Next Article in Journal
TCN-MAML: A TCN-Based Model with Model-Agnostic Meta-Learning for Cross-Subject Human Activity Recognition
Previous Article in Journal
Detecting Important Features and Predicting Yield from Defects Detected by SEM in Semiconductor Production
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Coverage Hole Recovery in Hybrid Sensor Networks Based on Key Perceptual Intersections for Emergency Communications

1
Henan Intelligent Emergency Service and Security Engineering Research Center, Nanyang Normal University, Nanyang 473061, China
2
Collaborative Innovation Center of Intelligent Explosion-Proof Equipment, Henan Province, Nanyang Normal University, Nanyang, 473061, China
3
The State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(13), 4217; https://doi.org/10.3390/s25134217 (registering DOI)
Submission received: 22 May 2025 / Revised: 26 June 2025 / Accepted: 4 July 2025 / Published: 6 July 2025
(This article belongs to the Section Sensor Networks)

Abstract

Wireless sensor networks (WSNs) have found extensive applications in a variety of fields, including military surveillance, wildlife monitoring, industrial process monitoring, and more. The gradual energy depletion of sensor nodes with limited battery energy leads to the dysfunction of some of the nodes, thus creating coverage holes in the monitored area. Coverage holes can cause the network to fail to deliver high-quality data and can also affect network performance and the quality of service. Therefore, the detection and recovery of coverage holes are major issues in WSNs. In response to these issues, we propose a method for detecting and recovering coverage holes in wireless sensor networks. This method first divides the network into equally sized units, and then selects a representative node for each unit based on two conditions, called an agent. Then, the percentage of each unit covered by nodes can be accurately calculated and holes can be detected. Finally, the holes are recovered using the average of the key perceptual intersections as the initial value of the global optimal point of the particle swarm optimization algorithm. Simulation experiments show that the algorithm proposed in this paper reduces network energy consumption by 6.68%, decreases the distance traveled by mobile nodes by 8.51%, and increases the percentage of network hole recovery by 2.16%, compared with other algorithms.

1. Introduction

Wireless sensor networks (WSNs) represent a novel paradigm in computing and networking, characterized as a system consisting of minute, expensive, and highly intelligent devices, commonly referred to as sensor nodes [1,2]. A wireless sensor network (WSN) is a structure composed of numerous sensor nodes that communicate wirelessly. It is extensively utilized in the industrial field for detecting and monitoring key target areas, such as urban tracking and observation [3], environmental analysis [4], strategic surveillance [5], mobile target tracking [6], and smart home automation [7]. The deployment environment of a WSN is highly variable, presenting numerous challenges. Sensor nodes may be deployed in areas where the environment is harsh and manpower cannot work, and the death of a sensor node may be caused by its own factors such as the exhaustion of energy required by the node and hardware failure, as well as environmental factors such as inclement weather and external attacks. Once a node loses its sensing capability, it is unable to complete the information collection and reporting tasks within its original sensing range. The network area that has been well covered and monitored is damaged, and a network coverage hole is formed [8]. The coverage hole will impair data transmission and disconnect the connected network, resulting in unobservable critical events or inaccurate data, greatly reducing the integrity of the WSN in collecting information from the covered area, and degrading and destroying the functionality of the entire network. After a disaster, to ensure the communication quality and meet various rescue communication needs, it is necessary to restore the composite communication of the whole area in a high-efficiency way. Therefore, sensor nodes are deployed to complete the full coverage of the disaster area to achieve the recovery of basic communications.
When the network is divided into so many units and several units are detected to have coverage holes, then we need to select suitable mobile nodes to fix the coverage holes. The algorithm in this paper has the option of moving nodes to fix holes, but its fitness function is slightly simplistic and has a lot of room for improvement [9]. In this paper, the fitness function not only considers the distance of the hole from the BS, the coverage of the hole, but also considers the overlap rate with other nodes when the mobile node dispatches over.
The term key perception intersection point is abbreviated as KIP. A perception intersection point refers to the intersection between the sensing circle of a node in the surveillance area and its neighboring nodes, or the intersection between that node and the boundary of the detection area. A perception intersection is termed a key perception intersection if it is not covered by any other neighboring nodes [10]. If the KIP of a unit is determined, the centroid of the coverage hole can be approximated. If the centroid of the coverage hole is known, mobile nodes can be directly dispatched to fix the hole [11]. However, the single use of a KIP to repair the hole has many issues, such as the peculiar shape of the hole, a too high overlap rate with other nodes, etc. To overcome these problems, we combine the KIP with PSO, and consider the overlap rate of mobile nodes with other nodes when setting the fitness function, which achieves good results.
To address these issues and reduce the energy consumption and the mobility distance of the mobile nodes, this paper proposes a method for hole detection and recovery based on a key perception intersection (partial research results were published in the IEEE International Symposium on Parallel and Distributed Processing with Applications ISPA 2024). In this method, the network is firstly united. Then, the percentage of each unit covered by nodes is accurately calculated and holes are detected. Finally, the hole is recovered by using the average of the key perception intersections as the initial value of the global optimal point of the PSO. The key contributions presented in this paper can be condensed as:
(1) The paper introduces a network unit formulation rooted in network density, a metric derived from the interplay between network scale and the count of nodes. As network density escalates, so does the proliferation of units, fostering the enhanced load distribution and the streamlined management of network nodes.
(2) The entire network environment is divided into units, each discretized into k*k pixel points. Each unit has an information table with the number of rows equal to the number of pixels covered by the unit and the number of columns in the table equal to the number of nodes in the unit. The method can accurately calculate the percentage of each unit covered by nodes and can accurately detect the location of holes. The accurate identification of holes can improve the recovery efficiency, coverage, and quality of service of the network.
(3) Using mobile nodes to recover holes improves coverage. Recovering holes by using the average value of the key perceived intersection as the initial value of the global optimal point of PSO reduces the distance traveled by the mobile nodes and improves the overall coverage of the nodes.
The rest of this article is structured as follows: Section 2 reviews the literature pertinent to our work. Section 3 describes network scenarios and several models. Section 4 provides a detailed description of the proposed method. Section 5 presents the simulation results and evaluation of the proposed method. Finally, some conclusions are given in Section 6.

2. Related Work

In recent times, numerous methods have been developed to tackle the problem of coverage holes in WSNs. These approaches can generally be divided into three categories according to the type of network: static sensor networks, mobile sensor networks, and hybrid sensor networks.

2.1. Static Sensor Networks

Since nodes are not mobile, the main consideration is the deployment strategy of the nodes, which is more like network optimization. By scheduling the monitoring area to be fully covered by sensor nodes simultaneously, the overlapping areas between nodes can be minimized, thereby maximizing the overall coverage of the network. The focus of the static WSN solution is to find the smallest set of sensor nodes that can fully monitor the covered area, utilizing an effective clustering method with a sensor activation scheduling strategy, and combining it to reduce the energy consumption for network deployment and improve the energy utilization, thus extending the network lifecycle and maintaining the coverage [12]. A sensor deployment method based on the bee clustering algorithm schedules sensor nodes to achieve the longest lifecycle while minimizing the overlap region and the number of nodes used at the time of deployment [13]. Paper [14] proposes an effective genetic algorithm, MIGA, for the maximization of the area coverage in static wireless sensor networks with heterogeneous sensing ranges. However, this method has a relatively large computational load and longer computation time. For example, when processing the s5-09 instance, the average computation time for MIGA is about 60,000 ms, while the average computation time for ICS is about 20,000 milliseconds. Its computational complexity is also too high (O(n3logn)). Paper [15] proposed a distributed energy efficiency optimization method based on the firefly algorithm, which divides the network geography into grids and balances the network energy consumption. However, the applicability and efficiency in dynamic and complex network environments are relatively low. Hole remediation can be achieved by activating the neighbor node with the highest number of sensor nodes at the hole edge. But this leads to high node-to-node overlap [16]. The complexity of this algorithm is high and the redundancy of the nodes also has a significant impact on the network. The algorithm proposed in this paper limits the redundant coverage of critical targets and improves network lifetime by prioritizing the sensors that cover critical targets and have high remaining battery life [17]. The algorithm WEMER in this paper merges the wedge regions dynamically by forming sectors and wedges during the initialization phase of the network and merging the wedges dynamically when energy voids are formed. It also effectively balances the energy consumption in the network and prolongs the lifetime of the network by considering the residual energy of the nodes and the distance from the relevant successor cluster head when selecting the cluster head [18]. Paper [19] calculates node positions using an improved Lyapunov optimization algorithm, performs clustering, and calculates the area of holes using an improved sand cat swarm optimization algorithm, and then detects the shape and size of holes using hybrid deep reinforcement learning technology. However, the training process of Hyb-DRL technology requires a large amount of data and time, which may result in a long model training time and difficulty in quickly adapting to dynamic changes in the network. The paper [20] uses ISGO to quantify the area covered by holes, DGO to accurately locate hole boundaries, and RGNN to select patch locations, significantly improving the efficiency of hole detection and repair. However, DGO may have shortcomings in terms of positioning accuracy, especially in complex network environments, and the accuracy of boundary identification may be challenged. Paper [21] locates holes by calculating the area of the circumscribed circle and assigns repair priorities based on hole size. However, these com-plex calculations consume a significant amount of computing resources and increase the energy consumption of sensor nodes.

2.2. Mobile Sensor Networks

All sensors can be moved after deployment, and when a coverage gap occurs within a network, mobile nodes can be directly dispatched to fix the coverage gap. The main concern of mobile sensor networks is the selection of appropriate nodes and their deployment to desired locations to maximize the coverage area. In paper [22], the movement of a vast quantity of sensor nodes is utilized to achieve a balanced distribution of nodes within the network and to eliminate coverage holes. In paper [23], hole detection and recovery use multiple computational geometric steps such as Voronoi diagram construction, Delaunay triangular dissection, and convex packet formation, which can lead to high computational complexity. Despite acknowledging the importance of the distance between the virtual repair node and the mobile node, as well as the energy expenditure incurred during the mobile repair operations, the paper does not fully consider the energy consumed by all of the nodes in the repair process. In this paper [24], according to the perception probability of the nodes, a node movement strategy is designed so that the nodes move to a region with low perception probability, but there is a problem with the insufficient control of the movement of the nodes in the dense region. In paper [25], we propose an algorithm that combines node mobility and adjustable sensing range to fix the coverage holes, but the nodes need to adjust their sensing range or position frequently. Although the genetic algorithm and particle swarm optimization algorithm proposed in this paper theoretically improve the coverage performance of wireless sensor networks, they suffer from the problems of difficult parameter adjustment but easily fall into local optimal solutions [26]. The approach proposed in the paper [27], while aiming to address the energy and coverage hole problems in underwater wireless sensor networks, suffers from high node energy consumption and a high dependence on initial deployment.

2.3. Hybrid Sensor Networks

Hybrid WSNs combine static and mobile sensor networks. Initially static sensor nodes are deployed and later when holes are found, holes are fixed by dispatching mobile nodes. In the paper [28], a self-healing coverage scheme based on fuzzy logic is proposed for randomly deployed mobile sensor networks. The scheme minimizes coverage holes by identifying uncovered sensing areas and selecting the best mobile node within moments. However, it relies on a fuzzy logic system for node selection and mobility decisions, which may increase the computational complexity and may lead to an insufficient response in rapidly changing network environments. Paper [29] balances the load by dividing the detection area into equal-sized units, while calculating node overlaps with high accuracy to schedule sensor nodes and reduce network energy consumption. However, the algorithm requires high computational resources to achieve accurate node overlap calculation and hole detection. Paper [30] proposes a dynamic clustering method based on a two-layer WSN–IoT architecture to detect coverage holes by clustering members, accurately identifying holes using the surveyor’s formula, and recovering holes using fuzzy logic. However, the detection and recovery of coverage holes using the surveyor’s formula and fuzzy logic is computationally complex and consumes more computational resources. Also, the recovery strategy proposed in the article is not applicable in some specific cases, such as when there are a lot of coverage holes in the network or when the nodes have an extreme energy imbalance. The algorithm in this paper estimates the node’s overlap with other neighboring nodes by converting the sensory range of each sensor node into a numerical matrix, and then designs a scheduling mechanism based on Q-learning. However, using Q-learning and numerical matrices to calculate node overlap increases the computational burden of sensor nodes, especially in resource-constrained environments [31].
This shows that swarm intelligence optimization algorithms are more popular and have more research value in solving coverage holes. KIP is also frequently used in coverage vulnerability detection. Combining KIP with swarm intelligence optimization algorithm is of great significance for coverage hole fixing.

3. System Model

3.1. Network Model

In WSNs, n static UAVs and m mobile UAVs are randomly deployed in a rectangular target area O. It is assumed that all mobile nodes are initially deployed with all of them dormant and located at the base station. In addition, the entire network is well connected regardless of the presence of coverage voids. The following assumptions are made for the network model used in this chapter to ensure the subsequent work:
Assumption 1.
n static UAVs and m mobile UAVs are randomly deployed in the WSNs target area. The set of UAVs is defined as S = {S1, S2, …, Sn, Sn+1, …, Sn+m}, where Si = (xi, yi) (i = 1, 2, 3, …, n + m) is the position of each UAV.
Assumption 2.
Each UAV knows its location information through GPS or some location service, and each node has a unique ID number [32].
Assumption 3.
Assume that the UAV randomly deployed in the WSNs are isomorphic with a sensing radius of Rs, a communication radius of Rc, and both the communication range and the sensing range are circular areas centered on the node position and radiused by Rs, Rc, respectively. To ensure the normal transmission of data, the communication radius of the node is set equal to twice the sensing radius of the node, i.e., Rc = 2Rs [33].
The network model of the method in this paper is shown in Figure 1.

3.2. Sensing Model

In the context of WSN coverage, two primary sensing models exist: the Boolean sensing model and the probabilistic sensing model. The Boolean sensing model is also referred to as the 0–1 sensing model. Given its relative simplicity compared with the probabilistic sensing model, we will employ the Boolean sensing model in this paper, as detailed below:
  P i , j = 1 , d i , j R s 0 , o t h e r w i s e
where d(i,j) denotes the Euclidean distance between node Si and the target at point j, and Rs is the perception radius of the node. Through (1), it is obvious that when the monitored object is within the sensing range of node Si, the probability that the monitored object is covered by effective sensing is 1. Otherwise, its probability is constant at 0.

3.3. Energy Model

The energy consumption model presented in paper [34] is utilized for calculating energy consumption. To ensure efficient data transmission, the node amplifies the signal during the data transmission process based on the transmission distance. Assuming the data transmission distance is d, the energy consumption for a node to transmit b bits of data over the link can be expressed as:
  E t x k , d = k E e l e c + k ε f s d 2   i f   d < d 0 k E e l e c + k ε a m p d 4   i f   d   d 0
d 0 = ε f s ε a m p
where E e l e c denotes the energy consumed by the node to transmit 1 bit data, ε f s is the free space model signal amplification factor, and ε a m p is the multipath fading model signal amplification factor.
The energy consumed by the node to receive k bit data is given in the following equation:
  E r x k , d = k E e l e c

3.4. Hole Model

Since UAVs have limited battery energy, where the gradual depletion of energy leads to the dysfunction of some nodes, thus creating holes in the monitored area. The area covered by the node is calculated as a percentage of the area of the unit; if it is less than 90% then the unit is considered to have a coverage hole—as shown in Figure 2. For example, when the nodes at the dotted line run out of energy, resulting in the coverage area of this unit being less than 90 percent, the unit is considered to have a coverage hole.

3.5. Network Scenario

After a disaster, to ensure the quality of communications and to meet various rescue communication needs, it is necessary to efficiently restore communications in the entire region. As the ground is severely damaged after a disaster, the probability of user movement is very small, and at this time the user’s position can be considered relatively static. In such situations, users’ communication needs primarily include high reliability for data transmission to ensure the timely delivery of emergency information; low latency to enable rapid response to emergencies; and sufficient coverage to ensure that all disaster-affected areas can be monitored. Therefore, aerial base stations need to be established, and the deployment of UAVs should ensure full coverage of the disaster area to realize the restoration of basic communications.
The emergency communications scenario is shown in Figure 3.

4. Proposed Methodology

The proposed method is designed to address the issue of detecting and recovering coverage holes in wireless sensor networks through a three-stage process. In the initial phase, the network is partitioned into a varying number of equally sized units, depending on the density of the nodes. Then an agent is selected for each unit based on two conditions: the distance of the node from the center point of the unit and the remaining energy of the node. After that, the information is transmitted through the agent node and when the energy of the agent node is less than 10%, the agent node is reselected. In the second stage of the method, each unit has an information table, and the percentage of nodes covering each unit can be calculated more accurately based on the information table. When the percentage of the unit is less than 90%, we consider that the unit has coverage holes. After that, it is necessary to fix the coverage holes. In the third stage, when the coverage holes are detected, we use the average value of the key perceptual interactions as the initial value of the global optimal point of the PSO, and then we send the mobile nodes to repair the holes. Meanwhile, we consider three factors when fixing the holes, including the distance of the BS from the hole unit, the coverage ratio of the hole, and the overlap of the mobile node with other nodes. In our work, the basic framework of the algorithm in this paper is shown in Figure 4. The following section describes the algorithm of this paper in detail.

4.1. Network Unit

In this phase, the network environment is unitized based on its density. To achieve optimal load distribution, the number of network units dynamically adjusts to reflect the network’s density, with denser networks resulting in a greater number of uniform-sized units. Initially, the network density is determined using Formula (5), which considers both the number of nodes and the network’s area.
D e n s i t y = n L 2
In (5) n is the number of static sensor nodes and L is the width of the monitoring environment. Based on (6), the network is divided into different numbers of units according to the network density.
C = 2 2 ,   i f ( 0 D e n s i t y 0.001 ) 3 2 ,   i f 0.001 D e n s i t y 0.01 4 2 ,   i f ( 0.01 D e n s i t y 0.05 ) 5 2 ,   i f ( 0.05 D e n s i t y 0.1 ) 6 2 ,   i f ( 0.1 D e n s i t y 0.15 ) 7 2 ,   i f ( 0.15 D e n s i t y 0.2 )
where C is the number of divided units. The size of each unit is calculated according to (7).
C e l l s i z e = L C
After that the unitized unit is named as shown in Figure 5.
The Aij represent a unit, where i signifies the row position of the unit within a grid, and j represents its column position. Meanwhile, (x0, y0) represents the location of the base station.
According to (8), each individual node can determine the unique unit number in which it is located.
i = y s C e l l s i z e j = x s C e l l s i z e
where (xs, ys) is the position of UAV and Cellsize is the size of the unit.
In each unit, the node with the most remaining energy and closest to the unit center is selected as the unit agent. It is assumed that each unit has a unit centroid, such as shown in Figure 5.
The coordinates of the center point of each unit are calculated according to (9).
  x 0 + j 1 2     C e l l s i z e , y 0 + i 1 2     C e l l s i z e
where (x0, y0) represents the location of the base station, i represents the horizontal coordinate of the node, j represents the vertical coordinate of the node, and Cellsize represents the size of the unit.
All of the nodes send a hello message containing node ID, Cell-number, Remaining energy, Distance, and Packet type to other neighboring nodes in the same unit as shown in Figure 6. The ID represents the node number, Cellnumber represents the unit number where the node is located, Remaining energy represents the remaining energy of the node, Distance represents the distance from the node to the center point of the unit, and Packet type represents the packet type, which initially has a value of 0.
Then, each node is compared with its neighbors. The optimal unit agent is selected and it will send a packet containing its ID and Cellnumber to its co-unit node and declare itself as a unit agent. If the value of Packet type changes to 1, it means that the node is a unit agent.
When the energy level of a unit agent drops below 10%, an agent notification packet is transmitted to its co-unit node, and the process of selecting a new unit agent for that unit is repeated. This mechanism ensures that the unit agent is changed as needed to function properly and fulfill its responsibilities effectively. As depicted in Figure 6, in addition to the Cellnumber and ID, the Packet type is also included in the transmission. If the Packet type changes to 0, it indicates that the unit agent has been reselected.
Algorithm 1 gives the pseudo-code for the first stage.
Algorithm 1. Network unit
Input: i: row number, j: column number, L: length of the network, C: number of network units, n: number of nodes
Output: C, Aij
1: The network density is calculated
2: Density = n/L2
3: The number of units is calculated according to the Density
4: Each unit is named as Aij
5: The side size of each unit in the network is calculated by C e l l s i z e = L C
6: The base station notifies (x0, y0) and Cellsize to all network nodes
7: for (s = 1; sn; s++) do
8:       Identifying unit number in which it is located for nodes by i = y s C e l l s i z e j = x s C e l l s i z e
9:      Node s sends a hello packet to the neighbor nodes
10: end for
11: if (The node has the most remaining energy and closest to the center of the unit) then
12:    Sends a packet and declares itself a unit agent
13: else
14:    Waits to receive the unit agent notification packet
15: end if

4.2. Detecting Holes

In this stage, each unit is discretized into kk pixel points and the set of pixel points is Ui = (xi, yi), and i = 1, 2, 3, …, k. Each unit has an information table to calculate the proportion of each unit covered by nodes. The quantity of rows present in this table corresponds directly to the total number of pixels encompassed by the unit, referred to as k. Similarly, the count of columns within this table matches the number of nodes contained within the same unit.
If a pixel is covered by at least one neighboring node, the value in its corresponding CONO column is set to 1. The number of rows in each information table is consistent, while the number of columns varies depending on the number of nodes within each unit. Initially, all entries in the information table are set to 0. When a pixel is covered by a node, the table entry corresponding to that pixel is updated to 1. Table 1 shows a complete example of an information table for unit A11, according to Figure 7.
As shown in Figure 7, (x40, y40) is covered by two nodes S1 and S2, and (x100, y100) is covered by three nodes S2, S3, and S4. Therefore, the (x40, y40) entries in the columns of nodes S1 and S2 in Table 1 are 1. The (x100, y100) entries in the columns of nodes S2, S3, and S4 are 1. (x1, y1), (xk−1, yk−1), and (xk, yk) are not covered by any node. Hence, the table entries for these pixels are all 0 in Table 1. Additional pixels are also evaluated using this same method.
The number of pixels per unit is calculated based on the length and width of the unit, based on (10).
  C e l l p i x e l = C e l l s i z e     30 2
The proportion of each unit covered by nodes is calculated according to (11).
C o v e r a g e r a t e s i j = C o N O C e l l p i x e l
If the coverage of the unit is greater than or equal to 90 per cent, the unit does not have a coverage hole. Otherwise, the unit has a coverage gap.
Figure 8 shows a cell of the network after the holes are detected.
Algorithm 2 gives the pseudo-code for the second stage.
Algorithm 2. Detecting Holes
Input: k: number of pixels covered by the unit, n: number of nodes, d: Euclidean distance, C: number of network units, Rs: sensing radius
Output: Coverageratesij
1: Information = 0
2: for (s = 1; s ≤ C; s++) do
3:      for (k = 1; dRs; k++) do
4:         All the entries of a row k in the Info table are OR together and recorded in CoNO column
5:      end for
6:      Calculate the coverage of each unit (Coverageratesij)
7: end for
8: for (s = 1; sC; s++) do
9:      if (Coverageratesij < 90%) then
10:      This unit has holes.
11:    else
12:        There are no holes in this unit.
13: end if

4.3. Hole Recovery

In this phase, we need to first find the key perceptual intersection of all nodes within each unit. For example, Figure 9 shows the distribution of nodes in unit A11. In Figure 9, node S1 intersects its neighbor node S2 at P1 and P2, and the set {P1, P2} are no longer covered by any other nodes. Therefore, the set {P1, P2} is the key perceptual intersection of node S1. Node S2 has three neighboring nodes, S1, S3, and S4. The intersection of S2 with S1 is P1, P2, and P1, P2 are no longer covered by other nodes, so P1, P2 are part of the key perceptual intersection set of S2. The intersection of S2 with S3 is P3, P4, but this intersection of P4 is covered by S4, so P4 is not a key perceptual intersection set of S2, and similarly, P5 is also is not a key perceptual intersection of S2. The final result is that the set {P1, P2, P3, P6} is the key perceptual intersection of S2.
With this method, the key perceptual intersections of all nodes in the unit are derived. After that, the key perception intersection of all nodes in the unit is derived, but the exact location coordinates of all KIPs need to be known. The key perceived intersections P1, P2 of node Si with its neighbor node Sj are calculated as follows:
x p 1 = δ + γ y j y i d i , j , y p 1 = η + γ x j x i d i , j
  x p 2 = δ γ y j y i d i , j , y p 2 = η + γ x j x i d i , j
where (xi, yi), (xj, yj) are the position coordinates of nodes Si, Sj, respectively, di,j denotes the Euclidean distance between node Si and node Sj, (xp1, yp1) are the coordinates of intersection point P1, and (xp2, yp2) are the coordinates of intersection point P2. δ, η, and γ are calculated using the following three equations:
  δ = x i + R 2 s i R 2 s j + d 2 i j 2 d i j x j x i d i j
  η = y i + R 2 s i R 2 s j + d 2 i j 2 d i j y j y i d i j
γ = R 2 s i R 2 s i R 2 s j + d 2 i j 2 d i j
where Rsi, Rsj represent the perceived radius of node Si and node Sj.
The coordinates of the geometric center of the hole shape are then calculated using (17).
X i ¯ = i = 1 n x i n , Y i ¯ = i = 1 n y i n
where (xi, yi) are the coordinates of each key sensing point. n represents the number of key sensing intersections in this unit.
Then, PSO is used to determine the most necessary holes covered by using mobile nodes. There are m mobile nodes available for coverage hole recovery, and the number of detected coverage holes is z. When zm, the mobile nodes are directly sent to the coordinates derived from (17) for hole recovery, when the mobile nodes take into account the overlap rate with other nodes. As shown in Figure 10, the dashed position on the right side is the new position of the mobile node derived by the algorithm in this paper. When z > m, the highest priority hole is selected according to PSO. The steps in this phase of the proposed method are outlined as follows:
Initialization: In this paper, g particles are used as the initial population. Each particle is considered to cover the response of the hole.
Fitness function: In (18), the fitness function of the method in this paper is shown.
  F i t = a     1 D b s , h L + b     1 C o v e r a g e r a t e s i j +   c     1 O v e r l a p r a t e s n
where Dbs,h denotes the distance from the base station to the hole unit, calculated based on the Euclidean distance. Coverageratesij is the coverage of the unit Sij. Overlapratesn represents the overlap rate between the mobile node Sn and other nodes. L is the network width. a, b, and c are the influence coefficients, which take values in the range of 0~1 and a + b + c = 1.
In this step, each particle is evaluated according to the fitness function in (18). The solution with the highest fitness function value is designated as T.
End condition: In this paper, the termination condition is set to reach a simulation time of 150 s. If the end condition is satisfied, T is considered to be the answer; otherwise, the step continues.
Position update: The position of the particle is updated in accordance with (19).
x i d k + 1 = x i d k + v i d k
In (19), x i d k + 1 -the position vector of particle i in the dth dimension in the k + 1th iteration. x i d k -the velocity vector of particle i in the dth dimension in the kth iteration. v i d k -velocity vector of particle i in the dth dimension in the kth iteration.
Then, the velocity of the particle is updated according to (20).
  v i d k + 1 = ω   v i d k + c 1 r 1 p i d , p b e s t k x i d k +   c 2 r 2 p d , g b e s t k x i d k
In (20), N—particle swarm size; i—particle serial number, i = 1, 2, …, N; D—particle dimension; d—particle dimension serial number, d = 1, 2, …, D; k—number of iterations; w—inertia weight; c1—individual learning factor; c2—population learning factor; and r1, r2—random numbers in the interval [0, 1] to increase the randomness of the search.
Return to the evaluation step: After the position update, the new particles are evaluated. These steps are iteratively repeated until the stopping condition is met.
Algorithm 3 gives the pseudo-code for the third stage.
Algorithm 3. Hole Recovery
Input: z: number of coverage hole, m: number of mobile nodes, n: the number of key perceptual point
Output: New coverage of Unit Sij
1: Coverageratesij < 90%
2: if zm then
3:     for (z = 1; zm; z++) do
4:         The mobile node is directly sent to the coordinates for hole recovery by X i ¯ = i = 1 n x i n , Y i ¯ = i = 1 n y i n .
5:   else
6:        for (z = 1; z > m; z++) do
        the highest priority hole is selected according to Particle Swarm Optimization algorithm
7:          The priority of holes depends on three parameters, including Dbs,h, Coverageratesij, and Overlapratesn.
8:        end for
9: end if

5. Simulation Experiment and Result Analysis

In this chapter, pycharm is used to construct a 2D simulation scenario to verify the performance of the algorithms in this paper. A total of 150 static nodes are randomly distributed in a 2D area of 200 m × 200 m, and 30 mobile nodes are located near the base station. Then, the AliHallafi [9], Nilsaz Dazfouli [15], and Jain methods [30] and this paper’s algorithm are used, and the algorithm is verified. The specific parameters used for the simulation are shown in Table 2. The simulation results and analysis are shown in Figure 11, Figure 12, Figure 13, Figure 14, Figure 15, Figure 16 and Figure 17.

5.1. Comparison of Energy Consumption

Figure 11 shows a comparison of the energy consumed when running the AliHallafi, Nilsaz Dazfouli, and Jain methods and proposed algorithm in this paper with different numbers of sensor nodes. In WSNs, the energy consumption mainly comes from sensing, the movement of mobile nodes, and data transmission between nodes and nodes. In this paper, most of the energy consumption comes from the movement of mobile nodes. The algorithm proposed in this paper unitizes the network which reduces the energy consumption and the network unitization is performed based on the density of the nodes which will make the energy consumption more balanced. Thus, the algorithm of this paper reduces energy consumption by 6.68% compared with AliHallafi, 16.22% compared with the Nilsaz Dazfouli, and 19.87% compared with the Jain method.
Figure 11. Energy consumption with different numbers of nodes.
Figure 11. Energy consumption with different numbers of nodes.
Sensors 25 04217 g011

5.2. Comparison of Average Energy Consumption

Figure 12 presents a comparative analysis of average energy consumption for running the AliHallafi, Nilsaz Dazfouli, and Jain methods and the proposed algorithm in this paper for different scenarios of simulation time. In this paper, the fitness function in the particle swarm optimization algorithm is used to select the holes to be repaired by the mobile node. The parameters used to select the hole to be patched are the distance from the hole to the base station, the size of the hole, and the overlap rate of the mobile node with other nodes, which allows the mobile node to move a shorter distance and cover a larger area. Thus, the average energy consumption of this paper’s method is 5.71% less than the AliHallafi, 13.15% less than the Nilsaz Dazfouli, and 17.5% less than the Jain method with different simulation times.
Figure 12. Average energy consumption at different simulation times.
Figure 12. Average energy consumption at different simulation times.
Sensors 25 04217 g012

5.3. Average Percentage of Holes Repaired

Figure 13 shows the comparison of the average percentage of holes repaired by running the AliHallafi, Nilsaz Dazfouli, and Jain methods and the proposed algorithm in this paper for different numbers of mobile nodes. The percentage of holes fixed increases as the amounts of mobile nodes continues to increase. In this paper, the coverage area of each unit by nodes can be calculated more accurately, and the hole detection accuracy is high, so better hole recovery decisions can be made. When a coverage hole is detected in a unit, the mobile node is sent to the hole unit. Therefore, for different numbers of mobile nodes, the average hole recovery rate of our algorithm is 2.16% higher than the AliHallafi, 4.29% higher than the Nilsaz Dazfouli, and 7.42% higher than the Jain method.
Figure 13. Average percentage of hole recovery for various numbers of mobile nodes.
Figure 13. Average percentage of hole recovery for various numbers of mobile nodes.
Sensors 25 04217 g013

5.4. Average Mobility Distance of Mobile Nodes

Figure 14 shows the comparison of the average mobility distance of mobile nodes running the AliHallafi, Nilsaz Dazfouli, Jain methods and this paper’s algorithm with different numbers of nodes. The algorithm in this paper takes the average value of the key perceptual intersection as the initial value of the global optimum in the particle swarm optimization algorithm and sets a more optimal fitness function when selecting the mobile nodes, which reduces the travel distance of the mobile nodes. As a result, the average traveling distance of this paper’s algorithm is reduced by 16.5% compared with the Nilsaz Dazfouli, 14.85% compared with AliHallafi, and 8.51% compared with the Jain method for different numbers of nodes.
Figure 14. Average mobility distance of mobile nodes with different numbers of nodes.
Figure 14. Average mobility distance of mobile nodes with different numbers of nodes.
Sensors 25 04217 g014

5.5. Coverage Ratio with Different Number of Failed Nodes

Figure 15 shows the coverage ratio of running the AliHallafi, Nilsaz Dazfouli, and Jain methods and this paper’s algorithm with different numbers of failed sensors. The algorithm in this paper can calculate the location of the coverage holes more accurately and will repair the coverage holes according to the fitness function. The AliHallafi and Nilsaz Dazfouli methods can wake up the nodes according to the overlap rate of the nodes but they dispatch the nodes to move them to repair the coverage holes with a simple fitness function. Therefore, as the number of failed nodes increases, the coverage ratio of our algorithm is 3.36% higher than the AliHallafi, 6.10% higher than the Nilsaz Dazfouli, and 12.71% higher than the Jain method.
Figure 15. Coverage ratio with different number of failed nodes.
Figure 15. Coverage ratio with different number of failed nodes.
Sensors 25 04217 g015

5.6. Average Coverage at Different Simulation Times

Figure 16 shows the average coverage for running the AliHallafi, Nilsaz Dazfouli, and Jain methods and the proposed algorithm in this paper for different scenarios of simulation time. The algorithm in this article uses the network unit to reduce energy consumption, while combining the particle swarm optimization algorithm with KIP also reduces energy consumption. Therefore, with an increase in simulation time, the average coverage of our algorithm is 2.17% higher than the AliHallafi, 7.38% higher than the Nilsaz Dazfouli, and 10.53% higher than the Jain method.
Figure 16. Average coverage at different simulation times.
Figure 16. Average coverage at different simulation times.
Sensors 25 04217 g016

5.7. Average Coverage

Figure 17 shows the comparison of the average coverage of running the AliHallafi, Nilsaz Dazfouli, and Jain methods and this paper’s algorithm with different numbers of sensor nodes. The average coverage of this paper is 2.41% higher than the Nilsaz Dazfouli and 4.15% higher than the Jain method for different number of nodes but the average coverage under the AliHallafi algorithm is higher than the average coverage of this paper’s algorithm. This is mainly because this paper aims to reduce the energy consumption of the nodes, increase the percentage of fixing holes, and reduce the distance traveled by the mobile sensor nodes.
Figure 17. Average coverage with different numbers of nodes.
Figure 17. Average coverage with different numbers of nodes.
Sensors 25 04217 g017

6. Conclusions

This paper proposes a method for hole detection and hole recovery based on the key perceptual intersection for hybrid wireless sensor networks. This method first divides the network into equally sized units, and then selects a representative node for each unit, called an agent. Then, the proportion of each unit covered by nodes is accurately calculated and holes are detected. Finally, the holes are recovered using the average of the key perceptual intersection as the initial value of the global optimal point of the particle swarm optimization algorithm. The simulation experiments illustrate that the proposed algorithm reduces the network energy consumption, reduces the traveling distance of the mobile nodes, and increases the percentage of network holes that are repaired. These improvements collectively enhance the overall performance of the algorithm, specifically manifested in the following ways: network modularization significantly reduces node energy consumption; increasing the proportion of coverage vulnerabilities repaired enhances network coverage effectiveness; and reducing node movement distance improves algorithm efficiency. In future, we will improve the average coverage under different numbers of nodes while maintaining the advantages of our algorithm.

Author Contributions

Conceptualization, H.L. and S.S.; methodology, S.S.; software, Q.Q.; validation, S.S. and H.L.; formal analysis, S.S.; investigation, H.L. and C.Z.; resources, H.L. and S.S.; data curation, S.S. and P.Y.; writing—original draft preparation, S.S. and J.L.; writing—review and editing, S.S., H.L. and J.L.; visualization, S.S. and C.D.; supervision, H.L., C.Z. and Z.F.; project administration, H.L., Q.Q. and P.Y.; funding acquisition, H.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was partly supported by the National Natural Science Foundation of China [grant No. 62002180], the Key Scientific Research Projects of Colleges and Universities in Henan Province [grant Nos. 24A520030, 24A520031, 24A520032, 23A110002], the Training Plan for Young Backbone Teachers in Higher Education Institutions in Henan Province [grant No. 2023GGJS120], the Key Scientific and Technological Research Projects in Henan Province [Grant Nos. 252102210247], the Youth Program of Nanyang Normal University [grant No. 2025QN021, 2020QN019], and the Special Plan for Basic and Frontier Technology Research in Nanyang City [grant No. 23JCQY2002, JCQY006].

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data are available from the corresponding author on reasonable request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Qu, S.; Zhao, L.; Xiong, Z. Cross-layer congestion control of wireless sensor networks based on fuzzy sliding mode control. Neural Comput. Appl. 2020, 32, 13505–13520. [Google Scholar] [CrossRef]
  2. Rathinam, D.D.K.; Surendran, D.; Shilpa, A.; Grace, A.S.; Sherin, J. Modern Agriculture Using Wireless Sensor Network (WSN). In Proceedings of the 5th International Conference on Advanced Computing & Communication Systems (ICACCS), Coimbatore, India, 15–16 March 2019; pp. 515–519. [Google Scholar]
  3. Deebak, B.D.; Al-Turjman, F. A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Netw. 2020, 97, 102022. [Google Scholar]
  4. Singh, A.; Kumar, D.; Hötzel, J. IoT Based information and communication system for enhancing underground mines safety and productivity: Genesis, taxonomy and open issues. Ad Hoc Netw. 2018, 78, 115–129. [Google Scholar] [CrossRef]
  5. Boukerche, A.; Sun, P. Connectivity and coverage based protocols for wireless sensor networks. Ad Hoc Netw. 2018, 80, 54–69. [Google Scholar] [CrossRef]
  6. Ahmadi, H.; Viani, F.; Bouallegue, R. An accurate prediction method for moving target localization and tracking in wireless sensor networks. Ad Hoc Netw. 2018, 70, 14–22. [Google Scholar] [CrossRef]
  7. Sun, G.; Liu, Y.; Yang, M.; Wang, A.; Liang, S.; Zhang, Y. Coverage optimization of VLC in smart homes based on improved cuckoo search algorithm. Comput. Netw. 2017, 116, 63–78. [Google Scholar] [CrossRef]
  8. Hajjej, F.; Hamdi, M.; Ejbali, R.; Zaied, M. A distributed coverage hole recovery approach based on reinforcement learning for Wireless Sensor Networks. Ad Hoc Netw. 2020, 101, 102082. [Google Scholar] [CrossRef]
  9. Hallafi, A.; Barati, A.; Barati, H. A distributed energy-efficient coverage holes detection and recovery method in wireless sensor networks using the grasshopper optimization algorithm. J. Ambient. Intell. Humaniz. Comput. 2022, 14, 13697–13711. [Google Scholar] [CrossRef]
  10. Verma, M.; Sharma, S. A Greedy Approach for Coverage Hole Detection and Restoration in Wireless Sensor Networks. Wirel. Pers. Commun. 2018, 101, 75–86. [Google Scholar] [CrossRef]
  11. Singh, P.; Chen, Y.-C. Sensing coverage hole identification and coverage hole healing methods for wireless sensor networks. Wirel. Netw. 2019, 26, 2223–2239. [Google Scholar] [CrossRef]
  12. Nguyen, D.T.; Nguyen, N.P.; Thai, M.T.; Helal, A. An optimal algorithm for coverage hole healing in hybrid sensor networks. In Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, Istanbul, Turkey, 4–8 July 2011; pp. 494–499. [Google Scholar]
  13. Elhabyan, R.; Shi, W.; St-Hilaire, M. Coverage protocols for wireless sensor networks: Review and future directions. J. Commun. Netw. 2019, 21, 45–60. [Google Scholar] [CrossRef]
  14. Hanh, N.T.; Binh, H.T.T.; Hoai, N.X.; Palaniswami, M.S. An efficient genetic algorithm for maximizing area coverage in wireless sensor networks. Inf. Sci. 2019, 488, 58–75. [Google Scholar] [CrossRef]
  15. Dezfuli, N.N.; Barati, H. Distributed energy efficient algorithm for ensuring coverage of wireless sensor networks. IET Commun. 2019, 13, 578–584. [Google Scholar] [CrossRef]
  16. Xiong, A.; Hou, R.; Zhou, L.; Xing, G.; Zeng, D. K-means++ and Reinforcement Learning-Based Clustering Method to Achieve Energy Efficiency in Underwater Acoustic Sensor Networks. In Proceedings of the 2023 IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA), Wuhan, China, 21–24 December 2023; pp. 50–55. [Google Scholar]
  17. Manju; Singh, S.; Kumar, S.; Nayyar, A.; Al-Turjman, F.; Mostarda, L. Proficient QoS-Based Target Coverage Problem in Wireless Sensor Networks. IEEE Access 2020, 8, 74315–74325. [Google Scholar] [CrossRef]
  18. Sharmin, N.; Karmaker, A.; Lambert, W.L.; Alam, M.S.; Shawkat, M.S.A. Minimizing the Energy Hole Problem in Wireless Sensor Networks: A Wedge Merging Approach. Sensors 2020, 20, 277. [Google Scholar] [CrossRef]
  19. Chowdhuri, R.; Barma, D. Node position estimation based on optimal clustering and detection of coverage hole in wireless sensor networks using hybrid deep reinforcement learning. J. Supercomput. 2023, 79, 20845–20877. [Google Scholar] [CrossRef]
  20. Chowdhuri, R.; Barma, D. Enhancing Network Reliability: Exploring Effective Strategies for Coverage-Hole Analysis and Patching in Wireless Sensor Networks. Wirel. Pers. Commun. 2024, 134, 487–517. [Google Scholar] [CrossRef]
  21. Lu, X.; Wei, Y.; Wu, Q.; Yang, C.; Li, D.; Zhang, L.; Zhou, Y. A Coverage Hole Patching Algorithm for Heterogeneous Wireless Sensor Networks. Electronics 2022, 11, 3563. [Google Scholar] [CrossRef]
  22. Zhou, S.; Wu, M.-Y.; Shu, W. Finding optimal placements for mobile sensors: Wireless sensor network topology adjustment. In Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication, Shanghai, China, 31 May–2 June 2004; pp. 529–532. [Google Scholar]
  23. Gou, P.; Mao, G.; Zhang, F.; Jia, X. Reconstruction of coverage hole model and cooperative repair optimization algorithm in heterogeneous wireless sensor networks. Comput. Commun. 2020, 153, 614–625. [Google Scholar] [CrossRef]
  24. Li, Q.; Liu, N. Monitoring area coverage optimization algorithm based on nodes perceptual mathematical model in wireless sensor networks. Comput. Commun. 2020, 155, 227–234. [Google Scholar] [CrossRef]
  25. Khalifa, B.; Khedr, A.M.; Al Aghbari, Z. A Coverage Maintenance Algorithm for Mobile WSNs With Adjustable Sensing Range. IEEE Sens. J. 2020, 20, 1582–1591. [Google Scholar] [CrossRef]
  26. Tarnaris, K.; Preka, I.; Kandris, D.; Alexandridis, A. Coverage and k-Coverage Optimization in Wireless Sensor Networks Using Computational Intelligence Methods: A Comparative Study. Electronics 2020, 9, 675. [Google Scholar] [CrossRef]
  27. Latif, K.; Javaid, N.; Ahmad, A.; Khan, Z.A.; Alrajeh, N.; Khan, M.I. On Energy Hole and Coverage Hole Avoidance in Underwater Wireless Sensor Networks. IEEE Sens. J. 2016, 16, 4431–4442. [Google Scholar] [CrossRef]
  28. Izadi, D.; Abawajy, J.; Ghanavati, S. An Alternative Node Deployment Scheme for WSNs. IEEE Sens. J. 2015, 15, 667–675. [Google Scholar] [CrossRef]
  29. Xiong, Y.; Chen, G.; Lu, M.; Wan, X.; Wu, M.; She, J. A Two-Phase Lifetime-Enhancing Method for Hybrid Energy-Harvesting Wireless Sensor Network. IEEE Sens. J. 2020, 20, 1934–1946. [Google Scholar] [CrossRef]
  30. Jain, J.K. A Coherent Approach for Dynamic Cluster-Based Routing and Coverage Hole Detection and Recovery in Bi-layered WSN-IoT. Wirel. Pers. Commun. 2020, 114, 519–543. [Google Scholar] [CrossRef]
  31. Rahmani, A.M.; Ali, S.; Malik, M.H.; Yousefpoor, E.; Yousefpoor, M.S.; Mousavi, A.; Khan, F.; Hosseinzadeh, M. An energy-aware and Q-learning-based area coverage for oil pipeline monitoring systems using sensors and Internet of Things. Sci. Rep. 2022, 12, 9638. [Google Scholar] [CrossRef]
  32. Karp, B. Greedy Perimeter Stateless Routing for Wireless Networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 6–11 August 2000; pp. 243–254. [Google Scholar]
  33. Tian, D.; Georganas, N.D. Connectivity maintenance and coverage preservation in wireless sensor networks. Ad Hoc Netw. 2005, 3, 744–761. [Google Scholar] [CrossRef]
  34. Heinzelman, W.R.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 7 January 2000; p. 10. [Google Scholar]
Figure 1. The network model.
Figure 1. The network model.
Sensors 25 04217 g001
Figure 2. Coverage hole.
Figure 2. Coverage hole.
Sensors 25 04217 g002
Figure 3. Emergency communications network scenario.
Figure 3. Emergency communications network scenario.
Sensors 25 04217 g003
Figure 4. Basic framework.
Figure 4. Basic framework.
Sensors 25 04217 g004
Figure 5. Unit naming.
Figure 5. Unit naming.
Sensors 25 04217 g005
Figure 6. Hello message.
Figure 6. Hello message.
Sensors 25 04217 g006
Figure 7. Overlapping pixel points about unit A11.
Figure 7. Overlapping pixel points about unit A11.
Sensors 25 04217 g007
Figure 8. Coverage hole in a unit.
Figure 8. Coverage hole in a unit.
Sensors 25 04217 g008
Figure 9. Node distribution diagram for unit A11.
Figure 9. Node distribution diagram for unit A11.
Sensors 25 04217 g009
Figure 10. New location of mobile node.
Figure 10. New location of mobile node.
Sensors 25 04217 g010
Table 1. Information table for unit A11.
Table 1. Information table for unit A11.
CoordinateS1S2S3S4S5SnCoNO
(x1, y1)00000 00
(x40, y40)11000 01
(x100, y100)01110 01
(xk1, yk1)00000 00
(xk, yk)00000 00
Table 2. Simulation parameters.
Table 2. Simulation parameters.
SymbolAttributeValue
Omonitoring area200 ∗ 200 m2
Deploydeployment methodRandom
Llength of the network200
Sia sensor node180
Aijrepresents a unit
Cnumber of unitsDepends on the number of nodes
Rssensor i sensing radius30 m
Rcsensor i communication radius60 m
Vimovement speed of sensor i20 m/s
nnumber of static sensor nodes150
mnumber of mobile sensor nodes30
Eminitial energy of the mobile node 5 J
Ecmobile energy consumption0.1 J/m
SIMsimulation time150 s
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, H.; Sun, S.; Dong, C.; Qi, Q.; Zhao, C.; Fu, Z.; Yu, P.; Liu, J. Coverage Hole Recovery in Hybrid Sensor Networks Based on Key Perceptual Intersections for Emergency Communications. Sensors 2025, 25, 4217. https://doi.org/10.3390/s25134217

AMA Style

Li H, Sun S, Dong C, Qi Q, Zhao C, Fu Z, Yu P, Liu J. Coverage Hole Recovery in Hybrid Sensor Networks Based on Key Perceptual Intersections for Emergency Communications. Sensors. 2025; 25(13):4217. https://doi.org/10.3390/s25134217

Chicago/Turabian Style

Li, He, Shixian Sun, Chuang Dong, Qinglei Qi, Cong Zhao, Zufeng Fu, Peng Yu, and Jiajia Liu. 2025. "Coverage Hole Recovery in Hybrid Sensor Networks Based on Key Perceptual Intersections for Emergency Communications" Sensors 25, no. 13: 4217. https://doi.org/10.3390/s25134217

APA Style

Li, H., Sun, S., Dong, C., Qi, Q., Zhao, C., Fu, Z., Yu, P., & Liu, J. (2025). Coverage Hole Recovery in Hybrid Sensor Networks Based on Key Perceptual Intersections for Emergency Communications. Sensors, 25(13), 4217. https://doi.org/10.3390/s25134217

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop