DETECTION AND REPAIR OF COVERAGE HOLES IN MOBILE SENSOR NETWORKS USING SUB-VORONOI CELLS

Lixia Deng, Xin Ma, Jason Gu, and Yibin Li

References

  1. [1] Z. Chen, X. Li, B. Yang, and Q. Zhang, A self-adaptive wirelesssensor network coverage method for intrusion tolerance basedon trust value, Journal of Sensors, 2015, 2015, 1–10.
  2. [2] J. Zhang, H. Lv, D. He, et al., Discrete bioinspired neuralnetwork for complete coverage path planning, InternationalJournal of Robotics and Automation, 32(2), 2017, 186–193.
  3. [3] P. Huang, F. Lin, C. Liu, J. Gao, and J.-L. Zhou, ACO-basedsweep coverage scheme in wireless sensor networks, Journal ofSensors, 2015, 2015, 1–7.
  4. [4] I. Khoufi, P. Minet, A. Laouiti, et al., Survey of deploymentalgorithms in wireless sensor networks: Coverage and connectivity issues and challenges, International Journal of Autonomous and Adaptive Communications Systems (IJAACS),1(4), 2014, 1–24.
  5. [5] Y.Q. Miao, A.M. Khamis, and M.S. Kamel, A novel mobilitymodel for mobile sensors deployment in surveillance systems,International Journal of Robotics and Automation, 28(2), 2013,112–122.
  6. [6] H. Ren and M.Q.H. Meng, Game-theoretic modeling of jointtopology control and power scheduling for wireless heterogeneous sensor networks, IEEE Transactions on AutomationScience and Engineering, 6(4), 2009, 610–625.
  7. [7] H. Ren and M.Q.H. Meng, Power adaptive localization algorithm for wireless sensor networks using particle filter, IEEETransactions on Vehicular Technology, 58(5), 2009, 2498–2508.
  8. [8] J.M. Lanza-Gutierrez, J.A. Gomez-Pulido, and M.A. Vega-Rodriguez, Intelligent relay node placement in heterogeneouswireless sensor networks for energy efficiency, InternationalJournal of Robotics and Automation, 29(3), 2014, 1–13.
  9. [9] W. Li, A novel graphic coverage hole description in wirelesssensor networks, IEEE Communications Letters, 18(12), 2014,2205–2208.
  10. [10] H.-C. Ma, P.K. Sahoo, and Y.-W. Chen, Computational geometry based distributed coverage hole detection protocol for thewireless sensor networks, Journal of Network and ComputerApplications, 34(5), 2011, 1743–1756.
  11. [11] Q.-S. Wang and H. Gao, Coverage holes discovery algorithmfor wireless sensor network, Journal of Theoretical & AppliedInformation Technology, 48(2), 2013, 1121–1125.
  12. [12] W. Li & and. Zhang, Coverage hole and boundary nodesdetection in wireless sensor networks, Journal of Network andComputer Applications, 48, 2015, 35–43.
  13. [13] F. Yan, P. Martins, and L. Decreusefond, Connectivity-baseddistributed coverage hole detection in wireless sensor networks,Proc. of the IEEE Global Telecommunications Conference,Houston, TX, 2011, 1–6.
  14. [14] F. Yan, P. Martins, and L. Decreusefond, Accuracy of homologybased coverage hole detection for wireless sensor networkson sphere, IEEE Transactions on Wireless Communications,13(7), 2014, 3583–3595.
  15. [15] J. Jia, J. Chen, G.-R. Chang, L.-L. Zhao, and G.-X. Wang,Optimal coverage scheme based on genetic algorithm in wirelesssensor networks, Control and Decision, 22(11), 2007, 1289–1301.
  16. [16] X. Yu, C. Wu, D. Chen, and N. Hu, Level set based coverageholes detection and holes healing scheme in hybrid sensornetwork, International Journal of Distributed Sensor Networks,2013, 2013, 1–9.
  17. [17] G. Wang, G. Cao, and T. La Porta, Movement-assisted sensordeployment, IEEE Transactions on Mobile Computing, 5(6),2006, 640–652.
  18. [18] H. Mahboubi, K. Moezzi, A.G. Aghdam, K. Sayrafian-Pour,and V. Marbukh, Distributed deployment algorithms for im-proved coverage in a network of wireless mobile sensors, IEEETransactions on Industrial Informatics, 10(1), 2014, 163–174.
  19. [19] G. Dai, L. Chen, B. Zhou, and P. Xu, Coverage hole detectionalgorithm based on Voronoi diagram in wireless sensor network,Journal of Computer Applications, 35(3), 2015, 620–623.
  20. [20] Q. Fang, J. Gao, and L.J. Guibas, Locating and bypassingholes in sensor networks, Mobile Networks and Applications,11(2), 2006, 187–200.
  21. [21] M.R. Senouci, A. Mellouk, and K. Assnoune, Localizedmovement-assisted sensor deployment algorithm for hole detection and healing, IEEE Transactions on Parallel DistributedSystems, 25(5), 2014, 1267–1277.
  22. [22] G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, and C. Gill,Integrated coverage and connectivity configuration for energyconservation in sensor networks, ACM Transactions on SenorNetworks, 1(1), 2005, 36–72.
  23. [23] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill,Integrated coverage and connectivity configuration in wirelesssensor networks, Proc. of the International Conference onEmbedded Networked Sensor Systems, Los Angeles, CA, 2003,28–39.
  24. [24] H. Zhang and J.C. Hou, Maintaining sensing coverage andconnectivity in large sensor networks, Ad Hoc Sensor WirelessNetworks, 1(1–2), 2005, 89–124.
  25. [25] S. Zaidi, M. Hafeez, S. Khayam, D. McLernon, M. Ghogho,and K. Kim, On minimum cost coverage in wireless sensornetworks, Annual Conference on Information Sciences andSystems, Baltimore, MD, 2009, 213–218.

Important Links:

Go Back