Volume 18, Issue 2 (10-2021)                   JSDP 2021, 18(2): 75-96 | Back to browse issues page


XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Yousefpour M, Barekatain B. A Novel Efficient Energy-Aware Coverage Hole Detection Algorithm in Wireless Sensor Networks. JSDP 2021; 18 (2) :75-96
URL: http://jsdp.rcisp.ac.ir/article-1-1014-en.html
University
Abstract:   (1975 Views)
One of the most widely researched areas in wireless sensor networks is the issue of coverage. Coverage is directly related to the degree of quality, how and how long the sensors are able to detect predetermined targets in areas. Standard coverage for calculating network Quality of Service (QoS) greatly affects network performance. The most important factor in maximum coverage in wireless sensor networks is to consider the energy consumption constraints. Sensor nodes typically use a battery to supply power, which in most cases is not rechargeable; therefore, it is very important to carry out operations to reduce energy consumption and increase the life of the sensor node. Full network coverage is such that all areas of interest must be monitored and covered by diffused sensors. Now, if a certain area is not covered by any sensor, it is known as a cover hole and the real events in the cover points will not be recognizable and traceable. The aim of this study is to identify cover holes to reduce energy consumption in wireless sensor networks; which is applied by presenting a new model of credit management system. In this system, the sensor radius of the nodes is adjusted for maximum coverage in the network. In the simulation presented, decisions are made by gathering information at different time intervals and interactions among nodes; According to this decision, the evaluation is applied for the level of satisfaction of the nodes and based on the level of satisfaction of the nodes, rewards and fines are considered for the nodes and finally, using the support vector machine tool, cover holes in the sensor network are identified. Thus, the effect of identifying holes in reducing energy consumption, performance and quality of services provided in the network is expressed. Evaluations show that the longevity of the network and the size of the sensor radius of the nodes have improved 12.42% and 20.4%, respectively in terms of the number of sensor nodes in the environment with respect to the moving radius of the nodes, mobile nodes and cellular automata compared to the environment considering the constant radius of the nodes, mobile nodes and without automata.
Full-Text [PDF 2340 kb]   (833 Downloads)    
Type of Study: Research | Subject: Paper
Received: 2019/05/6 | Accepted: 2020/08/19 | Published: 2021/10/9 | ePublished: 2021/10/9

References
1. [1] I. F.Akyildiz, E.C., Weilian Su and Y. Sankarasubramaniam, "A Survey on sensor network", IEEE Communications Magazine, , pp. 102-114, August 2002. [DOI:10.1109/MCOM.2002.1024422]
2. [2] I.F. Akyildiz, et al., "Wireless sensor networks: a survey", Computer Networks, pp. 393-422. 20 December 2002. [DOI:10.1016/S1389-1286(01)00302-4]
3. [3[ CH. CHEE-YEE and P. SRIKANTA, "Sensor Networks: Evolution, Opportunities,and Challenges", PROCEEDINGS OF THE IEEE, Vol. 91, no. 8, pp. 1247-1256, 2003. [DOI:10.1109/JPROC.2003.814918]
4. [4] B. Barekatain, S. Dehghani, and M. Pourzaferani, "An Energy-Aware Routing Protocol for Wireless Sensor Networks Based on new combination of Genetic Algorithm & k-means", The Third Information Systems International Conference, vol.72, pp. 552 - 560, 2015. [DOI:10.1016/j.procs.2015.12.163]
5. [5[ J. Yick, B. Mukherjee, and D.G., "Wireless sensor network survey", Computer Networks, vol. 7, pp. 2292-2330, April 2008. [DOI:10.1016/j.comnet.2008.04.002]
6. [6] S. Liu1, Y.T. and Y. Liu2, "A survey of transport protocol for wireless sensor networks",Yichang IEEE, 2012. [DOI:10.1109/CECNet.2012.6202037] [PMCID]
7. [7] I. Butun, S.D. Morgera, and R. Sankar, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks", IEEE COMMUNICATIONS SURVEYS & TUTORIALS, vol. 16, no. 1, pp. 266-282, 2014. [DOI:10.1109/SURV.2013.050113.00191]
8. [8] I.F. Akyildiz, et al., "Wireless sensor networks: a survey", Computer Networks, pp. 393-422, 2002. [DOI:10.1016/S1389-1286(01)00302-4]
9. [9] J. LIANG, M. LIU, and X. KUI, "A Survey of Coverage Problems in Wireless Sensor Networks", IFSA Publishing, Vol. 163 (1), pp. 240-246, 2014.
10. [10] S. Debnath, , A.K. Singh, and A. Hossain, "A Comprehensive Survey of Coverage Problem and Efficient Sensor Deployment Strategies in Wireless Sensor Networks", Indian Journal of Science and Technology, vol. 9(45), pp. 1-6, December 2016. [DOI:10.17485/ijst/2016/v9i45/99032]
11. [11] J. Yu, , S. Wan, and X. Cheng, "Coverage Contribution Area Based k -Coverage for Wireless Sensor Networks", IEEE Vehicular Technology Society, vol. 66(9), pp. 8510 - 8523, Sept.2017. [DOI:10.1109/TVT.2017.2681692]
12. [12]. A. Malik, P.A.a., "Hole Detection for Quantifying Connectivity in Wireless Sensor Networks", Journal of Computer Networks and Communications, Vol. 2014, pp. 11, 2014. [DOI:10.1155/2014/969501]
13. [13] S. Dehghani, B. Barekatain, and M. Pourzaferani, "An Enhanced Energy-Aware Cluster-Based Routing Algorithm in Wireless Sensor Networks", Wireless Personal Communications, no.98(1), pp. 1605-163. January 2018. [DOI:10.1007/s11277-017-4937-1]
14. [14] A. Ghosha and S.K. Dasb, "Coverage and connectivity issues in wireless sensor networks", Pervasive and Mobile Computing, pp. 303-334, 2008. [DOI:10.1016/j.pmcj.2008.02.001]
15. [15] S. Zhai, , Z. Tang, and D. Wang,"Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization", Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), July 2017. [DOI:10.1109/CSE-EUC.2017.231]
16. [16] D. Jewel, et al., "Improved Hole Detection Healing and Replacing Algorithm for Optimal Coverage in Wireless Sensor Networks", Department of Computer Science and Engineering, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, April 2016, no. 2(2), pp. 724-731.
17. [17] T. Amgoth, and a.K. Jana, "Coverage hole detection and restoration algorithm for wireless sensor networks", Peer-to-Peer Networking and Applications, no. 10(1), pp. 66-78, January 2017. [DOI:10.1007/s12083-015-0407-2]
18. [18] C. Qiu, H. Shen, and K. Chen, "An Energy-Efficient and Distributed Cooperation Mechanism fork-Coverage Hole Detection and Healing in WSNs", IEEE Transactions on Mobile Computing, no.17(6), pp. 1247 - 1259. 2018. [DOI:10.1109/TMC.2017.2767048]
19. [19] G. Wang, G. Cao, and T. LaPorta, "A bidding protocol for deploying mobile sensors, in Network Protocols", Proceedings 11th IEEE International Conference on. 2003. IEEE. 2003.
20. [20] Y. Wang, J. Gao, and J.S.B. Mitchell, "Boundary recognition in sensor networks by topological methods", The ACM Guide to Computing Literature, pp. 122-133, 2006. [DOI:10.1145/1161089.1161104]
21. [21] Chu, W.-C. and K.-F. Ssu, "Location-free boundary detection in mobile wireless sensor networks with a distributed approach", Computer Networks, no. 70, pp. 96-112. 2014. [DOI:10.1016/j.comnet.2014.05.005]
22. [22] M. Naderan, M. Dehghan, and H. Pedram, "Sensing task assignment via sensor selection for maximum target coverage in WSNs", Journal of Network and Computer Applications, no. 36(1), pp. 262-273, 2013. [DOI:10.1016/j.jnca.2012.06.003]
23. [23] Z. Kang, H. Yu1, and Q. Xiong, "Detection and Recovery of Coverage Holes in Wireless Sensor Networks", JOURNAL OF NETWORKS, vol. 8, no.4, pp. 822-828, 2013. [DOI:10.4304/jnw.8.4.822-828]
24. [24] N.N. Dezfuli, and H. Barati, "Distributed energy efficient algorithm for ensuring coverage of wireless sensor networks", Institution of Engineering and Technology 2019. vol.13(5), pp. 578 - 584, 2019. [DOI:10.1049/iet-com.2018.5329]
25. [25] A. Maheshwari, and N. Chand, "A Survey on Wireless Sensor Networks Coverage Problems", Proceedings of 2nd International Conference on Communication, Computing and Networking,. vol. 46, pp. 153-164, 2019. [DOI:10.1007/978-981-13-1217-5_16]
26. [26] P. Corke, R. Peterson, and D. Rus, "Finding holes in sensor networks", IEEE Workshop on Omniscient Space: Robot Control, 2007.
27. [27] J. Yang, and Z. Fei. HDAR: Hole detection and adaptive geographic routing for ad hoc networks. in Computer Communications and Networks (ICCCN), 2010 Proceedings of 19th International Conference on. 2010. IEEE. [DOI:10.1109/ICCCN.2010.5560012]
28. [28] E. Zhao, , et al., "A coverage hole detection method and improvement scheme in WSNs", in Electric Information and Control Engineering (ICEICE), 2011 International Conference on. 2011. IEEE.
29. [29] I.M. Khan, , N. Jabeur, and S. Zeadally, "Hop-based approach for holes and boundary detection in wireless sensor networks", IET Wireless Sensor Systems, no. 2(4), pp. 328-337, 2012. [DOI:10.1049/iet-wss.2012.0076]
30. [30] Y. Zhang, et al., "HDRE: Coverage Hole Detection with Residual Energy in Wireless Sensor Networks," JOURNAL OF COMMUNICATIONS AND NETWORKS, vol. 16, no. 5, pp. 493-501, 2014. [DOI:10.1109/JCN.2014.000088]
31. [31] J.K.a.B. Kaur, "BHDP Using Fuzzy Logic Algorithm for Wireless Sensor Network under Black Hole Attack", International Journal of Advance Research in Computer Science and Management Studies, vol. 2(9), pp. 142-151, 2014.
32. [32] N.J.P.a.R.H. Jhaveri , "Detecting Packet Dropping Misbehaving Nodes using Support Vector Machine (SVM) in MANET", International Journal of Computer Applications,. Vol. 122 , No.4, pp. 26-32, 2015. [DOI:10.5120/21689-4794]
33. [33] S. Ramazani, et al., "Topological and combinatorial coverage hole detection in coordinate-free wireless sensor networks", Int. J. Ad Hoc and Ubiquitous Computing. X, pp. 1-12.
34. [34] L. Yi, et al., "Localized Confident Information Coverage Hole Detection in Internet of Things for Radioactive Pollution Monitoring", IEEE vol. 5, pp. 18665 - 18674, 2017. [DOI:10.1109/ACCESS.2017.2754269]
35. [35] A. M.Khed, W. Osamy, and A. Salim, "Distributed coverage hole detection and recovery scheme for heterogeneous wireless sensor networks", Computer Communications,. vol. 124, pp. 61-75, June 2018. [DOI:10.1016/j.comcom.2018.04.002]
36. [36] M. Verma, and S. Sharma, "A Greedy Approach for Coverage Hole Detection and Restoration in Wireless Sensor Networks", Wireless Personal Communications, vol. 101(1), pp. 75-86, July 2018. [DOI:10.1007/s11277-018-5668-7]
37. [37] X. Shen, , K. Liu, and M. Ye, "Sweep coverage optimization for mobile sensor networks in multi-obstacles scene", Tenth International Conference on Advanced Computational Intelligence (ICACI), pp. 1-10, 2018. [DOI:10.1109/ICACI.2018.8377587]
38. [38] X. Deng, et al., "Detecting Confident Information Coverage Holes in Industrial Internet of Things: An Energy-Efficient Perspective", IEEE Communications Magazine,. vol. 56(9), pp. 68 - 73, 2018. [DOI:10.1109/MCOM.2018.1701195]
39. [39] Y. Liu, et al., "Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security, IEEE Transactions on Network Science and Engineering, vol. 7(1), pp. 356 - 372. 2018. [DOI:10.1109/TNSE.2018.2881152]
40. [40] X. Dang, C. Shao, and Z. Hao, "Target Detection Coverage Algorithm Based on 3D-Voronoi Partition for Three-Dimensional Wireless Sensor Networks", Mobile Information Systems, pp. 15-34. 2019. [DOI:10.1155/2019/7542324]
41. [41] S. Karmakar, and A. Roy, "Holes detection in wireless sensor networks: a survey", International Journal of Modern Education and Computer Science, vol. 6(4), pp. 24, 2014. [DOI:10.5815/ijmecs.2014.04.04]
42. [42] K. Chatterjee, "Mathematical foundations of computer science", pp.866, 2013. [DOI:10.1007/978-3-642-40313-2]

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2015 All Rights Reserved | Signal and Data Processing