Skip to main content

Advertisement

Log in

A Novel Redundant Hole Identification and Healing Algorithm for a Homogeneous Distributed Wireless Sensor Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The Quality of Service of a Wireless Sensor Network depends mainly on how perfectly the required area is covered. The work aims at identifying the coverage hole in the region of interest using the advanced Delaunay technique. Secondly, the healing process is initiated through the identification of the redundant node. Unlike the basic distance and energy parameter, the number of occurrences of the redundant node in the redundancy map is also taken into consideration which helps to choose the best redundant node. The third objective of the work is to devise a cooperative incomplete game for the process of healing to have a better coverage based on the average leftover energy and distance of the run. The sizing of the coverage hole after each run of the algorithm helps to check if the required threshold level of coverage is reached. To reduce the number of healer node participating in the healing process the redundancy in the hole point is identified so as to heal more than one hole at a time. It is shown that if we adopt a variable sensing range along with the random mobility pattern in healing the best coverage can be achieved. The coverage improvement with the sensing radius of 15 m is about 14% better than the conventional technique with the hole area being 89.59% lesser after healing. The total distance moved to heal is 59.7% lesser with the average residual energy being 20.87% more in the proposed technique.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.

    Article  Google Scholar 

  2. Wang, G., Cao, G., La Porta, T., & Zhang, W. (2005). Sensor relocation in mobile sensor networks. In INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies. Proceedings IEEE (Vol. 4, pp. 2302–2312). IEEE.

  3. Wang, G., Cao, G., & La Porta, T. F. (2006). Movement-assisted sensor deployment. IEEE Transactions on Mobile Computing, 5(6), 640–652.

    Article  Google Scholar 

  4. Zou, Y. & Chakrabarty, K. (2003). Sensor deployment and target localization based on virtual forces,” In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE societies (Vol. 2, pp. 1293–1303). IEEE.

  5. Zhou, H., Wu, H., Xia, S., Jin, M., & Ding, N. (2011). A distributed triangulation algorithm for wireless sensor networks on 2D and 3D surface. In INFOCOM, 2011 proceedings IEEE (pp. 1053–1061). IEEE.

  6. Qiu, C., & Shen, H. (2014). A delaunay-based coordinate-free mechanism for full coverage in wireless sensor networks. IEEE Transactions on Parallel and Distributed System, 25(4), 828–839.

    Article  MathSciNet  Google Scholar 

  7. Zhao, E., Yao, J., Wang, H., & Lv, Y. (2011). A coverage hole detection method and improvement scheme in WSNs. In Electric information and control engineering (ICEICE), 2011 International Conference on (pp. 985–988). IEEE.

  8. Li, W., & Wu, Y. (2016). Tree-based coverage hole detection and healing method in wireless sensor networks. Computer Networks, 5(103), 33–43.

    Article  Google Scholar 

  9. Zhang, C., Zhang, Y., & Fang, Y. (2009). Localized algorithms for coverage boundary detection in wireless sensor networks. Wireless Networks, 15(1), 3–20.

    Article  Google Scholar 

  10. Zhang, C., Zhang, Y., & Fang, Y. (2006). Detecting coverage boundary nodes in wireless sensor networks. In Networking, sensing and control, 2006. ICNSC’06. Proceedings of the 2006 IEEE international conference on (pp. 868–873). IEEE.

  11. Chizari, H., Poston, T., Razak, S. A., Abdullah, A. H., & Salleh, S. (2014). Local coverage measurement algorithm in GPS-free wireless sensor networks. Ad Hoc Networks, 23, 1–7.

    Article  Google Scholar 

  12. Ma, H. C., Sahoo, P. K., & Chen, Y. W. (2011). Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks. Journal of Network and Computer Applications, 34(5), 1743–1756.

    Article  Google Scholar 

  13. Antil, P., & Malik, A. (2014). Hole detection for quantifying connectivity in wireless sensor networks: A survey. Journal of Computer Networks and Communications, 7, 2014.

    Google Scholar 

  14. Jabeur, N., Sahli, N., & Khan, I. M. (2013). Survey on sensor holes: A cause–effect–solution perspective. Procedia Computer Science, 1(19), 1074–1080.

    Article  Google Scholar 

  15. Ghrist, R. & Muhammad, A. (2005). Coverage and hole-detection in sensor networks via homology. In: Information processing in sensor networks, 2005. IPSN 2005. Fourth International Symposium on (pp. 254–260). IEEE.

  16. Lambrou, T. P. & Panayiotou, C. G. (2007). Collaborative event detection using mobile and stationary nodes in sensor networks. In: Collaborative computing: Networking, applications and worksharing, 2007, Collaborate Com 2007. International Conference on (pp. 106–115). IEEE.

  17. Lambrou, T. P., & Panayiotou, C. G. (2009). Collaborative area monitoring using wireless sensor networks with stationary and mobile nodes. EURASIP Journal on Advances in Signal Processing, 1(2009), 7.

    Google Scholar 

  18. Chizari, H., Hosseini, M., Poston, T., Razak, S. A., & Abdullah, A. H. (2011). Delaunay triangulation as a new coverage measurement method in wireless sensor network. Sensors, 11(3), 3163–3176.

    Article  Google Scholar 

  19. Khan, I. M., Jabeur, N., & Zeadally, S. (2012). Hop-based approach for holes and boundary detection in wireless sensor networks. IET Wireless Sensor Systems, 2(4), 328–337.

    Article  Google Scholar 

  20. Bejerano, Y. (2012). Coverage verification without location information. IEEE Transactions on Mobile Computing, 11(4), 631–643.

    Article  Google Scholar 

  21. Kasbekar, G. S., Bejerano, Y., & Sarkar, S. (2012). Generic coverage verification without location information using dimension reduction. IEEE/ACM Transactions on Networking, 20(6), 1991–2004.

    Article  Google Scholar 

  22. Kang, Z., Yu, H., & Xiong, Q. (2013). Detection and recovery of coverage holes in wireless sensor networks. Journal of Networks, 8(4), 822–828.

    Article  Google Scholar 

  23. De Silva, V., & Ghrist, R. (2006). Coordinate-free coverage in sensor networks with controlled boundaries via homology. The International Journal of Robotics Research, 25(12), 1205–1222.

    Article  MATH  Google Scholar 

  24. Chu, W. C., & Ssu, K. F. (2014). Location-free boundary detection in mobile wireless sensor networks with a distributed approach. Computer Networks, 9(70), 96–112.

    Article  Google Scholar 

  25. El Korbi, I., & Zeadally, S. (2014). Energy-aware sensor node relocation in mobile sensor networks. Ad Hoc Networks, 31(16), 247–265.

    Article  Google Scholar 

  26. Mahendrababu, K. & Joshitha, K. L. (2014) A solution to energy hole problem in wireless sensor networks using WITRICITY. In: Information communication and embedded systems (ICICES), 2014 international conference on (pp. 1–6). IEEE.

  27. Lakshmi Joshitha, K. & Jayashri, S. (2015). Location free approach for coverage verification in distributed wireless sensor network. International Journal of Applied Engineering Research, 10(20), 16084–16090. ISSN 0973-4562.

  28. Joshitha, K. L. & Jayashri, S. Modified coverage hole detection algorithm for distributed WSNs. LNCS. Elseviers.

  29. Fang, Q., Gao, J., & Guibas, L. J. (2006). Locating and bypassing holes in sensor networks. Mobile Networks and Applications, 11(2), 187–200.

    Article  Google Scholar 

  30. Senouci, M. R., Mellouk, A., & Assnoune, K. (2014). Localized movement-assisted sensor deployment algorithm for hole detection and healing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1267–1277.

    Article  Google Scholar 

  31. Abo-Zahhad, M., Sabor, N., Sasaki, S., & Ahmed, S. M. (2016). A centralized immune-Voronoi deployment algorithm for coverage maximization and energy conservation in mobile wireless sensor networks. Information Fusion, 31(30), 36–51.

    Article  Google Scholar 

  32. Li, W., & Zhang, W. (2015). Coverage hole and boundary nodes detection in wireless sensor networks. Journal of Network and Computer Applications, 28(48), 35–43.

    Article  Google Scholar 

  33. Qiu, C., & Shen, H. (2014). A delaunay-based coordinate-free mechanism for full coverage in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(4), 828–839.

    Article  MathSciNet  Google Scholar 

  34. Bai, F. & Helmy, A. (2004). A survey of mobility models. In Wireless Adhoc Networks, University of Southern California, USA. (Vol. 206, p. 147).

  35. Mehta, S., & Kwak, K. S. (2010). An energy-efficient MAC protocol in wireless sensor networks: A game theoretic approach. EURASIP Journal on Wireless Communications and Networking, 1, 926420.

    Article  Google Scholar 

  36. Milan, F., Jaramillo, J. J., & Srikant, R. (2006) Achieving cooperation in multihop wireless networks of selfish nodes. In Proceeding from the 2006 workshop on game theory for communications and networks (p. 3). ACM.

  37. Memon, I., Kumar, P., Memon, N. A., & Chowdhry, B. S. (2015). Secure coverage tree construction scheme for wireless sensor networks. Wireless Personal Communications, 82(1), 659–674.

    Article  Google Scholar 

  38. Singh, S., Chand, S., Kumar, R., Malik, A., & Kumar, B. (2016). NEECP: Novel energy-efficient clustering protocol for prolonging lifetime of WSNs. IET Wireless Sensor Systems., 6(5), 151–157.

    Article  Google Scholar 

  39. Hemavathi, N., & Sudha, S. (2016). A novel regression based clustering technique for wireless sensor networks. Wireless Personal Communications, 88(4), 985–1013.

    Article  Google Scholar 

  40. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000) Energy-efficient communication protocol for wireless microsensor networks. In System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on (p. 10). IEEE.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Lakshmi Joshitha.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Joshitha, K.L., Jayashri, S. A Novel Redundant Hole Identification and Healing Algorithm for a Homogeneous Distributed Wireless Sensor Network. Wireless Pers Commun 104, 1261–1282 (2019). https://doi.org/10.1007/s11277-018-6079-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-6079-5

Keywords

Navigation