2,031 research outputs found
Energy Complexity of Distance Computation in Multi-hop Networks
Energy efficiency is a critical issue for wireless devices operated under
stringent power constraint (e.g., battery). Following prior works, we measure
the energy cost of a device by its transceiver usage, and define the energy
complexity of an algorithm as the maximum number of time slots a device
transmits or listens, over all devices. In a recent paper of Chang et al. (PODC
2018), it was shown that broadcasting in a multi-hop network of unknown
topology can be done in energy. In this paper, we continue
this line of research, and investigate the energy complexity of other
fundamental graph problems in multi-hop networks. Our results are summarized as
follows.
1. To avoid spending energy, the broadcasting protocols of Chang
et al. (PODC 2018) do not send the message along a BFS tree, and it is open
whether BFS could be computed in energy, for sufficiently large . In
this paper we devise an algorithm that attains energy
cost.
2. We show that the framework of the round lower bound proof
for computing diameter in CONGEST of Abboud et al. (DISC 2017) can be adapted
to give an energy lower bound in the wireless network model
(with no message size constraint), and this lower bound applies to -arboricity graphs. From the upper bound side, we show that the energy
complexity of can be attained for bounded-genus graphs
(which includes planar graphs).
3. Our upper bounds for computing diameter can be extended to other graph
problems. We show that exact global minimum cut or approximate -- minimum
cut can be computed in energy for bounded-genus graphs
Minimum Sparsity of Unobservable Power Network Attacks
Physical security of power networks under power injection attacks that alter
generation and loads is studied. The system operator employs Phasor Measurement
Units (PMUs) for detecting such attacks, while attackers devise attacks that
are unobservable by such PMU networks. It is shown that, given the PMU
locations, the solution to finding the sparsest unobservable attacks has a
simple form with probability one, namely, , where
is defined as the vulnerable vertex connectivity of an augmented
graph. The constructive proof allows one to find the entire set of the sparsest
unobservable attacks in polynomial time. Furthermore, a notion of the potential
impact of unobservable attacks is introduced. With optimized PMU deployment,
the sparsest unobservable attacks and their potential impact as functions of
the number of PMUs are evaluated numerically for the IEEE 30, 57, 118 and
300-bus systems and the Polish 2383, 2737 and 3012-bus systems. It is observed
that, as more PMUs are added, the maximum potential impact among all the
sparsest unobservable attacks drops quickly until it reaches the minimum
sparsity.Comment: submitted to IEEE Transactions on Automatic Contro
Resilient Wireless Sensor Networks Using Topology Control: A Review
Wireless sensor networks (WSNs) may be deployed in failure-prone environments, and WSNs nodes easily fail due to unreliable wireless connections, malicious attacks and resource-constrained features. Nevertheless, if WSNs can tolerate at most losing k − 1 nodes while the rest of nodes remain connected, the network is called k − connected. k is one of the most important indicators for WSNs’ self-healing capability. Following a WSN design flow, this paper surveys resilience issues from the topology control and multi-path routing point of view. This paper provides a discussion on transmission and failure models, which have an important impact on research results. Afterwards, this paper reviews theoretical results and representative topology control approaches to guarantee WSNs to be k − connected at three different network deployment stages: pre-deployment, post-deployment and re-deployment. Multi-path routing protocols are discussed, and many NP-complete or NP-hard problems regarding topology control are identified. The challenging open issues are discussed at the end. This paper can serve as a guideline to design resilient WSNs
Improving the connectivity of community detection-based hierarchical routing protocols in large-scale wsns
The recent growth in the use of wireless sensor networks (WSNs) in many applications leads to the raise of a core infrastructure for communication and data gathering in Cyber-Physical Systems (CPS). The communication strategy in most of the WSNs relies on hierarchical clustering routing protocols due to their ad hoc nature. In the bulk of the existing approaches some special nodes, named Cluster-Heads (CHs), have the task of assembling clusters and intermediate the communication between the cluster members and a central entity in the network, the Sink. Therefore, the overall efficiency of such protocols is highly dependent on the even distribution of CHs in the network. Recently, a community detection-based approach, named RLP, have shown interesting results with respect to the CH distribution and availability that potentially increases the overall WSN efficiency. Despite the better results of RLP regarding the literature, the adopted CH election algorithm may lead to a CH shortage throughout the network operation. In line with that, in this paper, we introduce an improved version of RLP, named HRLP. Our proposal includes a hybrid CH election algorithm which relies on a computationally cheap and distributed probabilistic-based CH recovery procedure to improve the network connectivity. Additionally, we provide a performance analysis of HRLP and its comparison to other protocols by considering a large-scale WSN scenario. The results evince the improvements achieved by the proposed strategy by means of the network connectivity and lifetime metrics. (C) 2016 The Authors. Published by Elsevier B.V.Federal University of São Paulo, Avenida Cesare Mansueto Giulio Lattes, 1201, Parque Tecnológico, 12247014, São José dos Campos-SP-BrazilFederal University of São Paulo, Avenida Cesare Mansueto Giulio Lattes, 1201, Parque Tecnológico, 12247014, São José dos Campos-SP-BrazilWeb of Scienc
Graph Signal Processing: Overview, Challenges and Applications
Research in Graph Signal Processing (GSP) aims to develop tools for
processing data defined on irregular graph domains. In this paper we first
provide an overview of core ideas in GSP and their connection to conventional
digital signal processing. We then summarize recent developments in developing
basic GSP tools, including methods for sampling, filtering or graph learning.
Next, we review progress in several application areas using GSP, including
processing and analysis of sensor network data, biological data, and
applications to image processing and machine learning. We finish by providing a
brief historical perspective to highlight how concepts recently developed in
GSP build on top of prior research in other areas.Comment: To appear, Proceedings of the IEE
A Tutorial on Clique Problems in Communications and Signal Processing
Since its first use by Euler on the problem of the seven bridges of
K\"onigsberg, graph theory has shown excellent abilities in solving and
unveiling the properties of multiple discrete optimization problems. The study
of the structure of some integer programs reveals equivalence with graph theory
problems making a large body of the literature readily available for solving
and characterizing the complexity of these problems. This tutorial presents a
framework for utilizing a particular graph theory problem, known as the clique
problem, for solving communications and signal processing problems. In
particular, the paper aims to illustrate the structural properties of integer
programs that can be formulated as clique problems through multiple examples in
communications and signal processing. To that end, the first part of the
tutorial provides various optimal and heuristic solutions for the maximum
clique, maximum weight clique, and -clique problems. The tutorial, further,
illustrates the use of the clique formulation through numerous contemporary
examples in communications and signal processing, mainly in maximum access for
non-orthogonal multiple access networks, throughput maximization using index
and instantly decodable network coding, collision-free radio frequency
identification networks, and resource allocation in cloud-radio access
networks. Finally, the tutorial sheds light on the recent advances of such
applications, and provides technical insights on ways of dealing with mixed
discrete-continuous optimization problems
- …