Learn More
Routing holes in wireless sensor networks (WSN) do occur due to several reasons, including cases caused by natural obstacles or disaster suffered areas. Computing the exact boundary of a hole is possible [5], but can be impractical with large holes. In this paper, we consider the problem of how to approximate a hole by a simplistic shape, covering polygon(More)
Because of its simplicity and scalability, geographic routing is a popular approach in wireless sensor networks, which can achieve a near-optimal routing path in the networks without of holes. With the occurrence of holes, however, geographic routing faces the problems of hole diffusion and routing path enlargement. Several recent proposals attempt to fix(More)
Holes in sensor network are regions without operating nodes which may occur due to several reasons, including cases caused by natural obstacles or disaster suffered areas. Determining the location and shape of holes can help to monitor these disaster events (such as volcano, tsunami, etc.) or help to make smart, early routing decisions for circumventing a(More)
There are two main requirements in dealing with coverage holes in wireless sensor networks (WSNs): locating the hole boundary and finding the locations to deploy new sensors for hole patching. The current protocols on finding the patching locations always require re-running the protocols from scratch many times. This constraint causes the time complexity(More)
The routing stretch in a sensor network with a large hole can be controlled if the network nodes have certain information about the hole location and shape, possibly by using some mechanism for hole boundary approximation and information dissemination. However, a finer approximation (for smaller stretch) leads to higher cost of dissemination, which could be(More)
A critical issue in designing efficient routing algorithms for wireless sensor networks (WSN) is dealing with holes which do occur due to several reasons, including cases caused by natural obstacles or disaster suffered areas. Traditional solutions utilize perimeter routing techniques that however lead to traffic concentration on the nodes on the hole(More)
  • 1