INFORMATION CHANGE THE WORLD

International Journal of Modern Education and Computer Science (IJMECS)

ISSN: 2075-0161 (Print), ISSN: 2075-017X (Online)

Published By: MECS Press

IJMECS Vol.6, No.4, Apr. 2014

Holes Detection in Wireless Sensor Networks: A Survey

Full Text (PDF, 400KB), PP.24-30


Views:181   Downloads:8

Author(s)

Smita Karmakar, Alak Roy

Index Terms

Holes;Coverage;Hole detection;Size estimation of hole

Abstract

Now a day’s, it has been a great idea of research on using Wireless Sensor Networks (WSNs) to assist in the initial deployment of sensor nodes. Hole problem in WSNs is the most fundamental Problem in WSNs. Hole means a communication gap in WSNs. Finding an optimal sensor deployment strategy that would minimize the cost, reduce the node failure and also reduce the communication overhead. Then it provides a maximum degree of area coverage with lower cost of deployment of sensor nodes, best possible communication and maintaining the network connectivity. However, it increases the quality of service in WSNs that is extremely challenging. In this article, we present various types of holes, a comparative study of various types of holes and various types of coverage holes. At the end, we proposed an Algorithm to detect hole. In this paper, we aim to give the solution of hole problems of area coverage in WSNs.

Cite This Paper

Smita Karmakar, Alak Roy,"Holes Detection in Wireless Sensor Networks: A Survey", IJMECS, vol.6, no.4, pp. 24-30, 2014.DOI: 10.5815/ijmecs.2014.04.04

Reference

[1]Y. Jennifer, B. Mukherjee, and D. Ghosal, "Wireless sensor network survey," Computer networks, 52 (1), pp. 2292-2330, 2008.

[2]I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer networks, 38 (4), pp. 393-422, 2002.

[3]D.J Pottie and W.J. Kaiser, “Wireless Integrated Network Sensors,” Communication of the ACM, 43 (5), pp. 51-58, May 2000.

[4]http://en.wikipedia.org/wiki/Wireless_sensor_network#Characteristics. Last accessed on November 08, 2013.

[5]A. D. Wood, J. A. Stankovic, and S. H. Son, “JAM: A jammed-area mapping service for sensor networks”, In 24th IEEE Real Time System Symposium (RTSS’03), pp. 286–298, Dec 2003.

[6]C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and counter measures”, In 1st IEEE International Workshop SNPA’03, May 2003.

[7]A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks”, IEEE Computer, 35(10), pp 48–56, Oct 2002.

[8]S. Ghiasi, A. Srivatava, X. Yang, and M. Sanafzadeh,” Optimal Energy Aware Clustering in Clustering in Sensor Networks”, in Sensors, 2, pp. 258-269, Feb 2002.

[9]http://en.wikipedia.org/wiki/Orography. Last accessed on November 08, 2013.

[10]A. Ghosh, "Estimating coverage holes and enhancing coverage in mixed sensor networks." In Local Computer Networks, 2004, 29th Annual IEEE International Conference on, IEEE, pp. 68-76, 2004.

[11]G. Wang, G. Cao, P. Berman, T.F.L. Porta, “Bidding protocols for deploying mobile sensors”, IEEE Transactions on Mobile Computing, 6(5), pp. 515–528, 2007.

[12]S. Babaie, and S. S. Pirahesh. "Hole detection for increasing coverage in wireless sensor network using triangular structure", IJCSI International Journal of Computer Science Issues, 9(2), January 2012. 

[13]H. C. Jun, and Y. S. Hua, “Data Collection Method with A Mobile Sink Node in Wireless Sensor Network”, International Journal of Wireless and Microwave Technologies (IJWMT), 2(4), 46, 2012.

[14]C. K. Nagpal, C. Kumar, B. Bhushan, and S. Gupta, “A Study of Black Hole Attack on MANET Performance”, International Journal of Modern Education & Computer Science, 4(8), 2012.

[15]H. HongNing, L. Zhong, and L. Lu, “A Real-Time Directed Routing Protocol Based on Projection of Convex Holes on Underwater Acoustic Networks”, International Journal of Wireless and Microwave Technologies (IJWMT), 2(2), 65, 2012.

[16]X. Yu, C. Wu, D. Chen, and N. Hu, “Level Set Based Coverage Holes Detection and Holes Healing Scheme in Hybrid Sensor Network”, International Journal of Distributed Sensor Networks, 2013.

[17]C. Kong, A. Ferworn, J. Tran, S. Herman, E. Coleshill, and K. G. Derpanis, “Toward the automatic detection of access holes in disaster rubble”, In Safety, Security, and Rescue Robotics (SSRR), 2013 IEEE International Symposium on (pp. 1-6). IEEE, Oct 2013.

[18]M. L. Zheng, P. P. Zhai, and X. Zou, “Research of Location Technology Based on Wireless Sensor Network”, Advanced Materials Research, 860, 2817-2824, 2014.