Next Article in Journal
Storing Set Families More Compactly with Top ZDDs
Next Article in Special Issue
A General Cooperative Optimization Approach for Distributing Service Points in Mobility Applications
Previous Article in Journal
Adaptive Versioning in Transactional Memory Systems
Previous Article in Special Issue
Chaos and Stability in a New Iterative Family for Solving Nonlinear Equations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Greedy Heuristic for Maximizing the Lifetime of Wireless Sensor Networks Based on Disjoint Weighted Dominating Sets

1
Department of Computer Science, Ferhat Abbas University Sétif 1, Sétif 19000, Algeria
2
Department of Computer Science, Mechatronics Laboratory (LMETR)—E1764200, Ferhat Abbas University Sétif 1, Sétif 19000, Algeria
3
Artificial Intelligence Research Institute (IIIA-CSIC), Campus of the UAB, 08193 Bellaterra, Spain
*
Author to whom correspondence should be addressed.
Algorithms 2021, 14(6), 170; https://doi.org/10.3390/a14060170
Submission received: 9 May 2021 / Revised: 27 May 2021 / Accepted: 28 May 2021 / Published: 31 May 2021
(This article belongs to the Special Issue 2021 Selected Papers from Algorithms Editorial Board Members)

Abstract

:
Dominating sets are among the most well-studied concepts in graph theory, with many real-world applications especially in the area of wireless sensor networks. One way to increase network lifetime in wireless sensor networks consists of assigning sensors to disjoint dominating node sets, which are then sequentially used by a sleep–wake cycling mechanism. This paper presents a greedy heuristic for solving a weighted version of the maximum disjoint dominating sets problem for energy conservation purposes in wireless sensor networks. Moreover, an integer linear programming model is presented. Experimental results based on a large set of 640 problem instances show, first, that the integer linear programming model is only useful for small problem instances. Moreover, they show that our algorithm outperforms recent local search algorithms from the literature with respect to both solution quality and computation time.

Graphical Abstract

1. Introduction

Wireless sensor networks (WSNs) have received increasing attention in the last decade due to their potential applications in various fields such as environmental monitoring, medical and health applications, security surveillance and emergency operations [1]. They are generally composed of a rather large number of small devices, called sensors, with a limited low-power supply that depletes rather quickly. The lifetime of a sensor device (in hours) is generally calculated by dividing the battery capacity (in Watt hours) by the average power drain (in Watts). However, as the energy consumption also depends on other factors—such as, for example, the operating temperature—the estimation of the lifetime of a sensor node is not trivial [2]. One of the most challenging issues in WSNs is extending the lifetime of the network while providing sufficient sensing coverage and communication reliability. The lifetime of a network is defined as the time (duration) in which the network is fully functional with respect to the tasks that have to be fulfilled, that is, the time duration in which the overall sensing coverage is maintained. Therefore, WSN lifetime significantly depends on the energy consumption of sensors in the context of limited energy availability. Examples of real-world applications for maximizing sensor network lifetime can be found in [3] (human activity monitoring), [4] (smart agriculture monitoring), [5] (road traffic monitoring), and [6] (structural health monitoring).
According to [7], power saving strategies can usually be classified under one of the following mechanisms:
  • Sleep–wake cycling (also called duty cycling): Sensors switch between active and sleep mode.
  • Power control by adjusting the transmission range of wireless nodes.
  • Energy efficient routing, and data gathering.
  • Reducing the amount of transmitted data and avoiding useless activity.
This study focuses on the first possibility, in the following way. The problem of extending (prolonging) WSN lifetime is addressed by organizing the sensors into a number of disjoint subsets that are activated successively. We require that each of these subsets is a dominating set of the communication graph defined by a sensor network. Note that, given the locations of the sensors, the communication graph is obtained by joining two sensors with an edge in case they can communicate with each other via their wireless antennas. The requirement of a subset of sensors being a dominating set is introduced such that each subset of nodes is able to cover the whole coverage area.
The maximization of network lifetime has been studied in the literature from different perspectives. Most of them addressed the problem either via the set K-cover problem (also known as the target coverage problem) or as the domatic partition problem (also known as the maximum disjoint dominating sets problem). Slijepcevic and Potkonjak [8] were the first ones to model the problem as a set K-cover problem and proved its NP-hardness using a polynomial time transformation from the minimum cover problem. The set K-cover problem is defined over a bipartite graph of two node sets (sensors and targets) with the aim to partition the sensors into a maximum number of disjoint sets (covers) over all targets. These sensor covers are then activated one after the other to effectively extend the WSN lifetime. The sensors of an active cover are able to monitor the entire set of targets. Due to the hardness of the problem, a variety of approximate algorithms have been devised, also for different variants of the problem. Examples include a greedy heuristic [8], memetic algorithms [9,10,11], cuckoo search [12] and a genetic algorithm [13].
As mentioned before, the maximization of the lifetime of WSNs is often approached through the domatic partition problem in which the goal is to find a partition of the nodes of a given network—represented as a simple, undirected graph—into a maximum number of disjoint dominating sets. Throughout this paper, we refer to the domatic partition problem as maximum disjoint dominating sets (MDDS) problem. The MDDS problem, which belongs to the large and important family of dominating set problems [14,15,16], is known to be NP-hard for general graphs [17]. Cardei et al. [18] proved the NP-completeness of one of its variants known as the 3-disjoint dominating sets problem that asks for deciding whether or not a given graph contains three disjoint dominating sets. The same authors showed that, unless P = NP, the MDDS problem has no polynomial-time approximation with a performance guarantee of less than 1.5. They also introduced a heuristic approach based on graph coloring. In the same year, Feige et al. [19] proved that every graph of order n with maximum degree Δ and minimum degree δ includes a domatic partition (a collection of disjoint dominating sets) of size ( 1 o ( 1 ) ) ( δ + 1 ) / ln Δ . Here, the term o ( 1 ) tends to zero as n increases. Moreover, they showed that there is no approximation algorithm for the MDDS problem with an approximation ratio of ( 1 + o ( 1 ) ) ln n unless N P D T I M E ( n O ( log log n ) ) . The same authors also provided a centralized algorithm to find a domatic partition of size Ω ( δ / ln Δ ) . Based on this later work, Moscibroda and Wattenhöfer [20] defined the MDDS problem as the maximum cluster-lifetime problem and introduced a randomized, distributed algorithm that has—with high probability—a performance ratio of O ( log ( n ) ) . Nguyen and Huynh [21] demonstrated that the 3-disjoint dominating sets problem remains NP-complete even for planar unit disk graphs and studied the performance comparison of four greedy heuristics for the MDDS problem. In [22], a greedy heuristic of time complexity O ( n 3 ) is described. More recently, Pino et al. [23] focused on a weighted variant of the MDDS problem which is henceforth labelled the maximum weighted disjoint Dominating Sets (MWDDS) problem. In this problem, each node of the input graph—corresponding to a deployed sensor device—carries a weight that corresponds to its remaining lifetime. The lifetime of a dominating set is then defined as the minimum of the lifetimes of the nodes that form part of the set. The optimization goal of the MWDDS is to find a domatic partition such that the sum of the lifetimes of the corresponding dominating sets is maximized. Pino et al. devised three local search algorithms for the MWDDS problem. Each local search algorithm is seeded with an initial feasible solution generated by a modified greedy heuristic from [22] and iteratively swaps nodes between different dominating sets in the solution, in the hope to increase the total lifetime of the network. These local search approaches differ in the way they realize the swaps.
The main contributions of this paper can be summarized as follows:
  • We introduce an integer linear programming (ILP) model for the MWDDS problem.
  • We propose an efficient greedy heuristic for the MWDDS problem.
  • We conduct comprehensive experiments on a set of 640 problem instances in order to investigate the performance and the advantages of our greedy heuristic in comparison to the application of CPLEX and to recent state-of-the-art methods.
The rest of this paper is organized as follows. In Section 2 we provide a technical description of the MWDDS problem and recall some required notations and basic definitions. Next, an ILP model for the MWDDS problem is presented in Section 3. In Section 4, we introduce a new greedy algorithm. Finally, in Section 5 we present and discuss the experimental results, while Section 6 summarizes the work and offers directions for future work.

2. The Maximum Weighted Disjoint Dominating Sets Problem

Let G = ( V , E , lifetime ) be a simple, undirected, node-weighted graph, where V (with | V | = n ) is the set of nodes, E V × V (with | E | = m ) is the set of edges, and lifetime : V R + is a weight function that assigns a positive weight value lifetime ( v ) > 0 to each node v V . Note that such a graph may represent the communication graph of a WSN, and the node weight may represent the lifetime of the node. However, before technically introducing the MWDDS problem, let us briefly recall some basic definitions and notations used throughout this paper. For more details on graph theoretic aspects, the readers may refer to [24]. We say that two nodes v u V are neighbors (adjacent to each other) if and only if there exists an edge between them, that is, ( v , u ) E . Given a node v V , N ( v ) : = { u V ( v , u ) E } denotes the set of neighbors of v, known as the open neighborhood of v in G. Furthermore, the closed neighborhood of a node v V , denoted by N [ v ] , contains the nodes adjacent to v plus node v itself, that is, N [ v ] : = N ( v ) { v } . The degree deg ( v ) of v is the number of neighbors of v, that is, deg ( v ) : = | N ( v ) | . More generally, given a subset of nodes D V , the open neighborhood of D denoted by N ( D ) is defined as v D N ( v ) and its closed neighborhood, denoted by N [ D ] , is defined as N [ D ] : = N ( D ) D .
Definition 1
(Dominating set). A subset D V of the nodes of a simple, undirected graph G = ( V , E ) is called a dominating set of G if and only if each node v V D has at least one neighbor in D. Each node in a dominating set D is called a dominator, otherwise it is called a dominatee. A dominator dominates (covers) itself and all its neighbors.
Note, for example, that—given a simple, undirected graph G = ( V , E ) —the complete set of nodes (V) is a dominating set.
Definition 2
(Domatic partition). A set D = { D 1 , D 2 , , D k } of subsets D i V is called a domatic partition of a simple, undirected graph G = ( V , E ) , if each D i ( i = 1 , , k ) is a dominating set of G and all sets of D are pairwise disjoint, which is the case if for all 1 i < j k it holds that D i D j = .
Definition 3
(Domatic number). The domatic number of a simple, undirected graph G = ( V , E ) is determined as | D * | where D * : = a r g m a x { | D | D   i s   a   d o m a t i c   p a r t i t i o n   o f   G } . In other words, the domatic number of G is the size of the largest domatic partition of G. It is known that the domatic number of a graph G is limited from above by δ + 1 , where δ is the minimum degree of the nodes in V.
Given a simple, undirected graph G = ( V , E ) , the maximum disjoint dominating sets (MDDS) problem requires to find a domatic partition of G of maximal size. Furthermore, given a graph G = ( V , E , lifetime ) as introduced above, the maximum weighted disjoint dominating sets (MWDDS) problem is defined as follows. Any domatic partition D of G is a valid solution. The objective function value of a valid solution D = { D 1 , , D | D | } is defined as f ( D ) : = i = 1 | D | min { lifetime ( v ) v D i } . In other words, the quality of a subset D i is determined as the minimum lifetime of all its nodes. The objective is to find a valid solution D * that maximizes f ( ) . More formally, the problem can be expressed as follows:
max f ( D ) = i = 1 | D | min { lifetime ( v ) v D i }
s . t . D i V , i = 1 , , k
N [ D i ] = V , i = 1 , , k
D i D j = , 1 i < j k
Equation (3) ensures that each set D i is a dominating set and Equation (4) asks for all subsets of D to be pairwise disjoint.

Illustrative Example

Figure 1 provides an illustrative example of the MWDDS problem. Figure 1a,b provide a problem instance and the lifetime values of the nodes in terms of node weights, respectively. Note that, for the sake of simplicity, the lifetime values are normalized between 0 and 1. Figure 1c shows a feasible solution D : = { D 1 = { 3 , 4 } , D 2 = { 1 , 5 , 6 } } , that is, solution D contains the two dominating sets D 1 = { 3 , 4 } and D 2 = { 1 , 5 , 6 } . The lifetimes of nodes 3 and 4 are 0.775 and 0.424, respectively. Therefore, the lifetime of D 1 is 0.424. Moreover, the lifetimes of nodes 1, 5, and 6 are 0.804, 0.782 and 0.021, respectively. This means that the lifetime of D 2 is 0.021. As a consequence, the objective function value f ( D ) of D is the sum of 0.424 and 0.021, which results in 0.445. In contrast, Figure 1d shows the optimal solution to this problem instance, that is, D * : = { D 1 = { 1 , 3 , 5 } , D 2 = { 2 , 4 , 6 } } . According to the lifetime values of the single nodes, the lifetime of D 1 is 0.775, while the lifetime value of D 2 is 0.021. Therefore, the objective function value f ( D * ) of D * is 0.796. Finally, note that, since this graph contains a node of degree 1, any valid solution contains at most two disjoint dominating sets.

3. An ILP Model for the MWDDS Problem

Our ILP model for the MWDDS problem requires the following sets of variables. First, we introduce a binary variable x i j for each node v i ( i = 1 , , n ) and each possible disjoint set D j ( j = 1 , , δ ( G ) + 1 ). Hereby, δ ( G ) : = min { d e g ( v ) v V } . (Remember that the maximum number of disjoint dominating sets in a graph is δ ( G ) + 1 .) When x i j = 1 , node v i is assigned to the j -th dominating set. Second, a binary variable y j ( j = 1 , , δ ( G ) + 1 ) indicates whether or not the j -th set is opened. Finally, a real-valued variable z j [ 0 , M ] ( M R + ) stores the weight of the j -th dominating set. Hereby, M : = max { lifetime ( v ) v V } . Based on these variables, the MWDDS can be stated as an ILP in the following way.
max j = 1 δ ( G ) + 1 z j
s . t . j = 1 δ ( G ) + 1 x i j 1 i = 1 , , n
v k N ( v i ) x k j y j x i j j = 1 , , δ ( G ) + 1
y j x i j i = 1 , , n   a n d   j = 1 , , δ ( G ) + 1
x i j · lifetime ( v i ) + ( 1 x i j ) · M z j i = 1 , , n   a n d   j = 1 , , δ ( G ) + 1
y j · M z j j = 1 , , δ ( G ) + 1
y j y j + 1 j = 1 , , δ ( G )
z j z j + 1 j = 1 , , δ ( G )
The objective function sums over the weight values of all dominating sets. Note that, for this objective function to be correct, the weight value of those dominating sets that are not opened must be set to zero by respective constraints. Constraints (6) require that each node of the graph is assigned to at most one dominating set. This assures the disjointness of the dominating sets. Next, constraints (7) are the so-called dominating set constraints, that is, they ensure that, if the j -th set is opened, then the set of nodes assigned to the j-th set form a dominating set of G. Further, constraints (8) make sure that nodes can only be assigned to opened dominating sets. Constraints (9) are responsible for correctly determining the weights of the opened dominating sets. In other words, the value of variable z j of the j -th dominating set (if open) is set to the minimum of the lifetime-values of all nodes assigned to this set. Next, constraints (10) ensure that the weight values of dominating sets that are not opened are set to zero. Finally, the last two sets of constraints—that is, constraints (11) and (12)—are not necessary for the correctness of the ILP. They are tie-breaking constraints that ensure that (1) if k dominating sets are opened, they are assigned to sets 1 , , k and (2) the opened dominating sets are ordered according to a non-increasing weight value.

4. Proposed Greedy Heuristic

Greedy algorithms are constructive heuristics for building feasible solutions to combinatorial optimization problems. They start from an empty solution and iteratively add the most favorable component from a set of feasible extensions of the current partial solution until a complete solution is reached. That is, the component to be added at each construction step is chosen deterministically according to some greedy function, which is a measure for the goodness of the solution components. In general, greedy heuristics do not require overly large computation times. The main drawback of a greedy heuristic is that the single constructed solution is most likely not optimal.
The pseudo-code of our greedy algorithm, henceforth labelled GH-MWDDS, is presented in Algorithm 1. Note that our greedy algorithm is a centralized algorithm which must be executed on a central unit that has the knowledge about the topology of the network and about the lifetime values of the individual nodes. At the start of the algorithm, the following sets are initialized. Solution D is initialized to the empty set. Furthermore, set V rem , which contains all nodes that may still be added to a dominating set, is initialized to V. Finally, set V done , which collects all nodes that already form part of a dominating set in D , is initialized to the empty set. Counter k counts the number of dominating sets that are being constructed. It is initialized to zero. At each main iteration k 1 , the algorithm generates a dominating set D k consisting of nodes from set V rem which, as mentioned above, contains all nodes of G that do not form part of any of the already generated dominating sets D i , i = 1 , , k 1 ; see lines 5 and 21. The algorithm stops once no further dominating set can be generated from the nodes in V rem . This is the case if at least one node v V and all its neighbors form part of V done . More formally, the algorithm stops if there is at least one v V such that N [ v ] is a subset of V done (see line 5).
Algorithm 1 GH-MWDDS: A Greedy heuristic for the MWDDS problem
Input: 
a simple, node-weighted, undirected graph G = ( V , E , lifetime )
Output: 
a family of disjoint dominating sets D = { D 1 , D 2 , , D k }
1:
D
2:
k 0
3:
V rem V
4:
V done
5:
while not exists v V s.t.  N [ v ] is a subset of V done  do
6:
k k + 1
7:
for each node v V  do
8:
     c o l o r ( v ) WHITE
9:
end for
10:
   D k
11:
  while D k is not a dominating set of G (that is, N [ D k ] V ) do
12:
      v * argmax { s c o r e ( v ) v { G ( D k ) W ( D k ) } V rem }
13:
      D k D k { v * }
14:
      V rem V rem { v * }
15:
     for each node u N ( v * )  do
16:
       if ( c o l o r ( u ) = WHITE ) then
17:
           c o l o r ( v ) GRAY
18:
       end if
19:
   end for
20:
    c o l o r ( v * ) BLACK
21:
  end while
22:
  Reduce( D k , V rem , V done ) {optional}
23:
   D D { D k }
24:
   V done V done D k
25:
end while
26:
return D = { D 1 , D 2 , , D k } .
The construction of a dominating set D k at round k of the algorithm is done as follows. First, D k is initialized to the empty set. At each moment, each node of the input graph G belongs to one of the following sets:
  • Black nodes: Nodes that are part of D k .
  • Gray nodes: Nodes in G ( D k ) : = N ( D k ) D k , that is, nodes that are not contained in D k but that are adjacent to at least one black node.
  • White nodes: Nodes in W ( D k ) : = V N [ D k ] , that is, nodes that are neither gray nor black.
Remember, in this context, that N ( D k ) and N [ D k ] denote the open neighborhood and the closed neighborhood of D k , respectively. Given these definitions, D k is iteratively generated by adding at each construction step exactly one node from { G ( D k ) W ( D k ) } V rem , that is, a nodes that is (1) either gray or white, and (2) that is not already added to one of the dominating sets from previous rounds. In order to make this choice, all nodes from { G ( D k ) W ( D k ) } V rem are evaluated by means of greedy function s c o r e ( ) , which is defined as follows:
s c o r e ( v ) : = lifetime ( v ) * w h i t e _ d e g r e e ( v ) v { G ( D k ) W ( D k ) } V rem
w h i t e _ d e g r e e ( v ) : = | N [ v ] W ( D k ) |
In other words, the greedy function of a node v is obtained by multiplying the lifetime of the node with the number of white nodes from the closed neighborhood of v.
To further improve the quality of solutions, the dominating set D k might be reduced by removing redudant nodes before adding D k to solution D . This is done in the optional function Reduce ( D k , V rem , V done ) ; see line 22 of the pseudo-code. Formally, a node v D k is redundant if each node from its closed neighborhood N [ v ] is dominated by at least two nodes from D k , that is, N [ v ] u D k { v } N [ u ] [25]. Redundant nodes are identified and removed in an iterative way. Moreover, sets V rem and V done are updated accordingly.

Time Complexity of GH-MWDDS

In this section, we analyze the complexity of our greedy algorithm, without the optional reduction mechanism from line 22. The main while loop (line 5) of the algorithm is iterated k times (rounds), where k refers to the number of disjoint dominating sets returned by the algorithm. Since the maximum number of dominating sets in a domatic partition of a graph G = ( V , E ) is less or equal to δ + 1 [19], where δ is the minimum degree of any node of G, it holds that k δ + 1 . As a result, checking the condition in line 5 and executing lines 7-9 is both done in O ( δ · n ) time. Further, n is clearly an upper bound for the number of times that the inner while loop (lines 11-21) is iterated. To determine the time complexity of line 12, we proceed as follows. Remember that for any node v the calculation of its w h i t e _ d e g r e e ( v ) value requires d e g ( v ) operations. Moreover, for choosing the first node v 1 * of a dominating set, line 12 requires a time of d e g ( v 1 ) + d e g ( v 2 ) + + d e g ( v n ) . The well-known Handshaking Lemma states that v V d e g ( v ) = 2 m , where m = | E | . For choosing the second node v 2 * , line 12 requires m d e g ( v 1 * ) time, etc. Therefore, the total time complexity of line 12 is O ( n m ) . In summary, we can conclude that our greedy algorithm has a worst-case time complexity of O ( δ n ) + O ( n m ) = O ( m a x ( δ n , n m ) ) = O ( n m ) .

5. Experimental Evaluation

The proposed greedy algorithm (GH-MWDDS) was implemented in ANSI C++ using GCC 7.4.0 for compiling the software. Its performance was compared with three recent local search approaches available from the related literature [23]: Local Search (LS), Fixed Depth (FD), and Variable Depth (VD). In order to conduct a fair comparison to the three local search algorithms (LS, FD and VD) we used the original source code provided by the authors of [23]. GH-MWDDS and the three local search algorithms were experimentally evaluated on a laptop equipped with a 64-bit 2.5-GHz Intel® Core™ i5-7200U processor and 8 GB of RAM. We applied GH-MWDDS to a set of 640 problem instances that are described below. Moreover, in order to test the usefulness of our ILP model, we applied the ILP solver ILOG CPLEX 20.01 in single-threaded mode to all problem instances. The time limit for each application of CPLEX was set to 2 CPU hours. Moreover, the experiments with CPLEX were performed on a cluster of machines with two Intel® Xeon® Silver 4210 CPUs with 10 cores of 2.20 GHz and 92 Gbytes of RAM.

5.1. Problem Instances

We used the source code provided in [23] for generating 640 diverse problem instances. Each problem instance was generated according to two control parameters: The size of the network n (number of nodes) and its average degree d, where d = 2 m / n and m is the number of edges. More specifically, we considered five different network sizes: 50, 100, 150, 200 and 250 nodes. For each network size, we considered between 5 to 8 different average degrees in a way such that networks over a range from sparse to dense networks are generated. In addition, each node (sensor) of the network was given a random real value between 0 and 1 as node weight (lifetime). Then, for each combination of n and d, 20 different networks were randomly generated resulting in a total of 640 problem instances for the experimental evaluation.

5.2. Results and Discussion

Table 1 reports on the performance comparison of GH-MWDDS (without the optional reduction procedure) and LS, FD, VD, and CPLEX. The first two columns indicate the problem instance type. More specifically, the number of nodes (n) is provided in the first column, whereas the average degree (d) is shown in the second column. Obviously, the higher d, the more dense is the network. Remember that for each combination of n and d—that is, for each table row—there are 20 randomly generated problem instances. The values shown in the tables represent the average results obtained for these 20 instances per table row. Table columns 3 and 4 contain the results of CPLEX. While the first one of these columns indicates the average solution quality obtained, the second column provides the average gap (in percent) between the found results and the upper bounds. The results of the other algorithms are provided in two columns for each algorithm. These columns report on the average solution quality (Value) and the average computation time (Time(s)) in seconds. Moreover, the 11-th column of the table indicates the average size of solutions ( | D P | ) in terms of the average number of disjoint dominating sets. Since the three algorithms LS, FD and VD start with the same greedy solution as initial solution, and the number of disjoint dominating sets does not change during local search, the column with heading | D P | holds for all three algorithms. Finally, in the last column of the table, the average size of the solutions of GH-MWDDS is given.
In addition to evaluating GH-MWDDS, we also tested the following two additional versions. Henceforth we refer to the version of GH-MWDDS that removes redundant nodes in line 22 as GH-MWDDS + . In addition, the algorithm can be easily adapted in order to solve the maximum disjoint dominating sets (MDDS) problem, instead of the MWDDS. The resulting greedy algorithm, which is called GH-MDDS, is obtained by replacing the s c o r e ( · ) function in line 12 of Algorithm 1 by the w h i t e _ d e g r e e ( · ) function of Equation (14). The experiential results obtained with GH-MDDS and GH-MWDDS + are provided in Table 2, whose structure is very similar to the one of Table 1.
From the results displayed in Table 1 and Table 2, the following observations can me made:
  • First of all, the ILP model (solved by CPLEX) is only useful in the context of the smallest problem instances. In fact, CPLEX obtains the best results for all networks with 50 nodes. As an additional information we can say that CPLEX was able to solve 8 out of 20 problem instances with 50 nodes and an average degree of 15 to optimality. Figure 2 exemplary shows the optimal solution obtained by CPLEX for network number 14 of those networks with 50 nodes and an average node degree of 15. Note that the nodes are divided into six dominating sets (as indicated by the colors of the nodes). The nodes which are colored in green are not assigned to any dominating set.
  • CPLEX already starts to fail for the instances with 100 nodes, for which the results are already inferior to those of GH-MWDDS. In fact, for most of the problem instances (starting from 150 nodes and an average degree of 60) CPLEX is unable to find anything but the trivial solution that contains no dominating set.
  • Concerning GH-MWDDS, we can observe that it dominates the three competitors from the literature for all problem instances in terms of solution quality as well as computational time. It is significantly better than the best of the other three approaches, while requiring a computation time that is approximately five orders of magnitude smaller than the time needed by the other methods. The improvement ratio of our algorithm with respect to VD (the best approach from the literature) is about 5.37.
  • As expected, most solutions suffer from the existence of redundant nodes. As a result, GH-MWDDS + is able to produce solutions whose size (in terms of the number of disjoint dominating sets) is increased with respect to the solutions produced by GH-MWDDS. This is achieved without compromising the quality of the generated solutions. On the contrary, the quality of the obtained solutions is slightly improved, at the cost of a negligible amount of computation time.
  • In addition, from Table 2 we can observe that GH-MDDS and GH-MWDDS + achieve an overall average solution quality (see that last row of Table 2) of 3.667 and 9.515, respectively, and an average solution size (in terms of the number of disjoint dominating sets) of 24.089 and 21.541, respectively. It is worthwhile to note that GH-MDDS always produces solutions with the maximum possible size (equal to δ ( G ) + 1 ). However, the quality of these solutions (as measured by the objective function of the MWDDS problem) is, of course, lower than the quality of the solutions produced by GH-MWDDS. This is because GH-MDDS is primarily focused on finding solutions of large size, without taking into consideration the problem-specific knowledge of the lifetime values of the nodes. Therefore, a solution to the MWDDS problem with the maximum size does not necessarily correspond to the best MWDDS-solution. For example, in the case where n = 250 and d = 140, for which GA-MDDS finds a solution with an average value 9.584 and an average size 53.6, GH-MWDDS + finds solutions with an average value 22.514 and average size 47.7.
  • From above observations we can say that the poor performance of the three local search algorithms proposed by Pino et al. [23] is mainly due to greedy heuristic used for producing the initial solutions for their local search approaches. Since this greedy heuristic was developed for the MDDS problem, and the local search approaches try to improve these solutions by making swaps among nodes of different disjoint dominating sets, they are limited to the size of the solutions found by the initial greedy heuristic, which cannot be changed later. As can be seen by our results, this way of proceeding limits too much the possibility of the local search algorithms to find improvements.
In summary we can say that our GH-MWDDS approach is clearly a new state-of-the-art method for the MWDDS problem. In order to study the scalability of our approach, we finally generated two large-scale random geometric graphs with 10,000 nodes. Both graphs were generated by scattering 10,000 nodes randomly in the unit square, and connecting each pair of nodes whose geometric distance is below r = 0.02 (first graph), respectively r = 0.03 (second graph). The first graph has 61,646 edges, while the second one has 137,317 edges. The computation time of GH-MWDDS was 1.829 seconds for the first graph and 5.054 seconds for the second graph. This difference in computation time between the first and the second graph is due to the different density, which leads to a solution with two dominating sets in the case of the first graph and a solution with six dominating sets in the case of the second graph. The important point, however, is that the computation time of our algorithm is still very low, even in the context of large-scale graphs. The solutions of GH-MWDDS are graphically shown in Figure 3. Note that, in the case of the first graph, red and green nodes form dominating sets, while all but the pink-colored nodes in the case of the second graph are assigned to six different dominating sets.

6. Conclusions

This paper deals with the network lifetime maximization problem using the approach of computing disjoint dominating sets in a given network in which sensors are characterized by different lifetime values. In other words, we considered a version of the weighted disjoint dominating sets problem. In this context, we have proposed a greedy heuristic that benefits from the use of problem-specific knowledge. To assess the performance of our algorithm, 640 problem instances of different sizes (both sparse and dense graphs) were evaluated and the obtained results were compared with those of three recently published local search algorithms. Computational results show the superiority of our greedy algorithm over recent approaches available from the literature. In addition, we stated the considered problem as an integer linear programming model. However, the results of applying CPLEX to solve the model have shown that this approach is only useful for the smallest ones of the considered networks.
Finally, note that our approach can directly be applied to disconnected graphs, that is, our implementation considers the possible existence of disconnected sub-graphs. Moreover, the approach can easily be adapted to directed graphs. The only aspect that has to change for the application to directed graphs is the definition of a dominating set (see, for example, [26]) and the way in which such dominating sets are generated at each main loop of the greedy heuristic.
In the future we plan to develop well-working metaheuristics on the basis of the developed greedy heuristic in order to further improve the obtained results. Options include ant colony optimization or iterated greedy algorithms, which are both based on the step-by-step construction of solutions. Another line of research will focus on hybrid techniques such as construct, merge, solve and adapt (CMSA) [27], which make it possible to take profit from ILP solvers such as CPLEX even in the context of instances of large problem.

Author Contributions

Conceptualization, S.B. (Salim Bouamama); Investigation, S.B. (Samir Balbal) and S.B. (Salim Bouamama); Methodology, S.B. (Salim Bouamama) and C.B.; Software, S.B. (Samir Balbal); Supervision, S.B. (Salim Bouamama) and C.B.; writing—original draft, S.B. (Samir Balbal) and S.B. (Salim Bouamama); writing—review and editing, C.B. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by project CI-SUSTAIN funded by the Spanish Ministry of Science and Innovation (PID2019-104156GB-I00).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

The authors would like to thank Tayler Pino for providing the code of the three proposed local search algorithms; S. Bouamama is grateful to DGRSDT-MESRS (Algeria), for financial support.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yetgin, H.; Cheung, K.T.K.; El-Hajjar, M.; Hanzo, L.H. A survey of network lifetime maximization techniques in wireless sensor networks. IEEE Commun. Surv. Tutor. 2017, 19, 828–854. [Google Scholar] [CrossRef] [Green Version]
  2. Rodrigues, L.M.; Montez, C.; Budke, G.; Vasques, F.; Portugal, P. Estimating the lifetime of wireless sensor network nodes through the use of embedded analytical battery models. J. Sens. Actuator Netw. 2017, 6, 8. [Google Scholar] [CrossRef] [Green Version]
  3. Lewandowski, M.; Płaczek, B.; Bernas, M. Classifier-Based Data Transmission Reduction in Wearable Sensor Network for Human Activity Monitoring. Sensors 2021, 21, 85. [Google Scholar] [CrossRef] [PubMed]
  4. Sharma, H.; Haque, A.; Jaffery, Z.A. Maximization of wireless sensor network lifetime using solar energy harvesting for smart agriculture monitoring. Ad Hoc Netw. 2019, 94, 101966. [Google Scholar] [CrossRef]
  5. Lewandowski, M.; Bernas, M.; Loska, P.; Szymała, P.; Płaczek, B. Extending Lifetime of Wireless Sensor Network in Application to Road Traffic Monitoring. In International Conference on Computer Networks; Springer: Berlin/Heidelberg, Germany, 2019; pp. 112–126. [Google Scholar]
  6. Mansourkiaie, F.; Ismail, L.S.; Elfouly, T.M.; Ahmed, M.H. Maximizing lifetime in wireless sensor network for structural health monitoring with and without energy harvesting. IEEE Access 2017, 5, 2383–2395. [Google Scholar] [CrossRef]
  7. Cardei, M.; Thai, M.T.; Li, Y.; Wu, W. Energy-efficient target coverage in wireless sensor networks. In Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, USA, 13–17 March 2005; Volume 3, pp. 1976–1984. [Google Scholar]
  8. Slijepcevic, S.; Potkonjak, M. Power efficient organization of wireless sensor networks. In Proceedings of the ICC 2001—IEEE International Conference on Communications, Helsinki, Finland, 11–14 June 2001; Volume 2, pp. 472–476. [Google Scholar]
  9. Wang, H.; Li, Y.; Chang, T.; Chang, S. An effective scheduling algorithm for coverage control in underwater acoustic sensor network. Sensors 2018, 18, 2512. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  10. Liao, C.C.; Ting, C.K. A novel integer-coded memetic algorithm for the set k-cover problem in wireless sensor networks. IEEE Trans. Cybern. 2017, 48, 2245–2258. [Google Scholar] [CrossRef] [PubMed]
  11. Chen, Z.; Li, S.; Yue, W. Memetic algorithm-based multi-objective coverage optimization for wireless sensor networks. Sensors 2014, 14, 20500–20518. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  12. Balaji, S.; Anitha, M.; Rekha, D.; Arivudainambi, D. Energy efficient target coverage for a wireless sensor network. Measurement 2020, 165, 108167. [Google Scholar] [CrossRef]
  13. D’Ambrosio, C.; Iossa, A.; Laureana, F.; Palmieri, F. A genetic approach for the maximum network lifetime problem with additional operating time slot constraints. Soft Comput. 2020, 1–7. [Google Scholar] [CrossRef]
  14. Li, J.; Potru, R.; Shahrokhi, F. A Performance Study of Some Approximation Algorithms for Computing a Small Dominating Set in a Graph. Algorithms 2020, 13, 339. [Google Scholar] [CrossRef]
  15. Li, R.; Hu, S.; Liu, H.; Li, R.; Ouyang, D.; Yin, M. Multi-Start Local Search Algorithm for the Minimum Connected Dominating Set Problems. Mathematics 2019, 7, 1173. [Google Scholar] [CrossRef] [Green Version]
  16. Bouamama, S.; Blum, C. An Improved Greedy Heuristic for the Minimum Positive Influence Dominating Set Problem in Social Networks. Algorithms 2021, 14, 79. [Google Scholar] [CrossRef]
  17. Garey, M.; Johnson, D. Computers and Intractability. A Guide to the Theory of NP-Completeness; W. H. Freeman: New York, NY, USA, 1979. [Google Scholar]
  18. Cardei, M.; MacCallum, D.; Cheng, M.X.; Min, M.; Jia, X.; Li, D.; Du, D.Z. Wireless sensor networks with energy efficient organization. J. Interconnect. Netw. 2002, 3, 213–229. [Google Scholar] [CrossRef]
  19. Feige, U.; Halldórsson, M.M.; Kortsarz, G.; Srinivasan, A. Approximating the domatic number. SIAM J. Comput. 2002, 32, 172–195. [Google Scholar] [CrossRef]
  20. Moscibroda, T.; Wattenhofer, R. Maximizing the lifetime of dominating sets. In Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, Denver, CO, USA, 4–8 April 2005. [Google Scholar]
  21. Nguyen, T.N.; Huynh, D.T. Extending sensor networks lifetime through energy efficient organization. In Proceedings of the International Conference on Wireless Algorithms, Systems and Applications (WASA 2007), Chicago, IL, USA, 1–3 August 2007; pp. 205–212. [Google Scholar]
  22. Islam, K.; Akl, S.G.; Meijer, H. Maximizing the lifetime of wireless sensor networks through domatic partition. In Proceedings of the 2009 IEEE 34th Conference on Local Computer Networks, Zurich, Switzerland, 20–23 October 2009; pp. 436–442. [Google Scholar]
  23. Pino, T.; Choudhury, S.; Al-Turjman, F. Dominating set algorithms for wireless sensor networks survivability. IEEE Access 2018, 6, 17527–17532. [Google Scholar] [CrossRef]
  24. Haynes, T.W.; Hedetniemi, S.T.; Henning, M.A. Topics in Domination in Graphs; Springer: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
  25. Bouamama, S.; Blum, C. A hybrid algorithmic model for the minimum weight dominating set problem. Simul. Model. Pract. Theory 2016, 64, 57–68. [Google Scholar] [CrossRef]
  26. Pang, C.; Zhang, R.; Zhang, Q.; Wang, J. Dominating sets in directed graphs. Inf. Sci. 2010, 180, 3647–3652. [Google Scholar] [CrossRef]
  27. Blum, C.; Davidson, P.P.; López-Ibáñez, M.; Lozano, J.A. Construct, Merge, Solve & Adapt: A new general algorithm for combinatorial optimization. Comput. Oper. Res. 2016, 68, 75–88. [Google Scholar]
Figure 1. An illustrative example of the MWDDS problem.
Figure 1. An illustrative example of the MWDDS problem.
Algorithms 14 00170 g001
Figure 2. An optimal solution for network number 14 with 50 nodes and an average node degree of 15. The solution was produced by CPLEX. The color of the nodes indicates to which of six dominating sets they belong: Blue, dark blue, dark green, red, purple, and brown. The nodes colored in green do not belong to any dominating set.
Figure 2. An optimal solution for network number 14 with 50 nodes and an average node degree of 15. The solution was produced by CPLEX. The color of the nodes indicates to which of six dominating sets they belong: Blue, dark blue, dark green, red, purple, and brown. The nodes colored in green do not belong to any dominating set.
Algorithms 14 00170 g002
Figure 3. Results of GH-MWDDS for two random geometric graphs of different densities.
Figure 3. Results of GH-MWDDS for two random geometric graphs of different densities.
Algorithms 14 00170 g003
Table 1. Numerical results of comparison between LS, FD, VD and GH-MWDDS.
Table 1. Numerical results of comparison between LS, FD, VD and GH-MWDDS.
ndCPLEXLSFDVD|DP|GH-MWDDS
ValueGap(%)ValueTime(s)ValueTime(s)ValueTime(s)ValueTime(s)|DP|
50152.77932.8390.3950.0030.4770.0190.5551.9842.552.1550.0005.75
203.922121.0880.6490.0040.8250.0551.0147.6513.553.3530.0018.05
255.098158.0381.0110.0061.2450.0551.4904.8854.054.5950.00110.05
306.432200.5671.6640.0072.4600.1242.78013.1176.305.9260.00112.90
357.929197.4342.2000.0122.9140.2043.16625.0486.857.3760.00015.30
100202.467405.6690.2830.0230.3330.1880.42330.4582.452.7840.0017.00
303.202>1000.00.4310.0170.5350.1650.57631.7962.954.5010.00310.90
403.338>1000.00.8590.0211.2590.3941.341183.9214.756.6790.00214.80
503.857>1000.01.3610.0382.0180.7962.407225.7046.008.5000.00118.65
605.804823.0222.0190.0272.8840.8303.226362.7757.1511.1310.00123.40
150300.055>1000.00.2870.0530.3260.3160.326106.6022.854.0980.00210.65
400.028>1000.00.5570.0500.6700.5950.745156.9943.805.8160.00314.05
500.011>1000.00.6150.0770.9271.1391.009182.6303.957.4790.00317.50
600>1000.00.8480.0461.5062.5761.521646.2684.909.2810.00221.00
700>1000.01.3730.0662.2934.2192.4641028.6506.6511.3880.00424.45
800>1000.01.6890.0652.7292.5993.036549.9007.2013.5080.00528.90
900>1000.02.2090.0553.8173.7934.193906.0309.0515.4850.00632.95
200400>1000.00.2560.0490.3170.6480.37081.7502.655.4240.00413.65
500>1000.00.3740.0990.4751.2520.483186.9003.456.7840.00516.60
600>1000.00.6780.1120.8972.0830.917313.8503.758.6560.00520.35
700>1000.01.0040.1701.6526.4631.6803112.9505.9510.3510.00623.65
800>1000.00.8400.0761.6245.8741.7951629.4005.3512.4470.00827.15
900>1000.01.1530.1091.9245.2602.0451364.4005.6513.9780.01230.55
1000>1000.01.5030.0912.8369.3963.0983024.8307.6515.8680.00934.30
250500>1000.00.2660.1360.3140.8670.329557.6762.956.6810.01616.85
600>1000.00.5260.2210.8927.6380.9451400.7884.558.2440.01219.70
700>1000.00.6890.2641.0506.9061.3262380.3665.109.6360.01322.95
800>1000.00.6520.2411.1639.8011.445647.7635.4011.5200.01326.15
900>1000.00.8410.3241.44818.3941.5911242.6635.8012.9380.01329.55
1000>1000.01.1170.2281.98120.7892.4432210.8806.4514.7330.01632.70
1200>1000.01.2590.1462.57710.4422.7812249.3507.2018.3480.01639.70
1400>1000.02.1350.1214.27516.8854.7136624.59610.5022.4780.02047.25
Avg 1.404 0.9920.0921.5834.3991.757984.1435.2319.4420.00621.169
Table 2. Numerical results of comparison between GH-MDDS, GH-MWDDS and GH-MWDDS + .
Table 2. Numerical results of comparison between GH-MDDS, GH-MWDDS and GH-MWDDS + .
ndGH-MDDSGH-MWDDSGH-MWDDS +
ValueTime(s)|DP|ValueTime(s)|DP|ValueTime(s)|DP|
50151.1110.0016.752.1550.0005.752.1910.0026.150
201.5480.0019.053.3530.0018.053.4500.0008.350
252.6300.00111.854.5950.00110.054.6720.00010.550
303.5100.00114.605.9260.00112.906.0420.00013.350
354.7720.00117.257.3760.00015.307.5460.00015.900
100200.8410.0018.502.7840.0017.002.8420.0017.400
301.7140.00412.704.5010.00310.904.5800.00111.150
402.9000.00217.156.6790.00214.806.7940.00215.200
503.9080.00221.408.5000.00118.658.5250.00219.100
606.1110.00426.3011.1310.00123.4011.1740.00223.600
150301.0360.00312.004.0980.00210.654.1410.00210.900
401.7690.00216.205.8160.00314.055.8720.00214.350
502.5530.00320.007.4790.00317.507.5700.00217.850
603.6470.00424.109.2810.00221.009.3710.00521.450
704.7890.00228.1011.3880.00424.4511.4460.00525.050
806.4680.00533.0013.5080.00528.9013.6110.00329.150
907.1430.00636.5515.4850.00632.9515.5890.00533.550
200401.3500.00615.505.4240.00413.655.4860.00513.950
501.7190.00618.956.7840.00516.606.8480.00617.050
602.5510.00723.358.6560.00520.358.7100.00820.550
703.5660.00826.8010.3510.00623.6510.3950.00824.100
804.4660.01530.7012.4470.00827.1512.5290.00327.400
905.3680.00934.8013.9780.01230.5514.0460.00931.000
1006.4250.01138.5015.8680.00934.3015.9930.00934.650
250501.6430.01319.056.6810.01616.856.7830.00816.950
602.0620.01022.708.2440.01219.708.2850.01019.950
702.6130.01226.159.6360.01322.959.6990.01323.150
803.3480.01329.5511.5200.01326.1511.5710.01326.500
904.0300.01633.5012.9380.01329.5512.9780.01629.900
1005.0240.01637.1514.7330.01632.7014.8000.01633.150
1207.1340.01745.0518.3480.01639.7018.4180.01840.250
1409.5840.02053.6022.4780.02047.2522.5140.02047.700
Avg 3.6670.00724.0899.4420.00621.1699.5150.00621.541
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Balbal, S.; Bouamama, S.; Blum, C. A Greedy Heuristic for Maximizing the Lifetime of Wireless Sensor Networks Based on Disjoint Weighted Dominating Sets. Algorithms 2021, 14, 170. https://doi.org/10.3390/a14060170

AMA Style

Balbal S, Bouamama S, Blum C. A Greedy Heuristic for Maximizing the Lifetime of Wireless Sensor Networks Based on Disjoint Weighted Dominating Sets. Algorithms. 2021; 14(6):170. https://doi.org/10.3390/a14060170

Chicago/Turabian Style

Balbal, Samir, Salim Bouamama, and Christian Blum. 2021. "A Greedy Heuristic for Maximizing the Lifetime of Wireless Sensor Networks Based on Disjoint Weighted Dominating Sets" Algorithms 14, no. 6: 170. https://doi.org/10.3390/a14060170

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop