A Survey on Holes Problem in Wireless Underground Sensor Networks

The paper aims to put in the forefront a survey on the problem of the existing holes in the Wireless Underground Sensor Networks (WUSNs). Anomalies in wireless sensor networks can weaken the network by impeding its functionalities. These existing anomalies commonly known as holes may cause irreversible devastating problems and may prove fatal to humans. There can be different holes in the network, such as coverage hole, routing hole, jamming hole, sink/ worm hole, etc. This paper intends to discuss various holes problems in WUSNs, reasons behind their occurrence, and different techniques to mitigate the issues. An efficient hole detection technique shall increase network lifetime, use lesser resources and give accurate results with zero false positives. To put a light on the present scenario, methods/ techniques used to cope with different types of holes have been discussed in detail presenting their analysis, constraints, and advantages. Besides, it would also touch upon the comparative analysis in terms of soundness and limitations of these techniques. The study is concluded with future research directions.

[1]  Transmission of Electromagnetic Waves , 2021, Introduction to Electromagnetic Waves with Maxwell's Equations.

[2]  Mohamed Elhoseny,et al.  An Adaptive Protection of Flooding Attacks Model for Complex Network Environments , 2021, Secur. Commun. Networks.

[3]  Stefan Friedl Algebraic topology , 2020, Graduate Studies in Mathematics.

[4]  R. Eswari,et al.  QoS optimization through PBMR algorithm in multipath wireless multimedia sensor networks , 2020, Peer-to-Peer Networking and Applications.

[5]  Manu Vardhan,et al.  Defense against distributed DoS attack detection by using intelligent evolutionary algorithm , 2020, International Journal of Computers and Applications.

[6]  Manu Vardhan,et al.  A new hybrid wrapper TLBO and SA with SVM approach for gene expression data , 2019, Inf. Sci..

[7]  N. Nithiyanandam,et al.  Artificial bee colony based sinkhole detection in wireless sensor networks , 2019, Journal of Ambient Intelligence and Humanized Computing.

[8]  Saad A. Al-Ahmadi,et al.  Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks , 2019, IEEE Access.

[9]  A. Shanmugam,et al.  Jensen–Shannon Divergence Based Independent Component Analysis to Detect and Prevent Black Hole Attacks in Healthcare WSN , 2019, Wireless Personal Communications.

[10]  Ahmed A. Ewees,et al.  Improved grasshopper optimization algorithm using opposition-based learning , 2018, Expert Syst. Appl..

[11]  Ahmed Fathy,et al.  Recent meta-heuristic grasshopper optimization algorithm for optimal reconfiguration of partially shaded PV array , 2018, Solar Energy.

[12]  M. Aramudhan,et al.  Priority based prediction mechanism for ranking providers in federated cloud architecture , 2018, Cluster Computing.

[13]  Rishi Pal Singh,et al.  Coverage Hole Detection and Healing to Enhance Coverage and Connectivity in 3D Spaces for WSNs: A Mathematical Analysis , 2017, Wireless Personal Communications.

[14]  Attahiru Sule Alfa,et al.  A Survey on an Energy-Efficient and Energy-Balanced Routing Protocol for Wireless Sensor Networks , 2017, Sensors.

[15]  Nishant Kumar,et al.  Coverage problem in wireless sensor networks: A survey , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).

[16]  Fadi M. Al-Turjman,et al.  Information-centric sensor networks for cognitive IoT: an overview , 2016, Annals of Telecommunications.

[17]  Wei Tsang Ooi,et al.  Multimedia prefetching with optimal Markovian policies , 2016, J. Netw. Comput. Appl..

[18]  Wenyi Liu,et al.  Detecting Boundary Nodes and Coverage Holes in Wireless Sensor Networks , 2016, Mob. Inf. Syst..

[19]  Andrea Gasparri,et al.  Distributed Hole Detection Algorithms for Wireless Sensor Networks , 2014, 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems.

[20]  Rishi Pal Singh,et al.  Survey on Coverage Problems in Wireless Sensor Networks , 2014, Wireless Personal Communications.

[21]  Philippe Martins,et al.  Construction of the Generalized Czech Complex , 2014, 2015 IEEE 81st Vehicular Technology Conference (VTC Spring).

[22]  Lovepreet Kaur,et al.  Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey , 2014 .

[23]  Nilufa Yeasmin,et al.  k-coverage Problems and Solutions in Wireless Sensor Networks: A Survey , 2014 .

[24]  Philippe Martins,et al.  Homology-Based Distributed Coverage Hole Detection in Wireless Sensor Networks , 2013, IEEE/ACM Transactions on Networking.

[25]  Avishek Adhikari,et al.  An efficient IND-CCA2 secure Paillier-based cryptosystem , 2012, Inf. Process. Lett..

[26]  Yigal Bejerano,et al.  Coverage Verification without Location Information , 2012, IEEE Transactions on Mobile Computing.

[27]  Guangjie Han,et al.  A survey on coverage and connectivity issues in wireless sensor networks , 2012, J. Netw. Comput. Appl..

[28]  Walid Osamy,et al.  Finding Perimeter of Query Regions in Heterogenous Wireless Sensor Networks , 2012, Comput. Informatics.

[29]  Philippe Martins,et al.  Connectivity-Based Distributed Coverage Hole Detection in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[30]  SungHwi Kim,et al.  Disjoint Multipath Scheme with Hole Detouring Strategy in Wireless Sensor Networks , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).

[31]  S. Sitharama Iyengar,et al.  Coverage Assessment and Target Tracking in 3D Domains , 2011, Sensors.

[32]  Athanasios V. Vasilakos,et al.  Compressed data aggregation for energy efficient wireless sensor networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[33]  Sang-Ha Kim,et al.  An explicit disjoint multipath algorithm for Cost efficiency in wireless sensor networks , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[34]  Jacques M. Bahi,et al.  Randomness Quality of CI Chaotic Generators: Applications to Internet Security , 2010, 2010 2nd International Conference on Evolving Internet.

[35]  Naixue Xiong,et al.  TPGF: geographic routing in wireless multimedia sensor networks , 2010, Telecommun. Syst..

[36]  Dharma P. Agrawal,et al.  Perimeter discovery in wireless sensor networks , 2009, J. Parallel Distributed Comput..

[37]  Di Ma,et al.  A survey of movement strategies for improving network coverage in wireless sensor networks , 2009, Comput. Commun..

[38]  Rastko R. Selmic,et al.  Decentralized detection and patching of coverage holes in wireless sensor networks , 2009, Defense + Commercial Sensing.

[39]  Ammar W. Mohemmed,et al.  A wireless sensor network coverage optimization algorithm based on particle swarm optimization and Voronoi diagram , 2009, 2009 International Conference on Networking, Sensing and Control.

[40]  Yunhao Liu,et al.  Underground coal mine monitoring with wireless sensor networks , 2009, TOSN.

[41]  Elhadi M. Shakshuki,et al.  Software agent-based directed diffusion in wireless sensor network , 2008, Telecommun. Syst..

[42]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[43]  Antoine B. Bagula,et al.  Energy Constrained Multipath Routing in Wireless Sensor Networks , 2008, UIC.

[44]  Sajal K. Das,et al.  Coverage and connectivity issues in wireless sensor networks: A survey , 2008, Pervasive Mob. Comput..

[45]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[46]  Azzedine Boukerche,et al.  A Voronoi Approach for Coverage Protocols in Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[47]  William A. Sethares,et al.  Distance Estimation Using Bidirectional Communications Without Synchronous Clocking , 2007, IEEE Transactions on Signal Processing.

[48]  Yunhao Liu,et al.  Underground Structure Monitoring with Wireless Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[49]  Daniel Minoli,et al.  Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .

[50]  Yu-Chee Tseng,et al.  Coverage and Connectivity of Wireless Sensor Networks , 2007 .

[51]  Yuguang Fang,et al.  Localized algorithms for coverage boundary detection in wireless sensor networks , 2007, Wirel. Networks.

[52]  Vin de Silva,et al.  Coordinate-free Coverage in Sensor Networks with Controlled Boundaries via Homology , 2006, Int. J. Robotics Res..

[53]  Ian F. Akyildiz,et al.  Wireless underground sensor networks: Research challenges , 2006, Ad Hoc Networks.

[54]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[55]  Kaveh Pahlavan,et al.  Modeling of the TOA-based distance measurement error using UWB indoor radio measurements , 2006, IEEE Communications Letters.

[56]  Leonidas J. Guibas,et al.  Locating and Bypassing Holes in Sensor Networks , 2006, Mob. Networks Appl..

[57]  Jan M. H. Hendrickx,et al.  Methods for prediction of soil dielectric properties: a review , 2005, SPIE Defense + Commercial Sensing.

[58]  Abubakr Muhammad,et al.  Blind Swarms for Coverage in 2-D , 2005, Robotics: Science and Systems.

[59]  Sanjay Jha,et al.  The holes problem in wireless sensor networks: a survey , 2005, MOCO.

[60]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[61]  A. Ghosh,et al.  Estimating coverage holes and enhancing coverage in mixed sensor networks , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[62]  Peter Corke,et al.  Autonomous deployment and repair of a sensor network using an unmanned aerial vehicle , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.

[63]  Afra Zomorodian,et al.  Computing Persistent Homology , 2004, SCG '04.

[64]  J. Vasquez,et al.  Underground wireless communications using high-temperature superconducting receivers , 2004, IEEE Transactions on Applied Superconductivity.

[65]  Thomas F. La Porta,et al.  Movement-assisted sensor deployment , 2004, IEEE INFOCOM 2004.

[66]  Leonidas J. Guibas,et al.  Locating and bypassing routing holes in sensor networks , 2004, IEEE INFOCOM 2004.

[67]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[68]  Guoliang Xing,et al.  Integrated coverage and connectivity configuration in wireless sensor networks , 2003, SenSys '03.

[69]  Yu-Chee Tseng,et al.  The Coverage Problem in a Wireless Sensor Network , 2003, WSNA '03.

[70]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[71]  Di Tian,et al.  Energy efficient routing with guaranteed delivery in wireless sensor networks , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[72]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[73]  Deborah Estrin,et al.  Rumor routing algorthim for sensor networks , 2002, WSNA '02.

[74]  B. Karp GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[75]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[76]  Roderick Urquhart,et al.  Some properties of the planar Euclidean relative neighbourhood graph , 1983, Pattern Recognit. Lett..

[77]  M. Mohammed,et al.  W-GeoR: Weighted Geographical Routing for VANET’s Health Monitoring Applications in Urban Traffic Networks , 2022, IEEE Access.

[78]  M. Mohammed,et al.  3D Location Oriented Routing in Flying Ad-Hoc Networks for Information Dissemination , 2021, IEEE Access.

[79]  Wireless Sensor Networks A Networking Perspective , 2021 .

[80]  Mazin Abed Mohammed,et al.  Review of Data Fusion Methods for Real-Time and Multi-Sensor Traffic Flow Analysis , 2021, IEEE Access.

[81]  Ahmed Hammoodi,et al.  Novel Universal Windowing Multicarrier Waveform for 5G Systems , 2021, Computers, Materials & Continua.

[82]  Saad A. Al-Ahmadi,et al.  Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking , 2020, IEEE Access.

[83]  Rachana A. Satao,et al.  A Survey on Various Multipath Routing Protocols in Wireless Sensor Networks , 2016 .

[84]  Rastko R. Selmic,et al.  Coverage and Connectivity , 2016 .

[85]  Hossam S. Hassanein,et al.  Towards prolonged lifetime for deployed WSNs in outdoor environment monitoring , 2015, Ad Hoc Networks.

[86]  Ming Liu,et al.  A Survey of Coverage Problems in Wireless Sensor Networks , 2014 .

[87]  Nabil Sahli,et al.  Survey on Sensor Holes: A Cause-Effect-Solution Perspective , 2013, ANT/SEIT.

[88]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[89]  C. Boano,et al.  Radio Link Quality Estimation in Wireless Sensor Networks: a Survey , 2011 .

[90]  Agnelo R. Silva,et al.  Communication Through Soil in Wireless Underground Sensor Networks – Theory and Practice , 2010 .

[91]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[92]  Mo Li,et al.  A Survey on Topology issues in Wireless Sensor Network , 2006, ICWN.

[93]  Jennifer C. Hou,et al.  Maintaining Sensing Coverage and Connectivity in Large Sensor Networks , 2005, Ad Hoc Sens. Wirel. Networks.

[94]  Gordon Wyeth,et al.  Sensing and Control for a Small-Size Helicopter , 2002, ISER.

[95]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[96]  Godfried T. Toussaint,et al.  Relative neighborhood graphs and their relatives , 1992, Proc. IEEE.

[97]  I. Akyildiz WIRELESS MULTIMEDIA SENSOR NETWORKS : A SURVEY The uthors discusse , 2022 .