434 ieee/acm transactions on networking, vol. 18, no. 2

14
434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010 Constrained Relay Node Placement in Wireless Sensor Networks: Formulation and Approximations Satyajayant Misra, Member, IEEE, Seung Don Hong, Guoliang (Larry) Xue, Senior Member, IEEE, and Jian Tang, Member, IEEE Abstract—One approach to prolong the lifetime of a wireless sensor network (WSN) is to deploy some relay nodes to commu- nicate with the sensor nodes, other relay nodes, and the base sta- tions. The relay node placement problem for wireless sensor net- works is concerned with placing a minimum number of relay nodes into a wireless sensor network to meet certain connectivity or sur- vivability requirements. Previous studies have concentrated on the unconstrained version of the problem in the sense that relay nodes can be placed anywhere. In practice, there may be some physical constraints on the placement of relay nodes. To address this issue, we study constrained versions of the relay node placement problem, where relay nodes can only be placed at a set of candidate locations. In the connected relay node placement problem, we want to place a minimum number of relay nodes to ensure that each sensor node is connected with a base station through a bidirectional path. In the survivable relay node placement problem, we want to place a min- imum number of relay nodes to ensure that each sensor node is con- nected with two base stations (or the only base station in case there is only one base station) through two node-disjoint bidirectional paths. For each of the two problems, we discuss its computational complexity and present a framework of polynomial time -ap- proximation algorithms with small approximation ratios. Exten- sive numerical results show that our approximation algorithms can produce solutions very close to optimal solutions. Index Terms—Approximation algorithms, connectivity and sur- vivability, relay node placement, wireless sensor networks (WSNs). I. INTRODUCTION A WIRELESS sensor network (WSN) consists of many low-cost and low-power sensor nodes (SNs) [1]. Sensing and short-range communication to transmit sensed information to the base stations are two of the most important functions of a SN in a WSN. There has been extensive research on energy-aware routing [4], [14], [18], [33], improvement in Manuscript received July 16, 2008; revised March 20, 2009; approved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor M. Liu. First published November 24, 2009; current version published April 16, 2010. This work was supported in part by NSF Grants 0901451 and 0830739 and ARO Grant W911NF-04-1-0385. The information reported here does not reflect the posi- tion or the policy of the federal government. This is an extended and enhanced version of the paper [23] that appeared in IEEE INFOCOM 2008. S. Misra is with the Department of Computer Science, New Mexico State University, Las Cruces, NM 88003 USA (e-mail: [email protected]). S. D. Hong and G. Xue are with the Department of Computer Science and Engineering, Arizona State University, Tempe, AZ 85287 USA (e-mail: seung. [email protected]; [email protected]). J. Tang is with the Department of Computer Science, Montana State Univer- sity, Bozeman, MT 59717 USA (e-mail: [email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TNET.2009.2033273 lifetime [12], [24], [32], and survivability [22] in WSNs. Since energy consumption is proportional to for transmitting over distance , where is a constant in the interval , long-distance transmission in WSNs is costly. To prolong network lifetime while meeting certain network specifications, researchers have proposed to deploy in a WSN a small number of relay nodes (RNs) whose main function is to communicate with the SNs and other RNs [2], [5], [11], [12], [15], [20], [21], [32]. These are studied under the general theme of relay node placement. Recently, this problem has received a lot of attention from the networking community, with papers addressing this problem published in MobiCom [24], MobiHoc [2], [29], and Infocom [10], [15], [34]. Relay node placement problems can be classified into ei- ther single-tiered or two-tiered based on the routing structures [11], [12], [21], [24] and into either connected or survivable based on the connectivity requirements [2], [11], [15], [34]. In single-tiered relay node placement, a SN also forwards packets received from other nodes. In two-tiered relay node placement, a SN forwards its sensed information to a RN or a base station (BS), but does not forward packets received from other nodes. In connected relay node placement, we place a small number of RNs to ensure that each sensor node is connected with a base station through a bidirectional path. In survivable relay node placement, we place a small number of RNs to ensure that each sensor node is connected with two base stations (or the only base station, in case there is only one base station) through two node-disjoint bidirectional paths. We first briefly review prior works on single-tiered relay node placement, where both relay nodes and sensor nodes participate in the forwarding of received packets. We will use and to denote the communication ranges of RNs and SNs, respectively. We will also use to denote connectivity requirement and use to denote survivability requirement. In 1999, Lin and Xue [19] studied the problem with and , proved its NP-hardness, and presented a minimum spanning tree (MST) based 5-approximation algorithm. They also designed a steiner- ization scheme, which has been used by almost all later works [2], [3], [5], [10], [11], [15], [20], [21], [29], [34]. Chen et al. [3] proved that the Lin–Xue algorithm is a 4-approximation algo- rithm and presented a 3-approximation algorithm. Cheng et al. [5] presented a faster 3-approximation algorithm and a random- ized 2.5-approximation algorithm. Bredin et al. [2] extended the relay node placement problem to the case of and and presented polynomial time -approximation algorithms for any fixed . Kashyap et al. [15] presented a 10-approxima- tion algorithm for the case of and . All of the 1063-6692/$26.00 © 2009 IEEE

Upload: others

Post on 27-Jan-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010

Constrained Relay Node Placement in WirelessSensor Networks: Formulation and Approximations

Satyajayant Misra, Member, IEEE, Seung Don Hong, Guoliang (Larry) Xue, Senior Member, IEEE, andJian Tang, Member, IEEE

Abstract—One approach to prolong the lifetime of a wirelesssensor network (WSN) is to deploy some relay nodes to commu-nicate with the sensor nodes, other relay nodes, and the base sta-tions. The relay node placement problem for wireless sensor net-works is concerned with placing a minimum number of relay nodesinto a wireless sensor network to meet certain connectivity or sur-vivability requirements. Previous studies have concentrated on theunconstrained version of the problem in the sense that relay nodescan be placed anywhere. In practice, there may be some physicalconstraints on the placement of relay nodes. To address this issue,we study constrained versions of the relay node placement problem,where relay nodes can only be placed at a set of candidate locations.In the connected relay node placement problem, we want to place aminimum number of relay nodes to ensure that each sensor node isconnected with a base station through a bidirectional path. In thesurvivable relay node placement problem, we want to place a min-imum number of relay nodes to ensure that each sensor node is con-nected with two base stations (or the only base station in case thereis only one base station) through two node-disjoint bidirectionalpaths. For each of the two problems, we discuss its computationalcomplexity and present a framework of polynomial time ���-ap-proximation algorithms with small approximation ratios. Exten-sive numerical results show that our approximation algorithms canproduce solutions very close to optimal solutions.

Index Terms—Approximation algorithms, connectivity and sur-vivability, relay node placement, wireless sensor networks (WSNs).

I. INTRODUCTION

A WIRELESS sensor network (WSN) consists of manylow-cost and low-power sensor nodes (SNs) [1]. Sensing

and short-range communication to transmit sensed informationto the base stations are two of the most important functionsof a SN in a WSN. There has been extensive research onenergy-aware routing [4], [14], [18], [33], improvement in

Manuscript received July 16, 2008; revised March 20, 2009; approved byIEEE/ACM TRANSACTIONS ON NETWORKING Editor M. Liu. First publishedNovember 24, 2009; current version published April 16, 2010. This workwas supported in part by NSF Grants 0901451 and 0830739 and ARO GrantW911NF-04-1-0385. The information reported here does not reflect the posi-tion or the policy of the federal government. This is an extended and enhancedversion of the paper [23] that appeared in IEEE INFOCOM 2008.

S. Misra is with the Department of Computer Science, New Mexico StateUniversity, Las Cruces, NM 88003 USA (e-mail: [email protected]).

S. D. Hong and G. Xue are with the Department of Computer Science andEngineering, Arizona State University, Tempe, AZ 85287 USA (e-mail: [email protected]; [email protected]).

J. Tang is with the Department of Computer Science, Montana State Univer-sity, Bozeman, MT 59717 USA (e-mail: [email protected]).

Color versions of one or more of the figures in this paper are available onlineat http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TNET.2009.2033273

lifetime [12], [24], [32], and survivability [22] in WSNs. Sinceenergy consumption is proportional to for transmittingover distance , where is a constant in the interval ,long-distance transmission in WSNs is costly. To prolongnetwork lifetime while meeting certain network specifications,researchers have proposed to deploy in a WSN a small numberof relay nodes (RNs) whose main function is to communicatewith the SNs and other RNs [2], [5], [11], [12], [15], [20], [21],[32]. These are studied under the general theme of relay nodeplacement. Recently, this problem has received a lot of attentionfrom the networking community, with papers addressing thisproblem published in MobiCom [24], MobiHoc [2], [29], andInfocom [10], [15], [34].

Relay node placement problems can be classified into ei-ther single-tiered or two-tiered based on the routing structures[11], [12], [21], [24] and into either connected or survivablebased on the connectivity requirements [2], [11], [15], [34]. Insingle-tiered relay node placement, a SN also forwards packetsreceived from other nodes. In two-tiered relay node placement,a SN forwards its sensed information to a RN or a base station(BS), but does not forward packets received from other nodes.In connected relay node placement, we place a small number ofRNs to ensure that each sensor node is connected with a basestation through a bidirectional path. In survivable relay nodeplacement, we place a small number of RNs to ensure that eachsensor node is connected with two base stations (or the onlybase station, in case there is only one base station) through twonode-disjoint bidirectional paths.

We first briefly review prior works on single-tiered relay nodeplacement, where both relay nodes and sensor nodes participatein the forwarding of received packets. We will use and todenote the communication ranges of RNs and SNs, respectively.We will also use to denote connectivity requirement anduse to denote survivability requirement. In 1999, Lin andXue [19] studied the problem with and , provedits NP-hardness, and presented a minimum spanning tree (MST)based 5-approximation algorithm. They also designed a steiner-ization scheme, which has been used by almost all later works[2], [3], [5], [10], [11], [15], [20], [21], [29], [34]. Chen et al. [3]proved that the Lin–Xue algorithm is a 4-approximation algo-rithm and presented a 3-approximation algorithm. Cheng et al.[5] presented a faster 3-approximation algorithm and a random-ized 2.5-approximation algorithm. Bredin et al. [2] extended therelay node placement problem to the case of andand presented polynomial time -approximation algorithmsfor any fixed . Kashyap et al. [15] presented a 10-approxima-tion algorithm for the case of and . All of the

1063-6692/$26.00 © 2009 IEEE

Page 2: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

MISRA et al.: CONSTRAINED RELAY NODE PLACEMENT IN WIRELESS SENSOR NETWORKS 435

above works assume that the transmission range of the RNs isthe same as that of the SNs. Lloyd and Xue [21] studied theproblem with and , proved its NP-hardness, andpresented a 7-approximation algorithm. Zhang et al. [34] pre-sented a 14-approximation algorithm for and .

We next give a brief review of prior works on two-tieredrelay node placement, where only the RNs participate in packetforwarding. Motivated by the works [9] and [24] on clusteredWSNs, Hao et al. in [11] formulated the two-tiered relay nodeplacement problems where each SN has to be within distanceof at least RNs, and the RNs (all having communication range

) form a -connected network, for . Tang et al.in [30] presented 4.5-approximation algorithms for and2, under the assumption that and that the SNs are uni-formly distributed. In [20], under the assumption thatand with no restriction on the distribution of the SNs, Liu et al.presented a -approximation algorithm for and a

-approximation algorithm for , where is anygiven constant. In [21], Lloyd and Xue studied the problem for

with the condition relaxed to and presenteda -approximation algorithm. Srinivas et al. [29] presentedbetter approximation algorithms under the assumption .Zhang et al. [34] studied both single-tiered and two-tiered relaynode placement problems that ensure 2-connectivity, which in-volves sensor nodes, relay nodes, and base stations. They pre-sented -approximation algorithms for both problems.

All of the above works study unconstrained relay node place-ment in the sense that the RNs can be placed anywhere. Forexample, in the works [2], [21], and [34], the relay nodes arestacked on top of other relay nodes or sensor nodes. In practice,however, there may be some physical constraints on the place-ment of the RNs. For example, there may be a lower bound onthe distance between two network nodes to reduce interference.Also, there may be some forbidden regions where relay nodescannot be placed. However, the relay node placement problemsubject to forbidden regions and lower bound on internode dis-tance is intrinsically harder than its unconstrained counterpart.As a first step toward solving this challenging problem, we studyconstrained relay node placement problems where the RNs canonly be placed at a set of candidate locations. Our formulationcan be viewed as an approximation to the aforementioned relaynode placement problem subject to the constraints of forbiddenregions and lower bound on internode distance in the followingsense. Instead of allowing the relay nodes to be placed anywhereoutside of the forbidden regions and satisfying the internodedistance bound, we further restrict the placement of the relaynodes to certain candidate locations that are outside of the for-bidden regions. The use of candidate locations simultaneouslyapproximates the constraint enforced by the forbidden regionsand the constraint enforced by the internode distance bound. Weare using a discrete optimization problem to approximate a non-convex continuous optimization problem.

In this paper, we study single-tiered constrained relay nodeplacement problems under both the connectivity requirementand the survivability requirement. We formulate the prob-lems, discuss their complexities, and present polynomial time

-approximation algorithms. To our best knowledge, we

are the first to present -approximation algorithms for theseproblems.

In Section II, we present basic notations and prove a fewfundamental lemmas that will be used in later sections. InSection III, we study the connected relay node placementproblem. In Section IV, we study the survivable relay nodeplacement problem. In Section V, we present linear program-ming-based schemes for computing lower bounds on theoptimal solutions of the relay node placement problems. Wepresent numerical results in Section VI and conclude the paperin Section VII.

II. BASIC NOTATIONS AND FUNDAMENTAL LEMMAS

We consider a hybrid wireless sensor network (HWSN) con-sisting of SNs, RNs, and BSs. We assume that all SNs have com-munication range and that all RNs have communicationrange , where and are given constants. We also as-sume that the BSs are powerful enough so that their communi-cation range is much greater than , and that any two BSs cancommunicate directly with each other. We note that, in prac-tice, two BSs may communicate indirectly via other means, suchas satellites or the Internet. Since the objective of this paper isto place the minimum number of RNs to meet connectivity orsurvivability requirements, our assumption simplifies notationswithout losing any generality. We use to denote the Eu-clidean distance between two points and in the plane. Wewill also use to denote the location of a node , if no confu-sion arises.

Following the above discussions, two nodes and can com-municate directly with each other if and only if is lessthan or equal to the smaller of the communication ranges of thetwo nodes. In other words, a SN can communicate directlywith another node (which could be a SN, a RN, or a BS) ifand only if . A RN can communicate directly withanother node (which could be a RN or a BS) if and only if

. Similarly, any pair of BSs can communicate di-rectly with each other. Following these rules, the SNs, the RNs,and the BSs, together with the values of and , collectivelyinduce a hybrid communication graph ( ) formally definedin the following.

Definition 2.1: Let be a set of BSs, be a set of SNs,be a set of RNs, and be the respective communica-tion ranges of RNs and SNs. The hybrid communication graph

induced by the 5-tuple is anundirected graph with node set and edge setdefined as follows. For any two BSs , contains theundirected edge . For a RN and a node

, which could be either a RN or a BS, contains theundirected edge if and only if . Fora SN and a node , which is either a SN, aRN, or a BS, contains the undirected edge ifand only if .

We illustrate the concept of using the example shown inFig. 1(a). In this example, the set of SNs is , theset of RNs is , and the set of BSs is .Therefore, the has six vertices. There is an edgein the because . Similarly, the also

Page 3: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

436 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010

Fig. 1. (a) Illustration of , showing ��� �� �� � � �� �� � � ���� � � ��, where ��� � � � � ��� � � � � ��� � � � � ��� � � � � �,��� � � � � �. (b) Edge weights in , where an edge incident with norelay node has a weight of 0, an edge incident with exactly one relay node hasa weight of 1, and an edge incident with two relay nodes has a weight of 2.

contains the edges , , and . There is anedge in the connecting RNs and because

. Similarly, the also contains the edgesand . There is an edge in the con-

necting BSs and because we assume any pair of BSs aredirectly connected.

The hybrid communication graph defines all possible bidirec-tional communications between pairs of nodes. For the designand analysis of our schemes, we will need to define two moreconcepts related to an , i.e., the edge weights and the relaysize of an . These are formally defined in the following. Weuse the following standard graph theoretic notations: for a graph

, denotes the node set of and denotes the edgeset of .

Definition 2.2: Let be a hybridcommunication graph. For each edge in the ,we define its weight (denoted by ) as

(2.1)

Let be a subgraph of . The weight of [denoted by ]is defined as

(2.2)

The relay size of [denoted by ] is defined as

(2.3)

In other words, the relay size of is the number of relay nodesin .

Fig. 1(b) illustrates the edge weights of the shown inFig. 1(a). Simply put, the weight of an edge in theis the number of relay nodes the edge is incident with. Recallthat our goal is to use the minimum number of relay nodes toensure that the sensor nodes and the base stations are connectedor biconnected. This assignment of edge weight in the en-sures that a constant approximation to a minimum weight sub-graph of connecting all of the sensor nodes and the basestations corresponds to a constant approximation to an optimalsolution of the connected relay node placement problem, andthat a constant approximation to a minimum weight 2-connectedsubgraph of connecting all of the sensor nodes and the basestations corresponds to a constant approximation to an optimalsolution of the survivable relay node placement problem. Moreprecisely, our definition of the weight and relay size of a sub-graph of an leads to an important relationship between theweight and the relay size of a certain class of subgraphs of an

, which is stated in the following lemma.

Lemma 2.1: Let be a subgraph ofsuch that every RN in has degree at least 2 (within ). Then,

.Proof: We prove this lemma by shifting the edge weight to

its end nodes. Initially, every node in has its weight initializedto 0. We loop over all edges of to move the edge weights totheir end nodes in the following way.

Let be an edge of that is incident with two RNs.According to our definition, the weight of this edge is 2. In thiscase, we divide the edge weight into two equal pieces, add aweight of 1 to node , and add a weight of 1 to node . Let

be an edge of , where is a RN and is not. Accordingto our definition, the weight of this edge is 1. In this case, weadd a weight of 1 to node , add a weight of 0 to node . Let

be an edge of where neither nor is a RN. Accordingto our definition, the weight of this edge is 0. In this case, weadd a weight of 0 to node and add a weight of 0 to node .

After all edges are looped over, we have shifted the edgeweights of to the RNs in . Note that a relay node is get-ting a weight of 1 from every edge of that is incident with ,resulting in a weight equal to the degree of . Since every RN in

is incident with at least two edges in , it receives a weightof at least 2. Therefore, .

We use Fig. 1(b) to illustrate Lemma 2.1 and its proof. As-sume that is the in Fig. 1(a). We have

and . Clearly, we have. Following the weight shifting scheme used

in the proof, RN receives a weight of 1 from edge ,a weight of 1 from edge , and a weight of 1 from edge

, resulting in a total weight of . Similarly, RNreceives a weight of 1 from edge , a weight of 1 fromedge , and a weight of 1 from edge , resulting ina total weight of . Therefore, each RN receives a weightthat is equal to its degree, as stated in the proof of Lemma 2.1.

We will also need to use the result stated in Lemma 2.3, whichis based on Lemma 2.2 in the following.

Lemma 2.2: Let be an undirected biconnected graphwhere and each edge has a unit length .Let be a minimum length biconnected subgraph of .Then, .

Proof: Since is biconnected, we can find an eardecomposition of [31]. Let be defined by all the ears in anear decomposition of . Then, is a biconnected subgraph of

spanning all vertices in . We need to prove that containsno more than edges.

By definition, the first ear is a cycle spanning ver-tices and contains edges. Each additional ear spansnew vertices using edges. Therefore, the total number ofedges in is at most .

Lemma 2.3: Let be an undirected connected graphwhere and each edge has a unit length

. Let be a minimum length connected subgraph ofsuch that two vertices and are in the same biconnected

component of if and only if they are in the same biconnectedcomponent of . Then, .

Proof: Let be the biconnected components of, where has vertices, . Note that two

biconnected components and may share one common

Page 4: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

MISRA et al.: CONSTRAINED RELAY NODE PLACEMENT IN WIRELESS SENSOR NETWORKS 437

node, but never two. Assume that the union of hasconnected components . Let

, where . Then,can be obtained by connecting the connected components ofthe union of and vertices usingexactly edges in . Therefore, the number of edgesin is

(2.4)

(2.5)

(2.6)

where the second equality follows from. This proves the lemma.

Definition 2.3: Let be a hybridcommunication graph. Let be a subgraph of . Let bea relay node in . The sensor degree of in , denoted by

, is the number of SNs that are neighbors of in .The base station degree of in , denoted by , is thenumber of BSs that are neighbors of in . The maximumsensor degree of is defined as

. The maximum base station degree of is definedas . The maximumnonrelay degree of is defined as

.It is clear that . For graph theoretic

terms not defined in this paper, we refer readers to the standardtextbook [31]. We will use to denote the undirected edgein a graph. Therefore, and denote the same edge.We will use the terms nodes and vertices interchangeably, aswell as links and edges. For concepts in algorithms and com-puting theory, such as NP-hard, we refer readers to the standardtextbooks [6], [8].

A polynomial time -approximation algorithm for a mini-mization problem is an algorithm that, for any instance ofthe problem, computes a solution that is at most times the op-timal solution of the instance in time bounded by a polynomialin the input size of the instance [6]. In this case, we also say that

has an approximation ratio of .

III. RELAY NODE PLACEMENT TO ENSURE CONNECTIVITY

Given a set of SNs, a set of BSs, and a set of candidate lo-cations where RNs can be placed, we are interested in placingthe minimum number of RNs so that the sensor nodes and thebase stations are in the same connected component of the hy-brid communication graph induced by the SNs, the RNs, andthe BSs.

Relay node placement in wireless sensor networks has beenstudied by many researchers [2], [3], [5], [10], [11], [15],[19]–[21], [29], [34]. The objective here is to shift the load oflong-distance transmissions from the SNs to the RNs, thereforeachieving better energy efficiency and extending networklifetime. Most of the previous studies have concentrated onthe case where the RNs can be placed anywhere. In practice,however, there are certain restrictions on the locations of the

RNs with respect to the SNs, the BSs, and other RNs. Thismotivated us to study the constrained relay node placementproblem. In this section, we study the problem of placing theminimum number of RNs to ensure network connectivity.

A. Problem Definitions and Discussions

Definition 3.1: Let be the respective communi-cation ranges for RNs and SNs. Let be a set of BSs, be aset of SNs, and be a set of candidate locations where RNscan be placed. A set of RNs is said to be a feasibleconnected relay node placement (denoted by -RNPc) for

if the graph is connected.The size of the corresponding -RNPc is . A -RNPcis said to be a minimum connected relay node placement for

(denoted by -RNPc) if it has the minimumsize among all -RNPc for .

Definition 3.2: Let be the respective communi-cation ranges for RNs and SNs. Let be a set of BSs, be aset of SNs, and be a set of candidate locations where RNscan be placed. The connected relay node placement problemfor , denoted by RNPc-P , seeksa -RNPc for .

We also study a special case of RNPc-P where . Manyexisting works correspond to this special case [3], [5], [19], [21].For this special case, our algorithm has a faster running time anda better approximation ratio. In this case, one of the relay nodesdeployed can work as a base station to collect data.

The authors of [16] studied the Critical-Grid CoverageProblem (CGCP). CGCP is concerned with a grid of equi-lateral triangles of size . Some of the grid points are criticalgrids, which need to be covered by sensor nodes with sensingrange and communication range . The goal of CGCP isto deploy a minimum number of sensor nodes on the grid pointsso that: 1) each critical-grid point is within distance of atleast one sensor node; and 2) the sensor nodes form a connectednetwork under the unit disk communication model, where twosensor nodes can communicate iff they are within distance .It is proved in [16] that if and , thenCGCP is NP-hard using a reduction from planar 3SAT.

We demonstrate in the following that the special case ofRNPc-P with contains CGCP as a special case. Forany given instance of CGCP, we construct an instanceof RNPc-P with in the following way. Let (the setof sensor nodes in ) be the set of critical grids in . Let(the candidate locations for relay nodes in ) be the rest of thegrid points contained in the convex hull of the critical grids.Let , , and . Then, we have an instance

for RNPc-P. Moreover, an optimal solution to corre-sponds to an optimal solution to , and an -approximation to

corresponds to an -approximation to . Since CGCP isNP-hard, RNPc-P is also NP-hard. Therefore, we seek efficientalgorithms that have provably good performance guarantees.

We present a general framework of efficient approximationalgorithms for RNPc-P, based on efficient approximation algo-rithms for the graph Steiner tree problem (STP) [13]. In partic-ular, we show that by using the best-known approximation algo-rithm for STP [28], our framework becomes a -approxima-tion algorithm for RNPc-P when , and a -approxima-

Page 5: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

438 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010

TABLE ICLOSELY RELATED RESULTS ON CONNECTED RELAY NODE PLACEMENT

tion algorithm for the general RNPc-P. To the best of our knowl-edge, we are the first to present -approximation algorithmsfor these constrained relay node placement problems. The un-constrained version of RNPc-P when is the single-tieredrelay node placement problem studied by Lloyd andXue [21], where there is no restriction on the locations of therelay nodes. Considering that the best-known approximation al-gorithm [21] for (the unconstrained problem) has anapproximation ratio of , our -approximation algorithm forthe constrained problem is amazingly good. Table I lists themost closely related results on this topic.

B. A Framework of Efficient Approximation Algorithms

In this section, we present a framework of polynomial timeapproximation algorithms for RNPc-P. For the general case, weprove that the number of RNs used by our algorithm is no morethan times the number of RNs required by an optimal solu-tion, where is the approximation ratio of the approximationalgorithm for STP. For the special case where , weprove that the number of RNs used by our algorithm is no morethan times the number of RNs required by an optimal so-lution. Our approximation algorithm for RNPc-P is presentedas Algorithm 1.

Algorithm 1 Approximation for RNPc-P

Input: , set of BSs , set of SNs , set of candidatelocations of RNs , and an approximation algorithm forthe STP.

Output: An -RNPc for given by .

1: Construct .

2: if the nodes in are not in a single connectedcomponent of then

3: The RNPc-P instance does not have a feasible solution.

Stop.

4: end if

5: Assign edge weights to the edges inas in Definition 2.2.

6: Apply algorithm to compute a low weight treesubgraph of which connects allnodes in .

7: Output .

Algorithm 1 takes as input an instance of RNPc-P and anapproximation algorithm for the graph STP. Simply put, aninstance of STP is given by an undirected graphand a subset of target nodes, where and the arethe set of nodes and edges, respectively, and is theweight of edge . The goal is to compute a minimumweight tree subgraph of such that connects all targetnodes (maybe some additional nodes in , which are calledSteiner nodes) [13]. This problem is NP-hard, but admits manypolynomial time approximation algorithms with small constantapproximation ratios. The simplest approximation algorithm forSTP is the MST-based 2-approximation algorithm of Kou et al.[17]. The algorithm first constructs an edge-weighted completegraph on the set of target nodes, where the weight ofan edge in is the weight of the minimum weight

– path in . We then compute an MST of . Since eachedge in corresponds to a – path in , the MSTof the complete graph corresponds to a connected subgraphof . Note that is not necessarily a tree. We can then com-pute a tree subgraph of and repeatedly delete nontarget leafnodes in the tree. The resulting tree is a Steiner tree whose costis no more than twice that of the optimal Steiner tree. Othermore sophisticated approximation algorithms are also known.For example, with a longer running time (still a polynomial timealgorithm), the algorithm of [28] has an approximation ratio of

.The major steps of Algorithm 1 are as follows. First, we con-

struct the hybrid communication graph , asif we were placing an RN at every candidate location in .This is accomplished in Line 1 of the algorithm. It should benoted that the given instance of the problem has a feasible so-lution if and only if all the BSs and SNs are in the same con-nected component of . Recall that we as-sume that all base stations are connected. We can compute all ofthe connected components of in linear timeusing depth first search [6]. This is accomplished in Lines 2–4of the algorithm. Next, we assign nonnegative integer weightsto the edges of the as in Definition 2.2, i.e., the weightof an edge is the number of relay nodes with which it is inci-dent. This is accomplished in Line 5 of the algorithm. Then, weapply algorithm to compute a low-weight tree subgraphof , spanning all nodes in . This isaccomplished in Line 6 of the algorithm. Finally, in Line 7, weidentify the locations to place the RNs.

We use the example shown in Fig. 2 to illustrate Algorithm 1.Fig. 2(a) shows six SNs (illustrated using small circles), twoBSs (illustrated using small hexagons), and 18 candidate loca-tions for RNs (illustrated using small squares). These 26 nodesare sitting on unit grid points. Assuming and ,the edges of the corresponding are also shown, wherethe 0-weight edges (edges with weight 0) are shown in dashedlines, the 1-weight edges are shown in dash-dot lines, and the2-weight edges are shown in solid lines. Fig. 2(b) shows theedge-weighted complete graph on , where the weight ofan edge in the complete graph is the length of the shortest pathconnecting the two end nodes in the . A MST of the com-plete graph is shown in thick edges. Fig. 2(c) shows the relaynode placement corresponding to the MST, which uses six RNs,

Page 6: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

MISRA et al.: CONSTRAINED RELAY NODE PLACEMENT IN WIRELESS SENSOR NETWORKS 439

Fig. 2. (a) The of the instance for two BSs (hexagons), six SNs (circles),and 18 candidate locations for RNs (squares). (b) The edge-weighted completegraph on ��� , where the edge weight is the shortest path length in the ,and a MST (thick edges). (c) The corresponding MST-based � -RNPc, whichuses six RNs. (d) The optimal solution, which uses four RNs.

shown as filled squares. Fig. 2(d) shows the optimal relay nodeplacement, which uses four RNs.

Theorem 3.1: Algorithm 1 has a worst-case running timebounded by , where is the timecomplexity of the approximation algorithm used for approx-imating the STP problem. Furthermore, we have the following:

• RNPc-P has a feasible solution if and onlyif has a connected component thatcontains all nodes in .

• When RNPc-P has a feasible solution, Al-gorithm 1 guarantees computing a feasible solution thatuses no more than times the number ofRNs required in an optimal solution , where is theapproximation ratio of , and is a minimum spanningtree of .Proof: Line 1 constructs the , which requires

time. Lines 2–4 can be accomplished using depth firstsearch, which also requires time. Line 5 alsorequires time. Line 6 requires time.This proves the time complexity of the algorithm.

If not all the nodes in are in the same connected com-ponent of , there must be two nodes

that are not connected in . Since allbase stations are connected with each other in the , thismeans that there is at least one sensor node that is not connectedto a base station, implying that the given instance does not have afeasible solution. On the other hand, if all the nodes in arein the same connected component of , anytree subgraph of which spans all the nodesin corresponds to an -RNPc of the given instance.

Let be a minimum weight tree subgraph ofwhich connects all nodes in .

Since is a tree subgraph of whichconnects all nodes in , we have

(3.1)

Since is a -approximation algorithm, we have

(3.2)

We can write as ,where is the sum of the 1-weight edges in and

is the sum of the 2-weight edges in . Sincefor each RN in

(3.3)

Since is a tree, it has at most 2-weight edges.Therefore

(3.4)

Therefore

(3.5)

Combining Lemma 2.1 and inequalities (3.2) and (3.5), we have

(3.6)

This proves the theorem.There are several choices for the approximation algorithm .

For example, if we use the algorithm of [17], the correspondingapproximation ratio is . If we use the algorithm of [28],the corresponding approximation ratio is .Next, we will prove a bound on .

Lemma 3.1: Let be a MST of ,where is an optimal solution to RNPc-P .Then, and .

Proof: We prove this by contradiction. Assume that in, a RN is connected to six SNs .

Without loss of generality, assume that . Sinceand , we have . Since

is a tree, it does not contain edge , as otherwisethere would be a cycle . Replacing edgein with edge , we obtain another tree spanningthe nodes . Since and ,we have , contradicting the assumption that

is a minimum spanning tree. Therefore, an RN cannotbe connected to more than five SNs in .

Now, assume that a relay node is connected to two BSsand in . Since is a tree, it does not contain the edge

. We can replace edge in with edgeto obtain another lower weight tree spanning the nodes

. This contradiction proves that no RN in can beconnected to more than one BSs.

Corollary 3.1: The general RNPc-P has a polynomial time-approximation algorithm. The special case of RNPc-P with

has a polynomial time -approximation algorithm.Proof: According to Robins and Zelikovsky [28], there is

a polynomial time approximation scheme for the STP whoseapproximation ratio can be made arbitrarily close to

Page 7: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

440 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010

. The claims of this corollary follow from Theorem 3.1 withand the bound derived in Lemma 3.1.

Corollary 3.2: The general RNPc-P has an -approximationalgorithm with a running time of

. The special case of RNPc-P (with ) has a -approxi-mation algorithm with a running time of

.Proof: If we take in Algorithm 1 as the MST-based 2-ap-

proximation algorithm for STP [17], the running time of Algo-rithm 1 is . The correspondingapproximation ratios of Algorithm 1 follows from Theorem 3.1and Lemma 3.1.

IV. RELAY NODE PLACEMENT TO ENSURE SURVIVABILITY

In Section III, we have studied the relay node placementproblem under the connectivity requirement, i.e., there is a pathconnecting every pair of nodes . In this section,we consider a relay node placement problem that meets boththe connectivity requirement and the survivability requirement.In particular, we need to ensure that between each pair ofnodes , there exists a pair of node-disjoint pathsconnecting and .

Survivable relay node placement (also known as fault-tolerantrelay node placement) in wireless sensor networks has beenstudied by many researchers [2], [10], [11], [15], [20], [29],[34]. The objective here is to ensure that the network remainsconnected in the presence of up to node failures. For anetwork to tolerate up to node failures, it has to be -con-nected. The works [11], [15], [20], [29], and [34] study relaynode placement that ensures 2-connectivity, while the works [2]and [10] study relay node placement that ensures higher orderconnectivity. All these works can be viewed as unconstrainedsurvivable relay node placement in the sense that relay nodescan be placed anywhere. Our current work can be viewed asconstrained survivable relay node placement in the sense thatrelay nodes can only be placed at some prespecified candidatelocations.

A. Problem Definitions and Discussions

Given a set of SNs, a set of BSs, as well as the candidate lo-cations where RNs can be placed, we are interested in placingthe minimum number of relay nodes so that the hybrid commu-nication graph induced by the SNs, the RNs, and the BSs is bi-connected.

Definition 4.1 : Let be the respective communi-cation ranges for RNs and SNs. Let be a set of BSs, be a setof SNs, and be a set of candidate locations where RNs can beplaced. A set of RNs is said to be a feasible survivablerelay node placement (denoted by -RNPs) forif the graph is biconnected. The size ofthe corresponding -RNPs is . A -RNPs is said to be aminimum survivable relay node placement for(denoted by -RNPs) if it has the minimum size among all

-RNPs for .Definition 4.2: Let be the respective commu-

nication ranges for RNs and SNs. Let be a set of BSs, bea set of SNs, and be a set of candidate locations where RNs

TABLE IICLOSELY RELATED RESULTS ON SURVIVABLE RELAY NODE PLACEMENT

can be placed. The survivable relay node placement problemfor , denoted by RNPs-P , seeksa -RNPs for .

The problem we are studying here is closely related to the-survivable network design problem ( SNDP) defined

in Definition 4.3. The SNDP is known to be NP-hard [26], [27],but admits several polynomial time approximation algorithms[7], [26]. Our approximation algorithms for RNPs-P rely onsolving instances of SNDP.

Definition 4.3: Let be an undirected graph withnonnegative weights on all edges . For each pair ofnodes , there is a connectivity requirement

. The -survivable network design problem(SNDP) asks for a minimum weight subgraph of suchthat for any two nodes , contains at leastnode-disjoint paths between and .

Since the RNPc-P problem studied in Section III (which onlyrequires connectivity) is NP-hard, it is natural to believe thatthe RNPs-P problem is also NP-hard. Instead of searching fora hardness proof of the problem, we concentrate on the designand analysis of polynomial time approximation algorithms thathave small approximation ratios.

We present a general framework of efficient approximationalgorithms, based on approximation algorithms for SNDP. Inparticular, we show that by using the best-known approximationalgorithm for SNDP [7], our framework becomes an -approxi-mation algorithm for the general RNPs-P problem, and a -ap-proximation algorithm for the special RNPs-P problem where

. Table II lists the most closely related results on this topic.

B. A Framework of Efficient Approximation Algorithms

In this section, we present a framework of polynomial timeapproximation algorithms for RNPs-P. Our framework is basedon polynomial time approximation algorithms for -SNDP. Our framework for RNPs-P is presented as Algorithm 2.

Algorithm 2 Approximation forRNPs-P

Input : , set of SNs , set of BSs , set of candidatelocations of RNs , and an approximation algorithm for the

-SNDP.

Output : A -RNPs for given by .

1: Construct .

2: if the nodes in are not in a single biconnectedcomponent of

3: The RNPs-P problem does not have a feasible solution.

Page 8: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

MISRA et al.: CONSTRAINED RELAY NODE PLACEMENT IN WIRELESS SENSOR NETWORKS 441

Stop.

4: end if

5: Assign edge weights to the edges inas in Definition 2.2.

6: Assign connectivity requirements between every pair ofnodes in in the following way. Let and be two nodes.If neither of them is in , set . Otherwise, set

.

7: Apply the polynomial time -approximation algorithmto compute a low weight biconnected subgraph

of which meets the connectivityrequirement specified in the previous step of this algorithm.

8: Output .

The major steps of our scheme are as follows. First, we con-struct , as if we were placing a RN at everycandidate location in . This is accomplished in Line 1 of thealgorithm. The given instance of the problem has a feasible so-lution if and only if all of the BSs and SNs are in the same bi-connected component of . We can computeall of the biconnected components of inlinear time using depth first search [6]. This is accomplished inLines 2–4 of the algorithm. Next, we assign nonnegative integerweights to the edges of the as in Definition 2.2. This is ac-complished in Line 5 of the algorithm. In Line 6, we constructan instance of the -SNDP problem. Then, we apply al-gorithm to compute a low-weight biconnected subgraphof , spanning all nodes in . This isaccomplished in Line 7 of the algorithm. Finally, in Line 8, weidentify the locations to place the RNs.

Theorem 4.1: Algorithm 2 has a worst-case running timebounded by , where is the timecomplexity of the approximation algorithm used for approx-imating -SNDP. Furthermore, we have the following:

• RNPs-P has a feasible solution if and onlyif has a biconnected component thatcontains all nodes in .

• When RNPs-P has a feasible solution,Algorithm 2 guarantees computing a feasible solutionthat uses no more than times thenumber of RNs required in an optimal solution ,where is a minimum-weight biconnected sub-graph of that spans all nodes in

, and is the approximation ratio of .Proof: Let be an optimal solution of the -

SNDP instance. Since is a feasible solution to -SNDP, and is a -approximation algorithm for -SNDP, we have

(4.1)

We need to find an upper bound on using a func-tion of . Let denote the total weights ofthe 2-weight edges in , and let denote

Fig. 3. Proof of Lemma 4.1: � �� � � � (a) Delete �� � �� (b) Deleteedge �� � ��.

the total weights of the 1-weight edges in . We have. Since each RN in

is incident with at most -weight edges in , wehave

(4.2)

Applying Lemma 2.3 to each of the connected components ofthe subgraph of induced by all the 2-weight edges, we have

(4.3)

It follows from Lemma 2.1 that

(4.4)

(4.5)

This proves the theorem.There are several choices of the approximation algorithm

for -SNDP. For example, if we use the algorithm of[7], the corresponding approximation ratio is . If we usethe algorithm of [26], the corresponding approximation ratio is

. Next, we will prove a bound for .Lemma 4.1: Let be an optimal solution to RNPs-P

. Let be a minimum-weight biconnectedsubgraph of spanning all nodes in thegraph. Then, , .

Proof: We prove this by contradiction. Assume that RNis connected to six sensor nodes in . Withoutloss of generality, assume that . Since, and , we have .

Therefore, is an edge in . Sincethe weight of is 0, we can assume that .

Since is biconnected, it contains an – path thatdoes not go through . If path does not go through node [asshown in Fig. 3(a)], contains a cycle (the edges ,

, concatenated with the path ) and one of itschords . Deleting the chord from will re-duce its weight without destroying its biconnectivity [31]. Thiscontradicts the minimum weight property of . If pathgoes through node [as shown in Fig. 3(b)], contains acycle (the edge concatenated with the path ) and one ofits chords . Deleting the chord from will re-duce its weight without destroying its biconnectivity [31]. Thisagain contradicts the minimum weight property of .

Now, assume that RN is connected to two BSs and in. Since is an optimal solution, is connected to a SN

Page 9: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

442 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010

Fig. 4. Proof of Lemma 4.1:� �� � � � (a) Delete edge �� � �� (b) Deleteedge �� � ��.

or another RN in . Since the weight of is 0, wecan assume that .

Since is biconnected, it contains a – path thatdoes not go through . If path does not go through node[as shown in Fig. 4(a)], contains a cycle (the edges ,

, concatenated with the path ) and one of itschords that has a weight of 1. Deleting the chordfrom will reduce its weight without destroying its bicon-nectivity [31]. This contradicts the minimum weight propertyof . If path goes through node [as shown in Fig. 4(b)],

contains a cycle (the edge concatenated with thepath ) and one of its chords . This again contradicts theminimum weight property of .

Corollary 4.1: The general RNPs-P problem has a -ap-proximation algorithm with a polynomial running time. Thespecial RNPs-P problem, where , has a -approxima-tion algorithm with a polynomial running time.

Proof: This is achieved by choosing as the 2-approxi-mation algorithm of Fleischer [7].

Corollary 4.2: The general RNPs-P problem has a -ap-proximation algorithm with a running time of

, where and are the node set and edge set of, and is the inverse Ackermann func-

tion [6]. The special case of RNPs-P, where , has a-approximation algorithm with a running time of

.Proof: This is achieved by choosing as the 3-approxima-

tion algorithm of Ravi and Williamson for the -SNDPproblem [26], [27].

V. EFFICIENTLY COMPUTABLE LOWER BOUNDS

In order to evaluate the performance of the approximation al-gorithms that we developed in the previous two sections, weneed to compare the approximate solutions with the optimal so-lutions. The lack of efficient algorithms for computing optimalsolutions for RNPc-P and RNPs-P presents a challenge for thenecessary performance study of our approximation algorithms.Since RNPc-P is known to be NP-hard, and RNPs-P is believedto be NP-hard, it is unlikely that one will be able to computeoptimal solutions to these problems in a reasonable amount oftime, unless the input size of the instances is very small. In thissection, we present a unified linear programming (LP) formula-tion that can efficiently compute lower bounds for both RNPc-Pand RNPs-P. These lowers bounds will be used to study the per-formance of our approximation algorithms in the next section.We denote the LP formulation by , where corre-sponds to the case of RNPc-P and corresponds to thecase of RNPs-P.

TABLE IIINOTATION USED IN THE LP FORMULATION

Our LP formulation is based on multicommodity flowpacking [25] defined on the . We arbitrarily pick one ofthe base stations (say ) as the common sink and route a flowof type- and value- from node to this common sink foreach sensor node . This type- flow is distributed onthe edges of the (in the variables for )and routed toward the common sink node. For each andeach , the amount of type- flow going through node(denoted by the variable ) cannot exceed 1. For eachand each other than the common sink, the amount oftype- flow going through node (denoted by the variable )cannot exceed 1. For each , the maximum amount of flowof any type going through node is denoted by the variable .The objective of the LP is to minimize subject to flowconservation constraints in addition to the above constraints.When the variables are restricted to 0 and 1values, becomes an integer LP problem, which we de-note by . A feasible solution to corresponds to a

-RNPc where there is a relay node placed at iffin the feasible solution, as the solution guarantees that there isa path connecting sensor node and base station for eachsensor node . Similarly, a feasible solution tocorresponds to a -RNPs where there is a relay node placedat iff in the feasible solution, as the solutionguarantees that there are two node-disjoint paths connectingsensor node and base station for each sensor node .Therefore, the optimal objective function values of and

are the numbers of relay nodes required in the optimalsolutions to RNPc-P and RNPs-P, respectively, where there isa relay node at iff in the optimal solution. We listthe notations used in the LP formulation in Table III and presentthe LP formulation as . See equations (5.1)–(5.11) at thebottom of the next page.

Constraint (5.2) ensures that the net flow of type-x out of nodex is f. Constraint (5.3) ensures that the net flow of type-x intonode t is f. Constraints (5.4) and (5.5) ensure that for eachand , the total flow of type-x into node z is and thatthe total flow of type-x out of node z is also . Constraints(5.6) and (5.7) ensure that for each and , thetotal flow of type-x into node b is and that the total flow oftype-x out of node b is also . Constraint (5.8) ensures that theflow of type-x on each link is a real number between 0 and 1.

Page 10: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

MISRA et al.: CONSTRAINED RELAY NODE PLACEMENT IN WIRELESS SENSOR NETWORKS 443

Fig. 5. Example network for the LP formulation illustration.

Constraint (5.9), together with Constraints (5.4) and (5.5), en-sures that for each and , the total flow of type-xinto node z is a real number between 0 and and 1, which equalsthe total flow of type-x out of node z. Constraint (5.10), togetherwith Constraints (5.6) and (5.7), ensures that for eachand , the total flow of type-x into node b is a real numberbetween 0 and and 1, which equals the total flow of type-x out ofnode b. Constraint (5.11) defines the flow packing, i.e., for each

, is the maximum usage of node z among all types offlows. The objective function (5.1) to be minimized is the sum-mation of the maximum usages over all nodes .

Fig. 5 shows a small input instance that we shall use to illus-trate the LP formulation of RNPc-P and RNPc-P. The instanceconsists of two SNs 0 and 1, two RNs 2 and 3, and two BSs 4 and5. We pick as the common sink node for the LP formula-tions. The corresponding LP formulations for RNPc-Pand RNPs-P is shown in Fig. 6.

Next, we will prove that the solution to LP(f) leads to a lowerbound on the optimal solution for RNPc-P (with ) and forRNPs-P (with ).

Theorem 5.1: Let be the objective function value of LP(1),and be the objective function value of LP(2). Then, is a

Fig. 6. LP formulation for the illustrative deployment setup.

lower bound on the optimal value of RNPc-P, and is a lowerbound on the optimal value of RNPs-P.

over variables (5.1)

(5.2)

(5.3)

(5.4)

(5.5)

(5.6)

(5.7)

(5.8)

(5.9)

(5.10)

(5.11)

Page 11: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

444 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010

Fig. 7. Results with increasing density: 100� 100 playing field; ��� � ���; �� � �� � ��� ��� ��� ��� ��� ���� ���� ���� ���. (a) Running times ofARNPc and ARNPs. (b) Number of RNs used by ARNPc, LP-RNPc. (c) Number of RNs used by ARNPs, LP-RNPs.

Proof: Let an instance for the relay node placementproblem be given by , sensors , base stations ,and candidate locations for relay nodes . We arbitrarily pick

as the common sink node.Let be a -RNPc for the given instance. Then,

the hybrid communication graph is con-nected. Therefore, for each , there is an – path in

. We can use this path to define the type-flow of value-1 in . Also, for each ,set if , and otherwise. Then, we havea feasible solution for LP(1) whose objective function value isequal to . This proves that is a lower bound for the op-timal solution of RNPc-P.

Let be a -RNPs for the given instance. Then the hy-brid communication graph is 2-connected.Therefore, for each , there exists a pair of node-disjoint

paths in . We can use this pair of pathsto define the type- flow of value-2 in .Also, for each , set if , andotherwise. Then, we have a feasible solution for LP(2) whoseobjective function value is equal to . This proves that isa lower bound for the optimal solution of RNPs-P.

Note that LP(f) can be solved in polynomial time, which canprovide a lower bound on the optimal solutions for RNPc-P(with ) and for RNPs-P (with ). If an approximatesolution produced by an approximation algorithm to RNPc-P(RNPs-P, respectively) is within a factor of from its lowerbound, it is guaranteed to be within a factor of from its optimalsolution. We will use these efficiently computable lower boundsin our performance studies in the next section.

VI. NUMERICAL RESULTS

To verify the effectiveness of the frameworks presented in thispaper, we have implemented our approximation algorithms forboth RNPc-P and RNPs-P, tested them on a variety of test prob-lems, and compared the solutions obtained by our approxima-tion algorithms with the corresponding lower bounds computedusing the LP formulations presented in Section V. We havestudied both the running times (for scalability) and the numberof relay nodes required (for performance of approximation). Thenumerical results show that our theoretical analyses are quiteconservative. In all cases, the number of relay nodes required inthe solutions obtained by our approximation algorithms is very

close to the corresponding theoretical lower bounds. This in-dicates that our approximation algorithms are very effective inpractice.

The algorithms implemented are: 1) ARNPc, which is Algo-rithm 1 with being the MST based 2-approximation in [17] forSTP (simpler than the algorithm in [28]); 2) ARNPs, which isAlgorithm 2 with being the sequential maximum-flow-based3-approximation in [26] for -SNDP (simpler than thealgorithm in [7]); 3) LP-RNPc, which solves LP(1) using ILOGCPLEX [35]; and 4) LP-RNPs, which solves LP(2) using ILOGCPLEX [35]. The tests were run on a 2.4-GHz Linux PC with1 GB of memory.

As in [15] and [34], the SNs were randomly distributed in asquare playing field. Two base stations were randomly deployedin the field. We used both regular grid points and randomly gen-erated points as the candidate locations for the relay nodes. Forboth setups, we set and .

We first present the results for the case where the candidatelocations are regular grid points. For this setting, we chose thegrid to be a square grid since it is the most commonly useddeployment. The playing field consists of small squareseach of side 10, with the grid points as . We studiedtwo separate settings: the case where the density of the SNs inthe field increases and the case where the density is constant.We define the density as the ratio between the number of SNsin the field and the area of the field. For the increasing densitycase, we chose a constant field size of square units.For the constant density case, we let the size of the playing fieldincrease with the number of SNs.

In the case with increasing density, the number of candi-date RN locations was 121. The number of SNs was variedfrom 10 to 120. For each setting, the SNs were deployed ran-domly in the field. The results were averaged over 10 test cases.Fig. 7(a) shows the running time of ARNPs and ARNPc. The

-axis is the sum of the average number of edges and nodesin the (as the running time of the algorithm depends onboth and ), and the -axis is the running time in seconds.The solid line shows the running time of ARNPc, which is lessthan 1 s in all cases. This is because of the com-plexity of ARNPc, which is fairly small. The dashed line showsthe running time of ARNPs. The running time of ARNPs in-creases with the increase of the number of SNs and decreasesafter a certain threshold, as shown in the figure. This is ex-pected because the -SNDP algorithm requires com-putation of the maximum flows for every pair of SNs in the

Page 12: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

MISRA et al.: CONSTRAINED RELAY NODE PLACEMENT IN WIRELESS SENSOR NETWORKS 445

Fig. 8. Results with constant density: seven different playing fields, from 40� 40 to 100� 100; two density values, � � ����� and � � ����. (a) Runningtimes of ARNPc and ARNPs. (b) Number of RNs used by ARNPc, LP-RNPc. (c) Number of RNs used by ARNPs, LP-RNPs.

Fig. 9. Random grid—Results with increasing density: 100� 100 playing field; ��� � ���; �� ��� � ��� ��� ��� ��� ��� ���� ���� ���� ��. (a) Runningtimes of ARNPc and ARNPs. (b) Number of RNs used by ARNPc, LP-RNPc. (c) Number of RNs used by ARNPs, LP-RNPs.

network that are not biconnected yet. If the number of SNs in-creases beyond the threshold, the biconnectivity among the SNsalso increases correspondingly. This increased biconnectivityreduces the number of maximum flow computations required,resulting in a decrease in the running time. From the figures,we conclude that ARNPc is has a fast running time, whereasARNPs requires increasing computation with increasing valuesof up to a threshold beyond which the computationtime decreases. Fig. 7(b) and (c) show the average number ofRNs required by ARNPc and ARNPs, respectively, and that re-quired by LP-RNPc and LP-RNPs, respectively. The number ofRNs required decreases with an increase in the number of SNs.This is because with an increase in the number of SNs, they areable to satisfy the connectivity and survivability requirementswith the help of less number of RNs. From the figures, we canconclude that in a network where the SNs are sparsely deployed,use of an effective algorithm is essential for efficient relay nodesplacement. With increasing density, the number of relay nodesrequired is much lesser, hence the effectiveness of the algorithmis not as crucial. We note that in all cases, the number of RNs re-quired by our approximation algorithms is no worse than twicethat of the number obtained from solving the corresponding LPs.This indicates that our approximation algorithms perform verywell.

For the case of constant density, we studied two subcases: onewith density and the other with density .For each density value, we used seven different numbers of SNs.The field sizes were chosen to be , withthe number of SNs ranging from 8 to 50 for , and 16 to 100 for

, deployed randomly in the field. The result of each configura-tion was averaged over 10 test cases. Fig. 8(a) shows the runningtimes of ARNPc and ARNPs. For both densities, ARNPc hasrunning time less than 1 s because of its small time complexity.

On the other hand, the running time of ARNPs is dependent onboth the density and the number of SNs in the network. The run-ning time for is lesser than that of . Thisis expected because with the increase in density, more pairs ofSNs are already biconnected. Hence, our algorithm runs fasterwith an increase in density. Fig. 8(b) and 8(c) show the numberof RNs required by various algorithms. Our algorithms performvery well in comparison with the results obtained by solvingthe LPs. In the worst case, the number of RNs obtained fromARNPc is four times the number obtained from solving the cor-responding LPs. This is the case where the density is and thefield size is 40 40. This shows that our theoretical analysison the approximation ratios of our approximation algorithmsis quite conservative. In other words, our approximation algo-rithms perform quite better than the theoretical approximationratios indicate.

Now, we present results where the candidate locations of theRNs were randomly generated. This simulates a random deploy-ment of the RNs, say, from an aircraft or a terrestrial vehicle. Inthis setup, we studied the settings where the density of the SNsin the field increases and where the density remains constant.The parameters of the simulations are exactly the same barringthe fact that the RNs are now randomly deployed in the squarefield instead of on a square grid. This setup may also be thoughtof as the placement of the RNs on a random grid. Fig. 9 showsthe results for the increasing density case. The trend is similarto the case with square grid. Despite the trend being the same,the value of the running time is higher in the random grid casethan in the square grid case. This is because in the random gridcase, due to the random deployment of the RNs, a RN chosen atan iteration in the algorithm may only be able to biconnect oneSN that needs to be biconnected. This results in more computa-tion to ensure that all the SNs are biconnected, thus increasing

Page 13: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

446 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010

Fig. 10. Random grid—Results with constant density: seven different playing fields, from 40� 40 to 100� 100; two density values, � � ����� and � � ����

(a) Running times of ARNPc and ARNPs (b) Number of RNs used by ARNPc, LP-RNPc (c) Number of RNs used by ARNPs, LP-RNPs.

the running time. Fig. 9(b) and (c) show the number of RNsused for the connectivity and survivability cases, respectively.The number of RNs obtained by our approximation algorithmsis within two times the number obtained by the solution of thecorresponding LPs.

Fig. 10 shows the results for the constant density case. Therunning time of the ARNPc and ARNPs algorithms is shown inFig. 10(a). In comparison to the running time plot in the squaregrid case, we can see that the running time of the ARNPs for

is higher than the running time for .This is due to the random placement of the RNs. The numberof SNs when the density is is twice that when in the densityis . Owing to the random deployment of the RNs, it takesmore time to biconnect the SNs in the network. Thus, we canconclude that, in the random grid case, increase in the densityof the SNs can increase the running time of ARNPs. Fig. 10(b)shows the number of RNs required when ARNPc and LP-RNPcare used. As expected, the number of RNs required when thedensity is is lesser than that required when the densityis . The number of RNs required by ARNPc is lessthan four times that required by the LP solution in the worst case(40 40 case). Fig. 10(c) shows the number of RNs required forsurvivability. The number of RNs required by ARNPs is nevermore than twice the number required by the LP solution. Thesimulation results show that our approximation algorithms arevery effective in solving RNPc-P and RNPs-P.

VII. CONCLUSION

In this paper, we have formulated constrained single-tieredrelay node placement problems in a heterogeneous wirelesssensor network to meet connectivity and survivability require-ments. We have discussed the computational complexities ofthese problems and presented a framework of polynomial timeapproximation algorithms with approximation ratios. Toour best knowledge, we are the first to present approx-imation algorithms for the constrained relay node placementproblems.

The connectivity requirement in this paper ensures the exis-tence of a bidirectional path between each sensor node and abase station, which supports both broadcast from a base stationand data collection to the base stations. A weaker connectivityrequirement is one that ensures the existence of a directionalpath from each sensor node to a base station, which supports

data collection only. Obviously, the number of relay nodes re-quired to ensure this weaker connectivity will not exceed thenumber of relay nodes required to ensure the stronger connec-tivity studied in this paper. The study of constrained relay nodeplacement under this weaker connectivity requirement may bea direction of future research.

Instead of placing the more powerful and more expensiverelay nodes to meet the connectivity or survivability require-ment, one may also place the less expensive sensor nodes tomeet the connectivity or survivability requirement. This corre-sponds to the special case of . The algorithms studied inthis paper apply to this case as well. However, approximationalgorithms with smaller approximation ratios may exist for thisspecial case. Therefore, the study of better algorithms for thiscase is also of interest.

ACKNOWLEDGMENT

The authors wish to thank the associate editor and the anony-mous reviewers, whose constructive and insightful commentson an earlier version of this paper have helped to significantlyimprove the presentation of the paper.

REFERENCES

[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wire-less sensor networks: A survey,” Comput. Netw., vol. 38, pp. 393–422,2002.

[2] J. Bredin, E. Demaine, M. Hajiaghayi, and D. Rus, “Deploying sensornetworks with guaranteed capacity and fault tolerance,” in Proc. ACMMobiHoc, 2005, pp. 309–319.

[3] D. Chen, D. Z. Du, X. D. Hu, G. Lin, L. Wang, and G. Xue, “Approx-imations for Steiner trees with minimum number of Steiner points,” J.Global Optimization, vol. 18, pp. 17–33, 2000.

[4] P. Cheng, C. N. Chuah, and X. Liu, “Energy-aware node placementin wireless sensor networks,” in Proc. IEEE Globecom, 2004, pp.3210–3214.

[5] X. Cheng, D. Z. Du, L. Wang, and B. Xu, “Relay sensor placement inwireless sensor networks,” Wireless Netw., vol. 14, pp. 347–355, 2008.

[6] T. Cormen, C. Leiserson, R. Rivest, and C. Stein, Introduction to Algo-rithms, 2nd ed. Cambridge, MA: MIT Press and McGraw-Hill, 2001.

[7] L. Fleischer, “A 2-Approximation for minimum cost {0, 1, 2} vertexconnectivity,” in Proc. IPCO, 2001, pp. 115–129.

[8] M. R. Garey and D. S. Johnson, Computers and Intractability: A Guideto the Theory of NP-Completeness. San Francisco, CA: Freeman,1979.

[9] G. Gupta and M. Younis, “Fault tolerant clustering of wireless sensornetworks,” in Proc. WCNC, 2003, pp. 1579–1584.

[10] X. Han, X. Cao, E. L. Lloyd, and C.-C. Shen, “Fault-tolerant relay nodeplacement in heterogeneous wireless sensor networks,” in Proc. IEEEINFOCOM, 2007, pp. 1649–1657.

Page 14: 434 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2

MISRA et al.: CONSTRAINED RELAY NODE PLACEMENT IN WIRELESS SENSOR NETWORKS 447

[11] B. Hao, J. Tang, and G. Xue, “Fault-tolerant relay node placement inwireless sensor networks: Formulation and approximation,” in Proc.IEEE HPSR, 2004, pp. 246–250.

[12] Y. T. Hou, Y. Shi, H. D. Sherali, and S. F. Midkiff, “Prolonging sensornetwork lifetime with energy provisioning and relay node placement,”in Proc. IEEE Secon, 2005, pp. 295–304.

[13] F. K. Hwang, D. S. Richards, and P. Winter, The Steiner TreeProblem. Amsterdam, The Netherlands: North Holland, 1992,Annals of Discrete Mathematics.

[14] B. Karp and H. Kung, “GPSR: Greedy perimeter stateless routing forwireless networks,” in Proc. ACM Mobicom, 2001, pp. 243–254.

[15] A. Kashyap, S. Khuller, and M. Shayman, “Relay placement for higherorder connectivity in wireless sensor networks,” in Proc. IEEE IN-FOCOM, pp. 1–12.

[16] W.-C. Ke, B.-H. Liu, and M.-J. Tsai, “Constructing a wireless sensornetwork to fully cover critical grids by deploying minimum sensors ongrid points is NP-complete,” IEEE Trans. Comput., vol. 56, no. 5, pp.710–715, May 2007.

[17] L. T. Kou, G. Markowsky, and L. Berman, “A fast algorithm for Steinertrees,” Acta Informatica, vol. 15, pp. 141–145, 1981.

[18] Q. Li, J. Aslam, and D. Rus, “Online power-aware routing in wirelessad-hoc networks,” in Proc. ACM Mobicom, 2001, pp. 97–107.

[19] G. Lin and G. Xue, “Steiner tree problem with minimum number ofSteiner points and bounded edge-length,” Inf. Process. Lett., vol. 69,pp. 53–57, 1999.

[20] H. Liu, P. J. Wan, and X. H. Jia, “Fault-tolerant relay node placementin wireless sensor networks,” LNCS, vol. 3595, pp. 230–239, 2005.

[21] E. Lloyd and G. Xue, “Relay node placement in wireless sensor net-works,” IEEE Trans. Comput., vol. 56, no. 1, pp. 134–138, Jan. 2007.

[22] W. Lou, W. Liu, and Y. Fang, “SPREAD: Enhancing data confiden-tiality in mobile ad hoc networks,” in Proc. IEEE INFOCOM, 2004,pp. 2404–2413.

[23] S. Misra, D. Hong, G. Xue, and J. Tang, “Constrained relay node place-ment in wireless sensor networks to meet connectivity and survivabilityrequirements,” in Proc. IEEE INFOCOM, 2008, pp. 281–285.

[24] J. Pan, Y. T. Hou, L. Cai, Y. Shi, and S. X. Shen, “Topology control forwireless sensor networks,” in Proc. ACM Mobicom, 2003, pp. 286–299.

[25] S. Plotkin, D. Shmoys, and E. Tardos, “Fast approximation algorithmsfor fractional packing and covering problems,” Math. Oper. Res., vol.20, pp. 257–301, 1995.

[26] R. Ravi and D. P. Williamson, “An approximation algorithm for min-imum-cost vertex-connectivity problems,” Algorithmica, vol. 18, pp.21–43, 1997.

[27] R. Ravi and D. P. Williamson, “Erratum: An approximation algorithmfor minimum-cost vertex-connectivity problems,” Algorithmica, vol.34, pp. 98–107, 2002.

[28] G. Robins and A. Zelikovsky, “Tighter bounds for graph Steiner treeapproximation,” SIAM J. Discrete Math., vol. 19, pp. 122–134, 2005.

[29] A. Srinivas, G. Zussman, and E. Modiano, “Mobile backbone net-works-Construction and maintenance,” in Proc. ACM Mobihoc, 2006,pp. 166–177.

[30] J. Tang, B. Hao, and A. Sen, “Relay node placement in large scalewireless sensor networks,” Comput. Commun., vol. 29, pp. 490–501,2006.

[31] D. B. West, Introduction to Graph Theory. Englewood Cliffs, NJ:Prentice Hall, 1996.

[32] K. Xu, H. Hassanein, and G. Takahara, “Relay node deployment strate-gies in heterogeneous wireless sensor networks: multiple-hop commu-nication case,” in Proc. IEEE Secon, 2005, pp. 575–585.

[33] O. Younis and S. Fahmy, “Distributed clustering for ad-hoc sensornetworks: A hybrid, energy-efficient approach,” in Proc. IEEE IN-FOCOM, 2004, pp. 269–640.

[34] W. Zhang, G. Xue, and S. Misra, “Fault-tolerant relay node placementin wireless sensor networks: Problems and algorithms,” in Proc. IEEEINFOCOM, 2007, pp. 1649–1657.

[35] “ILOG CPLEX: Software for mathematical programming and opti-mization,” ver. 8.1, 2002 [Online]. Available: http://www.ilog.com/products/cplex/

Satyajayant Misra (S’04–M’09) received the inte-grated M.Sc. (Tech.) information systems and M.Sc.(Hons.) physics degrees from the Birla Institute ofTechnology and Science, Pilani, India, in June 2003,and the Ph. D. degree in computer science from Ari-zona State University, Tempe, in 2009.

He is an Assistant Professor with the Departmentof Computer Science, New Mexico State University,Las Cruces. His research interests include identifyingsecurity, privacy, and reliability issues in wirelesssensors and ad hoc networks and formulating effi-

cient solutions to handle them.

Seung Don Hong received the B.S. degree in com-puter science and engineering from Arizona StateUniversity, Tempe, in May 2005.

Since then, he has been a Ph.D. student in the De-partment of Computer Science and Engineering, Ari-zona State University. His research interests includewireless sensor networks.

Guoliang (Larry) Xue (SM’99) received the B.S.degree in mathematics and the M.S. degree in opera-tions research from Qufu Teachers University, Qufu,China, in 1981 and 1984, respectively, and the Ph.D.degree in computer science from the University ofMinnesota, Minneapolis, in 1991.

He is a Full Professor of computer science and en-gineering with Arizona State University, Tempe, andhas held previous positions at Qufu Teachers Uni-versity; the Army High Performance Computing Re-search Center, Stanford, CA; and the University of

Vermont, Burlington. His research interests include efficient algorithms for op-timization problems in networking, with applications to QoS, survivability, se-curity, privacy, and energy efficiency issues in networks. He has published over160 papers in these areas. His research has been continuously supported by fed-eral agencies including the NSF and ARO.

Prof. Xue has been a Member of the Association for Computing Machinery(ACM) since 1993. He received the Graduate School Doctoral DissertationFellowship from the University of Minnesota in 1990, a third prize fromthe Ministry of Education of P.R. China in 1991, a NSF Research InitiationAward in 1994, and a NSF-ITR Award in 2003. He is an Editor of the IEEETRANSACTIONS ON WIRELESS COMMUNICATIONS (TWC), an Area Editorof Computer Networks (COMNET), an Editor of IEEE Network, and anAssociate Editor of the Journal of Global Optimization. He has served on theexecutive/program committees of many conferences, including ACM Mobihoc,IEEE INFOCOM, IEEE Secon, IEEE ICC, and IEEE Globecom. He was aTPC Co-Chair of the IEEE ICC Symposium on Wireless Ad Hoc and SensorNetworks in 2007 and 2009, and a TPC Co-Chair of QShine in 2007. He isserving as a TPC Co-Chair of IEEE INFOCOM 2010.

Jian Tang (S’04–M’08) received the Ph.D. degreein computer science from Arizona State University,Tempe, in 2006.

He is an Assistant Professor with the Departmentof Computer Science, Montana State University,Bozeman. His research interest is in the area ofwireless networking, with emphasis on routing,scheduling, cross-layer optimization, and QoSprovisioning. He has published over 40 papers inthis area. His research has been supported by theNational Science Foundation, U.S. Department of

Homeland Security, and Montana State.Dr. Tang is the recipient of an NSF CAREER award. He has served on the ex-

ecutive or program committees of many international conferences such as IEEEINFOCOM, IEEE ICC, IEEE Globecom, IEEE IWQoS, and IEEE ICCCN.