Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2014 (2014), Article ID 985854, 13 pages
http://dx.doi.org/10.1155/2014/985854
Research Article

Boundary Detection Method for Large-Scale Coverage Holes in Wireless Sensor Network Based on Minimum Critical Threshold Constraint

1School of Information Science and Engineering, Yanshan University, Hebei 066004, China
2School of Mathematics and Information Technology, Hebei Normal University of Science and Technology, Hebei 066004, China

Received 25 July 2014; Accepted 29 October 2014; Published 1 December 2014

Academic Editor: Yasuko Y. Maruo

Copyright © 2014 Rong Jing et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422, 2002. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Elson and D. Estrin, Sensor Networks: A Bridge to the Physical World, Kluwer Academic, Norwell, UK, 2004.
  3. C. Zhu, C. Zheng, L. Shu, and G. Han, “A survey on coverage and connectivity issues in wireless sensor networks,” Journal of Network and Computer Applications, vol. 35, no. 2, pp. 619–632, 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. S. Sengupta, S. Das, M. Nasir, A. V. Vasilakos, and W. Pedrycz, “An evolutionary multiobjective sleep-scheduling scheme for differentiated coverage in wireless sensor networks,” IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews, vol. 42, no. 6, pp. 1093–1102, 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. Z. Vyacheslav, E. Adil, A. Sergey, and C. Hyuseung, “Energy-efficient area coverage by sensors with adjustable ranges,” Sensors, vol. 9, no. 4, pp. 2446–2460, 2009. View at Google Scholar
  6. X. Wang, S. Han, and Y. Wu, “Coverage and energy consumption control in mobile heterogeneous wireless sensor networks,” IEEE Transactions on Automatic Control, vol. 58, no. 4, pp. 975–988, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. A. Kroller, S. P. Fekete, D. Pfisterer, and S. Fischer, “Deterministic boundary recognition and topology extraction for large sensor networks,” in Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithm, pp. 1000–1009, 2006.
  8. Q. Fang, J. Gao, and L. J. Guibas, “Locating and bypassing holes in sensor networks,” Mobile Networks and Applications, vol. 11, no. 2, pp. 187–200, 2006. View at Publisher · View at Google Scholar · View at Scopus
  9. S. Das, I. Banerjee, and T. Samanta, “Sensor localization and obstacle boundary detection algorithm in WSN,” in Proceedings of the 3rd International Conference on Advances in Computing and Communications, pp. 412–415, August 2013. View at Publisher · View at Google Scholar · View at Scopus
  10. C.-H. Wu, K.-C. Lee, and Y.-C. Chung, “A delaunay triangulation based method for wireless sensor network deployment,” Computer Communications, vol. 30, no. 14, pp. 2744–2752, 2007. View at Publisher · View at Google Scholar · View at Scopus
  11. A. Boukerche and F. Xin, “A voronoi approach for coverage protocols in wireless sensor networks,” in Proceedings of the 50th Annual IEEE Global Telecommunications Conference, pp. 5190–5194, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. C. Zhang, Y. C. Zhang, and Y. G. Fang, “Localized algorithms for coverage boundary detection in wireless sensor networks,” Wireless Networks, vol. 15, no. 1, pp. 3–20, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. E. D. Zhao, J. Yao, H. Wang, and Y. T. Lv, “A coverage hole detection method and improvement scheme in WSNs,” in Proceedings of the International Conference on Electric Information and Control Engineering (ICEICE '11), pp. 985–988, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. H. C. Ma, P. Kumar Sahoo, and Y. W. Chen, “Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks,” Journal of Network and Computer Applications, vol. 34, no. 5, pp. 1743–1756, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. F. Yan, P. Martins, and L. Decreusefond, “Connectivity-based distributed coverage hole detection in wireless sensor networks,” in Proceedings of the 54th Annual IEEE Global Telecommunications Conference, pp. 1–6, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Bejerano, “Coverage verification without location information,” IEEE Transactions on Mobile Computing, vol. 11, no. 4, pp. 631–643, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. I. M. Khan, N. Jabeur, and S. Zeadally, “Hop-based approach for holes and boundary detection in wireless sensor networks,” IET Wireless Sensor Systems, vol. 2, no. 4, pp. 328–337, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. H. Chintakunta and H. Krim, “Distributed localization of coverage holes using topological persistence,” IEEE Transactions on Signal Processing, vol. 62, no. 10, pp. 2531–2541, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. J. Chen, J. Li, S. He, Y. Sun, and H.-H. Chen, “Energy-efficient coverage based on probabilistic sensing model in wireless sensor networks,” IEEE Communications Letters, vol. 14, no. 9, pp. 833–835, 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. L. R. Ford and D. R. Fulkerson, Flows in Networks, Princeton University Press, Princeton, NJ, USA, 2010. View at MathSciNet
  21. X. X. Ning, Blocking Flow Theory and Its Application, Science Press, Beijing, China, 2nd edition, 2009.
  22. D. P. Bertsekas, Nonlinear Programming, Athena Scientific Press, Belmont, Canada, 2nd edition, 1999.