28
128 Chapter 3 Clustering Wireless Sensor Nodes Using Caterpillar Graph 3. Introduction A wireless sensor network is a collection of nodes organized into a cooperative network [1].Currently, wireless sensor networks are beginning to be deployed at an accelerated space. It is not unreasonable to expect that in 10-15 years that the world will be covered with wireless sensor networks with access to them via the Internet. This can be considered as the Internet becoming a physical network. This new technology is exciting with unlimited potential for numerous application areas including environmental, medical, military, transportation, entertainment, crisis management, homeland defense, and smart spaces. Since a wireless sensor network is a distributed real-time system a natural question is how many solutions from distributed and real-time systems can be used in these new systems? Unfortunately, very little prior work can be applied and new solutions are necessary in all areas of the system. The main reason is that the set of assumptions underlying previous work has changed dramatically. Most past distributed systems research has assumed that the systems are wired, have unlimited power, are not real-time, have user interfaces such as screens and mice, have a fixed set of resources, treat each node in the system as very important and are location independent. In contrast, for wireless sensor networks, the systems are wireless, have scarce power, are real-time, utilize sensors and actuators as interfaces, have dynamically changing sets of resources, aggregate behavior is important and location is critical. Many wireless sensor networks also

Chapter 3 Clustering Wireless Sensor Nodes Using ...shodhganga.inflibnet.ac.in/bitstream/10603/8399/10/10_chapter 3.pdf · Clustering Wireless Sensor Nodes Using Caterpillar Graph

Embed Size (px)

Citation preview

128

Chapter 3

Clustering Wireless Sensor Nodes Using Caterpillar Graph

3. Introduction

A wireless sensor network is a collection of nodes organized into a cooperative

network [1].Currently, wireless sensor networks are beginning to be deployed at an

accelerated space. It is not unreasonable to expect that in 10-15 years that the world

will be covered with wireless sensor networks with access to them via the Internet.

This can be considered as the Internet becoming a physical network. This new

technology is exciting with unlimited potential for numerous application areas

including environmental, medical, military, transportation, entertainment, crisis

management, homeland defense, and smart spaces. Since a wireless sensor network is

a distributed real-time system a natural question is how many solutions from

distributed and real-time systems can be used in these new systems? Unfortunately,

very little prior work can be applied and new solutions are necessary in all areas of

the system. The main reason is that the set of assumptions underlying previous work

has changed dramatically. Most past distributed systems research has assumed that the

systems are wired, have unlimited power, are not real-time, have user interfaces such

as screens and mice, have a fixed set of resources, treat each node in the system as

very important and are location independent. In contrast, for wireless sensor networks,

the systems are wireless, have scarce power, are real-time, utilize sensors and

actuators as interfaces, have dynamically changing sets of resources, aggregate

behavior is important and location is critical. Many wireless sensor networks also

129

utilize minimal capacity devices which places a further strain on the ability to use past

solutions.

3.1 MAC

A medium access control (MAC) protocol coordinates actions over a shared channel.

The most commonly used solutions are contention-based. One general contention-

based strategy is for a node which has a message to transmit to test the channel to see

if it is busy, if not busy then it transmits, else if busy it waits and tries again later.

After colliding, nodes wait random amounts of time trying to avoid re-colliding. If

two or more nodes transmit at the same time there is a collision and all the nodes

colliding try again later. Many wireless MAC protocols also have a dozen mode

where nodes not involved with sending or receiving a packet in a given timeframe go

into sleep mode to save energy. Many variations exist on this basic scheme. In

general, most MAC protocols optimize for the general case and for arbitrary

communication patterns and workloads. However, a wireless sensor network has more

focused requirements that include a local unicast or broad cast , traffic is generally

from nodes to one or a few sinks (most traffic is then in one direction),have periodic

or rare communication and must consider energy consumption as a major factor. An

effective MAC protocol for wireless sensor networks must consume little power,

avoid collisions, be implemented with a small code size and memory requirements, be

efficient for a single application, and be tolerant to changing radio frequency and

networking conditions. One example of a good MAC protocol for wireless sensor

networks is B-MAC [2]. B-MAC is highly configurable and can be implemented with

130

a small code and memory size. It has an interface that allows choosing various

functionality and only that functionality as needed by a particular application. B-MAC

consists of four main parts: clear channel assessment (CCA), packet back off, link

layer acks, and low power listening. For CCA, B-MAC uses a weighted moving

average of samples when the channel is idle in order to assess the background noise

and better be able to detect valid packets and collisions. The packet back off time is

configurable and is chosen from a linear range as opposed to an exponential back off

scheme typically used in other distributed systems. This reduces delay and works

because of the typical communication patterns found in a wireless sensor network. B-

MAC also supports a packet by packet link layer acknowledgement. In this way only

important packets need pay the extra cost. A low power listening scheme is employed

where a node cycles between awake and sleep cycles. While awake it listens for a

long enough preambles to assess if it needs to stay awake or can return to sleep mode.

This scheme saves significant amounts of energy. Many MAC protocols use a request

to send (RTS) and clear to send (CTS) style of interaction. This works well for ad hoc

mesh networks where packet sizes are large (1000s of bytes). However, the overhead

of RTS-CTS packets to set up a packet transmission is not acceptable in wireless

sensor networks where packet sizes are on the order of 50 bytes. B-MAC, therefore,

does not use a RTS-CTS scheme. Recently, there has been new work on supporting

multi-channel wireless sensor networks. In these systems it is necessary to extend

MAC protocols to multi-channel MACs. One such protocol is MMSN[3] . These

protocols must support all the features found in protocols such as B-MAC, but must

also assign frequencies for each transmission. Consequently, multi-frequency MAC

131

protocols consist of two phases: channel assignment and access control. The details

for MMSN are quite complicated and are not described here. On the other hand, we

expect that more and more future wireless sensor networks will employ multiple

channels (frequencies). The advantages of multi-channel MAC protocols include

providing greater packet throughput and being able to transmit even in the presence of

a crowded spectrum.

3.1.1 Routing

Semantics may be that a single node closest to the geographic destination is to be the

unicast node. Second, the semantics could be that all nodes within some area around

the destination address should receive the message. This is an area multicast. Third, it

may only be necessary for any node, called any cast, in the destination area to receive

the message. The SPEED [4] protocol supports these 3 types of semantics. There is

also often a need to flood (multicast) to the entire network. Many routing schemes

exist for supporting efficient flooding.

Real-Time: For some applications, messages must arrive at a destination by a

deadline. Due to the high degree of uncertainty in WSN it is difficult to develop

routing algorithms with any guarantees. Protocols such as SPEED [5] and RAP [6]

use a notion of velocity to prioritize packet transmissions. Velocity is a nice metric

that combines the deadline and distance that a message must travel.

Mobility: Routing is complicated if either the message source or destination or both

are moving. Solutions include continuously updating local neighbor tables or

identifying proxy nodes which are responsible for keeping track of where nodes are.

132

Proxy nodes for a given node may also change as a node moves further and further

away from its original location.

Voids: Since WSN nodes have a limited transmission range, it is possible that for

some node in the routing path there are no forwarding nodes in the direction a

message is supposed to travel. Protocols like GPSR [7]. Solve this problem by

choosing some other node “not” in the correct direction in an effort to find a path

around the void.

Security: If adversaries exist, they can perpetrate a wide variety of attacks on the

routing algorithm including selective forwarding, black hole, Sybil, replays,

wormhole and denial of service attacks. Unfortunately, almost all WSN routing

algorithms have ignored security and are vulnerable to these attacks. Protocols such as

SPINS [8] have begun to address secure routing issues.

Congestion: Today, many WSN have periodic or infrequent traffic. Congestion does

not seem to be a big problem for such networks. However, congestion is a problem

for more demanding WSN and is expected to be a more prominent issue with larger

systems that might process audio, video and have multiple base stations (creating

more cross traffic). Even in systems with a single base station, congestion near the

base station is a serious problem since traffic converges at the base station. Solutions

use backpressure, reducing

133

3.2 Design Challenges

Several design challenges present themselves to designers of wireless sensor network

applications. The limited resources available to individual sensor nodes implies

designers must develop highly distributed, fault-tolerant, and energy efficient

applications in a small memory-footprint. Some features of wireless sensor nodes are:

1. Individual nodes in a wireless sensor network have limited computational power

and storage capacity. They operate on nonrenewable power sources and employ a

short-range transceiver to send and receive messages.

2. The number of nodes in a wireless sensor network can be several orders of

magnitude higher than in an ad hoc network. Thus, algorithm scalability is an

important design criterion for sensor network applications.

3. Sensor nodes are generally densely deployed in the area of interest. This dense

deployment can be leveraged by the application, since nodes in close proximity can

collaborate locally prior to relaying information back to the base station.

4. Sensor networks are prone to frequent topology changes. This is due to several

reasons, such as hardware failure, depleted batteries, intermittent radio interference,

environmental factors, or the addition of sensor nodes. As a result, applications

require a degree of inherent fault tolerance and the ability to reconfigure themselves

as the network topology evolves over time.

Wireless sensor networks do not employ a point-to-point communication paradigm

because they are usually not aware of the entire size of the network and nodes are not

uniquely identifiable. Consequently, it is not possible to individually address a

specific node. Paradigms, such as directed diffusion [9, 10] employ a data-centric

134

view of generated sensor data. Nodes request data by disseminating interests for this

named data throughout the network. Data that matches the criterion are relayed back

toward the querying node.

Even with the limitations individual sensor nodes possess and the design challenges

application developers face, several advantages exist for instrumenting an area with a

wireless sensor network [11].Due to the dense deployment of a greater number of

nodes, a higher level of fault tolerance is achievable in wireless sensor networks. .

Coverage of a large area is possible through the union of coverage of several small

sensors. Coverage of a particular area and terrain can be shaped as needed to

overcome any potential barriers or holes in the area under observation. It is possible to

incrementally extend coverage of the observed area and density by deploying

additional sensor nodes within the region of interest. An improvement in sensing

quality is achieved by combining multiple, independent sensor readings. Local

collaboration between nearby sensor nodes achieves a higher level of confidence in

observed phenomena. . Since nodes are deployed in close proximity to the sensed

event, this overcomes any ambient environmental factors that might otherwise

interfere with observation of the desired phenomenon.

3.2.1 Architecture

The wireless sensor network architecture is divided into distinct tiers Fig. 1. The

lowest level consists of autonomous motes, equipped with various sensors that

perform basic networking, computing, and sensing tasks. They are organized into a

local one-hop network and collectively identified as a sensor patch. One of the sensor

135

motes within the sensor patch serves as a gateway between the sensor patch and the

base station. It differs from other motes in that it is equipped with a high-gain antenna

able to transmit data over a 350-foot link to the base station. The gateway node is also

equipped with a solar panel and rechargeable battery in order to be able to operate

with a 100% duty cycle. Data relayed to the base station are stored in a database and

made available over the Internet.

Client Data Service

Base remote link

Transit network

Base Sensor

Gateway node

Internet Gateway

Figure 1

136

3.3 Clustering

Clustering analysis is desirable in nearly any field of study where it is beneficial to

group data into similar sets depending on one’s objective in analyzing a set of data

one might define similarity between elements differently and thus a clustering process

could be optimized to provide numerous way of grouping a set of elements. In order

to create any sort of clustering algorithm and determine its effectiveness it is

necessary to find some way to quantity similarity between elements. When sensor

nodes are organized in clusters they could use either single hop or multi hop mode of

communication to send their data to their respective cluster heads. The sensor nodes

are randomly and uniformly distributed over the region and the nodes are organized in

clusters to take advantage of possible data aggregation at the cluster head nodes.

There are two types of nodes; cluster head nodes and sensor nodes. The cluster head

nodes act as the fusion points within the network. During each data gathering cycle

the sensor nodes send their sensed data to the closest cluster head node which perform

data aggregation. Then the cluster head directly transmits the aggregated data to a

base station. The sensor nodes have simple functionality, since they perform sensing

and relatively short-range communication. However the cluster head nodes are more

complex, since they coordinate MAC and routing within their cluster perform data

fusion and perform long range transmissions to the remote base station. The overall

system design problem involves determining the optimum number of cluster head

nodes the optimum node of communication within a cluster (Single hop or Multi

hop).Some of the objectives of the clustering nodes are as follows

137

• Involves grouping nodes into clusters and electing a CH

• Members of a cluster can communicate with their CH directly

• CH can forward the aggregated data to the central base station through

other CHs

• Clustering Objectives

• Allows aggregation

• Limits data transmission

• Facilitate the reusability of the resources

• CHs and gateway nodes can form a virtual backbone for intercluster

routing

• Cluster structure gives the impression of a smaller and more stable

network

• Improve network lifetime

• Reduce network traffic and the contention for the channel

• Data aggregation and updates take place in CHs

Various clustering algorithms have been proposed to organize sensor nodes in a

wireless sensor network into clusters. [1][2][3][4][5][6](Papers). Each aim to meet

certain needs of the system. This could provide a system having low clustering related

maintenance cost or energy efficient clusters to minimize energy consumption

suitable for sensor nodes with energy constraints or for load balancing to distribute

the workload of a network. The fig2 illustrates the concept of clusters.

138

Wireless sensor networks are networks of wireless nodes that are deployed over an area for

the purpose of monitoring certain phenomena of interest. The nodes perform certain

measurements process the measured data and transmit the processed data to a base station

over a wireless channels. The base station collects data from all the nodes and analyzes this

data to draw conclusion about the activity in the area of interest. These networks are different

from the traditional wireless ad hoc networks. However, when nodes are organized in clusters

and when they use multi hop communication to reach the cluster head the nodes closer to a

cluster head have a higher load of relaying packets as compared to other nodes. However is

Cluster member

Clusterhead

Gateway node

Intra - Cluster Cross - Cluster

Figure 2

139

most sensor networks nodes are static consequently the nodes closer to the cluster head get

overburdened constantly. The cluster heads themselves have the extra burden of performing

long rang transmissions to the distant base station.

We consider a region to be covered by sensor nodes. The number of sensor nodes is

determined by the application requirements. Usually each sensor node has a sensing radius

and it is required that the sensor nodes provide coverage of the region with a high probability.

The sensing radius of each node depends on the phenomenon that is being sensed as well as

the sensing hardware of the node. Thus in general the required number of sensor nodes is

dictated by the application and hence we assume it to be a constant.

3.3.1 Clustering Algorithm

Consider a wireless network represented by a connected graph where the

vertex set contains nodes and is the edge set. We assume that the nodes form

clusters in such a manner that the following assumptions are satisfied: . Each node

belongs to one and only one cluster.2. In each cluster, there is a node which is

adjacent to all the remaining nodes in the cluster. Such a node is called a cluster-head.

(If more than one such nodes exist, only one is chosen). Two clusters are called

adjacent (or neighbors) if there is a direct link joining them. Assume that through

some information exchange, a cluster-head knows all its neighboring clusters. In the

case that two clusters are joined by more than one links, we assume that the cluster-

heads of both clusters agree on a single such link being activated. The end nodes of

active links are called gateway nodes. The set of cluster-heads by our assumption is a

dominating set, i.e., a subset of nodes which are at most 1 hop away from any node.

140

The well-known minimum dominating set (MDS) problem seeks a dominating set of

minimum size, and has been proven to be -hard. In the following, we describe

hence its degree (i.e., the number of neighbors). Initially, a non-iterative

decentralized clustering algorithm for choosing a dominating set. Assume that each

node knows its one-hop neighbors, each node sets its own flag to , meaning that it

does not yet belong to any cluster. At a certain time, each node starts a timer with

length drawn from an exponential distribution with rate If node ’s timer expires

at , it becomes a cluster-head. It sets its flag to , and broadcasts a “cluster

initialize” message to all its neighbors. Each of its neighbors with flag signals its

intention to join the cluster by replying with a “cluster join” message. It also sets its

own flag to and stops the timer. At the end, clusters satisfying the two properties

mentioned above are formed. The particular choice of timers ensures that high degree

nodes have more chances to become cluster-heads, somewhat like a greedy algorithm.

3.4 Graph Terminology

We use an undirected graph with edges and nodes, to represent a

snapshot of the wireless sensor network. Each node in represents a mobile host, and

each edge in signifies that two hosts are within transmission range of each other.

The topology of is the set of edges and nodes. Hence, when we say a node

movement changes the topology, we mean a change in the network that results in a

change in either or . Specifically, an edge deletion occurs when two hosts lose

communication with each other, and an edge insertion occurs when two hosts move

141

into range of each other. A node deletion in isolation occurs when a host turns off its

power, and a node insertion in isolation occurs when a host turns on its power. By “in

isolation” we mean that no other change has occurred in the network. Because a node

insertion or deletion affects multiple edges, we process these changes to as multiple

changes to . Finally, the most general node movement models the movement of a

host from one part of the network to another; hence, a node movement is a

combination of a node deletion from one part of and a node insertion in another part

of . The open neighborhood of node represents all hosts within

transmission range of except for itself. The closed neighborhood of also

includes , that is, . With these definitions extended to subsets of

, the open neighborhood of ∈ , and the closed

neighborhood of is . The degree of v is the size of its open

neighborhood: The maximum degree of is ∈ For

the purposes of analysis of overhead, we assume that a local broadcast takes

time (which is true if the MAC layer can schedule local broadcasts reliably). Given a

subgraph of , the –degree of is , the number of ’s neighbors that are in

. The maximum degree of is denoted . The diameter of is the

maximum number of edges contained in any simple path between two nodes in .

The diameter of a subgraph of is denoted

We use an approximation to a minimum connected dominating set (MCDS). A

subset is a dominating set if . Let be the subgraph induced by

is a connected dominating set if, in addition to , is

142

connected. Since finding an MCDS is an -complete problem that is also hard to

approximate we present a distributed greedy MCDS approximation algorithm that is

similar to the algorithm in. The MCDS nodes are incidentally also the interior nodes

of a maximum leaf spanning tree.

We use the interior of this tree as the back bone. Thus, each node in has a unique

dominator in , denoted .The set ∈ is a maximum leaf

spanning tree. The nodes of comprise the interior of this spanning tree, and the

edges of this spanning tree between nodes in are called back bone edges. Wireless

sensor networks can be deployed for many application unlike wired networks or

cellular networks no physically backbone infrastructure is installed in wireless sensor

networks. A communication session is achieved either through a single hop if the

communication parties are close enough or through relating by intermediate nodes

otherwise. The topology of such wireless ad hoc network can be modeled as a unit

disk graph a geometric graph in which there is an edge between two nodes if and only

if there distance is at one unit as show in fig 3

Figure 3

143

Although a wireless sensor network has no physical backbone infrastructure a virtual

back bone can be formed by nodes in a connected dominating set of the corresponding

unit disk graph [6][7][8]. Such a virtual backbone plays a very important role in

routing, broadcasting, and connectivity managements in wireless sensor networks

3.4.1 Clustering Using Dominating Sets

A dominating set is a subset of a graph such that every vertex in is either in

or adjacent to a vertex in [12]. Dominating sets are widely used in clustering

networks [8]. Dominating sets can be classified into three main classes, Independent

Dominating Sets (IDS), Weakly Connected Dominating Sets (WCDS) and Connected

Dominating Sets (CDS) [13]

Independent Dominating Sets: IDS is a dominating set of a graph in which there

are no adjacent vertices.

Weakly Connected Dominating Sets (WCDS): A weakly induced sub graph is a

subset of a graph that contains the vertices of , their neighbors and all edges of

the original graph with at least one endpoint in . A subset is a weakly-connected

dominating set, if is dominating and is connected [14].

Connected Dominating Sets: A connected dominating set (CDS) is a subset of a

graph such that forms a dominating set and is connected.

Clustering Using IDS: Baker and Ephremides [15] proposed an independent

dominating set algorithm called highest vertex ID. A very similar algorithm to the

highest id algorithm is the lowest id algorithm by Gerla and Tsai [16].”Gerla and

Tsai” developed another algorithm to find the independent dominating sets called the

144

highest degree algorithm. Although these algorithms are considered as important

algorithms, Chen et al. [17] proposed that these algorithms are not working correctly

for some graphs. To solve this incorrect operation, Chen et al developed the -

distance independent dominating set algorithm.[18].

Clustering Using WCDS: Although independent dominating sets are suitable for

constructing optimum sized dominating sets, they have some deficiencies such as lack

of direct communication between cluster heads. In order to obtain the connectivity

between cluster heads, WCDSs can be used to construct clusters. A Dominating Set

Based Clustering Algorithm for Mobile Ad Hoc Networks 573. The WCDS was first

proposed for clustering in ad hoc networks by Chen and Liestman [19] called zonal

clustering.

Clustering Using CDS: CDS have many advantages in network applications such as

ease of broadcasting and constructing virtual backbones [20],however, when we try to

obtain a connected dominating set, we may have undesirable number of cluster heads.

So, in constructing connected dominating sets, our primary problem is to find a

minimal connected dominating set. Guha and Khuller [21] proposed two centralized

greedy algorithms for finding suboptimal connected dominating sets. Das and

Bharghavan [22] provided distributed implementations of Ghua and Khuller’s

algorithms [23]. Wu and Li [24] improved Das and Bhraghavan’s distributed

algorithm as a localized distributed algorithm for finding connected and Ophir

Frieder [25] proposed a distributed algorithm for finding a CDS which constructs the

dominating set using the Maximal Independent Sets. Hui Liu, Yi Pan and Jiannong

Cao [26],”Improved Wu and Li’s algorithm” [27] by adding a third phase elimination.

145

In the additional third phase, the algorithm searches redundant cluster heads. A cluster

head is eliminated if it is dominated by two of its cluster head neighbors.

3.5 Caterpillar Graphs

A caterpillar graph is a tree having a chordless path , called the backbone

that contains at least one end point of every edge. Edges connecting the leaves with

the backbone are called hairs. In a complete caterpillar graph, each vertex of its

backbone has a nonempty set of hairs denoted by a complete caterpillar graph

with backbone .

We can use a simple graph to represent an wireless sensor network,

where represents a set of wireless mobile hosts and represents a set of edges. An

edge between host pairs indicates that both hosts and are within their

wireless transmitter ranges. To simplify our discussions, we assume all mobile hosts

are homogeneous i.e. their wireless transmitter ranges are the same. In other word, if

there is an edge in E, it indicates is within ’s range and is within ’s

range. Thus the corresponding graph will be an undirected graph. The graph in fig3

represents the corresponding wireless sensor network.

Figure 4

146

Lemma 1 ([28]). If is a chord less path with vertices, then

≥ two vertices

are twins in a graph if they have the same neighborhood. Jou et al [28] proved the

following properties.

Lemma 2. If and are twins in a graph then

Lemma 3. If is an induced subgraph of , then

Lemma 4. ([29]) For any two disjoint graphs and Let

For each , ) is the set of its

pendent vertices and is an independent set but it

is not maximal in If same vertex of belongs to a MIS then every vertex

of ) must belongs to it otherwise it is not maximal. As two vertices of are

twins in , we can construct them in to a single vertex, called hi, that represents

the whole set . Let be the construction group of

otherwise that is also a caterpillar graph with at most one pendent vertex at

each the contraction graph of a complete caterpillar graph is also complete.

Here, we can deploy the wireless sensor nodes in the form of caterpillar graphs as

shown in the fig. 4.But our objective here is to retain the connected dominating set

from the caterpillar graphs. Because the nodes in the set of connected dominating set

are cluster heads which has many applications in wireless sensor networks.We are

using linear algorithm to retain connected dominating set (CDS).

147

3.6 Linear Algorithm

Efficient liner algorithm for the domination number of a tree designed by

Cockayne,S Goodman and S Hedetniemi Cock et al [30] proposed their “a liner

algorithm for finding the domination number of a tree”, Partitioning the tree in

to three subsets where consists of free vertices, consists of bound

vertices and consists of required vertices. They have coined the one more term

called mixed domination set in is set of vertices which contain all required

vertices i.e. and which dominate all bound vertices i.e. every vertex ∈ is

either in or is adjacent to at least one vertex in . Free vertices need not be

dominated by but may be included in in order to dominate bound vertices. The

mixed dominating set in such a set is called an set of . Here we are applying

this algorithm on caterpillar graphs. Once we traced the algorithm on caterpillar graph

we get a a connected dominating set. Let us consider the algorithm.

Let the vertices of network be partitioned in to three subsets, ,

where consists of free vertices, consists of bound vertices and consist

required vertices. A mixed dominating set in G is set of vertices M which contains all

required vertices, i.e. and which dominates all bound vertices, i.e. every

vertex either in or is adjacent to at least one vertex in . Free vertices need

not be dominated by but may be included in in order to dominate bound vertices.

The mixed domination number is the minimum order of a mixed dominating

set in ; such a set is called an - set of .

148

The construction and correctness of the next algorithm is based on the following

theorem.

3.7 Theorem: [30] Let be a tree having free, bound and required vertices

respectively. Let be an end vertex of which is adjacent to vertex .

Then

(i) If , then ;

(ii) If and is the tree which results from deleting and relabeling

as “required”, then ;

(iii) If and , then

(iv) If and and if is the tree which results from deleting and

relabeling as “free”, then

Proof.(i) If ∈ , then since is free it need not be dominated in mixed

dominating set of . Thus any mixed dominating set of is also a mixed

dominating set of i.e. . Conversely, let be an set

of and let the free end vertex be a adjacent to vertex . Now if , the is

also a mixed dominating set of On the other hand if then

is mixed dominating set of Thus in either case.

.

149

(ii) The proof of this case, where the end vertex is bound, is virtually identical to

case (i) i.e must be dominated in any - set of . In this case we can show that

if is an set of then so is , i.e. there is an –set of

which contains . But this –set must also be an -set of , in

which is considered a required vertex.

(iii) The proof of this case is obvious and is omitted.

(iv) Let be an – set of in which is deleted and is labeled ‘free’. Then

clearly, is a mixed dominating set of , i.e.

Conversely let be an - set of . Since is required, We need to

consider two cases. If is also in , then is mixed dominating set of

similarly if then, since is free in , is also mixed dominating set

in . In either case – and with the previous inequality we

conclude,

150

3.8 Algorithm DOMSET. To find a -Set, or – Set, DOMSET, in a tree

T with free, bound and required vertices.

Step 0. [Initialize] Set DOMSET ← φ ; ← .

Step 1. [Delete end vertices one at a time]

Do

Step 2. has a free end vertex adjacent to a vertex

Step 3.set ← –

Step 4. has a bound end vertex adjacent to vertex

Step 5.Relabel as required;

Step 6.Set ← – .

Step7. has a required end vertex adjacent to a vertex

Step 8.Set ←

Step 9.If is bound then label as free

Step 10.Set ← –

od

Step11. [Process last vertex] If the last vertex is not free

then ←

Grouping sensor nodes into clusters in order to achieve the network scalability

objective. Every cluster would have a leader often referred to as cluster head (CH).

Recently a number of clustering algorithm have been specifically designed for WSN.

These proposed clustering techniques widely vary depending on the node deployment.

In this algorithm we need to deploy sensors in the form of caterpillar graphs and

151

tracing the algorithm on caterpillar graphs finally it left with path which is itself a

connected dominating set and all the nodes in the connected dominating sets are

cluster heads (CH).A CH may also be just one of the sensors or a node that is richer in

resources. The cluster membership may be fixed or variable. In addition to supporting

network scalability. Clustering has numerous advantages It can localize the route set

up within the cluster and thus reduce the size of the routing table store at the

individual node.

3.9 Conclusion

We studied the problem of the design of wireless sensor networks from the point of

view of the caterpillar graphs retaining the connected dominating set (CDS) of

caterpillar graphs. The CDS is itself a cluster head of the sensor nodes. And we utilize

the exiting linear time algorithm for finding domination number of a tree. Applying

this algorithm systematically on caterpillar graphs we get a connected dominating set.

152

References

[1]J. Hill, R. Szewczyk, A, Woo, S. Hollar, D. Culler, and K. Pister, System

Architecture Directions for Networked Sensors, ASPLOS, November 2000.

[2]. J. Polastre, J. Hill and D. Culler, Versatile Low Power Media Access for Wireless

Sensor Networks,ACM SenSys, November 2004.

[3] G. Zhou, C. Huang, T. Yan, T. He and J. Stankovic, MMSN: Multi-Frequency

Media Access Control for Wireless Sensor Networks, Infocom, April 2006.

[4] T. He, J. Stankovic, C. Lu and T. Abdelzaher, A Spatiotemporal Communication

Protocol for Wireless Sensor Networks, IEEE Transactions on Parallel and

Distributed Systems, to appear

[5] T. He, J. Stankovic, C. Lu and T. Abdelzaher, A Spatiotemporal Communication

Protocol for Wireless Sensor Networks, IEEE Transactions on Parallel and

Distributed Systems, to appear.

[6] J. Liu, M. Chu, J.J. Liu, J. Reich and F. Zhao, State-centric Programming for

Sensor and Actuator Network Systems, IEEE Pervasive Computing, October 2003.

[7]” B. Karp and H. T. Kung, GPSR: Greedy Perimeter Stateless Routing for Wireless

Sensor Networks,IEEE Mobicom, August 2000. ”

[8] A. Perrig, R. Szewczyk, J. Tygar, V.Wen, and D. Culler, SPINS: Security

Protocols for Sensor Networks,ACM Journal of Wireless Networks, September 2002.

[9] C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed diffusion: A scalable

and robustcommunication paradigm for sensor networks. In Proceedings of the 6th

Annual International Conference on Mobile Computing and Networking, pages 56–

67, ACM Press,2000.

153

[10] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva. Directed

diffusion for wireless sensor networking. IEEE/ACM Transactions on

Networking,11(1):2–16, 2003.

[11] J. Agre and L. Clare. An integrated architecture for cooperative sensing

networks. IEEE Computer, pages 106–108, May 2000..

[12]. West, D. : Introduction to Graph Theory, Second edition, Prentice Hall, Upper

Saddle River, N.J., (2001).

[13] Haynes, T., W., Hedetniemi, S., T. and Slater, P., J. : Domination in

Graphs,Advanced Topics, Marcel Dekker, Inc., (1998).

[14] Chen, Y., Z., P., Liestman, A., L. and Jiangchuan, L. : Clustering Algorithms for

Ad Hoc Wireless Networks, Nova Science Publishers, (2004).

[15] Baker, D. and Ephremides, A. : The Architectural Organization of a Mobile

Radio Network via a Distributed Algorithm, Communications, IEEE Transactions,

(1981), 29(11), 1694-1701.

[16] Gerla, M. and Jack T., C., T. : Multicluster, Mobile, Multimedia Radio

Network,Wireless Networks, 1(3), (1995), 255-265.

[17] Chen, G., Nocetti, F.,G., Gonzalez and J.S., Stojmenovic, I. : Connectivity Based

K-Hop Clustering in Wireless Networks, System Sciences, Proc. of the 35th Annual

Hawaii International Conference, (2002), 2450-2459.

[18] Ohta, T., Inoue, S. and Kakuda, Y. : An Adaptive Multihop Clustering Scheme

for Highly Mobile Ad Hoc Networks, Proc. of 6th ISADS’03, (2003).

154

[19] Chen, Y., P. and Liestman, A., L. : A Zonal Algorithm for Clustering Ad Hoc

Networks, International Journal of Foundations of Computer Science, (2003),

14(2),305-322.

[20] Stojmenovic, I., Seddigh M. and Zunic, J. : Dominating Sets and Neighbor

Elimination-Based Broadcasting Algorithms in Wireless Networks, IEEE

Transactions on Parallel and Distributed Systems, (2002), 13, 14-25. ”

[21] Guha S. and Khuller, S. : Approximation Algorithms for Connected Dominating

Sets, Springer Verlag New York, LLC, ISSN: 0178-4617, (1998).

[22] Das, B. and Bharghavan, V. : Routing in Ad-Hoc Networks Using Minimum

Connected Dominating Sets, Communications, ICC97 Montreal, ’Towards the

Knowledge Millennium’, IEEE International Conference, (1997), 1, 376-380

[23]. Wu and Li [14],” Wu, J. and Li, H. : A Dominating-Set-Based Routing Scheme

in Ad Hoc Wireless Networks, Springer Science Business Media B.V., Formerly

Kluwer Academic Publishers B.V. ISSN: 1018-4864, (2001).

[24] Wu, J. and Li, H. : A Dominating-Set-Based Routing Scheme in Ad Hoc

Wireless Networks, Springer Science+Business Media B.V., Formerly Kluwer

Academic Publishers B.V. ISSN: 1018-4864, (2001).

[25] Wan, P., J., Alzoubi, K., M. and Frieder, O. : Distributed Construction of

Connected Dominating Set in Wireless Ad Hoc Networks, Springer Science+Business

Media B.V., Formerly Kluwer Academic Publishers B.V., , (2002), 9(2), 141-149

[26], “Liu, H., Pan, Y. and Cao, J. : An Improved Distributed Algorithm for

Connected Dominating Sets in Wireless Ad Hoc Networks, Parallel and Distributed

Processing and Applications, Proc. of the ISPA 2004, (2004), 340.

155

[27]Liu, H., Pan, Y. and Cao, J. : An Improved Distributed Algorithm for Connected

Dominating Sets in Wireless Ad Hoc Networks, Parallel and Distributed Processing

and Applications, Proc. of the ISPA 2004, (2004), 340.

[28] J.Liu, Maximal Independent Sets in Bipartite Graphs, Journal of Graph Theory

17(1993)495-507.

[29]M Hujter, Z. Tuza, The Number of Maximal Independent Sets In Triangle – Free

Graph, SIAM Journal on Discrete Mathematics 6(1993)284-288.

[30] E Cockayne,S. Goodman, and S.Hedetniemi, A Linear Algorithm for the

Domination Number of A Tree Volume 4,number 2 ,1975