{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T13:42:04Z","timestamp":1772458924767,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,5,5]],"date-time":"2018-05-05T00:00:00Z","timestamp":1525478400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s00607-018-0623-8","type":"journal-article","created":{"date-parts":[[2018,5,5]],"date-time":"2018-05-05T17:08:41Z","timestamp":1525540121000},"page":"363-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Area coverage of heterogeneous wireless sensor networks in support of Internet of Things demands"],"prefix":"10.1007","volume":"101","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5849-3106","authenticated-orcid":false,"given":"Saeed","family":"Sedighian Kashi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,5]]},"reference":[{"issue":"10","key":"623_CR1","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1007\/s00607-016-0510-0","volume":"98","author":"D Georgakopoulos","year":"2016","unstructured":"Georgakopoulos D, Jayaraman PP (2016) Internet of things: from internet scale sensing to smart services. Computing 98(10):1041\u20131058","journal-title":"Computing"},{"issue":"2","key":"623_CR2","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/s10796-014-9489-2","volume":"17","author":"A Whitmore","year":"2015","unstructured":"Whitmore A, Agarwal A, Da Xu L (2015) The Internet of Things\u2014a survey of topics and trends. Inf Syst Front 17(2):261\u2013274","journal-title":"Inf Syst Front"},{"key":"623_CR3","unstructured":"Mainetti L, Patrono L, Vilei A (2011) Evolution of wireless sensor networks towards the Internet of Things: a survey. In: IEEE international conference on software, telecommunications and computer networks (SoftCOM), pp 1\u20136"},{"issue":"C","key":"623_CR4","first-page":"46","volume":"40","author":"QT Minh","year":"2014","unstructured":"Minh QT, Shibata Y, Borcea C, Yamada S (2014) On-site configuration of disaster recovery access networks made easy. Ad Hoc Netw 40(C):46\u201360","journal-title":"Ad Hoc Netw"},{"key":"623_CR5","doi-asserted-by":"crossref","unstructured":"Di Felice M et al (2013) STEM-mesh: self-organizing mobile cognitive radio network for disaster recovery operations. In: International wireless communications and mobile computing conference (IWCMC), pp 602\u2013608","DOI":"10.1109\/IWCMC.2013.6583626"},{"issue":"PB","key":"623_CR6","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.adhoc.2014.08.009","volume":"25","author":"S Saha","year":"2015","unstructured":"Saha S, Nandi S, Paul PS, Shah VK, Roy A, Das SK (2015) Designing delay constrained hybrid ad hoc network infrastructure for post-disaster communication. Ad Hoc Netw 25(PB):406\u2013429","journal-title":"Ad Hoc Netw"},{"issue":"10","key":"623_CR7","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOM.2014.6917403","volume":"52","author":"Q Minh","year":"2014","unstructured":"Minh Q, Nguyen K, Borcea C, Yamada S (2014) On-the-fly establishment of multihop wireless access networks for disaster recovery. IEEE Commun Mag 52(10):60\u201366","journal-title":"IEEE Commun Mag"},{"issue":"15","key":"623_CR8","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Lera A, Morabito G (2010) Internet of Things: a survey. Comput Netw. 54(15):2787\u20132805","journal-title":"Comput Netw."},{"key":"623_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2014.09.008","volume":"54","author":"E Borgia","year":"2014","unstructured":"Borgia E (2014) The internet of things vision: key features, applications and open issues. Comput Commun 54:1\u201331","journal-title":"Comput Commun"},{"issue":"5","key":"623_CR10","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/TPDS.2011.237","volume":"23","author":"C Konstantopoulos","year":"2012","unstructured":"Konstantopoulos C, Pantziou G, Gavalas D, Mpitziopoulos A, Mamalis B (2012) A rendezvous-based approach enabling energy-efficient sensory data collection with mobile sinks. IEEE Trans Parallel Distrib Syst 23(5):809\u2013817","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"4","key":"623_CR11","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s11280-012-0188-y","volume":"16","author":"B Guo","year":"2013","unstructured":"Guo B, Zhang D, Yu Z, Liang Y, Wang Z, Zhou X (2013) From the internet of things to embedded intelligence. World Wide Web 16(4):399\u2013420","journal-title":"World Wide Web"},{"issue":"2","key":"623_CR12","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4236\/ait.2016.62002","volume":"6","author":"MS Mahmoud","year":"2016","unstructured":"Mahmoud MS, Mohamad AAH (2016) A study of efficient power consumption wireless communication techniques\/modules for Internet of Things (IoT) applications. Adv Internet Things 6(2):19\u201329","journal-title":"Adv Internet Things"},{"issue":"1","key":"623_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11276-007-0021-1","volume":"15","author":"C Zhang","year":"2007","unstructured":"Zhang C, Zhang Y, Fang Y (2007) Localized algorithms for coverage boundary detection in wireless sensor networks. Wirel Netw 15(1):3\u201320","journal-title":"Wirel Netw"},{"key":"623_CR14","unstructured":"Xingfa S, Jiming C, Youxian S (2006) Grid scan: a simple and effective approach for coverage issue in wireless sensor networks. In: IEEE international conference on communications, vol 8, pp 3480\u20133484"},{"key":"623_CR15","unstructured":"Sheu J-P, Chang G-Y, Chen Y-T (2008) A novel approach for k-coverage rate evaluation and re-deployment in wireless sensor networks. In: IEEE global telecommunications conference (GLOBECOM), pp 1\u20135"},{"key":"623_CR16","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.eij.2015.08.003","volume":"17","author":"V Sharma","year":"2016","unstructured":"Sharma V, Patel RB, Bhadauria HS, Prasad D (2016) Deployment schemes in wireless sensor network to achieve blanket coverage in large-scale open area: a review. Egypt Inform J 17:45\u201356","journal-title":"Egypt Inform J"},{"key":"623_CR17","doi-asserted-by":"crossref","unstructured":"Balister B, Zheng Z, Kumar S, Sinha P (2009) Trap coverage: allowing coverage holes of bounded diameter in wireless sensor networks. In: IEEE international conference on computer communications (INFOCOM), pp 136\u2013144","DOI":"10.1109\/INFCOM.2009.5061915"},{"issue":"5","key":"623_CR18","doi-asserted-by":"publisher","first-page":"3405","DOI":"10.3390\/s90503405","volume":"9","author":"S Pashazadeh","year":"2009","unstructured":"Pashazadeh S, Sharifi M (2009) Determining the best sensing coverage for 2-dimensional acoustic target tracking. Sensors 9(5):3405\u20133436","journal-title":"Sensors"},{"key":"623_CR19","unstructured":"Watfa MK, Commuri S (2009) Energy-efficient approaches to coverage holes detection in wireless sensor networks. In: IEEE international conference on computer aided control system design, pp 131\u2013136"},{"issue":"5","key":"623_CR20","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1016\/j.adhoc.2004.08.013","volume":"3","author":"H Frey","year":"2005","unstructured":"Frey H, G\u00f6rgen D (2005) Planar graph routing on geographical clusters. Ad Hoc Netw 3(5):560\u2013574","journal-title":"Ad Hoc Netw"},{"key":"623_CR21","doi-asserted-by":"crossref","unstructured":"Argany M, Mostafavi MA, Karimipour F (2010) Voronoi-based approaches for geosensor networks coverage determination and optimisation: a survey. In: International symposium on Voronoi diagrams in science and engineering (ISVD), pp 115\u2013123","DOI":"10.1109\/ISVD.2010.36"},{"key":"623_CR22","volume-title":"Wireless sensor and actuator networks: algorithms and protocols for scalable coordination and data communication","author":"A Nayak","year":"2009","unstructured":"Nayak A, Stojmenovi\u0107 I (2009) Wireless sensor and actuator networks: algorithms and protocols for scalable coordination and data communication. Wiley, New York"},{"key":"623_CR23","unstructured":"Liu B, Towsley D (2004) A study of the coverage of large-scale sensor networks. In: IEEE international conference on mobile adhoc and sensor systems, pp 475\u2013483"},{"issue":"11","key":"623_CR24","doi-asserted-by":"publisher","first-page":"2907","DOI":"10.3390\/S7112907","volume":"7","author":"J Chen","year":"2007","unstructured":"Chen J, Li S, Sun Y (2007) Novel deployment schemes for mobile sensor networks. Sensors 7(11):2907\u20132919","journal-title":"Sensors"},{"issue":"2","key":"623_CR25","first-page":"145","volume":"3","author":"NAA Aziz","year":"2009","unstructured":"Aziz NAA, Aziz KA, Ismail WZW (2009) Coverage strategies for wireless sensor networks. World Acad Sci Eng Technol 3(2):145\u2013150","journal-title":"World Acad Sci Eng Technol"},{"issue":"11","key":"623_CR26","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1007\/s00607-012-0192-1","volume":"94","author":"S Sedighian Kashi","year":"2012","unstructured":"Sedighian Kashi S, Sharifi M (2012) Coverage rate calculation in wireless sensor networks. Computing 94(11):833\u2013856","journal-title":"Computing"},{"key":"623_CR27","doi-asserted-by":"crossref","unstructured":"Lazos L, Poovendran R, Ritcey JA (2007) On the deployment of heterogeneous sensor networks for detection of mobile targets. In: International symposium on modeling and optimization in mobile, ad hoc, and wireless networks (WiOpt)","DOI":"10.1109\/WIOPT.2007.4480029"},{"key":"623_CR28","unstructured":"Killijian M, Cunningham R, Meier R, Mazare L, Cahill V (2001) Towards group communication for mobile participants. In: ACM workshop on principles of mobile computing (POMC)"},{"key":"623_CR29","doi-asserted-by":"crossref","unstructured":"Shen F, Te Sun M, Liu C, Salazar A (2009) Coverage-aware sleep scheduling for cluster-based sensor networks. In: IEEE wireless communications and networking conference (WCNC), pp 1\u20136","DOI":"10.1109\/WCNC.2009.4917649"},{"key":"623_CR30","unstructured":"Dhillon SS, Chakrabarty K (2003) Sensor placement for effective coverage and surveillance in distributed sensor networks. In: IEEE wireless communications and networking conference (WCNC), vol 3, pp 1609\u20131614"},{"issue":"12","key":"623_CR31","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.1109\/TC.2002.1146711","volume":"51","author":"K Chakrabarty","year":"2002","unstructured":"Chakrabarty K, Iyengar SS, Qi H, Cho E (2002) Grid coverage for surveillance and target location in distributed sensor networks. IEEE Trans Comput 51(12):1448\u20131453","journal-title":"IEEE Trans Comput"},{"key":"623_CR32","doi-asserted-by":"crossref","unstructured":"Zou Y, Chakrabarty K (2003) Sensor deployment and target localization based on virtual forces. In: IEEE international conference on computer communications (INFOCOM), vol 2, no C, pp 1293\u20131303","DOI":"10.1109\/INFCOM.2003.1208965"},{"key":"623_CR33","doi-asserted-by":"publisher","first-page":"750657","DOI":"10.1155\/2009\/750657","volume":"2009","author":"TP Lambrou","year":"2009","unstructured":"Lambrou TP, Panayiotou CG (2009) Collaborative area monitoring using wireless sensor networks with stationary and mobile nodes. EURASIP J Adv Signal Process 2009:750657","journal-title":"EURASIP J Adv Signal Process"},{"key":"623_CR34","unstructured":"Ismail WZW, Abd Manaf S (2010) Study on coverage in wireless sensor network using grid based strategy and particle swarm optimization. In: IEEE Asia Pacific conference on circuit and system, pp 1175\u20131178"},{"key":"623_CR35","doi-asserted-by":"crossref","unstructured":"Akshay N, Kumar MP, Harish B, Dhanorkar S (2010) An efficient approach for sensor deployments in wireless sensor network. In: International conference on emerging trends in robotics and communication technologies (INTERACT), pp 350\u2013355","DOI":"10.1109\/INTERACT.2010.5706178"},{"issue":"2","key":"623_CR36","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/SURV.2013.091213.00018","volume":"16","author":"DS Deif","year":"2014","unstructured":"Deif DS, Gadallah Y (2014) Classification of wireless sensor networks deployment techniques. IEEE Commun Surv Tutor 16(2):834\u2013855","journal-title":"IEEE Commun Surv Tutor"},{"issue":"4","key":"623_CR37","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2489253.2489257","volume":"9","author":"J Sheu","year":"2013","unstructured":"Sheu J, Chang G, Wu S, Chen Y (2013) Adaptive k-coverage contour evaluation and deployment in wireless sensor networks. ACM Trans Sens Netw 9(4):40","journal-title":"ACM Trans Sens Netw"},{"key":"623_CR38","doi-asserted-by":"crossref","unstructured":"Saha D, Das N, Pal S (2014) A digital-geometric approach for computing area coverage in wireless sensor networks. In: International conference on distributed computing and internet technology, pp 134\u2013145","DOI":"10.1007\/978-3-319-04483-5_15"},{"key":"623_CR39","doi-asserted-by":"crossref","unstructured":"Saha D, Das N, Bhattacharya B (2014) Fast estimation of coverage area in a pervasive computing environment. In: International conference on advanced computing, networking and informatics, vol 2, pp 19\u201327","DOI":"10.1007\/978-3-319-07350-7_3"},{"key":"623_CR40","doi-asserted-by":"crossref","unstructured":"Ghosh A (2004) Estimating coverage holes and enhancing coverage in mixed sensor networks. In: IEEE international conference on local computer networks, pp 68\u201376","DOI":"10.1109\/LCN.2004.53"},{"issue":"5","key":"623_CR41","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TMC.2007.1022","volume":"6","author":"G Wang","year":"2007","unstructured":"Wang G, Cao G, Berman P, La Porta TF (2007) Bidding protocols for deploying mobile sensors. IEEE Trans Mob Comput 6(5):515\u2013528","journal-title":"IEEE Trans Mob Comput"},{"key":"623_CR42","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84996-059-5","volume-title":"Coverage control in sensor networks","author":"B Wang","year":"2010","unstructured":"Wang B (2010) Coverage control in sensor networks. Springer, Berlin"},{"key":"623_CR43","doi-asserted-by":"crossref","unstructured":"Alsalih W, Islam K, N\u00fa\u00f1ez-Rodr\u00edguez Y, Xiao H (2008) Distributed Voronoi diagram computation in wireless sensor networks. In: Annual symposium on parallelism in algorithms and architectures (SPAA), no 1, p 364","DOI":"10.1145\/1378533.1378597"},{"key":"623_CR44","doi-asserted-by":"crossref","unstructured":"Boukerche A, Xin F (2007) A Voronoi approach for coverage protocols in wireless sensor networks. In: IEEE global telecommunications conference (GLOBECOM), pp 5190\u20135194","DOI":"10.1109\/GLOCOM.2007.984"},{"issue":"2","key":"623_CR45","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1049\/iet-com.2009.0288","volume":"4","author":"J-S Li","year":"2010","unstructured":"Li J-S, Kao H-C (2010) Distributed k-coverage self-location estimation scheme based on Voronoi diagram. IET Commun 4(2):167","journal-title":"IET Commun"},{"issue":"1","key":"623_CR46","first-page":"77","volume":"3","author":"Y Cai","year":"2007","unstructured":"Cai Y, Li M, Shu W, Wu M (2007) ACOS: an area-based collaborative sleeping protocol for wireless sensor networks. Ad Hoc Sens Wirel Netw 3(1):77\u201397","journal-title":"Ad Hoc Sens Wirel Netw"},{"issue":"4","key":"623_CR47","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s11036-005-1564-y","volume":"10","author":"C Huang","year":"2005","unstructured":"Huang C, Tseng Y (2005) The coverage problem in a wireless sensor network. Mob Netw Appl 10(4):519\u2013528","journal-title":"Mob Netw Appl"},{"key":"623_CR48","first-page":"89","volume":"1","author":"H Zhang","year":"2005","unstructured":"Zhang H, Hou JC (2005) Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc Sens Wirel Netw 1:89\u2013124","journal-title":"Ad Hoc Sens Wirel Netw"},{"key":"623_CR49","unstructured":"Khan I, Mokhtar H, Merabti M (2008) A survey of boundary detection algorithms for sensor networks. In: Annual postgraduate symposium on the convergence of telecommunications, networking and broadcasting"},{"issue":"4","key":"623_CR50","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393\u2013422","journal-title":"Comput Netw"},{"key":"623_CR51","doi-asserted-by":"crossref","unstructured":"Karp B, Kung H (2000) GPSR: Greedy perimeter stateless routing for wireless networks. In: International conference on mobile computing and networking, pp 243\u2013254","DOI":"10.1145\/345910.345953"},{"issue":"4","key":"623_CR52","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1080\/07468342.1986.11972974","volume":"17","author":"B Braden","year":"1986","unstructured":"Braden B (1986) The surveyor\u2019s area formula. Coll Math J 17(4):326","journal-title":"Coll Math J"},{"key":"623_CR53","first-page":"19924","volume":"1","author":"S Mohamed","year":"2015","unstructured":"Mohamed S, Hamza H, Saroit I (2015) Harmony search-based k-coverage enhancement in wireless sensor networks. Harmony 1:19924","journal-title":"Harmony"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0623-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-018-0623-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0623-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T10:23:35Z","timestamp":1557138215000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-018-0623-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,5]]},"references-count":53,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["623"],"URL":"https:\/\/doi.org\/10.1007\/s00607-018-0623-8","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,5]]},"assertion":[{"value":"11 January 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}