skip to main content
10.1145/1400751.1400784acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
research-article

Sleeping on the job: energy-efficient and robust broadcast for radio networks

Published: 18 August 2008 Publication History

Abstract

We address the problem of minimizing power consumption when broadcasting a message from one node to all the other nodes in a radio network. To enable power savings for such a problem, we introduce a compelling new data streaming problem that we call the Bad Santa problem. Our results on this problem apply for any situation where: 1) a node can listen to a set of n nodes, out of which at least half are non-faulty and know the correct message; and 2) each of these n nodes sends according to some predetermined schedule which assigns each of them its own unique time slot. In this situation, we show that in order to receive the correct message with probability 1, it is necessary and sufficient for the listening node to listen to a Θ(√n) expected number of time slots. Moreover, if we allow for repetitions of transmissions so that each sending node sends the message O(log* n) times (i.e. in O(log* n) rounds each consisting of the n time slots), then listening to O(log* n) expected number of time slots suffices. We show that this is near optimal.
We describe an application of our result to the popular grid model for a radio network. Each node in the network is located on a point in a two dimensional grid, and whenever a node sends a message, all awake nodes within L distance r receive the message. In this model, up to t< r/2 (2r+1) nodes within any 2r+1 by 2r+1 square in the grid can suffer Byzantine faults. Moreover, we assume that the nodes that suffer Byzantine faults are chosen and controlled by an adaptive adversary that knows everything except for the random bits of each non-faulty node. This type of adaptive adversary models worst-case behavior due to malicious attacks on the network; mobile nodes moving around in the network; or static nodes losing power or ceasing to function. Let n=r(2r+1). We show how to solve the broadcast problem in this model with each node awake only an expected O(1/√n) fraction of the time. Moreover, if we allow each node to send O(log* n) times, we can increase the energy savings so that each node is awake only an expected O((log* n)/ n) fraction of the time. This compares favorably with previous protocols that required each node to be awake for every time step.

References

[1]
Noga Alon, Yossi Matias, and Mario Szegedy. The space complexity of approximating the frequency moments. In Proceedings of the $28^th$ Annual ACM Symposium on Theory of Computing (STOC), 1996.
[2]
Trevor Armstrong. Wake-up based power management in multi-hop wireless networks. www.eecg.toronto.edu/~trevor/Wakeup/index.html.
[3]
Vartika Bhandari and Nitin~H. Vaidya. On reliable broadcast in a radio network. In Proceedings of the $24^th$ Annual ACM Symposium on Principles of Distributed Computing (PODC), 2005.
[4]
Vartika Bhandari and Nitin~H. Vaidya. On reliable broadcast in a radio network: A simplified characterization. http://www.crhc.uiuc.edu/wireless/papers/bcast-addendum.pdf, 2005.
[5]
Vartika Bhandhari, Jonathan Katz, Chiu-Yuen Koo, and Nitin Vaidya. Reliable broadcast in radio networks: The bounded collision case. In Proceedings of the $25^th$ Annual ACM Symposium on Principles of Distributed Computing (PODC), 2006.
[6]
Graham Cormode, Flip Korn, S. Muthukrishnan, and Divesh Srivastava. Space- and time-efficient deterministic algorithms for biased quantiles over data streams. In Proceedings of the $25^th$ ACM SIGMOD-SIGACT-SIGART symposium on Principles of Database Systems, pages 263--272, 2006.
[7]
Eric Demaine, Alejandro López-Ortiz, and Ian Munro. Frequency estimation of internet packet streams with limited space. In Proceedings of the 10th Annual European Symposium on Algorithms (ESA 2002), pages 348--360, 2002.
[8]
Laura~Marie Feeney and Martin Nilsson. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In Proceedings of IEEE INFOCOM, 2001.
[9]
Sudipto Guha and Andrew McGregor. Approximate quantiles and the order of the stream. In ACM Symposium on Principles of Database Systems, pages 273--279, 2006.
[10]
Sudipto Guha and Andrew McGregor. Lower bounds for quantile estimation in random-order and multi-pass streaming. In Proceedings of the $34^th$ International Colloquium on Automata, Languages and Programming, 2007.
[11]
Monika Henzinger, Prabhaker Raghavan, and Sridar Rajagopalan. Computing on data streams. Technical Report SRC-TN-1998-011, Digital Systems Research Center, 1998.
[12]
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David~E. Culler, and Kristofer S. J. Pister. System architecture directions for networked sensors. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), pages 93--104, 2000.
[13]
Chiu-Yuen Koo. Broadcast in radio networks tolerating byzantine adversarial behavior. In Proceedings of the $23^rd$ Annual ACM Symposium on Principles of Distributed Computing (PODC), pages 275--282, 2004.
[14]
Ian Munro and Mike Paterson. Selection and sorting with limited storage. Theoretical Computer Science, pages 315--323, 1980.
[15]
S. Muthukrishnan. Data Streams: Algorithms and Applications (Foundations and Trends in Theoretical Computer Science). Now Publishers Inc, 2005.
[16]
Jared Saia and Maxwell Young. Reducing communication costs in robust peer-to-peer networks. Information Processing Letters, 106(4):152--158, 2008.
[17]
Lan Wang and Yang Xiao. A survey of energy-efficient scheduling mechanisms in sensor networks. Mobile Networks and Applications, 11:723--740, 2006.
[18]
Qin Wang, Mark Hempstead, and Woodward Yang. A realistic power consumption model for wireless sensor network devices. In Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2006.
[19]
Andrew Yao. Probabilistic computations: Toward a unified measure of complexity. In Proceedings of Eighteenth IEEE Symposium on Foundations of Computer Science, pages 222--227, 1977.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
PODC '08: Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
August 2008
474 pages
ISBN:9781595939890
DOI:10.1145/1400751
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 August 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. broadcast
  2. byzantine failure
  3. data streaming
  4. energy efficient
  5. fault tolerance
  6. power aware
  7. radio networks

Qualifiers

  • Research-article

Conference

PODC '08

Acceptance Rates

Overall Acceptance Rate 740 of 2,477 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Sleeping on the Job: Energy-Efficient and Robust Broadcast for Radio NetworksAlgorithmica10.1007/s00453-010-9422-061:3(518-554)Online publication date: 31-Dec-2018
  • (2018)A resource-competitive jamming defenseDistributed Computing10.1007/s00446-017-0313-331:6(419-439)Online publication date: 1-Nov-2018
  • (2011)Conflict on a communication channelProceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing10.1145/1993806.1993855(277-286)Online publication date: 6-Jun-2011
  • (2011)Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious InterferenceIEEE Communications Surveys & Tutorials10.1109/SURV.2011.041311.0015613:4(617-641)Online publication date: 2011
  • (2010)Scalable byzantine computationACM SIGACT News10.1145/1855118.185513641:3(89-104)Online publication date: 3-Sep-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media