دوره 18، شماره 2 - ( 7-1400 )                   جلد 18 شماره 2 صفحات 96-75 | برگشت به فهرست نسخه ها


XML English Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Yousefpour M, Barekatain B. A Novel Efficient Energy-Aware Coverage Hole Detection Algorithm in Wireless Sensor Networks. JSDP 2021; 18 (2) :75-96
URL: http://jsdp.rcisp.ac.ir/article-1-1014-fa.html
یوسف پور مریم، برکتین بهرنگ. یک الگوریتم آگاه از انرژی نوین جهت تشخیص مؤثر حفره پوششی در شبکه‌های حس‌گر بی‌سیم. پردازش علائم و داده‌ها. 1400; 18 (2) :75-96

URL: http://jsdp.rcisp.ac.ir/article-1-1014-fa.html


مرکز تحقیقات کلان داده، واحد نجف‌آباد، دانشگاه آزاد اسلامی
چکیده:   (1733 مشاهده)
مهم‌ترین مانع بر سر افزایش سطح پوشش در شبکه­‌های بی‌سیم، مصرف انرژی حس‌گرها است که باعث اتمام انرژی آن‌ها می­‌شود. این رخداد به‌عنوان یک مسأله بحرانی با نام حفره پوششی شناخته‌ می­‌شود و در آن منطقه خاصی تحت پوشش هیچ حس‌گری نیست. درنتیجه رخدادهای واقعی در آن نقاط قابل‌شناسایی و ردیابی نخواهند بود. در این راستا،‌ این پژوهش یک الگوریتم نوین مبتنی بر سامانه مدیریت اعتماد اعتبار در شبکه‌های حس‌گر بی‌سیم را جهت بیشینه‌سازی میزان پوشش‌دهی ‌شبکه با تنظیم هوشمندانه شعاع حس‌گری گره‌ها معرفی کرده است. این الگوریتم میزان حفره پوششی را با استفاده از ماشین بردار پشتیبان و ضمن مصرف کم انرژی در شبکه، به‌طور چشم‌گیری کاهش می­‌دهد. به عبارتی، با جمع‌آوری اطلاعات در بازه زمانی‌های مختلف و تعاملات بین گره‌ها، میزان رضایت‌مندی آن‌ها ارزیابی و بر این اساس پاداش یا جریمه‌ای برای آن‌ها در نظر گرفته می‌شود. ارزیابی‌ها نشان می‌دهند که طول عمر شبکه و اندازه شعاع حس‌گری گره‌ها به‌لحاظ تعداد گره‌های حس‌گر در محیطی با در‌نظر‌گرفتن شعاع متحرک گره‌ها، گره‌های متحرک و آتوماتای سلولی در مقایسه با محیطی با در‌نظر‌گرفتن شعاع ثابت گره‌ها، گره‌های متحرک و بدون آتوماتای سلولی به‌ترتیب معادل 42/12% و 4/20% بهبود یافته‌اند.
متن کامل [PDF 2340 kb]   (644 دریافت)    
نوع مطالعه: پژوهشي | موضوع مقاله: مقالات گروه امنیت اطلاعات
دریافت: 1398/2/16 | پذیرش: 1399/5/29 | انتشار: 1400/7/17 | انتشار الکترونیک: 1400/7/17

فهرست منابع
1. [1] I. F.Akyildiz, E.C., Weilian Su and Y. Sankarasubramaniam, "A Survey on sensor network", IEEE Communications Magazine, , pp. 102-114, August 2002. [DOI:10.1109/MCOM.2002.1024422]
2. [2] I.F. Akyildiz, et al., "Wireless sensor networks: a survey", Computer Networks, pp. 393-422. 20 December 2002. [DOI:10.1016/S1389-1286(01)00302-4]
3. [3[ CH. CHEE-YEE and P. SRIKANTA, "Sensor Networks: Evolution, Opportunities,and Challenges", PROCEEDINGS OF THE IEEE, Vol. 91, no. 8, pp. 1247-1256, 2003. [DOI:10.1109/JPROC.2003.814918]
4. [4] B. Barekatain, S. Dehghani, and M. Pourzaferani, "An Energy-Aware Routing Protocol for Wireless Sensor Networks Based on new combination of Genetic Algorithm & k-means", The Third Information Systems International Conference, vol.72, pp. 552 - 560, 2015. [DOI:10.1016/j.procs.2015.12.163]
5. [5[ J. Yick, B. Mukherjee, and D.G., "Wireless sensor network survey", Computer Networks, vol. 7, pp. 2292-2330, April 2008. [DOI:10.1016/j.comnet.2008.04.002]
6. [6] S. Liu1, Y.T. and Y. Liu2, "A survey of transport protocol for wireless sensor networks",Yichang IEEE, 2012. [DOI:10.1109/CECNet.2012.6202037] [PMCID]
7. [7] I. Butun, S.D. Morgera, and R. Sankar, "A Survey of Intrusion Detection Systems in Wireless Sensor Networks", IEEE COMMUNICATIONS SURVEYS & TUTORIALS, vol. 16, no. 1, pp. 266-282, 2014. [DOI:10.1109/SURV.2013.050113.00191]
8. [8] I.F. Akyildiz, et al., "Wireless sensor networks: a survey", Computer Networks, pp. 393-422, 2002. [DOI:10.1016/S1389-1286(01)00302-4]
9. [9] J. LIANG, M. LIU, and X. KUI, "A Survey of Coverage Problems in Wireless Sensor Networks", IFSA Publishing, Vol. 163 (1), pp. 240-246, 2014.
10. [10] S. Debnath, , A.K. Singh, and A. Hossain, "A Comprehensive Survey of Coverage Problem and Efficient Sensor Deployment Strategies in Wireless Sensor Networks", Indian Journal of Science and Technology, vol. 9(45), pp. 1-6, December 2016. [DOI:10.17485/ijst/2016/v9i45/99032]
11. [11] J. Yu, , S. Wan, and X. Cheng, "Coverage Contribution Area Based k -Coverage for Wireless Sensor Networks", IEEE Vehicular Technology Society, vol. 66(9), pp. 8510 - 8523, Sept.2017. [DOI:10.1109/TVT.2017.2681692]
12. [12]. A. Malik, P.A.a., "Hole Detection for Quantifying Connectivity in Wireless Sensor Networks", Journal of Computer Networks and Communications, Vol. 2014, pp. 11, 2014. [DOI:10.1155/2014/969501]
13. [13] S. Dehghani, B. Barekatain, and M. Pourzaferani, "An Enhanced Energy-Aware Cluster-Based Routing Algorithm in Wireless Sensor Networks", Wireless Personal Communications, no.98(1), pp. 1605-163. January 2018. [DOI:10.1007/s11277-017-4937-1]
14. [14] A. Ghosha and S.K. Dasb, "Coverage and connectivity issues in wireless sensor networks", Pervasive and Mobile Computing, pp. 303-334, 2008. [DOI:10.1016/j.pmcj.2008.02.001]
15. [15] S. Zhai, , Z. Tang, and D. Wang,"Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization", Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), July 2017. [DOI:10.1109/CSE-EUC.2017.231]
16. [16] D. Jewel, et al., "Improved Hole Detection Healing and Replacing Algorithm for Optimal Coverage in Wireless Sensor Networks", Department of Computer Science and Engineering, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, April 2016, no. 2(2), pp. 724-731.
17. [17] T. Amgoth, and a.K. Jana, "Coverage hole detection and restoration algorithm for wireless sensor networks", Peer-to-Peer Networking and Applications, no. 10(1), pp. 66-78, January 2017. [DOI:10.1007/s12083-015-0407-2]
18. [18] C. Qiu, H. Shen, and K. Chen, "An Energy-Efficient and Distributed Cooperation Mechanism fork-Coverage Hole Detection and Healing in WSNs", IEEE Transactions on Mobile Computing, no.17(6), pp. 1247 - 1259. 2018. [DOI:10.1109/TMC.2017.2767048]
19. [19] G. Wang, G. Cao, and T. LaPorta, "A bidding protocol for deploying mobile sensors, in Network Protocols", Proceedings 11th IEEE International Conference on. 2003. IEEE. 2003.
20. [20] Y. Wang, J. Gao, and J.S.B. Mitchell, "Boundary recognition in sensor networks by topological methods", The ACM Guide to Computing Literature, pp. 122-133, 2006. [DOI:10.1145/1161089.1161104]
21. [21] Chu, W.-C. and K.-F. Ssu, "Location-free boundary detection in mobile wireless sensor networks with a distributed approach", Computer Networks, no. 70, pp. 96-112. 2014. [DOI:10.1016/j.comnet.2014.05.005]
22. [22] M. Naderan, M. Dehghan, and H. Pedram, "Sensing task assignment via sensor selection for maximum target coverage in WSNs", Journal of Network and Computer Applications, no. 36(1), pp. 262-273, 2013. [DOI:10.1016/j.jnca.2012.06.003]
23. [23] Z. Kang, H. Yu1, and Q. Xiong, "Detection and Recovery of Coverage Holes in Wireless Sensor Networks", JOURNAL OF NETWORKS, vol. 8, no.4, pp. 822-828, 2013. [DOI:10.4304/jnw.8.4.822-828]
24. [24] N.N. Dezfuli, and H. Barati, "Distributed energy efficient algorithm for ensuring coverage of wireless sensor networks", Institution of Engineering and Technology 2019. vol.13(5), pp. 578 - 584, 2019. [DOI:10.1049/iet-com.2018.5329]
25. [25] A. Maheshwari, and N. Chand, "A Survey on Wireless Sensor Networks Coverage Problems", Proceedings of 2nd International Conference on Communication, Computing and Networking,. vol. 46, pp. 153-164, 2019. [DOI:10.1007/978-981-13-1217-5_16]
26. [26] P. Corke, R. Peterson, and D. Rus, "Finding holes in sensor networks", IEEE Workshop on Omniscient Space: Robot Control, 2007.
27. [27] J. Yang, and Z. Fei. HDAR: Hole detection and adaptive geographic routing for ad hoc networks. in Computer Communications and Networks (ICCCN), 2010 Proceedings of 19th International Conference on. 2010. IEEE. [DOI:10.1109/ICCCN.2010.5560012]
28. [28] E. Zhao, , et al., "A coverage hole detection method and improvement scheme in WSNs", in Electric Information and Control Engineering (ICEICE), 2011 International Conference on. 2011. IEEE.
29. [29] I.M. Khan, , N. Jabeur, and S. Zeadally, "Hop-based approach for holes and boundary detection in wireless sensor networks", IET Wireless Sensor Systems, no. 2(4), pp. 328-337, 2012. [DOI:10.1049/iet-wss.2012.0076]
30. [30] Y. Zhang, et al., "HDRE: Coverage Hole Detection with Residual Energy in Wireless Sensor Networks," JOURNAL OF COMMUNICATIONS AND NETWORKS, vol. 16, no. 5, pp. 493-501, 2014. [DOI:10.1109/JCN.2014.000088]
31. [31] J.K.a.B. Kaur, "BHDP Using Fuzzy Logic Algorithm for Wireless Sensor Network under Black Hole Attack", International Journal of Advance Research in Computer Science and Management Studies, vol. 2(9), pp. 142-151, 2014.
32. [32] N.J.P.a.R.H. Jhaveri , "Detecting Packet Dropping Misbehaving Nodes using Support Vector Machine (SVM) in MANET", International Journal of Computer Applications,. Vol. 122 , No.4, pp. 26-32, 2015. [DOI:10.5120/21689-4794]
33. [33] S. Ramazani, et al., "Topological and combinatorial coverage hole detection in coordinate-free wireless sensor networks", Int. J. Ad Hoc and Ubiquitous Computing. X, pp. 1-12.
34. [34] L. Yi, et al., "Localized Confident Information Coverage Hole Detection in Internet of Things for Radioactive Pollution Monitoring", IEEE vol. 5, pp. 18665 - 18674, 2017. [DOI:10.1109/ACCESS.2017.2754269]
35. [35] A. M.Khed, W. Osamy, and A. Salim, "Distributed coverage hole detection and recovery scheme for heterogeneous wireless sensor networks", Computer Communications,. vol. 124, pp. 61-75, June 2018. [DOI:10.1016/j.comcom.2018.04.002]
36. [36] M. Verma, and S. Sharma, "A Greedy Approach for Coverage Hole Detection and Restoration in Wireless Sensor Networks", Wireless Personal Communications, vol. 101(1), pp. 75-86, July 2018. [DOI:10.1007/s11277-018-5668-7]
37. [37] X. Shen, , K. Liu, and M. Ye, "Sweep coverage optimization for mobile sensor networks in multi-obstacles scene", Tenth International Conference on Advanced Computational Intelligence (ICACI), pp. 1-10, 2018. [DOI:10.1109/ICACI.2018.8377587]
38. [38] X. Deng, et al., "Detecting Confident Information Coverage Holes in Industrial Internet of Things: An Energy-Efficient Perspective", IEEE Communications Magazine,. vol. 56(9), pp. 68 - 73, 2018. [DOI:10.1109/MCOM.2018.1701195]
39. [39] Y. Liu, et al., "Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security, IEEE Transactions on Network Science and Engineering, vol. 7(1), pp. 356 - 372. 2018. [DOI:10.1109/TNSE.2018.2881152]
40. [40] X. Dang, C. Shao, and Z. Hao, "Target Detection Coverage Algorithm Based on 3D-Voronoi Partition for Three-Dimensional Wireless Sensor Networks", Mobile Information Systems, pp. 15-34. 2019. [DOI:10.1155/2019/7542324]
41. [41] S. Karmakar, and A. Roy, "Holes detection in wireless sensor networks: a survey", International Journal of Modern Education and Computer Science, vol. 6(4), pp. 24, 2014. [DOI:10.5815/ijmecs.2014.04.04]
42. [42] K. Chatterjee, "Mathematical foundations of computer science", pp.866, 2013. [DOI:10.1007/978-3-642-40313-2]

ارسال نظر درباره این مقاله : نام کاربری یا پست الکترونیک شما:
CAPTCHA

ارسال پیام به نویسنده مسئول


بازنشر اطلاعات
Creative Commons License این مقاله تحت شرایط Creative Commons Attribution-NonCommercial 4.0 International License قابل بازنشر است.

کلیه حقوق این تارنما متعلق به فصل‌نامة علمی - پژوهشی پردازش علائم و داده‌ها است.