Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Localized Motion Abetment Sensor Deployment Method for Hole Recognition and Curative

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 10
Year of Publication: 2015
Authors:
Pradnya Irawadkar
Archana Lomte
10.5120/21739-4945

Pradnya Irawadkar and Archana Lomte. Article: Localized Motion Abetment Sensor Deployment Method for Hole Recognition and Curative. International Journal of Computer Applications 122(10):34-37, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Pradnya Irawadkar and Archana Lomte},
	title = {Article: Localized Motion Abetment Sensor Deployment Method for Hole Recognition and Curative},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {10},
	pages = {34-37},
	month = {July},
	note = {Full text available}
}

Abstract

A basic service in Wireless sensor network is monitoring of particular region of interest . since due to the nature of WSN random development hole in the ROI is obvious . So for these reason ROI should be completely and continuously covered. And in this paper we have attended and covered the issue of hole detection and healing in mobile WSNs. The main drawbacks of existing systems are selecting the boundary of ROI, finding coverage holes and estimating their characteristics, finding best location for relocating mobile nodes for repairing holes, and moving mobile nodes to safe location with minimum moving and messaging cost And to handle all these problems a novel technique is present named hole detection and healing. The computational complexity of HEAL is given as (v2), in which is the average number of 1-hop neighbors. In Heal there are Two Stages first, it detects boundary nodes and finds holes and in second, it treats hole healing. A distributed virtual forces-based local healing methodology is presented in which the nodes in a suitable distance from the hole will be included in the healing procedure and also presented wakeup scheduling algorithm. with the help of wakeup scheduling algorithm energy utilization of sensor nodes is reduced and increases the life of network.

References

  • Mustapha Reda Senouci, Abdelhamid Mellouk, and Khalid Assnoune, "Localized Movement-Assisted Sensor Deployment Algorithm for Hole Detection and Healing", IEEE Transactions On Parallel And DistributedSystems, Vol. 25, No. 5, pg no. 1267??1277, May 2014
  • C. Y. Chang, C. Y. Lin, G. J. Yu, and C. H. Kuo, "An energy Efficient Hole Healing Mechanism for Wireless Sensor Networks with Obstacles," Wireless Comm. and Mobile Computing, vol. 13, no. 4, pp. 377??392,2013.
  • C. Y. Chang, L. L. Hung, S. W. Chang, and Y. C. Chen, "Decentralized and Energy Balanced Algorithms for Maintaining Temporal Full Coverage in Mobile WSNs," J. Wireless Comm. and Mobile Computing , vol. 12, no. 5, pp. 445-462, 2012.
  • X. Li, G. Fletcher, A. Nayak, and I. Stojmenovic, "Randomized Carrier- Based Sensor Relocation in Wireless Sensor and Robot Networks," Proc. Ad Hoc Networks, 2012, DOI:10. 1016/j. adhoc. 2012. 06. 007.
  • A. Nadeem, S. K. Salil, and J. Sanjay, "A Pragmatic Approach to AreaCoverage in Hybrid Wireless Sensor Networks," Wireless Comm. And Mobile Computing, vol. 11, no. 1, pp. 23??45, 2011.
  • B. Wang, Coverage Control in Sensor Networks. Springer, 2010.
  • B. Wang, H. B. Lim, and M. Di, "A Survey of Movement Strategies forImproving Network Coverage in Wireless Sensor Networks," Computer Comm. , vol. 32, pp. 1427??1436, 2009.
  • M. Younis and K. Akkaya, "Strategies and Techniques for Node Placement in Wireless Sensor Networks: A Survey," J. Ad Hoc Network, vol. 6, no. 4, pp. 621??655, 2008.
  • F. Stefan and K. Christian, "Hole Detection or: How Much Geometry Hides In Connectivity" Proc. 22nd Ann. Symp. Computational Geometry (SCG 06), pp. 377-385, 2006.
  • Y. Wang, J. Gao, and S. B. Mitchell, "Boundary Recognition in Sensor Networks by Topological Methods," MobiCom '06, pp. 122-133, 2006.
  • Q. Fang, J. Gao, and L. J. Guibas, "Locating and Bypassing Holes in Sensor Networks," Mobile Networks and Applications, vol. 11, no. 2, pp. 187??200, 2006.
  • G. Wang, G. Cao, and T. F. L. La Porta, "Movement Assisted Sensor Deployment,"IEEE Trans. Mobile Computing, vol. 5, no. 6, pp. 640??652, June 2006.
  • N. Ahmed, S. S. Kanhere, and S. Jha, "The Holes Problem in Wireless Sensor Networks: A Survey, SIGMOBILE Mobile Computing Comm. Rev. , vol. 9, no. 2, pp. 4??18, 2005.
  • F. Stefan, "Topological Hole Detection in Wireless Sensor Networks and its Applications," Proc. Joint Workshop on Foundations of Mobile Computing, p. 44??53, 2005.
  • S. P. Fekete, M. Kaufmann, A. Kroller, and N. Lehmann, "A New Approach for Boundary Recognition in Geometric Sensor Networks," Proc. 17th Canadian Conf. Computational Geometry, pp. 82??85, 2005.
  • S. P. Fekete, A. Kroller, D. Pfisterer, S. Fischer, and C. Buschmann, "Neighborhood Based Topology Recognition in Sensor Networks," Proc. Int'l Workshop on Algorithmic Aspects of Wireless Sensor Networks, pp. 123??136, 2004.
  • S. Ganeriwal, A. Kansal, and M. B. Srivastava, "Self Aware Actuation for Fault Repair in Sensor Networks," Proc. IEEE Intl Conf. Robotics and Automation (ICRA '04), pp. 5244-5249, May 2004.
  • A. Ghosh, "Estimating Coverage Holes and Enhancing Coverage in Mixed Sensor Networks," Proc. 29th Ann. IEEE Int'l Conf. Local Computer Networks (ICLCN '04), pp. 68-76, Nov. 2004