2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07) 2007
DOI: 10.1109/broadnets.2007.4550425
|View full text |Cite
|
Sign up to set email alerts
|

Joint monitoring and routing in wireless sensor networks using robust identifying codes

Abstract: Abstract-Wireless Sensor Networks (WSNs) provide an important means of monitoring the physical world, but their limitations present challenges to fundamental network services such as routing. In this work we utilize an abstraction of WSNs based on the theory of identifying codes. This abstraction has been useful in recent literature for a number of important monitoring problems, such as localization and contamination detection. In our case, we use it to provide a joint infrastructure for efficient and robust m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(44 citation statements)
references
References 36 publications
0
44
0
Order By: Relevance
“…The neighborhood of each vertex in the graph intersects uniquely with this code, and such an intersection is called an identifying set 1 ; given an identifying set, one can thus uniquely identify the vertex in the graph that produced it. In this case, the code provided is also optimal, because one needs at least lg 8 = 3 code vertices to produce 8 distinct identifying sets (corresponding to the 8 vertices of the cube) 2 . The goal of 1 Unlike traditional identifying codes, the empty set is considered a valid identifying set here.…”
Section: A Identifying Codesmentioning
confidence: 99%
See 3 more Smart Citations
“…The neighborhood of each vertex in the graph intersects uniquely with this code, and such an intersection is called an identifying set 1 ; given an identifying set, one can thus uniquely identify the vertex in the graph that produced it. In this case, the code provided is also optimal, because one needs at least lg 8 = 3 code vertices to produce 8 distinct identifying sets (corresponding to the 8 vertices of the cube) 2 . The goal of 1 Unlike traditional identifying codes, the empty set is considered a valid identifying set here.…”
Section: A Identifying Codesmentioning
confidence: 99%
“…More recently, these codes were extended to applications for environmental monitoring [10], and joint monitoring and routing in wireless sensor networks [2]. In the former, sensors are placed in a subset of junctions of a utility network such as an air ventilation system, a water supply network, or a river bed, etc, in order to detect pollutants.…”
Section: ) Applicationsmentioning
confidence: 99%
See 2 more Smart Citations
“…One can also mention applications to routing [44], to bioinformatics [37] (where identifying codes are called differentiating dominating sets) and to measuring the first-order logical complexity of graphs [41] (where locating-dominating sets are calledsieves).…”
Section: Definitions and Problemsmentioning
confidence: 99%