skip to main content
10.1145/3491371.3491380acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnsyssConference Proceedingsconference-collections
short-paper

Hole Healing in Mobile Sensor Network

Published:21 December 2021Publication History

ABSTRACT

In a sensor network, the occurrence of coverage hole in the system is quite natural. The most common technique used to heal such a hole is to deploy sensors densely. Some of these sensors remain active and covers the whole target area and the remaining stays deactivated as long as there is no hole in the network. This technique will not work properly if the deployment of the sensors is not dense. In this paper, this problem has been dealt with mobile sensors. The proposed algorithm in this paper can heal a hole with minimal numbers of sensors needed to cover the target area.

References

  1. Shahram Babaie and Seyed Sajad Pirahesh. 2012. Hole detection for increasing coverage in wireless sensor network using triangular structure. arXiv preprint arXiv:1203.3772(2012).Google ScholarGoogle Scholar
  2. Kun Bi, Kun Tu, Naijie Gu, Wan Lin Dong, and Xiaohu Liu. 2006. Topological Hole Detection in Sensor Networks with Cooperative Neighbors. In Systems and Networks Communications, 2006. ICSNC ’06. International Conference on. 31–31. https://doi.org/10.1109/ICSNC.2006.71Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chih-Yung Chang, Sheng-Wen Chang, and Shih-Yun Hsu. 2007. A Decentralized Hole-Shape Regulation Technique for Enhancing Patrol and Deployment Tasks in Mobile WSNs. In 2007 IEEE International Conference on Mobile Adhoc and Sensor Systems. IEEE, 1–9.Google ScholarGoogle ScholarCross RefCross Ref
  4. Qing Fang, Jie Gao, and LeonidasJ. Guibas. 2006. Locating and Bypassing Holes in Sensor Networks. Mobile Networks and Applications 11, 2 (2006), 187–200. https://doi.org/10.1007/s11036-006-4471-yGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann. 2004. Neighborhood-Based Topology Recognition in Sensor Networks. In Algorithmic Aspects of Wireless Sensor Networks, Sotiris Nikoletseas and José Rolim (Eds.). Lecture Notes in Computer Science, Vol. 3121. Springer Berlin / Heidelberg, 123–136. http://dx.doi.org/10.1007/978-3-540-27820-7_1210.1007/978-3-540-27820-7_12.Google ScholarGoogle Scholar
  6. Stefan Funke. 2005. Topological Hole Detection in Wireless Sensor Networks and Its Applications. In Proceedings of the 2005 Joint Workshop on Foundations of Mobile Computing (Cologne, Germany) (DIALM-POMC ’05). ACM, New York, NY, USA, 44–53. https://doi.org/10.1145/1080810.1080819Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Stefan Funke and Christian Klein. 2006. Hole Detection or: ”How Much Geometry Hides in Connectivity?”. In Proceedings of the Twenty-second Annual Symposium on Computational Geometry (Sedona, Arizona, USA) (SCG ’06). ACM, New York, NY, USA, 377–385. https://doi.org/10.1145/1137856.1137911Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Robert Ghrist and Abubakr Muhammad. 2005. Coverage and Hole-detection in Sensor Networks via Homology. In Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (Los Angeles, California) (IPSN ’05). IEEE Press, Piscataway, NJ, USA, Article 34. http://dl.acm.org/citation.cfm?id=1147685.1147729Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. I.M. Khan, N. Jabeur, and S. Zeadally. 2012. Hop-based approach for holes and boundary detection in wireless sensor networks. Wireless Sensor Systems, IET 2, 4 (December 2012), 328–337. https://doi.org/10.1049/iet-wss.2012.0076Google ScholarGoogle ScholarCross RefCross Ref
  10. A. Kröller, S. P. Fekete, D. Pfisterer, and S. Fischer. 2006. Deterministic boundary recognition and topology extraction for large sensor networks. In Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm (Miami, Florida) (SODA ’06). ACM, New York, NY, USA, 1000–1009. https://doi.org/10.1145/1109557.1109668Google ScholarGoogle Scholar
  11. X. Li and D. K. Hunter. 2008. Distributed Coordinate-Free Hole Recovery. In ICC Workshops - 2008 IEEE International Conference on Communications Workshops. 189–194. https://doi.org/10.1109/ICCW.2008.41Google ScholarGoogle Scholar
  12. Fu-Tian Lin, Tien-Wen Sung, Chao-Yang Lee, and Chu-Sing Yang. 2013. A delivery time-aware hole healing scheme for Wireless Sensor Networks. In 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 23–27.Google ScholarGoogle Scholar
  13. B. Sau and K. Mukhopadhyaya. 2008. Length-based anchor-free distributed localization in a covered sensor network. In Wireless Communication and Sensor Networks, 2008. WCSN 2008. Fourth International Conference on. IEEE, 77–82. https://doi.org/10.1109/WCSN.2008.4772686Google ScholarGoogle Scholar
  14. Buddhadeb Sau and Krishnendu Mukhopadhyaya. 2013. Localizability of wireless sensor networks: Beyond wheel extension. In Symposium on Self-Stabilizing Systems. Springer, 326–340.Google ScholarGoogle ScholarCross RefCross Ref
  15. Mustapha Reda Senouci, Abdelhamid Mellouk, and Khalid Assnoune. 2014. Localized movement-assisted sensordeployment algorithm for holedetection and healing. IEEE Transactions on parallel and distributed systems 25, 5 (2014), 1267–1277.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Krishna Pal Sharma and Teek Parval Sharma. 2017. ZBFR: zone based failure recovery in WSNs by utilizing mobility and coverage overlapping. Wireless Networks 23, 7 (2017), 2263–2280.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Divya K Suku and Phini Ann Philip. 2015. HOLE DETECTION AND HEALING FOR A RoI IN WIRELESS SENSOR NETWORKS. International Journal of Engineering Research and General Science 3 (2015). Issue 4.Google ScholarGoogle Scholar
  18. G. Wang, G. Cao, and T.F. La Porta. 2006. Movement-Assisted Sensor Deployment. IEEE Transactions on Mobile Computing 5 (June 2006), 640–652. Issue 6. https://doi.org/10.1109/TMC.2006.80Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Guiling Wang, Guohong Cao, and T. LaPorta. 2003. A bidding protocol for deploying mobile sensors. In Network Protocols, 2003. Proceedings. 11th IEEE International Conference on. 315–324. https://doi.org/10.1109/ICNP.2003.1249781Google ScholarGoogle ScholarCross RefCross Ref
  20. Y. Wang, J. Gao, and J.S.B. Mitchell. 2006. Boundary recognition in sensor networks by topological methods. In Proceedings of the 12th annual international conference on Mobile computing and networking (Los Angeles, CA, USA) (MobiCom ’06). ACM, New York, NY, USA, 122–133. https://doi.org/10.1145/1161089.1161104Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Yang and Z. Fei. 2010. HDAR: Hole Detection and Adaptive Geographic Routing for Ad Hoc Networks. In 2010 Proceedings of 19th International Conference on Computer Communications and Networks. 1–6. https://doi.org/10.1109/ICCCN.2010.5560012Google ScholarGoogle Scholar
  22. Chi Zhang, Yanchao Zhang, and Yuguang Fang. 2006. Detecting Coverage Boundary Nodes in Wireless Sensor Networks. In Networking, Sensing and Control, 2006. ICNSC ’06. Proceedings of the 2006 IEEE International Conference oDetecting Coverage Boundary Nodes in Wireless Sensor Networksn. 868–873. https://doi.org/10.1109/ICNSC.2006.1673261Google ScholarGoogle Scholar
  23. Honghai Zhang and Jennifer C Hou. 2005. Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc & Sensor Wireless Networks 1, 1-2 (2005), 89–124.Google ScholarGoogle Scholar

Index Terms

  1. Hole Healing in Mobile Sensor Network
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              NSysS '21: Proceedings of the 8th International Conference on Networking, Systems and Security
              December 2021
              138 pages
              ISBN:9781450387378
              DOI:10.1145/3491371

              Copyright © 2021 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 21 December 2021

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • short-paper
              • Research
              • Refereed limited

              Acceptance Rates

              Overall Acceptance Rate12of44submissions,27%
            • Article Metrics

              • Downloads (Last 12 months)14
              • Downloads (Last 6 weeks)1

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format