A Review on Coverage-Hole Boundary Detection Algorithms in Wireless Sensor Networks
DOI:
https://doi.org/10.13053/cys-1-1-3133Keywords:
Sensor nodes, wireless sensor network, coverage-hole, hole-detection algorithm, hole-boundary detection, network performanceAbstract
Wireless sensor nodes are extremely useful in different security and surveillance related applications which may be compromised with the existence of coverage-holes. Coverage-hole is the area in a wireless sensor network (WSN) where sensing or transmitting of data is not achievable and therefore, detecting such region is a prominent research topic in WSN. Subsequent to hole-detection, another significant task is to detect the boundary nodesoutlining the coverage-holes. In this paper, we have gone through different research articles describing the various boundary-detection techniques those have been recommended to facilitate hole-detection inside the sensor network. On the basis of the literature review, we have done categorization of the boundary-detection methods, their characteristics, pros & cons and their effect on sensor network’s performance for better understanding and future reference.Downloads
Published
2020-03-25
Issue
Section
Articles
License
Hereby I transfer exclusively to the Journal "Computación y Sistemas", published by the Computing Research Center (CIC-IPN),the Copyright of the aforementioned paper. I also accept that these
rights will not be transferred to any other publication, in any other format, language or other existing means of developing.I certify that the paper has not been previously disclosed or simultaneously submitted to any other publication, and that it does not contain material whose publication would violate the Copyright or other proprietary rights of any person, company or institution. I certify that I have the permission from the institution or company where I work or study to publish this work.The representative author accepts the responsibility for the publicationof this paper on behalf of each and every one of the authors.
This transfer is subject to the following conditions:- The authors retain all ownership rights (such as patent rights) of this work, except for the publishing rights transferred to the CIC, through this document.
- Authors retain the right to publish the work in whole or in part in any book they are the authors or publishers. They can also make use of this work in conferences, courses, personal web pages, and so on.
- Authors may include working as part of his thesis, for non-profit distribution only.