21.08.2013 Views

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

Protocols for Secure Communication in Wireless Sensor Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.2. Rout<strong>in</strong>g on Spann<strong>in</strong>g Trees 139<br />

Source<br />

Root of subtree<br />

Target<br />

Figure 5.2: Target address conta<strong>in</strong>ed <strong>in</strong> the convex hull of the cover area, but not <strong>in</strong> the cover<br />

area itself<br />

Here, we propose to use the convex hull of a set of regions to represent<br />

the sum of the regions. Convex hulls have some desirable properties. First, a<br />

convex hull can be represented by very few po<strong>in</strong>ts compared to the po<strong>in</strong>t set<br />

it represents. Second, if the po<strong>in</strong>t set is extended, the new convex hull can be<br />

solely computed from the exist<strong>in</strong>g po<strong>in</strong>ts on the hull and the new po<strong>in</strong>t set. No<br />

<strong>in</strong><strong>for</strong>mation about the po<strong>in</strong>ts conta<strong>in</strong>ed <strong>in</strong> the convex hull is required. A third<br />

property is efficient computability us<strong>in</strong>g Graham’s algorithm (cf. [44]), which<br />

has O(nlogn) time complexity <strong>in</strong> the number of nodes.<br />

Us<strong>in</strong>g convex hulls <strong>for</strong> represent<strong>in</strong>g the area covered by a set of nodes <strong>in</strong><br />

a subtree has the disadvantage that the convex hull may conta<strong>in</strong> areas that are<br />

<strong>in</strong> fact not covered by any nodes <strong>in</strong> the subtree. This means that although an<br />

address, i.e. a geographic location, may be purportedly reachable through a<br />

subtree, s<strong>in</strong>ce it is conta<strong>in</strong>ed with<strong>in</strong> the convex hull covered by the subtree,<br />

there is <strong>in</strong> fact no node <strong>in</strong> the subtree that actually covers this location. Hence,<br />

such a message will be routed through that subtree without ever reach<strong>in</strong>g a node<br />

that actually covers the addressed location.<br />

Such a situation is depicted <strong>in</strong> Figure 5.2. The boxes illustrate the cover<br />

areas of the nodes, the union of these boxes is the total cover area of the subtree.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!