Title: On extracting consistent graphs in wireless sensor networks

Authors: Murtuza Jadliwala, Qi Duan, Jinhui Xu, Shambhu Upadhyaya

Addresses: Department of Computer Science and Engineering, The University at Buffalo, State University at New York, 201 Bell Hall, Buffalo, NY 14260-2000, USA. ' Department of Computer Science and Engineering, The University at Buffalo, State University at New York, 201 Bell Hall, Buffalo, NY 14260-2000, USA. ' Department of Computer Science and Engineering, The University at Buffalo, State University at New York, 201 Bell Hall, Buffalo, NY 14260-2000, USA. ' Department of Computer Science and Engineering, The University at Buffalo, State University at New York, 201 Bell Hall, Buffalo, NY 14260-2000, USA

Abstract: Robustness and security of services like localisation, routing and time synchronisation in Wireless Sensor Networks (WSNs) have been critical issues. Efficient mathematical (graph-theoretic) models for these services exist. Since, these services were not designed with robustness and security in mind, new mathematical models are needed to address these issues. In this paper, we propose a practical approach for modelling these services using weighted undirected graphs called Partially Consistent Grounded Graphs (PCGG). In such graphs, malicious behaviour or inaccurate information reporting is modelled as a function that assigns incorrect or inconsistent values (weights) to the edges connecting the corresponding nodes, called inconsistent edges. We formulate two optimisation problems, namely MAX-CON and LARGEST-CON. Given a PCGG, these are the problems of determining the largest induced subgraph (obtained by eliminating a subset of vertices) containing only consistent edges. MAX-CON maximises the number of vertices, while LARGEST-CON maximises the number of consistent edges of the resulting subgraph. We also discuss the practical implications of solving these problems, analyse their computational hardness and provide a comparitive analysis of heuristics-based algorithms for them.

Keywords: approximation algorithms; combinatorial optimisation; graph theory; wireless sensor networks; WSNs; wireless networks; robustness; security; malicious behaviour; inaccurate information.

DOI: 10.1504/IJSNET.2007.013195

International Journal of Sensor Networks, 2007 Vol.2 No.3/4, pp.149 - 162

Available online: 11 Apr 2007 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article