Coverage Hole Bypassing in Wireless Sensor Networks

10Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless sensor networks deployment and operation are most likely to take place under hazardous conditions. One extreme scenario is the deployment of a wireless sensor network in a mountainous and forested region in which a fire has ignited, for the purpose of localizing and/or tracking, in real time, its spread. Some methods developed in this paper are expected to provide superior performances under these conditions. Existing fires in the deployment region will also affect the nodes' coverage because the nodes that will fall in the middle of the fire will likely cease to operate. In our work, we develop a coverage hole bypassing algorithm for storing and maintaining holes-information in the network based on which a boundary node can provide the communication path which is more efficient to try to bypass a hole. Simulation results are presented to illustrate the proposed method and evaluate its run-time and message count per node. We show that these routing can be used in many applications.

Cite

CITATION STYLE

APA

Wan, S., & Zhang, Y. (2017). Coverage Hole Bypassing in Wireless Sensor Networks. Computer Journal, 60(10), 1536–1544. https://doi.org/10.1093/comjnl/bxx073

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free