Top Banner
N o : 2008-ISAL-0026 Year 2008 Thesis Impacts of Self-organized Mechanisms in Wireless Sensor Networks defend at l’Institut National des Sciences Appliqu ´ ees de Lyon for the degree of Doctor of Philosophy Ecole Doctorale Informatique et Information pour la Societe by JiaLiang LU dissertation May 6
164

Impacts of Self-organized Mechanisms in Wireless Sensor ...theses.insa-lyon.fr/publication/2008ISAL0026/these.pdf · No: 2008-ISAL-0026 Year 2008 Thesis Impacts of Self-organized

Feb 10, 2021

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • No: 2008-ISAL-0026 Year 2008

    Thesis

    Impacts of Self-organized Mechanisms in

    Wireless Sensor Networks

    defend at

    l’Institut National des Sciences Appliquées de Lyon

    for the degree of

    Doctor of Philosophy

    Ecole Doctorale Informatique et Information pour la Societe

    by

    JiaLiang LU

    dissertation May 6

  • Committee in charge: AL AGHA Khaldoun (Reviewer)

    Professor, University Paris Sud

    BARTHEL Dominique (Examiner)

    Senior researcher, France Telecom R&D, Grenoble

    FLEURY Eric (Co-supervisor)

    Professor, ENS Lyon

    Noel Thomas (Examiner)

    Professor, Louis Pasteur University Strasbourg

    Simplot-Ryl David (Reviewer)

    Professor, University Lille 1

    Ubeda Stephane (Examiner)

    Professor, INSA Lyon

    VALOIS Fabrice (Co-supervisor)

    Associated professor, INSA Lyon

    ii

  • “To observe without the observer”

    Jiddu Krishnamurti

    iii

  • Remerciements v

    Remerciements

    Cette thèse a été effetuée au sein du Centre d’Innovation en Télécommunications et Inté-

    gration de Services (CITI), à l’INSA de Lyon, et dans le projet ARES de l’INRIA Rhône-

    Alpes, en collaboration avec le Centre de Recherche et Développement de FranceTélé-

    com Grenoble et Beijing.

    Je tiens tout d’abort à remercier Fabrice Valois sans, qui cette thèse n’aurait, je

    pense, jamais eu lieu. Je le remercie de m’avoir encadré non seulement durant la thèse

    mais également pendant mon mastère de recherche, en me donnant les outils et surtout

    l’esprit de recherche pour réussir dans ce domaine. Je le remercie de m’avoir me toujour

    soutenu mais aussi crétiqué pour réussir cette thèse. Je remercie également Eric Fleury

    qui m’a co-encadré durant cette thèse et a su partager son expertise scientifique.

    Je remercie tout particuliérement Monsieur Khaldoun Al Agha, Professeur à l’Université

    de Paris-Sud, et Monsieur David Simplot-Ryl, Professeur à l’Université de Lille qui ont

    accepté de juger mes traveaux de thèse et d’en être les rapporteurs.

    Je remercie également Monsieur Dominique Barthel, Chercheur Sénior à FranceTélé-

    com R&D de Grenoble, Monsieur Thomas Noel, Professeur à l’Université de Strasbourg

    et Monsieur Stéphane Ubeda, Professur à l’INSA de Lyon d’avoir accepté de faire partie

    de ce jury de thèse et de s’être intéressés à mon travail.

    Je remercie également Monsieur Mischa Dohler avec qui j’ai passé ces moments de

    concentration riche, tant pour son apport scientifique que personnel.

    Je tiens à remercier Yvan Royon et Noha Ibrahim pour les discussions scientifiques,

    sociales ou personnelles que nous avons eu. Je remercie également Fabrice Theo-

    leyre, Nathalie Mitton, Tahiry Razafindralambo, Karel Heurtefeux, Elyès Ben Hamida,

    Thomas Watteyne, Katia Jaffrès-Runser avec qui les nombreuse exchanges scientifiques

    ont eu lieu. Je remercie Haila Wang, Song Wang et Yu Zhang qui m’ont aidé à dévelop-

    per les activité de recherche à FranceTélécom Beijing. Je remercie également tous les

    chercheurs du laboratoire CITI (pêle-mêle Jean-Marie Gorce, Guillaume Chélius, Is-

    abelle Augé-Blum, et tant d’autres que je ne nommerai pas par manque de place).

    Enfin, je tiens à remercier Yi, mon epouse, qui a su m’accompagner (physiquement et

    moralement) dans cette grande expérience scientifique mais surtout personnelle qu’est

    une thèse.

  • Résumé

    Un réseau de capteurs est un réseau radio multi-sauts formé par une quantité impor-

    tante de capteurs identiques. Contrairement aux noeuds d’un réseau ad hoc, les cap-

    teurs ont des nombreuses contraintes, notamment en termes de consommation d’énergie,

    de capacité de calcul et de stockage. L’absence d’infrastructure et de contrôle centralisé

    implique une collaboration efficace et pertinente des noeuds du réseau de capteurs.

    Ces travaux de thèse s’inscrivent dans la problématique d’auto-organisation des

    réseaux de capteurs. De notre point de vue, l’auto-organisation est un problème fonda-

    mental des réseaux de capteurs conduisant à construire une vue logique de la topolo-

    gie du réseau physique et de fournir des protocoles de communication basés sur cette

    vue logique. Nous avons donc proposé une architecture d’auto-organisation (nommée

    FISCO) permettant d’organiser le réseau - via des interactions locales uniquement-

    sous le forme soit d’un arbre soit d’un treillis. Les propriétés structurelles et les perfor-

    mances de FISCO ont été évaluées puis comparées aux principaux mécanismes d’auto-

    organisation de la littérature. Cette architecture exhibe de très bonnes performances

    en termes de stabilité, persistance, robustesse et surtout gestion de l’énergie.

    Ensuite, nous avons revisité les principaux défis de la communication des réseaux

    de capteurs en se basant sur l’auto-organisation préalablement introduite. Nous nous

    sommes donc intéressé aux problèmes clefs suivant : allocation dynamique d’adresses,

    protocole d’inondation, dissémination et agrégation de données dans les réseaux de

    capteurs. L’impact de l’auto-organisation est clairement constaté en comparant avec

    les approches classiques. Notons que la structure d’auto-organisation offre également

    une solution très efficace et très flexible pour la gestion de puits mobiles et multiples

    dans un réseau de capteurs. Le travail réalisé dans cette partie repose sur l’utilisation

    d’outils issus de la théorie des graphes, de l’algorithmique distribuée mais aussi de

    l’évaluation de performances.

    En parallèle, nous avons cherché à justifier l’utilisation d’approche auto-organisée

    (i.e. structurée) par rapport aux approches à plat. Pour ce faire, nous avons introduit

    une nouvelle métrique d’évaluation hérité de la notion d’entropie statistique. Cette

    métrique est la première métrique quantitative qui mesure l’ordre de l’organisation

    dans un réseau sans fil multi-sauts. Cette métrique ouvre de nombreuses pistes de

    recherches dans le domaine de l’auto-organisation des réseaux.

    Nous avons aussi proposé une plate-forme d’expérimentation composant des 30 cap-

    teurs. Cette plate-forme expérimentale est utilisée pour valider les solutions proposées.

    Ainsi, les contributions des travaux de la thèse couvrent à la fois le domaine théorique,

    mais aussi la simulation et l’expérimentation.

  • Contents vii

    Contents

    1 Introduction 1

    1.1 Popularity of Wireless Sensor Networks . . . . . . . . . . . . . . . . . . 2

    1.1.1 Advanced sensor nodes . . . . . . . . . . . . . . . . . . . . . . . 2

    1.1.2 Ease of deployment . . . . . . . . . . . . . . . . . . . . . . . . . . 4

    1.1.3 Versatile applications . . . . . . . . . . . . . . . . . . . . . . . . 5

    1.2 Description of WSN in Our Consideration . . . . . . . . . . . . . . . . . 6

    1.3 Motivations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

    1.3.1 Setting up and organizing . . . . . . . . . . . . . . . . . . . . . . 7

    1.3.2 Managing and maintaining . . . . . . . . . . . . . . . . . . . . . 8

    1.3.3 Support of applications and services . . . . . . . . . . . . . . . . 9

    1.3.4 Energy efficiency . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

    1.4 Organization of the Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . 10

    2 State of the Art 13

    2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

    2.2 Self-configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

    2.2.1 Autoconfiguration in IP networks . . . . . . . . . . . . . . . . . . 15

    2.2.2 Address conflict detection based solutions . . . . . . . . . . . . . 17

    2.2.3 Distributed DHCP solutions . . . . . . . . . . . . . . . . . . . . . 18

    2.2.4 Synthesis on self-configuration . . . . . . . . . . . . . . . . . . . 20

    2.3 Self-organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

    2.3.1 Network model formalism . . . . . . . . . . . . . . . . . . . . . . 22

    2.3.2 Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

    2.3.3 Virtual backbone . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

    2.3.3.1 Connected dominating set . . . . . . . . . . . . . . . . 25

    2.3.3.2 Maximal independent set . . . . . . . . . . . . . . . . . 26

    2.3.3.3 Relative neighborhood graph . . . . . . . . . . . . . . . 27

    2.3.3.4 Local minimum spanning tree . . . . . . . . . . . . . . 28

    2.3.4 Source dependent . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

    2.3.5 Synthesis on self-organization . . . . . . . . . . . . . . . . . . . . 29

    2.4 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

    3 FISCO: An Autonomous Architecture for WSN 33

    3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

    3.2 FISCO Highlights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

    3.2.1 Problem statement . . . . . . . . . . . . . . . . . . . . . . . . . . 34

  • Contents

    3.2.2 Hierarchical structure . . . . . . . . . . . . . . . . . . . . . . . . 353.2.3 Two-level address allocation . . . . . . . . . . . . . . . . . . . . . 36

    3.2.4 FISCO messages . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

    3.3 Join of Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383.3.1 One-hop address allocation . . . . . . . . . . . . . . . . . . . . . 39

    3.3.2 Two-hop address allocation . . . . . . . . . . . . . . . . . . . . . 40

    3.3.3 Creation of a new partition . . . . . . . . . . . . . . . . . . . . . 403.4 Departure of Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

    3.4.1 Departure of a member node . . . . . . . . . . . . . . . . . . . . 41

    3.4.2 Departure of a gateway node . . . . . . . . . . . . . . . . . . . . 42

    3.4.3 Departure of a leader node . . . . . . . . . . . . . . . . . . . . . 433.5 Partition Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

    3.5.1 Partition splitting . . . . . . . . . . . . . . . . . . . . . . . . . . 44

    3.5.2 Partition detection . . . . . . . . . . . . . . . . . . . . . . . . . . 453.5.3 Partition merge . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

    3.6 Local Re-organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

    3.7 Mesh Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483.8 Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

    3.8.1 Analysis on FISCO backbone . . . . . . . . . . . . . . . . . . . . 51

    3.8.2 Message complexity analysis . . . . . . . . . . . . . . . . . . . . 55

    3.9 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 553.9.1 Self-configuration related properties . . . . . . . . . . . . . . . . 56

    3.9.1.1 Configuration message overhead . . . . . . . . . . . . . 57

    3.9.1.2 Configuration latency . . . . . . . . . . . . . . . . . . . 583.9.1.3 Evolution of partitions during configuration . . . . . . . 59

    3.9.1.4 Energy consumption for configuration . . . . . . . . . . 60

    3.9.2 Self-organization related properties . . . . . . . . . . . . . . . . . 603.9.2.1 FISCO backbone . . . . . . . . . . . . . . . . . . . . . . 61

    3.9.2.2 Local structure characteristics . . . . . . . . . . . . . . 62

    3.9.2.3 Long term message overhead . . . . . . . . . . . . . . . 633.9.2.4 Energy consumption for organization . . . . . . . . . . 63

    3.9.3 Impact of re-organization on lifetime . . . . . . . . . . . . . . . . 65

    3.9.4 Energy consumption of FISCO mesh organization . . . . . . . . 65

    3.10 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

    4 Data Dissemination and Data Aggregation 69

    4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

    4.2 Data Dissemination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 724.2.1 Overview of data dissemination schemes . . . . . . . . . . . . . . 72

    4.2.2 Backbone based data dissemination . . . . . . . . . . . . . . . . 74

    4.2.2.1 Directed query forwarding . . . . . . . . . . . . . . . . 754.2.2.2 Data notification and data forwarding . . . . . . . . . . 76

    4.2.3 Management of multiple mobile sinks over BBDD . . . . . . . . 77

    4.2.4 Analysis on data dissemination . . . . . . . . . . . . . . . . . . . 78

    viii

  • Contents

    4.3 Data Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

    4.3.1 Where to aggregate . . . . . . . . . . . . . . . . . . . . . . . . . 82

    4.3.2 When to aggregate . . . . . . . . . . . . . . . . . . . . . . . . . . 83

    4.3.3 Adaptive-ARMA model for data aggregation . . . . . . . . . . . 85

    4.3.3.1 ARMA model . . . . . . . . . . . . . . . . . . . . . . . 85

    4.3.3.2 Local A-ARMA computation . . . . . . . . . . . . . . . 86

    4.3.4 Analysis on A-ARMA . . . . . . . . . . . . . . . . . . . . . . . . 88

    4.3.4.1 Accuracy and efficiency . . . . . . . . . . . . . . . . . . 88

    4.3.4.2 Under erroneous measurements . . . . . . . . . . . . . . 90

    4.3.5 Highlights of A-ARMA technique . . . . . . . . . . . . . . . . . . 93

    4.4 SODA Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

    4.4.1 Spatial packet merge on leader nodes . . . . . . . . . . . . . . . . 95

    4.4.2 Performance evaluation on data collection . . . . . . . . . . . . . 95

    4.4.2.1 Message cost during data collection . . . . . . . . . . . 97

    4.4.2.2 Active time during data collection . . . . . . . . . . . . 97

    4.4.2.3 Energy consumption during data collection . . . . . . . 100

    4.5 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

    5 Entropy of Organization 105

    5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

    5.2 Original Definitions of Entropy . . . . . . . . . . . . . . . . . . . . . . . 106

    5.3 Extended Definition of Entropy . . . . . . . . . . . . . . . . . . . . . . . 107

    5.3.1 Formulation of entropy . . . . . . . . . . . . . . . . . . . . . . . 107

    5.3.2 Interpretations of this formulation . . . . . . . . . . . . . . . . . 109

    5.3.3 Application of entropy on a simple network . . . . . . . . . . . . 109

    5.3.3.1 Flat organization scheme . . . . . . . . . . . . . . . . . 110

    5.3.3.2 LMST self-organization scheme . . . . . . . . . . . . . . 110

    5.4 Entropy Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

    5.5 Entropy Variation Evaluation . . . . . . . . . . . . . . . . . . . . . . . . 115

    5.5.1 When single node disappears . . . . . . . . . . . . . . . . . . . . 115

    5.5.2 When several nodes disappear . . . . . . . . . . . . . . . . . . . 117

    5.6 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

    6 Test-bed 123

    6.1 Description of Test-bed . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

    6.1.1 Imote2 hardware platform . . . . . . . . . . . . . . . . . . . . . . 124

    6.1.2 Basic communication architecture . . . . . . . . . . . . . . . . . 125

    6.1.3 MAC layer based on CC2420 driver . . . . . . . . . . . . . . . . 126

    6.1.4 Detailed architecture of network layer . . . . . . . . . . . . . . . 126

    6.2 Implementation of FISCO . . . . . . . . . . . . . . . . . . . . . . . . . . 128

    6.2.1 FISCO FSM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

    6.2.2 FISCO message format . . . . . . . . . . . . . . . . . . . . . . . 129

    6.3 Methodology of Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

    6.3.1 Funtional test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

    ix

  • Contents

    6.3.2 Performance test . . . . . . . . . . . . . . . . . . . . . . . . . . . 1316.4 Experimental Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131

    6.4.1 First node configuration . . . . . . . . . . . . . . . . . . . . . . . 1326.4.2 Configure to member . . . . . . . . . . . . . . . . . . . . . . . . . 1336.4.3 Configure to leader . . . . . . . . . . . . . . . . . . . . . . . . . . 133

    6.5 Conclusions and Discussions . . . . . . . . . . . . . . . . . . . . . . . . . 134

    7 Conclusions and Persperctives 137

    7.1 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1377.1.1 Autonomous architecture . . . . . . . . . . . . . . . . . . . . . . 1377.1.2 Self-organized mechanisms . . . . . . . . . . . . . . . . . . . . . . 1387.1.3 Framework solution . . . . . . . . . . . . . . . . . . . . . . . . . 1397.1.4 Entropy for quantifying organization . . . . . . . . . . . . . . . . 1397.1.5 Experimental Imote2 test-bed . . . . . . . . . . . . . . . . . . . . 139

    7.2 Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1407.2.1 Enrich the functionalities of the architecture . . . . . . . . . . . 1407.2.2 Security aspects of the solutions . . . . . . . . . . . . . . . . . . 1417.2.3 Scaling laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1417.2.4 Application tunable parameters . . . . . . . . . . . . . . . . . . . 142

    x

  • List of Figures xi

    List of Figures

    1.1 General architecture of a sensor node . . . . . . . . . . . . . . . . . . . . . 21.2 Imote2 node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

    2.1 DHCP server-client configuration . . . . . . . . . . . . . . . . . . . . . . . . 152.2 IPv6 stateless address autoconfiguration . . . . . . . . . . . . . . . . . . . . 162.3 Segmented address pools in Buddy [1] . . . . . . . . . . . . . . . . . . . . . 182.4 MANETConf [2] configuration process . . . . . . . . . . . . . . . . . . . . . 192.5 Prophet [3] address allocation . . . . . . . . . . . . . . . . . . . . . . . . . 202.6 A Unit Disk Graph of 120 nodes and radius=0.16 . . . . . . . . . . . . . . . 222.7 2.5-hop and 3-hop coverage set . . . . . . . . . . . . . . . . . . . . . . . . . 242.8 Example of CDS construction in [4] and [5] . . . . . . . . . . . . . . . . . . 262.9 RNG: pruning the longest edge . . . . . . . . . . . . . . . . . . . . . . . . . 282.10 Snapshots of self-organization structures: a network with 120 nodes, radius=0.16 30

    3.1 FISCO structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353.2 LDBR message format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363.3 Address space management in FISCO . . . . . . . . . . . . . . . . . . . . . 373.4 New node configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393.5 One-hop address allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . 403.6 Two-hop address allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . 413.7 The departure of a gateway . . . . . . . . . . . . . . . . . . . . . . . . . . 423.8 The departure of a leader . . . . . . . . . . . . . . . . . . . . . . . . . . . 443.9 Local re-organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483.10 Mesh backbone with different values of p . . . . . . . . . . . . . . . . . . . . 493.11 A topology with multiple gateways when p = 1 . . . . . . . . . . . . . . . . 503.12 FISCO mesh analysis with radius=0.18 . . . . . . . . . . . . . . . . . . . . 513.13 The number of nodes in S within node u’s neighborhood . . . . . . . . . . . 523.14 Motif: hexagon, octagon, dodecagon . . . . . . . . . . . . . . . . . . . . . . 533.15 Paving the space with hexagons . . . . . . . . . . . . . . . . . . . . . . . . 543.16 Configuration message overhead, radius=0.20 . . . . . . . . . . . . . . . . . 583.17 Configuration latency, radius=0.20 . . . . . . . . . . . . . . . . . . . . . . . 593.18 Evolution of the number of partitions from 1 to 400 nodes . . . . . . . . . . . 603.19 Energy saving in configuration, radius=0.20 . . . . . . . . . . . . . . . . . . 613.20 Cardinality of dominating set, radius=0.20 . . . . . . . . . . . . . . . . . . . 613.21 Properties of FISCO local structures, radius=0.14 . . . . . . . . . . . . . . . 623.22 FISCO sent and received control message cost, radius=0.14 . . . . . . . . . . 633.23 CDS and FISCO control message cost, radius=0.20 . . . . . . . . . . . . . . 64

  • List of Figures

    3.24 Energy saving in organization, radius=0.20 . . . . . . . . . . . . . . . . . . 643.25 Impact of re-organization in FISCO on network lifetime, radius=0.20 . . . . . 653.26 Impact of mesh organization on energy saving, radius=0.20 . . . . . . . . . . 66

    4.1 Communication in WSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . 704.2 Data dissemination: data centric routing and rendezvous systems . . . . . . . 744.3 Directed query forwarding structure on FISCO mesh backbone . . . . . . . . 754.4 Data forwarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764.5 Support for sink mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . 784.6 Analysis of communication overhead (average number of queries per sink q=50,

    average number of events per source node e=500, N=10000, r=0.1, α=0.3 for

    TTDD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804.7 Analysis of communication overhead (m=5 mobile sinks, n=10 source nodes,

    N=10000, r=0.1, α=0.3 for TTDD) . . . . . . . . . . . . . . . . . . . . . . 814.8 Block diagram of A-ARMA. . . . . . . . . . . . . . . . . . . . . . . . . . . 874.9 Applying ARMA and A-ARMA models on indoor temperatures. . . . . . . . 894.10 Accuracy and efficiency of the A-ARMA(2,2) on 720 samples. . . . . . . . . . 904.11 Accuracy and efficiency under independent errors . . . . . . . . . . . . . . . 924.12 Accuracy and efficiency under consecutive errors . . . . . . . . . . . . . . . . 934.13 Number of messages in data collection . . . . . . . . . . . . . . . . . . . . . 974.14 Average active time of sensor nodes in data collection (ideal MAC scheduling) 984.15 Average active time of sensor nodes in data collection (BMAC) . . . . . . . . 994.16 Factor of active time between BMAC and ideal MAC scheduling . . . . . . . 1004.17 Distribution of active modes among total active time . . . . . . . . . . . . . 1014.18 Average energy consumption on nodes . . . . . . . . . . . . . . . . . . . . . 102

    5.1 Flat organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1105.2 LMST organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1115.3 Entropy value of a topology of 4 nodes . . . . . . . . . . . . . . . . . . . . . 1115.4 Average entropy value on networks of 200 nodes, radius=0.16 . . . . . . . . . 1135.5 Average broadcast cost on networks of 200 nodes, radius=0.16 . . . . . . . . 1145.6 Probability Density Function of entropy variation for simple node disappearance 1165.7 Entropy variation of self-organization schemes for random geometric network,

    radius=0.16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1175.8 Entropy variation of self-organization schemes under different densities . . . . 119

    6.1 Basic communication architecture . . . . . . . . . . . . . . . . . . . . . . . 1256.2 Modules description in network layer . . . . . . . . . . . . . . . . . . . . . . 1276.3 Finite state machine of FISCO configuration . . . . . . . . . . . . . . . . . . 1286.4 Message header of FISCO . . . . . . . . . . . . . . . . . . . . . . . . . . . 1296.5 Setup for 30 Imotes test-bed platform . . . . . . . . . . . . . . . . . . . . . 131

    xii

  • Introduction 1

    Introduction 1In the past decade, wireless technologies have become key technologies, offering mo-

    bile and flexible communications for industries, enterprises and individuals. The GSM

    and CDMA wireless mobile networks are reaching the leadership as daily voice com-

    munications media, surpassing the wired telephone network. They are evolving from

    2nd generation to 3rd generation, with larger bandwidth, higher data transmission rate

    and better support of data and video transmissions. On the other side, the widely

    deployed wireless LANs with WiFi technology have also been great successes. The

    standard IEEE 802.11a/b/g [6] provides a bandwidth up to 54Mbps. This technology

    enables Internet connections everywhere as long as one has a laptop or a PDA. Around

    each person, Wireless Personal Area Networks (Wireless PANs) based on Bluetooth

    [7] technology, begin to appear which offer the possibility to connect different devices

    such as wireless handsets, PDAs and game controllers together to enrich the interac-

    tions between humans and environment. Another wireless technology Radio Frequency

    Identification (RFID) [8], standing for clear and contact-less identification of objects,

    enables rapid and automatic data acquisition via radio waves. It is changing the way

    of organization in retail, transportation and logistic.

    Beside all these wireless technologies, the Wireless Sensor Networks (WSNs) [9, 10]

    became popular in the past five years. More and more sensing applications take advan-

    tages of WSNs based on the collaborative efforts of a large number of sensor nodes. In

    this work, we place our focus on this new type of wireless networks. Particularly, we

    try to find autonomous solutions for networking and data communication in WSNs.

    In this chapter, we first discuss the popularity of wireless sensor networks from three

    principal angles: the designs of advanced sensor nodes, the ease of deployment and

    the versatile WSN applications. Secondly, the motivations of this work are stated as

    providing an autonomous architecture for WSN. This architecture’s objectives are to set

    up, organize, operate and manage the WSN as well as to support various applications

    and services.

  • Introduction

    Sensor Broad

    RAM Flash

    Infrared sensor

    Humidity sensor

    Temperature sensor

    Radio

    Micro−processor

    Power

    Supply

    Con−

    nector

    A/D Converter

    Sensor

    Con−nector

    Antenna

    Communication Broad

    Power Supply Broad

    Figure 1.1: General architecture of a sensor node

    1.1 Popularity of Wireless Sensor Networks

    Wireless Sensor Network becomes one of the hottest topics in both research and com-

    mercial fields. How can we explain its popularity?

    1.1.1 Advanced sensor nodes

    The individual processing, storage and communication capabilities of sensor nodes are

    relatively limited when comparing to personal computers or devices. However each of

    them uses low cost components and targets for low power operation. The size of a

    sensor node, as an individual communication unit, has also been dramatically reduced

    even comparing to the most up-to-date personal devices. Small size, low cost and low

    power operation make wireless sensor nodes significantly different from other wireless

    devices.

    We distinguish a sensor node from a sensor. A sensor node has capability to sense

    (taking measure from physical environment), to communicate (to other sensor nodes)

    and it has a power supply module (see Fig. 1.1). The sensing part is generally called

    a sensor (or a sensor board) which is a transduction device that measures some phys-

    ical quantities and converts them to electrical quantities. The sensor is connected to

    a communication board, so called the main board, via analog or digital Iuput/Output

    (I/O) interfaces. With the increase of versatile wireless sensor network applications,

    2

  • Popularity of Wireless Sensor Networks

    many advanced small powerful main boards such as Mica2/MicaZ [11], µAMPS [12]

    and Imote2 (Fig. 1.2(a) and 1.2(b)), have been developed to support in-network data

    processing and reporting of measurements. Table 1.1 gives the detailed hardware in-

    formation of these advanced sensor nodes. Besides, various modules have also been

    designed to supply energy to sensor nodes’ communication boards and sensor boards.

    Traditional batteries, solar chargers [13] and energy extracted from vibration [14] have

    been used as the possible ways of power supply.

    Table 1.1: Detailed specifications of MICA2/MicaZ, µAMPS and Imote2

    Components Mica2/MicaZ µAMPS Imote2

    Processor ATmega128L SA-1110 Intel PXA271Processor speed 7.3728 MHz 206 MHz 13-416 MHzSRAM 4 KBytes 16 KBytes 256 KBytesProgram Memory 128 KBytes 128 KBytes 32 MBytesData storage 512 KBytes 512 KBytes 32 MBytesSerial Interface UART GPIO UART&GPIO&mini-UOther Interfaces DIO, I2C, SPI No SPI I2C, I2SBattery 2x AA 4x AAA 3x AAAExternal Power 2.7 - 3.3 V 3.6 V 3.2 - 4.5 VExpansion Connector 51 pin 256 pin JTAGRadio CC1000[15]/CC2420 Bluetooth[7] CC2420 [16]Software TinyOs µOS TinyOS, Linux[17]

    It is worth noting that the research interests are also multiplied with the develop-

    ment of event-driven embedded operating system such as TinyOS [18]. TinyOS is an

    event-based operating environment/framework designed for using with embedded net-

    worked sensors, to support intensive concurrent operations needed by sensor network

    applications. It features a component-based architecture which enables rapid innova-

    tion and implementation while minimizing code size as required by the severe memory

    constraints inherent in sensor networks.

    The design of advanced sensor nodes can be summarized as to target the following

    three purposes:

    1. Low-energy operations. In the most cases, sensor nodes are battery supplied.

    Regarding to the variety of deployment terrains, it may be unfeasible to renew

    their energy resources. Therefore low power processing and communication are

    required to prolong the lifetime of WSNs. In the earlier design of sensor nodes,

    low-frequency micro-controller is used (in Mica2/MicaZ series) to ensure low con-

    sumption during the processing. In order to increase the processing capability,

    3

  • Introduction

    (a) Imote2 hardware components (b) Imote2 architecture

    Figure 1.2: Imote2 node

    more powerful CPU have been used lately in Imote2. Thanks to the low-frequency

    mode of these CPUs, moderate power operation is also possible. However there

    is always a trade-off between the processing capability and energy saving. Radio

    communication is another source of energy dissipation, even much more costly

    than processing operations. A comparison between computation and communi-

    cation cost [19] reveals that 3000 instructions can be executed for the same cost

    as the transmission of one bit over 100m. Using low power radio transceivers such

    as IEEE 802.15.4 [20] compatible radio module becomes the trend.

    2. Size and cost constraints. In order to benefit from collaborative operations of

    sensor nodes, a wireless sensor network is formed by hundreds of sensor nodes.

    Therefore sensor nodes should have small size, light weight and low cost to support

    large scale deployments. Mica2/MicaZ, µAMPS and Imote2 have shown the pos-

    sibility of embedding processing, communication and sensing on small platforms.

    However the cost of sensor nodes is still too high nowadays.

    3. Support of operating system. By running an operating system on small sensor

    nodes, both the communication protocols and applications can be developed with

    more flexibilities.

    1.1.2 Ease of deployment

    The needs for large scale sensor network and for intensive collaborative operations

    and computations change the way of deploying sensors. Sensor nodes are required

    to form multi-hop networks to communicate among themselves. It is a significant

    4

  • Popularity of Wireless Sensor Networks

    improvement over traditional sensors in the way that nodes can be randomly deployed

    in inaccessible terrains in case of disaster relief operation. In addition to the advances

    in sensor nodes hardware architectures, the power of wireless sensor networks also lies

    on the ability to deploy large number of nodes which configure and organize themselves.

    Through advanced distributed networking protocols, the sensor nodes form a virtual

    environment that extends the reach of cyberspace out into the physical world. Although

    the capability of any single sensor node is minimal, the composition of hundreds and

    thousands of nodes offers radical new technological possibilities.

    Unlike traditional wireless devices such as cell phones and PDAs, wireless sensor

    nodes do not need to communicate directly with the nearest base station, but only

    with nodes within its local area. Instead of relying on a pre-deployed infrastructure,

    each individual sensor node becomes a part of the overall infrastructure. Therefore

    a wireless sensor network should be able to configure sensor nodes under any possible

    node placement upon the deployment. Nevertheless real systems must place constraints

    on actual node placement; for example the physical topology should be connected to

    ensure the connectivity on network level. The wireless sensor network must be capable

    of providing feedback when these constraints are violated.

    In addition to an initial configuration phase, a WSN also has the capability to adapt

    to changing environmental conditions. The envisioned flexible self-organizing network

    architectures dynamically adapt themselves to support arrival of new nodes or to ex-

    pand to cover a larger geographic region. Furthermore, the network can automatically

    adapt to compensate for node failures. Throughout the lifetime of a deployment, nodes

    may also be relocated or other objects may appear in the radio environment which

    might interfere with the communication in the WSN. The network should be able to

    automatically reconfigure in order to tolerate these occurrences.

    1.1.3 Versatile applications

    The raise of its versatile applications is one of the propelling forces for researches in

    WSNs. Wireless sensor network applications cover a large range of applications from

    our daily life acme military usage. Agriculture, environment monitoring, health care,

    structure monitoring, intrusion detection, traffic monitoring and industries have made

    WSNs increasingly popular [21, 22, 23]. We envision that, in the near future, wireless

    sensor networks will be an integral part of our lives, more than the present-day personal

    computers.

    The common characteristics of wireless sensor applications are: large number of

    nodes, long lifetime and fault tolerance.

    5

  • Introduction

    1. The use of large number of sensor nodes increases the accuracy of the application

    and reduce the cost of prior study of the node placements. It also requires that

    networking protocols efficiently reduce the communication overhead and provide

    a virtual coordination for data report.

    2. Running for a long lifetime is required to minimize the human interventions from

    replacing sensor nodes, while ensuring the profitability of such deployed sensor

    network services and applications. Long lifetime obviously implies a low energy

    consumption of sensor nodes during the operation of the network.

    3. As the network ages, it is expected that nodes will fail over time. A large number

    of sensor nodes are deployed with redundancy, hence the failure of a fraction of the

    sensor nodes should not Hamper the operation of the application. Nevertheless

    the network should be capable of reconfiguring its nodes to handle node/link

    failure or to redistribute network traffic load.

    1.2 Description of WSN in Our Consideration

    Now that we have established the sensor nodes’ capabilities, constraints and the set of

    applications, we eventually consider a WSN as a network having following characteris-

    tics:

    1. A WSN is formed by small identical sensor nodes. Each sensor node has the

    same limited processing, storage and communication capabilities. A sensor node

    is supplied by limited energy resource on board.

    2. A WSN requires an easy deployment of sensor nodes in the field. Sensor nodes

    must configure themselves. An untrained person should be able to place sensor

    nodes throughout the environment and have the system simply work.

    3. No predefined communication infrastructure should be given when the network

    is set up. After the deployment, the sensor nodes should keep organizing among

    themselves to deal with the changes, so as to provide a flexible communication

    structure.

    4. Long lifetime is critical to many sensor network applications. In some applica-

    tions (such as environment monitoring, military and tracking applications), the

    goal is to have nodes placed out in the field, unattended, for months or years.

    Long lifetime also leads to much more convenient usage of WSNs in home and

    6

  • Motivations

    health application. The use of low-power electronic components is one way to

    provide energy saving. Moreover, the networking protocol used in WSNs should

    be energy efficient by keeping the nodes’ activity to a minimum (communication

    and computation).

    1.3 Motivations

    The popularity of wireless sensor networks also promotes a range of research topics,

    particularly around providing energy-optimized communication. A wireless sensor net-

    work is deployed to collect and report data while reducing human intervention and

    labor. The following scenario is an example of desired implementation and operation

    of a WSN.

    One may buy a box of sensor nodes from a store. These sensor nodes have been

    mass-produced and sold at low price. When the user gets them, they are identical

    but may be connected to various sensor boards or controllers. Once at home, the user

    places nodes around his house: on the ceiling for monitoring the lights, at every corner

    to monitoring the temperature or connected to air-conditioning and light switches for

    controlling. Once the nodes are deployed, he simply wants the network work! He

    wants to get a comfortable living space without configuring nodes one by one to set up

    addresses, data paths and communication structures!

    This work aims at providing an autonomous network architecture for WSNs to

    minimize the user’s tasks. The architecture makes the WSN run as an autonomous

    system where sensor nodes organize themselves without external configurations and

    interventions.

    This architecture is built and maintained by a set of mechanisms executed by all

    sensor nodes. It is the unique architecture upon the deployment of a wireless sensor

    network. It takes into account the constraints of sensor nodes as well as the requirement

    of sensor applications to set up, organize, manage and maintain the autonomous archi-

    tecture in WSNs. This work also addresses how to simplify the multiple development

    of networking protocols within the architecture.

    The motivations for such architecture are stated as follows along with the operation

    of WSNs.

    1.3.1 Setting up and organizing

    Each sensor node should be configured to set up a network, instead of working indepen-

    dently. Such configuration should be achieved by sensor nodes themselves, in order to

    7

  • Introduction

    save on human interventions. The corresponding mechanism is called self-configuration.

    Self-configuration allows sensor nodes to set up their addresses and parameters for data

    communications in WSNs. Although it has been addressed as Autoconfiguration prob-

    lem [1, 3, 24] in the field of Mobile Ad hoc Network (MANET) [25], the context of

    WSNs is different. Unlike a wireless LAN card containing a unique MAC address, sen-

    sor nodes are not necessarily manufactured with unique identifiers, because they are

    produced in mass quantities at low cost. Self-configuration scheme is the only way

    that a sensor node may get a unique address without any pre-defined identifier, man-

    ually configuration or centralized servers. A sensor node can communicate with other

    nodes only if it can be identified. Therefore self-configuration is one of the preliminary

    schemes for setting up communications in a wireless sensor network.

    After the self-configuration, the communication between two nodes which share a

    wireless channel can be established. However, in our point of view, multi-hop commu-

    nication is still impossible, unless a communication structure is built. Self-organization

    is the mechanism which aims at providing such a structure, more precisely a logic struc-

    ture on the top of physical network topology. All sensor nodes naturally participate in

    the overall structure. They collect information via the structure and they make local

    decisions to change it at the same time. Self-organization is an autonomous process, in

    which decisions of organization is not guided or managed by centralized elements. The

    structure of the self-organization is formed by all local structures around each node. It

    is a result of information exchanges and local decisions taken by sensor nodes.

    1.3.2 Managing and maintaining

    Throughout the life of a wireless sensor network, sensor nodes may fail or be relocated.

    It is also possible that new sensor nodes are introduced to cover a larger service re-

    gion. The autonomous architecture also has the role of compensating the influences

    of these events in the network. A new node should still be configured through the

    self-configuration mechanism and be integrated to the communication structure by

    self-organization. Besides, the failures of sensor nodes also bring about changes in

    the communication structure. Hence, the initial deployment and configuration is only

    the first step in the network lifetime. In the long term, the total cost (in terms of

    message, computation and energy) may have more to do with the maintenance cost.

    Self-configuration and self-organization that are used in the network set up, are con-

    tinuously running as self-maintenance mechanisms in order to deal with spontaneous

    changes in the network.

    As the network ages, the residual energy on board the sensor nodes decrease as well.

    8

  • Motivations

    Optimizing the energy consumption during the WSN’s life is another goal of managing

    and maintaining the network. In practice, some nodes may spend more energy than

    others, because of their particular roles in the network. The network management

    should also spread the energy cost over all sensor nodes.

    1.3.3 Support of applications and services

    One purpose of this autonomous architecture is to provide a general platform for easy

    implementation of applications and services. The autonomous architecture makes the

    physical changes transparent to the upper applications and services. Several proper-

    ties are conserved along with the network operation. One may take advantages of

    these properties to improve the effectiveness and efficiency of running applications and

    services.

    Data dissemination and data aggregation are considered in this work as two examples

    of basic services in wireless sensor networks. How to provide efficient data dissemination

    and data aggregation are the core problems of many applications such as environment

    monitoring and tracking applications. Both of them are supported by the autonomous

    architecture that we proposed for WSNs. The additional cost of running data dissemi-

    nation and data aggregation is dramatically reduced, and the overall message cost and

    energy consumption are lower as well. The results (see in chapter 4) confirm the positive

    impacts on the applications and services of using an autonomous network architecture.

    1.3.4 Energy efficiency

    It is worth noting that such an autonomous architecture should achieve energy efficiency

    during its generation, maintenance as well as lifelong operation. As explained in section

    1.1.1, the wireless sensor nodes are extremely energy constrained due to their small

    size and low cost. Whilst the majority of WSNs applications targets long lifetime, the

    utilization of the autonomous architecture should optimize the communications to meet

    high energy efficiency. Furthermore, the additional energy consumption generated from

    the executions of the autonomous architecture should also be minimized.

    Unfortunately, a number of networking mechanisms proposed for WSNs still adopt

    energy-hungry techniques. The utilization of HELLO message is the most popular tech-

    nique for topology control and organization in WSNs, while it generates a significant

    control overhead and is very energy consuming.

    The autonomous architecture that we propose in this work as well as all of the asso-

    ciated mechanisms aim at providing energy savings during the entire life of WSNs. The

    9

  • Introduction

    energy efficiency are particularly considered and analyzed as one of the most important

    performance metrics.

    To summarize, the motivations of this work is to provide efficient and low-cost mech-

    anisms from the deployment to the effective execution of services and application in

    WSNs.

    1.4 Organization of the Thesis

    This thesis is organized in 7 chapters. Chapter 2 presents some prior contributions to

    the networking of wireless sensor network. We point out that self-configuration and

    self-organization are two key mechanisms for WSNs. The aim of self-configuration is to

    let nodes set up addresses and parameters without any manual intervention (minimize

    user’s tasks), so that nodes may identify each other in a communication. There exist

    two class of self-configuration schemes: Duplicated Address Detection (DAD) based

    and Distributed Dynamic Host Configuration Protocol (DDHCP) based. Several works

    are reviewed. It is shown through discussions that few of them conform with the energy

    constraints of WSN. Self-organization aims at structuring the network (i.e. provide a

    communication structure) through merely local information and decisions. Clustering,

    virtual backbone based and source dependent self-organization schemes are discussed.

    Once again the energy efficiency is the most critical problem to these schemes. By

    analyzing and identifying the shortcomings in the existing self-configuration and self-

    organization solutions, we point out the necessity of our autonomous architecture.

    We propose, in chapter 3, an autonomous architecture which combines self-configuration

    and self-organization, named FISCO (Fully Integrated Scheme of self-Configuration and

    self-Organization). This autonomous architecture is motivated by improving efficiency

    of the network formation and organization. Our point of view is that self-configuration

    and self-organization are two relevant schemes for wireless sensor networks. A unique

    structure is generated and maintained with the autonomous architecture for both

    conflict-free address allocation and data communication. The autonomous architecture

    is built with event-driven procedures, while the use of periodical actions are optimized

    in order to avoid control overhead and provide energy saving during its operation. Our

    architecture integrating two mechanisms exhibits significant improvements comparing

    to existing solutions, not only in the energy efficiency but also in other properties such

    as the cardinality of backbone, etc. The performance results also indicate the reduction

    on total energy consumption and the extension on network lifespan.

    In chapter 4, we discuss the usage of FISCO architecture, by exploring data dis-

    10

  • Organization of the Thesis

    semination and data aggregation. One of the goals of running FISCO structure is to

    provide further improvement in intensive data communication, such as easing path set

    up between source nodes and sink nodes or providing energy saving. We show in this

    chapter that the use of FISCO architecture may provide an flexible and low-cost data

    dissemination structure. It also supports data aggregation techniques to provide sig-

    nificant energy saving during data reporting. Through a set of simulations, the impact

    of FISCO are clearly highlighted, by comparing the cost and the result of running

    data dissemination and data aggregation schemes with and without the autonomous

    architecture. We also propose a localized temporal data aggregation technique based

    on Adaptive AutoRegression Moving Average (A-ARMA) technique. It is shown that

    using an adaptive technique such as A-ARMA is better than non-adaptive methods,

    because it achieves low complexity, high accuracy and good efficiency at the same time.

    Chapter 5 addresses a fundamental question in wireless sensor networks, more gener-

    ally wireless multi-hop network: how to define a good organization? Although metrics

    such as complexity or self-stability are commonly used for evaluation, to the best of

    our knowledge, none of them quantifies the efficiency of building and maintaining an

    organization (order) under connection changes. In this chapter, the notion of entropy

    is adopted as a metric for evaluating the organization of a network where different

    self-organization schemes are used. This approach provides several quantitative and

    qualitative insights into the behavior and design of self-organization protocols. For

    example, any of the chosen protocols yields a higher organizational state than a flat

    topology.

    Chapter 6 presents our work on building a test-bed based on 30 Imote2 sensor nodes in

    FranceTelecom R&D center in Beijing. We designed and implemented a protocol stack

    based on an embedded Linux OS for wireless sensor nodes. A partial implementation

    of FISCO scheme is available on this test-bed. Through a set of functional tests, the

    correctness of the FISCO implementation is validated. The Imote2 test-bed shows that

    it is possible, with commercial sensor nodes, to validate the autonomous architecture

    proposed in this thesis. It is also a step from the design to the practice. This test-bed

    will be used in FranceTelecom R&D center as an extensible hardware platform with

    stable development environment for further demonstrations of WSN.

    Chapter 7 summarizes the thesis and gives a prediction of future technological trends.

    The major contribution of this thesis is that we designed a complete solution for net-

    working in WSNs which covers deployment, configuration, organization and data com-

    munications. This work also leads to several perspectives which are not limited to the

    functionalities of the architecture, but also extended to security and applications. This

    11

  • Introduction

    thesis was financed and supported by France Telecom R&D under CRE No 46130157.

    It is realized at CITI Laboratory of INSA Lyon, in the ARES Team of INRIA Rhône-

    Alpes, under the direction of Doctor Fabrice Valois and Professor Eric Fleury.

    12

  • State of the Art 13

    State of the Art 22.1 Introduction

    As addressed in the introduction (section 1.3), the quality of service provided by a

    wireless sensor network relies on an autonomous network architecture. It is not a single

    scheme, but the combination of mechanisms which support the operation of a WSN

    from its deployment onward, including self-configuration, self-organization, self-healing

    and self-management.

    Self-configuration [26, 27] is the first action to take when sensor nodes are deployed.

    The aim of self-configuration is to let nodes set up addresses and parameters without

    any manual intervention. Address allocation is known as the core problem of self-

    configuration. The main issue of address allocation in multi-hop wireless network with-

    out a pre-defined infrastructure (including both ad hoc networks and wireless sensor

    networks) is how to ensure the uniqueness of allocated addresses in the entire network.

    Solutions using centralized address servers are not optimized to work for large scale

    sensor networks. The use of server-client approach even becomes a bottle-neck of con-

    figuration performance. Indeed, the self-configuration should achieve a distributed and

    dynamic address allocation in WSNs. It should deal with random deployment of spo-

    radic node arrival by an immediate join procedure. Furthermore, it should handle the

    problem related to address conflicts during partition splitting and partition merging in

    the network.

    Self-organization [28, 29] in our point of view is defined as a process aiming at struc-

    turing the network through purely local information and decisions. The logic structure

    of the network is represented by relations between neighboring nodes (as logic links)

    and node roles in the network. Using self-organization instead of a pre-defined structure

    makes the communication structure scalable, flexible and adaptive. According to local

    information and localized algorithm, nodes form local structures. The self-organization

    structure is built based on these local structures. It reflects the emerging behavior in

  • State of the Art

    the network from pure local decisions.

    Self-healing [30, 31] aims at adapting the network to keep certain properties that

    have been established. It is highly related to the notion of stability, because it runs for

    maintaining the structure built by self-organization facing spontaneous changes such

    as node failures, relocations, etc. Self-healing also adjusts the structure of organization

    partially or entirely on-the-fly to optimize the real time performance such as energy

    consumption. Hence, we consider self-healing as a part of self-organization.

    Self-management [32, 33] deals with the control of the services based on the au-

    tonomous architecture. It benefits from the autonomous architecture to improve the

    quality of service in the network. Different from other mechanisms, it also involves

    application configurations and parameters. As we target an autonomous network ar-

    chitecture, the self-management is beyond the scope of this work. Nevertheless it is

    discussed as one of our perspectives in section 7.2.

    The objective of this chapter is to review the existing works before proposing an

    autonomous network architecture, while self-configuration and self-organization are two

    indispensable mechanisms for this end. Therefore this chapter is organized as follows:

    Section 2.2 reviews prior contributions to self-configuration. The majority of these

    works is in the context of ad hoc networks, where self-configuration aims at providing

    dynamic address allocation solutions in a network. Section 2.3 reviews the major works

    in self-organization in ad hoc and wireless sensor networks. Clustering based, virtual

    backbone based and source dependent self-organizations are considered. Based on the

    resulting structure, virtual backbone based self-organizations are further classified into

    Maximal Independent Set (MIS), Connected Dominating Set (CDS), Local Minimum

    Spanning Tree (LMST), Relative Neighboring Graph (RNG). It is after identifying the

    concepts and weaknesses in these solutions that we propose an autonomous architecture

    in the next chapter.

    2.2 Self-configuration

    It is worth noting that some WSN applications do not require nodes to be identified by

    logic addresses such as IP addresses. In such applications, coordinates [34] or contents

    [35] are used for data reporting. However the routes can not be recorded or reused if

    nodes can not be identified. Therefore assigning addresses to sensor nodes facilitates the

    data communication in WSN. Moreover, for most of WSN applications, the addressing

    is indispensable.

    Although the majority of self-configuration schemes reviewed in this section were

    14

  • Self-configuration

    Client

    DHCP_ACK

    DHCP_REQUEST

    DHCP_OFFER

    DHCP_DISCOVER

    Server

    Figure 2.1: DHCP server-client configuration

    proposed for ad hoc networks, it is worth noting that self-configuration is not a new

    notion for IP networks, especially known as autoconfiguration in IPv6 networks. Before

    embarking on to the self-configuration schemes in ad hoc network, let us first take a

    glance at the mechanisms used in IP networks in order to demonstrate that they can

    not be directly applied in our context.

    2.2.1 Autoconfiguration in IP networks

    Already available for IPv4, Dynamic Host Configuration Protocol (DHCP) [36] is the

    most used autoconfiguration protocol for address allocation in wired networks and AP-

    based wireless networks. It is built on a server-client model, where designated DHCP

    servers allocate IP addresses and deliver configuration parameters to hosts. Client-

    server exchanges in DHCP involve four messages (as shown in Fig. 2.1). DHCP is also

    known as a stateful autoconfiguration protocol because all the address allocation states

    are stored (in DHCP servers) during the configuration.

    IPv6 [37], Internet Protocol version 6, is designed as an evolutionary step from IPv4

    with some main changes such as: expanded addressing capability, improved support

    for extensions and options, extensions for authentication and privacy, etc. As one

    of the improvements, IPv6 integrates a stateless autoconfiguration [38] for traditional

    hierarchical networks to deal with those networks without DHCP servers.

    In a IPv6 stateless autoconfiguration, the following steps are performed by a host

    once it joins the network on a physical link (see Fig. 2.2):

    1. The host generates locally a link-local address that is based on the interface

    identifier (IEEE 64-bits Extended Universal Identifier) and a pre-defined link-

    local prefix (FF02::1/64). The state of this address is set to Provisioning.

    2. A Duplicated Address Detection (DAD) procedure is launched by the host to

    have the uniqueness of its provisioning address verified. A Neighbor Solicitation

    15

  • State of the Art

    Provising link−local @

    Yes RA

    No RARA

    RS

    No NA

    NA Yes NA

    NS

    Working with link−local @Obtain prefix

    Link−local @

    Figure 2.2: IPv6 stateless address autoconfiguration

    (NS) message is sent out with the provisioning address as the target address. The

    source address is the all-zero address; the destination IP address is the solicited-

    node multicast address. If the address is already in use by another host in the

    network, then it replies with a Neighbor Advertisement (NA) message. An address

    conflict is henceforth recognized. Either a manual configuration or a regeneration

    of link-local address is required. If there is no answer to the NS within the timeout,

    the address is assigned to the interface and the state of the address changes to

    Preferred.

    3. The host sends a Router Solicitation (RS) in order to determine the global prefix.

    The RS message is sent to the all-routers multicast group of FF02::2.

    4. If there is a router on the link, then it replies with a Router Advertisement (RA).

    Because the uniqueness of EUI-64 has already been verified in DAD with link-

    local interface, there is no need to repeat it for the global address. The host

    simply combines the prefix with the interface identifier. If no RA is received in

    timeout, the host keeps communicating with its link-local address.

    Although DHCP and IPv6 stateless autoconfiguration are widely used as the standard

    address configuration techniques in the networks which have pre-defined infrastructures,

    neither of them is applicable in ad hoc and wireless sensor networks. The major problem

    comes from the scalability. In ad hoc or wireless sensor networks, nodes do not reside

    on the same physical links. The discoveries of DHCP servers as well as duplicated

    addresses are not time bounded. They are achieved through a flooding because there

    is no pre-defined structure in the network. It is not only message costly but also time

    16

  • Self-configuration

    consuming. To reduce the configuration cost and duration, self-configuration has been

    investigated as a particularly important problem in ad hoc and wireless sensor networks

    where two approaches have been proposed.

    2.2.2 Address conflict detection based solutions

    The first approach relies on DAD [24] mechanism. If the network diameter is known in

    advance, then the duplicate address can be detected within a timeout. This is known

    as Strong DAD. However when the network diameter is unknown, which is actually the

    case in ad hoc and wireless sensor networks, the DAD can not be achieved in a given

    timeout. Hence Weak [39] and Passive DAD [40] mechanisms are proposed to resolve

    this issue of Strong DAD. Contrary to Strong DAD, they only prevent a packet from

    being routed to a wrong destination.

    Weak DAD [39] tolerates duplicate addresses in the network after the local generation

    of addresses as long as all packets are delivered correctly. A unique per-node key is

    assumed to be included in the routing control packets and the routing table entries,

    but is not embedded in IP address. If two nodes happen to have chosen the same

    IP address, then they can still be identified by their keys. It is worth noting that a

    new implementation of Weak DAD is required every time a different MANET routing

    protocol is used (eg. its implementation over link state routing is different from that

    over dynamic source routing). This increases the development cost of Weak DAD.

    Passive DAD [40] is similar to Weak DAD. Address conflicts are detected passively

    by nodes using continuous monitoring on routing control traffic. It was initially built

    for link state routing protocols, and then extended to work with reactive routing pro-

    tocols as well. A node analyzes incoming protocol packets, including date packets and

    control packets, to derive hints about address conflicts. The basic idea is to apply

    various Passive DAD algorithms to exploit protocol events that 1) never occur in case

    of a unique address, but always in case of duplicate addresses or; 2) rarely occur in

    case of a unique address, but often in case of duplicate addresses. In the first case, de-

    tection is certain while in the second case a conflict is probably occurring. In order to

    have a certain confidence on the conflict detection, long-term monitoring is necessary.

    Although this approach does not incur extra overhead in the network, it heavily relies

    on the underlying routing protocol. Furthermore, the correctness and effectiveness are

    strongly affected by the particular parameter settings of the routing protocol.

    17

  • State of the Art

    A

    DB

    B

    80 − 12764 − 79

    0 − 127

    64 − 1270 − 63A

    Address

    Figure 2.3: Segmented address pools in Buddy [1]

    2.2.3 Distributed DHCP solutions

    The second approach of self-configuration is to build a distributed version of DHCP

    in ad hoc and wireless sensor networks. The idea is to assign the DHCP functionality

    to every node. Each node has capability to allocate addresses to other nodes on the

    same wireless link. The allocation is hence limited to one-hop. In order to avoid address

    duplication in the entire network, nodes should exchange address allocation information

    and maintain this knowledge synchronized among them.

    [1] proposes to use Buddy system (a well known method for memory management) in

    address allocation. When a node join the network, it asks one of its one-hop neighbor

    nodes for an address allocation after a discovery procedure. The latter node acting as

    a DHCP server, named Buddy node in the proposal, responses back by giving the half

    of its current address pool. The new node now gets its own DHCP address pool and

    assigns itself the first address of its address pool. The address space is hence divided

    into a binary tree with the arrival of nodes in the network (see Fig. 2.3). Nodes should

    synchronize from time to time to keep the records of IP address assignment in the entire

    network and detect any IP address leak for recover.

    However the binary division of address space has several inconveniences. First, it

    causes a non-uniform distribution of addresses. A massive arrival of nodes may cause

    some region of the network to run out of addresses, while many addresses are not used

    in another region. Secondly, the binary address tree (Fig. 2.3) reaches very quickly

    its leaf level (no address is available on leaf nodes) within an exponential speed 2n.

    When a node goes out of addresses, it has to go through its buddy nodes (parent nodes

    in the binary address tree) until one buddy node replies to the request with available

    addresses. An unpredicted amount of message overhead is generated in this address

    pool searching. Furthermore, if several partitions are generated during the network

    deployment, then each partition has its own binary address tree. It is difficult to merge

    18

  • Self-configuration

    nor Allocate Pending tables

    Neighbor discovery

    Informing all MANET

    Selecting an @ which

    Select node A as Initiator

    A B

    MANET node New arrival node

    Neighbor_Reply

    Neighbor_Query

    Requester_Request

    @ + Allocated Table +Allocate Pending Table

    nodes of this configuration

    is neither in Allocated

    Figure 2.4: MANETConf [2] configuration process

    binary address trees when these partitions meet, because the address pools used in one

    partition should be completely transformed to a branch of the other. It increases not

    only the message overhead but also the complexity of computation. Hence it does not

    meet the requirements of wireless sensor networks.

    MANETconf [2] is another distributed DHCP solution for ad hoc networks. In order

    to maintain the address information, every node holds an Allocated and an Allocate

    Pending tables. The first one contains the set of all IP addresses in use and the second

    one notes all addresses used in the procedure of allocation. When a node joins the

    network, it sends a one-hop Neighbor Query message to find a configured node (see

    Fig. 2.4). The first replying neighbor is considered the DHCP server for the new node.

    It allocates an address which is neither in Allocated or Allocate Pending tables. This

    node also informs all other nodes of this allocation via flooding. At the same time, the

    Allocated and Allocate Pending tables are duplicated in the new node.

    In order to deal with partition splitting, merge, initiator crash and concurrent alloca-

    tion, additional mechanisms are proposed. However the flooding used for each address

    allocation limits the scalability of the solution and generates a significant message over-

    head.

    Prophet Addressing [3] uses a function f(n) to assign no-conflict addresses to nodes.

    The scheme is simple and entails low overhead as long as f(n) has good properties.

    Address allocation is considered as an assignment of different numbers from an integer

    range to different nodes. The first node A in the network chooses a random number

    as its address and uses a random state value as the seed for its f(n) (Fig. 2.5). The

    second node, say node B, joins the network as a neighbor of node A and asks node

    A for an address allocation. Node A uses f(n) to compute a new address from its

    address and its state value. A new state value is also generated for the next round of

    19

  • State of the Art

    @_1, state_1

    A

    A

    A

    D

    B

    BC

    f(@_2, state_2) = (@4, state_4)f(@_1, state_2) = (@3, state_3)

    f(@_1, state_1) = (@2, state_2)

    @_4, state_4@_2, state_4@_3, state_3@_1, state_3

    @_2, state_2@_1, state_2

    Figure 2.5: Prophet [3] address allocation

    address generation. The new address and the new state value are sent back to B, from

    which the node is able to generate addresses without conflict. The f(n) also creates an

    tree-like address hierarchy in the network (Fig. 2.5).

    However, the tree-like address hierarchy causes problems in partition merge. First,

    nodes need send periodical HELLO message to detect address conflicts in two partitions.

    Upon the address conflict detection, all nodes in one partition have to give up their

    address and re-configure themselves using the state value of the other partition. This

    mechanism generates significant message overhead and increases computation cost dur-

    ing address re-configuration.

    2.2.4 Synthesis on self-configuration

    It is much more difficult to achieve self-configuration in a wireless multi-hop network,

    especially in a wireless sensor network, than in traditional IP networks. Nevertheless

    it is a key mechanism to WSN deployment for the following reasons:

    1. Different from the production way of wired/wireless LAN card, wireless sensor

    nodes are required to be manufactured in large quantities at low cost. In order to

    reduce the production cost, wireless sensor nodes are note expected to have any

    unique hardware addresses. Therefore it is necessary to develop address allocation

    mechanisms for WSNs.

    2. Because WSNs are multi-hop networks usually deployed in large scale, it is infea-

    sible to implement centralized servers. Self-configuration provides dynamic and

    distributed address allocations in WSNs.

    3. Remember wireless sensor nodes have very limited energy resources. Hence, low

    energy consumption and low message overhead are critical for self-configuration

    in WSNs.

    Although the existing approaches tried to adapt the techniques used in traditional

    IP networks to ad hoc network and wireless sensor networks, they do not meet all the

    20

  • Self-organization

    requirements, especially because of their significant control message overhead.

    1. The technique of Strong DAD is applicable in an ad hoc or wireless sensor network

    only if its network diameter is known in advance. Otherwise, a node is not sure

    to get a duplicate detection response within a timeout. Furthermore, the DAD

    messages injected during the flooding in the network is a harmful overhead for

    network deployment.

    2. Weak/Passive DAD is an alternative to Strong DAD, in which address conflicts are

    detected by examining incoming and outgoing routing messages. This approach

    does not generate additional control message only because routing messages are

    used to this end. The efficiency of this technique also highly relies on the under-

    lying routing protocol, and its implementations vary from one routing protocol

    to another. This causes a significant development cost.

    3. In distributed DHCP approach, the idea is to make every node a DHCP server in

    the network. A node asks one of its neighbor nodes for an address allocation. The

    core problem in this approach is how to maintain the address information updated

    on all nodes in the network to keep a coherent view for next address allocation

    without conflict. To this end, either periodical one-hop HELLO messages or flooding

    are used to synchronize addresses in the network. However, this synchronization

    on all nodes leads to significant message overhead.

    2.3 Self-organization

    It is worth distinguishing self-organization from the notion of self-organized. Self-

    organized is a properties related to mechanisms. For instance, unicast routing in ad

    hoc and wireless sensor networks should be self-organized. However, the notion of self-

    organization in our consideration is a basic concept to create order and to provide a logic

    structure in the network. Certainly, the mechanisms used in self-organization should

    be self-organized. Nevertheless, comparing to individual self-organized protocols, self-

    organization has a more general purpose: organizing and structuring the network. It is

    also around this idea that we develop our autonomous network architecture. Hence, the

    prior works revised in this section all aim at forming a structure in the network. They

    are classified into three categories: clustering based, virtual backbone based and source

    dependent structure. The virtual backbone based solutions can be further divided into

    CDS, MIS, LMST and RNG according to the properties of the resulting structures.

    21

  • State of the Art

    Figure 2.6: A Unit Disk Graph of 120 nodes and radius=0.16

    The algorithms that we reviewed in this section have also been used to deal with

    topology control problems in wireless ad hoc and sensor networks. Topology control

    [41] aims at controlling the topology of the graph representing the communication links

    between nodes, while reducing energy consumption and/or interference that are strictly

    related to the nodes’ transmitting range. Both clustering and virtual backbone based

    algorithm can be applied to this end. However self-organization that we focus on in

    this section has a more general goal. It not only deals with individual transmission

    assignment, but also takes care of an emerging behavior in the entire network.

    Before embarking onto different algorithm, we shall subsequently define the formalism

    of network model based on which the properties of structures are formulated.

    2.3.1 Network model formalism

    A wireless network is generally modeled as a graph, where nodes are represented as

    vertexes and radio links as edges. If all links are symmetric, then the graph is a non-

    oriented graph. If all nodes use the same radio transceiver with identical transmission

    powers, then the radio vicinity of a node is a disk of ray R (normalized between 0 tp

    1). In this case, the network is modeled as a Unit Disk Graph (UDG). Fig. 2.6 gives

    an example of UDG with 120 nodes and radius at 0.16.

    We introduce here the notations we used in this thesis:

    • G = (V,E): the graph representing a wireless network, where V is the vertex setand E ⊆ V 2 the edge set.

    • (u, v): the edge exists between two vertex u and v if and only if v can receive

    22

  • Self-organization

    correctly the message sent by node u.

    • |X|: the cardinality of a vertex set X.

    • Nk(u): the neighbor set of vertex u within k-hop distance to u. By simplification,N(u) = N1(u), where N1(u) = {v|(u, v) ∈ E}).

    • ∆k(u): the number of k-hop neighbors (∆k(u) = |Nk(u)|). ∆1(u) is also definedas the degree of node u.

    • dist(u, v): the hop distance between u and v.

    It is possible to introduce the arrival and departure of nodes as well as node mobility

    in this graph model. The arrivals and departures can be modeled as random processes.

    For example, we can consider the arrival as a Poisson process, while the lifetime of a

    host in the network is exponentially distributed. There are also some mobility models

    in the literature [42].

    Although a real radio environment does not correspond exactly to the UDG model,

    it shows a number of properties which simplify the analysis of geometric structure in

    the network. The use of UDG model gives an idea on the bound properties of target

    structures. Certainly, it is not considered as the tool which gives detailed performance

    results for a solution.

    2.3.2 Clustering

    Cluster is a basic structure used in network organization. Each cluster is a set of nodes

    which is grouped within a geographical area. A clusterhead is in charge of a set of

    specific functionalities within its cluster. Organizing a wireless network into clusters

    necessitates a distributed clusterhead election algorithm.

    [43] is one of the fundamental works in clustering. The election of clusterhead is based

    on the lowest identifier: node u is elected as a clusterhead if its identifier is the lowest

    among its neighbors N(u). To this end, nodes need communicate their identifiers to

    their neighbors at the beginning of the election. Non-clusterhead nodes join the cluster

    whose clusterhead has the lowest identifier and become cluster members. Some of them

    become gateways, if they have neighbors belonging to other clusters. The network is

    partitioned into clusters where each cluster has one clusterhead and several gateways

    and members. In such structure, there is no adjacent clusterheads and the clusterheads

    are spaced at most by 2-hop. This solution needs synchronization for launching an

    election phase. And it takes a number of iterations to finalize the election. We also

    note that high message overhead is generated.

    23

  • State of the Art

    3−hop coverage

    w

    vu Member

    Gateway

    Clusterhead

    2.5−hop coverage

    Figure 2.7: 2.5-hop and 3-hop coverage set

    [44] also uses lowest identifier based clusterhead election, but extends with a localized

    backbone construction to connect clusters in the network. To this end, 2.5-hop cov-

    erage set of a clusterhead u is defined as a set which includes all the clusterheads in its

    2-hop neighbor set N2(u) and the clusterheads having members in N2(u). It is different

    from u’s 3-hop coverage set, which includes all the clusterheads in N3(u). In Fig. 2.7,

    clusterhead v and w are in 3-hop coverage set of u. However, w is not in 2.5-hop cover-

    age set of u, because none of w’s neighbor is in N2(u). Clusterheads collect 1-hop and

    2-hop information from their neighbors to construct a 2.5-hop coverage set once they

    are selected. By using a greedy algorithm, each clusterhead selects a set of gateways to

    interconnect clusterheads in its 2.5-hop coverage set. A node should broadcast several

    rounds of messages before it gets a stable role in the network (clusterhead, gateway or

    member). This solution does not overcome the high message overhead neither.

    [45] proposes to use a metric composed of residual energy and node’s degree to adjust

    the backoff time before broadcasting a clusterhead decision. In this way, nodes with

    more residual energy have a bigger chance to be elected as clusterheads. Low power

    transmissions are used within each cluster, while clusterheads use higher transmission

    power to communicate among themselves. However, the energy consumption for the

    clusterhead election remains high because the maximum transmission power is used for

    sending election messages. Furthermore, the election should be renewed periodically in

    order to take into account the energy dissipations on nodes.

    2.3.3 Virtual backbone

    Here, the algorithms aim at generating a virtual backbone which covers all nodes in the

    networks. Some virtual backbones represent a dominating set of the network (in case of

    24

  • Self-organization

    CDS and MIS), while the others contain all nodes but with a subset of communication

    links (in case of LMST and RNG). Nevertheless, the goal stays the same: simplifying

    the physical structure and providing a logic structure based on localized decisions.

    2.3.3.1 Connected dominating set

    A Connected Dominating Set (CDS) S is defined as a subset of the vertex set V , which

    satisfies two characteristics:

    • Every node of V is either in S or a neighbor of a node in S.

    • S is connected.

    The formulation of CDS is:

    ∀u ∈ V, ∃v ∈ S|v ∈ N(u) (2.1)∀(u, v) ∈ S2, ∃p = Pathu→v|∀w ∈ p,w ∈ S (2.2)

    By extending the formula (2.1) to k-hop neighborhood, we obtain the definition of

    k-CDS:

    ∀u ∈ V, ∃v ∈ Sk|v ∈ Nku (2.3)

    CDS based self-organizations aim at computing a CDS with small cardinality and

    low computation complexity using distributed algorithms. Computation of a Mini-

    mum CDS (MCDS) is known as a NP-hard problem. Hence, many distributed CDS

    construction algorithms are designed to compute an approximate MCDS.

    One localized algorithm is proposed in [4] by Wu and Li. They assume that each

    node in the network owns a unique identifier. Nodes send periodic HELLO messages

    to exchange neighbor lists with their one-hop neighbors. Each node hence has the

    knowledge of 2-hop neighborhood. A node marks itself as dominating node if any pair

    of its neighbors is not directly connected. After this marking procedure, all dominating

    nodes form a CDS, but the cardinality of this CDS is very big. In order to reduce the

    size of CDS, two self-pruning rules are adopted.

    1. If node u is a dominating node in current CDS and there exists one neighbor of

    u, say v, whose one-hop neighbor set N(v) includes the N(u), and the ID(u) <

    ID(v), then node u becomes a dominated node.

    25

  • State of the Art

    1

    8

    5

    4

    3

    2

    6

    7

    9

    (a) Marking process

    1

    8

    5

    4

    3

    2

    6

    7

    9

    (b) Rule 2 [4]

    5

    Dominated node

    Dominating node

    6

    2

    1

    7

    9

    8 4

    3

    (c) Rule k [5]

    Figure 2.8: Example of CDS construction in [4] and [5]

    2. If node u is a dominating node in current CDS and there exist two neighbors of u,

    say v and w, whose one-hop neighbor set union N(v)∪N(w) includes N(u), andID(u) = min(ID(u), ID(v), ID(w), then node u becomes a dominated node.

    The self-pruning rules reduce significantly the cardinality of CDS. In [5], an enhanced

    rule, Rule k, is proposed. If the neighbor set of a dominating node is covered by a set

    of k neighbor nodes, and it has the lowest identifier, then it becomes a dominated node.

    Rule k is more efficient in reducing dominating set size than the combination of Rules 1

    and 2, and has the same communication complexity and less computation complexity.

    Fig. 2.8(a)-2.8(c) illustrates the CDS construction algorithm of Wu and Li. In Fig.

    2.8(a), nodes {3, 4, 5, 6, 8, 9} are marked as dominating nodes because each of them hasat least a pair of non-connected neighbors. After applying Rule 2 in [4], node 3 finds

    its neighbor set is completely covered by two nodes with bigger identifiers: 5 and 6.

    It changes itself to a dominated node. When Rule k [5] is applied, node 4 decides to

    become a dominated node because its neighbor set is fully covered by nodes {5, 6, 9}.There are other methods of CDS construction such as [46] and [47]. However, interme-

    diate structures are formed (MIS and MPR respectively) during the CDS construction.

    That is why these solutions are classified in section 2.3.3.2 and 2.3.4.

    CDS is used as logic backbone in a network. Although Wu&Li’s CDS algorithm is

    completely localized, every node still need two-hop information. To this end, the use

    of HELLO message is indispensable. Hence, the control message cost rises significantly.

    2.3.3.2 Maximal independent set

    An Independent Set (IS) is a subset of vertexes which do not contain adjacent nodes

    in a graph. A formal definition of IS is the following:

    IS = {u ∈ IS|(not∃v ∈ IS|u ∈ N(v))}

    26

  • Self-organization

    The Maximal Independent Set (MIS) is the Independent Set containing maximum num-

    ber of vertexes. The particular interest in MIS problem stems on practical importance

    of distributed computation in ad hoc and wireless sensor networks. A MIS defines a set

    of nodes which can operate in scheduling or parallel processing without interference.

    Furthermore, it is possible to obtain approximate Minimum CDS structure based on a

    MIS structure.

    [46] proposes to construct a MIS based on a rooted tree. It is a distributed algorithm

    but not a localized algorithm, because one node should initiate the construction. A

    spanning tree is first generated in the network by using a flooding. During the tree

    construction, each node is also assigned with a rank. They move to a color-marking

    phase to determinate the MIS nodes. All nodes in the network are initially marked

    WHITE. The root node marks itself BLACK and broadcasts a BLACK message. A

    WHITE node which receives a BLACK message becomes GRAY node and sends a

    GRAY message. A WHITE node which receives GRAY messages from all its neighbor

    closer to root node will marks itself BLACK and broadcasts a BLACK message. By

    propagating BLACK and GRAY messages in the network, all nodes are marked either

    BLACK or GRAY. The set of BLACK nodes is the MIS. The algorithm can be extended

    to construct a CDS by adding a phase to connect all BLACK nodes.

    Although the final CDS has a lower cardinality, the message overhead and time

    complexity of the algorithm are higher than those in [4]. Hence, it does not meet the

    energy constraint of WSNs. The resulting structure depends on the root node, which

    does not leave the solution enough flexibility and scalability.

    2.3.3.3 Relative neighborhood graph

    Relative Neighborhood Graph (RNG) is a geometric concept proposed by Toussaint

    [48] in 1980. The idea is to prune the longest edge in each triangle in the graph. It is

    formulated as:

    RNG = {(u, v) ∈ RNG|(not∃w ∈ N(u) ∩ N(v)|d(u, v) > d(u,w)d&d(u, v) > d(v,w))}

    where d(u, v) is a weight assigned to edge (u, v). The length of an edge is often used as

    its weight. As shown in Fig. 2.9, the edge (uv) is not in the RNG subgraph, because

    it is the longest edge in triangle (u, v,w).

    RNG subgraph is not a loop-free graph, although each local structure around a node

    is a tree structure. It is shown that the