 Research
 Open Access
Localized geometric topologies with bounded node degree for threedimensional wireless sensor networks
 Fan Li^{1},
 Zeming Chen^{1} and
 Yu Wang^{2}Email author
https://doi.org/10.1186/168714992012157
© Li et al; licensee Springer. 2012
 Received: 3 August 2011
 Accepted: 1 May 2012
 Published: 1 May 2012
Abstract
Threedimensional (3D) wireless sensor networks have attracted a lot of attention due to their great potential usages in both commercial and civilian applications, such as environmental data collection, pollution monitoring, space exploration, disaster prevention, and tactical surveillance. Topology control in 3D sensor networks has been studied recently, and different 3D geometric topologies were proposed to be the underlying network topologies to achieve the sparseness of the communication networks. However, most of these proposed 3D topologies cannot bound the maximum node degree, i.e., some nodes may need to maintain a large number of neighbors in the constructed topologies, which is not energy efficient and may lead to large contention. In this article, we extend several existing 3D geometric topologies to a set of new 3D topologies with bounded node degree. We provide both theoretical analysis and simulation evaluation on their power efficiency and node degree distributions. Our simulation results over random 3D sensor networks confirm nice performances of these proposed 3D topologies.
Keywords
 Sensor Network
 Wireless Sensor Network
 Node Degree
 Topology Control
 Maximum Transmission Power
1 Introduction
Due to its widerange potential applications (such as environmental data collection, pollution monitoring, space exploration, disaster prevention, and tactical surveillance), 3D wireless sensor network has recently emerged as a premier research topic. Most current researches in 3D sensor networks primarily focus on coverage [1–4], connectivity [4, 5], and routing issues [6–12]. In this article, we focus on how to efficiently control the 3D network topology to maintain both network connectivity and energy efficiency of routes in 3D wireless sensor networks.
Topology control [13–15] has been wellstudied for 2D wireless ad hoc and sensor networks in the past decade [16–26]. Topology control methods allow each sensor node to locally adjust its transmission range and select certain neighbors for communication, while maintaining a structure that can support energy efficient routing and improve the overall network performance. Given the dynamic nature of sensor networks, the topology should be locally and selfadaptively maintained without affecting the whole network and the communication cost during maintaining should not be too high. There exist several topology control techniques such as localized geometrical structures [17–25], dynamic cluster techniques [27–30] and power assignment protocols [31–37]. In this article, we focus on geometrical structures based methods.
Though many 2D geometrical structures have been proposed, surprisingly, there is not much study of 3D geometrical methods for topology control in 3D sensor networks, except for [38–44]. Bahramgiri et al. [38], Ghosh et al. [42], and Poduri et al. [43] proposed methods based on generalized conebased topology control algorithm [17, 20] to preserve connectivity in 3D sensor networks, however, all of their 3D structures cannot bound the node degree, i.e., some nodes may have large unbounded number of neighbors. In addition, their construction methods are complex. Wang et al. [39–41] and Kim et al. [44] then proposed a set of 3D structures based on Yao structures [18, 19] in 3D space. These 3D Yao structures can be constructed locally and efficiently, and they do have bounded node outdegree. However, none of these existing 3D structures can bound the node indegree. Possible unbounded indegree at some nodes will often cause large overhead or contention at those nodes which may make them exhausted earlier than other nodes. Faced up with this challenge, in this article we study how to efficiently construct 3D topology with bounded node degree (both outdegree and indegree) to maintain connectivity, conserve energy, and enable energy efficient routing. In particularly, we propose two general frameworks: 3D Symmetric Yao Graph and 3D Yao and Reverse Yao Graph, which are based on any existing 3D Yao structures. We then theoretically prove that the new 3D structures built by our proposed method can guarantee connectivity of the network, have a constantbounded node degree, and support energy efficient routes. We believe that these structures are the first set of 3D structures that can achieve all of these properties.
The rest of this article is organized as follows. Section 2 introduces the network model and desired properties of our 3D topology control problem. Section 3 provides a brief review of related study on existing 3D topology control methods. Section 4 presents the algorithms to build 3D Yaobased topologies with bounded degree and the theoretical proofs of their nice properties, such as connectivity, degree bound, and power stretch factor. Section 5 presents the simulation results on random 3D networks and Section 6 concludes the article.
2 Network models and assumptions
A 3D wireless network consists of a set V of n wireless nodes distributed in a 3D plane ℝ^{3}. Each node has the same maximum transmission range R. These wireless nodes define a unit ball graph (UBG), or called unit sphere graph, in which there is an edge uv between two nodes u and v iff (if and only if) the Euclidean distance uv between u and v in ℝ^{3} is at most R. In other words, two nodes can always receive the signal from each other directly if the distance between them is not more than R. If there exists a link uv in UBG, v is a neighbor of u. All neighbors of u form its onehop neighborhood, denoted as N_{ UBG }(u) or N(u). The size of N_{ UBG }(u) is the node degree of u. We assume that all wireless nodes have distinctive identities and each node knows its position information either through a lowpower GPS receiver or some other ways (such as 3D localization methods in [45–47]). By onehop broadcasting, each node u can gather the location information of all nodes within its transmission range. As in the most common powerattenuation model, the power to support a link uv is assumed to be uv^{ β }, where β is a real constant between 2 and 5 depending on the wireless transmission environment.
 (1)
Connectivity: To guarantee communications among all sensor nodes, the constructed topology H needs to be connected, i.e., there exists a path between any pair of nodes in the topology. This is the most fundamental requirement of topology control. Here, we always assume that the original communication graph UBG is a connected graph.
 (2)
Bounded node degree: It is also desirable that node degree in the constructed topology H is small and upperbounded by a constant. If H is a directed graph, both indegree and outdegree should be bounded. A small node degree reduces the MAClevel contention and interference, and may help to mitigate the wellknown hidden and exposed terminal problems. In addition, if a graph has a bounded node degree, it is also a sparse graph, i.e., the total number of links is linear with the total number of nodes in the graph. A sparse graph conserves more energy in term of maintaining the constructed network topology.
 (3)
Power spanner: A good network topology should be energy efficient, i.e., the total power consumption of the least energy cost path between any two nodes in final topology should not exceed a constant factor of the power consumption of the least energy cost path in original network [18]. Given a path v_{1}v_{2} · · · v_{ h } connecting two nodes v_{1} and v_{ h }, the energy cost of this path is ${\sum}_{j=1}^{h1}{\u2225{v}_{j}{v}_{j+1}\u2225}^{\beta}$. The path with the least energy cost is called the shortest path in a graph. A subgraph H is called a power spanner of a graph G if there is a positive real constant ρ such that for any two nodes, the power consumption of the shortest path in H is at most ρ times of the power consumption of the shortest path in G. The constant ρ is called the power stretch factor. A power spanner of the communication graph (e.g., UBG) is usually energy efficient for routing.
 (4)
Localized construction: Due to limited resources and high mobility of wireless nodes, it is preferred that the topology can be constructed locally and in a selforganizing fashion. Here, a topology is localized, i.e., can be constructed locally, if every node u can decide all edges incident on itself in the topology by only using the information of nodes within a constant hops of u. Actually, all construction algorithms of our topologies presented here only use 1hop neighbor information.
3 Related works
In this section, we briefly review the current techniques of topology control in both 2D and 3D wireless networks.
3.1 Topology control in 2D networks
With the objective of achieving energy efficiency and maintaining network connectivity, several localized geometrical structures have been proposed for topology control in 2D wireless networks, such as local minimum spanning tree (LMST) [21, 22], relative neighborhood graph (RNG) [48, 49], Gabriel graph (GG) [48, 50], Yao graph (YG) [18, 19], conebased topology control (CBTC) [17, 20], Delaunaybased graph [23–25], and different combinations of these graphs [51–53]. By constructing such sparse topology structures, transmission power of nodes can be minimized. As a result, the number of links in the constructed topology is significantly reduced compared with that of the original communication graph which contains all links supported by the maximum transmission power. Among these 2D structures, some are planar structures (such as LMST, RNG, GG, and Delaunaybased graphs), some are power spanners (such as GG, Yao graph, CBTC, and Delaunaybased graphs), and some are with bounded node degree (such as Yao graph).
Besides these localized geometrical structures, there are also other various techniques proposed by researchers for topology control in 2D sensor networks, such as how to construct a virtual backbone for routing [27–30] and how to minimize the total transmission power while maintaining connectivity or other properties [31, 32, 36, 37]. Since this article only focuses on localized geometrical structures with bounded node degree, we refer readers to some nice surveys [13–15] on topology control for more details.
3.2 Topology control in 3D networks
Although geometric topology control protocols have been well studied in 2D networks, the design of 3D topology control is surprisingly more difficult than the design in 2D. Current 2D methods cannot be directly applied in 3D networks. Wang et al. [39, 40] proved that there is no embedding method mapping a 3D network into a 2D plane so that the relative scale of all edge length is preserved and all 2D geometric topology control protocols can still be applied for power efficiency. Thus, any simple mapping method from 3D to 2D does not work. On the other hand, many properties of 3D networks require additional computational complexity. Until recently, little research has been done on topology control for 3D wireless networks.
To solely achieve the connectivity of a 3D network, local minimum spanning tree (LMST) [21, 22] may be the best choice, since it is very sparse (with a bounded node degree) and can be easily constructed even for 3D networks and preserve connectivity. However, LMST may have very large power stretch factor. Similarly, relative neighborhood graph (RNG) and Gabriel graph (GG) can be easily extended to 3D, as shown in [39, 40]. However, both of them do not have bounded node degree.
Bahramgiri et al. [38] generalized CBTC algorithm from 2D to 3D to preserve connectivity. Basically, each node u increases its transmission power until there is no empty 3Dcone with angle degree α, i.e., there exists at least a node in each 3Dcone of degree α centered at u, if $\alpha \phantom{\rule{0.3em}{0ex}}\le \phantom{\rule{0.3em}{0ex}}\frac{2\pi}{3}$. This algorithm can be extended to ensure kconnectivity with $\alpha \phantom{\rule{0.3em}{0ex}}\le \phantom{\rule{0.3em}{0ex}}\frac{2\pi}{3k}$. Even though this approach can guarantee connectivity, the gap detection algorithm applied to check the existence of the empty 3Dcone of degree α is very complicated. The time complexity of the gap detection algorithm at a node u is O(d^{3} log d), where d is the node degree of u. Moreover, their method cannot bound node degree, as shown by [54].
Wang et al. [39, 40] proposed a set of 3D Yaobased topologies (FiYG and FlYG), which can be constructed locally and efficiently. They proved some nice properties of these 3D Yaobased structures, e.g., bounded node outdegree and constant power stretch factor. Later, Wang et al. [41] also extended all of their 3D structures to support fault tolerance.
Ghosh et al. [42] also presented two CBTCbased approaches for 3D wireless networks. Though the first approach, a heuristic based on 2D orthographic projections, can provide excellent performance in practice, it cannot guarantee connectivity for sure. In the second approach, a spherical Delaunay triangulation (SDT) is built to determine the existence of empty 3D cones. Although the second approach can guarantee connectivity of the network, the expense to construct the SDT is very high. Similarly, Poduri et al. [43] also used the spherical Delaunay triangulation to find the largest empty 3D cone in order to apply a CBTCbased topology control. The expense of SDT construction makes it inefficient in practice.
Recently, Kim et al. [44] proposed another localized Yaobased structure with Platonic solid (PYG). The basic idea is the same as the 3D Yao structures in [39, 40] except for the partition method of 3D cones. To construct PYG, each node divides the 3D sphere neighborhood into k equal cones by using regular kpolyhedron and selects the neighbor that requires the lowest transmit power in each cone. The authors also consider the interference effects to adaptively choose the minimum transmit power and adjust the topology. However, such modification will break the connectivity and power spanner guarantees of 3D Yao structures.
Overall, all of these existing 3D structures cannot achieve bounded node degree. Notice that even though 3D Yao structures (including FiYG, FlYG, and PYG) can bound the node outdegree, their node indegree could be as large as O(n) where n is the number of nodes in the networks. Faced up with this challenge, in this article we study how to efficiently construct 3D topology with bounded node degree to maintain connectivity, conserve energy and enable energy efficient routing.
4. Degreebounded 3D topologies: 3D symmetric Yao graph and 3D Yao & reverse Yao graph
In this section, we propose two general frameworks to build degreebounded 3D topologies for wireless sensor networks. The proposed frameworks basically apply the existing 3D Yao structures via two techniques developed in [19, 23, 55] for 2D topology control protocols. In addition, we provide detailed analysis on the degree bound and power stretch factor of the proposed new 3D topologies.
4.1 Review of basic 3D Yao structures
Our general frameworks to building degreebounded 3D topologies are based on any existing 3D Yao structure (such as FiYG [39, 40], FlYG [39, 40] and PYG [44]). These 3D Yao structures use certain types of 3D cones to partition the transmission range of a node (which is a sphere), and inside each 3D cone the node only keeps a link to the nearest neighbor. Since the number of such 3D cones is bounded by a constant k, all of them can bound the node outdegree by k. Here, k is a constant depending on which method and parameter are used. Basically, these structures can be categorized into two sets: fixed partition and flexible partition.
3D Yao structures based on fixed partition
3D Yao structures based on flexible partition
Algorithm 1. Construct 3D Yao Structure FlY G for Node u
Input: all neighbors N_{ UBG }(u) of node u in UBG.
Output: neighbors N_{ FlY G }(u) of u in the constructed FlYG.
1: Sort all neighbors v_{ i } ∈ N_{ UBG }(u) by its length such that uv_{ i } ≤ uv_{i+1}, where i = 1 to N_{ UBG }(u).
2: Set PROCESSED(v_{ i }) = 0 for all neighbor v_{ i } ∈ N_{ UBG }(u).
3: for i = 1 to N_{ UBG }(u) do
4: if PROCESSED(v_{ i }) = 0 then
5: As shown in Figure 2a, let ${C}_{u{v}_{i}}$ be the cone using uv_{ i } as the axis and 2θ as the top angle.
6: Keep v_{ i } as a neighbor of u in FlYG, i.e., add v_{ i } in N_{ FlYG }(u).
7: Set PROCESSED(w) = 1 for every other neighbor w inside C_{ uvi }.
8: end if
9: end for
10: return N_{ FlY G }(u)
4.2 General frameworks to build 3D symmetric Yao graph and 3D Yao & reverse Yao graph
Bounded outdegree from 3D Yao structures gives us advantages when apply several routing algorithms on these structures. However, possible unbounded indegree at some nodes will often cause large overhead or contention at those nodes which may make them exhausted earlier than other nodes. Therefore it is often imperative to construct a sparse network topology such that both the indegree and the outdegree are bounded by a constant while it is still power spanner. Hereafter, we define a general function 3DYAOStructure() which can generate the neighbor set of 3D Yao structure at node u given the current neighbor set of u. The 3DYAOStructure() function can be any generation methods of existing Yaobased 3D structures. We use YG to denote the generated 3D Yao structure.
Algorithm 2. Building 3D symmetric Yao graph at node u
Input: all neighbors N_{ UBG }(u) of node u in UBG.
Output: neighbors N_{ SY G }(u) of u in the constructed SYG.
1: N_{ YG }(u) = 3DYAOStructure(N_{ UBG }(u)).
2: Broadcast N_{ Y G }(u) to all neighbors N_{ UBG }(u).
3: for all node v ∈ N_{ Y G }(u) do
4: if u ∈ N_{ Y G }(v) then
5: Keep v as a neighbor of u in SYG, i.e., add v in N_{ SY G }(u).
6: end if
7: end for
8: return N_{ SY G }(u)
Algorithm 3. Building 3D Yao and reverse Yao graph at node u
Input: all neighbors N_{ UBG }(u) of node u in UBG.
Output: neighbors N_{ YY G }(u) of u in the constructed YYG.
1: N_{ Y G }(u) = 3DYAOStructure(N_{ UBG }(u)).
2: Broadcast N_{ Y G }(u) to all neighbors N_{ UBG }(u).
3: Let ${N}_{Y\phantom{\rule{2.77695pt}{0ex}}G}^{in}\left(u\right)$ be the set of u's incoming neighbors, i.e., all node v satisfying u ∈ N_{ Y G }(v).
4: ${N}_{Y\phantom{\rule{0.3em}{0ex}}YG}^{in}\left(u\right)\phantom{\rule{0.3em}{0ex}}=\phantom{\rule{0.3em}{0ex}}3\text{DYAOStructure}\left({N}_{Y\phantom{\rule{0.3em}{0ex}}G}^{in}\left(u\right)\right)$.
5: Broadcast ${N}_{Y\phantom{\rule{0.3em}{0ex}}YG}^{in}\left(u\right)$ to all neighbors N_{ U BG }(u).
6: for all node v ∈ N_{ YG }(u) do
7: if $u\in {N}_{YYG}^{in}\left(\upsilon \right)$ then
8: Keep v as a neighbor of u in YYG, i.e., add v in N_{ Y Y G }(u).
9: end if
10: end for
11: return N_{ Y Y G }(u)
The second set of 3D topologies is 3D Yao and reverse Yao graph (YYG), a directed graph, which guarantees that both node indegree and node outdegree are at most k. The basic idea is to apply reverse 3D Yao structure on YG to bound the node indegree. Node u chooses a node v from each 3D cone, if there is any, so the incoming link $\stackrel{\u20d6}{uv}$ in YG has the smallest length among all incoming links from YG in that cone as shown in Figure 3c. Similar idea has been used for 2D networks by [16, 19, 57]. Algorithm 3 shows the detailed algorithm. 3D YYG can be built locally and efficiently with only 1hop neighbor information and linear number of messages.
4.3 Performance analysis of 3D SYG and 3D YYG
We are now ready for providing some analysis on the 3D structures built by our general frameworks. We will use two basic properties of the underlying 3D Yao structures: (1) the outdegree of 3D YG is bounded by k; and (2) if a link uv ∈ UBG is not kept in 3D YG, there must exist a shorter link uw kept in 3D YG and ∠vuw < θ. Here θ is the largest angle possible in a 3D cone in FiYG or the half of the top angle of the 3D cone in FlYG. For simplification, we assume the maximum transmission range R = 1.
Theorem 1 Both 3D SYG and 3D YYG are strongly connected if the original 3D UBG is connected and the angle parameter θ in 3D YG is bounded by π/3.
PROOF. We first prove the connectivity of 3D SYG, which is equivalent to prove that there is a directed path from u to v in SYG for any two nodes u and v with uv ≤ 1. We prove this claim by an induction over the distance uv between nodes u and v. First, note that the edge between the closest pair of nodes must be kept in SYG. Assume that the claim is true for all links less than uv. Now we consider nodes u and v. If uv is kept in SYG, the claim is true. If uv is not in SYG, there must a node w inside one of 3D cones at u or v who causes the deletion of uv. Assume w and v are in the same cone of u and uw < uv. Because the angle ∠wuv is less than $\theta \phantom{\rule{0.3em}{0ex}}\le \phantom{\rule{0.3em}{0ex}}\frac{\pi}{3}$, we have vw < uv. By induction there is a path from u to w and a path from w to v in SYG. Therefore a path from u to v exists in SYG. This finishes the proof for SYG.
We next prove that SYG is a subgraph of YYG, which then can imply the connectivity of 3D YYG automatically. Assume that there exists a link uv in SYG but not in YYG. From the definition of SYG, we know link uv is selected by both u and v in 3D YG. Then if we apply reverse Yao structure on incoming neighbor of 3D YG (as Line 4 in Algorithm 3), uv will also be selected by node v. Thus, uv must be in YYG. This is a contradiction. Therefore, YYG is a supergraph of SYG and fully connected. □
The above theorem shows that our proposed algorithms can guarantee the connectivity of the final structure given that the underlying UBG is connected. In other words, our algorithms only remove links whose deletions will not affect the connectivity. Therefore, if the underlying UBG is already very sparse, our algorithms will not remove many links or even any links. But if the UBG is denser, more links will be removed by our proposed algorithms. This has been confirmed by our simulations (presented in Section 5). Notice that how to guarantee the connectivity of the UBG (where every node uses the maximum transmission power) is beyond the scope of this article. However, there are several existing studies [31, 33–35, 54] on how to set up the maximum transmission power to guarantee the network connectivity.
Theorem 2 The node degree of 3D SYG is bounded by k while both node outdegree and indegree of 3D YYG is bounded by k, where k is the degree bound of underlying 3D YG.
PROOF. This theorem is straightforward from the construction methods of SYG and YYG. Both methods first apply 3D YG. Since each node has at most k 3D cones during this construction, the outdegree is bounded by k. For 3D SYG, a link is kept only if both endpoints keep it in 3D YG. Thus, the node degree of SYG is obviously bounded by k. For 3D YYG, the second round of 3D YG is applied to incoming links, thus the node indegree is also bounded by k. Notice that in 3D YYG, the outdegree and indegree neighbors of a node may be different set of nodes. □
Theorem 3 The 3D SYG is not a power spanner of UBG, while 3D YYG is a power spanner of UBG when β ≥ 3 and θ < π /3.
PROOF. The first half of this theorem can be directly obtained from a result by Grunewald et al. [16]. They basically show how to construct a counter example of a 2D network in which SYG is not a power spanner. Since the 2D network is a special case of 3D networks, the same counter example works for 3D networks.
The proof of power spanner property of YYG is much challenging, even in 2D. Jia et al. [58] first proved that 2D YYG is a power spanner when θ ≤ π / 60 (i.e., k ≥ 120). It seems that their proof might be extended to 3D case, however, the node degree bound will be huge ($\text{larger}\phantom{\rule{0.3em}{0ex}}\text{than}\phantom{\rule{0.3em}{0ex}}\frac{4\pi /3}{2\pi \left(1cos\left(\theta /2\right)\right)\phantom{\rule{0.3em}{0ex}}/\phantom{\rule{0.3em}{0ex}}3}\phantom{\rule{0.3em}{0ex}}\ge 5836$). Thus it is not very useful in practice. Schindelhauer et al. [59] then proved that 2D YYG is a power spanner with power spanning ratio ${\left(8c\phantom{\rule{0.3em}{0ex}}+\phantom{\rule{0.3em}{0ex}}1\right)}^{2}\phantom{\rule{0.3em}{0ex}}\frac{{\left(2c\right)}^{\beta}}{1{2}^{\left(2\beta \right)}}$ for β > 2 when k > 6. Here $c\phantom{\rule{0.3em}{0ex}}=\phantom{\rule{0.3em}{0ex}}\frac{1}{12\phantom{\rule{0.3em}{0ex}}sin\left(\pi /k\right)}$. They proved this by first proving that 2D YYG is a weak cspanner. In a weak cspanner, between any two nodes there exists a path which remains within a disk or sphere of radius ctimes the Euclidean distance between them. Their proof of weak spanner property of YYG can also be extended to 3D YYG with θ < π / 3. However, to further extend it to 3D power spanner, it requires β ≥ 3. More specifically, 3D YYG is a power spanner with power spanning ratio ${\left(8c\phantom{\rule{0.3em}{0ex}}+\phantom{\rule{0.3em}{0ex}}1\right)}^{3}\phantom{\rule{0.3em}{0ex}}\frac{{\left(2c\right)}^{\beta}}{1{2}^{\left(3\beta \right)}}$ for β > 3 or O(c^{12}) for β = 3 when θ < π/3. Therefore, we can claim that 3D YYG is a power spanner for β ≥ 3 and θ < π / 3. When 2 ≤ β < 3, the power spanner property is still open. □
Property summary for existing and proposed 3D topologies
3D structure  connectivity  outdegree  indegree  power stretch factor  message  time 

3D LMST  yes  O(1)  O(1)  O(n)  O(n)  O(d^{2}) 
3D RNG  yes  O(n)  O(n)  O(n)  O(n)  O(d) 
3D GG  yes  O(n)  O(n)  1  O(n)  O(d) 
3D YG  yes  O(1)  O(n)  O(1)  O(n)  O(d) or O(d log d) 
3D SYG  yes  O(1)  O(1)  O(n)  O(n)  O(d) or O(d log d) 
3D YYG  yes  O(1)  O(1)  O(1)  O(n)  O(d) or O(d log d) 
5 Simulation results
In order to evaluate the performance of our new 3D topologies with bounded degree, we conduct simulations by generating random 3D sensor networks. In our experiments, we randomly generate a set V of n wireless nodes and the UBG, then test the connectivity of UBG. If it is connected, we construct different localized 3D topologies proposed in this article and some existing ones, and measure the node degree as well as power efficiency of these topologies. We repeat the experiment for multiple times and report the average or maximum values of these metrics in all of the simulations.
We evaluate the following localized 3D topologies:

Sparse topologies: RNG and GG;

3D Yao structures: FiYG_{32}, PYG_{8}, PYG_{12}, FlYG _{π/4}, and FlYG _{π/6};

3D symmetric Yao structures: FiSYG_{32}, PSYG_{8}, PSYG_{12}, FlSYG_{π/4}, and FlSYG_{π/6};

3D Yao & reverse Yao Structures: FiYYG_{32}, PYYG_{8}, PYYG_{12}, FlYTG_{π/4}, and FlYYG_{π/ 6};
Here, ∗SYG and ∗YYG are the symmetric Yao structure and Yao & Reverse Yao structure based on the corresponding underlying 3D Yao structures, respectively.
The node degree of wireless networks should not be too large to avoid interference, collision, and overhead. It should not be too small either: a low node degree usually implies that the network has a low fault tolerance and tends to increase the overall network power consumption as longer paths may have to be taken. Figure 6a shows all localized 3D topologies have lower average degrees compared with UBG and keep small degrees when the degree of UBG becomes denser and denser as the number of nodes in the network increases. Clearly, Yao structures with larger number of 3D cones lead to denser structures, while RNG is much sparser than most of Yaobased structures. Notice that the structures sparser than GG are Symmetric Yao structures and Yao & Reverse Yao structures of PYG_{12}, PYG_{8} and FlYG_{π/ 4}since these structures have smallest 3D cones. These can also be verified by Figure 4 and 6b (the maximum node degree). Figure 6c shows that the maximum node outdegree of these localized 3Dtopologies are small. The outdegrees of all Yao structures are smaller than the theoretical bounds. Figure 6d also gives the maximum node indegree of these topologies which are a little bit larger than their outdegrees. It is clear that both symmetric Yao structures and Yao & reverse Yao structures have smaller indegrees than 3D Yao structures. Remember that theoretically they can bound the node indegree. The results also showed that RNG and GG do not have large degrees and 3D Yao structures do not have large indegree in this experiment, and the reasons are that the nodes are distributed randomly in the area. In real life, the network may not be distributed randomly, so it is possible that RNG and GG have large degrees and 3D Yao structures have large indegrees. Such examples and simulation results can be found in [19].
Besides connectivity, the most important design metric of wireless networks is perhaps power efficiency, because it directly affects both nodes and network lifetime. Figure 6e,f show all proposed structures have small power stretch factors even when the network is very dense. Notice that Yao structures based on PYG_{8} and RNG have a little bit higher stretch factor than GG and other Yaobased structures, however, their maximum power stretch factors are still smaller than 5. The reason again is that the nodes are distributed randomly in the area and the number of nodes is not too large. As we expected, GG has a power stretch factor of one and all power stretch factors of 3D Yao structures are smaller than their theoretical bounds if they have ones. Among all 3D Yao structures, FlYG_{π/6}and FlYYG_{π/6}have the smallest stretch factor, since they are the densest 3D Yao structures.
6 Conclusion
Topology control for 3D wireless sensor networks has been well studied recently and different 3D geometric topologies were proposed to achieve the sparseness and power efficiency. However, most of them cannot bound the node degree. Even though some of 3D structures based on Yao graph can bound the node outdegree, they may still lead to large indegree at some nodes. Therefore, in this article, we propose two general frameworks to build degreebounded 3D topologies for wireless sensor networks. These frameworks can use all existing Yaobased 3D structures as the underlying methods, and only use local information with linear number of messages. We show some of them can also guarantee the constant power stretch factor in 3D. Our simulation results confirm the good performance of our new 3D topologies.
Endnote
^{a}As shown in Figure 2b, the angle between two neighbors in FlYG_{ θ } must be larger than θ, i.e., ∠v_{ i }uv_{ j } < θ.
Declarations
Acknowledgements
The study of F. Li was partially supported by the National Natural Science Foundation of China (NSFC) under Grant No. 60903151, Beijing Natural Science Foundation under Grant No. 4122070, and the Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry. The study of Y. Wang was supported in part by the US National Science Foundation (NSF) under Grant No. CNS0721666, CNS0915331, and CNS1050398.
Authors’ Affiliations
References
 Huang CF, Tseng YC, Lo LC: The coverage problem in threedimensional wireless sensor networks. In Proc of IEEE Globecom 2004. Volume 5. Dallas, Texas, USA; 2004:31823186.Google Scholar
 Watfa M, Commuri S: Optimal 3dimensional sensor deployment strategy. In Proc of 3rd IEEE Consumer Communications and Networking Conference (CCNC 2006). Volume 2. Las Vegas, Nevada, USA; 2006:892896.Google Scholar
 Watfa M, Commuri S: The 3dimensional wireless sensor network coverage problem. In Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control (ICNSC'06). Ft Lauderdale, Florida, USA; 2006:856861.View ArticleGoogle Scholar
 Alam SMN, Haas ZJ: Coverage and connectivity in threedimensional networks. In Proceedings of the 12th ACM Annual International Conference on Mobile Computing and Networking (MobiCom'06). New York, NY, USA; 2006:346357.View ArticleGoogle Scholar
 Ravelomanana V: Extremal properties of threedimensional sensor networks with applications. IEEE Trans Mobile Comput 2004, 3(3):246257. 10.1109/TMC.2004.23View ArticleGoogle Scholar
 Pompili D, Melodia T: Threedimensional routing in underwater acoustic sensor networks. In Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (PEWASUN). Montreal, Canada; 2005:214221.View ArticleGoogle Scholar
 Xie P, Cui JH, Lao L: VBF: vectorbased forwarding protocol for underwater sensor networks. In Proceedings of the 5th international IFIPTC6 conference on Networking Technologies (Networking'06). Coimbra, Portugal; 2006:12161221.Google Scholar
 Kao G, Fevens T, Opatrny J: Positionbased routing on 3D geometric graphs in mobile ad hoc networks. In Proceedings of the 17th Canadian Conference on Computational Geometry (CCCG 2005). Ontario, Canada; 2005:8891.Google Scholar
 Abdallah A, Fevens T, Opatrny J: Poweraware 3D positionbased routing algorithm for ad hoc networks. In Proc of 2007 IEEE International Conference on Communications (ICC). Glasgow, Scotland; 2007:31303135.View ArticleGoogle Scholar
 Li F, Chen S, Wang Y, Chen J: Load balancing routing in three dimensional wireless networks. In Proc of 2008 IEEE International Conference on Communications (ICC). Beijing, China; 2008:30733077.View ArticleGoogle Scholar
 Liu C, Wu J: Efficient geometric routing in three dimensional ad hoc networks. In Proc of 28th Annual IEEE Conference on Computer Communications (INFOCOM), Miniconference. Rio, Brazil; 2009:27512755.Google Scholar
 Wang Y, Yi CW, Huang M, Li F: Three dimensional greedy routing in largescale random wireless sensor networks. Ad Hoc Netw (2011, to appear)Google Scholar
 Rajaraman R: Topology control and routing in ad hoc networks: a survey. SIGACT News 2002, 33: 6073. 10.1145/564585.564602View ArticleGoogle Scholar
 Santi P: Topology Control in Wireless Ad Hoc and Sensor Networks. JohnWiley & Sons, Chichester, UK; 2005.View ArticleGoogle Scholar
 Wang Y: Topology control for wireless sensor networks. In Wireless Sensor Networks and Applications. Edited by: Y Li, M Thai, W Wu. Springer, New York, USA; 2007.Google Scholar
 Grünewald M, Lukovszki T, Schindelhauer C, Volbert K: Distributed maintenance of resource efficient wireless network topologies. In Proc of the 8th European Conference on Parallel Computing (EuroPar'02). Paderborn, Germany; 2002:935946.Google Scholar
 Li L, Halpern JY, Bahl P, Wang YM, Wattenhofer R: Analysis of a conebased distributed topology control algorithms for wireless multihop networks. In Proc of ACM Symposium on Principle of Distributed Computing (PODC). Newport, Rhode Island, USA; 2001:264273.Google Scholar
 Li XY, Wan PJ, Wang Y: Power efficient and sparse spanner for wireless ad hoc networks. In Proc of IEEE Int Conf on Computer Communications and Networks (ICCCN01). Scottsdale, Arizona, USA; 2001:564567.Google Scholar
 Li XY, Wan PJ, Wang Y, Frieder O: Sparse power efficient topology for wireless networks. In Proc of IEEE Hawaii Int Conf on System Sciences (HICSS). Big Island, HI, USA; 2002:38393848.Google Scholar
 Wattenhofer R, Li L, Bahl P, Wang YM: Distributed topology control for wireless multihop adhoc networks. In Proc of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). Volume 3. Anchorage, Alaska, USA; 2001:13881397.Google Scholar
 Li N, Hou JC, Sha L: Design and analysis of a MSTbased topology control algorithm. In Proc of the 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). Volume 3. San Francisco California, USA; 2003:17021712.Google Scholar
 Li XY, Wang Y, Song WZ: Applications of k Local MST for topology control and broadcasting in wireless ad hoc networks. IEEE Trans Parallel Distrib Syst 2004, 15(12):10571069. 10.1109/TPDS.2004.77View ArticleGoogle Scholar
 Li XY, Stojmenovic I, Wang Y: Partial delaunay triangulation and degree limited localized bluetooth multihop scatternet formation. IEEE Trans Parallel Distrib Syst 2004, 15(4):350361. 10.1109/TPDS.2004.1271184View ArticleGoogle Scholar
 Li XY, Calinescu G, Wan PJ, Wang Y: Localized delaunay triangulation with application in wireless ad hoc networks. IEEE Trans Parallel Distrib Process 2003, 14(10):10351047. 10.1109/TPDS.2003.1239871View ArticleGoogle Scholar
 Gao J, Guibas LJ, Hershburger J, Zhang L, Zhu A: Geometric spanner for routing in mobile networks. In Proceedings of the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 01). Long Beach, CA, USA; 2001:4555.View ArticleGoogle Scholar
 Ramanathan R, Hain R: Topology control of multihop wireless networks using transmit power adjustment. In Proc of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). Volume 2. Tel Aviv, Israel; 2000:404413.Google Scholar
 Nikaein N, Bonnet C: Topology management for improving routing and network performances in mobile ad hoc networks. Mob Netw Appl 2004, 9(6):583594.View ArticleGoogle Scholar
 Bao L, GarciaLunaAceves JJ: Topology management in ad hoc networks. Proceedings of the 4th ACM international symposium on Mobile Ad Hoc Networking & Computing (MobiHoc) 2003, 129140.Google Scholar
 Liang B, Haas ZJ: Virtual backbone generation and maintenance in ad hoc network mobility management. In Proc of the 19th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). Volume 3. Tel Aviv, Israel; 2000:12931302.Google Scholar
 Alzoubi K, Li XY, Wang Y, Wan PJ, Frieder O: Geometric spanners for wireless ad hoc networks. IEEE Trans Parallel Distrib Process 2003, 14(4):408421. 10.1109/TPDS.2003.1195412View ArticleGoogle Scholar
 Clementi AE, Huiban G, Penna P, Rossi G, Verhoeven YC: Some recent theoretical advances and open questions on energy consumption in adhoc wireless networks. In Proc of 3rd Workshop on Approximation and Randomization Algorithms in Communication Networks (ARACNE). Volume 15. Rome, Italy; 2002:2338.Google Scholar
 Lloyd L, Liu R, Marathe MV, Ramanathan R, Ravi SS: Algorithmic aspects of topology control problems for ad hoc networks. In Proceedings of the 3rd ACM international symposium on Mobile Ad Hoc Networking and Computing (MobiHoc). Lausanne, Switzerland; 2002:123134.View ArticleGoogle Scholar
 Chen WT, Huang NF: The strongly connecting problem on multihop packet radio networks. IEEE Trans Commun 1989, 37(3):293295. 10.1109/26.20105View ArticleGoogle Scholar
 Blough D, Leoncini M, Resta G, Santi P: On the symmetric range assignment problem in wireless ad hoc networks. In Proc of the 2nd IFIP International Conference on Theoretical Computer Science (TCS). Deventer, The Netherlands; 2002:7182.Google Scholar
 Kirousis LM, Kranakis E, Krizanc D, Pelc A: Power consumption in packet radio networks. Theor Comput Sci 2000, 243(12):289305. 10.1016/S03043975(98)002230MathSciNetView ArticleGoogle Scholar
 Wang Y, Li XY: Minimum power assignment in wireless ad hoc networks with spanner property. J Comb Optim 2006, 11: 99112. 10.1007/s1087800659800MathSciNetView ArticleGoogle Scholar
 Zhu Y, Huang M, Chen S, Wang Y: Cooperative energy spanners: energyefficient topology control in cooperative ad hoc networks. In Proc of IEEE 30th Conference on Computer Communications (INFOCOM11), Miniconference. Shanghai, China; 2011:231235.Google Scholar
 Bahramgiri M, Hajiaghayi MT, Mirrokni VS: Faulttolerant and 3dimensional distributed topology control algorithms in wireless multihop networks. In Proceedings of the 11th Annual IEEE International Conference on Computer Communications and Networks (ICCCN). Miami, Florida, USA; 2002:392397.Google Scholar
 Wang Y, Li F, Dahlberg T: Power efficient 3dimensional topology control for ad hoc and sensor networks. In Proc of IEEE Global Telecommunications Conference (GlobeCom 2006). San Francisco, CA, USA; 2006:15.Google Scholar
 Wang Y, Li F, Dahlberg TA: Energyefficient topology control for 3dimensional sensor networks. Int J Sensor Netw (IJSNet) 2008, 4(1/2):6878. 10.1504/IJSNET.2008.019253View ArticleGoogle Scholar
 Wang Y, Cao L, Dahlberg TA, Li F, Shi X: Selforganizing fault tolerant topology control in largescale threedimensional wireless networks. ACM Trans Auto Adap Syst (TAAS) 2009, 4(3):19:119:21.Google Scholar
 Ghosh A, Wang Y, Krishnamachari B: Efficient distributed topology control in 3dimensional wireless networks. In Proc of 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON'07). San Diego, California, USA; 2007:91100.Google Scholar
 Poduri S, Pattem S, Krishnamachari B, Sukhatme GS: Using local geometry for tunable topology control in sensor networks. IEEE Trans Mob Comput 2009, 8(2):218230.View ArticleGoogle Scholar
 Kim J, Shin J, Kwon Y: Adaptive 3dimensional topology control for wireless adhoc sensor networks. IEICE Trans on Communications 2010, E93B(11):29012911. 10.1587/transcom.E93.B.2901View ArticleGoogle Scholar
 Zhang Y, Cheng L: A distributed protocol for multihop underwater robot positioning. In Proceedings of IEEE International Conference on Robotics and Biomimetics. Shenyang, China; 2004:480484.Google Scholar
 Zhou Z, Cui JH, Zhou S: Localization for largescale underwater sensor networks. In Proceedings of IFIP Networking'07. Atlanta, GA, USA; 2007:108119.Google Scholar
 Cheng W, Teymorian A, Ma L, Cheng X, Lu X, Lu X: Underwater localization in sparse 3D acoustic sensor networks. In Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM'08). Phoenix, AZ, USA; 2008:236240.Google Scholar
 Bose P, Morin P, Stojmenovic I, Urrutia J: Routing with guaranteed delivery in ad hoc wireless networks. In Proc of 3rd Int Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'99). Seattle, Washington, USA; 1999:4855.View ArticleGoogle Scholar
 Seddigh M, Gonzalez JS, Stojmenovic I: RNG and internal node based broadcasting algorithms for wireless onetoone networks. ACM Mob Comput Commun Rev 2002, 5(2):3744.View ArticleGoogle Scholar
 Karp B, Kung H: GPSR: Greedy perimeter stateless routing for wireless networks. In Proc of the 6th ACM Annual International Conference on Mobile Computing and Networking (MobiCom 2000). Boston, Massachusetts; 2000:243254.Google Scholar
 Wang Y, Li XY: Localized construction of bounded degree and planar spanner for wireless ad hoc networks. ACM/Springer Mob Netw Appl (MONET) 2006, 11(2):161175. 10.1007/s1103600644695View ArticleGoogle Scholar
 Song WZ, Wang Y, Li XY: Localized algorithms for energy efficient topology in wireless ad hoc networks. ACM/Springer Mob Netw Appl (MONET) 2005, 10(6):911923. 10.1007/s1103600544473View ArticleGoogle Scholar
 Li XY, Song WZ, Wang W: A unified energyefficient topology for unicast and broadcast. In Proceedings of the 11th ACM Annual International Conference on Mobile Computing and Networking (MobiCom'05). New York, USA; 2005:115.Google Scholar
 Li XY, Wan PJ, Wang Y, Yi CW, Frieder O: Robust deployment and fault tolerant topology control for wireless ad hoc networks. Wiley J Wirel Commun Mob Comput 2004, 4: 109125. 10.1002/wcm.161View ArticleGoogle Scholar
 Stojmenovic I: Dominating set based bluetooth scatternet formation with localized maintenance. In Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002). Washington, DC, USA; 2002:122.Google Scholar
 Wang Y, Li XY, Frieder O: Distributed spanner with bounded degree for wireless networks. Int J Found Comput Sci 2003, 14(2):183200. 10.1142/S0129054103001674MathSciNetView ArticleGoogle Scholar
 Rührup S, Schindelhauer C, Volbert K, Grünewald M: Performance of distributed algorithms for topology control in wireless networks. In Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003). Nice, France; 2003.Google Scholar
 Jia L, Rajaraman R, Scheideler C: On local algorithms for topology control and routing in ad hoc networks. In Proceedings of the 15th Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA 03). San Diego, California, USA; 2003:220229.Google Scholar
 Schindelhauer C, Volbert K, Ziegler M: Geometric spanners with applications in wireless networks. Comput Geom Theory Appl 2007, 36: 197214. 10.1016/j.comgeo.2006.02.001MathSciNetView ArticleGoogle Scholar
Copyright
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.