Review Article

Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey

Table 2

Strengths and shortcomings of coverage hole detection algorithms.

ResearcherYearConcept usedAdvantagesDisadvantages

Wang et al. [33]2003Using Voronoi diagramEach node needs to monitor small area around it; low communication complexityPerformance depends on ratio of mobile to static sensors; no obstacle modeling
Guiling et al. [26]2004Using computational geometryExtensible to large deployments because communication and movements are localPoor performance on initial clustered deployment and lower communication range
Fekete et al. [21]2004Average density and centrality densityAvoids GPSComplex computations; unrealistic assumption on sensor distribution and density
Ghrist and Muhammad [25]2005Using homologyWorks in coordinate free sensor networksNot scalable; complex calculations
Bldg and Funke [28]2005Using isosets and isocontoursWorks for both continuous and discrete cases and avoids GPSRequires high network density and huge overhead in selecting seed nodes and constructing isolevels
Kröller et al. [30]2006Using combinatorial structuresSupports quasi-UDGFails in sparse n/w and deals with complex combinatorial structures
Fang et al. [23]2006Using stuck nodesNo assumption about node distributionHigh message complexity and UDG constraint
Wang et al. [27]2006Using shortest path treeNo UDG constraint; works for random distributionNeeds high node density, high communication overhead due to flooding and cannot detect multiple adjacent holes
Bi et al. [16]2006Cooperative neighbor and coverage ratioScalableNot suitable for randomly deployed dense networks
Corke et al. [22]2007Using convex hullsCan discover holes based on normal message trafficLocal detection algorithm needs initial state information; global detection algorithm needs location information
Li and Hunter [31]2008Using homology and connectivity informationScalable, large holes can be easily detectedFails for trivial holes
Dong et al. [20]2009Using FGP transformationCan detect small holes accurately; correctness of hole detection is provedCommunication overhead
Yang and Fei [14]2010Using TENT rule Single node can detect hole efficientlyNeeds localized nodes
Zhao et al. [32]2011Mathematical analysisCan find precise location of holesNeeds location information and works only for mobile nodes
Martins et al. [17]2011Rips and Cech complexesCan detect nontriangular holes efficientlyCommunication overhead
Zeadally et al. [18]2012Using hop based approachWorks for node degree 7 or higherCommunication overhead to identify x-hop neighbors
Babaie and Pirahesh [29]2012Using triangular oriented structureExact hole area is identifiedNeeds localized nodes
Chu and Ssu [19]2014Using contour linesNo UDG constraint; suitable for dynamic hole detectionCommunication overhead
Senouci et al. [24]2014Using TENT rule and virtual forces’ conceptMinimizes resource consumptionCannot detect holes at the network boundaries; UDG constraint