Abstract
The coverage hole problem in Wireless Sensor Networks (WSNs) is one of the most important problem. The data has to be communicated through the base station that every sensor node have to be communicated to the adjacent nodes within its communication area. The level of network connectivity is used to detect the coverage hole problem. The proposed fuzzy enabled coverage hole detection methodology is used to identify the coverage hole in the network. The communication links among the sensor nodes are maintained by the path construction. The adjacent nodes are identified based on the energy level for enhanced transmission. Fuzzy rules are constructed with the parameters of Energy, Communication with adjacent nodes and network coverage with the coverage hole is detected as the output of these rules. The experimental results show that the proposed methodology has improved performance for detecting the coverage hole with various parameters.














Similar content being viewed by others
References
Fu, X., Yao, H., & Yang, Y. (2019). Cascading failures in wireless sensor networks with load redistribution of links and nodes. Ad Hoc Networks, 93, 101900.
Vijayakumar, K. P., Kumar, K. P. M., Kottilingam, K., Karthick, T., Vijayakumar, P., & Ganeshkumar, P. (2019). An adaptive neuro-fuzzy logic based jamming detection system in WSN. Soft Computing, 23(8), 2655–2667. https://doi.org/10.1007/s00500-018-3636-5
Mohindru, V., Bhatt, R., & Singh, Y. (2019). Re authentication scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems, 23, 158–166.
Harold Robinson, Y., Golden Julie, E., Balaji, S., & Ayyasamy, A. (2017). Energy aware clustering scheme in wireless sensor network using neuro-fuzzy approach. Wireless Personal Communications, 95(2), 703–721.
Parras, J., & Zazo, S. (2019). Learning attack mechanisms in wireless sensor networks using markov decision processes. Expert Systems with Applications, 122(15), 376–387.
Shelke, M., Malhotra, A., & Mahalle, P. N. (2019). Fuzzy priority based intelligent traffic congestion control and emergency vehicle management using congestion-aware routing algorithm. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-019-01523-8
Sun, Z., Liu, Y., & Tao, Li. (2018). Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization. Journal of Network and Computer Applications, 112(15), 29–40.
Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., & Changlani, S. (2020). Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in wireless sensor networks (WSN). Computer Communications, 149, 134–145.
Khedr, A. M., Osamy, W., & Salim, A. (2018). Distributed coverage hole detection and recovery scheme for heterogeneous wireless sensor networks. Computer Communications, 124, 61–75.
Kalaikumar, K., & Baburaj, E. (2020). Fuzzy enabled congestion control by cross layer protocol utilizing OABC in WSN: Combining MAC, routing, non-similar clustering and efficient data delivery. Wireless Networks, 26, 1085–1103. https://doi.org/10.1007/s11276-018-1848-3
Han, L., Zhou, M., Jia, W., Dalil, Z., & Xu, X. (2019). Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Information sciences, 476, 491–504.
Elavarasan, R., & Chitra, K. (2020). An efficient fuzziness based contiguous node refining scheme with cross-layer routing path in WSN. Peer-to-Peer Networks Applications. https://doi.org/10.1007/s12083-019-00825-0
López, M., Peinado, A., & Ortiz, A. (2019). An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks. Computer Networks, 165, 106945.
Oh, S., Cho, H., Kim, S. H., Lee, W., & Lee, E. (2019). Continuous object tracking protocol with selective wakeup based on practical boundary prediction in wireless sensor networks. Computer Networks, 162, 106854.
Arjunan, S., & Sujatha, P. (2018). Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol. Applied Intelligence, 48, 2229–2246. https://doi.org/10.1007/s10489-017-1077-y
Harold Robinson, Y., & Golden Julie, E. (2019). MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks. Wireless Personal Communications, 109, 739–760.
Sun, Z., Wei, M., Zhang, Z., & Gang, Qu. (2019). Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks. Applied Soft Computing, 77, 366–375.
Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022.
Yi, L., Deng, X., Zou, Z., Ding, D., & Yang, L. T. (2018). Confident information coverage hole detection in sensor networks for uranium tailing monitoring, . Journal of Parallel and Distributed Computing, 118(1), 57–66.
Robinson, Y. H., Julie, E. G., Saravanan, K., & Kumar, R. (2020). DRP: Dynamic routing protocol in wireless sensor networks. Wireless Personal Communications, 111(1), 313–329.
Le Nguyen, P., Nguyen, K., Vu, H., & Ji, Y. (2019). TELPAC: A time and energy efficient protocol for locating and patching coverage holes in WSNs. Journal of Network and Computer Applications, 147, 102439.
Jean-MatthieuEtancelin, A. F., & FrédéricGuinand, M. R. (2019). DACYCLEM: A decentralized algorithm for maximizing coverage and lifetime in a mobile wireless sensor network. Ad Hoc Networks, 87(1), 174–187.
Harold Robinson, Y., Balaji, S., & Golden Julie, E. (2019). FPSOEE: Fuzzy-enabled particle swarm optimization-based energy-efficient algorithm in mobile ad-hoc networks. Journal of Intelligent & Fuzzy Systems, 36(4), 3541–3553.
Kalaivanan, K., & Bhanumathi, V. (2018). Reliable location aware and Cluster-Tap Root based data collection protocol for large scale wireless sensor networks. Journal of Network and Computer Applications, 118(15), 83–101.
Kumar, P., & Chaturvedi, A. (2018). Fuzzy-interval based probabilistic query generation models and fusion strategy for energy efficient wireless sensor networks. Computer Communications, 117, 46–57.
Xie, J., Xiong, Z., Dai, Q., Wang, X., & Zhang, Y. (2019). A local-gravitation-based method for the detection of outliers and boundary points. Knowledge-Based Systems, 192, 105331.
Khelil, A., Beghdad, R., & Khelloufi, A. (2020). 3HA: Hybrid hole healing algorithm in a wireless sensor networks. Wireless Personal Communications, 1–13
Robinson, Y. H., & Rajaram, M. (2016). A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile ad hoc network. Wireless Personal Communications, 90(2), 769–791.
Hadikhani, P., Eslaminejad, M., Yari, M., & Mahani, A. M. (2019). An energy-aware and load balanced distributed geographic routing algorithm for wireless sensor networks with dynamic hole. Wireless Networks. https://doi.org/10.1007/s11276-019-02157-6.
Bhushan, B., & Sahoo, G. (2019). ISFC-BLS (intelligent and secured fuzzy clustering algorithm using balanced load sub-cluster formation) in WSN environment. Wireless Personal Communication. https://doi.org/10.1007/s11277-019-06948-0
Feng, X., Zhang, X., Zhang, J., & Muhdhar, A. A. (2019). A coverage hole detection and repair algorithm in wireless sensor networks. Cluster Computing, 22(5), 12473–12480.
Yan, F., Ma, W., Shen, F., Xia, W., & Shen, L. (2020). Connectivity based k-coverage hole detection in wireless sensor networks. Mobile Networks and Applications, 25(2), 783–793.
Mittal, N. (2020). An energy efficient stable clustering approach using fuzzy type-2 bat flower pollinator for wireless sensor networks. Wireless PersCommun. https://doi.org/10.1007/s11277-020-07094-8
Jain, A., & Goel, A. K. (2020). Energy efficient fuzzy routing protocol for wireless sensor networks. Wireless Personal Communications, 110, 1459–1474. https://doi.org/10.1007/s11277-019-06795-z
Zain Eldin, H., Badawy, M., Elhosseini, M., Arafat, H., & Abraham, A. (2020). An improved dynamic deployment technique based-on genetic algorithm (IDDT-GA) for maximizing coverage in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-01698-5.
Prithi, S., & Sumathi, S. (2020). LD2FA-PSO: A novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Networks, 97, 102024.
Phoemphon, S., So-In, C., & Leelathakul, N. (2020). A hybrid localization model using node segmentation and improved particle swarm optimization with obstacle-awareness for wireless sensor networks. Expert Systems with Applications, 143, 113044.
Das, R., Dash, D., & Sarkar, M. K. (2020). HTMS: Fuzzy based hierarchical trust management scheme in WSN. Wireless Personal Communications. https://doi.org/10.1007/s11277-020-07092-w
Khalifa, B., Al Aghbari, Z., & Khedr, A. M. (2020). A distributed self-healing coverage hole detection and repair scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems, 100428
Funding
This work has not supported by any funding agency/institution.
Author information
Authors and Affiliations
Contributions
YHR: Writing—original draft, writing—review and editing, conceptualization, data curation, Validation. TSL: writing—data curation, validation. EGJ: conceptualization, formal analysis, review and editing, conceptualization. SV: formal analysis, supervision.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they do not have any conflict of interest. This research does not involve any human or animal participation. All authors have checked and agreed the submission.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Robinson, Y.H., Lawrence, T.S., Julie, E.G. et al. Development of Fuzzy Enabled Coverage Hole Detection Algorithm in Wireless Sensor Networks. Wireless Pers Commun 119, 3631–3649 (2021). https://doi.org/10.1007/s11277-021-08424-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08424-0