next up previous
Next: Bibliography Up: COMP 5008 Project: Voronoi Previous: Skew Voronoi Diagrams

Subsections


Applications

We conclude by giving some examples of Voronoi Diagrams applications.


Natural Phenomenon Modelling

We now figure another algorithm to draw Voronoi Diagrams. Imagine that you grow circles around the points you are using to generate your Voronoi Diagram. Imagine also that you grow them simultaneously and at the same speed. Then, the first time a pair of circles intersect, both circles have the same radius, meaning that the touching point is equidistant from both sites. Suppose now that you stop growing in a given direction each time you touch another circle. This means that once you are done growing you circles, what remains are the touching points, which are all equidistant from some pair of generating points. In other words, they lie on some bisectrix, and careful attention leads to conclude that what you have is actually a Voronoi Diagram.

Figure 7: Giraffe patches.
Image giraf

It appears that some natural phenomenon can be modelled by growing circles. One of those phenomenons would apparently be the patches on a giraffe. Although we do not have a serious reference about that (which does not imply that no one exists), if you look carefully at the patches of a giraffe, you may find that those look pretty much like a Voronoi Diagram. Also (once again, we do not have any confirmation from a biologist), apparently that those patches first appear as spots, and slowly grow until they touch. Anyway, whether they really behave as Voronoi Diagrams or not, it is certain that they look enough like Voronoi Diagrams to use it in computer graphics to draw giraffes...

Figure 8: Soap Bubbles.
Image bubbles

Another phenomenon that can be modelled using Voronoi Diagrams is Soap Bubbles. When you have many soap bubbles stuck together, their boundaries follow some physical equilibrium laws (that we honestly don't really know about) which solution is a 3D Voronoi Diagram.

Computer Art

Figure 9: The Mandelbrot Set.
Image mandelbrot

Fractals have been really popular those last year because of their fascinating and always renewed complexity. The most popular fractal object is probably the Mandelbrot set (see Figure 9), but there are also many others. Roughly, although this is far from the actual mathematical definition, a fractal image is nothing more than a portion of the plot of some function sophisticated enough to be visually appealing. Since there are infinitely many functions, several ways have been imagined to help fractal artists to find a good looking one. One of those is through the use of genetic computing. Basically, the idea is to imagine some crossover definition between functions used to generate fractals, and to hope that good looking fractals parents will engender good (and hopefully better) looking fractal sons.

Figure 10: Kandid Screen Shot.
Image kandid

Many computer programs have been produced in this aim, among which are Genetic Art 4, that you can find as an applet here (8), and Kandid, that you can download here (6). Although Genetic Art 4 is easier to run (it is a simple web applet), Kandid is way more complete and offers several different ways to generate visually appealing computer images. Some of them are actual fractals, but it also has some other ways to generate images. One of those ways is through the use of Voronoi Diagrams. Since we saw in Section 4.1 that Voronoi Diagrams can be used to model natural phenomenons, they can also be used to produce images that are quite attractive. On Figure 10, we can see a screen shot of Kandid. The user sees a collection of computer generated images, and chose among two of them to produce new images that have some visual properties of their parents.

Wireless Security

Figure 11: Rogue Base Station Detection.
\includegraphics{wireless.eps}

The last application of Voronoi Diagrams we discuss is on wireless security. In (3), the authors show how to use Voronoi Diagrams to perform rogue base station detection. First of all, a base station can be seen as a service access point for wireless mobile users. A rogue base station is an intruder which tries to fool a mobile user by stealing some base station identity. The rogue base station detection problem is, for a mobile user, to be able to determine wether or not the base station to which it is going to connect is actually a real or a rogue base station.

As mobile users are moving around, they are connected to the base station which is the nearest. If $ reg(i)$ is the Voronoi region of a base station $ i$ (with respect to the Voronoi Diagram generated by all the base stations), a mobile user $ \times$ is then always connected to the unique base station $ i$ which region $ reg(i)$ contains the location of $ \times$.

A mobile station can determine which base station is the nearest based on the received signal strength. The nearer a base station is, the stronger is the signal. Thus, when comes the time to chose to which base station to connect to, a mobile user just makes its decision by measuring the signal strength.

In Figure 11, user $ \times$ is connected to the base station $ i$ but is now nearer to $ \square$ than to $ i$. Suppose now that $ \square$ is a rogue base station which tries to steal $ j$'s identity. We show how $ \times$ can determine that $ \square$ is not actually $ j$. Since $ \times$ is connected to $ i$, he knows that it is in $ reg(i)$. However, the received signal strength is higher than what can be expected on the boundary of $ reg(i)$. This is because the smallest circle having center $ j$ and touching $ reg(i)$ has radius smaller than the perceived distance between $ \times$ and $ j$ (which is actually the distance between $ \times$ and $ \square$). Since it is not possible that this signal is so strong, then the mobile user $ \times$ detects that someone is trying to steal $ j$'s identity and does not connect to that station.

Since all the threshold distances can be pre-computed only once, this gives rise to an efficient algorithm (which is actually an heuristic) to detect rogue base stations.


next up previous
Next: Bibliography Up: COMP 5008 Project: Voronoi Previous: Skew Voronoi Diagrams
Mathieu Couture 2005-12-08