Heinzelman, A.P. Chandrakasan and H. Balakrishnan;An application-specific protocol architecture for wireless mi-crosensor networks; IEEE Transactions on Wireless Communica-tions; Vol. 1(2002), pp. 660โ€“670.

[15] D.S. Hochbaum; Approximating covering and packing prob-lems: Set cover, vertex cover, independent set, and relatedproblems; in: D.S. Hochbaum (Ed.), Approximation Algorithmsfor NP-Hard Problems; PWS Publishing Co., Boston, MA, USA,1996, pp. 94-143.

[16] Y.T. Hou, Y. Shi, and H.D. Sherali; On energy provisioningand relay node placement for wireless sensor networks; IEEETransactions on Wireless Communications, Vol. 4(2005), pp. 2579โ€“2590.

[17] F.K. Hwang, D.S. Richards and P. Winter; The Steiner TreeProblem; Annals of Discrete Mathematics, 1992.

[18] A. Kashyap, S. Khuller and M. Shayman; Relay placementfor higher order connectivity in wireless sensor networks;Infocomโ€™06.

[19] L.T. Kou, G. Markowsky and L. Berman; A fast algorithm forSteiner trees; Acta Informatica; Vol. 15(1981); pp. 141โ€“145.

[20] Q. Li, J. Aslam, D. Rus; Online power-aware routing in wire-less ad-hoc networks; Mobicomโ€™01, pp. 97โ€“107.

[21] G. Lin and G. Xue; Steiner tree problem with minimum num-ber of Steiner points and bounded edge-length; InformationProcessing Letters; Vol. 69(1999), pp. 53-57.

[22] H. Liu, P.J. Wan and X.H. Jia; Fault-tolerant relay node place-ment in wireless sensor networks; LNCS; Vol. 3595(2005),pp. 230โ€“239.

[23] E. Lloyd and G. Xue; Relay node placement in wirelesssensor networks; IEEE Transactions on Computers; Vol. 56(2007),pp. 134โ€“138.

[24] W. Maass; On the complexity of nonconvex covering; SIAMJournal on Computing; Vol. 15(1986), pp. 453โ€“467.

[25] S. Misra, S. Hong, G. Xue and J. Tang; Constrained relaynode placement in wireless sensor networks: formulationand approximations; IEEE/ACM Transactions on Networking;Vol. 18(2010), pp. 434โ€“447.

[26] N. Mustafa and S. Ray; PTAS for geometric hitting set prob-lems via local search; SCGโ€™09; pp. 17-22.

[27] J. Pan, Y.T. Hou, L. Cai, Y. Shi, S.X. Shen; Topology control forwireless sensor networks; Mobicomโ€™03, pp. 286โ€“299.

[28] S. Rajagopalan and V. Vazirani; Primal-Dual RNC approxima-tion algorithms for set cover and covering integer programs;SIAM Journal on Computing; Vol. 28(1998), pp. 525โ€“540.

[29] R. Ravi and D.P. Williamson; An approximation al-gorithm for minimum-cost vertex-connectivity problems;Algorithmica;Vol.18(1997),pp.21-43.

[30] R. Ravi and D.P. Williamson; Erratum: an approximationalgorithm for minimum-cost vertex-connectivity problems; Al-gorithmica; Vol. 34(2002), pp.98โ€“107.

[31] G. Robins and A. Zelikovsky; Tighter bounds for graph Steinertree approximation; SIAM J. on Disc. Math.; Vol. 19(2005),pp. 122โ€“134.

[32] A. Srinivas, G. Zussman, and E. Modiano; Mobile backbonenetworksโ€“Construction and maintenance, Mobihocโ€™06, pp. 166โ€“177.

[33] D.B. West, Introduction to Graph Theory, Prentice Hall, 1996.[34] K. Xu, H. Hassanein, G. Takahara and Q. Wang; Relay node

deployment strategies in heterogeneous wireless sensor net-works: multiple-hop communication case; Seconโ€™05, pp. 575-585.

[35] O. Younis and S. Fahmy; Distributed clustering for ad-hoc sen-sor networks: a hybrid, energy-efficient approach; Infocomโ€™04;pp.269โ€“640.

[36] W. Zhang, G. Xue, and S. Misra; Fault-tolerant relay nodeplacement in wireless sensor networks: problems and algo-rithms; Infocomโ€™07; pp.1649โ€“1657.

Dejun Yang (Sโ€™08) received the B.S. fromPeking University, China, in 2007. Currentlyhe is a PhD student in the School of Comput-ing, Informatics, and Decision Systems Engi-neering (CIDSE) at Arizona State University.His research interests include game theory,graph algorithms, optimization in wirelesssensor networks, wireless mesh networksand social networks.

Satyajayant Misra (Mโ€™05) is an AssistantProfessor of Computer Science at New Mex-ico State University. He received his MScdegrees (2003) in physics and computer sci-ence from BITS, Pilani, India and his PhDdegree (2009) in computer science from theSchool of Computing and Informatics at Ari-zona State University. His research inter-ests are in wireless and social networks andinclude network security, optimization, andanalysis. He has served on the TPCs of

several international conferences and as reviewer for several inter-national journals and conferences.

Xi Fang (Sโ€™09) received the B.S. and M.S.degrees from Beijing University of Postsand Telecommunications, China, in 2005 and2008 respectively. Currently he is a Ph.Dstudent in the School of Computing, Infor-matics, and Decision Systems Engineeringat Arizona State University. His research in-terests include algorithm design and securityin wireless networks, optical networks andsocial networks.

Guoliang Xue (SMโ€™99-Fโ€™11) is a Professor ofComputer Science and Engineering at Ari-zona State University. He received the BSdegree (1981) in mathematics and the MSdegree (1984) in operations research fromQufu Normal University, Qufu, China, andthe PhD degree (1991) in computer sciencefrom the University of Minnesota, Minneapo-lis, USA. His research interests include sur-vivability, security, and resource allocationissues in networks ranging from optical net-

works to wireless mesh and sensor networks. He has publishedover 170 papers in these areas. He received the NSF ResearchInitiation Award in 1994, and has been continuously supported byfederal agencies including NSF and ARO. He is an Associate Editorof IEEE/ACM Transactions on Networking and IEEE Network, aswell as a past Associate Editor of IEEE Transactions on WirelessCommunications, and Computer Networks. He served as a TPC co-chair of IEEE INFOCOMโ€™2010, and is a Distinguished Lecturer of theIEEE Communications Society. He is a Fellow of the IEEE.

Junshan Zhang (Mโ€™00-SMโ€™06) received hisPh.D. degree from the School of ECE atPurdue University in 2000. He joined the EEDepartment at Arizona State University inAugust 2000, where he has been Professorsince 2010. His current research focuseson fundamental problems in information net-works and network science, including net-work optimization and management, networkinformation theory, and statistical learningand analysis. He is a recipient of the ONR

Young Investigator Award in 2005 and the NSF CAREER award in2003. He served as TPC co-chair for WICONโ€™2008 and IPCCCโ€™06,and general chair for IEEE Communication Theory Workshopโ€™2007.He will be TPC co-chair for INFOCOMโ€™2012. He co-authored a paperthat won IEEE ICCโ€™2008 best paper award. One of his papers wasselected as the INFOCOMโ€™2009 Best Paper Award Runner-up.

IEEE TRANSACTIONS ON MOBILE COMPUTINGThis article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.