Elsevier

Computer Communications

Volume 116, January 2018, Pages 9-20
Computer Communications

DECK: A distributed, asynchronous and exact k-connectivity detection algorithm for Wireless Sensor Networks

https://doi.org/10.1016/j.comcom.2017.11.005Get rights and content

Abstract

Wireless Sensor Networks (WSNs) are one of the widespread platforms for communications and remote sensing. A robust WSN should tolerate the failures of nodes without losing the connection to active nodes. A network is k-connected if all active nodes remain connected after failures in k-1 arbitrary nodes. Finding (detecting) the k value in a WSN is a significant operation to estimate the connectivity robustness, reliability and load balancing level of the network. Also, the detection of k values provides useful information for connectivity restoration, lower bound of node degree, critical nodes and possible cycles. In this paper, we propose an asynchronous distributed algorithm (DECK) for k-connectivity detection in WSNs. In the proposed algorithm, each node estimates a local k using its 2-hop neighborhood information and then a distributed linked list of minimum estimations is created between the nodes. Finally, the sink node validates the correctness of detected values by finding the number of node-disjoint paths to the node having the minimum estimation. We analyze our algorithm in detail, provide theoretical analysis, testbed experiments on the IRIS nodes and simulation results in the TOSSIM simulator by comparing with the other algorithms. The comprehensive testbed and simulation results show that the proposed algorithm always finds exact k values with reasonable energy consumption while the correct detection ratios of existing distributed algorithms on similar networks are usually less than 40%.

Introduction

Recent advances in communication and processing platforms have provided new perspectives, applications and challenges. Wireless sensor networks (WSNs) are one of the important platforms for communications that are composed of sensor nodes aiming to accomplish certain tasks. WSNs are increasingly being used in several applications such as disaster relief, military surveillance, underground mines, health care, intelligent systems and outer space exploration.

Generally, in WSNs the nodes connect to each other if they are in the radio range of each other. These autonomous nodes can collect sensed data from the environment and execute algorithms in a distributed manner to form self-organizing networks. Based on local processes, nodes can decide to transmit the sensed data to a special sink node which acts as a gateway between the WSN and its users. In a typical multi-hop sensor network application, the data may be aggregated and relayed to the sink or the commands may be sent from the sink and forwarded with some intermediate nodes to reach to a target node.

Due to challenging environmental conditions in these applications and also the limited energy source of nodes, each node may fail individually or collapse as groups of nodes. This situation increases the risk of partitioning in the network, which can make active nodes unreachable from the sink. Thus, the network connectivity should be maintained to achieve robust communication.

A k-connected WSN has at least k node-disjoint paths between the sink and other nodes, and the network remains connected after failures of any k-1 nodes. The k-connectivity related problems on WSNs have been subjected in various researches from different perspectives including power assignment, topology maintenance, node deployment and finally k-connectivity detection (i.e. finding the k value of a given network). From the power assignment viewpoint, the problem is how to set the minimum transmission ranges of nodes such that the resulting topologies become k-connected [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11]. The topology maintenance category includes approaches that repair WSN topologies to obtain k-connected networks [12], [13], [14], [15]. In the research thread related to the node deployment, one aim is to deploy nodes in a network area in a way that the network becomes k-connected [16], [17], [18], [19], [20], [21], [22]. Another aim in the node deployment research thread is to find the probability of the k-connectedness of a given network [23], [24], [25], [26], [27], [28], [29], [30]. Our concern is to find the k value of a network which is a significant operation that provides meaningful information about the fault tolerance status of the given network.

In this paper, we propose a distributed exact k-connectivity detection algorithm (DECK) which finds the k value of a given network. The proposed algorithm has 3 main phases. At the first phase, the sink starts the proposed algorithm and each node estimates a local k value from its 2-hop local subgraph. These estimated local values will be equal to or lower than the global k value. In the second phase, a distributed linked list is established between the nodes, which is built according to the minimum estimations. Finally, in the third phase, the sink validates the correctness of estimations and finds the exact global k value using the previously constructed linked list.

The rest of this paper is organized as follows. The related work is surveyed in Section 2. The problem formulation is given in Section 3. The description of DECK and its theoretical analysis are given in Section 4. The experimental analysis of the proposed algorithm with its counterparts is given in Section 5. Finally, conclusions are drawn in Section 6.

Section snippets

Related work

Connectivity detection and restoration for constant k values is a well-known research problem for various types of networks [31], [32], [33], [34], [35], [36], [37]. When k= 1, the problem is finding the cut vertices (articulation points) whose removal breaks the connectivity of the given graph. For the purpose of this paper, this problem is not our concern. Even and Tarjan [38] proposed the first central algorithm for the k-connectivity detection problem which is based on the network flow

Network model

We have designed our algorithm under the following assumptions about the network model.

  • All nodes except the sink node are equal in terms of processing capabilities, battery and memory.

  • The sink node has enough resources to achieve its mission.

  • Each node has a unique id and nodes are randomly distributed in the environment.

  • The nodes are stationary during the execution of the algorithm.

  • The nodes communicate on bidirectional links.

  • Each node can send a radio broadcast message to all nodes in its

The proposed approach

The proposed approach has 3 main phases. In the first phase, each node estimates a local k value and sends this value to the sink node. In the second phase, we create a list of nodes which send the minimum estimation to the sink. In the last phase, the correctness of minimum estimations is validated and the real k value is detected.

Let Γu be the 1-hop neighbor list of node u, Δ be the maximum cardinality of Γ, and S(u, v) be the minimum vertex cut set (separator) of nodes u and v. In a k

Experimental analysis

In this section, we first give measurements from our testbed experiments then provide simulation results on large random topologies.

Conclusions

In this paper, we proposed an algorithm for k-connectivity detection problem in WSNs called DECK which has estimation, gathering and confirmation phases. We proved the correctness of DECK and showed that its bit, time and space complexities are O(n2log2(n)k), O(n2k) and O2log2n) respectively. Through testbed experiments and simulations we showed that DECK guarantees the correctness of detected k in all networks. The resource consumption of DECK is very lower than CENTRAL and k-DFDP, and even

Acknowledgment

This work was supported by the TUBITAK (Scientific and Technical Research Council of Turkey) [Project number 113E470].

References (53)

  • M.R. Henzinger et al.

    Computing vertex connectivity: new bounds from old techniques

    J. Algo.

    (2000)
  • C. Liu et al.

    Guaranteed on-demand discovery of node-disjoint paths in ad hoc networks

    Comput. Commun.

    (2007)
  • Y. Challal et al.

    Secure and efficient disjoint multipath construction for fault tolerant routing in wireless sensor networks

    J. Netw. Comput. Appl.

    (2011)
  • O. Yilmaz et al.

    Localization-free and energy-efficient hole bypassing techniques for fault-tolerant sensor networks

    J. Netw. Comput. Appl.

    (2014)
  • N. Li et al.

    Flss: a fault-tolerant topology control algorithm for wireless networks

    Proc. of the MobiCom ’04

    (2004)
  • Z. Nutov

    Approximating minimum-power k-connectivity.

    Ad Hoc Sensor Wirel. Netw.

    (2010)
  • B. Gupta et al.

    On the k-connectivity of ad-hoc wireless networks

    Proceedings of the 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering

    (2013)
  • H. Bagci et al.

    A distributed fault-tolerant topology control algorithm for heterogeneous wireless sensor networks

    IEEE Trans. Parallel Distrib. Syst.

    (2015)
  • P.-J. Wan et al.

    Asymptotic critical transmission radius and critical neighbor number for k-connectivity in wireless ad hoc networks

    Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing

    (2004)
  • X. Jia et al.

    Power assignment for k-connectivity in wireless ad hoc networks

    J. Comb. Optim.

    (2005)
  • H. Zhang et al.

    On the critical total power for asymptotic k-connectivity in wireless networks

    Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.

    (2005)
  • S. Wang et al.

    On movement-assisted connectivity restoration in wireless sensor and actor networks

    IEEE Trans. Parallel Distrib. Syst.

    (2011)
  • P. Szczytowski et al.

    Dkm: distributed k-connectivity maintenance in wireless sensor networks.

    WONS

    (2012)
  • N. Atay et al.

    Mobile wireless sensor network connectivity repair with k-redundancy.

    WAFR

    (2008)
  • S.K. Gupta et al.

    Genetic algorithm for k-connected relay node placement in wireless sensor networks

    Proceedings of the Second International Conference on Computer and Communication Technologies

    (2016)
  • H.M. Almasaeid et al.

    On the minimum k-connectivity repair in wireless sensor networks

    Proc. of the IEEE ICC’09

    (2009)
  • Cited by (22)

    • A distributed And asynchronous approach for optimizing weighted graph matchings in wireless network services

      2019, Expert Systems with Applications
      Citation Excerpt :

      MWM can be computed in polynomial time in centralized settings by the famous Blossom Algorithm of (Edmonds, 1965). Generally, central computation is extensive for dynamic wireless networks in terms of message and time since whole topology should be constructed in a central node (such as a sink node in wireless sensor nodes) periodically (Akram & Dagdeviren, 2018; Dagdeviren & Akram, 2014; 2017a). For a recent review of centralized matching algorithms, which is not in the scope of this work, we refer the readers to Lotker, Patt-Shamir, and Pettie (2015).

    • A Distributed Evolutionary algorithm for detecting minimum vertex cuts for wireless ad hoc and sensor networks

      2019, Journal of Network and Computer Applications
      Citation Excerpt :

      However, using a central algorithm in a distributed environment like WASNs, may lead to large amount of message passing and energy consumption because the entire topology information should be gathered in a single node to create a graph of the network. Even though, a few distributed approaches have been proposed for the MEC problem (Ghaffari and Kuhn, 2013; Curet et al., 2002), to the best of our knowledge, the existing distributed algorithms for MVC find a local k (the cardinality of MVC) without determining the elements of MVC (Jorgic et al., 2007; Szczytowski et al., 2012; Dagdeviren and AkramPack, 2017; Akram and Dagdeviren, 2018) or use already detected vertex cuts for network partitioning (Rahimian et al., 2014). Hence, finding MVCs and k in the distributed environments are still open problems (Wang et al., 2011).

    • DCBD: An Efficient Design of Dynamic Compromise Black Hole Attack Detection (DCBD) in WSN

      2023, 2023 International Conference on Network, Multimedia and Information Technology, NMITCON 2023
    View all citing articles on Scopus
    View full text