Table of Contents Author Guidelines Submit a Manuscript
Corrigendum

A corrigendum for this article has been published. To view the corrigendum, please click here.

Journal of Computer Networks and Communications
Volume 2014, Article ID 969501, 11 pages
http://dx.doi.org/10.1155/2014/969501
Review Article

Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey

Computer Science and Engineering, DCRUST, Murthal, Sonipat 131039, India

Received 31 May 2014; Revised 9 September 2014; Accepted 14 September 2014; Published 7 October 2014

Academic Editor: Tin-Yu Wu

Copyright © 2014 Pearl Antil and Amita Malik. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Kalantary and S. Taghipour, “A survey on architectures, protocols, applications and management in wireless sensor networks,” Journal of Advanced Computer Science, vol. 3, no. 1, 2014. View at Google Scholar
  2. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, 2002. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Agah, S. K. Das, K. Basu, and M. Asadi, “Intrusion detection in sensor networks: a non-cooperative game approach,” in Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (NCA '04), pp. 343–346, Cambridge, Mass, USA, September 2004. View at Publisher · View at Google Scholar · View at Scopus
  4. L. Schwiebert, S. K. S. Gupta, and J. Weinmann, “Research challenges in wireless networks of biomedical sensors,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom '01), pp. 151–165, Rome, Italy, July 2001. View at Publisher · View at Google Scholar
  5. E. S. Biagioni and K. W. Bridges, “The application of remote sensor technology to assist the recovery of rare and endangered species,” International Journal of High Performance Computing Applications, vol. 17, no. 3, pp. 315–324, 2002. View at Publisher · View at Google Scholar · View at Scopus
  6. R. Bhardwaj and H. Sharma, “Holes in wireless sensor networks,” International Journal of Computer Science and Informatics, vol. 2, no. 4, pp. 62–63, 2012. View at Google Scholar
  7. I. M. Khan, H. Mokhtar, and M. Merabti, “An overview of holes in wireless sensor networks,” in Proceedings of the 11th Annual Post Graduate symposium on the Convergence of Telecommunications, Networking & Broadcasting (PGNET '10), Liverpool, UK, June 2010.
  8. M. K. Watfa and S. Commuri, “Energy-efficient approaches to coverage holes detection in wireless sensor networks,” in IEEE International Symposium on Intelligent Control, vol. 4302, pp. 131–136, 2006.
  9. N. Jabeur, N. Sahli, and I. Muhammad, “Survey on sensor holes?: a cause-effect-solution perspective,” Procedia Computer Science, vol. 19, pp. 1074–1080, 2013. View at Publisher · View at Google Scholar
  10. N. Ahmed, S. S. Kanhere, and S. Jha, “The holes problem in wireless sensor networks: a survey,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 9, no. 2, pp. 4–18, 2005. View at Google Scholar
  11. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” in Proceedings of the 1st IEEE International Workshop (SNPA '03), May 2003.
  12. B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins, Global Positioning Systems: Theory and Practice, Springer, Berlin, Germany, 5th edition, 2001.
  13. I. Khan, H. Mokhtar, and M. Merabti, “A survey of boundary detection algorithms for sensor networks,” in Proceedings of the 9th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, 2008.
  14. J. Yang and Z. Fei, “HDAR: hole detection and adaptive geographic routing for ad hoc networks,” in Proceedings of the 19th International Conference on Computer Communications and Networks (ICCCN '10), pp. 1–6, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. B. Kun, G. Naijre, T. Kun, and D. Wanlllo, “Neighborhood-based distributed topological hole detection,” in Proceedings of the IET International Conference on Wireless, Mobile and Multimedia Networks (ICWMMN '06), pp. 1–4, Hangzhou, China, 2006.
  16. K. Bi, K. Tu, N. Gu, and W. Dong, “Topological hole detection in sensor networks with cooperative neighbors,” in Proceedings of the International Conference on Systems, vol. 00, pp. 1–5, October 2006, no. 60533020.
  17. P. Martins, F. Yan, and L. Decreusefond, “Connectivity-based distributed coverage hole detection in wireless sensor networks,” in IEEE Global Telecommunications Conference (GLOBECOM '11), pp. 1–6, 2011.
  18. S. Zeadally, N. Jabeur, and I. M. Khan, “Hop-based approach for holes and boundary detection in wireless sensor networks,” IET Wireless Sensor Systems, vol. 2, no. 4, pp. 328–337, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. W.-C. Chu and K.-F. Ssu, “Location free boundary recognition in mobile wireless sensor networks with a distributed approach,” Science Direct Computer Network, vol. 70, pp. 96–112, 2014. View at Google Scholar
  20. D. Dong, Y. Liu, and X. Liao, “Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods,” in Proceedings of the 10th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 135–144, 2009. View at Publisher · View at Google Scholar
  21. S. Fekete, A. Kroller, D. Pfisterer, S. Fischer, and C. Buschmann, “Neighborhood-based topology recognition in sensor networks,” in Proceedings of the Algorithmic Aspects of Wireless Sensor Networks (ALGOSENSORS '04), vol. 3121 of Lecture Notes in Computer Science, pp. 123–136, Springer, 2004.
  22. P. Corke, R. Peterson, and D. Rus, “Finding holes in sensor networks,” in Proceedings of the IEEE Workshop on Omniscient Space: Robot Control Architecture Geared toward Adapting to Dynamic Environments (ICRA '07), April 2007.
  23. Q. Fang, J. Gao, and L. J. Guibas, “Locating and bypassing holes in sensor networks,” Mobile Networks and Applications, vol. 11, no. 2, pp. 187–200, 2006. View at Publisher · View at Google Scholar · View at Scopus
  24. M. R. Senouci, A. Mellouk, and K. Assnoune, “Localized movement-assisted sensordeployment algorithm for holedetection and healing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 5, pp. 1267–1277, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. R. Ghrist and A. Muhammad, “Coverage and hole-detection in sensor networks via homology,” in Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), pp. 254–260, Los Angeles, Calif, USA, April 2005. View at Publisher · View at Google Scholar · View at Scopus
  26. W. Guiling, G. Cao, and T. La Porta, “Movement-assisted sensor deployment,” in Proceedings of the 23rd AnnualJoint Conference of the IEEE Computer and Communications Societies, IEEE, March 2004. View at Publisher · View at Google Scholar
  27. Y. Wang, J. Gao, and J. S. B. Mitchell, “Boundary recognition in sensor networks by topological methods,” in Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), pp. 122–133, ACM, New York, NY, USA, September 2006. View at Scopus
  28. G. Bldg and S. Funke, “Topological hole detection in wireless sensor networks and its applications,” in Proceedings of the Joint Workshop on Foundations of Mobile Computing (DIALM-POMC '05), pp. 44–53, 2005. View at Publisher · View at Google Scholar
  29. S. Babaie and S. S. Pirahesh, “Hole detection for increasing coverage in wireless sensor network using triangular structure,” International Journal of Computer Science Issues, vol. 9, no. 1, pp. 213–218, 2012. View at Google Scholar
  30. A. Kröller, S. P. Fekete, D. Pfisterer, and S. Fischer, “Deterministic boundary recognition and topology extraction for large sensor networks,” in Proceedings of the ACM-SIAM Symposium on Discrete Algorithms, pp. 1000–1009, ACM, January 2006. View at Publisher · View at Google Scholar · View at MathSciNet
  31. X. Li and D. K. Hunter, “Distributed coordinate-free hole recovery,” in Proceedings of the IEEE International Conference on Communications Workshops (ICC '08), pp. 189–194, IEEE, Beijing, China, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. E. Zhao, J. Yao, H. Wang, and Y. Lv, “A coverage hole detection method and improvement scheme in WSNs,” in Proceedings of the International Conference on Electric Information and Control Engineering (ICEICE '11), pp. 985–988, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  33. G. Wang, G. Cao, and T. La Porta, “A bidding protocol for deploying mobile sensors,” in Proceedings of the 11th IEEE International Conference on Network Protocol (ICNP '03), pp. 315–324, November 2003.
  34. X. Li, D. K. Hunter, and K. Yang, “Distributed coordinate-free hole detection and recovery,” in Proceedings of the 2006 IEEE GLOBECOM, San Francisco, Calif, USA, November-December 2006.
  35. J. Kanno, J. G. Buchart, R. R. Selmic, and V. Phoha, “Detecting coverage holes in wireless sensor networks,” in Proceedings of the 17th Mediterranean Conference on Control and Automation (MED ’09), pp. 452–457, Thessaloniki, Greece, June 2009. View at Publisher · View at Google Scholar