14
UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks 3 using measurement co-occurrence 4 Konstantinos Kalpakis * , Shilang Tang 5 Computer Science & Electrical Engineering Department, University of Maryland Baltimore County, 1000 Hilltop Circle, Baltimore, MD 21250, USA 6 Received 18 April 2007; accepted 6 January 2008 7 8 Abstract 9 Wireless ad hoc networks of battery-powered microsensors (WSNs) are proliferating rapidly and transforming how information is 10 gathered and processed, and how we affect our environment. The limited energy of those sensors poses the challenge of using such sys- 11 tems in an energy efficient manner to perform various activities. A common activity of many applications of WSNs is that of data gath- 12 ering: for each time step, gather the measurement from each sensor to a base station. Often there is redundancy and/or dependency 13 among the sensor measurements. How to identify the data redundancy/dependency and utilize them on improving energy efficiency 14 of data gathering has been one of the attractive topics. 15 We propose using measurement co-occurrence to identify data redundancy and a novel collaborative data gathering approach utiliz- 16 ing co-occurrence that offers a trade-off between the communication cost of data gathering versus errors at estimating the sensor mea- 17 surements at the base station. A key tenant of our approach is to have sensors with co-occurring measurements alternate in transmitting 18 such co-occurring measurements to the base station, and having the base station make inferences about the sensor measurements utiliz- 19 ing only the data transmitted to it. We present two effective in-network methods for detecting co-occurrence of measurements, as well as 20 a simple and efficient protocol for scheduling the transmission of the sensor measurements to the base station. 21 We provide experimental results on synthetic and real datasets showing that the proposed system offers substantial (up to 65%) reduc- 22 tion of the communication costs of data gathering with a small number of measurement inference errors (<6%) at the base station. 23 Ó 2008 Published by Elsevier B.V. 24 Keywords: Wireless sensor networks; Data gathering; Set resemblance; Co-occurrence 25 26 1. Introduction 27 Recent advances in hardware developments have led to 28 the creation of wireless sensor networks (WSNs). Such net- 29 works are envisioned to consist of low-cost sensor nodes 30 operating in unattended mode, each with some limited 31 computational power and low range wireless communica- 32 tion ability, and generally being battery powered. Because 33 of its unattended operation mode and easy deployment, 34 WSNs become attractive to many applications such as 35 wildlife tracking, environmental and habitat monitoring, 36 battlefield intelligence, and etc. However, the limited 37 energy of their sensors poses the challenge of using such 38 systems in an energy efficient manner (see Fig. 1 Q1 ). 39 We consider the problem of energy efficient data gather- 40 ing, which is a basic activity of many WSN applications. 41 We focus on applications in which each sensor continu- 42 ously monitors a field of interest, and the base station is 43 interested in getting every measurement from all the sen- 44 sors, in order to determine the status of the observing field 45 and make appropriate decisions. Example of such applica- 46 tions can be found in environmental monitoring, quality 47 control in manufacturing assembly lines, agriculture, etc. 48 A simple method for gathering the measurements is to have 49 each sensor transmit its every measurement to the base sta- 50 tion. However, this method is energy inefficient since often 0140-3664/$ - see front matter Ó 2008 Published by Elsevier B.V. doi:10.1016/j.comcom.2008.01.001 * Corresponding author. Tel.: +1 410 455 3143. E-mail addresses: [email protected] (K. Kalpakis), stang2@ csee.umbc.edu (S. Tang). www.elsevier.com/locate/comcom Available online at www.sciencedirect.com Computer Communications xxx (2008) xxx–xxx COMCOM 3556 No. of Pages 14, Model 5+ 24 January 2008 Disk Used ARTICLE IN PRESS Please cite this article in press as: K. Kalpakis, S. Tang, Collaborative data gathering in wireless sensor networks ..., Comput. Com- mun. (2008), doi:10.1016/j.comcom.2008.01.001

Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

1

2

3

4

5

67

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

2425

26

27

28

29

30

31

32

33

34

35

Available online at www.sciencedirect.com

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

www.elsevier.com/locate/comcom

Computer Communications xxx (2008) xxx–xxx

OF

Collaborative data gathering in wireless sensor networksusing measurement co-occurrence

Konstantinos Kalpakis *, Shilang Tang

Computer Science & Electrical Engineering Department, University of Maryland Baltimore County, 1000 Hilltop Circle, Baltimore, MD 21250, USA

Received 18 April 2007; accepted 6 January 2008

O

REC

TED

PRAbstract

Wireless ad hoc networks of battery-powered microsensors (WSNs) are proliferating rapidly and transforming how information isgathered and processed, and how we affect our environment. The limited energy of those sensors poses the challenge of using such sys-tems in an energy efficient manner to perform various activities. A common activity of many applications of WSNs is that of data gath-ering: for each time step, gather the measurement from each sensor to a base station. Often there is redundancy and/or dependencyamong the sensor measurements. How to identify the data redundancy/dependency and utilize them on improving energy efficiencyof data gathering has been one of the attractive topics.

We propose using measurement co-occurrence to identify data redundancy and a novel collaborative data gathering approach utiliz-ing co-occurrence that offers a trade-off between the communication cost of data gathering versus errors at estimating the sensor mea-surements at the base station. A key tenant of our approach is to have sensors with co-occurring measurements alternate in transmittingsuch co-occurring measurements to the base station, and having the base station make inferences about the sensor measurements utiliz-ing only the data transmitted to it. We present two effective in-network methods for detecting co-occurrence of measurements, as well asa simple and efficient protocol for scheduling the transmission of the sensor measurements to the base station.

We provide experimental results on synthetic and real datasets showing that the proposed system offers substantial (up to 65%) reduc-tion of the communication costs of data gathering with a small number of measurement inference errors (<6%) at the base station.� 2008 Published by Elsevier B.V.

Keywords: Wireless sensor networks; Data gathering; Set resemblance; Co-occurrence

R

36

37

38Q1

39

40

41

42

43

44

45

46

UN

CO1. Introduction

Recent advances in hardware developments have led tothe creation of wireless sensor networks (WSNs). Such net-works are envisioned to consist of low-cost sensor nodesoperating in unattended mode, each with some limitedcomputational power and low range wireless communica-tion ability, and generally being battery powered. Becauseof its unattended operation mode and easy deployment,WSNs become attractive to many applications such aswildlife tracking, environmental and habitat monitoring,

47

48

49

50

0140-3664/$ - see front matter � 2008 Published by Elsevier B.V.

doi:10.1016/j.comcom.2008.01.001

* Corresponding author. Tel.: +1 410 455 3143.E-mail addresses: [email protected] (K. Kalpakis), stang2@

csee.umbc.edu (S. Tang).

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

battlefield intelligence, and etc. However, the limitedenergy of their sensors poses the challenge of using suchsystems in an energy efficient manner (see Fig. 1).

We consider the problem of energy efficient data gather-ing, which is a basic activity of many WSN applications.We focus on applications in which each sensor continu-ously monitors a field of interest, and the base station isinterested in getting every measurement from all the sen-sors, in order to determine the status of the observing fieldand make appropriate decisions. Example of such applica-tions can be found in environmental monitoring, qualitycontrol in manufacturing assembly lines, agriculture, etc.A simple method for gathering the measurements is to haveeach sensor transmit its every measurement to the base sta-tion. However, this method is energy inefficient since often

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 2: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

T51

52

53

54

55

56

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

1 Our main focus in this paper is the number rather than the magnitudeof inference errors.

Fig. 1. The algorithm used by the base station to estimate sensormeasurements mi;t.

2 K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

UN

CO

RR

EC

there is redundancy and/or dependency among the sensormeasurements.

Identifying data redundancies/dependencies and utiliz-ing them in order to provide energy efficient data gatheringhas been considered by many researchers [10,13,8,6,18]. Inthis paper, we propose a new idea of using measurements(data) co-occurrence to identify data redundancy togetherwith two methods to estimate it and a novel collaborativedata gathering approach utilizing the measurements co-occurrence. Our proposed approach offers a trade-offbetween communication costs of the data gathering versusnumber of estimation errors of the sensor measurements atthe base station. Intuitively, two measurements co-occur ifthe set of times at which they are measured are similar. Weutilize co-occurrence as follows. Sensors identify co-occur-ring measurements by using the in-network method wepresent, which relies on estimating the approximate resem-blance of the measurement occurrence sets. Then, sensorswith co-occurring measurements collaborate, by informingthe base station and then taking turns in communicatingthose measurements to the base station. In addition, eachsensor may choose a default measurement, which it doesnot transmit upon informing the base station of its choice.Being informed of the measurement co-occurrence rela-tionship and the sensor defaults, the base station infersthe measurements of the non-transmitting sensors utilizingonly the transmitted measurements.

Data co-occurrence is different from data correlation,which is normally expected in densely deployed sensor net-works. Data correlation has been exploited to reduce thecommunication costs for gathering measurements to thebase station [13,8,6,18], or for in-network processing ofaggregation queries [10,13,19,12,16]. Intuitively, correla-tion attempts to capture monotonicity trends (e.g. lineardependencies) between sequences. Co-occurrence does notprovide information about such monotonicity trends;

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

ED

PR

OO

F

instead, it attempts to quantify the trend that two valuestend to occur simultaneously (e.g. non-linear dependen-cies), and is capable of handling discrete enumerated data.We can find sequences with co-occurring values of high fre-quency, and with arbitrary correlation coefficient, whichimplies that correlation is not an indicator of co-occur-rence. Further, data co-occurrence can appear in both den-sely and sparsely deployed sensor networks.

We present two in-network methods, namely positionalmin-wise and random projection, for sensors to detect mea-surement co-occurrence. Both methods compute small-sizesignatures of measurement occurrence sets, and then usethese signatures to estimate the resemblance of the mea-surement occurrence sets. Computing the signatures andestimating the resemblance are both simple, which makesour methods mindful of the limited energy and computa-tion resources of the sensors. As shown in our experiments,while the random projection method performs better, bothmethods are effective, in terms of signature size and accu-racy of resemblance estimation.

In order to utilize measurements co-occurrence, we pres-ent an efficient protocol for sensors to coordinate the trans-mission of co-occurring measurements. For simplicity, weassume that communication links are lossless. Using ourprotocol, sensors will determine their measurement trans-mission schedule dynamically, distributively, and near-immediately. Our protocol is aggressive on reducing trans-mission of measurements – normally just one of the sensorswith co-occurring measurements will transmit, and at thesame time it ensures that one of the co-occurring measure-ments will always be communicated to the base station.Our experimental results show that our approach offerssubstantial communication savings, at the price of a smallnumber of inference errors1 – for synthetic datasets it pro-vides up to 65% savings on the communication costs withno more than 6% inference errors, and for a real datasetit provides 27% savings and 1.53% inference errors.

The rest of the paper is organized as follows. In Section2 we discuss in details of measurement co-occurrence andpresent our methods for estimating co-occurrence. In Sec-tion 3 we describe our collaborative data gathering proto-col exploiting measurement co-occurrence on reducingdata communication costs. In Section 4 we present theresults of our experimental evaluation with synthetic andreal data. Related work is discussed in Section 5, and con-clusions are given in Section 6.

2. Estimating co-occurrence of sensor measurements

2.1. Measurement co-occurrence

Consider a wireless sensor network with a base stationand n sensors. Each sensor has a unique identifier (sid).

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 3: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

T

137

138

139

140

141

142

143

144

145

146

147

148

149

150

151

152

153

154

155

157157

158

160160

161

162

163

164

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

191191

192

194194

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

231231

232

234234

235

237237

238

K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx 3

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

UN

CO

RR

EC

We refer to the sensor with sid i as the sensor i. Sensorstake measurements of their environment at each time, whilethe base station needs to know all the measurements sen-sors make at each time. The time at which measurementsare taken is assumed to be discrete. Each sensor has a clockindicating the measurement time. Sensor clocks are locallysynchronized (within the neighborhood Adji of each sensori). Hereafter, we refer to measurement time simply as time.A window is a contiguous sequence of w times, with the jthwindow being W j ¼ ½j � w; ðjþ 1Þ � wÞ, j P 0. The relativetime of a measurement made at time t within a windowW ¼ ½t0; t0 þ wÞ is ~t ¼ t � t0. Let Ui be the discrete universe(domain) of the measurements sensor i makes. Let mi;t 2 Ui

be the measurement sensor i makes at time t. An element eis a tuple ði; vÞ, where v 2 U i and i is a sid; for brevity, lete:value ¼ v and e:sid ¼ i. The occurrence set vW ðeÞ of anelement e for a window W is the set of relative times thatsensor e:sid makes measurement e:value within the windowW,

vW ðeÞ ¼ f~t : me:sid;t ¼ e:value and t 2 W g: ð1Þ

The resemblance rðS1; S2Þ of any two sets S1; S2 is defined as

rðS1; S2Þ ¼jS1 \ S2jjS1 [ S2j

: ð2Þ

Set resemblance takes values between 0 and 1 and is a mea-sure of set similarity, e.g. if S1 ¼ S2 then rðS1; S2Þ ¼ 1 and ifS1 \ S2 ¼ ; then rðS1; S2Þ ¼ 0.

We are interesting in determining the degree that ele-ments tend to occur (be measured) at the same or almostthe same times. We say that two elements e1 and e2 co-occur

in a window W if the resemblance rðvW ðe1Þ; vW ðe2ÞÞ of theiroccurrence sets is P s, where s is the co-occurrence thresh-old, a system parameter between, 0 < s 6 1. Observe thatan element of a sensor i can co-occur with at most b1=scelements from sensor j 6¼ i. Moreover, note that co-occur-rence is not a transitive relation, i.e. since rðS1; S2ÞP s andrðS2; S3ÞP s does not always imply rðS1; S3ÞP s, for anysets S1; S2; S3.2 Therefore, additional care is needed whenusing the resemblance of occurrence sets to determinewhether a group of three or more elements co-occur.

We consider two different approaches on determiningco-occurrence for a set of elements L at a threshold s. Inthe clique approach, each pair of elements in L is requiredto co-occur at threshold s. In the connected-components(CC) approach, we require that for every pair of elementsin L there exists a chain of elements in L, with adjacent ele-ments co-occurring at threshold s. We experiment withboth approaches, and we find that the connected-compo-nents approach presents a better trade-off between commu-nication costs vs. error rate.

An element e can be thought of as the event of sensore:sid measuring value e:value. Consider two elements e1

and e2. Since the conditional probability of e2 given e1 is

240240

241

2 On the other hand, it can be shown that if j S1 j¼j S2 j¼j S3 j thenrðS1; S3ÞP rðS1; S2Þ þ rðS2; S3Þ � 1.

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

ED

PR

OO

F

Pr½e2je1� ¼ limjW j!1

jvW ðe1Þ \ vW ðe2ÞjjvW ðe1Þj

; ð3Þ

and the probability of e1 is

Pr½e1� ¼ limjW j!1

jvW ðe1ÞjjW j ; ð4Þ

using Lemma 1 in Appendix A, we find that a lower bounds on the resemblance of the ocurrence sets of e1 and e2, inthe limit, implies a lower bound of sð1þ 2sÞ=ð1þ sÞ2 onthe conditional probabilities Pr½e2 j e1� and Pr½e1 j e2�.

Measurement correlation has been used as a way toreduce communication costs in wireless sensor networks,while, to the best of our knowledge, this is the first timethat co-occurrence is proposed for that purpose. Correla-tion and co-occurrence are generally different concepts.Intuitively, correlation attempts to capture monotonicitytrends (linear dependencies) between numerical sequences(are both increasing/decreasing? is increasing and the otherdecreasing? etc). Co-occurrence does not provide informa-tion about such monotonicity trends; instead, it attempts toquantify the trend that two values tend to occur simulta-neously (non-linear dependencies). There are sequencesthat contain co-occurring elements with large occurrencesets, and which have arbitrary correlation coefficients (seeAppenidx B for such example sequences). Therefore, thecorrelation coefficient is not an indicator of co-occurrence.

2.2. Estimating the resemblance of occurrence sets

The naive approach for two sensors to determinewhether two elements e1 and e2 co-occur is for sensore2:sid to compute the resemblance of the occurrence setsof e1; e2 after obtaining the occurrence set vðe1Þ from sensore1:sid. The communication cost of this approach can beunnecessarily high. We present two methods for sensorsto approximately compute the resemblance of elementoccurrence sets with smaller communication cost.

2.2.1. Positional min-wise hashing

The first method is based on min-wise hashing. Min-wisehashing has been used before to estimate resemblance ofsets. Consider k random min-wise independent hash func-tions hi : ½0;wÞ ! N , i ¼ 1; 2; . . . ; k. The min-wise hash ofa set S � ½0;wÞ is the set

aðSÞ ¼ faiðSÞ j i ¼ 1; 2; . . . ; kg; ð5Þwhere

aiðSÞ ¼ minðfhiðzÞ j z 2 SgÞ: ð6ÞGiven two sets S1; S2 � ½0;wÞ, it turns out that

Pr½aiðS1Þ ¼ aiðS2Þ� ¼ rðS1; S2Þ: ð7ÞThe resemblance rðS1; S2Þ of S1; S2 can be estimated by

rðS1; S2Þ ¼jaðS1Þ \ aðS2Þj

k: ð8Þ

Datar and Muthukrishan [9, Lemma 1] show that

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 4: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

242

243

245245

246

247

248

249

250

251

252

253

254

256256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

279279

280

281

283283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

4 K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

Theorem 1. ([9]) For any 1 > �; p; d > 0 and k P 2��3p�1

log d�1,

rðS1; S2Þ ¼ ð1� �Þ � rðS1; S2Þ þ �p; ð9Þ

with probability at least 1� d.

For example, when � ¼ 0:05, p ¼ 0:99, and d ¼ 0:05,Theorem 1 implies that, in order to estimate resemblancewith 95% accuracy and 95% confidence, k (and thus thewindow size in our case) needs to be >48,416.

We define the positional min-wise hash of set S to be thevector ða1ðSÞ; a2ðSÞ; . . . ; akðSÞÞ, and estimate the resem-blance of two sets S1; S2 using their positional min-wisehashes as

rðS1; S2Þ ¼jfi : aiðS1Þ ¼ aiðS2Þgj

k; ð10Þ

In our experiments, we find that the positional min-wisehashing approach with k ¼ 15 gives an estimated resem-blance within 0.05 of the true resemblance for setsS1; S2 � ½0;wÞ, where w 6 2048. The value k ¼ 15 is toosmall for the standard min-wise hash approach to pro-vide useful resemblance estimation. Hereafter, we usepositional min-wise hashing instead of the standard min-wise hashing.

T

312

313

314

315

316

317

318

319

320

321

322

323

324

325

326

327

328

329

330

331

332

333

334

UN

CO

RR

EC

2.2.2. Random projection

The second method we consider for estimating setresemblance is based on random projections. Random pro-jections is a powerful dimensionality reduction techniquewith many applications, since it approximately preservesvector norms under some conditions [2,14]. Since any setS � ½0;wÞ has an indicator vector s 2 f0; 1gw, we refer toa random projection s of the vector s as a random projec-tion of the set S.

Consider two sets S1; S2 � ½0;wÞ. We can showthat j S1 � S2 j¼ ks1 � s2k2 and j S1 \ S2 j¼< s1; s2 >¼ðks1k2 þ ks2k2 � ks1 � s2k2Þ=2, where S1 � S2 ¼ ðS1 [ S2Þ�ðS1 \ S2Þ. Furthermore,

rðS1; S2Þ ¼jS1 \ S2jjS1 [ S2j

¼ jS1 \ S2jjS1 � S2j þ jS1 \ S2j

¼ ks1k2 þ ks2k2 � ks1 � s2k2

ks1k2 þ ks2k2 þ ks1 � s2k2: ð11Þ

using the random projections s1 and s2 to estimateks1 � s2k2, our estimate of rðS1; S2Þ is

rðS1; S2Þ ¼jS1j þ jS2j � jjs1 � s2k2

jS1j þ jS2j þ ks1 � s2k2: ð12Þ

335

336

337

338

339

340

341

342

2.2.3. Mis-identification errors

Using rðSi; SjÞ instead of rðSi; SjÞ, introduces errors inidentifying measurement co-occurrence with threshold s.Such errors happen when rðSi; SjÞ < s while rðSi; SjÞP s(false positive errors) and when rðSi; SjÞP s whilerðSi; SjÞ < s (false negative errors). The number of

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

ED

PR

OO

F

such errors depends on k, the number of hash functionsused in the positional min-wise hashing or the number ofdimensions used for the random projections, the thresholds, and the distribution of the values rðSi; SjÞ over all thesets Si; Sj.

Theorem 2 provides an upper bound on the probabilityof such mis-identification errors when using random pro-jections (similar estimates can be obtained using Theorem1 and the proof of Theorem 2).

Theorem 2. Consider a family of m sets S1; S2; . . . ; Sm �½0;wÞ, and a threshold 0 6 s 6 1 for identifying co-occur-

rence among any pair of them. Let 0 < d < 1 and b P 0. The

probability of an error in identifying co-occurrence between

any pair of sets Si; Sj when using rðSi; SjÞ, with random

projections onto k vectors, instead of rðSi; SjÞ is at most m�b

plus the probability that rðSi; SjÞ 2 ½ð1� dÞs; ð1þ dÞs�,where k P 4þ2b

�2=2��3=3log m, � 6 minf f�1 � 1; 1� f g, and

f ¼ 1�s1þs �

1þð1�dÞs1�ð1�dÞs.

Proof. The proof of this theorem uses Lemmas 2 and 3given in Appendix C. Using a ¼j Si j þ j Sj j andb ¼ ksi � sjk2 in Lemma 3, we get a band (range) of resem-blance values I ¼ ½ð1� dÞs; ð1þ dÞs� together with anupper bound �0 ¼ minf f�1 � 1; 1� fg on �, such that,rðSi; SjÞ 62 I if and only if rðSi; SjÞ 62 I , provided thatksi � sjk2 is within 1� � of ksi � sjk2. The latter happenswith probability 1� m�b for k P 4þ2b

�2=2��3=3log m, as given

by Lemma 2. Thus, with probability 1� mb there are noerrors in identifying co-occurrence when the true resem-blance is outside the band I. Therefore, the probability ofan error in identifying co-occurrence when using rðSi; SjÞinstead of rðSi; SjÞ is at most m�b plus the probability thatrðSi; SjÞ 2 ½ð1� dÞs; ð1þ dÞs�. h

For example, for s ¼ 0:95, d ¼ 10�2, b ¼ 1, and uniformdistribution of true resemblance over ½0; 1�, the probabilityof co-occurrence mis-identification errors for the randomprojections approach is 6 0:03 provided thatk P 502 log m. In our experimental results, we find thatmuch smaller values of k are sufficient for small errorj r � r j (note that here m 6 2w). Furthermore, we experi-mentally find that the resemblance estimation error oftwo sets by using the random projection approach is 50% smaller than that obtained with the positionalmin-wise hashing approach.

2.2.4. Element signatures

We define the (positional) min-wise signature of an ele-ment e within window W to be the (positional) min-wisehash of its occurrence set vW ðeÞ. Similarly, the random pro-

jection signature of e is the random projection of vW ðeÞ. Forbrevity, whenever it is clear from the context, we simplytalk about the signature of an element e, and we denoteit with re. The size of re is equal to k, the number of hashfunctions or projections used to compute it, while the timeto compute it is OðkwÞ.

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 5: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

T

343

344

345

346

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

393393

394

395

396

397

398

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

420

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

440

441

442

443

444

445

446

447

K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx 5

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

UN

CO

RR

EC

3. Collaborative data gathering protocol exploiting

measurements co-occurrence

We present a protocol that the sensors and the basestation in a wireless sensor network can use to reduce thecommunication costs of data gathering by exploitingco-occurrences of measurements. The protocol allows sen-sors to discover co-occurring elements and to collaborateby sharing the load of communicating such co-occurringelements, and it allows the base station to make inferencesabout the sensor measurements. Here, we assume that theco-occurrences between elements persist for some periodof time, larger than the window size w.

Sensors identify pairs of co-occurring elements e; e0 andnotify the base station that e; e0 are co-occurring. The basestation maintains the co-occurrence (symmetric) relationC : U U ! f0; 1g, such that C½e1; e2� ¼ 1 iff it has beennotified that e1 and e2 co-occur, where U ¼ [n

i¼1U i is theuniverse of all the sensor elements. The binary relation C

at the base station is represented efficiently using standarddata structures for sparse undirected graphs. Further, asensor i may choose, at any time, a default elementmdefaultðiÞ 2 Ui [ fnullg among its non-co-occurring ele-ments, and notify the base station of its choice. A sensori does not communicate mdefaultðiÞ to the base station eachtime it measures mdefaultðiÞ. The base station maintains theset of mdefaultðiÞ it has been notified of.

At the end of each time (discrete period) t, the base sta-tion makes an inference (estimate) mi;t of the value mi;t sen-sor i measures at t. For each sensor i and time t, we definethe candidate measurements V i;t to be a list of those ele-ments e ¼ ði; vÞ 2 Ui that co-occur with an elemente0 2 U � U i communicated to the base station at time t.By default, V i;t is considered as a FIFO list (i.e. the ele-ments e are ordered according to the order of arrival oftheir co-occurring elements e0 at the base station). Wedefine the extended candidate measurements bV i;t to beequal to V i;t if V i;t 6¼ ;, equal to ðmdefaultðiÞÞ if V i;t ¼ ; andmdefaultðiÞ 6¼ null, and otherwise to be equal to the list of ele-ments e 2 U i that co-occur with an element e0 2 U � Ui (inany order). Observe that ; � bV i;t � Ui. The base stationmakes an inference error if mi;t 6¼ mi;t.

The choice of the element in bV i;t used to compute mi;t

affects the magnitude j mi;t � mi;tj as well as the likelihoodof an inference error. For simplicity we choose the first ele-ment in bV i;t. Alternate choices of interest would be (a) thevalue of the element with highest estimated resemblance inV i;t,

3 (b) the value of the most frequent element in bV i;t, (c)the median value of the elements in bV i;t, or (d) the fre-quency-weighted average of the values in bV i;t, i.e.

arc minv2Ui

Xe2bV i;t

fejv� e:vj20B@

1CA; ð13Þ

448

449

450

3 The base station estimates co-occurrence of elements using its inferredmeasurements.

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

ED

PR

OO

F

where fe is the frequency of element e among i’s measure-ments. Choice (a) may be attractive when attempting to re-duce the likelihood of making an inference error, while theother choices may be attractive when attempting to reducethe magnitude of the inference errors.

The choice of mdefaultðiÞ also affects both the magnitudeand likelihood of inference errors. The default elementmdefaultðiÞ chosen by each sensor i is one of its most fre-quently occurring elements that does not co-occur with ele-ments of other sensors. Our choice of mdefaultðiÞ attempts tobe aggressive on reducing the number of measurementscommunicated to the base station. Other choices of interestwould be the frequency-weighted average or median valueof the elements that do not co-occur with elements fromother sensors if the magnitude of inference errors is of pri-mary interest. Furthermore, if sensor i has an element e

with high frequency but short U½e�:list, then it shouldchoose e as its default mdefaultðiÞ.

Sensor i maintains for each co-occurring element e adata structure U½e� that consists of: a list U½e�:list of ele-ments that have been identified as co-occurring with e (bysensor i or any other sensor), sorted in increasing orderof their sid’s; a list U½e�:children of elements that have beenidentified as co-occurring with e by sensor i itself; an attri-bute U½e�:state indicating the status of U½e�. AttributeU½e�:state takes values (a) normal if U½e� is up-to-date, (b)waiting if sensor i initiated an update and is waiting foracknowledgement messages, (c) init if sensor i had beenthe initiator of an update in the current window, (d)updating if sensor i received an update message UpdateMsgin the current window. For an element e that is not co-occurring with any other element, we assume U½e� ¼ null,and the sensor does not store U½e�.

Furthermore, each sensor i maintains a set Ri � U i ofelements that should always be communicated to the basestation. The base station may ask sensor i to append an ele-ment e to Ri, e.g. if inference errors for such elements areunacceptable to the application.

At each time t, sensor i communicates to the base stationits measuring element e ¼ ði;mi;tÞ, if e 6¼ mdefaultðiÞ or e 2 Ri

or e does not co-occur with any other elements. If e co-occurs with other elements, sensor i may not need to com-municate e to the base station, since the responsibility tocommunicate the co-occurring elements to the base stationis shared among all the sensors in U½e�:list. The current win-dow is partitioned into j U½e�:list j sub-windows, calledduty-zones, with each sensor taking charge of one duty-zone. Sensor i will communicate e to the base station iff e

occurs during a duty-zone for which sensor i is on duty.See Fig. 2 for further details.

We choose to split each window into equi-length duty-zones and let each sensor in the U½e�:list take charge of asingle duty-zone. This makes the scheduling simple anddistributive, and enables sensors to quickly join or leaveU½e�:list. Different ways to split a window into duty-zonesare possible. For example, in the equi-depth approach,the window is split into duty-zones so that each one has

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 6: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

TED

PR

OO

F451

452

453

454

455

456

457

458

459

460

461

462

463

464

465

466

467

468

469

470

471

472

473

474

475

476

477

478

479

480

481

Fig. 2. The algorithm used by sensors to schedule transmissions of measurements to the base station.

Fig. 3. The algorithm used by sensors to discover element co-occurences.

6 K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

UN

CO

RR

EC

approximately the same number of occurrences of theco-occurring elements. The equi-depth approach tries todistribute the burden of communicating the co-occurringelements equally among the sensors in U½e�:list. Such anapproach may lead to longer network lifetimes, providedthe overhead in computing equi-depth duty zones issmall. Also, sensors with more residual energy in U½e�:listmay take charge of multiple duty-zones. We defer consid-eration and comparison of such alternatives to futurework.

Sensor i may initiate the discovery of co-occurring ele-ments at any time, using the connected-components orthe clique approach. We present the discovery algorithmwith the connected-components approach in Fig. 3. Sensori maintains a set TSSi with the signatures of its elements,with respect to the previous window. The set TSSi containsonly those elements in Ui that occurred in the previous win-dow at sensor i. Sensor i updates the set TSSi of element sig-natures at the end of the current window. Sensor i requeststhe set TSSj of signatures of elements from sensors j 2 Adji,and if it finds among them an element e0 that co-occurswith e then it (i) adds e0 to U½e�:list and U½e�:children, and(ii) updates the base station and all the sensors with an ele-ment in U½e�:list. Whenever a sensor receives such anupdate, it further updates all its children not alreadyupdated. See Fig. 3 for further details. Note that only ele-ments e; e0 with e:sid 6¼ e0:sid may co-occur for any thresh-old s > 0. Further, since in practice s > 1=2, an element ofsensor i can co-occur with at most one element from

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

another sensor j, hence the break statement at line 10 inDiscoverCoOccurrences routine.

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 7: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

T

482

483

484

485

486

487

488

489

490

491

492

493

494

495

496

497

498

499

500

501

502

503

504

505

506

507

508

509

510

511

512

513

514

515

516

517

518

519

520

521

522

523

524

525

526

527

528

529

530

532532

533

534

535

536

K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx 7

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

Sensor i may decide to remove any of its co-occurringelements e from the co-occurrence relation at any time.In such a case, sensor i removes e from U½e�:list, choosesa sensor j in U½e�:list to act as a removal coordinator forupdating the remaining sensors with elements in U½e�:list.The removal coordinator sensor j ‘‘adopts” e’s childrenU½e�:children, and it tells all sensors with an element inU½e�:list to remove e from their co-occurrence lists. SeeFig. 4 for further details. Note that when sensor i wasasked by the base station to append e to Ri, the basestation may or may not ask i to remove e from co-occur-rence relationship. It is advantageous for the othersensors with elements in U½e�:list if the base stationchooses not to ask i to remove e from the co-occurrencerelation.

The base station may compute co-occurrence of ele-ments using the inferred measurements mi;t in a window,and then use this information to provide hints to the sen-sors to initiate either the discovery or removal of co-occurring elements. Such discovery or removal may betargeted since the base station could hint sensors to verifyco-occurrence of specific pairs of elements. This will beuseful, for example, when the communication costs ofthe discovery or removal become prohibitive (e.g. sensorswith large number of neighbors). Moreover, in theextreme, we can have the base station compute all theco-occurrence relationships, together with choosing adefault value and transmission schedule for each sensorto minimize the likelihood and/or magnitude of inferenceerrors.

UN

CO

RR

EC

Fig. 4. Algorithm used by sensors to remove an

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

ED

PR

OO

F

3.1. Analysis of the costs of the protocol

We analyze the worst-case running-time, memory, andcommunication costs of our protocol for collaborative datagathering.

Consider the BaseStationEstimator routine. SincebV i;t � U i, it follows that the worst-case running-time foreach time period t is

Pni¼1OðUiÞ ¼ OðUÞ. Note that, for

the case where we use just the first element in V i;t to esti-mate mi;t, the worst-case running-time is reduced to OðnÞby skipping the computation of the complete set bV i;t. Thememory required at the base station to store the co-occur-rence relation C is Oðnþ mÞ, where m ¼ OðU 2Þ is the num-ber of pairs of co-occurring elements.

Let M ¼ maxe2Ufj U½e�:list jg, d ¼ maxni¼1fj Adji jg,

c ¼ maxni¼1fminfw;Uigg, and u ¼ maxn

i¼1fU ig.Observe that, for each window,

j TSSi j6 minfw; j Ui jg 6 c.Consider the SensorMeasurementLoop routine executed

at sensor i. For each window, its worst-case running-time isXðe;reÞ2TSSi

w � Oðminfw;U½e�:listgÞ þ OðTSSi � k � wÞ

¼ Oðminfw;U ig � ðw �minfw;Mg þ k � wÞÞ¼ Oððw �minfw;Mg þ k � wÞ � uÞ; ð14Þ

while the worst-case total memory required to maintainU½e�, for all e 2 U i, is OðUiMÞ ¼ OðM � uÞ. The memoryrequired for TSSi is Oððk þ wÞ � TSSiÞ ¼ Oððk þ wÞ�minfw;UigÞ ¼ Oððk þ wÞ � uÞ.

element from its co-occurence relationships.

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 8: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

537

538

540540

541

542

543

544

545

546

547

548

549

550

551

552

553

554

555

556

557

558

559

560

561

562

563

564

565

566

567

568

569

570

571

572

573

574

575

576

577

578

579

580

581

582

583

584

585

586

587

588

589

590

591

8 K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

Consider now the DiscoverCoOccurrences routine atsensor i. Its worst-case running-time isXj2Adji

Oðk � TSSj � TSSiÞ þX

ðe;reÞ2TSSi

OðU½e�:listÞ

¼ Oðd � k �minfw;Uigminfw;Ujg þminfw;U ig �MÞ¼ Oðd � k � u2 þM � uÞ; ð15Þ

while sending a total of at most minfw;U ign ¼ OðunÞUpdateMsgs each of size OðMÞ.

Finally, consider the cost of the Remove procedure foran element e. This routine sends at most n messages alto-gether, each of size OðU þMÞ.

592

593

594

595

596

597

598

4. Experimental evaluation

We discuss the results of our experiments on evaluatingthe effectiveness of our in-network data co-occurrencedetection methods, and the energy efficiency of data gath-ering protocol.

T599

600

601

602

603

604

605

606

607

608

609

610

611

612

613

614

615

616

617

618

619

620

621

622

623

624

625

626

627

628

629

630

UN

CO

RR

EC

4.1. Data sets and performance metrics

We use synthetic datasets, as well as real sensor mea-surements downloaded from the ‘‘James Reserve DataManagement System” [1]. For the real datasets, we down-load from [1] the temperature and humidity measurementstaken by 12 sensors deployed in James Reserve, Californiaduring a two day span (August 9 and 10, 2005). In our sim-ulation, we round the original measurements x to roundðxÞ.

We generate synthetic datasets using three parameters:the window size w, the element frequency f in the window,and the true resemblance r between pairs of occurrencesets. The occurrence set of an element in a window is gen-erated using a uniform distribution (i.e. select f � w num-bers in ½0;wÞ with uniform distribution).

For evaluating our co-occurrence detection methods, weuse two primary metrics: (1) the average resemblance esti-mation error j rðS1; S2Þ � rðS1; S2Þ j, and (2) the size k ofthe signatures re used by the resemblance estimation meth-ods. For evaluating our data gathering protocol, we use (1)the rate at which the base station makes inference errors,calculated as the ratio of the number of inference errorsover the total number of measurements made by all thesensors, and (2) the relative reductionj Mdg�r �Mdg j = j Mdg j of the communication costs fordata gathering, where Mdg�r and Mdg are the total numberof measurements communicated to the base station by allthe sensors, with and without our proposed collaborativedata gathering method, respectively.4

The communication overhead of the proposed scheme isdue to the discovery and removal of co-occurring elements

631

632

633

634

635

4 Alternate communication cost models are possible, e.g. distance ofsensors from base station, etc. Though such models may give even bettersavings of the communication costs, the simple unit cost model is sufficientto demonstrate the benefits of our approach.

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

ED

PR

OO

F

in our protocol. These overheads are proportional to thesize of TSSi and the number of sensors in each sensor’sneighborhood Adji, while the size of TSSi is proportionalto the size of the element signatures re and the numberof elements in TSSi. The communication overhead is typi-cally no more than the cost of communicating all the mea-surements to the base station during a single window. Aslong as co-occurrences persist for a few windows, the over-head is small compared to the savings in the measurementcommunication costs.

4.2. Experimental results – synthetic datasets

To evaluate and compare the performance of our twoin-network data co-occurrence detection methods, we gen-erated 100 pairs of occurrence sets, for window sizes w

ranging from 256 to 2048. In this experiment, the trueresemblance r between pairs of occurrence sets is 0:95,while the element frequency f is 30%. Fig. 5 shows theresemblance estimation performance of the positionalmin-wise and random projection methods for different win-dow and signature sizes, while Fig. 6 shows their perfor-mance for signature size k ¼ lg w (i.e. using k randomvectors or min-wise hash functions). As expected, largervalues of k result in better resemblance estimation. It canbe seen that a signature size of k ¼ lg w works well for boththe positional min-wise and random projections methods.Furthermore, we see that the random projection methodgives more accurate resemblance estimates compared tothe positional min-wise method. Based on these results,in the remaining experiments, we use the random projec-tion method with signature size k ¼ lg w for resemblanceestimation.

Next, we examine the behavior of the resemblance estima-tion for different sizes of occurrence sets (i.e. elements withdifferent frequencies of occurrence), as well as occurrencesets with different true resemblances. The results of theseexperiments are given in Fig. 7. We see that the randomprojection signatures provide good resemblance estimationas the element frequencies f change, for occurrence sets withtrue resemblance 0:95. We also see that the estimatedresemblance converges to the true resemblance as the trueresemblance of occurrence sets increases, for elementfrequency f fixed at 30%. These results are useful for thefollowing two important reasons. Since co-occurrence canhappen for elements of different frequencies, it is criticalfor the resemblance estimation to be rather insensitive toelement frequencies. Further, having the resemblance esti-mation become more accurate for larger values of trueresemblance, allows us to use the resemblance threshold sas a lever for controlling the number of estimation errorsat the base station, and to better exploit the tradeoff betweennumber of errors and communication costs.

Next, we consider the connected-components and theclique approaches for identifying set with n P 2 co-occur-ing elements. These two approaches affect both the basestation inference error rate as well as the communication

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 9: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

UN

CO

RR

EC

T

RO

OF

636

637

638

639

640

641

642

643

644

645

646

647

648

649

650

651

652

256 512 768 1024 1280 1536 1792 20480

0.005

0.01

0.015

0.02

0.025

0.03

0.035

0.04

0.045

0.05Insensitivity to frequency of cooccurring value (f), k = log(w)

Window size (w)

Avg

diff

eren

ce (

erro

r) b

etw

een

estim

ated

and

true

res

embl

ance

f = 20%f = 30%f = 40%

a

Fig. 7. Magnitude of the resemblance estimation error using random projectioresemblance, and (b) varying true resemblance and fixed element frequency.

256 512 768 1024 1280 1536 1792 20480.01

0.02

0.03

0.04

0.05

0.06

0.07Performance comparison, k = log(w)

Window size (w)

Avg

diff

eren

ce (

erro

r) b

etw

een

estim

ated

and

true

res

embl

ance

random projectionpositional minwise

Fig. 6. Magnitude of the resemblance estimation error using positionalmin-wise and random projection signatures of size lg w.

256 512 768 1024 1280 1536 1792 20480.04

0.045

0.05

0.055

0.06

0.065

0.07

0.075

0.08Effectiveness of positional minwise

Window size (w)

Avg

diff

eren

ce (

erro

r) b

etw

een

estim

ated

and

true

res

embl

ance

k = log(w)k = 5k = 15

256 512 768 1024 1280 1536 1792 20480.01

0.015

0.02

0.025

0.03Effectiveness of random projection

Window size (w)

Avg

diff

eren

ce (

erro

r) b

etw

een

estim

ated

and

true

res

embl

ance

k = log(w)k = 5k = 15

a b

Fig. 5. Magnitude of the resemblance estimation error with varying signature size k, using (a) positional min-wise signatures, and (b) random projectionsignatures.

K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx 9

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

ED

Pcosts of data gathering. For these experiments, we considersets of n ¼ 2; 3; . . . ; 10 elements, one element per sensor,with varying frequency f, window size w ¼ 1024, trueresemblance between pairs of element occurrence sets0.95, signature size k ¼ lg w, and frequency of the defaultelement chosen by each sensor equal to 30%. We applyboth approaches for 100 consecutive windows. The resultsof these experiments are given in Figs. 8 and 9.

Fig. 8 gives the base station inference error rate, whileFig. 9 shows the relative reduction of communication costs.We can clearly see that the inference error rate is low, andthat the reduction of communication costs is substantialand increases as n increases. Both achieve comparable com-munication cost savings when the same number of elementsare identified as co-occurring. As expected, the inferenceerror rate with the clique approach is lower and increasesslower with n as compared with the connected-components

256 512 768 1024 1280 1536 1792 20480

0.01

0.02

0.03

0.04

0.05

0.06Convergence to true resemblance (r), k = log(w)

Window size (w)

Avg

diff

eren

ce (

erro

r) b

etw

een

estim

ated

and

true

res

embl

ance

r = 0.85r = 0.90r = 0.95r = 0.99

b

n signatures of size lg w for (a) varying element frequencies and fixed true

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 10: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

RR

EC

TED

PR

OO

F

653

654

655

656

657

658

659

660

661

662

663

664

665

666

667

668

669

670

671

672

673

674

2 3 4 5 6 7 8 9 100

0.01

0.02

0.03

0.04

0.05

0.06Inference error rate – connected component

Number of co–occurring sensors (n)

Rat

e of

infe

renc

e er

ror

at b

ase

stat

ion

f = 10%f = 30%f = 50%

frequency of default value = 30%

2 3 4 5 6 7 8 9 100

0.002

0.004

0.006

0.008

0.01

0.012

0.014

0.016

0.018Inference error rate – clique

Number of co–occurring sensors (n)

Rat

e of

infe

renc

e er

ror

at b

ase

stat

ion

f = 10%f = 30%f = 50%

frequency of default value = 30%

a b

Fig. 8. Base station measurement inference error rate using (a) the connected-components approach and (b) the clique approach for identifying groups ofco-occurring elements.

2 3 4 5 6 7 8 9 100.3

0.35

0.4

0.45

0.5

0.55

0.6

0.65

0.7

Communication reduction rate connected component

Number of cooccurring sensors (n)

Rat

e of

dat

a co

mm

unic

atio

n re

duct

ion

f = 10%f = 30%f = 50%

frequency of default value = 30%

2 3 4 5 6 7 8 9 100.3

0.35

0.4

0.45

0.5

0.55

0.6

0.65

0.7

Communication reduction rate clique

Number of cooccurring sensors (n)

Rat

e of

dat

a co

mm

unic

atio

n re

duct

ion

f = 10%f = 30%f = 50%

frequency of default value = 30%

a b

Fig. 9. Relative reduction of communication costs for collaborative data gathering when using (a) the connected-components approach, and (b) the cliqueapproach for identifying sets of co-occuring elements.

10 K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

UN

COapproach. However, this advantage of the clique approach

comes with higher communication and computation over-heads, since the signatures of every element in U½e�:listneeds to be examined before an element e0 can joinU½e�:list. Moreover, the clique approach may result in smal-ler U½e�:list, leading into smaller reduction of communica-tion costs. Consequently, the connected-componentsapproach should be preferred for most applications.

675

676

677

678

5 Data for only these two days were available. The dataset had somemissing measurements. Each missing measurement was replaced with aunique new value.

4.3. Experimental results – real dataset

To evaluate how our method might perform in real sen-sor networks, we download the temperature and humiditymeasurements taken, every 5 min, by 12 sensors deployedin James Reserve, California during a two days span(August 9 and 10, 2005) and rounded each measurement

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

x to roundðxÞ.5 We use window size w ¼ 512, random pro-jection signatures of size lg w with the connected-compo-nents approach for identifying sets of co-occurringelements, and resemblance threshold s ¼ 0:90. We usedthe measurements in the first window for co-occurrencedetection and found six sets of co-occurring elementsamong the temperature measurements: one with 6 ele-ments, one with 3 elements, and four with 2 elements. Eachsensor selects the most frequent temperature measurement(element) as its default element, among measurements(elements) that do not co-occur with measurements ofother sensors. Following our method, during the first

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 11: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

T

679

680

681

682

683

684

685

686

687

688

689

690

691

692

693

694

695

696

697

698

699

700

701

702

703

704

705

706

707

708

709

710

711

712

713

714

715

716

717

718

719

720

721

722

723

724

725

726

727

728

729

730

731

732

733

734

735

736

737

738

739

740

741

742

743

744

745

746

747

748

749

750

751

752

753

754

755

756

757

758

759

760

761

762

763

764

765

766

767

768

769

770

771

772

773

774

775

776

777

778

779

780

781

782

783

784

785

786

K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx 11

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

UN

CO

RR

EC

window, the sensors communicated 4481 measurementsout of 6144ð12 512Þ measurements taken (a savings of1663 measurements), while the number of measurementinference errors at the base station was 94. In other words,our scheme achieved a 27.1% reduction of the communica-tion cost for data gathering with an error rate of 1.53%.

Though we are primarily interested in the number ofinference errors rather than their magnitude, we note thatfor the real dataset, the p-norms of the all the sensor mea-surements kðmi;t � mi;tÞi;tkp and kðmi;tÞi;tkp are 58.20 and1292.02 for p ¼ 2, are 493 and 84562 for p ¼ 1, and are10 and 29 for p ¼ 1, respectively; the average and maxi-mum of the relative error j mi;t � mi;t j =mi;t over all i; t is0.0068 and 0.7143. The magnitude of the inference errorsmade for the real data set is small.

5. Related work

Related work falls into two areas: set resemblance esti-mation and collaborative data gathering in wireless sensornetworks.

5.1. Set resemblance estimation

Broder [4,5] utilizes min-wise independent hash func-tions for identifying near-duplicate documents on the webby estimating their resemblance using a fixed size signaturefor each document. Datar et al. [9] present min-wise basedalgorithms for estimating rarity and similarity on win-dowed data streams, accurate up to factor 1� e using spacelogarithmic in the window size. We also utilize a min-wisehashing as one of the methods for estimating resemblanceof sets. However, to meet the computation constraintsimposed by the sensors, we extend min-wise hashing topositional min-wise hashing to substantially reduce therequired number of hash functions for computingsignatures.

Random projections is a powerful dimensionality reduc-tion technique with many applications, since it approxi-mately preserves vector norms under some conditions.Cole et al. [7] utilize random projection on sketching thewindowed time series data to discover Pearson correlation,for cases when orthogonal transformations such as DFT,DWT, or SVD can not be used because the data sets donot have any clear principal components. Similarly, Indyket al. [15] use random projection on sketch computation foridentifying representative trends in time series data. Forstream data management, Thaper et al. [17] use randomprojection on constructing dynamic multidimensional his-tograms that succinctly approximate the data distributionof the underlying continue stream. We utilize random pro-jection for estimating the resemblance of two remote sets.

Agarwal and Trachtenberg [3] propose protocols forestimating the number of differences between sets held onremote hosts, using counting Bloom filters [11]. Given thesize of two sets from the same domain, the number of thedifferences between them can be calculated using their

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

ED

PR

OO

F

resemblance (see Section 2.2.2). Hence, our position min-wise hashing and random projection signatures are simpleand effective methods for estimating the difference betweenremote sets from the same domain, at a cost which is log-arithmic in the size of the domain.

5.2. Collaborative data gathering

Exploiting data correlations for data gathering in wire-less sensor networks has been recently addressed by Criste-scu et al. [8], Chou et al. [6], Rickenbach et al. [18], Sharafet al. [16], Yoon and Shahabi [19], and Gupta et al. [13].Cristescu et al. [8] consider the problem of finding the opti-mal transmission structure and the rate-distortion alloca-tions at the various spatially distributed nodes, in orderto minimize the total power consumption of the network.Chou et al. [6] and Rickenbach et al. [18] exploit correla-tions for coding the sensor measurements in order toreduce the total number of bits transmitted during datagathering. In Chou et al. [6], the data gathering node tracksthe correlation structure among the sensor nodes, and usesthis information to inform the sensors of the number of bitsthey should use for encoding their measurements. A fixedcorrelation structure is assumed, and all sensors areengaged in all of the data transmissions. In particular, Ric-kenbach et al. [18] consider foreign-coding and self-codingschemes and present algorithms for constructing optimaland near-optimal data gathering trees for foreign-codingand self-coding, respectively.

Gupta et al. [13] propose algorithms to select a subset ofsensors, called connected correlation-dominating set, thatform a connected communication graph and whose datamay be sufficient to reconstruct data for the entire sensornetwork at the base station. During data gathering onlythose selected sensors will be involved in communicationof measurements to the base station. They assume that sen-sors know the correlation structure, and their focus is oncomputing the correlation-dominating set. We present ascheme for sensors to detect, in-network, and then utilizemeasurement co-occurrence, which is different from corre-lation, for reducing the communication costs of datagathering.

Sharaf et al. [16] present the TiNA mechanism thatreduces data transmissions and provides approximateresults to aggregation queries by utilizing data temporalcoherency. Sensors will send a reading upwards on anaggregation tree only if their reading differs from the lastrecorded reading by more than a given tolerance. Yoonand Shahabi [19] present CAG, a similar mechanism toTiNA, that utilizes spatial correlation of sensor data. Whengenerating an aggregation tree, CAG forms clusters ofnodes sensing values within a user-provided error toler-ance. Subsequently only one value per cluster is transmit-ted upwards on the aggregation tree. Both TiNA andCAG exploit data correlation in the context of in-networkaggregation, while our work utilizes data co-occurrence ongathering every measurement from all the sensors.

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 12: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

787

788

789

790

791

792

793

794

795

796

797

798

799

800

801

802

803

804

805

806

807

808

809

810

811

812

813

814

815

816

817

818

819

820

821

822

823

824

825

826

827

828

829

830

831

832

833

834

835

836

837

838

840840

841

843843

844

846846

847

849849

850

852852

12 K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

Moreover, while these works above that utilize data cor-relation need numerical data, and it is unclear how theyshould handle enumerated (non-numerical) data, ourapproach works for both discrete numerical and non-numerical data.

Statistical models have been used for data acquisition in[12,10]. Goel et al. [12] present PERMON, a system formotion detection using the spatio-temporal correlation insensor readings to reduce data transmissions. In PER-MON, the base station generates a prediction model foreach sensor based on sensor readings, and it sends thesemodels back to the sensors. After receiving a predictionmodel, sensors will send a new reading only when it differsfrom the one in the motion prediction model. Deshpandeet al. [10] incorporate parametric statistical models of thereal-world into their sensornet query processing architec-ture. Time-varying multivariate Gaussian models are used,and sensors will be used to acquire and transmit data onlywhen those models are insufficient to answer queries withacceptable accuracy. In a sense, the notion of measurementco-occurrence we utilize is a time-varying non-parametricstatistical model of the sensor measurement field, whichdoes not require normality as [10] does.

T

853854

855

856

857

858

859

860

861

862

863

864

865

866

867

868

869

870

871

NC

OR

REC

6. Conclusion

We describe a novel approach for the problem of gath-ering at a base station all the measurements of the sensorsin wireless sensor networks. Our approach exploits co-occurrence of sensor measurements, in order for sensorsto share the cost of communicating co-occurring measure-ments to the base station. The base station makes infer-ences, sometimes erroneous, about the true sensormeasurements based on the information it receives. Wepresent two energy efficient methods enabling the sensorsto estimate the resemblance of their measurement occur-rence sets, one using (positional) min-wise hashing andone using random projections. We also present a simpleand effective protocol for sensors to collaborate in trans-mitting measurements to the base station.

We experimentally evaluate the proposed approach, andfind that it offers substantial savings in the communicationcosts for few number of inference errors at the base station.For synthetic datasets it provides up to 65% savings on thecommunication costs and <6% inference errors, and for a realdataset it provides 27% savings and 1.53% inference errors.

872

873

874

875

876

877

878

879

880

881

882

UAppendix A

Lemma 1. For any two sets S1; S2 with resemblance

0 6 p 6 1,

minfj S1 j; j S2 jg=maxfj S1 j; j S2 jgP p=ð1þ pÞ. Further,

if S1 6¼ ; then j S1 \ S2 j = j S1 jP pð1þ 2pÞ=ð1þ pÞ2.

Proof. Assume, w.l.o.g., that S1 is not empty. Bydefinition,

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

DPR

OO

F

p ¼ rðS1; S2Þ ¼jS1 \ S2jjS1 [ S2j

: ð16Þ

Since j S1 [ S2 j¼j S1 j þ j S2j� j S1 \ S2 j, we have that

jS1 \ S2jjS1j þ jS2j

¼ p1þ p

: ð17Þ

Furthermore, since

minfjS1j; jS2jgP jS1 \ S2j ¼p

1þ pðjS1j þ jS2jÞ

Pp

1þ pmaxfjS1j; jS2jg; ð18Þ

it follows that

1 PminfjS1j; jS2jgmaxfjS1j; jS2jg

Pp

1þ p: ð19Þ

In addition, if S1 6¼ ; then

jS1j þ jS2jjS1j

¼ 1þ jS2jjS1j

P 1þ minfjS1j; jS2jgmaxfjS1j; jS2jg

¼ 1þ p1þ p

¼ 1þ 2p1þ p

; ð20Þ

and the lemma follows. h

EAppendix B

We construct sequences with co-occurring values of highfrequency, and correlation coefficients that can be any-where in the range ð�1; 1Þ, thus demonstrating that the cor-relation coefficient is not an indicator of co-occurrence. LetxðIÞ be the set of elements of a vector x with indices in anindex set I, and let xðIÞ ¼ c indicate the fact that all ele-ments xðIÞ are equal to c. For a given frequency f, we gen-erate a set I of n � f uniformly distributed random integersin ½1; n�. Let J ¼ ½1; n� � I . We create the following six n-dimensional vectors:

� x1 with x1ðIÞ ¼ 1 and x1ðJÞ ¼ 0.� x2 with x2ðIÞ ¼ 3 and x2ðJÞ ¼ 0.� y1 with y1ðIÞ ¼ 0 and y1ðJÞ be random real number uni-

formly distributed over ½0; 5�.� y2 with y2ðIÞ ¼ 0 and y2ðJÞ be random real number uni-

formly distributed over ½�5; 0�.� z1 ¼ x1 þ y1, and� z2 ¼ x2 þ y2.

Observe that 1 and 3 co-occur between x1 and x2, as do 1and 0 between x1 and y1, etc. We then normalize each oneof these six sequences to have mean 0 and variance 1. Everypair of the normalized sequences still has a pair of (discret-ized) values that co-occur (at a level 1:0 with high prob-ability). The correlation coefficients between a sample ofthe sequences x1; x2; y1; y2; z1, and z2 for n ¼ 1000 andf ¼ 0:95 are

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 13: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

883

884

885

886

887

888

889

890

891

892

894894

895

896

897

898

899

900

901

902

903

904

905

906

908908

909

910

912912

913

914

916916

917

918

919

921921

922

x1 x2 y1 y2 z1 z2

x1 1:0000 1:0000 �0:8043 0:8034 �0:6298 0:9459

x2 1:0000 1:0000 �0:8043 0:8034 �0:6298 0:9459

y1 �0:8043 �0:8043 1:0000 �0:6265 0:9681 �0:7500

y2 0:8034 0:8034 �0:6265 1:0000 �0:4803 0:9532

z1 �0:6298 �0:6298 0:9681 �0:4803 1:0000 �0:5817

z2 0:9459 0:9459 �0:7500 0:9532 �0:5817 1:0000

0BBBBBBBBBBB@

1CCCCCCCCCCCA: ð21Þ

K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx 13

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

Here each pair of these sequences has a pair of co-occur-ring values at the level of 1.0. The correlation coefficientbetween pairs of distinct sequences does not indicatewhether any values co-occur.

T924924

925

927927

928

929

931931

932

933

934

936936

937

939939

940

942942

943

944

945946947948949950951952953954

UN

CO

RR

EC

Appendix C

Lemma 2 (Achlioptas [2]). For every set S ¼ fs1; s2; . . . ;sng � Rd , and every � > 0, the projection fs1; s2; . . . ; sng onto

a set of k vectors fz1; z2; . . . ; zkg � Rd , each of whose entrieszi;j are i.i.d. random variables, is such that for all 1 6 i; j 6 n,

ð1� �Þksi � sjk 6 ksi � sjk 6 ð1þ �Þksi � sjk; ð22Þ

with probability at least 1� nb, provided that

k P 4þ2b�2=2��3=3

log n. Each zi;j is an i.i.d. random variable that

takes the valuesffiffiffiffiffiffiffiffi3=k

p, �

ffiffiffiffiffiffiffiffi3=k

p, and 0 with probability 1/6,

1/6, and 2/3, respectively.

Similar results to Lemma 2 are known when the entriesof the projection vectors are i.i.d. normal random variablesNð0; 1Þ, scaled by 1=

ffiffiffikp

, where k ¼ Xð��2 log nÞ.

Lemma 3. Consider the function f ðxÞ ¼ ða� bxÞ=ðaþ bxÞfor x P 0, where a > 0, b P 0. Function f is non-increasing

in x, and f ð1þ �Þ 6 f ðxÞ 6 f ð1� �Þ for 1� � 6 x 6 1þ �,where 0 < � < 1. Moreover, for all 0 < d < 1 and

0 < k1 < 1,

f ð0ÞP k1 ! f ð1þ �ÞP ð1� dÞf ð0Þ and f ð1� �ÞP k1 ! f ð0ÞP ð1� dÞk1; ð23Þ

if � 6 �0 ¼ minf f�1 � 1; 1� f g where f ¼ 1�k1

1þk1� 1þð1�dÞk1

1�ð1�dÞk1.

Proof. Observe that for any 0 < k1 6 k2 < 1

k1 6 f ð0Þ 6 k2 $ c1b 6 a 6 c2b; ð24Þ

where ci ¼ ð1þ kiÞ=ð1� kiÞ, for i ¼ 1; 2. First, we provethat f ð0ÞP k1 implies f ð1þ �ÞP ð1� dÞf ð0Þ if

� 61þ k1

1� k1

� 1� ð1� dÞk1

1þ ð1� dÞk1

� 1: ð25Þ

Since f ð0ÞP k1, we have that a P c1b, wherec1 ¼ ð1þ k1Þ=ð1� k1Þ. Since aþ ð1þ �Þb 6 aþ ð1þ �Þ a

c1

and a� ð1þ �Þb P a� ð1þ �Þ ac1

, we have that

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

ED

PR

OO

F

a� ð1þ �Þbaþ ð1þ �Þb P

c1 � 1� �c1 þ 1þ � : ð26Þ

Therefore, it is sufficient to have

c1 � 1� �c1 þ 1þ � P ð1� dÞk1 $ c1

1� ð1� dÞk1

1þ ð1� dÞk1

P 1þ �; ð27Þ

which implies that it is sufficient to have

1þ k1

1� k1

� 1� ð1� dÞk1

1þ ð1� dÞk1

� 1 P �: ð28Þ

Second, we prove that f ð1� �ÞP k1 impliesf ð0ÞP ð1� dÞk1 if

� 6 1� 1� k1

1þ k1

� 1þ ð1� dÞk1

1� ð1� dÞk1

: ð29Þ

Since f ð1� �ÞP k1, we have that a P c1ð1� �Þb ¼ c01b,where c1 ¼ ð1þ k1Þ=ð1� k1Þ. Therefore, a� b P a� a=c01and aþ b 6 aþ a=c01, which implies that

f ð0Þ ¼ a� baþ b

Pa� a=c01aþ a=c01

¼ c01 � 1

c01 þ 1: ð30Þ

Thus, it is sufficient to require that

c1ð1� �Þ � 1

c1ð1� �Þ þ 1P ð1� dÞk1; ð31Þ

which is equivalent to having

c1ð1� �Þ � 1

2P

ð1� dÞk1

1� ð1� dÞk1

$ � 6 1� 1� k1

1þ k1

� 1þ ð1� dÞk1

1� ð1� dÞk1

: ð32Þ

h

References

[1] James Reserve Data Management System. http://cens.jamesre-serve.edu/jrcensweb/cmstest/CMS_env_data_list.php.

[2] D. Achlioptas, Database-friendly random projections: Johnson-lindenstrauss with binary coins, Journal of Computer and SystemSciences 26 (2003) 671–687.

[3] S. Agarwal and A. Trachtenberg, Estimating the number of differ-ences between remote sets, in: IEEE Information Theory Workshop(ITW), Punta del Este, Uruguay, 2006.

[4] A.Z. Broder, Identifying and filtering near-duplicate documents,CPM 2000, LNCS 1848, pp. 1–10, 2000.

ve data gathering in wireless sensor networks ..., Comput. Com-

Page 14: Collaborative data gathering in wireless sensor networks ...kalpakis/homepage/papers/co-kk-comc… · UNCORRECTED PROOF 1 2 Collaborative data gathering in wireless sensor networks

955956957958959960961962963964965966967968969970971972973974975976977978979

98098198298398498598698798898999099199299399499599699799899910001001100210031004

14 K. Kalpakis, S. Tang / Computer Communications xxx (2008) xxx–xxx

COMCOM 3556 No. of Pages 14, Model 5+

24 January 2008 Disk UsedARTICLE IN PRESS

[5] A.Z. Broder, M. Charikar, A.M. Frieze, M. Mitzenmacher, Min-wiseindependent permutations, Journal of Computer and System Sciences60 (3) (2000) 630–659.

[6] J. Chou, D. Petrovic, and K. Ramchandran, A distributed andadaptive signal processing approach to reducing energy consumptionin sensor networks, in: Proceedings of the IEEE INFOCOM, 2003.

[7] R. Cole, D. Shasha, X. Zhao, Fast window correlations over uncoop-erative time series, in: KDD ’05: Proceeding of the 11th ACM SIGKDDInternational Conference on Knowledge Discovery in Data Mining,ACM Press, New York, NY, USA, 2005, pp. 743–749.

[8] R. Cristescu, B. Beferull-Lozano, and M. Vetterli, On networkcorrelated data gathering. in: Proceedings of the IEEE INFOCOM,2004.

[9] M. Datar and S. Muthukrishnan, Estimating similarity and rarityover data stream windows, in: Proceedings of the 10th EuropeanSymposium on Algorithms, Rome, Italy, September 2002.

[10] A. Deshpande, C. Guestrin, S.R. Madden, J.M. Hellerstein, and W.Hong, Model-driven data acquisition in sensor networks, in: Pro-ceedings of the 30th VLDB Conference, Toronto, 2004.

[11] L. Fan, P. Cao, J. Almeida, A.Z. Broder, Summary cache: a scalablewide-area web cache sharing protocol, IEEE/ACM Transactions onNetworking 8 (3) (2000) 281–293.

[12] S. Goel, T. Imielinski, Prediction-based monitoring in sensornetworks: taking lessons from mpeg, SIGCOMM Comput. Commun.Rev. 31 (5) (2001) 82–98.

UN

CO

RR

EC

T1005

Please cite this article in press as: K. Kalpakis, S. Tang, Collaboratimun. (2008), doi:10.1016/j.comcom.2008.01.001

PR

OO

F

[13] H. Gupta, V. Navda, S.R. Das, and V. Chowdhary, Efficientgathering of correlated data in sensor networks, in: MobiHoc’05,Urbana-Champaign, Illinois, May 2005.

[14] P. Indyk, Stable distributions, pseudorandom generators, embeddingsand data stream computation, in: FOCS, pp. 189–197, 2000.

[15] P. Indyk, N. Koudas, S. Muthukrishnan, Identifying representativetrends in massive time series data sets using sketches, in: VLDB ’00:Proceedings of the 26th International Conference on Very Large DataBases, Morgan Kaufmann Publishers Inc., San Francisco, CA, USA,2000, pp. 363–372.

[16] M. Sharaf, J. Beaver, A. Labrinidis, and P. Chrysanthis, Tina: Ascheme for temporal coherency-aware in-network aggregation, in:MobiDE’03, San Diego, CA, USA, September 2003.

[17] N. Thaper, S. Guha, P. Indyk, N. Koudas, Dynamic multidimen-sional histograms, in: SIGMOD ’02: Proceedings of the 2002 ACMSIGMOD international conference on Management of data, ACMPress, New York, NY, USA, 2002, pp. 428–439.

[18] P. von Rickenbach and R. Wattenhofer. Gathering correlated data insensor networks. in: DIALM-POMC’04: Proceedings of the 2004Joint Workshop on Foundations of Mobile Computing, ACM Press,New York, NY, USA, 2004, pp. 60–66.

[19] S. Yoon and C. Shahabi. Exploiting spatial correlation towards anenergy efficient clustered aggregation technique (cag). in: Proceed-ings of the International Conference on Communications (ICC),2005.

ED

ve data gathering in wireless sensor networks ..., Comput. Com-