An O(log n) Dominating Set Protocol for Wireless Ad-Hoc Networks under the Physical Interference Model

被引:0
|
作者
Scheideler, Christian [1 ]
Richa, Andrea W. [2 ]
Santi, Paolo [3 ]
机构
[1] Tech Univ Munich, Inst Informat, D-80290 Munich, Germany
[2] Arizona State Univ, Dept Compute Sci & Engn, Tempe, AZ 85287 USA
[3] CNR, Inst Informat Telemat, Pisa, Italy
关键词
Ad hoc networks; dominating set; physical interference model; self-stabilization;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized or hop-based interference models in which the effect of interference is neglected beyond a certain range from the transmitter. However, interference is a more complex phenomenon that cannot, in general, be captured by localized models, implying that protocols based on such models are not guaranteed to work in practice. This paper is the first to present and rigorously analyze a distributed dominating set protocol for wireless ad-hoc networks with 0(1) approximation bound based on the physical interference model, which accounts for interference generated by all nodes in the network. The proposed protocol is fully distributed, randomized, and extensively uses physical carrier sensing to reduce message overhead. It does not need node identifiers or any kind of prior information about the system, and all messages are of constant size (in bits). We prove that, by appropriately choosing the threshold for physical carrier sensing, the protocol stabilizes within a logarithmic number of communication rounds, w.h.p., which is faster than the runtime of any known distributed protocol without prior knowledge about the system under any wireless model that does not abstract away collisions.
引用
收藏
页码:91 / 100
页数:10
相关论文
共 50 条
  • [31] A Dominating-Set-Based Routing Scheme in Ad Hoc Wireless Networks
    Jie Wu
    Hailan Li
    Telecommunication Systems, 2001, 18 : 13 - 36
  • [32] A dominating-set-based routing scheme in ad hoc wireless networks
    Wu, J
    Li, HL
    TELECOMMUNICATION SYSTEMS, 2001, 18 (1-3) : 13 - 36
  • [33] A Physical Layer Security-based Routing Protocol in Mobile Ad-hoc Wireless Networks
    Shim, Kyusung
    Tri Nhu Do
    Beongku An
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 417 - 422
  • [34] Interference of Overhearing by Eavesdropper Nodes for Secure Wireless Ad-Hoc Networks
    Shimada, Isamu
    Higaki, Hiroaki
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 700 - 705
  • [35] Experimental comparison of algorithms for interference control in ad-hoc wireless networks
    Athanassopoulos, Stavros
    Kaklamanis, Christos
    Papaioannou, Evi
    Tsantilas, Constantinos
    MELECON 2010: THE 15TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, 2010, : 1003 - 1008
  • [36] A Distributed Design for Minimum 2-Connected m-Dominating Set in Bidirectional Wireless Ad-Hoc Networks
    Xiaofeng Gao
    Department of Physics
    TsinghuaScienceandTechnology, 2012, 17 (05) : 553 - 566
  • [37] Interference of Overhearing by Eavesdropper Nodes for Secure Wireless Ad-Hoc Networks
    Amano, Hinano
    Higaki, Hiroaki
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, ICCSA 2020, PART IV, 2020, 12252 : 246 - 260
  • [38] An Adaptive Hierarchical Routing Protocol for Wireless Ad-hoc Sensor Networks
    Nourizadeh, Shahram
    Song, Y. Q.
    Thomesse, J. P.
    THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS, 2009, : 452 - 460
  • [39] A Secure and Green Cognitive Routing Protocol for Wireless Ad-Hoc Networks
    Javed, Muhammad Saqib
    Abu Bakar, Rana
    IEEE ACCESS, 2024, 12 : 194989 - 195004
  • [40] A balanced underlying MAC protocol (bump) for wireless ad-hoc networks
    Weber, PJ
    Felix, LCR
    Jayaraman, R
    Park, S
    PROCEEDINGS OF THE FOURTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2005, : 302 - 307