{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T03:47:20Z","timestamp":1762055240963,"version":"build-2065373602"},"reference-count":25,"publisher":"MDPI AG","issue":"6","license":[{"start":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T00:00:00Z","timestamp":1655251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100013209","name":"Hellenic Foundation for Research and Innovation (HFRI) under the 3rd Call for HFRI Ph.D. Fellowships","doi-asserted-by":"publisher","award":["5631"],"award-info":[{"award-number":["5631"]}],"id":[{"id":"10.13039\/501100013209","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The Internet of Battlefield Things is a newly born cyberphysical system and, even though it shares a lot with the Internet of Things and with ad hoc networking, substantial research is required to cope with its scale and peculiarities. This article examines a fundamental problem pertaining to the routing of information, i.e., the calculation of a backbone network. We model an IoBT network as a network with multiple layers and employ the concept of domination for multilayer networks. This is a significant departure from earlier works, and in spite of the huge literature on the topic during the past twenty years, the problem in IoBT networks is different since these networks are multilayer networks, thus making inappropriate all the past, related literature because it deals with single layer (flat) networks. We establish the computational complexity of our problem, and design a distributed algorithm for computing connected dominating sets with small cardinality. We analyze the performance of the proposed algorithm on generated topologies, and compare it against two\u2014the only existing\u2014competitors. The proposed algorithm establishes itself as the clear winner in all experiments concerning the dominating set from a size-wise and an energy-wise perspective achieving a performance gain of about 15%.<\/jats:p>","DOI":"10.3390\/fi14060186","type":"journal-article","created":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T22:17:01Z","timestamp":1655331421000},"page":"186","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Multilayer Backbones for Internet of Battlefield Things"],"prefix":"10.3390","volume":"14","author":[{"given":"Evangelia","family":"Fragkou","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Thessaly, 38334 Volos, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6816-1965","authenticated-orcid":false,"given":"Dimitrios","family":"Papakostas","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Thessaly, 38334 Volos, Greece"}]},{"given":"Theodoros","family":"Kasidakis","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Thessaly, 38334 Volos, Greece"}]},{"given":"Dimitrios","family":"Katsaros","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Thessaly, 38334 Volos, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2022,6,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MC.2016.355","article-title":"The Internet of Battle Things","volume":"49","author":"Kott","year":"2016","journal-title":"IEEE Comput. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Russel, S., and Abdelzaher, T. (2018, January 29\u201331). The Internet of Battlefield Things: The next generation of command, control, communications and intelligence (C3I) decision-making. Proceedings of the 2018 IEEE Military Communications Conference (MILCOM 2018), Los Angeles, CA, USA.","DOI":"10.1109\/MILCOM.2018.8599853"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Abdelzaher, T., Ayanian, N., Basar, T., Diggavi, S., Diesner, J., Ganesan, D., Govindan, R., Jha, S., Lepoint, T., and Marlin, B. (2018, January 2\u20136). Will distributed computing revolutionize peace? The emergence of Battlefield IoT. Proceedings of the IEEE International Conference on Distributed Computing Systems, Vienna, Austria.","DOI":"10.1109\/ICDCS.2018.00112"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MC.2018.2876048","article-title":"Toward and Internet of Battle Things: A resilience perspective","volume":"51","author":"Abdelzaher","year":"2018","journal-title":"IEEE Comput. Mag."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Papakostas, D., Basaras, P., Katsaros, D., and Tassiulas, L. (2016, January 1\u20133). Backbone formation in military multi-layer ad hoc networks using complex network concepts. Proceedings of the IEEE Military Communications Conference, Baltimore, MD, USA.","DOI":"10.1109\/MILCOM.2016.7795434"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.adhoc.2018.06.017","article-title":"Energy-aware backbone formation in military multilayer ad hoc networks","volume":"81","author":"Papakostas","year":"2018","journal-title":"Ad Hoc Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2618","DOI":"10.1109\/TWC.2018.2799860","article-title":"On the secure and reconfigurable multi-layer network design for critical information dissemination in the Internet of Battlefield Things (IoBT)","volume":"17","author":"Farooq","year":"2018","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"11725","DOI":"10.1109\/JIOT.2020.2999542","article-title":"The Internet-of-Battlefield-Things (IoBT)-based enemy localization using soldiers location and gunshot direction","volume":"7","author":"Gaikwad","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"378","DOI":"10.1109\/JIOT.2017.2786546","article-title":"Dynamic connectivity game for adversarial Internet of Battlefield Things Systems","volume":"5","author":"Abuzainab","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"6643","DOI":"10.1109\/TCOMM.2018.2866859","article-title":"A multiclass mean-field game for thwarting misinformation spread in the Internet of Battlefield Things","volume":"66","author":"Abuzainab","year":"2018","journal-title":"IEEE Trans. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/TSUSC.2018.2809665","article-title":"Robust malware detection for Internet of (Battlefield) Things devices using deep eigenspace learning","volume":"4","author":"Azmoodeh","year":"2019","journal-title":"IEEE Trans. Sustain. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MCC.2018.1081072","article-title":"Context aware ubiquitous biometrics in edge of military things","volume":"4","author":"Castiglione","year":"2017","journal-title":"IEEE Cloud Comput. Mag."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Nasim, I., and Kim, S. (2019, January 12\u201314). Human EMF exposure in wearable networks for Internet of Battlefield Things. Proceedings of the IEEE Military Communications Conference, Norfolk, VA, USA.","DOI":"10.1109\/MILCOM47813.2019.9020889"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/71.980024","article-title":"Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks","volume":"13","author":"Stojmenovic","year":"2002","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Wu, J., and Li, H. (1999, January 20). On calculating connected dominating set for efficient routing in ad hoc wireless networks. Proceedings of the Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, Seattle, WA, USA.","DOI":"10.1145\/313239.313261"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.comcom.2012.10.005","article-title":"Connected dominating sets in wireless ad hoc and sensor networks: A comprehensive survey","volume":"24","author":"Yu","year":"2013","journal-title":"Comput. Commun."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"7823","DOI":"10.1109\/TSMC.2020.2987163","article-title":"Minimum dominating set of multiplex networks: Definition, application, and identification","volume":"51","author":"Zhao","year":"2021","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Wu, Y., and Li, Y. (2008, January 26\u201330). Construction algorithms for k-connected m-dominating sets in wireless sensor networks. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hong Kong, China.","DOI":"10.1145\/1374618.1374631"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Pemmaraju, S.V., and Pirwani, I.A. (2006, January 22\u201325). Energy conservation via domatic partitions. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, Florence, Italy.","DOI":"10.1145\/1132905.1132922"},{"key":"ref_20","first-page":"1","article-title":"Finding and analysing the minimum set of driver nodes required to control multilayer networks","volume":"9","author":"Nacher","year":"2019","journal-title":"Nat. Sci. Rep."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Fan, N., and Watson, J.P. (2012, January 5\u20139). Solving the connected dominating set problem and power dominating set problem by integer programming. Proceedings of the International Conference on Combinatorial Optimization and Applications, Banff, AB, Canada.","DOI":"10.1007\/978-3-642-31770-5_33"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Haynes, T.W., Hedetniemi, S., and Slater, P. (1998). Fundamentals of Domination in Graphs, CRC Press.","DOI":"10.1002\/(SICI)1097-0037(199810)32:3<199::AID-NET4>3.0.CO;2-F"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Papakostas, D., Kasidakis, T., Fragkou, F., and Katsaros, D. (2021, January 9\u201311). Backbones for Internet of Battlefield Things. Proceedings of the IEEE\/IFIP Annual Conference on Wireless On-Demand Network Systems and Services, Klosters, Switzerland.","DOI":"10.23919\/WONS51326.2021.9415560"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1023\/A:1013763825347","article-title":"The broadcast storm problem in a mobile ad hoc network","volume":"8","author":"Tseng","year":"2002","journal-title":"Wirel. Netw."},{"key":"ref_25","unstructured":"Garey, M.R., and Johnson, D.S. (1979). Computers and Intractability: A Guide to the Theory of NP-Completeness, W. H. Freenan and Company."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/6\/186\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:32:12Z","timestamp":1760139132000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/6\/186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,15]]},"references-count":25,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2022,6]]}},"alternative-id":["fi14060186"],"URL":"https:\/\/doi.org\/10.3390\/fi14060186","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2022,6,15]]}}}