Survey on Sensor Holes: A Cause-Effect-Solution Perspective

Abstract We survey the sensor network holes from a cause-effect-solution perspective. We first propose a new taxonomy (PLMS) which classifies holes into type groups according to the cause of anomaly. We discuss the effects of holes on the sensor network. Finally, we survey the different curative approaches (prevention, detection, repairing, avoidance).

[1]  Shih-Chang Huang Ion-6: A Positionless Self-Deploying Method for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[2]  Donghun Lee,et al.  A modeling for hole problem in wireless sensor networks , 2007, IWCMC.

[3]  Yongping Zhang,et al.  SeRA: A Secure Routing Algorithm Against Sinkhole Attacks for Mobile Wireless Sensor Networks , 2010, 2010 Second International Conference on Computer Modeling and Simulation.

[4]  Krishna M. Sivalingam,et al.  Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications , 2003 .

[5]  Minyi Guo,et al.  Hole Avoiding in Advance Routing in Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[6]  G. Mahadevan,et al.  A non cryptographic method of sink hole attack detection in wireless sensor networks , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[7]  Abdelhamid Mellouk,et al.  Oriented Void Avoidance Scheme for Real-Time Routing Protocols in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[8]  Nafaâ Jabeur,et al.  A knowledge-oriented meta-framework for integrating sensor network infrastructures , 2009, Comput. Geosci..

[9]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[10]  Leonidas J. Guibas,et al.  Locating and Bypassing Holes in Sensor Networks , 2006, Mob. Networks Appl..

[11]  Martin Vetterli,et al.  Proceedings of the 4th international symposium on Information processing in sensor networks , 2005 .

[12]  Leonidas J. Guibas,et al.  Locating and bypassing routing holes in sensor networks , 2004, IEEE INFOCOM 2004.

[13]  Satyajayant Misra,et al.  BAMBi: Blackhole Attacks Mitigation with Multiple Base Stations in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[14]  Stefan Funke,et al.  Topological hole detection in wireless sensor networks and its applications , 2005, DIALM-POMC '05.

[15]  Abubakr Muhammad,et al.  Coverage and hole-detection in sensor networks via homology , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[16]  Abderrahmane Baadache,et al.  Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks , 2010, ArXiv.

[17]  Erik D. Demaine,et al.  Deploying sensor networks with guaranteed capacity and fault tolerance , 2005, MobiHoc '05.

[18]  Yskandar Hamam,et al.  Hidden Markov Model for Shortest Paths Testing to Detect a Wormhole Attack in a Localized Wireless Sensor Network , 2012, ANT/MobiWIS.

[19]  Sanjay Jha,et al.  The holes problem in wireless sensor networks: a survey , 2005, MOCO.

[20]  Peter Corke,et al.  Finding Holes in Sensor Networks , 2022 .

[21]  Liu An-Feng,et al.  Research on Energy Hole Problem for Wireless Sensor Networks Based on Alternation between Dormancy and Work , 2008, 2008 The 9th International Conference for Young Computer Scientists.

[22]  Ruttikorn Varakulsiripunth,et al.  Detecting sinkhole attack and selective forwarding attack in wireless sensor networks , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).

[23]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[24]  Stéphane Devismes,et al.  Analysis of Random Walks Using Tabu Lists , 2012, SIROCCO.

[25]  Gianluca Dini,et al.  An Algorithm for Reconnecting Wireless Sensor Network Partitions , 2008, EWSN.

[26]  C. Siva Ram Murthy,et al.  Dynamic Coverage Maintenance Algorithms for Sensor Networks with Limited Mobility , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[27]  Neeraj Suri,et al.  LEHP: Localized energy hole profiling in Wireless Sensor Networks , 2010, The IEEE symposium on Computers and Communications.

[28]  Yu-Chee Tseng,et al.  The Coverage Problem in a Wireless Sensor Network , 2003, WSNA '03.

[29]  Suman Banerjee,et al.  Proceedings of the 2005 joint workshop on Foundations of mobile computing , 2005 .

[30]  Ivan Stojmenovic,et al.  Design Guidelines for Maximizing Lifetime and Avoiding Energy Holes in Sensor Networks with Uniform Distribution and Uniform Reporting , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[31]  Roberto Verdone Proceedings of the 5th European conference on Wireless sensor networks , 2008 .

[32]  Kuei-Ping Shih,et al.  PALM: A Partition Avoidance Lazy Movement Protocol for Mobile Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.