1. [1] I. F.Akyildiz, E.C., Weilian Su and Y. Sankarasubramaniam, "A Survey on sensor network", IEEE Communications Magazine, , pp. 102-114, August 2002. [
DOI:10.1109/MCOM.2002.1024422]
2. [2] I.F. Akyildiz, et al., "Wireless sensor networks: a survey", Computer Networks, pp. 393-422. 20 December 2002. [
DOI:10.1016/S1389-1286(01)00302-4]
3. [3[ CH. CHEE-YEE and P. SRIKANTA, "Sensor Networks: Evolution, Opportunities,and Challenges", PROCEEDINGS OF THE IEEE, Vol. 91, no. 8, pp. 1247-1256, 2003. [
DOI:10.1109/JPROC.2003.814918]
4. [4] B. Barekatain, S. Dehghani, and M. Pourzaferani, "An Energy-Aware Routing Protocol for Wireless Sensor Networks Based on new combination of Genetic Algorithm & k-means", The Third Information Systems International Conference, vol.72, pp. 552 - 560, 2015. [
DOI:10.1016/j.procs.2015.12.163]
5. [5[ J. Yick, B. Mukherjee, and D.G., "Wireless sensor network survey", Computer Networks, vol. 7, pp. 2292-2330, April 2008. [
DOI:10.1016/j.comnet.2008.04.002]
6. [6] S. Liu1, Y.T. and Y. Liu2, "A survey of transport protocol for wireless sensor networks",Yichang IEEE, 2012. [
DOI:10.1109/CECNet.2012.6202037] [
PMCID]
7. [7] I. Butun, S.D. Morgera, and R. Sankar, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks", IEEE COMMUNICATIONS SURVEYS & TUTORIALS, vol. 16, no. 1, pp. 266-282, 2014. [
DOI:10.1109/SURV.2013.050113.00191]
8. [8] I.F. Akyildiz, et al., "Wireless sensor networks: a survey", Computer Networks, pp. 393-422, 2002. [
DOI:10.1016/S1389-1286(01)00302-4]
9. [9] J. LIANG, M. LIU, and X. KUI, "A Survey of Coverage Problems in Wireless Sensor Networks", IFSA Publishing, Vol. 163 (1), pp. 240-246, 2014.
10. [10] S. Debnath, , A.K. Singh, and A. Hossain, "A Comprehensive Survey of Coverage Problem and Efficient Sensor Deployment Strategies in Wireless Sensor Networks", Indian Journal of Science and Technology, vol. 9(45), pp. 1-6, December 2016. [
DOI:10.17485/ijst/2016/v9i45/99032]
11. [11] J. Yu, , S. Wan, and X. Cheng, "Coverage Contribution Area Based k -Coverage for Wireless Sensor Networks", IEEE Vehicular Technology Society, vol. 66(9), pp. 8510 - 8523, Sept.2017. [
DOI:10.1109/TVT.2017.2681692]
12. [12]. A. Malik, P.A.a., "Hole Detection for Quantifying Connectivity in Wireless Sensor Networks", Journal of Computer Networks and Communications, Vol. 2014, pp. 11, 2014. [
DOI:10.1155/2014/969501]
13. [13] S. Dehghani, B. Barekatain, and M. Pourzaferani, "An Enhanced Energy-Aware Cluster-Based Routing Algorithm in Wireless Sensor Networks", Wireless Personal Communications, no.98(1), pp. 1605-163. January 2018. [
DOI:10.1007/s11277-017-4937-1]
14. [14] A. Ghosha and S.K. Dasb, "Coverage and connectivity issues in wireless sensor networks", Pervasive and Mobile Computing, pp. 303-334, 2008. [
DOI:10.1016/j.pmcj.2008.02.001]
15. [15] S. Zhai, , Z. Tang, and D. Wang,"Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization", Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), July 2017. [
DOI:10.1109/CSE-EUC.2017.231]
16. [16] D. Jewel, et al., "Improved Hole Detection Healing and Replacing Algorithm for Optimal Coverage in Wireless Sensor Networks", Department of Computer Science and Engineering, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, April 2016, no. 2(2), pp. 724-731.
17. [17] T. Amgoth, and a.K. Jana, "Coverage hole detection and restoration algorithm for wireless sensor networks", Peer-to-Peer Networking and Applications, no. 10(1), pp. 66-78, January 2017. [
DOI:10.1007/s12083-015-0407-2]
18. [18] C. Qiu, H. Shen, and K. Chen, "An Energy-Efficient and Distributed Cooperation Mechanism fork-Coverage Hole Detection and Healing in WSNs", IEEE Transactions on Mobile Computing, no.17(6), pp. 1247 - 1259. 2018. [
DOI:10.1109/TMC.2017.2767048]
19. [19] G. Wang, G. Cao, and T. LaPorta, "A bidding protocol for deploying mobile sensors, in Network Protocols", Proceedings 11th IEEE International Conference on. 2003. IEEE. 2003.
20. [20] Y. Wang, J. Gao, and J.S.B. Mitchell, "Boundary recognition in sensor networks by topological methods", The ACM Guide to Computing Literature, pp. 122-133, 2006. [
DOI:10.1145/1161089.1161104]
21. [21] Chu, W.-C. and K.-F. Ssu, "Location-free boundary detection in mobile wireless sensor networks with a distributed approach", Computer Networks, no. 70, pp. 96-112. 2014. [
DOI:10.1016/j.comnet.2014.05.005]
22. [22] M. Naderan, M. Dehghan, and H. Pedram, "Sensing task assignment via sensor selection for maximum target coverage in WSNs", Journal of Network and Computer Applications, no. 36(1), pp. 262-273, 2013. [
DOI:10.1016/j.jnca.2012.06.003]
23. [23] Z. Kang, H. Yu1, and Q. Xiong, "Detection and Recovery of Coverage Holes in Wireless Sensor Networks", JOURNAL OF NETWORKS, vol. 8, no.4, pp. 822-828, 2013. [
DOI:10.4304/jnw.8.4.822-828]
24. [24] N.N. Dezfuli, and H. Barati, "Distributed energy efficient algorithm for ensuring coverage of wireless sensor networks", Institution of Engineering and Technology 2019. vol.13(5), pp. 578 - 584, 2019. [
DOI:10.1049/iet-com.2018.5329]
25. [25] A. Maheshwari, and N. Chand, "A Survey on Wireless Sensor Networks Coverage Problems", Proceedings of 2nd International Conference on Communication, Computing and Networking,. vol. 46, pp. 153-164, 2019. [
DOI:10.1007/978-981-13-1217-5_16]
26. [26] P. Corke, R. Peterson, and D. Rus, "Finding holes in sensor networks", IEEE Workshop on Omniscient Space: Robot Control, 2007.
27. [27] J. Yang, and Z. Fei. HDAR: Hole detection and adaptive geographic routing for ad hoc networks. in Computer Communications and Networks (ICCCN), 2010 Proceedings of 19th International Conference on. 2010. IEEE. [
DOI:10.1109/ICCCN.2010.5560012]
28. [28] E. Zhao, , et al., "A coverage hole detection method and improvement scheme in WSNs", in Electric Information and Control Engineering (ICEICE), 2011 International Conference on. 2011. IEEE.
29. [29] I.M. Khan, , N. Jabeur, and S. Zeadally, "Hop-based approach for holes and boundary detection in wireless sensor networks", IET Wireless Sensor Systems, no. 2(4), pp. 328-337, 2012. [
DOI:10.1049/iet-wss.2012.0076]
30. [30] Y. Zhang, et al., "HDRE: Coverage Hole Detection with Residual Energy in Wireless Sensor Networks," JOURNAL OF COMMUNICATIONS AND NETWORKS, vol. 16, no. 5, pp. 493-501, 2014. [
DOI:10.1109/JCN.2014.000088]
31. [31] J.K.a.B. Kaur, "BHDP Using Fuzzy Logic Algorithm for Wireless Sensor Network under Black Hole Attack", International Journal of Advance Research in Computer Science and Management Studies, vol. 2(9), pp. 142-151, 2014.
32. [32] N.J.P.a.R.H. Jhaveri , "Detecting Packet Dropping Misbehaving Nodes using Support Vector Machine (SVM) in MANET", International Journal of Computer Applications,. Vol. 122 , No.4, pp. 26-32, 2015. [
DOI:10.5120/21689-4794]
33. [33] S. Ramazani, et al., "Topological and combinatorial coverage hole detection in coordinate-free wireless sensor networks", Int. J. Ad Hoc and Ubiquitous Computing. X, pp. 1-12.
34. [34] L. Yi, et al., "Localized Confident Information Coverage Hole Detection in Internet of Things for Radioactive Pollution Monitoring", IEEE vol. 5, pp. 18665 - 18674, 2017. [
DOI:10.1109/ACCESS.2017.2754269]
35. [35] A. M.Khed, W. Osamy, and A. Salim, "Distributed coverage hole detection and recovery scheme for heterogeneous wireless sensor networks", Computer Communications,. vol. 124, pp. 61-75, June 2018. [
DOI:10.1016/j.comcom.2018.04.002]
36. [36] M. Verma, and S. Sharma, "A Greedy Approach for Coverage Hole Detection and Restoration in Wireless Sensor Networks", Wireless Personal Communications, vol. 101(1), pp. 75-86, July 2018. [
DOI:10.1007/s11277-018-5668-7]
37. [37] X. Shen, , K. Liu, and M. Ye, "Sweep coverage optimization for mobile sensor networks in multi-obstacles scene", Tenth International Conference on Advanced Computational Intelligence (ICACI), pp. 1-10, 2018. [
DOI:10.1109/ICACI.2018.8377587]
38. [38] X. Deng, et al., "Detecting Confident Information Coverage Holes in Industrial Internet of Things: An Energy-Efficient Perspective", IEEE Communications Magazine,. vol. 56(9), pp. 68 - 73, 2018. [
DOI:10.1109/MCOM.2018.1701195]
39. [39] Y. Liu, et al., "Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security, IEEE Transactions on Network Science and Engineering, vol. 7(1), pp. 356 - 372. 2018. [
DOI:10.1109/TNSE.2018.2881152]
40. [40] X. Dang, C. Shao, and Z. Hao, "Target Detection Coverage Algorithm Based on 3D-Voronoi Partition for Three-Dimensional Wireless Sensor Networks", Mobile Information Systems, pp. 15-34. 2019. [
DOI:10.1155/2019/7542324]
41. [41] S. Karmakar, and A. Roy, "Holes detection in wireless sensor networks: a survey", International Journal of Modern Education and Computer Science, vol. 6(4), pp. 24, 2014. [
DOI:10.5815/ijmecs.2014.04.04]
42. [42] K. Chatterjee, "Mathematical foundations of computer science", pp.866, 2013. [
DOI:10.1007/978-3-642-40313-2]