JOURNAL ARTICLE

Coverage Hole Bypassing in Wireless Sensor Networks

Shaohua WanYin Zhang⋆

Year: 2017 Journal:   The Computer Journal Vol: 60 (10)Pages: 1536-1544   Publisher: Oxford University Press

Abstract

Wireless sensor networks deployment and operation are most likely to take place under hazardous conditions. One extreme scenario is the deployment of a wireless sensor network in a mountainous and forested region in which a fire has ignited, for the purpose of localizing and/or tracking, in real time, its spread. Some methods developed in this paper are expected to provide superior performances under these conditions. Existing fires in the deployment region will also affect the nodes' coverage because the nodes that will fall in the middle of the fire will likely cease to operate. In our work, we develop a coverage hole bypassing algorithm for storing and maintaining holes-information in the network based on which a boundary node can provide the communication path which is more efficient to try to bypass a hole. Simulation results are presented to illustrate the proposed method and evaluate its run-time and message count per node. We show that these routing can be used in many applications.

Keywords:
Wireless sensor network Computer science Computer network Key distribution in wireless sensor networks Wireless network Telecommunications Wireless

Metrics

10
Cited By
1.89
FWCI (Field Weighted Citation Impact)
16
Refs
0.86
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Energy Efficient Wireless Sensor Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications
Mobile Ad Hoc Networks
Physical Sciences →  Computer Science →  Computer Networks and Communications
Distributed Control Multi-Agent Systems
Physical Sciences →  Computer Science →  Computer Networks and Communications
© 2026 ScienceGate Book Chapters — All rights reserved.