Minimum-Transmission Broadcast in Uncoordinated ... - IEEE Xplore
Minimum-Transmission Broadcast in Uncoordinated ... - IEEE Xplore
Minimum-Transmission Broadcast in Uncoordinated ... - IEEE Xplore
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>IEEE</strong> TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010 307<br />
<strong>M<strong>in</strong>imum</strong>-<strong>Transmission</strong> <strong>Broadcast</strong> <strong>in</strong> Uncoord<strong>in</strong>ated<br />
Duty-Cycled Wireless Ad Hoc Networks<br />
Jue Hong, Jiannong Cao, Senior Member, <strong>IEEE</strong>, Wenzhong Li, Member, <strong>IEEE</strong>,<br />
Sanglu Lu, Member, <strong>IEEE</strong>, and Daoxu Chen, Member, <strong>IEEE</strong><br />
Abstract—<strong>Broadcast</strong> is a fundamental operation of wireless<br />
ad hoc networks (WANETs) and has widely been studied over the<br />
past few decades. However, most exist<strong>in</strong>g broadcast<strong>in</strong>g strategies<br />
assume nonsleep<strong>in</strong>g wireless nodes and thus are not suitable for<br />
uncoord<strong>in</strong>ated duty-cycled WANETs, <strong>in</strong> which each node periodically<br />
switches on and off to save energy. In this paper, we<br />
study the m<strong>in</strong>imum-transmission broadcast problem <strong>in</strong> uncoord<strong>in</strong>ated<br />
duty-cycled WANETs (MTB-UD problem) and prove its<br />
NP-hardness. We show that modifications of exist<strong>in</strong>g broadcast<br />
approaches can only provide a l<strong>in</strong>ear approximation ratio of O(n)<br />
(where n is the number of nodes <strong>in</strong> the network). We propose<br />
a novel set-cover-based approximation (SCA) scheme with both<br />
centralized and distributed approximation algorithms. The centralized<br />
SCA (CSCA) algorithm has a logarithmic approximation<br />
ratio of 3(ln Δ + 1) and time complexity of O(n3 ) (Δ is the<br />
maximum degree of the network). The distributed SCA (DSCA)<br />
algorithm has a constant approximation ratio of at most 20 while<br />
keep<strong>in</strong>g both l<strong>in</strong>ear time and message complexities. We have<br />
conducted both theoretical analysis and simulations to evaluate<br />
the performance of the proposed algorithms. Results show that<br />
both the CSCA and DSCA algorithms outperform the modified<br />
versions of exist<strong>in</strong>g broadcast approaches by at least 50%.<br />
Index Terms—Approximation algorithm, duty cycle, m<strong>in</strong>imumtransmission<br />
broadcast (MTB), NP hard, wireless ad hoc network<br />
(WANET).<br />
I. INTRODUCTION<br />
ENERGY conservation is an important issue <strong>in</strong> wireless<br />
ad hoc networks (WANETs). Studies have shown that<br />
nodes spend most of the time on idle listen<strong>in</strong>g, which is a<br />
significant consumer of power [1]–[3]. To avoid idle listen<strong>in</strong>g<br />
and to conserve energy, many WANETs employ the uncoord<strong>in</strong>ated<br />
duty-cycled approach, <strong>in</strong> which each node periodically<br />
switches between the active and the sleep mode (see Fig. 1)<br />
[3]–[8]. Nodes perform computation or data transmission <strong>in</strong><br />
the active mode and then turn to sleep mode to save energy.<br />
The active period of each node dur<strong>in</strong>g the schedul<strong>in</strong>g period<br />
is <strong>in</strong>dependently determ<strong>in</strong>ed, without coord<strong>in</strong>ation with other<br />
Manuscript received January 23, 2009; revised May 24, 2009. First published<br />
August 18, 2009; current version published January 20, 2010. This work was<br />
supported <strong>in</strong> part by the Hong Kong Research Grant Council under Competitive<br />
Earmarked Research Grant PolyU 5102/07E; the Hong Kong Polytechnic<br />
University under the Interdiscipl<strong>in</strong>ary/Collaborative Research Grant G-YF61;<br />
the National Natural Science Foundation of Ch<strong>in</strong>a under Grant 90718031,<br />
Grant 60721002, and Grant 60803111; and the 973 Program under Grant<br />
2009CB320705. The review of this paper was coord<strong>in</strong>ated by Prof. J. Li.<br />
J. Hong, W. Li, S. Lu, and D. Chen are with Nanj<strong>in</strong>g University, Nanj<strong>in</strong>g<br />
210093, Ch<strong>in</strong>a (e-mail: jhong@dislab.nju.edu.cn; lwz@nju.edu.cn; sanglu@<br />
nju.edu.cn; cdx@nju.edu.cn).<br />
J. Cao is with the Department of Comput<strong>in</strong>g, Hong Kong Polytechnic<br />
University, Kowloon, Hong Kong (e-mail: csjcao@comp.polyu.edu.hk).<br />
Digital Object Identifier 10.1109/TVT.2009.2030203<br />
0018-9545/$26.00 © 2009 <strong>IEEE</strong><br />
Fig. 1. Example of periodical wakeup of node v.<br />
nodes; thus, no additional communication is needed. As a<br />
simple and efficient paradigm, the uncoord<strong>in</strong>ated duty-cycled<br />
WANET is widely used <strong>in</strong> variant applications, e.g., long-term<br />
wildlife surveillance, structure health monitor<strong>in</strong>g, and object<br />
track<strong>in</strong>g <strong>in</strong> wireless sensor networks [6], [9]–[11].<br />
<strong>Broadcast</strong> is a fundamental operation <strong>in</strong> WANETs for rout<strong>in</strong>g<br />
discovery, <strong>in</strong>formation dissem<strong>in</strong>ation, etc. [12]. <strong>Broadcast</strong> <strong>in</strong><br />
WANETs is quite different from that <strong>in</strong> traditional wired networks,<br />
<strong>in</strong> particular, due to the broadcast nature of the wireless<br />
medium; when a node sends a packet, all of its neighbors will<br />
receive the packet. Therefore, the total number of transmissions<br />
is generally used as the cost criterion for broadcast<strong>in</strong>g. A<br />
straightforward approach for broadcast is bl<strong>in</strong>d flood<strong>in</strong>g, <strong>in</strong><br />
which each node is obligated to retransmit a packet upon receiv<strong>in</strong>g<br />
it for the first time. Bl<strong>in</strong>d flood<strong>in</strong>g always leads to massive<br />
redundant transmission and dra<strong>in</strong>s out the energy fast [12].<br />
To reduce redundant transmission, plenty of work [13]–[20]<br />
has been devoted to solve the m<strong>in</strong>imum-transmission broadcast<br />
(MTB) problem. The MTB problem <strong>in</strong> WANETs is equivalent<br />
to f<strong>in</strong>d<strong>in</strong>g the m<strong>in</strong>imum number of forward<strong>in</strong>g nodes, which can<br />
be modeled as the NP-hard m<strong>in</strong>imum connected dom<strong>in</strong>at<strong>in</strong>g set<br />
(MCDS) problem [13], [21], [22].<br />
In this paper, we focus on the MTB problem <strong>in</strong> uncoord<strong>in</strong>ated<br />
duty-cycled WANETs, which makes the problem quite different<br />
from the schemes <strong>in</strong> conventional WANETs. In conventional<br />
broadcast, a node can cover all its neighbors by one transmission.<br />
The number of total transmissions is equal to the number<br />
of forward<strong>in</strong>g nodes. Thus, the MTB problem can be solved by<br />
f<strong>in</strong>d<strong>in</strong>g the m<strong>in</strong>imum forward<strong>in</strong>g node set. With uncoord<strong>in</strong>ated<br />
sleep schedule, each node can only receive packets when it is<br />
active; therefore, not all neighbors of a node can receive the<br />
broadcast packet by one transmission. Therefore, the number<br />
of transmissions is no longer equal to the number of forward<strong>in</strong>g<br />
nodes. This difference renders the exist<strong>in</strong>g MTB solutions <strong>in</strong><br />
conventional WANETs not suitable <strong>in</strong> the duty-cycled scenario.<br />
We need to consider both the forward<strong>in</strong>g nodes and their sleep<br />
schedules while m<strong>in</strong>imiz<strong>in</strong>g the number of transmissions <strong>in</strong><br />
uncoord<strong>in</strong>ated duty-cycled WANETs.
308 <strong>IEEE</strong> TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010<br />
A. Related Work<br />
Data-transmission issues <strong>in</strong> duty-cycled WANETs have recently<br />
attracted much of researchers’ attention. Dousse et al. [7]<br />
established a bound on the transmission latency of sensor<br />
networks with uncoord<strong>in</strong>ated schedule. Lu et al. proved the<br />
NP-hardness of m<strong>in</strong>imiz<strong>in</strong>g end-to-end communication delay<br />
<strong>in</strong> low-duty-cycle sensor networks <strong>in</strong> [23]. Cao et al. proposed<br />
the pipel<strong>in</strong>e forward<strong>in</strong>g pattern for sensor networks with a<br />
sleep<strong>in</strong>g schedule to decrease the delay [24]. Keshavarzian et al.<br />
analyzed the delay of several known wake-up patterns and<br />
proposed a new multiparent schedul<strong>in</strong>g pattern for sensor networks<br />
<strong>in</strong> [25]. Gu and He proposed a dynamic data forward<strong>in</strong>g<br />
scheme for extremely low-duty-cycle sensor networks based on<br />
the expected latency and reliability model [26]. However, these<br />
works ma<strong>in</strong>ly focus on the latency issue caused by the sleep<br />
schedule, and none of them refer to the broadcast problem.<br />
Much effort has been made to m<strong>in</strong>imize the number of<br />
transmissions of broadcast <strong>in</strong> conventional WANETs. These<br />
works can ma<strong>in</strong>ly be classified <strong>in</strong>to tree- and MCDS-based<br />
schemes. Chlamtac and Kutten proved that the MTB problem<br />
is NP-hard and proposed to reduce the broadcast redundancy<br />
us<strong>in</strong>g the tree-based scheme [13]. In [15]–[17], the authors<br />
<strong>in</strong>troduced the MCDS-based scheme and proposed a virtual<br />
backbone-based broadcast. Lou and Wu [14] improved the<br />
Dom<strong>in</strong>ant Prun<strong>in</strong>g scheme by utiliz<strong>in</strong>g two-hop neighborhood<br />
<strong>in</strong>formation to reduce transmission. Localized algorithms based<br />
on the multipo<strong>in</strong>t relay (MPR) scheme (e.g., MPR, extended<br />
MPR, and extended source-<strong>in</strong>dependent MPR) have been designed,<br />
whose local approximation ratios are logarithmic or<br />
constant [18], [20], [27]. Wu and Lou proposed the quasi-local<br />
forward-node-set-based scheme <strong>in</strong> [19], which outperforms the<br />
MPR and dom<strong>in</strong>ant prun<strong>in</strong>g schemes. As the core of solutions<br />
to the MTB problem, extensive work has been done to f<strong>in</strong>d a<br />
good approximation of MCDS <strong>in</strong> terms of small approximation<br />
ratio and to design distributed algorithms <strong>in</strong> WANETs. Das and<br />
Bharghavan proposed a distributed algorithm <strong>in</strong> [16] based on<br />
the work of Guha and Khuller [28], which has an approximation<br />
ratio of 3H(Δ). The approximation ratio of the node-prun<strong>in</strong>g<br />
scheme proposed <strong>in</strong> [17] is n/2. Wanet al. proposed an eightapproximation<br />
distributed algorithm <strong>in</strong> [29]. Li et al. improved<br />
the approximation ratio to 4.8+ln5[30]. Recently, Wan et al.<br />
further improved the approximation ratio to 6.8 with a twophase<br />
approach [31]. However, all these approaches are based<br />
on the broadcast nature of the wireless medium and thus are not<br />
suitable for duty-cycled WANETs.<br />
Recently, some research work has emerged, explor<strong>in</strong>g the<br />
broadcast problem <strong>in</strong> duty-cycled WANETs. Miller et al. proposed<br />
a probability-based broadcast approach on the mediumaccess<br />
control (MAC) layer, which can be <strong>in</strong>tegrated <strong>in</strong>to<br />
any sleep-schedul<strong>in</strong>g protocol <strong>in</strong> [32]. However, they did not<br />
focus on network-wide <strong>in</strong>teractions. Wang and Liu first def<strong>in</strong>ed<br />
the duty-cycle-aware broadcast problem and then proposed a<br />
centralized optimal solution and a distributed heuristic solution<br />
based on the dynamic programm<strong>in</strong>g approach <strong>in</strong> [33]. Different<br />
from the two works, <strong>in</strong> this paper, we specifically address the<br />
MTB problem <strong>in</strong> duty-cycled WANETs, provid<strong>in</strong>g theoretical<br />
analysis of its hardness and propos<strong>in</strong>g provable solutions.<br />
B. Our Contributions<br />
In uncoord<strong>in</strong>ated duty-cycled WANETs, the number of total<br />
transmissions <strong>in</strong> broadcast depends on not only the number<br />
of forward<strong>in</strong>g nodes but also their sleep schedules. These two<br />
issues should be addressed together when formulat<strong>in</strong>g the MTB<br />
problem <strong>in</strong> uncoord<strong>in</strong>ated duty-cycled WANETs. Based on exist<strong>in</strong>g<br />
broadcast<strong>in</strong>g approaches used <strong>in</strong> conventional WANETs,<br />
two modified schemes, i.e., the modified tree-based and modified<br />
MCDS-based schemes, can be implemented for the MTB<br />
problem <strong>in</strong> duty-cycled WANETs. However, we show that both<br />
schemes have l<strong>in</strong>ear approximation ratios and thus cannot guarantee<br />
to generate solutions with a small number of transmissions.<br />
Therefore, we proposed a novel set cover approximation<br />
scheme and, based on this scheme, designed a centralized<br />
algorithm and a distributed algorithm that can efficiently solve<br />
the MTB <strong>in</strong> uncoord<strong>in</strong>ated duty-cycled WANETs.<br />
We make four contributions <strong>in</strong> this paper.<br />
1) We formulate the MTB problem <strong>in</strong> uncoord<strong>in</strong>ated dutycycled<br />
WANETs (MTB-UD problem) and prove its NPhardness.<br />
This implies that there are no efficient broadcast<br />
algorithms to m<strong>in</strong>imize the number of transmissions of<br />
broadcast <strong>in</strong> uncoord<strong>in</strong>ated duty-cycled WANETs, unless<br />
P = NP.<br />
2) We show that modifications <strong>in</strong> exist<strong>in</strong>g broadcast<strong>in</strong>g approaches<br />
for the MTB-UD problem cannot guarantee the<br />
provision of good solutions and then propose the setcover-based<br />
approximation (SCA) scheme as a better<br />
solution.<br />
3) We propose a centralized SCA (CSCA) algorithm with<br />
3(ln Δ + 1)-approximation ratio and O(n3 ) time complexity<br />
(Δ is the maximum degree of the network).<br />
4) We propose a distributed SCA (DSCA) algorithm with<br />
a constant approximation ratio and both l<strong>in</strong>ear time and<br />
message complexities.<br />
The rest of this paper is organized as follows: Section II<br />
<strong>in</strong>troduces the network model, assumptions, and problem<br />
formulation. In Section III, we present and analyze two modifications<br />
of exist<strong>in</strong>g broadcast<strong>in</strong>g approaches, i.e., the modified<br />
tree-based and modified MCDS-based schemes. A novel<br />
SCA scheme is proposed <strong>in</strong> Section IV, and based on it, we<br />
devise a centralized algorithm and a distributed algorithm. In<br />
Section V, we evaluate the performance of the proposed algorithms<br />
by theoretical analyses and simulations. We briefly<br />
discuss some related issues of the broadcast problem for dutycycled<br />
WANETs <strong>in</strong> Section VI and conclude this paper <strong>in</strong><br />
Section VII.<br />
II. PRELIMINARIES<br />
Before giv<strong>in</strong>g the formal statement of the MTB problem <strong>in</strong><br />
duty-cycled WANETs, we first present the network model and<br />
assumptions.<br />
A. Network Model and Assumptions<br />
Table I summarizes the most frequently used notations <strong>in</strong> this<br />
paper. Let V be the set of nodes of a WANET; we assume that
HONG et al.: MTB IN UNCOORDINATED DUTY-CYCLED WANETs 309<br />
TABLE I<br />
NOTATIONS<br />
n = |V | nodes are distributed <strong>in</strong> a 2-D plane and have equal<br />
maximum transmitt<strong>in</strong>g ranges of one unit. The topology of the<br />
network is modeled as a connected UDGG(V,E). An edge<br />
{u, v} ∈E iff the distance between nodes u and v is with<strong>in</strong><br />
each other’s communication range. Each node is assigned a<br />
unique ID.<br />
Unlike literature focus<strong>in</strong>g on tun<strong>in</strong>g the sleep schedule<br />
[23]–[25], we follow the assumption for uncoord<strong>in</strong>ated dutycycled<br />
WANETs <strong>in</strong> [7] and [26], where each node determ<strong>in</strong>es<br />
its sleep schedule to be completely uncoord<strong>in</strong>ated. We assume<br />
that the schedule period T is divided <strong>in</strong>to |T | time slots with<br />
fixed and equal lengths, which are denoted by 1, 2,...,|T |<br />
accord<strong>in</strong>gly. Follow<strong>in</strong>g a very common sett<strong>in</strong>g, we assume<br />
that each node randomly chooses an active time slot i ∈ T<br />
<strong>in</strong>dependently. Each time slot is assumed to be long enough<br />
for send<strong>in</strong>g or receiv<strong>in</strong>g one data packet. The channel contention<br />
and collision avoidance are handled by underly<strong>in</strong>g MAC<br />
protocols, such as S-MAC [1]. Thus, we do not consider the<br />
collision issue <strong>in</strong> this paper. Each node becomes active at a<br />
specific time slot, which is denoted as SLa(v). Follow<strong>in</strong>g the<br />
sett<strong>in</strong>gs <strong>in</strong> [26], a node can wake up and transmit a packet at<br />
any time slot but can receive packets only at its active time<br />
slot. We denote the send<strong>in</strong>g time-slot set of node v by SLs(v).<br />
The global time synchronization is achieved by protocols such<br />
as the Flood<strong>in</strong>g Time Synchronization Protocol [34] <strong>in</strong> this<br />
paper.<br />
B. Problem Formulation<br />
We consider the s<strong>in</strong>gle-source broadcast session, <strong>in</strong> which a<br />
predef<strong>in</strong>ed source node s broadcasts the data packets to all other<br />
nodes. A broadcast backbone B(G) on G(V,E) is def<strong>in</strong>ed as<br />
a set of forward<strong>in</strong>g nodes of V . Data packets are conveyed<br />
along the broadcast backbone to all nodes <strong>in</strong> the network. Let<br />
a pair (u, SLs(u)) <strong>in</strong>dicate that node u transmits at time slots<br />
<strong>in</strong> SLs(u). We def<strong>in</strong>e a broadcast schedule on a backbone B<br />
as BS(B), which can be expressed as a series of pairs, i.e.,<br />
(u, SLs(u)) (u ∈ B).<br />
An example of the MTB problem <strong>in</strong> uncoord<strong>in</strong>ated dutycycled<br />
WANETs is shown <strong>in</strong> Fig. 2, which demonstrates<br />
a WANET with two different time slots. The objective of<br />
the conventional MTB problem is to f<strong>in</strong>d the MCDS for<br />
G, e.g., {s, v, x} or {s, w, y} <strong>in</strong> this example. Without consider<strong>in</strong>g<br />
the broadcast schedule, both solutions are regarded<br />
as equivalent and have the number of total transmissions<br />
equal to three. However, the broadcast backbone of {s, v, x}<br />
Fig. 2. Uncoord<strong>in</strong>ated duty-cycled WANET with a schedule period of<br />
length two.<br />
needs at least four transmissions to cover all nodes with the<br />
schedule of {(s, {2}), (v, {1, 2}), (x, {2})}, whereas the other<br />
broadcast backbone {s, w, y} with the broadcast schedule of<br />
{(s, {1}), (w, {2}), (y, {1})} needs only three transmissions to<br />
cover all nodes.<br />
This <strong>in</strong>stance reveals that the number of total transmissions<br />
<strong>in</strong> a broadcast session <strong>in</strong> uncoord<strong>in</strong>ated duty-cycled WANETs<br />
depends on not only the broadcast backbone but the correspond<strong>in</strong>g<br />
broadcast schedule as well. Therefore, the def<strong>in</strong>ition and<br />
the solutions of the conventional MTB problem are no longer<br />
suitable <strong>in</strong> this case.<br />
Based on the aforementioned model, we reformulate the<br />
MTB problem <strong>in</strong> uncoord<strong>in</strong>ated duty-cycled WANETs as<br />
follows:<br />
Def<strong>in</strong>ition 1—MTB-UD Problem: Given a WANET<br />
G(V,E), f<strong>in</strong>d a broadcast backbone B(G) and a broadcast<br />
schedule BS(B) so that the total transmission <br />
v∈B |SLs(v)|<br />
is m<strong>in</strong>imized.<br />
Theorem 1: The MTB-UD Problem is NP-Hard:<br />
Proof: It has been proven that the MCDS problem is<br />
NP-hard <strong>in</strong> both general and unit disk graphs [21], [22]. We<br />
prove the NP-hardness of the MTB-UD problem by show<strong>in</strong>g<br />
that the MCDS problem can be mapped to one of its special<br />
cases. Consider a special case of the MTB-UD problem where<br />
|T | =1, i.e., the length of the schedul<strong>in</strong>g period is only one<br />
time slot. Thus, all nodes <strong>in</strong> the network wake up at the same<br />
active time slot. In this case, the solution of the problem is<br />
an MCDS of the graph, which is exactly the MCDS problem.<br />
Hence, the MTB-UD problem is NP-hard. <br />
We conclude this section by present<strong>in</strong>g two useful<br />
def<strong>in</strong>itions.<br />
Def<strong>in</strong>ition 2—Independent Set (IS): An IS of a graph G is a<br />
set of vertices <strong>in</strong> G, no two of which are adjacent.<br />
Def<strong>in</strong>ition 3—Set Cover: Given a set U and a family S of<br />
subsets of U, a set cover is a subfamily C ⊆ S of sets, whose<br />
union is U.<br />
Accord<strong>in</strong>gly, the <strong>M<strong>in</strong>imum</strong> Set Cover problem is to f<strong>in</strong>d the<br />
m<strong>in</strong>imum set cover C for U, which is NP-hard [21].<br />
III. MODIFIED TREE- AND MCDS-BASED SCHEMES<br />
FOR THE MTB-UD PROBLEM<br />
As mentioned before, conventional broadcast algorithms<br />
have not considered the sleep-schedule issue and, thus, are not<br />
suitable for duty-cycled WANETs. In this section, based on
310 <strong>IEEE</strong> TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010<br />
Fig. 3. Special case of duty-cycled WANET, <strong>in</strong> which all nodes with active<br />
time slot i are connected to node vi−1. (Nodes with active time slot 1 are<br />
connected to s.)<br />
modification of exist<strong>in</strong>g solutions for broadcast <strong>in</strong> conventional<br />
WANETs, we present two broadcast schemes for the MTB-UD<br />
problem. The two schemes are called the modified tree-based<br />
scheme and the modified MCDS-based scheme. However, as<br />
we will show later, these two schemes cannot produce quality<br />
solutions, because they do not explore the characteristics of<br />
transmission <strong>in</strong> uncoord<strong>in</strong>ated duty-cycled WANETs.<br />
A. Modified Tree-Based Scheme<br />
The modified tree-based scheme orig<strong>in</strong>ated from the wellknown<br />
basic tree-based broadcast for conventional WANETs<br />
[35]. The basic tree-based broadcast can be stated as follows:<br />
Generate a spann<strong>in</strong>g tree of the network G rooted <strong>in</strong> the<br />
source node s; the broadcast will f<strong>in</strong>ish while each node on<br />
this tree sends packets to all its children one by one. Obviously,<br />
this scheme can be utilized for solv<strong>in</strong>g the MTB-UD<br />
problem with m<strong>in</strong>or modification, i.e., each transmission is<br />
scheduled at the active time slot of the receiver. The number<br />
of total transmissions of the modified tree-based scheme is<br />
exactly n − 1.<br />
Next, we show the approximation ratio of the modified<br />
tree-based scheme. Consider the case <strong>in</strong> Fig. 3, <strong>in</strong> which all<br />
nodes with active time slot i(i ∈ T ) are the children of the<br />
root s or node vi−1. In this case, the m<strong>in</strong>imum number of total<br />
transmissions of broadcast is |T ′ |(T ′ = <br />
v∈V SLa(v)), which<br />
is a trivial lower bound of the number of total transmissions.<br />
The correspond<strong>in</strong>g broadcast backbone is {s, v1,...,v |T ′ |−1},<br />
and the broadcast schedule is {(s, {1}), (v1, {2}),...,<br />
(v |T ′ |−1, |T ′ |)}. Meanwhile, the modified tree-based scheme<br />
generates a solution of n − 1 transmissions. The follow<strong>in</strong>g<br />
theorem shows the approximation ratio.<br />
Theorem 2: The approximation ratio of the modified treebased<br />
scheme is n − 1/|T ′ |.<br />
Proof: Based on the preced<strong>in</strong>g discussion, this theorem<br />
straightforwardly holds. <br />
All the children nodes with identical active time slots of the<br />
same parent node can receive the packet by one transmission.<br />
Thus, the number of total transmissions can further be reduced<br />
if each parent node transmits accord<strong>in</strong>g to the active time slots<br />
of its children. In this case, the number of total transmissions<br />
depends on the shape of the broadcast tree and the sleep<br />
schedule of each node. This improv<strong>in</strong>g issue is employed <strong>in</strong><br />
the follow<strong>in</strong>g modified MCDS-based scheme.<br />
B. Modified MCDS-Based Scheme<br />
The solutions to the conventional MTB problem are to f<strong>in</strong>d an<br />
MCDS <strong>in</strong> the WANETs. In addition, with m<strong>in</strong>or modification,<br />
we derive the modified MCDS-based scheme for the MTB-UD<br />
problem. Denote by T (v) the set of active time slots of nodes <strong>in</strong><br />
Disk(v). The modified MCDS-based scheme can be stated as<br />
follows: F<strong>in</strong>d an MCDS of the WANET; then, for each node v<br />
<strong>in</strong> the MCDS, transmit at time slots <strong>in</strong> T (v). In the modified<br />
MCDS-based scheme, nodes with identical active time slots<br />
<strong>in</strong> Disk(v) can receive the packet by only one transmission<br />
from node v, whereas, <strong>in</strong> the tree-based scheme, they can<br />
only receive the packet one by one. Theorem 3 derives the<br />
approximation ratio of the modified MCDS-based scheme.<br />
Theorem 3: The approximation ratio of the MCDS-based<br />
scheme is m<strong>in</strong>(Δ, |T |).<br />
Proof: Denote the size of the MCDS by #MCDS, which<br />
is another trivial lower bound of the number of total transmissions.<br />
Denot<strong>in</strong>g the number of transmissions <strong>in</strong> the optimal<br />
solution to the MTB-UD problem by OPT, wehaveOPT <br />
#MCDS. In the modified MCDS-based scheme, each node v<br />
<strong>in</strong> the MCDS transmits |T (v)| times. Thus, the number of total<br />
transmissions <strong>in</strong> the modified MCDS-based scheme is<br />
<br />
|T (v)| max (|T (v)|)#MCDS<br />
v∈MCDS<br />
v∈MCDS<br />
m<strong>in</strong> (Δ, |T |)OPT.<br />
However, to f<strong>in</strong>d the MCDS of a WANET is an NP-hard<br />
problem, and only suboptimal solutions are available. Therefore,<br />
the actual approximation ratio of the algorithms derived<br />
from the modified MCDS-based scheme is β m<strong>in</strong>(Δ, |T |),<br />
where β is the approximation ratio of the size of the MCDS.<br />
In summary, the modified tree-based scheme is simple to<br />
implement but may perform poorly <strong>in</strong> a large-scale network<br />
for the O(n) approximation ratio. The modified MCDS-based<br />
scheme may perform poorly <strong>in</strong> networks with high density or a<br />
long schedule period for the max(Δ, |T |) approximation ratio.<br />
It also holds that max(Δ, |T |) ∈ O(n), because Δ ∈ O(n).<br />
Although the two schemes are straightforward, they neither<br />
explore the characteristic of duty-cycled WANETs nor provide<br />
a reasonable solution to the MTB-UD problem.<br />
IV. PROPOSED SET-COVER-BASED SOLUTIONS<br />
FOR MTB-UD PROBLEM<br />
In this section, we present the design of our SCA scheme.<br />
Based on this scheme, a centralized and a distributed algorithm<br />
are proposed.<br />
A. SCA Scheme<br />
In uncoord<strong>in</strong>ated duty-cycled WANETs, the transmission at<br />
time slot i does not affect the transmission at time slot j if<br />
i = j. This implies that we can decrease the total transmission
HONG et al.: MTB IN UNCOORDINATED DUTY-CYCLED WANETs 311<br />
by m<strong>in</strong>imiz<strong>in</strong>g the transmission on each set of nodes with identical<br />
active time slots. Our proposed SCA scheme is designed<br />
based on this fact.<br />
S<strong>in</strong>ce the network can be modeled as a UDG, for each<br />
node v ∈ V , we denote Covi(v) as the set of the nodes<br />
<strong>in</strong> Disk(v) with active time slot i, i.e., Covi(v) ={u|u ∈<br />
Disk(v) ∧ SLa(u) =i}. It is obvious that all the nodes <strong>in</strong><br />
Covi(v) will receive the packet by one transmission from node<br />
v at time slot i. The nodes <strong>in</strong> Covi(v) are said to be covered<br />
by node v, and v is called a cover<strong>in</strong>g node. The SCA scheme<br />
consists of two phases.<br />
1) Phase I (F<strong>in</strong>d the m<strong>in</strong>imum cover<strong>in</strong>g node set.): Group<br />
all nodes with active time slot i <strong>in</strong> the WANET G(V,E)<br />
<strong>in</strong>to sets Ui(i ∈ T ), and then try to f<strong>in</strong>d a m<strong>in</strong>imum<br />
cover<strong>in</strong>g node set Ci <br />
for each Ui, respectively, such that<br />
v∈Ci Covi(v) =Ui;<br />
2) Phase II (Construct the backbone.): Establish a backbone<br />
consist<strong>in</strong>g of all the cover<strong>in</strong>g nodes <strong>in</strong> <br />
i∈T Ci, source<br />
node s, and some <strong>in</strong>termediate connectors.<br />
Phase I actually f<strong>in</strong>ds the m<strong>in</strong>imum set cover {Covi(v)}<br />
for Ui. The broadcast schedule can be obta<strong>in</strong>ed dur<strong>in</strong>g the<br />
two phases. The SCA scheme also establishes another lower<br />
bound on the number of total transmissions: Given a WANET of<br />
G(V,E) and the schedul<strong>in</strong>g period T , denot<strong>in</strong>g the number of<br />
transmissions <strong>in</strong> the optimal solution to the MTB-UD problem<br />
by OPT,wehave<br />
OPT <br />
m<strong>in</strong> |Ci|. (1)<br />
i∈T<br />
Based on the SCA scheme, we can design various algorithms<br />
with different implementations of the two phases. Here, we<br />
propose a CSCA algorithm and a DSCA algorithm to solve the<br />
problem.<br />
B. CSCA Algorithm<br />
Follow<strong>in</strong>g the SCA scheme, the CSCA consists of two<br />
phases. Among various centralized algorithms for the m<strong>in</strong>imum<br />
set cover problem, the simple greedy strategy is the most frequently<br />
used, because it provides a logarithmic approximation<br />
ratio with a lower time complexity of O(n2 ), compared with<br />
the others. Therefore, we implement phase I of the CSCA<br />
us<strong>in</strong>g the greedy strategy. In phase II of the CSCA, we construct<br />
the backbone based on the traversal of G, which is a<br />
common algorithm for generat<strong>in</strong>g spann<strong>in</strong>g trees. The detailed<br />
algorithm is described as follows. The pseudo code is shown <strong>in</strong><br />
Algorithm 1.<br />
1) Phase I—F<strong>in</strong>d the <strong>M<strong>in</strong>imum</strong> Cover<strong>in</strong>g Node Set: In this<br />
phase, we try to f<strong>in</strong>d the m<strong>in</strong>imum Ci for each Ui us<strong>in</strong>g<br />
the greedy strategy. The greedy algorithm from [36] yields a<br />
solution with the approximation ratio of ln d +1, where d is the<br />
maximum size of Covi(v). The greedy algorithm for f<strong>in</strong>d<strong>in</strong>g the<br />
m<strong>in</strong>imum cover<strong>in</strong>g node set Ci is briefly described here.<br />
Step 1) Ci ←∅, J ← V , and I ← Ui.<br />
Step 2) Select a node v = arg maxv∈J |Covi(v)|.<br />
Step 3) Ci ← Ci ∪{v}, J ← J \{v}, and I ← I \<br />
Covi(v).<br />
Step 4) If I = ∅, stop, and output Ci. Else, go to Step 2.<br />
Algorithm 1. CSCA Algorithm<br />
For each v ∈ Ci, we ma<strong>in</strong>ta<strong>in</strong> a set SLb(v) conta<strong>in</strong><strong>in</strong>g the<br />
time slot i. The existence of i <strong>in</strong> SLb(v) <strong>in</strong>dicates that node v<br />
is a cover<strong>in</strong>g node for Ui.<br />
2) Phase II—Construct the Backbone: To construct the<br />
broadcast backbone, we connect all nodes <strong>in</strong> <br />
i∈T Ci to the<br />
source node s. The backbone can be extracted dur<strong>in</strong>g the formation<br />
of a spann<strong>in</strong>g tree Tbcast on G. Initially, Tbcast is set to<br />
{s}, and a work<strong>in</strong>g set Temp is set to <br />
i∈T Ci. The process<br />
given here is executed.<br />
1) Traverse all elements <strong>in</strong> Temp, and pick the first-found<br />
Covi(v) satisfy<strong>in</strong>g one of the four conditions <strong>in</strong> Fig. 4.<br />
The existence of Covi(v) is guaranteed by Lemma 1.<br />
2) Connect all nodes <strong>in</strong> Covi(v) to v, and then, connect v to<br />
Tbcast, consider<strong>in</strong>g the four cases <strong>in</strong> Fig. 4.<br />
Case 1. v is <strong>in</strong> Tbcast: No operation is needed.<br />
Case 2. v is adjacent to some node u <strong>in</strong> Tbcast: Connect<br />
u to v.<br />
Case 3. There exists a node x <strong>in</strong> Covi(v) ∩ Tbcast:<br />
Connect x to v.<br />
Case 4. There exists a node x <strong>in</strong> Covi(v) that is adjacent<br />
to some node u <strong>in</strong> Tbcast: Connect x to u.<br />
3) If all Covi(v) (i∈ T ) related to node v have been<br />
processed, remove v from Temp.<br />
4) Repeat Steps 1)–3) until Temp = ∅.<br />
Eventually, the source node s, all nodes v <strong>in</strong> <br />
i∈T Ci, and<br />
all the connectors form the backbone B, and the pair series<br />
(v, SLs(v))(v ∈ B) form the BS(B).<br />
In the rema<strong>in</strong><strong>in</strong>g part of this section, we provide theoretical<br />
analysis of the performance of the CSCA algorithm <strong>in</strong> terms
312 <strong>IEEE</strong> TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010<br />
Fig. 4. Four cases of connect<strong>in</strong>g a Covi(v) to the exist<strong>in</strong>g Tbcast through v.<br />
Black nodes are connectors.<br />
of the number of transmissions and time complexity. We first<br />
present an importance property of the CSCA algorithm.<br />
Lemma 1: All nodes <strong>in</strong> the Covi(v) found <strong>in</strong> each iteration<br />
of the backbone-construct<strong>in</strong>g phase can be covered from the<br />
exist<strong>in</strong>g Tbcast by no more than three transmissions.<br />
Proof: After phase I of the CSCA algorithm, each node is<br />
a cover<strong>in</strong>g node <strong>in</strong> <br />
i∈T Ci, is covered by some node, or both.<br />
The connectedness of G guarantees that we can f<strong>in</strong>d a Covi(v)<br />
satisfy<strong>in</strong>g one of the four cases demonstrated <strong>in</strong> Fig. 4. All<br />
nodes <strong>in</strong> the Covi(v) can be connected to the exist<strong>in</strong>g Tbcast,<br />
as shown <strong>in</strong> Fig. 4. The number of transmissions <strong>in</strong> each case<br />
can be calculated as given here.<br />
1) Case 1: Node v is <strong>in</strong> the exist<strong>in</strong>g Tbcast; thus, all nodes<br />
<strong>in</strong> Covi(v) can be covered by one transmission of v →<br />
Covi(v).<br />
2) Case 2: Node v is adjacent to some node u <strong>in</strong> the exist<strong>in</strong>g<br />
Tbcast. Hence, two transmissions of {u → v, v →<br />
Covi(v)} cover all nodes <strong>in</strong> Covi(v).<br />
3) Case 3: Some node x ∈ Covi(v) is also <strong>in</strong> Tbcast. Note<br />
that x is adjacent to v. Similar to Case 2, two transmissions<br />
of {x → v, v → Covi(v)} cover all nodes <strong>in</strong><br />
Covi(v).<br />
4) Case 4: A node x ∈ Covi(v) is adjacent to some node<br />
u <strong>in</strong> Tbcast. In this case, three transmissions of {u →<br />
x, x → v, v → Covi(v)} cover all nodes <strong>in</strong> Covi(v).<br />
The summary of the four aforementioned cases yields this<br />
lemma. <br />
Us<strong>in</strong>g Lemma 1, Theorem 4 gives the approximation ratio of<br />
the CSCA algorithm.<br />
Theorem 4: The approximation ratio of the CSCA algorithm<br />
is 3(ln Δ + 1).<br />
Proof: Let OPT denote the m<strong>in</strong>imum number of transmissions<br />
<strong>in</strong> a broadcast session on G and OPTi denote the<br />
m<strong>in</strong>imum size of Ci for all nodes <strong>in</strong> Ui. Accord<strong>in</strong>g to (1),<br />
we have<br />
OPT <br />
OPTi.<br />
i∈T<br />
Denot<strong>in</strong>g the number of total transmissions of the CSCA<br />
algorithm by M, accord<strong>in</strong>g to Lemma 1, we have<br />
M 3 |{Covi(v)|i ∈ T,v ∈ Ci}| =3 <br />
|Ci|.<br />
Each Ci is greedily chosen; thus<br />
i∈T<br />
|Ci| (ln (max(|Covi(v)|)) + 1)OPTi.<br />
Hence<br />
M 3 <br />
|Ci| 3 <br />
(ln (max (|Covi(v)|)) + 1) OPTi<br />
i∈T<br />
i∈T<br />
3(ln Δ + 1) <br />
OPTi 3(ln Δ + 1)OPT. (2)<br />
i∈T<br />
This f<strong>in</strong>ishes our proof. <br />
Theorem 5 gives the time complexity of the CSCA algorithm.<br />
Theorem 5: The time complexity of the CSCA algorithm<br />
is O(n 3 ).<br />
Proof: The time complexity of the greedy set-cover<strong>in</strong>g<br />
algorithm is O(n 2 ). This algorithm runs |T | times <strong>in</strong> total <strong>in</strong><br />
the CSCA algorithm and has O(n 2 |T |) time complexity. The<br />
backbone construction costs n 3 +1/2 comparisons <strong>in</strong> the worst<br />
case and thus has O(n 3 ) time complexity. Therefore, the total<br />
time complexity is O(n 3 + n 2 |T |). It is obvious that backbone<br />
construction dom<strong>in</strong>ates the time complexity. |T | is known as a<br />
constant. Hence, the time complexity of the algorithm is O(n 3 ).<br />
C. DSCA Algorithm<br />
Follow<strong>in</strong>g the SCA scheme, the DSCA algorithm also consists<br />
of two phases. In phase I of the DSCA, the cover<strong>in</strong>g node<br />
set for each Ui is found with a distributed election process. In<br />
phase II of the DSCA, the backbone connect<strong>in</strong>g all cover<strong>in</strong>g<br />
nodes and the source s is constructed <strong>in</strong> a distributed manner<br />
us<strong>in</strong>g message pass<strong>in</strong>g. These two common distributed algorithms<br />
<strong>in</strong> the two phases provide good results with both l<strong>in</strong>ear<br />
time and message complexity. In DSCA, we assume that all<br />
nodes are <strong>in</strong>itially <strong>in</strong> idle listen<strong>in</strong>g state and turn to duty-cycl<strong>in</strong>g<br />
mode when the trigger z is set from 0 to 1. For convenience of<br />
description, we present some def<strong>in</strong>itions first.<br />
Def<strong>in</strong>ition 4 (i-Dom<strong>in</strong>ator): An i-dom<strong>in</strong>ator is a cover<strong>in</strong>g<br />
node for Ui (i ∈ T ).<br />
Def<strong>in</strong>ition 5 (i-Dom<strong>in</strong>atee): An i-dom<strong>in</strong>atee is a node <strong>in</strong> Ui<br />
covered by some i-dom<strong>in</strong>ator (i ∈ T ).<br />
We use the term ∗-dom<strong>in</strong>ator and ∗-dom<strong>in</strong>atee to represent<br />
any i-dom<strong>in</strong>ator and i-dom<strong>in</strong>atee (i ∈ T ).<br />
1) Phase I—Elect ∗-Dom<strong>in</strong>ators: The distributed election<br />
process aims to f<strong>in</strong>d a cover<strong>in</strong>g node set for each Ui. For<br />
the convenience of distributed implementation, we elect the<br />
i-dom<strong>in</strong>ators from Ui rather than from V <strong>in</strong> the centralized<br />
algorithm. Each node acquires its two-hop neighbor <strong>in</strong>formation<br />
by exchang<strong>in</strong>g the beacon message among its one-hop<br />
neighbors. Initially, all nodes are <strong>in</strong> the white state and are
HONG et al.: MTB IN UNCOORDINATED DUTY-CYCLED WANETs 313<br />
Fig. 5. Connect<strong>in</strong>g ∗-dom<strong>in</strong>ators. Note that, <strong>in</strong> this example, i = j; thus, the<br />
two ∗-dom<strong>in</strong>ators (i-and j-) can be adjacent to each other.<br />
marked blue if they become ∗-dom<strong>in</strong>ators or ∗-dom<strong>in</strong>atees. The<br />
election process is stated as given here.<br />
1) A white node with active time slot i broadcasts the<br />
IamDom<strong>in</strong>ator (ID, i) message conta<strong>in</strong><strong>in</strong>g its ID and i<br />
to declare itself an i-dom<strong>in</strong>ator and is marked blue if it<br />
has the most white neighbor nodes with active time slot i<br />
among all its one-hop white neighbors. (Node IDs are<br />
used to break the tie.)<br />
2) A white node with active time slot i becomes an<br />
i-dom<strong>in</strong>ator and is marked blue if it has neither white<br />
neighbors with active time slot i nor i-dom<strong>in</strong>ators around<br />
(knowledge from IamDom<strong>in</strong>atee messages).<br />
3) A white node with active time slot i becomes an<br />
i-dom<strong>in</strong>atee, is marked blue upon receiv<strong>in</strong>g the<br />
IamDom<strong>in</strong>ator(∗,i) message, and broadcasts the<br />
IamDom<strong>in</strong>atee(ID, i) message.<br />
At the end of this election process, each node is a<br />
∗-dom<strong>in</strong>ator or a ∗-dom<strong>in</strong>atee, and all nodes <strong>in</strong> Ui are covered<br />
by i-dom<strong>in</strong>ators. It is obvious that all i-dom<strong>in</strong>ators form an<br />
IS. However, an i-dom<strong>in</strong>ator may be adjacent to a j-dom<strong>in</strong>ator<br />
iff i = j. All∗-dom<strong>in</strong>ators generated <strong>in</strong> the elect<strong>in</strong>g procedure<br />
have the property that any pair of complementary subsets of<br />
all ∗-dom<strong>in</strong>ators are separated by no more than three hops.<br />
This is because the election process guarantees that no white<br />
node exists when it f<strong>in</strong>ishes and no ∗-dom<strong>in</strong>atee exists with no<br />
∗-dom<strong>in</strong>ators around.<br />
2) Phase II—Connect ∗-Dom<strong>in</strong>ators: Fig. 5 shows the<br />
process of connect<strong>in</strong>g ∗-dom<strong>in</strong>ators. In this phase, a forward<strong>in</strong>g<br />
tree H connect<strong>in</strong>g all ∗-dom<strong>in</strong>ators and the broadcast source s,<br />
which is exactly the broadcast backbone, will be constructed<br />
by exchang<strong>in</strong>g the INV/JOIN messages. Each node ma<strong>in</strong>ta<strong>in</strong>s<br />
a local trigger variable z, which is <strong>in</strong>itialized to 0 and set<br />
to 1 after this node jo<strong>in</strong>s the tree. Each node also ma<strong>in</strong>ta<strong>in</strong>s<br />
asetSLs (<strong>in</strong>itialized to ∅) stor<strong>in</strong>g the send<strong>in</strong>g time slots.<br />
Any two ∗-dom<strong>in</strong>ators are at most three hops away; thus, we<br />
only need to f<strong>in</strong>d some one- and two-hop connectors. The<br />
∗-dom<strong>in</strong>ator connect<strong>in</strong>g procedure uses four types of messages.<br />
Message INV1(i) is used by an i-dom<strong>in</strong>ator to connect to other<br />
∗-dom<strong>in</strong>ators and i-dom<strong>in</strong>atees, or to f<strong>in</strong>d one-hop connectors<br />
for two-hop ∗-dom<strong>in</strong>ators. Message INV2 is used by a<br />
∗-dom<strong>in</strong>atee to connect to two-hop ∗-dom<strong>in</strong>ators or f<strong>in</strong>d twohop<br />
connectors for three-hop ∗-dom<strong>in</strong>ators. Message INV3<br />
is used by a candidate two-hop connector to f<strong>in</strong>d three-hop<br />
∗-dom<strong>in</strong>ators. Message JOIN(i) is the reply for a node with<br />
Algorithm 2. Forward<strong>in</strong>g Tree Construct<strong>in</strong>g<br />
active time slot i to jo<strong>in</strong> H. A∗-dom<strong>in</strong>atee is marked gray<br />
if it is a candidate of a one- or a two-hop connector. Each<br />
∗-dom<strong>in</strong>atee marks itself a connector if it becomes a one- or<br />
a two-hop connector.<br />
The H roots at the source node s. Ifs is an i-dom<strong>in</strong>ator, it<br />
sets z =1and then broadcasts the INV1(i) message to start the<br />
construct<strong>in</strong>g procedure. Otherwise, s sets z =1and broadcasts<br />
the INV2 message to start the construct<strong>in</strong>g procedure. All<br />
other nodes jo<strong>in</strong> H accord<strong>in</strong>g to Algorithm 2. Note that, <strong>in</strong><br />
Algorithm 2, a ∗-dom<strong>in</strong>ator and ∗-dom<strong>in</strong>atee will act as the<br />
∗-dom<strong>in</strong>ator only, rather than both. The property of phase I<br />
that any pair of complementary subsets of all ∗-dom<strong>in</strong>ators<br />
are separated by no more than three hops guarantees that,<br />
whenever there is any ∗-dom<strong>in</strong>ators outside the current H, at<br />
least one would jo<strong>in</strong> H. Eventually, all ∗-dom<strong>in</strong>ators elected<br />
<strong>in</strong> the elect<strong>in</strong>g procedure will jo<strong>in</strong> H. Consequently, all<br />
∗-dom<strong>in</strong>ators and connectors form the broadcast backbone B,<br />
and the pair series (v, SLs(v))(v ∈ B) forms the BS(B).<br />
In the rema<strong>in</strong><strong>in</strong>g part of this section, we will first analyze<br />
the approximation ratio of the DSCA algorithm and, then, the<br />
time and message complexity. Denot<strong>in</strong>g the m<strong>in</strong>imum number<br />
of total transmissions of a broadcast session on G by OPT,we<br />
have the follow<strong>in</strong>g lemma:<br />
Lemma 2: The number of ∗-dom<strong>in</strong>ators elected <strong>in</strong> the elect<strong>in</strong>g<br />
procedure is at most 5OPT.<br />
Proof: Denote all ∗-dom<strong>in</strong>ators elected <strong>in</strong> the elect<strong>in</strong>g<br />
procedure by U ′ .LetH ′ be any spann<strong>in</strong>g tree of the broadcast<br />
backbone <strong>in</strong> the optimal solution. Consider an arbitrary<br />
preorder traversal of H ′ given by v1,v2,...,v |H ′ |. The number<br />
of transmissions of a node vi <strong>in</strong> H ′ is determ<strong>in</strong>ed by SLs(vi).
314 <strong>IEEE</strong> TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010<br />
Assume that SLs(vi) ={t1,t2,...,t |SLs(vi)|}. It is obvious<br />
that OPT = <br />
′ |SLs(vi)|.<br />
vi∈H<br />
Let U ′ i denote the ∗-dom<strong>in</strong>ators <strong>in</strong> U ′ , which are adjacent<br />
to node vi but none of v1,v2,...,vi−1. Thus, all U ′ i form a<br />
partition of U ′ , and |H ′ |<br />
i=1 |U ′ i | = |U ′ |. Because all i-dom<strong>in</strong>ators<br />
form an IS, node vi can be adjacent to at most five <strong>in</strong>dependent<br />
i-dom<strong>in</strong>ators <strong>in</strong> a UDG [29]. Note that an i-dom<strong>in</strong>ator can be<br />
adjacent to other j-dom<strong>in</strong>ators when i = j. Consequently, one<br />
transmission of node vi at time slot tk covers at most five <strong>in</strong>dependent<br />
tk-dom<strong>in</strong>ators, regardless of vi be<strong>in</strong>g a ∗-dom<strong>in</strong>ator or<br />
a ∗-dom<strong>in</strong>atee. For any two adjacent nodes vi−1 and vi, it is possible<br />
that SLa(vi) ∈ SLs(vi−1), but SLa(vi−1) /∈ SLs(vi).<br />
Hence, at most 5|SLs(vi)|∗-dom<strong>in</strong>ators <strong>in</strong> U ′ can be covered<br />
by node vi us<strong>in</strong>g the transmitt<strong>in</strong>g schedule stored <strong>in</strong> SLs(vi).It<br />
means that |U ′ i | 5|SLs(vi)|. Therefore<br />
|U ′ |H<br />
| =<br />
′ | <br />
|U ′ |H<br />
i| 5<br />
′ | <br />
|SLs(vi)| =5OPT. (3)<br />
i=1<br />
i=1<br />
This f<strong>in</strong>ishes our proof. <br />
The approximation ratio of the DSCA algorithm is described<br />
<strong>in</strong> Theorem 6.<br />
Theorem 6: The approximation ratio of the DSCA algorithm<br />
is a constant of at most 20.<br />
Proof: Denote by U ′ the set of all ∗-dom<strong>in</strong>ators elected<br />
<strong>in</strong> the elect<strong>in</strong>g procedure and by M the number of total transmissions<br />
of the DSCA algorithm. To cover all ∗-dom<strong>in</strong>atees,<br />
each ∗-dom<strong>in</strong>ator needs exactly one transmission and leads to<br />
a summation of |U ′ |. By the property mentioned of DSCA that<br />
any pair of complementary subsets of all ∗-dom<strong>in</strong>ators are separated<br />
by no more than three hops, at most three transmissions<br />
are need to f<strong>in</strong>d and reach a ∗-dom<strong>in</strong>ator outside the exist<strong>in</strong>g H.<br />
If the source node s is a ∗-dom<strong>in</strong>ator, the number of transmissions<br />
for connect<strong>in</strong>g all ∗-dom<strong>in</strong>ators is at most 3(|U ′ |−1).<br />
Accord<strong>in</strong>g to Lemma 2, we have<br />
M 3(|U ′ |−1) + |U ′ |<br />
=4|U ′ |−3 20OPT − 3. (4)<br />
If the source node s is not a ∗-dom<strong>in</strong>ator, the number of<br />
transmissions for connect<strong>in</strong>g all ∗-dom<strong>in</strong>ators is at most 1+<br />
3(|U ′ |−1). Hence<br />
M 1+3(|U ′ |−1) + |U ′ |<br />
=4|U ′ |−2 20OPT − 2. (5)<br />
The theorem holds <strong>in</strong> either case. <br />
Theorem 7 gives the message and the time complexities of<br />
the DSCA algorithm.<br />
Theorem 7: Both the time and the message complexities of<br />
the DSCA algorithm are O(n) overall.<br />
Proof: In the ∗-dom<strong>in</strong>ator elect<strong>in</strong>g procedure, each node<br />
sends constant messages and takes l<strong>in</strong>ear time. In the forward<strong>in</strong>g<br />
tree-construct<strong>in</strong>g procedure, each node also sends constant<br />
messages. The backbone construct<strong>in</strong>g procedure takes at most<br />
l<strong>in</strong>ear time. Therefore, both the total message complexity and<br />
the time complexity of the DSCA algorithm are O(n). <br />
V. P ERFORMANCE EVALUATION<br />
In this section, we comparatively evaluate the performance<br />
of the modified tree-based, modified MCDS-based, and SCA<br />
schemes. We first give theoretical comparison results and the<br />
two factors affect<strong>in</strong>g the performance of SCA-based algorithms.<br />
Then, the results of the simulations, which validate the<br />
theoretical results, are discussed.<br />
A. Theoretical Comparisons<br />
Various algorithms can be derived based on different implementations<br />
of the modified tree-based, modified MCDSbased,<br />
and proposed SCA-scheme. We can theoretically obta<strong>in</strong><br />
comparative results of all these algorithms accord<strong>in</strong>g to the<br />
comparisons of their schemes.<br />
We compare the SCA scheme to the modified tree-based<br />
scheme first. The number of total transmissions of algorithms<br />
based on SCA schemes (CSCA and DSCA), which is denoted<br />
by MS, depends on the sum of the size of each cover<strong>in</strong>g node<br />
set Ci of Ui and the number of connectors, as implied <strong>in</strong><br />
Section IV-A. Because we can always f<strong>in</strong>d the set of connectors<br />
with the size constantly proportional to |Ci|, MS can be<br />
expressed as λ |Ci|, where λ is a constant, and λ 1.<br />
(The CSCA and the DSCA provide λ’s of at most 3 and 4,<br />
respectively.)<br />
As shown <strong>in</strong> Section III-A, the number of total transmissions<br />
of algorithms derived from the modified tree-based scheme MT<br />
is n − 1. While compar<strong>in</strong>g MS to MT , we have the follow<strong>in</strong>g<br />
result:<br />
Theorem 8:<br />
λ|T ′ | MS<br />
<br />
n − 1 MT<br />
λn<br />
n − 1<br />
where T ′ = <br />
v∈V SLa(v)(T ′ ⊆ T ).<br />
Proof: The worst case for SCA-based algorithms is that<br />
the size of each cover<strong>in</strong>g node set Ci is equal to |Ui|; <strong>in</strong><br />
this case<br />
MS<br />
MT<br />
= λ <br />
i∈T |Ci|<br />
<br />
n − 1<br />
<br />
λ i∈T |Ui|<br />
=<br />
n − 1<br />
λn<br />
n − 1 .<br />
The best case for SCA-based algorithms is that all nodes <strong>in</strong><br />
Ui can be covered by one transmission at time slot i, <strong>in</strong> which<br />
|Ci| =1. In this case<br />
MS<br />
MT<br />
= λ <br />
i∈T |Ci|<br />
<br />
n − 1<br />
<br />
λ i∈T ′ |Ci|<br />
=<br />
n − 1<br />
λ|T ′ |<br />
n − 1 .<br />
<br />
Theorem 8 establishes a lower and an upper bound of the<br />
performance ga<strong>in</strong> of the SCA-based scheme to the modified<br />
tree-based scheme. Because λn/(n − 1) ∈ Θ(1), we can <strong>in</strong>fer<br />
that the performance of the SCA-based algorithms is with<strong>in</strong> a<br />
constant factor of the modified tree-based algorithms, even <strong>in</strong><br />
the worst case.<br />
Next, we would like to compare the SCA scheme with the<br />
modified MCDS-based scheme. For simplicity of analysis, we<br />
assume that the SCA scheme f<strong>in</strong>ds the m<strong>in</strong>imum cover<strong>in</strong>g node<br />
set for each Ui and that the MCDS-based scheme achieves the<br />
(6)
HONG et al.: MTB IN UNCOORDINATED DUTY-CYCLED WANETs 315<br />
optimal MCDS dur<strong>in</strong>g the comparison. Denot<strong>in</strong>g the number<br />
of total transmissions of the modified MCDS-based scheme by<br />
MM, with the aforementioned assumption, we have<br />
Theorem 9:<br />
1 MS<br />
λ. (7)<br />
m<strong>in</strong> (Δ, |T |) MM<br />
Proof: Given a duty-cycled WANET and the correspond<strong>in</strong>g<br />
MCDS, as described <strong>in</strong> the proof of Theorem 3, a lower<br />
bound of the number of total transmissions is #MCDS. Thus,<br />
we have MS #MCDS. Accord<strong>in</strong>g to Theorem 3, we also<br />
have MM m<strong>in</strong>(Δ, |T |)#MCDS. Hence<br />
MS<br />
MM<br />
<br />
#MCDS<br />
m<strong>in</strong> (Δ, |T |)#MCDS <br />
1<br />
m<strong>in</strong> (Δ, |T |) .<br />
Then, we denote the node set <strong>in</strong> the modified MCDS-based<br />
scheme, which transmits at time slot i,byWi and the m<strong>in</strong>imum<br />
cover<strong>in</strong>g node set for Ui <strong>in</strong> the SCA scheme by C ′ i . It is <strong>in</strong>tuitive<br />
that |C ′ i | |Wi|; otherwise, Wi would be a smaller cover<strong>in</strong>g<br />
node set for Ui, which contradicts the assumption that C ′ i is the<br />
m<strong>in</strong>imum one. Therefore, we have<br />
MS<br />
MM<br />
= λ <br />
i∈T |C′ i |<br />
<br />
i∈T<br />
|Wi| λ.<br />
<br />
Theorem 9 establishes a lower and an upper bound of the<br />
performance ga<strong>in</strong> of the SCA scheme to the MCDS-based<br />
scheme. However, both the m<strong>in</strong>imum set cover problem <strong>in</strong> the<br />
SCA scheme and the MCDS problem <strong>in</strong> the modified MCDSbased<br />
scheme are NP-hard, and only suboptimal solutions are<br />
available. Hence, while compar<strong>in</strong>g the algorithms derived from<br />
the two schemes, we obta<strong>in</strong> the upper bound on the performance<br />
ga<strong>in</strong> of αλ accord<strong>in</strong>gly, where α is the approximation ratio of<br />
the size of the m<strong>in</strong>imum cover<strong>in</strong>g node set.<br />
There are two important factors affect<strong>in</strong>g the performance of<br />
the SCA-based algorithms: One is the network topology, and<br />
the other is the length of the schedul<strong>in</strong>g period |T |.<br />
The network topology factors <strong>in</strong>clude the radio radius, node<br />
position, deployed manner, etc. One of the worst topologies for<br />
SCA-based algorithms is the case that all nodes <strong>in</strong> Ui form an<br />
IS of radius 2r, where r is radius of the radio range. In this case,<br />
we cannot f<strong>in</strong>d a node <strong>in</strong> V cover<strong>in</strong>g more than one node <strong>in</strong> Ui;<br />
thus, |Ci| = |Ui|, which means that no transmitt<strong>in</strong>g redundance<br />
can be elim<strong>in</strong>ated us<strong>in</strong>g the SCA scheme. The best topology<br />
is that all nodes <strong>in</strong> Ui can be covered by one node and that<br />
all these cover<strong>in</strong>g nodes form a connected subgraph, <strong>in</strong> which<br />
the transmitt<strong>in</strong>g redundance can be elim<strong>in</strong>ated to the greatest<br />
extent by SCA-based algorithms. An example of the best case<br />
is shown <strong>in</strong> Fig. 6.<br />
The value of |T |, which is the length of the schedul<strong>in</strong>g period<br />
of a duty-cycled WANET, affects the size of Ui and, thus,<br />
the performance of SCA-based algorithms. While |T |→∞,<br />
which is the case of extremely low duty cycle, the probability<br />
of two nodes hav<strong>in</strong>g the same active time slot becomes small<br />
with random time-slot choice, which means that |Ui| →1;<br />
thus, |Ci| →1. This becomes the worst case of SCA-based<br />
algorithms. While |T | becomes smaller, more nodes will share<br />
Fig. 6. Example of the best case for SCA-based algorithms. In this case, each<br />
vi+1 ∈ Ui, and the number of total transmissions is |Ci| = |T |.<br />
the same active time slot with higher probability, which means<br />
that more transmitt<strong>in</strong>g redundance can be elim<strong>in</strong>ated by SCAbased<br />
algorithms; thus, the performance will be better.<br />
B. Simulations<br />
We conduct simulations to compare the performances<br />
of algorithms based on the modified tree-based, modified<br />
MCDS-based, and SCA-based schemes, respectively, and to<br />
verify the conclusions drawn <strong>in</strong> the theoretical analysis. The<br />
simulations are conducted with PARSEC, which is a C-based<br />
discrete-event simulation language [37]. In the simulations,<br />
the network is randomly deployed <strong>in</strong> a 200 m × 200 m<br />
dimension area. To ma<strong>in</strong>ta<strong>in</strong> reasonable network connectivity,<br />
the radio radius of each node is set to 35 m, result<strong>in</strong>g <strong>in</strong> at<br />
least 0.5 nodes/100 m 2 and a node degree of at least 19 <strong>in</strong> the<br />
follow<strong>in</strong>g experiments. Each node randomly chooses an active<br />
time slot from T . Four algorithms, i.e., the modified tree-based<br />
approximation (TA) algorithm, the modified MCDS-based approximation<br />
(MA) algorithm, and both the CSCA and DSCA,<br />
are implemented. In the MA algorithm, we f<strong>in</strong>d the MCDS<br />
accord<strong>in</strong>g the Modified Greedy Algorithm <strong>in</strong> [28], which has<br />
a good logarithmic approximation ratio of 2(1 + H(Δ)). All<br />
results are the average of ten runs. In each run, the broadcast<br />
source node is chosen randomly.<br />
We compare the number of total transmissions of the four algorithms<br />
first. The network size scales from 200 to 1000 nodes<br />
with an <strong>in</strong>crement of 200, and the value of |T | is set to 20, 40,<br />
60, and 80, respectively. Accord<strong>in</strong>g to Fig. 7(a)–(d), both the<br />
CSCA and DSCA outperform the TA and MA algorithms <strong>in</strong><br />
the four general network configurations. Compared with that of<br />
the TA algorithm, the number of transmissions is reduced by<br />
50% and 70% us<strong>in</strong>g CSCA and DSCA, respectively, as the network<br />
size scales over 800 nodes when the value of |T | is small<br />
[see Fig. 7(a)]. We notice that this disparity becomes larger<br />
as the network scales up. An explanation is that, when other<br />
factors rema<strong>in</strong> unchanged, more nodes will enlarge the size<br />
of Ui and Disk(v), which enables the SCA-based algorithms<br />
to elim<strong>in</strong>ate more redundant transmissions. In the simulations,<br />
we f<strong>in</strong>d that the size of the MCDS found <strong>in</strong> the MA algorithm<br />
changes little s<strong>in</strong>ce both the deploy<strong>in</strong>g area and the radio range<br />
are fixed. However, as the network scales up, the average<br />
number of nodes dom<strong>in</strong>ated by each dom<strong>in</strong>at<strong>in</strong>g node becomes<br />
larger. In particular, <strong>in</strong> the cases with larger |T |, the sets of<br />
active time slots of neighbors for the dom<strong>in</strong>at<strong>in</strong>g nodes are<br />
consequently large. Consequently, the MA algorithm performs
316 <strong>IEEE</strong> TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010<br />
Fig. 7. Performance comparison of the four algorithms under cases with different values of |T |. (a)|T | =20.(b)|T | =40.(c)|T | =60.(d)|T | =80.<br />
Fig. 8. Effect of the value of |T | on the performance. (a) Network size: 250 nodes. (b) Network size: 500 nodes. (c) Network size: 750 nodes. (d) Network size:<br />
1000 nodes.<br />
poorly <strong>in</strong> these cases [see Fig. 7(c) and (d)], because each<br />
dom<strong>in</strong>at<strong>in</strong>g node had to transmit accord<strong>in</strong>g to the active time<br />
slots of its neighbors, which leads to massive redundancy.<br />
We then evaluate the effect of the value |T | on the performance<br />
of the four algorithms. In this simulation, the network<br />
size is set to 250, 500, 750, and 1000 nodes, respectively, and<br />
the |T | scales from 20 to 200 time slots with an <strong>in</strong>crement<br />
of 20. From Fig. 8, we can see that the performance of the<br />
MA, CSCA, and DSCA algorithms degrades as |T | becomes<br />
larger, whereas the TA algorithm rema<strong>in</strong>s unchanged, because<br />
it is only affected by the size of the network. This result<br />
matches our analysis that extremely small |T | will lead to the<br />
worst case for SCA-based algorithms. However, the number<br />
of transmissions of the CSCA and DSCA algorithms never<br />
exceeds the TA algorithm <strong>in</strong> the simulations. It is ma<strong>in</strong>ly<br />
because the implementation of both of the two algorithms<br />
generates tree-like structures <strong>in</strong> the network; thus, the number<br />
of transmissions will not be larger than n − 1. This simulation<br />
shows aga<strong>in</strong> that the performance of the MA algorithm<br />
degrades fast as the value of |T | <strong>in</strong>creases. When |T | reaches<br />
200, the number of transmissions of the MA algorithm is even<br />
double that of the TA and DSCA algorithm [see Fig. 8(b)]<br />
and nearly triple that of the CSCA algorithm [see Fig. 8(c)<br />
and (d)]. We also notice that the MA algorithm performs<br />
better <strong>in</strong> sett<strong>in</strong>gs with a large-scale network and low |T | [see<br />
Fig. 8(b)–(d)]. The reason beh<strong>in</strong>d this is that, while |T |→1, it<br />
is more like the conventional WANET, where the MCDS-based<br />
approaches achieve the optimal solution.<br />
Simulation results (see Figs. 7 and 8) also show that the<br />
CSCA algorithm outperforms the DSCA algorithm. The reason<br />
resides <strong>in</strong> the difference of the dom<strong>in</strong>at<strong>in</strong>g-node election methods.<br />
First, <strong>in</strong> CSCA, we benefit from the global <strong>in</strong>formation,<br />
whereas, <strong>in</strong> DSCA, we can only depend on the local <strong>in</strong>formation.<br />
Second, <strong>in</strong> CSCA, we f<strong>in</strong>d the m<strong>in</strong>imum cover<strong>in</strong>g node set<br />
for each Ui from V , whereas <strong>in</strong> DSCA, we only make the search<br />
<strong>in</strong> Ui for practical implementation. Consequently, the size of the<br />
cover<strong>in</strong>g node set for each Ui <strong>in</strong> CSCA is always larger than that<br />
<strong>in</strong> DSCA, which leads to the performance disparity.<br />
In duty-cycled WANETs, m<strong>in</strong>imiz<strong>in</strong>g the number of broadcast<br />
transmissions may lead to <strong>in</strong>tolerable broadcast latency<br />
[33]. Thus, we also conduct experiments to exam<strong>in</strong>e the broadcast<br />
latency of our algorithms. The optimal broadcast latency<br />
(OPT) serves as the compared basel<strong>in</strong>e. We observe both the<br />
exact broadcast latency and the latency dilation, which is<br />
def<strong>in</strong>ed as the ratio of the exact latency to the optimal value.<br />
We first set |T | to 100 and observe the effect of network size.<br />
As the network size <strong>in</strong>creases, the exact broadcast latency of<br />
CSCA and DSCA <strong>in</strong>creases quite slowly [see Fig. 9(a)]. (Note<br />
that the y-axis is <strong>in</strong> the log scale.) It is partially because the<br />
exact latency of our algorithms is affected by the number of<br />
set-cover<strong>in</strong>g nodes <strong>in</strong> the broadcast backbone, which depends<br />
more on |T | than on the network size. S<strong>in</strong>ce the optimal latency<br />
decreases as the network size <strong>in</strong>creases, the latency dilations of<br />
our algorithms <strong>in</strong>crease l<strong>in</strong>early [see Fig. 9(b)]. We then set the<br />
network size to 500 nodes and observe the effect of |T |. Aswe<br />
regard, the exact latency of both the optimal solution and our<br />
algorithms <strong>in</strong>crease with |T | [see Fig. 9(c)]. However, as shown<br />
<strong>in</strong> Fig. 9(d), the latency dilations of our algorithms quite slowly<br />
<strong>in</strong>crease. In particular, the latency dilation of CSCA is bounded<br />
by a constant of eight on average. The m<strong>in</strong>or changes of the<br />
latency dilations <strong>in</strong>dicate that, as |T | <strong>in</strong>creases, the broadcast<br />
latency of our algorithms rema<strong>in</strong>s with<strong>in</strong> a small factor of the<br />
optimal value.<br />
VI. DISCUSSION<br />
In this section, we would like to briefly discuss some related<br />
issues when solv<strong>in</strong>g the MTB-UD problem: the transmitt<strong>in</strong>g<br />
collision, the broadcast latency, and the balance of energy<br />
consumption.
HONG et al.: MTB IN UNCOORDINATED DUTY-CYCLED WANETs 317<br />
Fig. 9. Performance of broadcast latency. (a) |T | = 100. (b)|T | = 100. (c) Network size: 500 nodes. (d) Network size: 500 nodes.<br />
Transmitt<strong>in</strong>g collisions exist <strong>in</strong> almost all wireless communication<br />
environments. In duty-cycled WANETs, collisions<br />
will happen, although with a low probability, e.g., two nodes<br />
simultaneously transmit to the same node at the same time<br />
slot. Collisions usually cause retransmission and <strong>in</strong>crease the<br />
broadcast latency. How to elim<strong>in</strong>ate collisions and m<strong>in</strong>imize the<br />
broadcast latency is another challeng<strong>in</strong>g problem (actually, an<br />
NP-hard problem). In this paper, we focus on m<strong>in</strong>imiz<strong>in</strong>g the<br />
number of transmissions and leave the collision-avoid<strong>in</strong>g job to<br />
the underly<strong>in</strong>g MAC protocol [1].<br />
The latency of a broadcast process is also important. M<strong>in</strong>imiz<strong>in</strong>g<br />
the number of transmissions may lead to <strong>in</strong>tolerable<br />
broadcast latency [33]. The broadcast latency <strong>in</strong> duty-cycled<br />
WANETs is affected by both the active time slot of each<br />
node and the collision <strong>in</strong> the network. It is such a complex<br />
problem that we have decided to leave it to our future work.<br />
Nevertheless, as shown by the experiment results, the broadcast<br />
latency of our algorithm <strong>in</strong>creases quite slowly as the network<br />
size <strong>in</strong>creases and rema<strong>in</strong>s with<strong>in</strong> a small factor of the optimal<br />
values as the schedul<strong>in</strong>g period |T | <strong>in</strong>creases.<br />
The unbalanced energy consumption is a common problem<br />
of all backbone-based broadcast schemes. In our algorithms,<br />
broadcast messages are conveyed upon the constructed broadcast<br />
backbones. Hence, the energy on these backbone nodes<br />
will deplete faster than that on other nodes, caus<strong>in</strong>g the unbalanced<br />
energy consumption <strong>in</strong> the network. Many solutions<br />
have been proposed to address this problem and extend the<br />
network lifetime, e.g., change the backbone <strong>in</strong> rotation. In<br />
fact, as a different topic, the unbalanced energy consumption<br />
problem has well been studied; thus, we keep our focus on the<br />
MTB-UD problem.<br />
VII. CONCLUSION<br />
In this paper, we have studied the MTB problem <strong>in</strong> uncoord<strong>in</strong>ated<br />
duty-cycled WANETs. We have first formulated this<br />
problem, proven its NP-hardness, and presented two schemes<br />
(i.e., the modified tree-based and the modified MCDS-based<br />
scheme) based on exist<strong>in</strong>g approaches for the conventional<br />
MTB problem. Without explor<strong>in</strong>g the characteristics of dutycycled<br />
WANETs, both of the two schemes have a l<strong>in</strong>ear approximation<br />
ratio of O(n) and thus cannot guarantee to f<strong>in</strong>d<br />
solutions with a small number of transmissions. Then, we<br />
have proposed a novel SCA scheme, together with a centralized<br />
algorithm (CSCA) and a distributed algorithm (DSCA).<br />
The CSCA algorithm has a logarithmic approximation ratio<br />
of 3(ln Δ + 1) and a time complexity of O(n3 ).TheDSCA<br />
algorithm, on the other hand, has a constant approximation<br />
ratio of at most 20 and O(n) time complexity and message<br />
complexity. We have evaluated the performance of the proposed<br />
algorithms, theoretically and via simulations, to demonstrate<br />
their efficiency. Experiment results have shown that the CSCA<br />
algorithm outperforms the modified tree-based and modified<br />
MCDS-based algorithms by up to 70% and 60%, respectively,<br />
and the DSCA algorithm outperforms both the modified treebased<br />
and modified MCDS-based algorithms by up to 50%.<br />
We have also discussed some related issues of the MTB-UD<br />
problem, e.g., the transmitt<strong>in</strong>g collision, the broadcast latency,<br />
and the balance of energy consumption, which will be our<br />
future research.<br />
REFERENCES<br />
[1] W. Ye, J. Heidemann, and D. Estr<strong>in</strong>, “An energy-efficient MAC protocol<br />
for wireless sensor networks,” <strong>in</strong> Proc. INFOCOM, 2002, pp. 1567–1576.<br />
[2] T. van Dam and K. Langendoen, “An adaptive energy-efficient<br />
MAC protocol for wireless sensor networks,” <strong>in</strong> Proc. SenSys, 2003,<br />
pp. 171–180.<br />
[3] R. Zheng and R. Kravets, “On-demand power management for<br />
ad hoc networks,” <strong>in</strong> Proc. INFOCOM, Mar. 30–Apr. 3, 2003, vol. 1,<br />
pp. 481–491.<br />
[4] R. Zheng, J. C. Hou, and L. Sha, “Asynchronous wakeup for ad hoc<br />
networks,” <strong>in</strong> Proc. MobiHoc, 2003, pp. 35–45.<br />
[5] C. fan Hs<strong>in</strong> and M. Liu, “Network coverage us<strong>in</strong>g low duty-cycled sensors:<br />
Random and coord<strong>in</strong>ated sleep algorithms,” <strong>in</strong> Proc. IPSN, 2004,<br />
pp. 433–442.<br />
[6] C. Gui and P. Mohapatra, “Power conservation and quality of surveillance<br />
<strong>in</strong> target track<strong>in</strong>g sensor networks,” <strong>in</strong> Proc. MobiCom, 2004,<br />
pp. 129–143.<br />
[7] O. Dousse, P. Mannersalo, and P. Thiran, “Latency of wireless sensor networks<br />
with uncoord<strong>in</strong>ated power sav<strong>in</strong>g mechanisms,” <strong>in</strong> Proc. MobiHoc,<br />
2004, pp. 109–120.<br />
[8] C. Hua and T.-S. P. Yum, “Asynchronous random sleep<strong>in</strong>g for sensor<br />
networks,” ACM Trans. Sens. Netw., vol. 3, no. 3, p. 15, Aug. 2007.<br />
[9] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey<br />
on sensor networks,” <strong>IEEE</strong> Commun. Mag., vol. 40, no. 8, pp. 102–114,<br />
Aug. 2002.<br />
[10] A. Ma<strong>in</strong>war<strong>in</strong>g, D. Culler, J. Polastre, R. Szewczyk, and J. Anderson,<br />
“Wireless sensor networks for habitat monitor<strong>in</strong>g,” <strong>in</strong> Proc. WSNA, 2002,<br />
pp. 88–97.<br />
[11] N. Xu, S. Rangwala, K. K. Ch<strong>in</strong>talapudi, D. Ganesan, A. Broad,<br />
R. Gov<strong>in</strong>dan, and D. Estr<strong>in</strong>, “A wireless sensor network for structural<br />
monitor<strong>in</strong>g,” <strong>in</strong> Proc. SenSys, 2004, pp. 13–24.<br />
[12] S. Y. Ni, Y. C. Tseng, Y. S. Chen, and J. P. Sheu, “The broadcast<br />
storm problem <strong>in</strong> a mobile ad hoc network,” <strong>in</strong> Proc. MobiCom, 1999,<br />
pp. 151–162.<br />
[13] I. Chlamtac and S. Kutten, “Tree-based broadcast<strong>in</strong>g <strong>in</strong> multihop radio<br />
networks,” <strong>IEEE</strong> Trans. Comput., vol. C-36, no. 10, pp. 1209–1223,<br />
Oct. 1987.<br />
[14] W. Lou and J. Wu, “On reduc<strong>in</strong>g broadcast redundancy <strong>in</strong> ad hoc wireless<br />
networks,” <strong>IEEE</strong> Trans. Mobile Comput., vol. 1, no. 2, pp. 111–123,<br />
Apr.–Jun. 2002.<br />
[15] W. Lou and J. Wu, “A cluster-based backbone <strong>in</strong>frastructure for broadcast<strong>in</strong>g<br />
<strong>in</strong> MANETs,” <strong>in</strong> Proc. IPDPS, 2003, p. 221.1.
318 <strong>IEEE</strong> TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 1, JANUARY 2010<br />
[16] B. Das and V. Bharghavan, “Rout<strong>in</strong>g <strong>in</strong> ad-hoc networks us<strong>in</strong>g m<strong>in</strong>imum<br />
connected dom<strong>in</strong>at<strong>in</strong>g sets,” <strong>in</strong> Proc. ICC, 1997, pp. 376–380.<br />
[17] J. Wu and H. Li, “On calculat<strong>in</strong>g connected dom<strong>in</strong>at<strong>in</strong>g set for efficient<br />
rout<strong>in</strong>g <strong>in</strong> ad hoc wireless networks,” <strong>in</strong> Proc. DIALM, 1999, pp. 7–14.<br />
[18] J. Wu, “An enhanced approach to determ<strong>in</strong>e a small forward node set<br />
based on multipo<strong>in</strong>t relays,” <strong>in</strong> Proc. VTC, 2003, pp. 2774–2777.<br />
[19] J. Wu and W. Lou, “Forward-node-set-based broadcast <strong>in</strong> clustered mobile<br />
ad hoc networks,” Wirel. Commun. Mob. Comput., vol. 3, no. 2, pp. 155–<br />
173, 2003.<br />
[20] J. Wu, W. Lou, and F. Dai, “Extended multipo<strong>in</strong>t relays to determ<strong>in</strong>e<br />
connected dom<strong>in</strong>at<strong>in</strong>g sets <strong>in</strong> MANETs,” <strong>IEEE</strong> Trans. Comput., vol. 55,<br />
no. 3, pp. 334–347, Mar. 2006.<br />
[21] M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide to<br />
the Theory of NP-Completeness. New York: Freeman, 1979.<br />
[22] B. N. Clark, C. J. Colbourn, and D. S. Johnson, “Unit disk graphs,”<br />
Discrete Math., vol. 86, no. 1–3, pp. 165–177, Dec. 1990.<br />
[23] G. Lu, N. Sadagopan, B. Krishnamachari, and A. Goel, “Delay efficient<br />
sleep schedul<strong>in</strong>g <strong>in</strong> wireless sensor networks,” <strong>in</strong> Proc. INFOCOM,<br />
Mar. 2005, vol. 4, pp. 2470–2481.<br />
[24] Q. Cao, T. Abdelzaher, T. He, and J. Stankovic, “Towards optimal sleep<br />
schedul<strong>in</strong>g <strong>in</strong> sensor networks for rare-event detection,” <strong>in</strong> Proc. IPSN,<br />
2005, pp. 20–27.<br />
[25] A. Keshavarzian, H. Lee, and L. Venkatraman, “Wakeup schedul<strong>in</strong>g <strong>in</strong><br />
wireless sensor networks,” <strong>in</strong> Proc. MobiHoc, 2006, pp. 322–333.<br />
[26] Y. Gu and T. He, “Data forward<strong>in</strong>g <strong>in</strong> extremely low duty-cycle sensor<br />
networks with unreliable communication l<strong>in</strong>ks,” <strong>in</strong> Proc. SenSys, 2007,<br />
pp. 321–334.<br />
[27] C. Adjih, P. Jacquet, and L. Viennot, “Comput<strong>in</strong>g connected dom<strong>in</strong>ated<br />
sets with multipo<strong>in</strong>t relays,” Ad Hoc Sens. Wireless Netw., vol. 1, no. 1/2,<br />
pp. 27–39, Jan. 2005.<br />
[28] S. Guha and S. Khuller, “Approximation algorithms for connected dom<strong>in</strong>at<strong>in</strong>g<br />
sets,” Algorithmica, vol. 20, no. 4, pp. 374–387, 1998.<br />
[29] P.-J. Wan, K. M. Alzoubi, and O. Frieder, “Distributed construction of<br />
connected dom<strong>in</strong>at<strong>in</strong>g set <strong>in</strong> wireless ad hoc networks,” Mob. Netw. Appl.,<br />
vol. 9, no. 2, pp. 141–149, Apr. 2004.<br />
[30] Y. Li, M. T. Thai, F. Wang, C.-W. Yi, P.-J. Wan, and D.-Z. Du, “On greedy<br />
construction of connected dom<strong>in</strong>at<strong>in</strong>g sets <strong>in</strong> wireless networks: Research<br />
articles,” Wirel. Commun. Mob. Comput., vol. 5, no. 8, pp. 927–932,<br />
Dec. 2005.<br />
[31] P.-J. Wan, L. Wang, and F. Yao, “Two-phased approximation algorithms<br />
for m<strong>in</strong>imum CDS <strong>in</strong> wireless ad hoc networks,” <strong>in</strong> Proc. ICDCS, 2008,<br />
pp. 337–344.<br />
[32] M. J. Miller, C. Sengul, and I. Gupta, “Explor<strong>in</strong>g the energy-latency tradeoff<br />
for broadcasts <strong>in</strong> energy-sav<strong>in</strong>g sensor networks,” <strong>in</strong> Proc. ICDCS,<br />
2005, pp. 17–26.<br />
[33] F. Wang and J. Liu, “Duty-cycle-aware broadcast <strong>in</strong> wireless sensor networks,”<br />
<strong>in</strong> Proc. INFOCOM, 2009, pp. 468–476.<br />
[34] M. Maróti, B. Kusy, G. Simon, and A. Lédeczi, “The flood<strong>in</strong>g time<br />
synchronization protocol,” <strong>in</strong> Proc. SenSys, 2004, pp. 39–49.<br />
[35] A. Jütner and A. Magi, “Tree based broadcast <strong>in</strong> ad hoc networks,”<br />
Mob. Netw. Appl., vol. 10, no. 5, pp. 753–762, Oct. 2005.<br />
[36] V. Chvatal, “A greedy heuristic for the set-cover<strong>in</strong>g problem,” Math. Oper.<br />
Res., vol. 4, no. 3, pp. 233–235, 1979.<br />
[37] R. Bagrodia, R. Meyer, M. Takai, Y. an Chen, X. Zeng, J. Mart<strong>in</strong>, and<br />
H. Y. Song, “Parsec: A parallel simulation environment for complex<br />
systems,” Computer, vol. 31, no. 10, pp. 77–85, Oct. 1998.<br />
Jue Hong received the B.S. degree <strong>in</strong> computer<br />
science from Nanj<strong>in</strong>g University, Nanj<strong>in</strong>g, Ch<strong>in</strong>a, <strong>in</strong><br />
2005, where he is currently work<strong>in</strong>g toward the Ph.D.<br />
degree with the Department of Computer Science<br />
and Technology.<br />
His current research <strong>in</strong>terests <strong>in</strong>clude wireless ad<br />
hoc and sensor networks, pervasive comput<strong>in</strong>g, and<br />
distributed comput<strong>in</strong>g.<br />
Jiannong Cao (M’93–SM’04) received the B.Sc.<br />
degree from Nanj<strong>in</strong>g University, Nanj<strong>in</strong>g, Ch<strong>in</strong>a,<br />
<strong>in</strong> 1982 and the M.Sc. and Ph.D. degrees from<br />
Wash<strong>in</strong>gton State University, Pullman, <strong>in</strong> 1986 and<br />
1990, respectively, all <strong>in</strong> computer science.<br />
He is currently a Professor with the Department<br />
of Comput<strong>in</strong>g, Hong Kong Polytechnic University<br />
(PolyU), Kowloon, Hong Kong. Before jo<strong>in</strong><strong>in</strong>g<br />
PolyU <strong>in</strong> 1997, he was with the faculty of computer<br />
science, James Cook University, Townsville,<br />
Australia; the University of Adelaide, Adelaide,<br />
Australia; and the City University of Hong Kong, Kowloon. He has served as an<br />
Associate Editor and a member of the editorial boards of several <strong>in</strong>ternational<br />
journals, as well as Chair and member of organiz<strong>in</strong>g program committees<br />
for many <strong>in</strong>ternational conferences. His research <strong>in</strong>terests <strong>in</strong>clude mobile and<br />
pervasive comput<strong>in</strong>g, wireless network<strong>in</strong>g, parallel and distributed comput<strong>in</strong>g,<br />
fault tolerance, and distributed software architecture and programm<strong>in</strong>g.<br />
Wenzhong Li (S’05–M’08) received the B.S. and<br />
Ph.D. degrees from Nanj<strong>in</strong>g University, Nanj<strong>in</strong>g,<br />
Ch<strong>in</strong>a, <strong>in</strong> 2002 and 2007, respectively, both <strong>in</strong> computer<br />
science.<br />
In 2007, he jo<strong>in</strong>ed Nanj<strong>in</strong>g University as a<br />
Lecturer. His current research <strong>in</strong>terests <strong>in</strong>clude<br />
wireless networks, pervasive comput<strong>in</strong>g, person-toperson<br />
comput<strong>in</strong>g, and mobile data management.<br />
Sanglu Lu (M’04) received the B.S., M.S., and<br />
Ph.D. degrees from Nanj<strong>in</strong>g University, Nanj<strong>in</strong>g,<br />
Ch<strong>in</strong>a, <strong>in</strong> 1992, 1995, and 1997, respectively, all <strong>in</strong><br />
computer science.<br />
She is currently a Professor with the Department<br />
of Computer Science and Technology and the<br />
State Key Laboratory for Novel Software Technology,<br />
Nanj<strong>in</strong>g University. Her research <strong>in</strong>terests <strong>in</strong>clude<br />
distributed comput<strong>in</strong>g, pervasive comput<strong>in</strong>g,<br />
and wireless networks.<br />
Daoxu Chen (M’04) received the B.S. degree <strong>in</strong><br />
computer science from Nanj<strong>in</strong>g University, Nanj<strong>in</strong>g,<br />
Ch<strong>in</strong>a, <strong>in</strong> 1982.<br />
He was a Visit<strong>in</strong>g Researcher with Purdue University,<br />
West Lafayette, IN, and the City University of<br />
Hong Kong, Kowloon, Hong Kong. He is currently a<br />
Professor with the Department of Computer Science<br />
and Technology, Nanj<strong>in</strong>g University, Nanj<strong>in</strong>g, Ch<strong>in</strong>a.<br />
His research <strong>in</strong>terests <strong>in</strong>clude distributed comput<strong>in</strong>g,<br />
parallel process<strong>in</strong>g, and computer networks.<br />
Prof. Chen is a member of the Association<br />
for Comput<strong>in</strong>g Mach<strong>in</strong>ery and a Senior Member of the Ch<strong>in</strong>a Computer<br />
Federation.