{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:04:13Z","timestamp":1771373053079,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:00:00Z","timestamp":1614902400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T00:00:00Z","timestamp":1614902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100007224","name":"NAFOSTED","doi-asserted-by":"crossref","award":["102.02-2017.316"],"award-info":[{"award-number":["102.02-2017.316"]}],"id":[{"id":"10.13039\/100007224","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100009567","name":"Budapest University of Technology and Economics","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100009567","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,5]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>A quest for geographic routing schemes of wireless sensor networks when sensor nodes are deployed in areas with obstacles has resulted in numerous ingenious proposals and techniques. However, there is a lack of solutions for complicated cases wherein the source or the sink nodes are located close to a specific hole, especially in cavern-like regions of large complex-shaped holes. In this paper, we propose a geographic routing scheme to deal with the existence of complicated-shape holes in an effective manner. Our proposed routing scheme achieves routes around holes with the (1+<jats:inline-formula><jats:alternatives><jats:tex-math>$$\\epsilon$$<\/jats:tex-math><mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>\u03f5<\/mml:mi>\n                <\/mml:math><\/jats:alternatives><\/jats:inline-formula>)-stretch. Experimental results show that our routing scheme yields the highest load balancing and the most extended network lifetime compared to other well-known routing algorithms as well.<\/jats:p>","DOI":"10.1007\/s11276-021-02569-3","type":"journal-article","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T16:02:39Z","timestamp":1614960159000},"page":"3073-3089","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Energy-efficient routing in the proximity of a complicated hole in wireless sensor networks"],"prefix":"10.1007","volume":"27","author":[{"given":"Khanh-Van","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Chi-Hieu","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Phi","family":"Le Nguyen","sequence":"additional","affiliation":[]},{"given":"Tien","family":"Van Do","sequence":"additional","affiliation":[]},{"given":"Imrich","family":"Chlamtac","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"issue":"2","key":"2569_CR1","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/COMST.2017.2650979","volume":"19","author":"H Yetgin","year":"2017","unstructured":"Yetgin, H., Cheung, K. T. K., El-Hajjar, M., & Hanzo, L. H. (2017). A survey of network lifetime maximization techniques in wireless sensor networks. IEEE Communications Surveys Tutorials, 19(2), 828\u2013854.","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"2569_CR2","doi-asserted-by":"crossref","unstructured":"Karp, B., & Kung, H.\u00a0T. (2000). GPSR: greedy perimeter stateless routing for wireless networks. In Proceedings of MOBICOM\u201900 (pp. 243\u2013254).","DOI":"10.1145\/345910.345953"},{"key":"2569_CR3","doi-asserted-by":"crossref","unstructured":"Kuhn, F., Wattenhofer, R., & Zollinger, A. (2002). Asymptotically optimal geometric mobile ad-hoc routing. In DIALM-POMC \u201902 proceedings of the 2002 joint workshop on foundations of mobile computing.","DOI":"10.1145\/570810.570814"},{"key":"2569_CR4","doi-asserted-by":"crossref","unstructured":"Kuhn, F., Wattenhofer, R., & Zollinger, A. (2003). Worst-case optimal and average-case efficient geometric ad-hoc routing. In Proceedings of ACM MobiHoc.","DOI":"10.1145\/778415.778447"},{"key":"2569_CR5","doi-asserted-by":"crossref","unstructured":"Tan, G., Bertier, M., & Kermarrec, A.-M. (2009). Visibility-graph-based shortest-path geographic routing in sensor networks. Proceedings of IEEE INFOCOM (pp. 1719\u20131727).","DOI":"10.1109\/INFCOM.2009.5062091"},{"key":"2569_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2629659","volume":"18","author":"M Won","year":"2014","unstructured":"Won, M., & Stoleru, R. (2014). A low-stretch-guaranteed and lightweight geographic routing protocol for large-scale wireless sensor networks. ACM Transactions on Sensor Networks, 18, 1\u201322.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"2569_CR7","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.comnet.2017.10.001","volume":"129","author":"L Nguyen","year":"2017","unstructured":"Nguyen, L., Phi, J., Yusheng, L., Zhi, H., Vu, H., & Nguyen, K. V. (2017). Distributed hole-bypassing protocol in WSNS with constant stretch and load balancing. Computer Networks, 129, 232\u2013250.","journal-title":"Computer Networks"},{"key":"2569_CR8","doi-asserted-by":"crossref","unstructured":"Vu, H., Nguyen, T.\u00a0D., Nguyen, C.\u00a0Q., & Nguyen, V.\u00a0K. (2016). An efficient geographic algorithm for routing in the proximity of a large hole in wireless sensor networks. In Proceedings of the seventh symposium on information and communication technology (SoICT \u201916, pp. 286\u2013293). ACM.","DOI":"10.1145\/3011077.3011101"},{"key":"2569_CR9","doi-asserted-by":"crossref","unstructured":"Le Nguyen, P., Ji, Y., Le, K., & Nguyen, T. H. (2018). Load balanced and constant stretch routing in the vicinity of holes in WSNS. In 2018 15th IEEE annual consumer communications networking conference (CCNC) (pp. 1\u20136).","DOI":"10.1109\/CCNC.2018.8319190"},{"key":"2569_CR10","unstructured":"Boy lake-cass county lake located near longville mn=https:\/\/www.longville.com\/lake-maps\/boy-lake\/"},{"issue":"2","key":"2569_CR11","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MRA.2008.921540","volume":"15","author":"P Bhattacharya","year":"2008","unstructured":"Bhattacharya, P., & Gavrilova, M. L. (2008). Roadmap-based path planning-using the voronoi diagram for a clearance-based shortest path. IEEE Robotics Automation Magazine, 15(2), 58\u201366.","journal-title":"IEEE Robotics Automation Magazine"},{"key":"2569_CR12","unstructured":"Anish, P., Shalini, E. P., & Parhi, D.\u00a0R. (2017). Mobile robot navigation and obstacle avoidance techniques: A review. In ICRA 2017 ."},{"key":"2569_CR13","doi-asserted-by":"crossref","unstructured":"Hsiao, P.-H., Hwang, A., Kung, H.\u00a0T., & Vlah, D. (2001). Load-balancing routing for wireless access networks. In Proceedings IEEE INFOCOM 2001. Conference on computer communications. Twentieth annual joint conference of the IEEE computer and communications society (Cat. No.01CH37213) (Vol.\u00a02, pp. 986\u2013995).","DOI":"10.1109\/INFCOM.2001.916291"},{"key":"2569_CR14","doi-asserted-by":"crossref","unstructured":"Subramatian, S., Shakkottai, S., & Gupta, P. (2007). On optimal geographical routing in wireless networks with holes and non-uniform traffic. In Proceedings of IEEE INFOCOM.","DOI":"10.1109\/INFCOM.2007.123"},{"key":"2569_CR15","doi-asserted-by":"crossref","unstructured":"Gupta, N.\u00a0K., Shankar Yadav, R., & Nagaria, R.\u00a0K. (2018). Void handling in 3d wireless sensor networks. In 2018 15th IEEE India Council international conference (INDICON) (pp. 1\u20136).","DOI":"10.1109\/INDICON45594.2018.8987090"},{"key":"2569_CR16","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1007\/s11277-018-6079-5","volume":"104","author":"S Jayashri","year":"2019","unstructured":"Jayashri, S., & Lakshmi Joshitha, K. (2019). A novel redundant hole identification and healing algorithm for a homogeneous distributed wireless sensor network. Wireless Personal Communications, 104, 1261\u20131282.","journal-title":"Wireless Personal Communications"},{"key":"2569_CR17","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.comnet.2016.04.005","volume":"103","author":"W Li","year":"2016","unstructured":"Li, W., & Yuwei, W. (2016). Tree-based coverage hole detection and healing method in wireless sensor networks. Computer Networks, 103, 33\u201343.","journal-title":"Computer Networks"},{"key":"2569_CR18","unstructured":"Koriem, S. M., & Bayoumi, M. A. (2018). Detecting and measuring holes in wireless sensor network. Journal of King Saud University-Computer and Information Sciences."},{"key":"2569_CR19","doi-asserted-by":"crossref","unstructured":"Yu, F., et\u00a0al. (2008). Efficient hole detour scheme for geographic routing in wireless sensor networks. In Proceedings of the 67th IEEE vehicular technology conference, VTC\u201908 (pp. 153\u2013157).","DOI":"10.1109\/VETECS.2008.44"},{"key":"2569_CR20","doi-asserted-by":"crossref","unstructured":"Choi, M., & Choo, H. (2011). Bypassing hole scheme using observer packets for geographic routing in WSNs. In Proceedings of international conference on information networking, ICOIN\u201911 (pp. 435\u2013440).","DOI":"10.1109\/ICOIN.2011.5723124"},{"key":"2569_CR21","doi-asserted-by":"crossref","unstructured":"Tian, Y., et\u00a0al. (2008). Energy-efficient data dissemination protocol for detouring routing holes in wireless sensor networks. In Proceedings of IEEE international conference on communications, ICC\u201908 (pp. 2322\u20132326).","DOI":"10.1109\/ICC.2008.442"},{"key":"2569_CR22","doi-asserted-by":"crossref","unstructured":"Trajcevski, G., Zhou, F., Tamassia, R., Avci, B., Scheuermann, P., & Khokhar, A.\u00a0A. (2011). Bypassing holes in sensor networks: Load-balance versus latency. In GLOBECOM (pp. 1\u20135).","DOI":"10.1109\/GLOCOM.2011.6134431"},{"issue":"7","key":"2569_CR23","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1109\/MCOM.2017.1600348","volume":"55","author":"H Huang","year":"2017","unstructured":"Huang, H., Yin, H., Min, G., Zhang, X., Zhu, W., & Wu, Y. (2017). Coordinate-assisted routing approach to bypass routing holes in wireless sensor networks. IEEE Communications Magazine, 55(7), 180\u2013185.","journal-title":"IEEE Communications Magazine"},{"key":"2569_CR24","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.jss.2016.10.004","volume":"123","author":"K-V Nguyen","year":"2017","unstructured":"Nguyen, K.-V., Nguyen, L., Phi, Q. H., & Vu, Q. H., & Van Do, T. (2017). An energy efficient and load balanced distributed routing scheme for wireless sensor networks with holes. Journal of Systems and Software, 123, 92\u2013105.","journal-title":"Journal of Systems and Software"},{"key":"2569_CR25","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.adhoc.2017.03.002","volume":"61","author":"F Zhou","year":"2017","unstructured":"Zhou, F., Trajcevski, G., Tamassia, R., Avci, B., Khokhar, A., & Scheuermann, P. (2017). Bypassing holes in sensor networks: Load-balance versus latency. Ad Hoc Networks, 61, 16\u201332.","journal-title":"Ad Hoc Networks"},{"key":"2569_CR26","unstructured":"Yu, Y., Govindan, R., & Estrin, D. (2001) Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks. Technical report."},{"issue":"3","key":"2569_CR27","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1109\/TPDS.2013.60","volume":"25","author":"C Petrioli","year":"2014","unstructured":"Petrioli, C., Nati, M., Casari, P., Zorzi, M., & Basagni, S. (2014). Alba-r: Load-balancing geographic routing around connectivity holes in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 529\u2013539.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"2569_CR28","doi-asserted-by":"crossref","unstructured":"Le, K., Nguyen, T. H., Nguyen, K., & Nguyen, P. L. (2019). Exploiting q-learning in extending the network lifetime of wireless sensor networks with holes. In 2019 IEEE 25th international conference on parallel and distributed systems (ICPADS) (pp. 602\u2013609).","DOI":"10.1109\/ICPADS47876.2019.00091"},{"key":"2569_CR29","doi-asserted-by":"publisher","first-page":"105706","DOI":"10.1016\/j.asoc.2019.105706","volume":"84","author":"A Lipare","year":"2019","unstructured":"Lipare, A., Edla, D. R., & Kuppili, V. (2019). Energy efficient load balancing approach for avoiding energy hole problem in WSN using grey wolf optimizer with novel fitness function. Applied Soft Computing, 84, 105706.","journal-title":"Applied Soft Computing"},{"issue":"6","key":"2569_CR30","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/TMC.2017.2771424","volume":"17","author":"H Huang","year":"2018","unstructured":"Huang, H., Yin, H., Min, G., Zhang, J., Wu, Y., & Zhang, X. (2018). Energy-aware dual-path geographic routing to bypass routing holes in wireless sensor networks. IEEE Transactions on Mobile Computing, 17(6), 1339\u20131352.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2569_CR31","doi-asserted-by":"publisher","first-page":"140703","DOI":"10.1109\/ACCESS.2019.2939155","volume":"7","author":"ZA Khan","year":"2019","unstructured":"Khan, Z. A., Awais, M., Alghamdi, T. A., Khalid, A., Fatima, A., Akbar, M., & Javaid, N. (2019). Region aware proactive routing approaches exploiting energy efficient paths for void hole avoidance in underwater WSNS. IEEE Access, 7, 140703\u2013140722.","journal-title":"IEEE Access"},{"key":"2569_CR32","doi-asserted-by":"publisher","first-page":"96592","DOI":"10.1109\/ACCESS.2020.2996367","volume":"8","author":"M Awais","year":"2020","unstructured":"Awais, M., Ali, I., Alghamdi, T. A., Ramzan, M., Tahir, M., Akbar, M., & Javaid, N. (2020). Towards void hole alleviation: Enhanced geographic and opportunistic routing protocols in harsh underwater WSNS. IEEE Access, 8, 96592\u201396605.","journal-title":"IEEE Access"},{"key":"2569_CR33","doi-asserted-by":"crossref","unstructured":"Javaid, N. (2019). NADEEM: Neighbor node approaching distinct energy-efficient mates for reliable data delivery in underwater WSNS. Transactions on Emerging Telecommunications Technologies, e3805.","DOI":"10.1002\/ett.3805"},{"issue":"7","key":"2569_CR34","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1007\/s00607-018-0690-x","volume":"101","author":"ZA Khan","year":"2019","unstructured":"Khan, Z. A., Latif, G., Sher, A., Usman, I., Ashraf, M., Ilahi, M., & Javaid, N. (2019). Efficient routing for corona based underwater wireless sensor networks. Computing, 101(7), 831\u2013856.","journal-title":"Computing"},{"issue":"2","key":"2569_CR35","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1109\/JSEN.2019.2945595","volume":"20","author":"C Sha","year":"2020","unstructured":"Sha, C., Ren, C., Malekian, R., Wu, M., Huang, H., & Ye, N. (2020). A type of virtual force-based energy-hole mitigation strategy for sensor networks. IEEE Sensors Journal, 20(2), 1105\u20131119.","journal-title":"IEEE Sensors Journal"},{"issue":"1","key":"2569_CR36","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s11276-019-02157-6","volume":"26","author":"P Hadikhani","year":"2020","unstructured":"Hadikhani, P., Eslaminejad, M., Yari, M., & Mahani, E. A. (2020). An energy-aware and load balanced distributed geographic routing algorithm for wireless sensor networks with dynamic hole. Wireless Networks, 26(1), 507\u2013519.","journal-title":"Wireless Networks"},{"key":"2569_CR37","doi-asserted-by":"crossref","unstructured":"Fang, Q., Gao, J., & Guibas, L.\u00a0J. (2004). Locating and bypassing routing holes in sensor networks. In IEEE INFOCOM 2004 (Vol. 4, pp. 2458\u20132468).","DOI":"10.1109\/INFCOM.2004.1354667"},{"issue":"7","key":"2569_CR38","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1109\/TMC.2008.162","volume":"8","author":"WJ Liu","year":"2009","unstructured":"Liu, W. J., & Feng, K. T. (2009). Greedy routing with anti-void traversal for wireless sensor networks. IEEE Transactions on Mobile Computing, 8(7), 910\u2013922.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2569_CR39","doi-asserted-by":"publisher","first-page":"2549","DOI":"10.1007\/s11276-019-01983-y","volume":"26","author":"RK Gupta","year":"2020","unstructured":"Gupta, R. K., Kumar, N. N., & Yadav, R. S. (2020). 3D geographical routing protocols in wireless ad hoc and sensor networks: An overview. Wireless Networks, 26, 2549\u20132566.","journal-title":"Wireless Networks"},{"key":"2569_CR40","doi-asserted-by":"crossref","unstructured":"Thai, N.\u00a0Q.\u00a0D., & Nguyen, K. (2018). Stable low-stretch routing scheme for wireless sensor networks with a large hole of complicated shape. In 2018 5th NAFOSTED conference on information and computer science (NICS) (pp. 17\u201323).","DOI":"10.1109\/NICS.2018.8606882"},{"issue":"5","key":"2569_CR41","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/98.878533","volume":"7","author":"N Bulusu","year":"2000","unstructured":"Bulusu, N., Heidemann, J., & Estrin, D. (2000). Gps-less low-cost outdoor localization for very small devices. IEEE Personal Communications, 7(5), 28\u201334.","journal-title":"IEEE Personal Communications"},{"issue":"2","key":"2569_CR42","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1016\/0734-189X(83)90065-8","volume":"22","author":"DT Lee","year":"1983","unstructured":"Lee, D. T. (1983). Visibility of a simple polygon. Computer Vision, Graphics, and Image Processing, 22(2), 207\u2013221.","journal-title":"Computer Vision, Graphics, and Image Processing"},{"key":"2569_CR43","unstructured":"Castalia, simulator for wireless sensor networks, body area networks and generally networks of low-power embedded devices. https:\/\/github.com\/boulis\/Castalia\/"}],"updated-by":[{"DOI":"10.1007\/s11276-021-02607-0","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T00:00:00Z","timestamp":1618531200000}}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02569-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-021-02569-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02569-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T17:47:27Z","timestamp":1627667247000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-021-02569-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,5]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["2569"],"URL":"https:\/\/doi.org\/10.1007\/s11276-021-02569-3","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s11276-021-02607-0","asserted-by":"object"}]},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,5]]},"assertion":[{"value":"8 February 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2021","order":3,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":4,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":5,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11276-021-02607-0","URL":"https:\/\/doi.org\/10.1007\/s11276-021-02607-0","order":6,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}}]}}