Next Article in Journal
Predicting the Category and the Length of Punishment in Indonesian Courts Based on Previous Court Decision Documents
Previous Article in Journal
Improved Bidirectional GAN-Based Approach for Network Intrusion Detection Using One-Class Classifier
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Energy-Efficient Deterministic Approach for Coverage Hole Detection in Wireless Underground Sensor Network: Mathematical Model and Simulation

by
Priyanka Sharma
1,2,* and
Rishi Pal Singh
2
1
Semi-Conductor Laboratory, Govt. of India, Mohali 160071, India
2
Department of Computer Science & Engineering, Guru Jambheshwar University of Science & Technology, Hisar 125001, India
*
Author to whom correspondence should be addressed.
Submission received: 20 April 2022 / Revised: 7 May 2022 / Accepted: 13 May 2022 / Published: 26 May 2022

Abstract

:
Wireless underground sensor networks (WUSNs) are being used in agricultural applications, in border patrol, and in the monitoring of remote areas. Coverage holes in WUSNs are an issue which needs to be dealt with. Coverage holes may occur due to random deployment of nodes as well as the failure of nodes with time. In this paper, a mathematical approach for hole detection using Delaunay geometry is proposed which divides the network region into Delaunay triangles and applies the laws of triangles to identify coverage holes. WUSNs comprise static nodes, and replacing underground nodes is a complex task. A simplistic algorithm for detecting coverage holes in static WSNs/WUSNs is proposed. The algorithm was simulated in the region of interest for the initially randomly deployed network and after energy depletion of the nodes with time. The performance of the algorithm was evaluated by varying the number of nodes and the sensing radius of the nodes. Our scheme is advantageous over other schemes in the following aspects: (1) it builds a mathematical model and polynomial-time algorithm for detecting holes, and (2) the scheme does not work on centralized computation and therefore provides better scalability, (3) is energy-efficient, and (4) provides a cost-effective solution to detect holes with great accuracy and a low detection time. The algorithm takes less than 0.1 milliseconds to detect holes in a 100 m × 100 m-size network with 100 sensor nodes having a sensing radius of 8 m. The detection time shows only a linear change with an increase in the number of nodes in the network, which makes the algorithm applicable for every network size from small to large.

1. Introduction

Wireless underground sensor networks (WUSNs) [1,2] are sensor networks in which sensor nodes are buried under the surface. They are an extension of wireless sensor networks and are a potential field with enormous applications. WUSNs [3] have a large number of applications in the areas of irrigation monitoring, garden automation systems, sports ground maintenance, border patrol, and toxic substance and environment monitoring. WUSNs are becoming increasingly popular because of their contribution to accessing and monitoring toxic substances and the environment in remote areas. As compared to earlier wired underground networks, wireless networks provide more reliability and better concealment and are easy to deploy. However, understanding and modeling the radio propagation [4] among sensor nodes deployed underground are very critical for the operation of WUSNs. Network designers can estimate the most accurate communication radius and network capacity of WUSNs using an underground radio propagation model. Moreover, the characteristics of the underground communication medium (i.e., soil) differ from those of terrestrial networks, necessitating the use of an underground radio signal propagation model to regulate and validate the impacts of soil properties. Reliable antennas and the link quality [5,6,7,8] of deployed nodes play a key role for a range of communication protocols in WSNs. Data collection is easy with wireless underground sensor networks and provides real-time data. Besides the potential usage of WUSNs, there are many issues which need to be dealt with. The hole problem [9] is one of the major issues which WUSNs face.
A hole [10] is a region in the network where communication with other nodes is disconnected. The hole problem may occur due to a number of reasons. Firstly, holes can be created due to random deployment of nodes. When sensor nodes are deployed randomly in the network, during the placement of these nodes, a few areas may remain uncovered/disconnected. Secondly, sensor nodes have limited energy, and after continuous data collection and dissipation for a long time, they become exhausted and stop responding, leading to the failure of the nodes. The failure of nodes in a hefty figure generates holes in the network. Thirdly, there may be an oddity in the network due to a disaster. Nodes can fail due to anomalies in the network and hence can hamper the operation of the network. For example, a volcano in a region may damage sensor nodes buried underground. Damage to nodes can create a void in the region and generate holes. Holes can be divided into different categories. A region that is supposed to be fully covered may have some uncovered areas in it due to random deployment, an obstruction, or node failure; these uncovered regions are called coverage holes [11]. In the same way, there may be regions where nodes are not able to communicate, known as routing holes [12]. Other than these two categories, sometimes there may be some adversaries in the network which may create oddities. There may be malicious nodes that may jam communication to create jamming holes or that can seize the network by denial-of-service attacks, namely, sink/black/wormholes, and deteriorate the functionality of the network. Network performance is affected by holes as they act as barriers to communication. The purpose of hole identification [13] is to detect attacked, damaged, or inaccessible voids or nodes in the network. Unidentified holes lead to greater energy consumption and congestion, which ultimately increases the hole size. Identification of holes saves the network from additional energy exhaustion and congestion and therefore enhances the network life [14].
Thus far, we have discussed different types of holes; out of these, coverage holes are salient ones as they play a key role in maintaining quality of service [13]. Identification of coverage holes helps in finding voids/uncovered regions in the network. In uncovered regions, more nodes are set to be deployed to guarantee reliability by patching the holes. Hole detection assures the quality of service by preventing the loss of data. Therefore, this paper focused on the identification of coverage holes in wireless underground sensor networks.
We propose a Delaunay-based deterministic mathematical model which covers all required cases to detect coverage holes. The region of interest is divided into empty triangles (triangles with no node inside) using Delaunay triangulation. Then, using the proposed mathematical model, holes are detected in the network. Major contributions of this work are as follows:
1
A polynomial-time algorithm is proposed which can effectively detect all the holes presented in the network. Most of the existing solutions are centralized and work for hybrid networks. Such solutions are not scalable and therefore not suitable for WUSNs. WUSNs consist of static nodes and require solutions that possess low complexity and are scalable. Our algorithm is very well suited for WUSNSs.
2
Our algorithm requires only the location/coordinate information of the nodes.
3
Our algorithm is energy-efficient. The proposed coverage hole detection algorithm was run for the network lifetime, where all nodes communicate using the LEACH protocol. The algorithm avoids unnecessary computation and extra communication overheads which reduce the network lifetime. The residual energy after every round was noted. Based on the residual energy in the network, a new node deployment can be pre-planned. Considering the energy factor provides a comprehensive and wide-ranging viewpoint. The algorithm performs efficiently during the complete lifetime of the network. Extensive simulations were conducted to validate the performance of our proposed algorithm. The algorithm was tested by varying the number and sensing radius of the nodes. It works very well in spite of the nodes’ distribution and density. The algorithm has a short run time with the lowest cost and provides an accurate solution. The results show that the method is reliable, cost-effective, and energy-efficient.
The rest of this paper is structured as follows. Section 2 presents details of the work already conducted to identify coverage holes in WUSNs. The proposed mathematical model and related assumptions are presented in Section 3. In Section 4, the coverage hole identification algorithm is detailed. The simulation results are presented in Section 5. In Section 6, the proposed approach is discussed, and key contributions are highlighted. Section 7 concludes the paper.

2. Related Work

A significant amount of research has been conducted in the area with a preview of challenges faced in the deployment of wireless underground sensor networks. Hole detection in WUSNs is a promising area of research, although few works have been conducted in this domain.
Coverage hole identification techniques for wireless sensor networks can be categorized into three types: range-based, connectivity-based, and location-based techniques. In range-based/statistical techniques [15,16], nodes need to know the relative distance between neighbor nodes. In connectivity-based techniques [17,18,19,20], topology/connectivity information between nodes is required. The primary requirement of location-based/geometric techniques [5,21,22] is that all the sensor nodes need to know their location.
As per our acquaintance, there is only one model proposed by Kaushik [5] for coverage hole detection in wireless underground sensor networks. Therefore, to go into detail, studies conducted on coverage hole detection in terrestrial wireless sensor networks were also explored.
Kaushik [9] proposed location-based algorithms to find the boundary nodes and for the detection of holes in WUSNs. The author used the Voronoi diagram to find boundary nodes. After identifying the boundary nodes, the author used these boundary nodes to identify holes. With the help of the hole detection algorithm, approximate polygons using boundary nodes were created. The concept of the ‘flattening increment’ was used to approximate the hole edge point to the actual edge point, and the ’discretizing point’ was used to approximate the sensing edge.
In terms of range-based approaches for coverage hole detection in wireless sensor networks, Silva et al. [15] proposed a blind swarm of robots to determine coverage and holes. As no information about coordinates and connectivity was used by the authors, the algorithm only provides information about coverage, not about the minimum number of nodes required to fully cover the network or placement of nodes to maximize the coverage. Relative homology and simplical complexes [23] were used to determine holes in the network. The algorithm is based on centralized computation.
Bejerano [24] proposed two distributed coordinate-free k-coverage solutions (range-based) for hole detection, namely, a two-anchor (TA) scheme and a cyclic segment sequence (CSS) algorithm, for coverage verification and coverage hole detection. In the TA scheme, a local polar coordinate system is created by every internal node in the network by selecting two of its neighbor nodes as reference points, named anchors. Then, the location of other neighbor nodes is calculated with respect to this local polar coordinate system to verify the coverage. When all the neighbor nodes are determined, intersection points of the sensing border are calculated by each node to check the local coverage in its vicinity. The two-anchor solution works only if the transmission/communication range of the sensor node is greater than or equal to four times the sensing range. The cyclic segment sequence algorithm can be used to verify the coverage and detect holes even when the sensor nodes have a transmission range less than four times the sensing range (for a transmission range greater than or equal to two times the sensing range). It is a localized and efficient algorithm for detecting coverage holes without using local polar coordinates and works for 1-coverage. CSS may be susceptible to inaccurate distance measures and generate false positives.
In terms of connectivity-based approaches for coverage hole detection in wireless sensor networks, Khan et al. [20] proposed an approach to identifying the boundaries of holes as well as the boundaries of the sensor network. The basis of this approach is to check the connectivity [25] of the x-hop neighbor nodes adjoining every node. Here, the value of x can be set static and predetermined or dynamic and can vary as per the application requirement depending on a number of criteria such as the network density, degree of connectivity, and accuracy parameters. Though the algorithm has a low communication overhead in comparison to other similar techniques, deciding the value of x requires a thorough study of the network.
Li et al. [26] proposed a connectivity-based triangular mesh distributed hole recovery algorithm that detects and recovers coverage holes with only connectivity information. To find the accurate boundary of any hole, redundant nodes around the hole are activated using the algorithm. The algorithm is also said to be an enhanced 3MeSH algorithm. In the algorithm, sensor nodes are divided into two categories: active nodes and redundant nodes. A 3MeSH ring is formed in the graph of the active nodes to find the hole, if it exists. Nodes adjacent to hole boundary nodes are self-activated. The network reaches saturation when all redundant nodes become active and cannot perform any further hole recovery.
In terms of location-based approaches for coverage hole detection in wireless sensor networks, Wang et al. [21] designed two distributed protocols and three algorithms for handling sensor nodes’ movement. Voronoi diagrams were used to detect coverage holes. The first protocol is a basic protocol in which sensor nodes are moved iteratively for optimizing coverage. After each iteration, coverage holes are detected using the Voronoi diagram, and sensor nodes are moved by using one of the following algorithms: the VEC (VECtor-based), the VOR (VORonoi-based), or the minmax algorithm. In the VEC algorithm, sensor nodes are moved away from denser areas. In the VOR algorithm, nodes are moved toward holes. Nodes move toward another node that is farthest in the Voronoi diagram. VOR is a greedy algorithm and may result in the further creation of new holes. In the minmax algorithm, sensor nodes are also moved towards the hole, but the movement is kept such that the node in the Voronoi diagram for which the farthest movement is minimized is chosen. The second protocol is a virtual protocol in which sensor nodes are moved only virtually after each iteration; no actual physical movement is carried out. In the virtual protocol, the energy consumption is lower as the actual movements are deferred. The authors used a distributed approach to make it applicable for large networks. The simulation results showed that the minmax approach performed better than the other two. This protocol is only applicable for sensor nodes with mobility.
Zhang et al. [22] proposed two new computational geometric techniques, namely, localized Voronoi polygons (LVPs) and neighbor embracing polygons (NEPs), and using these techniques, two algorithms were designed. The first algorithm is localized and needs both distance and directional information. It uses localized Voronoi polygons (LVPs) and tentative localized Voronoi polygons (TLVPs) to find boundary nodes. A hole is detected only when any node which was being used in the LVP or TLVP construction dies. The second algorithm is an NEP-based algorithm which only needs direction information but cannot identify all holes. Both the algorithms can be combined for more efficient and cost-effective detection.
After reviewing various studies (as detailed above and also shown in Table 1) and analyzing scenarios of wireless underground sensor networks, we made the following observations:
Uniform and dense deployment of sensor nodes with a statistical distribution is required in range-based techniques which is not always feasible.
In connectivity-based techniques, topology/connectivity information between nodes is needed which adds an extra communication overhead in the network and thus reduces the lifetime of the network. This will increase the deployment frequency of underground nodes and increase the cost and complexity.
In many techniques, sensor networks are hybrid, i.e., a network containing both static and mobile nodes. However, in WUSNs, all the sensor nodes are static, so the algorithm needs to be designed with this factor taken into consideration.
Therefore, after reviewing various studies, we provide a geometry/location-based coverage hole detection technique for randomly deployed nodes in wireless underground sensor networks.

3. Mathematical Model and Methodology

In this section, we first discuss the property of Delaunay triangulation, which is adapted in our model. This is followed by the description of our network parameters, mathematical formulation, and methodology used to identify the coverage holes in the network.
The target region is divided into Delaunay triangles with each sensor node as a point in the geometry. Delaunay triangulation (DT) and Voronoi diagrams (VDs) [33,34] are two imperative and fundamental data structures of computational geometry that share the property of duality and play a key role in solving many problems. The property of duality states that the Delaunay triangulation of any set of points P corresponds to the dual graph of those set of points in P. Circumcenters of DT correspond to the vertices of VD. Delaunay triangulation for a given set of points P is a triangulation DT(P) with the property that no point in P lies inside the circumcircle (a circle passing through the vertices) of any triangle in the triangulation. In other words, any two points connected by an edge in DT exist iff a circle passing through these points exists that does not contain any other point inside. The minimum angle amongst all achievable triangulations is maximized in DT. We took a target region of 100 m × 100 m (shown in Figure 1) with 100 sensor nodes randomly deployed in the network.
Delaunay triangles are drawn using the sensor nodes as points in the network (shown in Figure 2). As can be seen from Figure 1, we placed a few nodes on the boundaries and corners of the network so that the Delaunay triangles can cover the full region. The complete network region was divided into a mesh of Delaunay triangles. Using the laws and properties of triangles, a mathematicalmodel was built. Holes in the network are detected using models applied to Delaunay triangles in the region of interest (ROI). A few assumptions were made, as follows:

3.1. Assumptions

1
Each node knows its location.
2
The communication radius (Rc) is larger than or equal to two times the sensing radius (Rs).
(Note that the sensing radius of any sensor node shows its coverage capacity, whereas the transmission/communication radius shows connectivity. A node can sense any object in its sensing range. Two sensor nodes can communicate with each other if they are within communication range of each other and are connected, called neighbor nodes.)
3
The sensing area of every sensor node is a circular disc with a sensing radius of Rs.

3.2. Mathematical Formulations

There are different types of Delaunay triangles in the network; we categorized them on the basis of their angles/circumcenter, as acute, right-angle, and obtuse triangles. In an obtuse triangle, one angle is more than 90°, whereas in an acute triangle, no angle is more than 90°. A triangle with one angle of 90° is a right-angle triangle. As it can be seen in Figure 3, a circumcircle is a circle drawn around the triangle passing through all the points of the triangle; it is drawn using the center at perpendicular bisectors of the edges of the triangle, and the distance from the circumcenter to any vertex is the radius of the circle.
CASE 1:
There is no hole in the triangular region if the sensing radius of nodes (Rs) is larger than or equal to the radius of the circumcircle (R). As shown in Figure 4, the full area of the triangular region is covered by sensing areas of three vertex nodes of the triangle when the sensing radius is more than the radius of the circumcircle of the triangle.
In acute and right-angle triangles, the circumcenter is inside/on the edge of the triangle, so the maximum distance which is needed to cover is the circumcircle radius (the circumcenter being the farthest point from every sensor node). Therefore, if the sensor radius is more than the circumcircle radius, then every point in the triangular region will be covered.
In an obtuse triangle, the circumcenter is outside the triangle and farthest from every sensor node. If the circumcenter is covered by the sensor nodes’ sensing radius, then every point inside the triangle will be covered as every point inside the triangle is at a shorter distance than the circumcenter.
CASE 2:
If the sensing radius of nodes (Rs) is less than the radius of the circumcircle (R) drawn around the triangle, then there may or may not be holes present in the network. To manifest that, we first need to check if the triangle is obtuse or not.
A triangle is obtuse if it follows Equation (1):
ArΔAOB + ArΔBOC + ArΔAOC > Ar ΔABC
where Ar represents the area of the triangle. To compute the area of △ABC, we apply a formula to ‘calculate the area of the triangle for coordinate geometry’ evinced in Equation (2). As shown in Figure 1, each point has its coordinates on the x- and y-axis. Therefore, taking sensor nodes A( x A ,   y A ), B( x B , y B ), and C( x C , y C ), and circumcenter O( x O , y O ),
Ar Δ ABC = | x A ( y B y C ) + x B ( y C y A ) + x C ( y A y B ) 2 |
Similarly, we calculate the area of △AOB, △BOC, and △AOC and compare the sum of the three with the area of △ABC. Now, there are two cases: in the first case, the sum is equal, and in the second, some of the areas of the three triangles are more than the area of △ABC (shown in Figure 5).
CASE 2a.
If the sum of areas of the triangles made with the circumcenter as one point (ArΔAOB + ArΔBOC + ArΔAOC) is equal to the area of ΔABC and the sensing radius of the sensor nodes (Rs) is less than the circumcircle radius (R), then there must be a hole (shown in Figure 6). As the sensing radius is less than the circumcircle radius, there must be some area around the circumcenter that remains uncovered. In acute and right-angle triangles, this area falls within the triangular region generated by sensor nodes and is called a coverage hole.
CASE 2b.
If the sum of areas of the triangles made with the circumcenter as one point (ArΔAOB + ArΔBOC + ArΔAOC) is more than the area of ΔABC, then ΔABC is an obtuse triangle. If Rs < R, then, the region around O is not covered. In an obtuse triangle, the circumcenter lies outside the triangle; therefore, it may be that the uncovered area lies outside the triangular region or inside the target area to be covered.
As shown in Figure 7, even if Rs < R, there may be no hole (Figure 7a), or a hole may be present (Figure 7b). To find out if there is a coverage hole or not, we can perform some mathematical calculations with the help of geometry.
To estimate coverage holes in an obtuse triangle, ⊥ bisectors play a foremost role. It is a well-known fact that in obtuse triangles, the circumcenter is always outside the triangle and is opposite to the largest angle (shown in Figure 8). Perpendicular bisectors dissect the largest side at two points (in Figure 8 and Figure 9, E and F), and there will be no hole if these points are covered by any of the sensor nodes (Figure 9a,b).
To see if points E and F are covered or not, we need to find the distances of BE, BF, AE, and CF. If these distances are smaller than or equal to the sensing radius of the sensor nodes, these points are covered; otherwise, they are not. We have three sensor nodes as three vertices, A( x A , y A ), B( x B , y B ), and C( x C , y C ), of △ABC (shown in Figure 10 for representation).
We need to find ⊥ bisectors of sides other than the side made by the largest angle, i.e., the largest side. Therefore, to find two smaller sides, we need to calculate the length of each side:
AB = ( ( x B 2 x A 2 ) + ( y B 2 y A 2 ) )
Using Equation (3), we can find all three sides, AB, BC, and AC, and take two smaller sides (here AB and BC) for further calculation. GE and HF are ⊥ bisectors of sides AB and BC, respectively (shown in Figure 10).
∵ GE is ⊥ AB, ∴ AG = GB
∵ GE is ⊥ AB, ∴ ∠AGE = ∠BGE = 90°
∵ AG = GB and ∠AGE = ∠BGE= 90°
∴ using Pythagoras′ rule, AE=BE and ◺AGE= ◺BGE
Similarly, BF = FC
Using the law of cosine,
θ 1 = ( AB ) 2 + ( AC ) 2 ( BC ) 2 2 · AB · AC
θ 2 = ( BC ) 2 + ( AC ) 2 ( AB ) 2 2 · BC · AC
Now, as
tan   θ 1 = GE AG   GE =   AG × tan   θ 1   GE =   AB / 2 × tan   θ 1
we already have the value of AB (using Equation (3)) and θ1 (using Equation (4)), which we can use to compute GE.
Similarly,
HF =   BC / 2 × tan   θ 2
Now, using Pythagoras’ rule for ◺AGE,
AE = ( AB / 2 ) 2 + ( GE ) 2
Similarly,
CF = ( BC / 2 ) 2 + ( HF ) 2
As proved earlier, AE = BE and BF = FC, so now we have the values of AE, BE, BF, and CF. If these values are less than the sensing radius Rs, then there is a coverage hole in the target region. Otherwise, there is no hole.
The proposed mathematical model is very robust. The approach is very simple and energy-efficient. The mathematical formulations were built using the inherent properties of triangles, the rule of Pythagoras, the law of cosine, and triangle geometry. Use of the model is not only limited to WUSNs; it can also be very effectively applied to all static WSNs.

4. Coverage Hole Detection Algorithm

We used these mathematical models presented in the previous section to devise an algorithm for coverage hole detection. We randomly placed sensor nodes under the surface of the earth. The coverage hole detection algorithm (Algorithm 1) was run to find holes at the beginning and in every subsequent iteration in the case of node failure. Algorithm 2 was used to facilitate nodal communication, wherein the LEACH protocol was deployed for said purpose. We evaluated the performance of our algorithm by measuring parameters such as the number of holes, detection time, and residual energy. The hole detection time was observed with an increase in the number of nodes, as well as during the lifetime of the network, which proves the algorithm is scalable and suitable for networks with sizes varying from small to large. Residual energy after every round was observed, which proves that our techniques are energy-efficient.
Algorithm 1: Coverage Hole Detection for WUSNs.
Input:
  • Location coordinates of sensor nodes deployed under the surface of earth Node (xi, yi), i = 1, 2, …, n.
  • Sensing radius Rs
  • Target Area
Steps:
  • Generate Delaunay Triangulation in the target area using locations of sensor nodes. (To cover the full area using Delaunay triangles, we have placed a few nodes at boundaries and corners of the network)
  • Find out coordinates of circumcenter (CCxj, CCyj) and circumradius (Rj) for circumcenters of all the Delaunay triangles (Let the total number of Delaunay triangles generated be m).
  • for each Delaunay triangle, DT do
  • if circumradius (Rj) ≤ Rs then
  • There is no Hole; (shown in CASE 1 of Section 3)
  • else
  • Find out if Triangle is an acute/right angle or obtuse using CASE 2 of the mathematical model in Section 3.
  • if Triangle is acute/right angle then
  • There is a Hole; (mathematically proven in CASE 2a of Section 3)
  • else
  • Find out the largest side of an obtuse triangle
  • Find out points where perpendicular bisectors of the other two sides dissect (Let E and F).
  • if E & F are covered by any of the three sensor nodes of DT then
  • There is no Hole; (mathematically proven in CASE 2b of Section 3)
  • else
  • There is a Hole; (mathematically proven in CASE 2b of Section 3)
  • end if
  • end if
  • end if
  • end for
Output:
Marking of Holes in Delaunay triangles H = [H1, H2,…Hm], if Hi is NULL, then there is no Hole else There is a Hole and Hi contains coordinates of the circumcenter of DTi.
In Algorithm 2, holes are calculated whenever the energy level of any node falls to zero. We used the LEACH protocol for communication in the network. Any other protocol can also be used to lower energy consumption, if possible. The LEACH [35] protocol uses a clustering mechanism to improve the life of the network. Nodes in the network are divided into different clusters. It is a hierarchical protocol in which nodes in one cluster share data with the cluster head, where the cluster head aggregates the received data and transmits them to the sink. Cluster heads are decided by the use of a stochastic algorithm with a random probability distribution and are updated after each round to maintain the energy balance in the network. Nodes join the cluster with the closest cluster head. Once a node is chosen as a cluster head, it cannot become a cluster head again for P rounds, where P is the percentage of cluster heads. Subsequently, each node will have a probability of 1/P of becoming the cluster head. We implemented Algorithm 2 to assess the performance of our coverage hole detection algorithm with an increasing number of node failures in the network.
Algorithm 2: Estimation of Coverage Holes in the Lifetime of a WUSN.
Input:
  • Locations of sensor nodes deployed under surface of earth Node (xi, yi), I = 1, 2, …, n, and Sink.
  • Sensing radius Rs
  • Target Area
  • Energy (E) of sensor nodes
  • Probability P of a node to become cluster head
  • Transmission Energy ETX, Receiving Energy ERX, Data Aggregation Energy, Amplifying Energies (Efs & Emp depending upon the type of amplifier used, where Efs > Emp)
  • Number of rounds (Rmax)
Steps:
  • Computation of threshold distance (d0), when distance among transmitting and receiving nodes is more than d0, then Efs is the amplifying energy otherwise Emp.
    d 0 = Efs Emp
  • for r = 1 to Rmax
  • if (mod(r, round(1/P)) == 0) then
  • for i = 1 to n
  • Reset all cluster heads //flag is reset after every P round after that all nodes can participate in becoming cluster head
  • end for
  • end if
  • for each node in the network
  • if there is any dead node then                  //which was not dead in the previous round
  • Update dead nodes
  • Use Algorithm 1 to detect Holes in the Network
  • Record time taken to detect a hole in rth round
  • Update number of Holes in the N/w //If there is any hole that was not present in the last round
  • end if
  • if the energy level of any node reaches 0 then
  • Set Node to dead.
  • end if
  • Compute the remaining energy in the network.
  • end for
  • for each active node in the network
  • Generate a random number—rand1
  • if   rand 1 ( P ( 1 P   × mod ( r ,   round ( 1 / P ) ) ) ) AND Sensor Node was not a cluster head in previous P rounds then
  • Node is set to Cluster Head//Cluster heads selection using random number probability-based fun.
  • end if
  • end for
  • for each non-cluster active node in the network
  • Calculate the distance of node to Sink (distanceSink) and every other cluster node (distancec), to choose closest node (with minimum distance- distancemin) for transmitting data
    d i s t a n c e C = ( C x N o d e x ) 2 + ( C y N o d e y ) 2 d i s t a n c e S i n k = ( S i n k x N o d e x ) 2 + ( S i n k y N o d e y ) 2 d i s t a n c e m i n = min ( d i s t a n c e C , d i s t a n c e S i n k )
     
  • if (distancemin > d0) then                            //Node Energy consumption in transmitting data
    Energy Dissip _ Node = ETX × 4000 +   Emp × 4000 × distance min 4
  • else
    Energy Dissip _ Node = ETX × 4000 +   Efs × 4000 × distance min 2
  • end if
  • E = E   Energy Dissip _ Node                                       //Remaining energy of node is updated
  • if the Cluster node is chosen to transmit Data Packet then
  • Energy Dissip _ C = ( ERX + EDA ) × 4000    //Cluster node Energy consumption in receiving data
  • E = E   Energy Dissip _ C                                                    //Remaining energy of cluster node is updated
  • end if
  • end for
  • for each cluster node in the network
  • distance = ( C x Sin k x ) 2 + ( C y Sin k y ) 2       //Calculate distance of node to Sink node
  • if (distance > d0) then               //Cluster Node Energy consumption in transmitting data to Sink 
    Energy Dissipation = ( ETX + EDA ) × 4000 +   Emp × 4000 × distance 4
  • else
    Energy Dissipation = ( ETX + EDA ) × 4000 +   Efs × 4000 × distance 2
  • end if
  • E = E   Energy Dissipation                               //Remaining energy of cluster node is updated
  • end for
  • end for
Output:
Marking of Holes in each round
Energy Dissipation in every round
Time taken to detect holes in every round
Holes can be healed by placing new sensor nodes at the location of the circumcenters of Delaunay triangles with a hole.

5. Simulation Results

To simulate our algorithms and evaluate the performance, we randomly deployed 100 sensor nodes under the earth’s surface in a 100 m × 100 m area (as shown in Figure 1). During the sensor deployment, we intentionally deployed a few nodes on the boundary of the network so that the full target area is covered by Delaunay triangles in the network (as shown in Figure 2). The sensing radius (Rs) of the sensor nodes was set to 8. A complete list of the parameters is shown in Table 2.
We used MATLAB for the implementation of our algorithms. Using Algorithm 1, we identified holes in the network after deployment. As shown in Figure 11, sensing nodes with a sensing radius of 8 m were deployed in the network; our algorithm marks holes in the network with very good accuracy.
After the identification of holes in the beginning, we ran Algorithm 2 for 500 rounds and recorded the performance of our coverage hole detection algorithm. Figure 12a,b represent two intermediate hole detection results that show an increasing number of holes due to the failure of nodes with time. Here, in our simulation, we set 10% of the total nodes as advanced nodes having energy (Ea) two times that of the energy (E) of other nodes. The motivation behind capturing this scenario is to view the change in the network with time, viewing the failure of nodes and increasing holes.
In Figure 13, we can see that up to the first 175 rounds, there was no new hole. The nodes communicated with each other using Algorithm 2, and no node failure was observed until 175 rounds. The number of holes exponentially increased in the next 100 rounds as the sensor nodes in the network started failing due to the loss of energy. Increasing the number of holes in the network clearly shows that node failure will increase with an increase in the hole size due to the higher energy consumption of other active nodes and will ultimately lead to more failures. To further analyze this, we checked how many times our coverage hole detection algorithm had to run in the network lifetime. As mentioned in Algorithm 2, the hole detection algorithm is run whenever there is a new dead node in the network.
Figure 14 shows that the hole detection algorithm was run around 95 times during the entire lifetime of the network, i.e., there was a new dead node found; this shows the detection time taken by the algorithm in every run. When we compare Figure 13 and Figure 14, it can be seen that the detection time was longer when there were more active nodes in the network. After a time when there was a sudden rise in the number of dead nodes/holes (as shown in Figure 13), the detection time reduced. The algorithm detected holes in the network with a size of 100 m × 100 m, with 100 sensor nodes having a sensing radius of 8 m, in less than 0.1 millisecond, and this was further reduced when the number of nodes reduced in the network.
Figure 15 shows the total residual energy of the network after every round. It can be seen that up to around 250 rounds, there was a linear and fast consumption of energy, as more nodes were communicating. After around 250 rounds, the number of dead nodes/holes increased (shown in Figure 13), so the communication reduced, as there were a few nodes in the communication range of each other and the sink.
We changed the sensing radius of the sensor nodes to 2 m and varied the number of nodes in the network in a range of 50–500 with an increase of 40 nodes after each iteration. After randomly deploying nodes in the 100 m × 100 m area, we ran the hole detection algorithm to observe the change in the hole detection time with an increase in the number of nodes in the network.
Figure 16 shows that the hole detection time increased linearly with an increase in the number of nodes; this shows that our algorithm’s performance is not affected by the increase in the network size and proves its suitability for every network size from small to large.

6. Discussion

Coverage holes are one of the most imperative challenges in wireless underground sensor networks, which can very badly affect the performance and quality of a network. Therefore, hole detection algorithms with a low cost and low complexity play a very important and crucial role in high-performance networks. In this paper, we proposed a Delaunay-based model for hole detection in wireless underground sensor networks. The simulation results show that our technique is advantageous over other schemes in many aspects.
A very simplistic and easy-to-implement mathematical model for static sensor nodes with a small capacity was built to detect coverage holes. The target region is divided into triangles using Delaunay triangulation. The model was developed using the properties of DT and geometry. All the cases were included in the model and were very well formulated using computational geometry. The results show that our algorithm can identify all holes present in the network.
We evaluated the consumption of energy in the network. We used the LEACH protocol for communication and recorded the residual energy after each round. The energy consumption in the network showed a linear depletion with the number of rounds. The energy consumption and the number of holes showed a comparative similarity when analyzed (Figure 13 and Figure 15). When the overall energy of the network fell below a threshold, a sudden increase in the number of holes could be seen due to the failure of the nodes. Residual energy can be helpful in pre-planning the deployment of additional nodes. The results show that the technique is energy-efficient, with less communication overhead. The algorithm performs very well during the lifetime of the network.
We analyzed the average hole detection time by varying the density of nodes in the network. Different numbers of nodes ranging from 50 to 500 having a sensing radius of 2 m were deployed in the region of interest. The hole detection time observed during all the experiments is presented in Figure 16, in Section 5. It can be seen that there was almost a linear rise in the hole detection time with increasing network density. A linear rise in time is very reasonable as, when the number of nodes in the network increases, the communication and computation time also increase. The lack of an exponential rise shows that our algorithm does not add any additional overhead with increasing network size. Therefore, the algorithm is scalable and can fit well with an increasing network size. The repeatability of the results was verified by generating one set of data points and running the hole detection algorithm multiple times; the algorithm is deterministic.

7. Conclusions

In this paper, we proposed a Delaunay-based coverage hole detection algorithm for randomly deployed sensor nodes in wireless underground sensor networks (WUSNs). We built rigorous mathematical models to realize the algorithm. The proposed algorithm detected all holes present in the network. The algorithm is easy to implement and possesses no hurdles in scalability. To analyze the performance of the coverage hole detection algorithm during the lifetime of the network, we implemented the algorithm using LEACH as a communication protocol. Using both algorithms, we simulated our network and found that holes in the network were captured with very good accuracy during the whole network lifetime. We calculated the residual energy after each round; the algorithm is very energy-efficient. The residual energy after every round provides a baseline for low-energy nodes and can be very useful in planning the deployment of new nodes in the network. The proposed algorithm took less than 0.1 milliseconds to detect holes in a 100 m × 100 m network with 100 sensor nodes having a sensing radius of 8 m. The hole detection time increased linearly with an increase in the number of nodes, which proves that the algorithm is scalable and suitable for small as well as large networks. Our scheme is cost-effective and shows fine performance over time when nodes start failing during communication. We developed an algorithm for nodes deployed in the same plane considering x and y coordinates in a 2D environment. The model can be extended to the 3D environment by considering depth as the third dimension. Future work can be conducted in this direction.

Author Contributions

Conceptualization, P.S. and R.P.S.; methodology, P.S.; software, P.S.; validation, P.S. and R.P.S.; formal analysis, P.S. and R.P.S.; investigation, P.S. and R.P.S.; resources, P.S.; data curation, P.S. and R.P.S.; writing—original draft preparation, P.S.; writing—review and editing, P.S. and R.P.S.; visualization, P.S.; supervision, R.P.S.; project administration, R.P.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Not applicable.

Acknowledgments

The first author is employed by the Semi-Conductor Laboratory (SCL), Government of India, and is grateful to Surinder Singh, Director SCL, Manish Kumar Hooda, Head TDD/SCL, Sathish Dhayalan, TDD/SCL and the organization for providing support for pursuing this research.

Conflicts of Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

  1. Silva, A.R.; Vuran, M.C. Communication with Aboveground Devices in Wireless Underground Sensor Networks: An Empirical Study. In Proceedings of the 2010 IEEE international conference on communications, Cape Town, South Africa, 23–27 May 2010; pp. 1–6. [Google Scholar]
  2. Vuran, M.C.; Silva, A.R. Communication through Soil in Wireless Underground Sensor Networks–Theory and Practice. In Sensor Networks; Springer: New York City, NY, USA, 2010; pp. 309–347. [Google Scholar]
  3. Akyildiz, I.F.; Stuntebeck, E.P. Wireless Underground Sensor Networks: Research Challenges. Ad Hoc Netw. 2006, 4, 669–686. [Google Scholar] [CrossRef]
  4. Yoon, S.-U.; Cheng, L.; Ghazanfari, E.; Pamukcu, S.; Suleiman, M.T. A radio propagation model for wireless underground sensor networks. In Proceedings of the 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, Houston, TX, USA, 5–9 December 2011; pp. 1–5. [Google Scholar]
  5. Alibakhshikenari, M.; Virdee, B.S.; Althuwayb, A.A.; Aïssa, S.; See, C.H.; Abd-Alhameed, R.A.; Falcone, F.; Limiti, E. Study on on-chip antenna design based on metamaterial-inspired and substrate-integrated waveguide properties for millimetre-wave and THz integrated-circuit applications. J. Infrared Millim. Terahertz Waves 2021, 42, 17–28. [Google Scholar] [CrossRef]
  6. Shirkolaei, M.M. Wideband linear microstrip array antenna with high efficiency and low side lobe level. Int. J. RF Microw. Comput. Aided Eng. 2020, 30, e22412. [Google Scholar] [CrossRef]
  7. Lin, K.; Hao, T. Experimental link quality analysis for LoRa-based wireless underground sensor networks. IEEE Internet Things J. 2020, 8, 6565–6577. [Google Scholar] [CrossRef]
  8. Silva, B.; Fisher, R.M.; Kumar, A.; Hancke, G.P. Experimental link quality characterization of wireless sensor networks for underground monitoring. IEEE Trans. Ind. Inform. 2015, 11, 1099–1110. [Google Scholar] [CrossRef] [Green Version]
  9. Kaushik, A. Multiple Hole Detection in Wireless Underground Sensor Networks. In Proceedings of the Communication and Computing Systems: Proceedings of the 2nd International Conference on Communication and Computing Systems ICCCS 2018, Gurgaon, India, 1–2 December 2018; p. 157. [Google Scholar]
  10. Bi, K.; Gu, N.; Tu, K.; Dong, W. Neighborhood-Based Distributed Topological Hole Detection Algorithm in Sensor Networks. In Proceedings of the IET International Conference on Wireless, Mobile and Multimedia Networks, Hangzhou, China, 6–9 November 2006; pp. 1–4. [Google Scholar]
  11. Ghosh, A.; Das, S.K. Coverage and Connectivity Issues in Wireless Sensor Networks: A Survey. Pervasive Mob. Comput. 2008, 4, 303–334. [Google Scholar] [CrossRef]
  12. Nguyen, P.L.; Ji, Y.; Liu, Z.; Vu, H.; Nguyen, K.-V. Distributed Hole-Bypassing Protocol in WSNs with Constant Stretch and Load Balancing. Comput. Netw. 2017, 129, 232–250. [Google Scholar] [CrossRef]
  13. Antil, P.; Malik, A. Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey. J. Comput. Netw. Commun. 2014, 2014, 969501. [Google Scholar] [CrossRef] [Green Version]
  14. Watfa, M.K.; Commuri, S. Energy-Efficient Approaches to Coverage Holes Detection in Wireless Sensor Networks. In Proceedings of the 2006 IEEE Conference on Computer Aided Control System Design, 2006 IEEE International Conference on Control Applications, 2006 IEEE International Symposium on Intelligent Control, Munich, Germany, 4–6 October 2006; pp. 131–136. [Google Scholar]
  15. De Silva, V.; Ghrist, R.; Muhammad, A. Blind Swarms for Coverage in 2-D. In Proceedings of the 1st Conference on Robotics: Science and Systems, Massachusetts Institute of Technology, Cambridge, MA, USA; pp. 335–342. Available online: http://math.uchicago.edu/~shmuel/AAT-readings/Sensory%20networks/blind%20swarms.pdf (accessed on 1 April 2022).
  16. De Silva, V.; Ghrist, R. Coordinate-Free Coverage in Sensor Networks with Controlled Boundaries via Homology. Int. J. Robot. Res. 2006, 25, 1205–1222. [Google Scholar] [CrossRef]
  17. Yao, J.; Zhang, G.; Kanno, J.; Selmic, R. Decentralized Detection and Patching of Coverage Holes in Wireless Sensor Networks. In Intelligent Sensing, Situation Management, Impact Assessment, and Cyber-Sensing; International Society for Optics and Photonics: Orlando, FL, USA, 2009; Volume 7352, p. 73520V. [Google Scholar]
  18. Ghosh, P.; Gao, J.; Gasparri, A.; Krishnamachari, B. Distributed Hole Detection Algorithms for Wireless Sensor Networks. In Proceedings of the 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems, Philadelphia, PA, USA, 28–30 October 2014; pp. 257–261. [Google Scholar]
  19. Yan, F.; Martins, P.; Decreusefond, L. Connectivity-Based Distributed Coverage Hole Detection in Wireless Sensor Networks. In Proceedings of the 2011 IEEE Global Telecommunications Conference GLOBECOM 2011, Houston, TX, USA, 5–9 December 2011; pp. 1–6. [Google Scholar]
  20. Khan, I.M.; Jabeur, N.; Zeadally, S. Hop-Based Approach for Holes and Boundary Detection in Wireless Sensor Networks. IET Wirel. Sens. Syst. 2012, 2, 328–337. [Google Scholar] [CrossRef]
  21. Wang, G.; Cao, G.; La Porta, T.F. Movement-Assisted Sensor Deployment. IEEE Trans. Mob. Comput. 2006, 5, 640–652. [Google Scholar] [CrossRef]
  22. Zhang, C.; Zhang, Y.; Fang, Y. Localized Algorithms for Coverage Boundary Detection in Wireless Sensor Networks. Wirel. Netw. 2009, 15, 3–20. [Google Scholar] [CrossRef]
  23. Hatcher, A. Algebraic Topology; Tsinghua University Press Co., Ltd: Beijing, China, 2005. [Google Scholar]
  24. Bejerano, Y. Coverage Verification without Location Information. IEEE Trans. Mob. Comput. 2011, 11, 631–643. [Google Scholar] [CrossRef]
  25. Funke, S.; Klein, C. Hole Detection or: How Much Geometry Hides in Connectivity? In Proceedings of the Twenty-Second Annual Symposium on Computational Geometry, Sedona, AZ, USA, 5–7 June 2006; pp. 377–385. [Google Scholar]
  26. Li, X.; Hunter, D.K. Distributed Coordinate-Free Hole Recovery. In Proceedings of the ICC Workshops-2008 IEEE International Conference on Communications Workshops, Beijing, China, 19–23 May 2008; pp. 189–194. [Google Scholar]
  27. Bi, K.; Tu, K.; Gu, N.; Dong, W.L.; Liu, X. Topological Hole Detection in Sensor Networks with Cooperative Neighbors. In Proceedings of the 2006 International Conference on Systems and Networks Communications ICSNC’06, Tahiti, French Polynesia, 29 October–3 November 2006; p. 31. [Google Scholar]
  28. Ghrist, R.; Muhammad, A. Coverage and Hole-Detection in Sensor Networks via Homology. In Proceedings of the IPSN 2005 Fourth International Symposium on Information Processing in Sensor Networks, Los Angeles, CA, USA, 24–27 April 2005; pp. 254–260. [Google Scholar]
  29. Corke, P.; Peterson, R.; Rus, D. Finding Holes in Sensor Networks. In Proceedings of the 2007 IEEE International Conference on Robotics and Automation, Roma, Italy, 10–14 April 2007; Available online: https://www.researchgate.net/profile/Daniela_Rus/publication/268256993_Finding_Holes_in_Sensor_Networks/links/56d0439f08ae059e375cfbae.pdf (accessed on 1 April 2022).
  30. Yangy, S.; Liz, M.; Wu, J. Scan-Based Movement-Assisted Sensor Deployment Methods in Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2007, 18, 1108–1121. [Google Scholar] [CrossRef]
  31. Shirsat, A.; Bhargava, B. Local Geometric Algorithm for Hole Boundary Detection in Sensor Networks. Secur. Commun. Netw. 2011, 4, 1003–1012. [Google Scholar] [CrossRef]
  32. Senouci, M.R.; Mellouk, A.; Assnoune, K. Localized Movement-Assisted Sensor Deployment Algorithm for Hole Detection and Healing. IEEE Trans. Parallel Distrib. Syst. 2013, 25, 1267–1277. [Google Scholar] [CrossRef]
  33. Aurenhammer, F.; Klein, R.; Lee, D.-T. Voronoi Diagrams and Delaunay Triangulations; World Scientific Publishing Company: Singapore, 2013. [Google Scholar]
  34. Rakovic, S.; Grieder, P.; Jones, C. Computation of Voronoi Diagrams and Delaunay Triangulation via Parametric Linear Programming; ETH (Eidgenössische Technische Hochschule): Zurich, Switzerland, 2004. [Google Scholar]
  35. Low-Energy Adaptive Clustering Hierarchy; In Wikipedia, The Free Encyclopedia; Page Version ID: 1076138763. 2019. Available online: https://en.wikipedia.org/wiki/Low-energy_adaptive_clustering_hierarchy (accessed on 1 April 2022).
Figure 1. WUSN with a size of 100 m × 100 m with 100 randomly deployed sensor nodes. The network plot was created using MATLAB software.
Figure 1. WUSN with a size of 100 m × 100 m with 100 randomly deployed sensor nodes. The network plot was created using MATLAB software.
Computers 11 00086 g001
Figure 2. Delaunay triangulation of sensor nodes deployed in the target region. The Delaunay triangles of the deployed sensor nodes were generated using MATLAB software.
Figure 2. Delaunay triangulation of sensor nodes deployed in the target region. The Delaunay triangles of the deployed sensor nodes were generated using MATLAB software.
Computers 11 00086 g002
Figure 3. Circumcircle around a triangle using ⊥ bisectors: (a) acute triangle; (b) obtuse triangle; (c) right-angle triangle.
Figure 3. Circumcircle around a triangle using ⊥ bisectors: (a) acute triangle; (b) obtuse triangle; (c) right-angle triangle.
Computers 11 00086 g003
Figure 4. There is no coverage hole when Rs > R: (a) acute triangle; (b) obtuse triangle; (c) right-angle triangle.
Figure 4. There is no coverage hole when Rs > R: (a) acute triangle; (b) obtuse triangle; (c) right-angle triangle.
Computers 11 00086 g004
Figure 5. Checking if a triangle is obtuse or not, with three cases: (ac).
Figure 5. Checking if a triangle is obtuse or not, with three cases: (ac).
Computers 11 00086 g005
Figure 6. There is a coverage hole when Rs < R: (a) acute triangle; (b) right-angle triangle.
Figure 6. There is a coverage hole when Rs < R: (a) acute triangle; (b) right-angle triangle.
Computers 11 00086 g006
Figure 7. Estimation of a coverage hole in an obtuse triangle when Rs < R: (a) no hole; (b) hole.
Figure 7. Estimation of a coverage hole in an obtuse triangle when Rs < R: (a) no hole; (b) hole.
Computers 11 00086 g007
Figure 8. Obtuse triangle with ⊥ bisectors GE and HF.
Figure 8. Obtuse triangle with ⊥ bisectors GE and HF.
Computers 11 00086 g008
Figure 9. Coverage hole estimation in an obtuse triangle: (a) no hole when E and F are covered; (b) hole when E and F are not covered.
Figure 9. Coverage hole estimation in an obtuse triangle: (a) no hole when E and F are covered; (b) hole when E and F are not covered.
Computers 11 00086 g009
Figure 10. Obtuse triangle with crucial points and sides marked.
Figure 10. Obtuse triangle with crucial points and sides marked.
Computers 11 00086 g010
Figure 11. Hole detection in a randomly deployed network. Red circles show hole centers marked by the algorithm.
Figure 11. Hole detection in a randomly deployed network. Red circles show hole centers marked by the algorithm.
Computers 11 00086 g011
Figure 12. Increasing holes in the network with time (due to node failure). Failing nodes and increasing holes are shown from (a) to (b) to capture real-time scenarios.
Figure 12. Increasing holes in the network with time (due to node failure). Failing nodes and increasing holes are shown from (a) to (b) to capture real-time scenarios.
Computers 11 00086 g012
Figure 13. Number of rounds vs. holes in the network. The figure depicts no change in the holes for the first 175 rounds and a huge increase in the number of holes when nodes start failing, and again, very few change as communication decreases due to the failing of nodes in the range of each other.
Figure 13. Number of rounds vs. holes in the network. The figure depicts no change in the holes for the first 175 rounds and a huge increase in the number of holes when nodes start failing, and again, very few change as communication decreases due to the failing of nodes in the range of each other.
Computers 11 00086 g013
Figure 14. Number of detections vs. detection time. The detection time is less than 0.1 millisecond and decreases with the decrease in the number of nodes (nodes failing with time) in the network.
Figure 14. Number of detections vs. detection time. The detection time is less than 0.1 millisecond and decreases with the decrease in the number of nodes (nodes failing with time) in the network.
Computers 11 00086 g014
Figure 15. Number of rounds vs. residual energy. Residual energy is measured after every fifty rounds.
Figure 15. Number of rounds vs. residual energy. Residual energy is measured after every fifty rounds.
Computers 11 00086 g015
Figure 16. Number of nodes vs. detection time. The hole detection time shows a linear increase with an increase in the number of nodes, proving the scalability of the algorithm.
Figure 16. Number of nodes vs. detection time. The hole detection time shows a linear increase with an increase in the number of nodes, proving the scalability of the algorithm.
Computers 11 00086 g016
Table 1. Literature review of various coverage hole detection algorithms and their limitations.
Table 1. Literature review of various coverage hole detection algorithms and their limitations.
Type of TechniquePaperModel/Concept UsedLimitations/Constraints
Range-Based Techniques[15]Blind swarm-based algorithmCentralized computation. Minimum node requirement for optimal coverage.
[24]Two-anchor (TA) and cyclic segment sequence (CSS) algorithmsTA algorithm requires that the transmission range must be more than or equal to four times the sensing range. CSS may be susceptible to inaccurate distance measures and generate false positives.
Connectivity-Based Techniques[19]Cech complex, Rips complex,
and connectivity-based distributed algorithm
In many scenarios, the algorithm is not sufficient in discovering triangular holes.
[20]Hop-based approach for hole and network boundary detectionA set of x-hop neighbors is discerned by each node in the network. Deciding the value of x needs a thorough study of the network.
[26]Triangular mesh distributed hole recovery algorithmRedundant nodes need to be placed in the network. The selection of an optimal number of nodes for hole recovery is NP-hard. The algorithm can identify large holes but is unable to detect small bores.
[27]Hole detection algorithm with cooperative neighborsThe algorithm will not work with non-uniformly distributed nodes. While checking the hole boundary, a threshold from the average degree of neighbor nodes is taken into account; an incorrect value of the threshold may bring an extra communication overhead or false information, or may lead to the loss of boundary nodes.
[28]Hole detection based on homologyCentralized approach, computationally complex, and may not always detect holes.
Location-Based
Techniques
[9]Voronoi diagram—with the concept of the flattening incrementThe value of the flattening increment and approximation is not clear.
[21]Voronoi diagram, two algorithms—VOR and VECPerformance depends upon the number of mobile nodes in the network, which is not suitable for large-sized holes.
[22]Localized Voronoi polygon (LVP) and neighbor embracing polygon (NEP)LVP needs both direction and distance. NEP cannot identify all holes.
[29]Convex hull-based algorithmsOne algorithm possesses an extra communication overhead to maintain the state information; the second algorithm requires routing details.
[30]Scan-based movement-assisted sensor deployment method (SMART)The number of scans leads to an extra communication overhead. The scan process may not work correctly if consecutive empty clusters increase in the network.
[31]Empty i-Cone-based hole detection algorithmThe algorithm requires 2-hop connectivity information along with the location information. Node synchronization is needed.
[32]Virtual force-based HEAL (hole detection and healing) algorithm using the concept of the Gabriel graphUnable to detect holes present on the network boundary.
Table 2. Network parameters for simulation.
Table 2. Network parameters for simulation.
ParameterValue
Target Area100 m × 100 m
Sensor Nodes (n)100
Sensing Radius (Rs)8 m
Initial Energy of Nodes (E)0.1 J (for 90% nodes)
0.2 J (for 10% nodes)
Cluster Head Probability (P)0.1
Packet Size4000 bits
Transceiver Energy (ETX, ERX)50 × 10−9 J/bit (i.e., 50 nJ/bit)
Data Aggregation Energy (EDA)5 × 10−9 J/bit (i.e., 5 nJ/bit)
Amplification Energy (Emp), When d > d00.0013 × 10−12 J/bit/m4 (i.e., 0.0013 pJ/bit/m4)
Amplification Energy (Efs), When d ≤ d010 × 10−12 J/bit/m2 (10 pJ/bit/m2)
No. of Rounds (Rmax)500
No. of Sink Nodes1 (center of the network)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Sharma, P.; Singh, R.P. Energy-Efficient Deterministic Approach for Coverage Hole Detection in Wireless Underground Sensor Network: Mathematical Model and Simulation. Computers 2022, 11, 86. https://0-doi-org.brum.beds.ac.uk/10.3390/computers11060086

AMA Style

Sharma P, Singh RP. Energy-Efficient Deterministic Approach for Coverage Hole Detection in Wireless Underground Sensor Network: Mathematical Model and Simulation. Computers. 2022; 11(6):86. https://0-doi-org.brum.beds.ac.uk/10.3390/computers11060086

Chicago/Turabian Style

Sharma, Priyanka, and Rishi Pal Singh. 2022. "Energy-Efficient Deterministic Approach for Coverage Hole Detection in Wireless Underground Sensor Network: Mathematical Model and Simulation" Computers 11, no. 6: 86. https://0-doi-org.brum.beds.ac.uk/10.3390/computers11060086

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop