skip to main content
10.1145/1137856.1137911acmconferencesArticle/Chapter ViewAbstractPublication PagessocgConference Proceedingsconference-collections
Article

Hole detection or: "how much geometry hides in connectivity?"

Authors Info & Claims
Published:05 June 2006Publication History

ABSTRACT

Wireless sensor networks typically consist of small, very simple network nodes without any positioning device like GPS. After an initialization phase, the nodes know with whom they can talk directly, but have no idea about their relative geographic locations. We examine how much geometry information is nevertheless hidden in the communication graph of the network: Assuming that the connectivity is determined by the well-known unit-disk graph model, we prove that using an extremely simple linear-time algorithm one can identify nodes on the boundaries of holes of the network. That is, there is enough geometry information hidden in the connectivity structure to identify topological features—in our example the holes in the network. While the theoretical analysis turns out to be quite conservative,an actual implementation shows that the algorithm works well under less stringent conditions.

References

  1. N. Amenta, M. Bern,and D. Eppstein. The crust and the β-skeleton: combinatorial curve reconstruction. Graph. Models Image Process., 60(2):125--135, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Bruck, J. Gao, and A. Jiang. Map: Medial-axis-based geometric routing in sensor networks. Proc. MobiCom, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Q. Fang, J. Gao, and L. Guibas. Locating and bypassing routing holes in sensor networks. In 23rd Conf. of the IEEE Communications Society (INFOCOM), 2004.Google ScholarGoogle ScholarCross RefCross Ref
  4. S. P. Fekete, A. Kröller, D. Pfisterer, and S. Fischer. Deterministic boundary recognition and topology extraction for large sensor networks. In Proc. of SODA, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann. Neighborhood-based topology recognition in sensor networks. In ALGOSENSORS, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Funke. Topological hole detection in wireless sensor networks and its applications.In DIALM-POMC: Joint workshop on Foundations of mobile computing, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F. Kuhn, T. Moscibroda, and R. Wattenhofer. Unit disk graph approximation. In Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T. Moscibroda and R. Wattenhofer. Maximal independent sets in radio networks. In 24th ACM Symp. on the Principles of Distributed Computing (PODC), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, and I. Stoica. Geographic routing without location information. In Proc. MobiCom, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Hole detection or: "how much geometry hides in connectivity?"

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SCG '06: Proceedings of the twenty-second annual symposium on Computational geometry
      June 2006
      500 pages
      ISBN:1595933409
      DOI:10.1145/1137856
      • Program Chairs:
      • Nina Amenta,
      • Otfried Cheong

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 June 2006

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate625of1,685submissions,37%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader