Proceedings of the 2nd ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing 2009
DOI: 10.1145/1540343.1540352
|View full text |Cite
|
Sign up to set email alerts
|

An improved approximation algorithm for data aggregation in multi-hop wireless sensor networks

Abstract: Data aggregation is an efficient primitive in wireless sensor network (WSN) applications. This paper focuses on data aggregation scheduling problem to minimize the latency. We propose an efficient distributed method that produces a collision-free schedule for data aggregation in WSNs. We prove that the latency of the aggregation schedule generated by our algorithm is at most 16R+Δ−14 time-slots. Here R is the network radius and Δ is the maximum node degree in the communication graph of the original network. Ou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
50
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 44 publications
(50 citation statements)
references
References 19 publications
0
50
0
Order By: Relevance
“…[20] proposes an aggregation schedule for a distributed solution and proves a lower-bound of max{log n, R} on the latency of data aggregation under any graph-based interference model; n is the network size.…”
Section: A Data Aggregationmentioning
confidence: 99%
“…[20] proposes an aggregation schedule for a distributed solution and proves a lower-bound of max{log n, R} on the latency of data aggregation under any graph-based interference model; n is the network size.…”
Section: A Data Aggregationmentioning
confidence: 99%
“…Data Aggregation/Collection Scheduling with minimum delay has been proven to be NP-hard [2] and well studied in [10,16,[18][19][20].…”
Section: Related Workmentioning
confidence: 99%
“…For the well-studied minimum latency data aggregation problem, there is a series of results focusing on either the protocol wireless interference model [5], [10], [13] or the physical interference model [11], [12]. There is also a recent work [6] for data aggregation scheduling in duty-cycled network.…”
Section: Related Workmentioning
confidence: 99%
“…Note that most data aggregation schemes adopt a tree routing structure [10], [13], then a malicious node closer to the sink node could access a large percentage of the whole network data and would have a larger impact on the manipulation of final result as observed in [14]. Our protocol can reduce the trust on high-level nodes and perceive all low-cost wireless nodes as evenly trustable, which is realized by the principle of divide-and-conquer (or grouping).…”
Section: Introductionmentioning
confidence: 99%