Next Article in Journal
Underwater Multi-Vehicle Trajectory Alignment and Mapping Using Acoustic and Optical Constraints
Previous Article in Journal
Validation of Underwater Sensor Package Using Feature Based SLAM
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks

1
Department of Computer Science and Information Engineering, Chang Gung University, Kwei-Shan 33302, Taiwan
2
Department of Electrical Engineering, Chang Gung University, Kwei-Shan 33302, Taiwan
3
Center for Biomedical Engineering, College of Engineering, Chang Gung University, Kwei-Shan 33302, Taiwan
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(3), 386; https://doi.org/10.3390/s16030386
Submission received: 21 December 2015 / Revised: 7 March 2016 / Accepted: 11 March 2016 / Published: 17 March 2016
(This article belongs to the Section Sensor Networks)

Abstract

:
In wireless sensor networks (WSNs), certain areas of the monitoring region may have coverage holes and serious coverage overlapping due to the random deployment of sensors. The failure of electronic components, software bugs and destructive agents could lead to the random death of the nodes. Sensors may be dead due to exhaustion of battery power, which may cause the network to be uncovered and disconnected. Based on the deployment nature of the nodes in remote or hostile environments, such as a battlefield or desert, it is impossible to recharge or replace the battery. However, the data gathered by the sensors are highly essential for the analysis, and therefore, the collaborative detection of coverage holes has strategic importance in WSNs. In this paper, distributed coverage hole detection algorithms are designed, where nodes can collaborate to detect the coverage holes autonomously. The performance evaluation of our protocols suggests that our protocols outperform in terms of hole detection time, limited power consumption and control packet overhead to detect holes as compared to other similar protocols.

1. Introduction

With the advance of microelectromechanical systems (MEMS) technology, wireless sensor networks (WSNs) [1] play an important role in transportation, infrastructures and forest monitoring for animals or fire [2,3], with its inexpensive, small size and multi-functional abilities. Normally, a wireless sensor network is composed of a large number of sensors deployed over the monitoring region regularly or randomly, and the deployed sensors are self-organized [4] to form the network. Since a random deployment is usually used in WSNs, the study of coverage issues is very important, which should be studied deeply in addition to the localization, target tracking and time synchronization in WSNs. However, a sensor node is severely constrained by the resources, such as limited memory, battery power, computation and communication capabilities. The energy consumption of each sensor is a function of its own sensing and communication range, and designing algorithms for deployment, localization, duty cycle, coverage and other issues is most important in WSNs.
The sensors are deployed randomly over a monitoring region with a high degree of density of nodes. Due to the random deployment strategy, certain areas of the monitoring region may have coverage holes [5,6] or serious coverage overlapping, which significantly degrade the network performance. Besides, the failure of electronic components, software bugs and destructive agents could lead to the random death of the nodes, and also, nodes may die due to the exhaustion of battery power, which may cause the network to be uncovered and disconnected. Since sensors are deployed in remote or hostile environments, such as a battlefield or desert, it is impossible to recharge or replace the battery. However, the data gathered by the sensors are highly critical and may be of scientific or strategic importance. Hence, the coverage provided in the sensor networks is a critical criterion of their effectiveness, and its maintenance is highly essential to form a robust network. The study of such coverage issues means summing of the sensing and communication range, which should be ideal in the monitoring area to provide good QoS for different applications.
Sensing coverage is a fundamental problem in WSNs and has been well studied over the past few years. However, most of the previous works address only one kind of redundancy, i.e., sensing or communication alone. The authors in [7] address how to combine coverage and connectivity maintenance in a single activity scheduling. In this work, it is proven that the communication range is at least twice the sensing range, which is the sufficient condition to ensure that a full coverage of a convex area implies connectivity among active nodes. In WSNs, nodes are deployed randomly, and it is hard or impossible to guarantee complete coverage of the monitored region, even if the node density is very high. Based on the deployment nature of the wireless sensor networks, the authors in [8] consider the communication range to be twice the sensing range, which is the sufficient condition and tight lower bound to ensure that the complete coverage preservation implies connectivity among active nodes, if the original network topology is connected.
In WSNs, due to the random deployment of the nodes, some areas cannot be covered [9,10,11] or have no connectivity. If a coverage region is sensed by at least k nodes, this sensing method is called k-covered, and the maintenance of a k-covered region is discussed in [12,13,14]. The coverage probability plays a fundamental role in coverage hole detection and other applications of WSNs, because of existing errors in the sensing and communication range [15,16]. Holes are hardly avoided in WSNs due to the various geographical environments of the monitoring region, such as the presence of ponds, obstacles or even due to physical destruction of the nodes. Ignoring the detection of holes affects the efficiency of geographic routing, data congestion and the excessive energy consumption of the hole boundary nodes. Additionally, for information flow, the hole could also affect the overall capacity of the network. Thus, the identification of the holes in sensor networks is of primary interest, because their presence often has a physical correspondence and may also map to one of the special events that are being monitored by the sensor networks.
Depending on the application environments and the level of information constraints, algorithms for identifying various coverage holes in the sensor networks can be generally classified into three categories: the computational geometry approach, the statistical approach and the topological method. In this paper, energy-efficient coverage hole detection algorithms are developed for wireless sensor networks, which can detect the presence of coverage holes distributively. The proposed hole detection methods can be achieved by considering the theoretical analysis of the point of intersection of the sensing discs of the sensors. First, the set of nodes that encloses a coverage hole is identified. This is done by taking location information of the nodes, their sensing coverage overlap and the circumference of the non-overlapping region of the sensors. Then, the coverage hole is detected by collaborating with the one-hop neighbors of the nodes that enclose the hole.
The rest of this paper is organized as follows. Related work is presented in Section 2. Section 3 describes the system model for detecting the holes in the WSNs. The proposed hole detection protocol is given in Section 4. The performance evaluation of the proposed protocol is done in Section 5, and concluding remarks are made in Section 6.

2. Related Work

Hole detection is one of the important research issues in WSNs [10], which can be classified as coverage holes, routing holes, jamming holes, sink/black holes and worm holes. Due to the random deployment of the sensors, some part of the monitoring region is not covered by the sensing disc of a sensor, which is called a coverage hole. The studies on coverage can be divided into two categories. The first category comprises probabilistic approaches for calculating the required node density for ensuring appropriate coverage [17], though these studies do not prove the hole detection solutions. The second category utilizes computational geometry approaches to discover the coverage holes. In this category, the detected holes problem, which is also called the connected coverage boundary detection problem, is addressed in [18]. Such a connected coverage boundary detection problem is classified into polygon-based and perimeter-based approaches. In the polygon-based approach, a Voronoi diagram is used for the coverage boundary detection. Briefly speaking, the VP of a node set V is the partition of the Euclidean space into polygons, called Voronoi polygons (VPs). According to the closeness property, if some portion of the VP is not covered by the nodes inside the VP, it will not be covered by any other node, which implies a coverage hole. However, it has been shown that the VPs of the boundary nodes cannot be locally computed, and the VP-based approach is not a real localized solution. The paper in [18] proposes a localized Voronoi polygon (LVP) to find the holes locally.
The first localized boundary node detection algorithm for the perimeter-based approach is proposed in [19], which is based on the information about the coverage of the perimeter of each node’s sensing disk. According to the perimeter-based approach, if a node i is the boundary node that exists at one point j on the circle, then point j is not covered by any one of the node i’s neighborhood sensors. The paper [20] proposes to check the intersection point by the node i and i’s neighborhood sensors not covered by other sensors. In [21], a coverage configuration protocol (CCP) based on the perimeter-based approach is presented to calculate the degree of the intersection points and to use this degree of intersection to maintain the k-coverage. In this paper, we define these special intersection points as hole points. However, the perimeter-based approach has two flaws. First, each node needs to check the positions and status of all of its neighbors, which is inefficient when the sensor nodes are densely deployed, and every time when a node dies, all of its neighbors need to check the coverage of their perimeters to update the existing coverage. Secondly, this approach is not efficient for using this information only to check the boundary nodes. In [22], the authors propose algorithms to construct two sets P and Q using the perimeter-based approach, where P is the end point set and Q is the edge point set, and the hole exists if two consecutive end points are found in the counterclockwise direction. However, it has two problems. The first problem is it needs more memory to store this information, and the second problem is it cannot solve the flaws of the perimeter-based approach. In [23], the authors propose a vector method to use the perimeter-based approach to group the hole points and to recover the coverage holes. Though they use the hole point information to recover the coverage holes, they do not consider the redundant sensors to recover them.
The formation of holes in the target field is quite common and is unavoidable due to the nature of the WSN and random deployment. This is very important to ensure that the target field is completely and continuously covered. In [24], the authors propose an approach called the hybrid hole detection and healing (HHDH) protocol that detects and heals the coverage holes effectively with minimum sensor movements. This protocol can recover the coverage hole formed due to the random deployment of the nodes. In [25], the authors use the knowledge of the location of each node for detecting coverage holes in randomly-deployed wireless sensor networks. In [26], the authors present a novel method for coverage hole detection considering the residual energy of the nodes in randomly-deployed wireless sensor networks. In this paper, by calculating the life expectancy of working nodes through the residual energy, the authors make a trade-off between the network repair cost and energy waste in which the working nodes with a short lifetime are screened out according to a proper ratio. As one of the best health indicators of the sensor network, the coverage holes directly decide the quality of the sensor network. In [27], the authors firstly propose an active contour model-based coverage hole detection algorithm for the sensor network, which can accurately evaluate both the number and the size of the holes.
The hybrid deployment of WSNs with static and mobile nodes in the monitoring area is an important issue to cover a maximum sensing area with a limited number of nodes. Furthermore, mobile sensor nodes can relocate themselves to improve the coverage area in the network. In [28], the authors propose a method that reduces the complexity of the relocation of the initial deployment and coverage hole healing of mobile sensor nodes in the hybrid WSNs. Their method finds the ways to get the shortest distance movements for the mobile nodes in WSNs. An adaptive threshold distance is used to eliminate some mobile nodes, which are already occupied or situated within the threshold distance from the optimal new positions. In [29], the authors develop distributed algorithms to detect and localize the coverage holes in sensor networks. This paper uses algebraic topological methods to define a coverage hole and develops algorithms to detect a hole. In [30], the authors design a stochastic learning weak estimation-based scheme, namely mobility prediction inside a coverage hole. The main objective of this scheme is that it could be able to correctly predict the mobility pattern of a target inside a coverage hole with low computational overhead.
In [31], the authors propose an intelligent strategy called the improved hybrid particle swarm algorithm to repair the coverage holes. Taking a hybrid sensor network, the authors consider the displacement of mobile sensors, energy consumption and energy balancing together. Their proposed protocol can schedule the redundant mobile sensors effectively to repair the coverage holes by moving them to appropriate locations. Besides, they improve the event detection rate to calculate the event detection lost or the detection error and coverage holes that seriously damage the quality of monitoring in WSNs. In [32], the authors design a localized coverage force division algorithm to find the coverage quality in WSNs. However, their algorithm can neither detect the coverage holes nor find the shape and size of a hole. In [33], the authors propose a novel method for describing the coverage holes graphically. Their proposed graphical hole description method is divided into two phases, namely coverage hole detecting and coverage hole describing. In [34], the authors present a coverage hole healing algorithm taking the existing nodes of the WSN to cover the holes. Their algorithm resolves a full coverage while minimizing the overlapped area of the sensing disks and deploying a minimum number of nodes.
It is to be noted that wireless sensors are deployed to monitor certain regions remotely for a wide range of potential applications, such as environment monitoring, object tracking, habitants monitoring and traffic control. If one or more sensors are dead in the network, the whole purpose of deploying sensors over the monitoring area becomes useless. As shown in Figure 1a, if the sensor D is dead, no communication is established among the sensors. As shown in Figure 1b, if sensor D is dead, coverage hole is created in the network, and the target within that area remains undetected. As shown in Figure 1c, if the sensor D is dead, both coverage, as well as communication holes are created, and therefore, the purpose of deploying sensors to detect any target remains futile.
In this paper, we propose a perimeter-based approach to find the coverage holes considering the points of intersection of the sensing discs of the wireless sensors deployed randomly over a monitoring region. The main contribution of this work over the existing hole detection protocols can be summarized as follows:
  • A distributed coverage hole detection (DCHD) protocol is proposed to detect the coverage holes without the help of the sink by simply calculating the points of intersection of a node with its one-hop neighbors and checking them as covered or not.
  • Algorithms are designed to filter the points of intersection into covered and non-covered points and then use this filtering method to detect the coverage hole. Such a filtering method can be done dynamically in an autonomous manner by maintaining the network integrity.
  • Our proposed algorithms can detect the nature and shape of the coverage holes, which can be highly useful and make it easier to redeploy the nodes.

3. System Model

Let us consider a wireless sensor network in which n number of wireless sensors are deployed randomly over a rectangular monitoring region R. Let R c and R s be the communication and sensing range of a sensor, respectively, such that R c = 2 R s . It is assumed that some part of the network is densely deployed with a large overlap of the sensing range, whereas some other part of the network is sparsely deployed, which is obvious due to the random deployment of the nodes. The part of the network in which nodes are deployed densely can have coverage overlapping, and the part of the network where nodes are sparsely deployed can have coverage holes; and the whole network is well connected irrespective of the presence of holes. Besides, coverage holes may be created due to the predictable death of the nodes, as some nodes may die due to power exhaustion. Similarly holes may be created due to unpredictable death of the nodes, as nodes may die due to hardware and software failures. Let S = { S 1 , S 2 , . . . , S i , . . . , S n } be the set of n nodes, where S i = ( X i , Y i ) , i = 1,2,3,...,n is the location of each sensor. It is assumed that every node knows its location information through GPS or some location services, and the coordinates of the monitoring region R are also known. As shown in Figure 2, A ( x 1 , y 1 ) , B ( x 2 , y 2 ) , C ( x 3 , y 3 ) and D ( x 4 , y 4 ) are the coordinates of the monitoring region R.

Definitions

In this subsection, we define a few terms, which are used throughout the paper to develop our coverage hole detection protocol.
Definition 1 (sensing disc): The sensing disc of a sensor is the circle with the sensing range as its radius, when it is centered at its own location. Any object present within the sensing disc of a sensor is perfectly detected by it. Throughout the paper, the radius of the sensing disc is refereed to as its sensing range ( R s ).
Definition 2 (connecting neighbors): Two nodes A and B are said to be connecting neighbors, if their Euclidean distance d ( A , B ) R c . As per our assumption, communication range R c = 2 R s , and therefore, nodes A and B are connecting neighbors, as shown in Figure 3. Similarly, nodes B and C are the connecting neighbors. From this definition, it is clear that a connecting neighbor is always a one-hop neighbor of a node.
Definition 3 (sensing neighbors): Two nodes A and B are said to be sensing neighbors, if their Euclidean distance d ( A , B ) < 2 R s . As shown in Figure 1, nodes A and B are sensing neighbors as d ( A , B ) < 2 R s . Similarly, nodes B are C sensing neighbors as d ( B , C ) is < 2 R s . In order to relate the sensing neighbors with connecting neighbors in our definition, it is clear that sensing discs of the sensing neighbors always overlap with each other, and they must be connecting neighbors, as they are located within one-hop from each other. As shown in Figure 3, nodes A and B are the sensing neighbors, as well as connecting neighbors. It is to be noted that throughout the paper, the set of sensing neighbors of any sensor S i is denoted as N i .
Definitions 4 (bounded/unbounded coverage hole): If any part of the monitoring region is not covered by the sensing disc of any sensor, there exists a coverage hole. Coverage holes are found in a monitoring region, if some part of it is sparsely deployed. A coverage hole is said to be bounded, if it is enclosed by the sensing discs of the deployed sensors. Otherwise, it is an unbounded coverage hole. As shown in Figure 2, hole H 1 is a bounded coverage hole, whereas holes H 2 H 4 are unbounded coverage holes.
Definitions 5 (boundary/non-boundary sensors): Sensors that enclose a bounded coverage hole are called boundary sensors. If S i is the set of sensors ∀ i=1,2,3,...,m, for m n , and encloses a coverage hole; then, each element of the set of sensors S i is a boundary sensor. The sensors that enclose an unbounded coverage hole are called non-boundary sensors. As shown in Figure 2, sensors S 1 S 10 are boundary sensors, as the coverage hole H 1 is enclosed by them. Similarly, sensors S 5 , S 6 , S 7 and S 12 are non-boundary sensors, as the coverage hole H 2 is enclosed by them. It is to be noted that a sensor could be a boundary, as well as a non-boundary sensor based on the presence of the holes. For example, as shown in Figure 2, sensors S 5 , S 6 and S 7 are boundary, as well as non-boundary sensors, as they enclose the bounded coverage hole H 1 and unbounded coverage hole H 2 , respectively.
Definitions 6 (border/non-border sensors): The sensor S i , ∀i=1,2,3,...,n is said to be a border sensor, if its sensing disc intersects the border of the monitoring region. Otherwise, the sensor must be a non-border sensor. It is to be noted that the equation of each border line can be given as y - y i = ( x - x i ) ( y j - y i x j - x i ) , ∀ i = 1 and j = 2 or i = 2 and j = 3 or i = 3 and j = 4 or i = 1 and j = 4 . Similarly, ( x - X i ) 2 + ( y - Y i ) 2 = R s 2 represents the equation of the sensing disc of any sensor, where ( X i , Y i ) is the location of a sensor i, ∀i = 1, 2, 3,..., n. As shown in Figure 2, A B ¯ , B C ¯ , C D ¯ and D A ¯ represent the equations of those borderlines.
Definitions 7 (critical intersection points): The critical intersection points (CIP) of a node are the points of intersection, which satisfy the conditions as follows. Let I be the set of points of the intersection of sensor S i with a sensing disc of its sensing neighbor S j , for i j . The point p i j I is said to be a critical intersection point, if it is not covered by any other sensing neighbor S k of sensor S i , for i k , or it lies on the border line of the monitoring region R. For example, as shown in Figure 2, the points in red color are the critical intersection points (CIP)due to the intersection of the sensing disc of one sensor with another or the sensing disc of one sensor with the border line of the monitoring region. It is to be noted that throughout the paper, the set of critical intersection points is denoted as P, where | P | | I | .
Definitions 8 (covered points): Let S j and S k be the sensing neighbors of a sensor S i , for i j k . p i and p j are two points of intersection of the sensor S i with the sensing disc of its sensing neighbor S j , such that both or any one of the points p i and p j are covered by the sensing disc of the sensor S k . Then, the point(s) of intersection that is covered by the sensing disc of sensor S k is called the covered point (CP) of sensor S i . For example, as shown in Figure 2, S 2 , S 10 and S 11 are one-hop sensing neighbors of sensor S 1 . There are several points of intersection of the sensing disc of S 1 with its sensing neighbors. However, only the red points p 1 , p 10 , p 15 and p 16 are the CIP of S 1 , as they are not covered by any other sensors, whereas the blue points p 11 , p 12 and p 13 are covered points (CP) of S 1 , as shown in Figure 2, since they are covered by its sensing neighbors S 10 , S 11 and itself. It is to be noted that a point of intersection of the sensing disc of one sensor with the sensing disc of another sensor could be either a CIP or a CP.

4. Proposed Hole Detection Protocol

In this section, a distributed coverage hole detection (DCHD) algorithm is designed to detect the bounded or non-bounded coverage holes present in the monitoring region. This scheme is proposed not only to solve the flaws of the perimeter-based coverage hole detection approaches, but also to consider the CIP to find a hole, which can reduce the time complexity of the coverage hole detection. In the first phase of the scheme, each sensor finds out its CIP set, as described in Section 4.1. In the second phase, each sensor also verifies if any of its points of intersection belong to a CP set or not, as described in Section 4.2. In the third phase, as described in Section 4.3, each sensor localizes and separates its CIP, which is used to determine the bounded or unbounded coverage hole. In the fourth phase, a sensor collaborates with its one-hop neighbors in the clock-wise direction and connect to its CIP to detect the presence of a coverage hole, as described in Section 4.4.

4.1. Determination of CIP

It is assumed that each sensor knows its own location information. After deployment of the nodes, each sensor exchanges its location information to know the location of its one-hop sensing neighbors. For simplicity, throughout the paper, sensing neighbors are refereed to as the neighbors. Upon receiving the location information from its one-hop neighbors, each sensor has to determine its CIP set (P) and sensing neighbors set (N). The algorithm for calculating the CIP is given in Algorithm 1. Upon executing the CIP calculation algorithm, each node has to maintain the list of its one-hop neighbor’s information and corresponding CIP, as given in Table 1. For example, the neighbors and CIP of different nodes given in Figure 2 can be shown in Table 1.
It is to be noted that there may be some isolated sensors deployed over the monitoring region R. Since the isolated sensors cannot have any sensing neighbors, they would not execute Algorithm 1, and there must be a coverage hole around that sensor. Suppose any sensor S i isolate has to calculate its CIP. First, S i chooses its one neighbor S j from its neighbor set N and calculates the intersection points p i , p j . If p i or p j is inside the monitoring region R and is not covered by any other neighbors of S i , p i and p j become the elements of the CIP set P. Besides, S j is selected as the member of the sensing neighbors’ set N. This process continues for all of the neighbors of S i .
For example, as shown in Figure 2, let us consider sensor S 1 . The one-hop sensing neighbors’ set of S 1 can be N ( S 1 ) = { S 2 , S 10 , S 11 } . Since the sensing disc of S 1 intersects the sensing disc of S 2 and both points of intersection are not covered by any of its neighbor, points p 1 and p 16 becomes the CIP. Similarly, the sensing disc of S 1 also intersects the sensing disc of S 10 , where the point of intersection p 12 is covered by another neighbor S 11 , whereas the point p 10 is not covered by any of its neighbors. Hence, only point p 10 becomes the CIP. Thus, the CIP set of S 1 can be given as P ( S 1 ) = { p 1 , p 10 , p 15 , p 16 } . Based on Algorithm 1, after the sensor S 1 finds its CIP, its next hop sensing neighbor S 2 clockwise finds its one-hop sensing neighbors set, i.e., N ( S 2 ) = { S 3 , S 1 } , and its CIP set can be given as P ( S 2 ) = { p 1 , p 2 , p 16 , p 17 } . Thus, the process continues for all sensors, and finally, as shown in Figure 2, the set of CIP can be calculated as P = { p 1 , p 2 , . . . , p 10 , p 14 p 28 } .
Algorithm 1 Algorithm for determining CIP of a node i.
1:
Input:
2:
N i : Set of all sensing neighbors of a node i;
3:
Output:
4:
P i : Set of CIP of node i;
5:
CIP Set Calculation Procedure:
6:
Select any node i randomly;
7:
Initialize P i = ϕ ;
8:
if ( N i ϕ )
9:
          {
10:
          Scan all members of N i ;
11:
          if (i is a non-border sensor)
12:
          {
13:
             Find intersection point p of node i with all members of N i ;
14:
             Find corresponding sensing neighbor s having an intersection point with node i;
15:
             Update P i = P i p and N i = N i s ;
16:
          }
17:
          if (i is a border sensor)
18:
          {
19:
             Scan all members of N i ;
20:
             Find point of intersection b of node i with border line of the monitoring region R;
21:
             Find point of intersection p of node i with all members of N i ;
22:
             Update P i = P i b p and N i = N i s ;
23:
          }
24:
          }
25:
else
26:
          {
27:
             i is an isolated sensor;
28:
             Terminate the procedure;
29:
          }

4.2. Determination of CP

It is assumed that each node knows its sensing neighbors set (N). Taking the set of sensing neighbors set N as the input, each sensor can find out if the point of intersection with its one-hop neighbor is a CP or not. The details of the procedure for calculating a point as CP or not is given in Algorithm 2.
Algorithm 2 Algorithm for determining the CP of a node i.
1:
Input: N i : Set of all sensing neighbors of node i;
2:
Output: C i : Set of covered points of node i;
3:
Calculation Procedure of CP set:
4:
   Select any node i randomly;
5:
   Initialize C i = ϕ ;
6:
   if ( N i ϕ )
7:
   {
8:
   Scan all members of N i ;
9:
   if (i is a non-border sensor)
10:
   {
11:
        Find intersection point of node i with j, which is one member of N i ;
12:
        Check if the point p is covered by a sensor k, which is another member of N i and j k ;
13:
        if (p is covered by k)
14:
        p is a CP;
15:
        else
16:
        {
17:
          p is a CIP or a border point;
18:
          Execute Algorithm 1 to find CIP;
19:
        }
20:
   }
21:
   else
22:
   {
23:
        i is a border sensor;
24:
        Find point of intersection b of node i with border line of the monitoring region R;
25:
        Check if point b is covered by any neighbors of i;
26:
        if (point b is covered)
27:
        b is a CP;
28:
        else
29:
        Execute Algorithm 1 to find CIP;
30:
   }
31:
   }
32:
   else
33:
        i is an isolated sensor;
Let us consider an example, as shown in Figure 2. As shown in the figure, N ( S 1 ) = { S 2 , S 10 , S 11 } is the one-hop sensing neighbors set of S 1 . Based on Algorithm 2, let the sensor S 1 first find its one-hop neighbors and then find the point of intersection with its sensing neighbor S 10 . p 10 and p 12 are the points of intersection of the sensing disk of S 1 with S 10 , out of which p 12 is covered by its other neighbor S 11 . Hence, p 12 becomes the CP, whereas p 10 becomes the CIP, as it is not covered by any other sensor of the network. Similarly, the sensing disc of the sensor S 11 can have points of intersection p 15 and p 13 with the sensing disc of the sensors S 1 and p 11 with the sensing disc of S 10 . Here, points p 11 and p 13 are covered by the neighbors S 1 and S 10 , respectively. Hence, the points of intersection p 11 , p 12 and p 13 become CP as marked in blue color in Figure 2. It is to be noted that a point of intersection that falls outside the monitoring region R is not taken into consideration for determining it as a CIP or CP.

4.3. Localization of CIP

In this section, we describe how to localize all of the CIP to detect the coverage hole. As discussed in Section 4.1 and Section 4.2, the points of intersection of all of the sensors with their one-hop neighbors are classified into CP or CIP. However, a sensor may have more than one CIP at different sides of its sensing disc. It is to be noted that there is no confusion in detecting the coverage hole if the intersection point of a sensor has only one CIP. However, if a sensor has more than one CIP, it is necessary to localize them either on the lower or upper side of the line connecting the location of the sensor to the location of its neighboring sensor. For example, as shown in Figure 4, sensor S 3 has four different CIP, such as p 2 , p 3 , p 12 and p 13 , out of which p 2 and p 3 are located at one side of the sensing disc of S 3 , whereas p 12 and p 13 are located at the other side of its sensing disc. Then, it is important to know how to differentiate those points theoretically to detect the coverage holes remotely. In order to differentiate those points, first, connect the location of one sensor to the location of a one-hop neighbor of that sensor, as shown in Figure 4. For example, sensors S 2 and S 4 are the one-hop neighbors of S 3 . Here, p 3 and p 13 are the CIP between the sensors S 3 and S 4 . Now, draw a line S 3 S 4 ¯ between the centers of the sensing disc of sensors S 3 and S 4 . Using simple coordinate geometry, it can be calculated that p 3 and p 13 lie below and above the S 3 S 4 ¯ , respectively. Similarly, S 2 and S 13 are one-hop neighbors of S 3 , and p 2 and p 12 are the CIP between the sensors S 2 and S 13 , respectively. By joining the centers of the sensing disc of S 2 and S 3 , it is observed that CIP p 2 lies below the line S 3 S 2 ¯ , whereas CIP p 12 lies above the line S 3 S 13 ¯ .
It is to be noted that the two points of intersection p i j and p j i between any two sensors S i and S j having locations ( x i , y i ) and ( x j , y j ) , respectively, can be calculated as given in Equations (1) and (2), where d i j is the distance between sensors S i and S j . Equation (3) represents the equation of the sensing disc of sensors S i and S j . Let p i j = ( X 1 , Y 1 ) and p j i = ( X 2 , Y 2 ) be the two points of intersection between the sensors S i and S j . Then,
X 1 : x i + x j 2 + y j - y i 2 d i j ( 4 R s 2 - d i j 2 ) , Y 1 : y i + y j 2 - x j - x i 2 d i j ( 4 R s 2 - d i j 2 )
X 2 : x i + x j 2 - y j - y i 2 d i j ( 4 R s 2 - d i j 2 ) , Y 2 : y i + y j 2 + x j - x i 2 d i j ( 4 R s 2 - d i j 2 )
S i : ( x - x i ) 2 + ( y - y i ) 2 = R s 2 , S j : ( x - x j ) 2 + ( y - y j ) 2 = R s 2
Considering the location of each sensor and CIP, as given in the above equations, the procedure for localizing each CIP is given in Algorithm 3.
Algorithm 3 Localization of CIP.
1:
Input:
2:
   N i : Set of all sensing neighbors of node S i ;
3:
   S j N i : Any sensing neighbor of node S i ;
4:
   C I P i j and C I P j i : CIP between sensors S i and S j ;
5:
   L i j : Set of all lines connecting to the location of sensor S i to location of S j ;
6:
Output:
7:
   C I P L : Set of CIP below the line L i j ;
8:
   C I P U : Set of CIP above the line L i j ;
9:
Localization of CIP
10:
   Initialize C I P L = ϕ and C I P U = ϕ ;
11:
   Do: for all CIP between sensors S i and S j ;
12:
   {
13:
          Select any sensor S i ;
14:
          Select another sensor S j from the set N i ;
15:
          Check location of C I P i j with respect to the line L i j ;
16:
   if ( C I P i j is above L i j )
17:
   {
18:
          Assign C I P U C I P i j ;
19:
          Update C I P U ;
20:
   }
21:
   else
22:
   {
23:
          Assign C I P L C I P i j ;
24:
          Update C I P U ;
25:
   }
26:
   }

4.4. Detection of Coverage Holes

In this section, the CIP are organized to detect the hole based on their location either above or below the line connecting to the location of any two neighboring sensors. The points that are below the connecting lines form a set of points as set C I P L , whereas the points above the line form a set C I P U . Then, in each set, those points are arranged in a clockwise fashion to check whether the nature of the hole is bounded or unbounded. By arranging the points either in the set C I P L or C I P U in the clockwise direction, a bounded coverage hole is detected if all elements of those sets form a loop, i.e., if the initial and terminal points are the same. However, an unbounded coverage hole is detected, if all elements of a set do not form a loop. It is to be noted that whether the coverage hole is bounded or unbounded is determined by the sensors that enclose them. The DCHD algorithm is run in each node to find the CIP and to detect the hole in collaboration with its one-hop neighbors. Once the hole detection procedure is terminated by the sensors, the information is transmitted to the sink by the sensor that has initiated this procedure. It could be possible that a node may be adjacent to more than one hole. In this case, the hole does not prevent the sensor from sending data to the sink. The node has to send information about the presence of both holes along with the nature of the holes to the sink. In our protocol, it is assumed that coverage holes are created due to the death of the nodes, and the role of the DCHD protocol is to detect the holes instead of detecting whether a node is dead or not. However, it is obvious that a node cannot have sensing overlapping with its one-hop neighbors, if a node is dead, and therefore, CIP is calculated and the hole detection done in the network.
In order to explain the detection of the coverage hole, let us take an example as shown in Figure 4. As discussed in the above subsection, the CIP are classified into two different sets based on their position. After calculating the position of each CIP either above or below the lines connecting to the centers of each sensing disc, two sets of points can be classified as sets C I P L and C I P U . Thus, for the sensors S 1 S 10 , the set C I P L = { p 1 , p 2 , p 3 , p 4 , p 5 , p 6 , p 7 , p 8 , p 9 , p 10 , p 1 } , where p 1 is revisited, which implies that these points can form a loop, and therefore, a bounded coverage hole exists in between those sensors. Similarly, for the sensors S 2 , S 13 , S 3 , S 4 , S 5 and S 15 , the set C I P U = { p 11 , p 12 , p 13 , p 14 , p 15 , p 16 } , where no point is revisited, which implies that though there is a coverage hole, the hole must be unbounded. It is to be noted that as shown in Figure 4, by connecting sensors S 17 , S 18 , S 6 , S 8 and S 7 , though those connecting lines can form a loop, no CIP is localized below those lines. This implies that all points of intersection between those sensors below the lines are detected as CP, and therefore, no coverage hole can be detected there. Taking all of the phases of the coverage hole detection procedure, the complete flow of the DCHD protocol can be shown as in Figure 5, and the DCHD algorithm is given in Algorithm. 4.
Algorithm 4 Distributed coverage hole detection (DCHD) procedure.
1:
Input:
2:
   N i : Set of all sensing neighbors of node S i ;
3:
   C I P L : Set of CIP below the connecting line;
4:
   C I P U : Set of CIP above the connecting line;
5:
Output:
6:
   Type of coverage holes;
7:
Detection of coverage holes:
8:
   Select any sensor S i ;
9:
   Select another sensor S j from the set N i ;
10:
   Find points of intersection between S i and S j ; Let it be P i j and P j i ;
11:
   Select another sensor S k from the set N i ;
12:
   Check P i j and P j i are covered by S k or not;
13:
   if ( P i j and P j i are not covered by S k )
14:
   {
15:
        Assign C I P i j P i j , C I P j i P j i ;
16:
        Execute Algorithm 3;
17:
        Function call: Hole_Type();
18:
   }
19:
   if ( P i j || P j i is a CIP) (ex: Let P i j be a CIP)
20:
   {
21:
        Assign C I P i j P i j ;
22:
        Execute Algorithm 3;
23:
        Function call: Hole_Type();
24:
   }
25:
   if (both P i j and P j i are covered)
26:
   {
27:
        Assign C P P i j and P j i ;
28:
        The network is fully covered;
29:
        Terminate the hole detection procedure;
30:
   }
31:
Hole_Type()
32:
          Arrange all points of C I P L and C I P U in clock-wise;
33:
          if (initial point == terminal point)
34:
          Hole is bounded;
35:
          Else: Hole is unbounded;

4.5. Construction of Covered and Uncovered Arcs

As discussed in the previous subsections, the presence of a coverage hole is detected by using the critical intersection points and after knowing their locations. However, it is essential to know the shape of the bounded or unbounded coverage holes. In this section, we propose a mechanism for how to get the shape of the hole by constructing covered and uncovered arcs. As shown in Figure 6, let S 2 , S 3 , S 4 , S 5 and S 6 be the sensing neighbors of the node S 1 . Here, p 1 , p 2 , p 3 and p 4 are the CIP of the sensor S 1 . As discussed in the above subsection, it can be determined that p 1 and p 2 are located at one side of its sensing disc, whereas p 3 and p 4 are located at the other side of the sensing disc. It is to be noted that the location of all CIP and the position of each sensor are known. Since the locations of the one-hop neighbors of a sensor are known, we can connect the location of one sensor to another. Thus, as shown in Figure 6, first, the lines S 1 S 2 ¯ , S 1 S 3 ¯ , . . . , S 1 S 6 ¯ are drawn, and the arcs are constructed as follows.
After locating the CIP, we have to construct the arcs along the circumference of the sensing disc of the sensor S 1 . For this reason, first consider the points p 1 , p 2 to draw the vectors S 1 p 1 and S 1 p 2 from the position of the sensor S 1 . Let α be the angle between these two vectors, which can be calculated using the formula α = arccos ( S 1 p 1 S 1 p 2 S 1 p 1 S 1 p 2 ) . Then, the arc length of the arc can be calculated as p 1 p 2 ^ = α × R s . Thus, the arcs p 2 p 3 ^ , p 3 p 4 ^ and p 4 p 1 ^ are calculated. However, if any of those arcs intersect with the S 1 S 2 ¯ , S 1 S 3 ¯ , . . . , S 1 S 6 ¯ , they are considered as covered arcs and, therefore, are omitted for constructing the coverage hole. Based on this rule, as shown in the figure, only arcs p 1 p 2 ^ and p 3 p 4 ^ are considered as the uncovered arcs and are separated, as they do not intersect any of those connecting lines. Since arcs p 1 p 2 ^ and p 3 p 4 ^ are at different sides of the sensing disc, they are separated into two sets. Based on the initial point and terminal points of each arc, finally, they are connected with each other to construct the coverage hole by which, the shape of the hole can be known. For example, as shown in Figure 7, taking S 1 as the starting sensor, the arcs p 1 p 2 ^ , p 2 p 3 ^ , p 3 p 4 ^ , p 4 p 5 ^ , ∼ p 10 p 1 ^ marked in red are connected to each other, which can form a hole. Thus, these uncovered arcs enclose the bounded coverage hole H 1 . Similarly, as shown in Figure 7, coverage holes H 2 , H 3 and H 4 are enclosed by the arcs marked in red.

5. Performance Evaluation

In this section, the performance of our proposed DCHD protocol is evaluated in terms of control packet overhead, power consumption to detect the holes and time to detect the holes. Besides, our protocol is also compared to similar coverage hole detection protocols, such as the localized Voronoi polygon (LVP) [18] and the vector method [23]. The detailed description of the simulation setups and results is given as follows.

5.1. Simulation Setup

In our simulation, a rectangular monitoring region of a size of 500 × 400 m 2 is considered. About 100 to 1500 sensor nodes are deployed randomly over the monitoring region, and the algorithms are simulated using ns-2.29 [35]. The sensing range of each sensor is taken to be 20 m, and communication range is fixed at 40 m, as we have considered that the communication range is twice the sensing range. The simulation parameters are setup according to the IEEE 802.15.4 MAC/PHY specification and the radio characteristics of IEEE 802.15.4 compliant product CC2420 [36] along with the AODV (ad hoc on-demand distance vector routing) protocol [37] and two-ray ground propagation model [38]. The initial energy of each node is assumed to have a fixed amount of 50 J of reserved energy, and the energy cost due to forwarding of each control packet is taken to be 0.3 J. Holes are generated randomly among the multi-hop and fully-connected nodes, so that they can form different groups of disjoint sets of nodes. Location information is given to all nodes, so that they can know about their one-hop sensing neighbors’ set and can find the point of intersection with the sensing disc of their neighbors. The data rate is kept as 250 Kbps, and the control packets are sent every 2 s to detect the neighbors, which is continued till 20 s to get the final list of one-hop neighbors of each node.

5.2. Simulation Result

In this section, first, we simulate our protocol for different numbers of coverage holes to evaluate the hole detection time, energy consumption and control packet overhead to detect the holes. Besides, we have also simulated our protocol to compare to other similar protocols in terms of control packet overhead, hole detection time and energy consumption with different numbers of holes and sensors. As shown in Figure 8, we have simulated the average hole detection time for different numbers of deployed sensors with the fixed number of coverage holes with 15, 30 and 45 present in the monitored region. It is observed that the average hole detection time is increased with the increase in the number of deployed sensors, which is quite reasonable. It is to be noted that the number of sensing neighbors of a node increases if the number of deployed nodes in the monitoring region is increased, which increases the hole detection time, as a node has to find its CIP and CP with its neighbors before detecting a hole.
As shown in Figure 9, the control packet overhead is simulated with the number of deployed sensors. This simulation is carried out for different numbers of holes in the monitored region. We observe that the control packet overhead is increased, if the number of deployed sensors is increased. We find that the control packet overhead is almost similar for less deployed nodes (100 to 800 sensors) irrespective of the number of coverage holes, which is obvious due to the lesser density of the nodes around a coverage hole. However, control packet overhead shows a significant difference for different numbers of holes, when he number of deployed sensors is more than 800, as the node density increases around each hole. The analysis of the average energy consumption for different numbers of holes with different deployed sensors is presented in Figure 10. Let k be the number of neighbors of a sensor S i and E t and E r be the energy consumed by the sensor to transmit and receive data from its k neighbors. Since node S i has to broadcast its location information and has to receive location information from its k neighbors, the typical amount of energy consumption of a node in our DCHD protocol could be E c D C H D = E t + k E r . As shown in Figure 10, it is observed that the average energy consumption is affected by different numbers of deployed sensors. This experiment is carried out for different number of holes, and it is found that the energy consumption is increased with the number of holes. This situation occurs as the degree of neighbors that enclose coverage holes increases due to the increase in the different numbers of holes.
Figure 11 shows the average number of neighbors required to detect a coverage hole in LVP, the vector method and the DCHD algorithm, which is simulated with a fixed number of 15 holes in the monitoring region. When the number of sensors is 200, the average degree of neighbors is around 3.52, and therefore, the number of nodes required in hole detection is almost similar in all three protocols. However, when the number of sensor is increased to 800, the average degree of neighbors is around 27.31. Obviously, the average number of required nodes to detect the holes in the vector method is increased. However, in our DCHD and LVP algorithms, only a fixed number of nodes is used to detect the hole. However, in the DCHD algorithm, the average number of nodes needed for hole detection is 4.62, whereas an average of 6.02 nodes can participate in the LVP algorithm to detect the hole. From the simulation results depicted in Figure 11, we can infer that the execution time to find the hole in the vector method and the LVP algorithm is more than the DCHD algorithm. It is to be noted that the performance of DCHD is a little better than LVP in terms of the average number of nodes required for the hole detection. In LVP, the coverage hole is detected by taking the number of nearest neighbors, similarly to DCHD. According to their protocol, the communication range of each sensor is divided into four quadrants to find the number of nearest sensors of each sensor. In LVP, the number of neighbors that participate in the coverage hole detection procedure is a little more (6.02 nodes) than ours. Hence, the performance of DCHD over LVP is a little better in terms of the average number of nodes for the hole detection.
Figure 12 shows the simulation result of average hole detection time with different numbers of holes for different protocols. It is noticed that the average hole detection time in DCHD is least as compared to LVP and the vector method. It is obvious from the results that DCHD outperforms LVP and the vector method, as fewer nodes in DCHD participate to detect the coverage holes. However, in all three protocols, the average hole detection time is increased with the increase in the number of holes, which is obvious. The average energy consumption in the three protocols is simulated for different numbers of coverage holes with a fixed number of nodes deployed over the monitoring region, which is fixed at 1000. As shown in Figure 13, it is found that the average energy consumption in these three protocols increases with the increase in the number of holes. However, the average energy consumption in DCHD is less than LVP and the vector method, which is due to the participation of less nodes to detect a coverage hole. Since, our protocol can save more power to detect the same number of holes as compared to other protocols, it can increase the network lifetime.
The control packet overhead of our protocol is compared to LVP and the vector method for different numbers of nodes, as shown in Figure 14. It is observed that our protocol outperforms LVP and the vector method when the number of coverage holes is less. From the simulation result, we find that there is no control packet overhead when the number of sensors is from 100 to 300. However, when the number of sensors is more than 300, the density of the sensors increases, and a greater number of redundant sensors in the network can increase the number of control packets.

6. Conclusion and Future Work

In this paper, a distributed coverage hole detection scheme is proposed in which the sensors can store location information of their one-hop neighbors to detect the presence of a coverage hole without the help of the sink. Prior to the detection of the holes, the construction of the holes is done using simple geometric methods to find the points of intersection and to check whether those points are covered or not. Algorithms are developed to join the critical points of intersection and, finally, to construct the hole. Using local information of the nodes, the global view of the coverage hole detection can be done. Besides, our protocol can formulate the bounded or unbounded coverage holes to predict the nature of the holes, which is a unique contribution in this work. Using covered or uncovered arcs, our protocol can also find the shape of the coverage hole. The interesting contribution in our work is that it can be applicable to detect the coverage holes irrespective of any shape or size of the monitoring region. Though we develop here the protocol for a rectangular monitoring region, our work with the same algorithm can be extended to the monitoring region of any shape and size, which is very practical in wireless sensor networks. Hence, our algorithms can be more useful and beneficial as compared to similar hole detection protocols. We feel that the proposed algorithm can find holes in the simplest way and with less time complexity and is therefore quite suitable for the memory and energy constraints of sensors. In our future work, we plan to design coverage hole detection algorithms for any irregular monitoring region. Besides, we will propose protocols for how to recover the coverage holes by moving a few sensors that have a large sensing overlap with their neighbors without disturbing the existing communication. Since the mobility of the sensors consumes more power, in our future work, we will design protocols to recover the holes with limited mobility.

Acknowledgments

This work is co-sponsored by the Ministry of Science and Technology (MOST), Taiwan, under Grants 103-2221-E-182-029, 104-2221-E-182-032, 104-2745-8-182-001 and 104-2221-E-182-004.

Author Contributions

Prasan Kumar Sahoo, Ming-Jer Chiang and Shih-Lin Wu conceived of and designed the protocol and experiments, analyzed the data and wrote the paper. Ming-Jer Chiang drew the figures and prepared the simulation results.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Pottie, G.J. Wireless sensor networks. In Proceedings of the Information Theory Workshop, Killarney, Ireland, 22–26 Jun 1998; pp. 139–140.
  2. Pottie, G.J.; Kaiser, W.J. Wireless integrated network sensors. Commun. ACM 2000, 43, 51–58. [Google Scholar] [CrossRef]
  3. Sohrabi, K.; Gao, J.; Ailawadhi, V.; Pottie, G.J. Protocols for self-organization of a wireless sensor network. IEEE Pers. Commun. 2000, 7, 16–27. [Google Scholar] [CrossRef]
  4. Heinzelman, W.B.; Murphy, A.L.; Carvalho, H.S.; Perillo, M.A. Middleware to support Sensor Network Application. IEEE Netw. J. 2004, 18, 6–14. [Google Scholar] [CrossRef]
  5. Boudriga, N.; Hamd, M.; Iyengar, S. Coverage Assessment and Target Tracking in 3D Domains. Sensors 2011, 11, 9904–9927. [Google Scholar] [CrossRef] [PubMed]
  6. Sahoo, P.K.; Liao, W.-C. HORA: Distributed Hole Recovery Algorithms for Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2015, 14, 1397–1410. [Google Scholar] [CrossRef]
  7. Zhang, H.; Hou, J.C. Maintaining Sensing Coverage and Connectivity in Large Sensor Networks. Ad Hoc Sens. Wirel. Netw. 2005, 1, 89–124. [Google Scholar]
  8. Tian, D.; Georganas, N.D. Connectivity Maintenance and Coverage Preservation in Wireless Sensor Networks. Ad Hoc Netw. 2005, 2, 744–761. [Google Scholar] [CrossRef]
  9. Funke, S. Topological hole detection in wireless sensor networks and its applications. In Proceedings of the 2005 Joint Workshop on Foundations of Mobile Computing, Germany, 5 September 2005; pp. 44–53.
  10. Ahmed, N.; Kanhere, S.S.; Jha, S. The Hole Problem in Wireless Sensor Networks: A Survey. ACM SIGMOBILE Mobile Computing and Communications Review; ACM: New York, NY, USA, 2005; Volume 9, pp. 4–18. [Google Scholar]
  11. Xu, H.; Zhu, J.; Wang, B. On the Deployment of a Connected Sensor Network for Confident Information Coverage. Sensors 2015, 15, 11277–11294. [Google Scholar] [CrossRef] [PubMed]
  12. Kumar, S.; Lai, T.H.; Balogh, J. On k-coverage in a mostly sleeping sensor network. Wirel. Netw. 2008, 14, 277–294. [Google Scholar] [CrossRef]
  13. Zhang, H.; Hou, J.C. On the critical total power for asymptotic k-connectivity in wireless networks. In Proceedings of the IEEE INFOCOM 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13–17 March 2005; pp. 466–476.
  14. Mo, W.; Qiao, D.; Wang, Z. Lifetime maximization of sensor networks under connectivity and k-coverage constraints. In Proceedings of the IEEE DCOSS, San Francisco, CA, USA, 18–20 June 2006; pp. 422–442.
  15. Meguerdichian, S.; Koushanfar, F.; Potkonjak, M.; Srivastava, M.B. Coverage problems in wireless ad hoc sensor networks. In Proceedings of The 20th Annual Joint Conference of the IEEE Computer and Communications Societies, Anchorage, AK, USA, 22–26 April 2001; pp. 1380–1387.
  16. Liu, B.; Towsley, D. On the coverage and detectability of large-scale wireless sensor networks. In Proceedings of the Workshop of Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Sophia Antipolis, France, 3–5 March 2003; pp. 201–204.
  17. Shakkottai, S.; Srikant, R.; Shroff, N. Unreliable sensor grids: Coverage, connectivity and diameter. In Proceedings of the IEEE Societies INFOCOM 2003 Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, San Francisco, CA, USA, 30 March–3 April 2003; Volume 2, pp. 1073–1083.
  18. Zhang, C.; Zhang, Y.; Fang, Y. Localized algorithms for coverage boundary detection in wireless sensor networks. Wirel. Netw. 2009, 15. [Google Scholar] [CrossRef]
  19. Huang, C.F.; Tseng, Y.C. The coverage problem in a wireless sensor network. In Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, San Diego, CA, USA, 19 September 2003; pp. 115–121.
  20. Zhang, H.; Hou, J. Maintaining sensing coverage and connectivity in large sensor networks. Wirel. Ad Hoc Sens. Netw. 2005, 1, 89–123. [Google Scholar]
  21. Wang, X.; Xing, G.; Zhang, Y.; Lu, C.; Pless, R.; Gill, C. Integrated coverage and connectivity configuration for energy conservation in sensor networks. ACM Trans. Sens. Netw. 2005, 1, 36–72. [Google Scholar]
  22. Liu, C.Y. Remote Hole Detection Algorithms for Wireless Sensor Network. Master Thesis, Yuan Ze University, Taoyuan, Taiwan, 15 August 2009. [Google Scholar]
  23. Sahoo, P.K.; Tsai, J.-Z.; Ke, H.L. Vector method based coverage hole recovery in Wireless Sensor Networks. In Proceedings of the IEEE International Conference on Communication Systems and Networks, Bangalore, India, 5–9 January 2010; pp. 1–9.
  24. Kukunuru, N.; RajyaLakshmi, D.; Damodaram, A. Hybrid approach for detecting and healing the coverage-hole in Wireless Sensor Network. In Proceedings of the 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT), Ajmer, India, 12–13 July 2014; pp. 110–115.
  25. Zhang, Y.; Zhang, X.; Wang, Z.; Liu, H. Virtual edge based coverage hole detection algorithm in wireless sensor networks. In Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, China, 7–10 April 2013; pp. 1488–1492.
  26. Zhang, Y.; Zhang, X.; Fu, W.; Wang, Z.; Liu, H. HDRE: Coverage hole detection with residual energy in wireless sensor networks. Commun. Netw. 2014, 16, 493–501. [Google Scholar] [CrossRef]
  27. Yu, X.; Xu, M.; Cheng, L.; Hu, N. A novel coverage holes detection and holes recovery algorithm in wireless sensor networks. In Proceedings of the Control and Decision Conference (CCDC), Qingdao, China, 23–25 May 2015; pp. 3640–3644.
  28. Htun, A.M.; Maw, M.S.; Sasase, I. Reduced complexity on mobile sensor deployment and coverage holehealing by using adaptive threshold distance in hybrid Wireless Sensor Networks, Personal, Indoor, and Mobile Radio Communication (PIMRC). In Proceedings of the 2014 IEEE 25th Annual International Symposium on Capital Hilton, Washington, DC, USA, 2–5 September 2014; pp. 1547–1552.
  29. Chintakunta, H.; Krim, H. Distributed Localization of Coverage Holes Using Topological Persistence. IEEE Trans. Signal Process. 2014, 62, 2531–2541. [Google Scholar] [CrossRef]
  30. Misra, S.; Singh, S.; Khatua, M. MIRACLE: Mobility Prediction Inside a Coverage Hole Using Stochastic Learning Weak Estimator. IEEE Trans. Cybern. 2015, 99, 1–12. [Google Scholar] [CrossRef] [PubMed]
  31. Fan, X.; Zhang, Z.; Lin, X.; Wang, H. Coverage hole elimination based on sensor intelligent redeployment in WSN. In Proceedings of the 2014 IEEE 4th Annual International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), Hong Kong, China, 4–7 June 2014; pp. 336–339.
  32. Qin, N.; Zheng, X.; Tian, G. Trajectory-Based Coverage Assessment Approach for Universal Sensor Networks. Sensors 2015, 15, 19649–19666. [Google Scholar] [CrossRef] [PubMed]
  33. Li, W. A Novel Graphic Coverage Hole Description in Wireless Sensor Networks. IEEE Commun. Lett. 2014, 18, 2205–2208. [Google Scholar] [CrossRef]
  34. Aliouane, L.; Benchaiba, M. HACH: Healing Algorithm of Coverage Hole in a Wireless Sensor Network. In Proceedings of the 2014 Eighth International Conference on Next Generation Mobile Apps, Services and Technologies (NGMAST), Oxford, UK, 10–12 September 2014; pp. 215–220.
  35. Network Simulator. Available online: http://www.isi.edu/nsnam/dist/ (accessed on 18 April 2006).
  36. Texas Instruments Chipcon Products. Available online: http://www.chipcon.com (accessed on 19 June 2004).
  37. Perkins, C.E.; Royer, E.M. Ad-hoc On-Demand Distance Vector Routing. In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, 25–26 February 1999; pp. 90–100.
  38. Rappaport, T.S. Wireless Communications: Principles and Practice, 2 ed.; Prentice Hall PTR: Upper Saddle River, NJ, USA, 2002. [Google Scholar]
Figure 1. Example of the consequences of coverage holes. (a) Loss of connectivity due to death of node D; (b) Coverage hole due to death of node D; (c) Both coverage and connectivity hole due to death of node D.
Figure 1. Example of the consequences of coverage holes. (a) Loss of connectivity due to death of node D; (b) Coverage hole due to death of node D; (c) Both coverage and connectivity hole due to death of node D.
Sensors 16 00386 g001
Figure 2. Example of coverage holes, critical intersection point (CIP) and covered point (CP).
Figure 2. Example of coverage holes, critical intersection point (CIP) and covered point (CP).
Sensors 16 00386 g002
Figure 3. Example of the sensing disc and connecting neighbors.
Figure 3. Example of the sensing disc and connecting neighbors.
Sensors 16 00386 g003
Figure 4. Example of the calculating of CIP and CP.
Figure 4. Example of the calculating of CIP and CP.
Sensors 16 00386 g004
Figure 5. Flow chart of the complete coverage hole detection procedure.
Figure 5. Flow chart of the complete coverage hole detection procedure.
Sensors 16 00386 g005
Figure 6. Construction of covered and uncovered arcs.
Figure 6. Construction of covered and uncovered arcs.
Sensors 16 00386 g006
Figure 7. Formation of coverage holes using the uncovered arcs.
Figure 7. Formation of coverage holes using the uncovered arcs.
Sensors 16 00386 g007
Figure 8. Average hole detection time in DCHD with different numbers of coverage holes.
Figure 8. Average hole detection time in DCHD with different numbers of coverage holes.
Sensors 16 00386 g008
Figure 9. Control packet overhead in DCHD with different numbers of coverage holes.
Figure 9. Control packet overhead in DCHD with different numbers of coverage holes.
Sensors 16 00386 g009
Figure 10. Energy consumption in DCHD to detect different numbers of coverage holes.
Figure 10. Energy consumption in DCHD to detect different numbers of coverage holes.
Sensors 16 00386 g010
Figure 11. Comparison of DCHD in terms of the average number of nodes to detect a hole.
Figure 11. Comparison of DCHD in terms of the average number of nodes to detect a hole.
Sensors 16 00386 g011
Figure 12. Comparison of DCHD with other protocols in terms of the average hole detection time.
Figure 12. Comparison of DCHD with other protocols in terms of the average hole detection time.
Sensors 16 00386 g012
Figure 13. Comparison of DCHD with other protocols in terms of the average energy consumption.
Figure 13. Comparison of DCHD with other protocols in terms of the average energy consumption.
Sensors 16 00386 g013
Figure 14. Control packet overhead of DCHD as compared to other protocols.
Figure 14. Control packet overhead of DCHD as compared to other protocols.
Sensors 16 00386 g014
Table 1. List of neighbors and corresponding critical intersection points (CIP) of a node.
Table 1. List of neighbors and corresponding critical intersection points (CIP) of a node.
NodeNeighborsCorresponding CIP
S 1 S 2 P 1 , P 16
S 10 P 10
S 11 P 15
S 2 S 1 P 1 , P 16
S 3 P 2 , P 17
S 3 S 2 P 2 , P 17
S 4 P 3 , P 18
S 4 S 3 P 3 , P 18
S 5 P 4
S 5 S 4 P 4
S 6 P 5 , P 20
S 6 S 5 P 5 , P 20
S 7 P 6 , P 21
S 7 S 6 P 6 , P 21
S 12 P 22
S 8 P 7
S 8 S 7 P 7
S 12 P 25
S 9 P 8 , P 26
S 9 S 8 P 8 , P 26
S 13 P 27
S 10 P 9
S 10 S 1 P 10
S 9 P 9
S 11 No

Share and Cite

MDPI and ACS Style

Kumar Sahoo, P.; Chiang, M.-J.; Wu, S.-L. An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks. Sensors 2016, 16, 386. https://doi.org/10.3390/s16030386

AMA Style

Kumar Sahoo P, Chiang M-J, Wu S-L. An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks. Sensors. 2016; 16(3):386. https://doi.org/10.3390/s16030386

Chicago/Turabian Style

Kumar Sahoo, Prasan, Ming-Jer Chiang, and Shih-Lin Wu. 2016. "An Efficient Distributed Coverage Hole Detection Protocol for Wireless Sensor Networks" Sensors 16, no. 3: 386. https://doi.org/10.3390/s16030386

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop