Development of Fuzzy Enabled Coverage Hole Detection Algorithm in Wireless Sensor Networks

The coverage hole problem in Wireless Sensor Networks (WSNs) is one of the most important problem. The data has to be communicated through the base station that every sensor node have to be communicated to the adjacent nodes within its communication area. The level of network connectivity is used to detect the coverage hole problem. The proposed fuzzy enabled coverage hole detection methodology is used to identify the coverage hole in the network. The communication links among the sensor nodes are maintained by the path construction. The adjacent nodes are identified based on the energy level for enhanced transmission. Fuzzy rules are constructed with the parameters of Energy, Communication with adjacent nodes and network coverage with the coverage hole is detected as the output of these rules. The experimental results show that the proposed methodology has improved performance for detecting the coverage hole with various parameters.

[1]  K. Chitra,et al.  An efficient fuzziness based contiguous node refining scheme with cross-layer routing path in WSN , 2020, Peer-to-Peer Netw. Appl..

[2]  Ahmed M. Khedr,et al.  A Distributed Self-Healing Coverage Hole Detection and Repair Scheme for Mobile Wireless Sensor Networks , 2020 .

[3]  Priti Maheshwary,et al.  Implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN) , 2020, Comput. Commun..

[4]  Jiang Xie,et al.  A local-gravitation-based method for the detection of outliers and boundary points , 2020, Knowl. Based Syst..

[5]  S. Balaji,et al.  FPSOEE: Fuzzy-enabled particle swarm optimization-based energy-efficient algorithm in mobile ad-hoc networks , 2019, J. Intell. Fuzzy Syst..

[6]  Andrés Ortiz,et al.  An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks , 2019, Comput. Networks.

[7]  Yesudhas Harold Robinson,et al.  Energy Aware Clustering Scheme in Wireless Sensor Network Using Neuro-Fuzzy Approach , 2016, Wireless Personal Communications.

[8]  Y. H. Robinson,et al.  MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks , 2019, Wireless Personal Communications.

[9]  Abdelkader Khelil,et al.  3HA: Hybrid Hole Healing Algorithm in a Wireless Sensor Networks , 2020, Wirel. Pers. Commun..

[10]  Gang Qu,et al.  Secure Routing Protocol based on Multi-objective Ant-colony-optimization for wireless sensor networks , 2019, Appl. Soft Comput..

[11]  Wenjing Jia,et al.  Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model , 2019, Inf. Sci..

[12]  Karunanithy Kalaivanan,et al.  Reliable location aware and Cluster-Tap Root based data collection protocol for large scale wireless sensor networks , 2018, J. Netw. Comput. Appl..

[13]  Yongsheng Yang,et al.  Cascading failures in wireless sensor networks with load redistribution of links and nodes , 2019, Ad Hoc Networks.

[14]  E. Baburaj,et al.  Fuzzy enabled congestion control by cross layer protocol utilizing OABC in WSN: combining MAC, routing, non-similar clustering and efficient data delivery , 2018, Wireless Networks.

[15]  Wenyu Ma,et al.  Connectivity Based k-Coverage Hole Detection in Wireless Sensor Networks , 2020, Mob. Networks Appl..

[16]  Nitin Mittal An Energy Efficient Stable Clustering Approach Using Fuzzy Type-2 Bat Flower Pollinator for Wireless Sensor Networks , 2020, Wirel. Pers. Commun..

[17]  Sariga Arjunan,et al.  Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol , 2017, Applied Intelligence.

[18]  S. Sumathi,et al.  LD2FA-PSO: A novel Learning Dynamic Deterministic Finite Automata with PSO algorithm for secured energy efficient routing in Wireless Sensor Network , 2020, Ad Hoc Networks.

[19]  Pramod Kumar,et al.  Fuzzy-interval based probabilistic query generation models and fusion strategy for energy efficient wireless sensor networks , 2018, Comput. Commun..

[20]  M. Rajaram,et al.  A Memory Aided Broadcast Mechanism with Fuzzy Classification on a Device-to-Device Mobile Ad Hoc Network , 2016, Wirel. Pers. Commun..

[21]  Ajith Abraham,et al.  An improved dynamic deployment technique based-on genetic algorithm (IDDT-GA) for maximizing coverage in wireless sensor networks , 2020, Journal of Ambient Intelligence and Humanized Computing.

[22]  Laurence T. Yang,et al.  Confident information coverage hole detection in sensor networks for uranium tailing monitoring , 2017, J. Parallel Distributed Comput..

[23]  Euisin Lee,et al.  Continuous object tracking protocol with selective wakeup based on practical boundary prediction in wireless sensor networks , 2019, Comput. Networks.

[24]  Martin Rosalie,et al.  DACYCLEM: A decentralized algorithm for maximizing coverage and lifetime in a mobile wireless sensor network , 2019, Ad Hoc Networks.

[25]  Li Tao,et al.  Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization , 2018, J. Netw. Comput. Appl..

[26]  Ashok K. Goel,et al.  Energy Efficient Fuzzy Routing Protocol for Wireless Sensor Networks , 2020, Wirel. Pers. Commun..

[27]  Mohammadreza Eslaminejad,et al.  An energy-aware and load balanced distributed geographic routing algorithm for wireless sensor networks with dynamic hole , 2020, Wirel. Networks.

[28]  Parikshit N. Mahalle,et al.  Fuzzy priority based intelligent traffic congestion control and emergency vehicle management using congestion-aware routing algorithm , 2019, Journal of Ambient Intelligence and Humanized Computing.

[29]  Chakchai So-In,et al.  A hybrid localization model using node segmentation and improved particle swarm optimization with obstacle-awareness for wireless sensor networks , 2020, Expert Syst. Appl..

[30]  Dinesh Dash,et al.  HTMS: Fuzzy Based Hierarchical Trust Management Scheme in WSN , 2020, Wirel. Pers. Commun..

[31]  Y. Harold Robinson,et al.  MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks , 2019, Wirel. Pers. Commun..

[32]  P. Vijayakumar,et al.  An adaptive neuro-fuzzy logic based jamming detection system in WSN , 2018, Soft Comput..

[33]  Jing Zhang,et al.  A coverage hole detection and repair algorithm in wireless sensor networks , 2018, Cluster Computing.

[34]  Fadi Al-Turjman,et al.  A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks , 2020, Ad Hoc Networks.

[35]  Walid Osamy,et al.  Distributed coverage hole detection and recovery scheme for heterogeneous wireless sensor networks , 2018, Comput. Commun..

[36]  Bharat Bhushan,et al.  ISFC-BLS (Intelligent and Secured Fuzzy Clustering Algorithm Using Balanced Load Sub-Cluster Formation) in WSN Environment , 2020, Wirel. Pers. Commun..

[37]  Santiago Zazo,et al.  Learning attack mechanisms in Wireless Sensor Networks using Markov Decision Processes , 2019, Expert Syst. Appl..

[38]  Le Hoang Son,et al.  DRP: Dynamic Routing Protocol in Wireless Sensor Networks , 2020, Wirel. Pers. Commun..

[39]  Vandana Mohindru,et al.  Reauthentication scheme for mobile wireless sensor networks , 2019, Sustain. Comput. Informatics Syst..

[40]  Yusheng Ji,et al.  TELPAC: A time and energy efficient protocol for locating and patching coverage holes in WSNs , 2019, J. Netw. Comput. Appl..