Skip to main content

Advertisement

Log in

Development of Fuzzy Enabled Coverage Hole Detection Algorithm in Wireless Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The coverage hole problem in Wireless Sensor Networks (WSNs) is one of the most important problem. The data has to be communicated through the base station that every sensor node have to be communicated to the adjacent nodes within its communication area. The level of network connectivity is used to detect the coverage hole problem. The proposed fuzzy enabled coverage hole detection methodology is used to identify the coverage hole in the network. The communication links among the sensor nodes are maintained by the path construction. The adjacent nodes are identified based on the energy level for enhanced transmission. Fuzzy rules are constructed with the parameters of Energy, Communication with adjacent nodes and network coverage with the coverage hole is detected as the output of these rules. The experimental results show that the proposed methodology has improved performance for detecting the coverage hole with various parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig.4
Fig.5
Fig.6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Fu, X., Yao, H., & Yang, Y. (2019). Cascading failures in wireless sensor networks with load redistribution of links and nodes. Ad Hoc Networks, 93, 101900.

    Article  Google Scholar 

  2. Vijayakumar, K. P., Kumar, K. P. M., Kottilingam, K., Karthick, T., Vijayakumar, P., & Ganeshkumar, P. (2019). An adaptive neuro-fuzzy logic based jamming detection system in WSN. Soft Computing, 23(8), 2655–2667. https://doi.org/10.1007/s00500-018-3636-5

    Article  Google Scholar 

  3. Mohindru, V., Bhatt, R., & Singh, Y. (2019). Re authentication scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems, 23, 158–166.

    Google Scholar 

  4. Harold Robinson, Y., Golden Julie, E., Balaji, S., & Ayyasamy, A. (2017). Energy aware clustering scheme in wireless sensor network using neuro-fuzzy approach. Wireless Personal Communications, 95(2), 703–721.

    Article  Google Scholar 

  5. Parras, J., & Zazo, S. (2019). Learning attack mechanisms in wireless sensor networks using markov decision processes. Expert Systems with Applications, 122(15), 376–387.

    Article  Google Scholar 

  6. Shelke, M., Malhotra, A., & Mahalle, P. N. (2019). Fuzzy priority based intelligent traffic congestion control and emergency vehicle management using congestion-aware routing algorithm. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-019-01523-8

    Article  Google Scholar 

  7. Sun, Z., Liu, Y., & Tao, Li. (2018). Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization. Journal of Network and Computer Applications, 112(15), 29–40.

    Article  Google Scholar 

  8. Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., & Changlani, S. (2020). Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in wireless sensor networks (WSN). Computer Communications, 149, 134–145.

    Article  Google Scholar 

  9. Khedr, A. M., Osamy, W., & Salim, A. (2018). Distributed coverage hole detection and recovery scheme for heterogeneous wireless sensor networks. Computer Communications, 124, 61–75.

    Article  Google Scholar 

  10. Kalaikumar, K., & Baburaj, E. (2020). Fuzzy enabled congestion control by cross layer protocol utilizing OABC in WSN: Combining MAC, routing, non-similar clustering and efficient data delivery. Wireless Networks, 26, 1085–1103. https://doi.org/10.1007/s11276-018-1848-3

    Article  Google Scholar 

  11. Han, L., Zhou, M., Jia, W., Dalil, Z., & Xu, X. (2019). Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Information sciences, 476, 491–504.

    Article  Google Scholar 

  12. Elavarasan, R., & Chitra, K. (2020). An efficient fuzziness based contiguous node refining scheme with cross-layer routing path in WSN. Peer-to-Peer Networks Applications. https://doi.org/10.1007/s12083-019-00825-0

    Article  Google Scholar 

  13. López, M., Peinado, A., & Ortiz, A. (2019). An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks. Computer Networks, 165, 106945.

    Article  Google Scholar 

  14. Oh, S., Cho, H., Kim, S. H., Lee, W., & Lee, E. (2019). Continuous object tracking protocol with selective wakeup based on practical boundary prediction in wireless sensor networks. Computer Networks, 162, 106854.

    Article  Google Scholar 

  15. Arjunan, S., & Sujatha, P. (2018). Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol. Applied Intelligence, 48, 2229–2246. https://doi.org/10.1007/s10489-017-1077-y

    Article  Google Scholar 

  16. Harold Robinson, Y., & Golden Julie, E. (2019). MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks. Wireless Personal Communications, 109, 739–760.

    Article  Google Scholar 

  17. Sun, Z., Wei, M., Zhang, Z., & Gang, Qu. (2019). Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks. Applied Soft Computing, 77, 366–375.

    Article  Google Scholar 

  18. Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022.

    Article  Google Scholar 

  19. Yi, L., Deng, X., Zou, Z., Ding, D., & Yang, L. T. (2018). Confident information coverage hole detection in sensor networks for uranium tailing monitoring, . Journal of Parallel and Distributed Computing, 118(1), 57–66.

    Article  Google Scholar 

  20. Robinson, Y. H., Julie, E. G., Saravanan, K., & Kumar, R. (2020). DRP: Dynamic routing protocol in wireless sensor networks. Wireless Personal Communications, 111(1), 313–329.

    Article  Google Scholar 

  21. Le Nguyen, P., Nguyen, K., Vu, H., & Ji, Y. (2019). TELPAC: A time and energy efficient protocol for locating and patching coverage holes in WSNs. Journal of Network and Computer Applications, 147, 102439.

    Article  Google Scholar 

  22. Jean-MatthieuEtancelin, A. F., & FrédéricGuinand, M. R. (2019). DACYCLEM: A decentralized algorithm for maximizing coverage and lifetime in a mobile wireless sensor network. Ad Hoc Networks, 87(1), 174–187.

    Google Scholar 

  23. Harold Robinson, Y., Balaji, S., & Golden Julie, E. (2019). FPSOEE: Fuzzy-enabled particle swarm optimization-based energy-efficient algorithm in mobile ad-hoc networks. Journal of Intelligent & Fuzzy Systems, 36(4), 3541–3553.

    Article  Google Scholar 

  24. Kalaivanan, K., & Bhanumathi, V. (2018). Reliable location aware and Cluster-Tap Root based data collection protocol for large scale wireless sensor networks. Journal of Network and Computer Applications, 118(15), 83–101.

    Article  Google Scholar 

  25. Kumar, P., & Chaturvedi, A. (2018). Fuzzy-interval based probabilistic query generation models and fusion strategy for energy efficient wireless sensor networks. Computer Communications, 117, 46–57.

    Article  Google Scholar 

  26. Xie, J., Xiong, Z., Dai, Q., Wang, X., & Zhang, Y. (2019). A local-gravitation-based method for the detection of outliers and boundary points. Knowledge-Based Systems, 192, 105331.

    Article  Google Scholar 

  27. Khelil, A., Beghdad, R., & Khelloufi, A. (2020). 3HA: Hybrid hole healing algorithm in a wireless sensor networks. Wireless Personal Communications, 1–13

  28. Robinson, Y. H., & Rajaram, M. (2016). A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile ad hoc network. Wireless Personal Communications, 90(2), 769–791.

    Article  Google Scholar 

  29. Hadikhani, P., Eslaminejad, M., Yari, M., & Mahani, A. M. (2019). An energy-aware and load balanced distributed geographic routing algorithm for wireless sensor networks with dynamic hole. Wireless Networks. https://doi.org/10.1007/s11276-019-02157-6.

    Article  Google Scholar 

  30. Bhushan, B., & Sahoo, G. (2019). ISFC-BLS (intelligent and secured fuzzy clustering algorithm using balanced load sub-cluster formation) in WSN environment. Wireless Personal Communication. https://doi.org/10.1007/s11277-019-06948-0

    Article  Google Scholar 

  31. Feng, X., Zhang, X., Zhang, J., & Muhdhar, A. A. (2019). A coverage hole detection and repair algorithm in wireless sensor networks. Cluster Computing, 22(5), 12473–12480.

    Article  Google Scholar 

  32. Yan, F., Ma, W., Shen, F., Xia, W., & Shen, L. (2020). Connectivity based k-coverage hole detection in wireless sensor networks. Mobile Networks and Applications, 25(2), 783–793.

    Article  Google Scholar 

  33. Mittal, N. (2020). An energy efficient stable clustering approach using fuzzy type-2 bat flower pollinator for wireless sensor networks. Wireless PersCommun. https://doi.org/10.1007/s11277-020-07094-8

    Article  Google Scholar 

  34. Jain, A., & Goel, A. K. (2020). Energy efficient fuzzy routing protocol for wireless sensor networks. Wireless Personal Communications, 110, 1459–1474. https://doi.org/10.1007/s11277-019-06795-z

    Article  Google Scholar 

  35. Zain Eldin, H., Badawy, M., Elhosseini, M., Arafat, H., & Abraham, A. (2020). An improved dynamic deployment technique based-on genetic algorithm (IDDT-GA) for maximizing coverage in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-020-01698-5.

    Article  Google Scholar 

  36. Prithi, S., & Sumathi, S. (2020). LD2FA-PSO: A novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Networks, 97, 102024.

    Article  Google Scholar 

  37. Phoemphon, S., So-In, C., & Leelathakul, N. (2020). A hybrid localization model using node segmentation and improved particle swarm optimization with obstacle-awareness for wireless sensor networks. Expert Systems with Applications, 143, 113044.

    Article  Google Scholar 

  38. Das, R., Dash, D., & Sarkar, M. K. (2020). HTMS: Fuzzy based hierarchical trust management scheme in WSN. Wireless Personal Communications. https://doi.org/10.1007/s11277-020-07092-w

    Article  Google Scholar 

  39. Khalifa, B., Al Aghbari, Z., & Khedr, A. M. (2020). A distributed self-healing coverage hole detection and repair scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems, 100428

Download references

Funding

This work has not supported by any funding agency/institution.

Author information

Authors and Affiliations

Authors

Contributions

YHR: Writing—original draft, writing—review and editing, conceptualization, data curation, Validation. TSL: writing—data curation, validation. EGJ: conceptualization, formal analysis, review and editing, conceptualization. SV: formal analysis, supervision.

Corresponding author

Correspondence to Y. Harold Robinson.

Ethics declarations

Conflict of interest

The authors declare that they do not have any conflict of interest. This research does not involve any human or animal participation. All authors have checked and agreed the submission.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Robinson, Y.H., Lawrence, T.S., Julie, E.G. et al. Development of Fuzzy Enabled Coverage Hole Detection Algorithm in Wireless Sensor Networks. Wireless Pers Commun 119, 3631–3649 (2021). https://doi.org/10.1007/s11277-021-08424-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08424-0

Keywords

Navigation