ABSTRACT
In a sensor network, the occurrence of coverage hole in the system is quite natural. The most common technique used to heal such a hole is to deploy sensors densely. Some of these sensors remain active and covers the whole target area and the remaining stays deactivated as long as there is no hole in the network. This technique will not work properly if the deployment of the sensors is not dense. In this paper, this problem has been dealt with mobile sensors. The proposed algorithm in this paper can heal a hole with minimal numbers of sensors needed to cover the target area.
- Shahram Babaie and Seyed Sajad Pirahesh. 2012. Hole detection for increasing coverage in wireless sensor network using triangular structure. arXiv preprint arXiv:1203.3772(2012).Google Scholar
- Kun Bi, Kun Tu, Naijie Gu, Wan Lin Dong, and Xiaohu Liu. 2006. Topological Hole Detection in Sensor Networks with Cooperative Neighbors. In Systems and Networks Communications, 2006. ICSNC ’06. International Conference on. 31–31. https://doi.org/10.1109/ICSNC.2006.71Google ScholarDigital Library
- Chih-Yung Chang, Sheng-Wen Chang, and Shih-Yun Hsu. 2007. A Decentralized Hole-Shape Regulation Technique for Enhancing Patrol and Deployment Tasks in Mobile WSNs. In 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems. IEEE, 1–9.Google ScholarCross Ref
- Qing Fang, Jie Gao, and LeonidasJ. Guibas. 2006. Locating and Bypassing Holes in Sensor Networks. Mobile Networks and Applications 11, 2 (2006), 187–200. https://doi.org/10.1007/s11036-006-4471-yGoogle ScholarDigital Library
- S. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann. 2004. Neighborhood-Based Topology Recognition in Sensor Networks. In Algorithmic Aspects of Wireless Sensor Networks, Sotiris Nikoletseas and José Rolim (Eds.). Lecture Notes in Computer Science, Vol. 3121. Springer Berlin / Heidelberg, 123–136. http://dx.doi.org/10.1007/978-3-540-27820-7_1210.1007/978-3-540-27820-7_12.Google Scholar
- Stefan Funke. 2005. Topological Hole Detection in Wireless Sensor Networks and Its Applications. In Proceedings of the 2005 Joint Workshop on Foundations of Mobile Computing (Cologne, Germany) (DIALM-POMC ’05). ACM, New York, NY, USA, 44–53. https://doi.org/10.1145/1080810.1080819Google ScholarDigital Library
- Stefan Funke and Christian Klein. 2006. Hole Detection or: ”How Much Geometry Hides in Connectivity?”. In Proceedings of the Twenty-second Annual Symposium on Computational Geometry (Sedona, Arizona, USA) (SCG ’06). ACM, New York, NY, USA, 377–385. https://doi.org/10.1145/1137856.1137911Google ScholarDigital Library
- Robert Ghrist and Abubakr Muhammad. 2005. Coverage and Hole-detection in Sensor Networks via Homology. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (Los Angeles, California) (IPSN ’05). IEEE Press, Piscataway, NJ, USA, Article 34. http://dl.acm.org/citation.cfm?id=1147685.1147729Google ScholarDigital Library
- I.M. Khan, N. Jabeur, and S. Zeadally. 2012. Hop-based approach for holes and boundary detection in wireless sensor networks. Wireless Sensor Systems, IET 2, 4 (December 2012), 328–337. https://doi.org/10.1049/iet-wss.2012.0076Google ScholarCross Ref
- A. Kröller, S. P. Fekete, D. Pfisterer, and S. Fischer. 2006. Deterministic boundary recognition and topology extraction for large sensor networks. In Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm (Miami, Florida) (SODA ’06). ACM, New York, NY, USA, 1000–1009. https://doi.org/10.1145/1109557.1109668Google Scholar
- X. Li and D. K. Hunter. 2008. Distributed Coordinate-Free Hole Recovery. In ICC Workshops - 2008 IEEE International Conference on Communications Workshops. 189–194. https://doi.org/10.1109/ICCW.2008.41Google Scholar
- Fu-Tian Lin, Tien-Wen Sung, Chao-Yang Lee, and Chu-Sing Yang. 2013. A delivery time-aware hole healing scheme for Wireless Sensor Networks. In 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 23–27.Google Scholar
- B. Sau and K. Mukhopadhyaya. 2008. Length-based anchor-free distributed localization in a covered sensor network. In Wireless Communication and Sensor Networks, 2008. WCSN 2008. Fourth International Conference on. IEEE, 77–82. https://doi.org/10.1109/WCSN.2008.4772686Google Scholar
- Buddhadeb Sau and Krishnendu Mukhopadhyaya. 2013. Localizability of wireless sensor networks: Beyond wheel extension. In Symposium on Self-Stabilizing Systems. Springer, 326–340.Google ScholarCross Ref
- Mustapha Reda Senouci, Abdelhamid Mellouk, and Khalid Assnoune. 2014. Localized movement-assisted sensordeployment algorithm for holedetection and healing. IEEE Transactions on parallel and distributed systems 25, 5 (2014), 1267–1277.Google ScholarDigital Library
- Krishna Pal Sharma and Teek Parval Sharma. 2017. ZBFR: zone based failure recovery in WSNs by utilizing mobility and coverage overlapping. Wireless Networks 23, 7 (2017), 2263–2280.Google ScholarDigital Library
- Divya K Suku and Phini Ann Philip. 2015. HOLE DETECTION AND HEALING FOR A RoI IN WIRELESS SENSOR NETWORKS. International Journal of Engineering Research and General Science 3 (2015). Issue 4.Google Scholar
- G. Wang, G. Cao, and T.F. La Porta. 2006. Movement-Assisted Sensor Deployment. IEEE Transactions on Mobile Computing 5 (June 2006), 640–652. Issue 6. https://doi.org/10.1109/TMC.2006.80Google ScholarDigital Library
- Guiling Wang, Guohong Cao, and T. LaPorta. 2003. A bidding protocol for deploying mobile sensors. In Network Protocols, 2003. Proceedings. 11th IEEE International Conference on. 315–324. https://doi.org/10.1109/ICNP.2003.1249781Google ScholarCross Ref
- Y. Wang, J. Gao, and J.S.B. Mitchell. 2006. Boundary recognition in sensor networks by topological methods. In Proceedings of the 12th annual international conference on Mobile computing and networking (Los Angeles, CA, USA) (MobiCom ’06). ACM, New York, NY, USA, 122–133. https://doi.org/10.1145/1161089.1161104Google ScholarDigital Library
- J. Yang and Z. Fei. 2010. HDAR: Hole Detection and Adaptive Geographic Routing for Ad Hoc Networks. In 2010 Proceedings of 19th International Conference on Computer Communications and Networks. 1–6. https://doi.org/10.1109/ICCCN.2010.5560012Google Scholar
- Chi Zhang, Yanchao Zhang, and Yuguang Fang. 2006. Detecting Coverage Boundary Nodes in Wireless Sensor Networks. In Networking, Sensing and Control, 2006. ICNSC ’06. Proceedings of the 2006 IEEE International Conference oDetecting Coverage Boundary Nodes in Wireless Sensor Networksn. 868–873. https://doi.org/10.1109/ICNSC.2006.1673261Google Scholar
- Honghai Zhang and Jennifer C Hou. 2005. Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc & Sensor Wireless Networks 1, 1-2 (2005), 89–124.Google Scholar
Index Terms
- Hole Healing in Mobile Sensor Network
Recommendations
Coverage Hole Detection and Healing to Enhance Coverage and Connectivity in 3D Spaces for WSNs: A Mathematical Analysis
The coverage and connectivity are the two imperative performance metrics for the growth of wireless sensor networks (WSNs) with sprouting technologies. In order to maintain these metrics, the issue of finding and healing of coverage hole is closely ...
The mission-oriented self-deploying methods for wireless mobile sensor networks
GPC'10: Proceedings of the 5th international conference on Advances in Grid and Pervasive ComputingIn the mission-oriented mobile sensor networks, the mobile sensor nodes actively organize and deploy themselves when an event arises in the target location The mobile sensor nodes are instructed by the base station to build a communication path to the ...
Analytic modeling of detection latency in mobile sensor networks
IPSN '06: Proceedings of the 5th international conference on Information processing in sensor networksAn envisioned usage of sensor networks is in surveillance systems for detecting a target or monitoring a physical phenomenon in a region. Traditionally, stationary sensor networks are deployed to carry out the sensing operations. In many applications, ...
Comments