{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T23:19:31Z","timestamp":1775258371760,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11277-018-6079-5","type":"journal-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T06:10:19Z","timestamp":1540534219000},"page":"1261-1282","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Novel Redundant Hole Identification and Healing Algorithm for a Homogeneous Distributed Wireless Sensor Network"],"prefix":"10.1007","volume":"104","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9021-4608","authenticated-orcid":false,"given":"K. Lakshmi","family":"Joshitha","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Jayashri","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"issue":"8","key":"6079_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102\u2013114.","journal-title":"IEEE Communications Magazine"},{"key":"6079_CR2","unstructured":"Wang, G., Cao, G., La Porta, T., & Zhang, W. (2005). Sensor relocation in mobile sensor networks. In INFOCOM 2005. 24th annual joint conference of the IEEE computer and communications societies. Proceedings IEEE (Vol. 4, pp. 2302\u20132312). IEEE."},{"issue":"6","key":"6079_CR3","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1109\/TMC.2006.80","volume":"5","author":"G Wang","year":"2006","unstructured":"Wang, G., Cao, G., & La Porta, T. F. (2006). Movement-assisted sensor deployment. IEEE Transactions on Mobile Computing, 5(6), 640\u2013652.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"6079_CR4","unstructured":"Zou, Y. & Chakrabarty, K. (2003). Sensor deployment and target localization based on virtual forces,\u201d In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE societies (Vol. 2, pp. 1293\u20131303). IEEE."},{"key":"6079_CR5","doi-asserted-by":"crossref","unstructured":"Zhou, H., Wu, H., Xia, S., Jin, M., & Ding, N. (2011). A distributed triangulation algorithm for wireless sensor networks on 2D and 3D surface. In INFOCOM, 2011 proceedings IEEE (pp. 1053\u20131061). IEEE.","DOI":"10.1109\/INFCOM.2011.5934879"},{"issue":"4","key":"6079_CR6","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TPDS.2013.134","volume":"25","author":"C Qiu","year":"2014","unstructured":"Qiu, C., & Shen, H. (2014). A delaunay-based coordinate-free mechanism for full coverage in wireless sensor networks. IEEE Transactions on Parallel and Distributed System, 25(4), 828\u2013839.","journal-title":"IEEE Transactions on Parallel and Distributed System"},{"key":"6079_CR7","doi-asserted-by":"crossref","unstructured":"Zhao, E., Yao, J., Wang, H., & Lv, Y. (2011). A coverage hole detection method and improvement scheme in WSNs. In Electric information and control engineering (ICEICE), 2011 International Conference on (pp. 985\u2013988). IEEE.","DOI":"10.1109\/ICEICE.2011.5778219"},{"issue":"103","key":"6079_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.comnet.2016.04.005","volume":"5","author":"W Li","year":"2016","unstructured":"Li, W., & Wu, Y. (2016). Tree-based coverage hole detection and healing method in wireless sensor networks. Computer Networks, 5(103), 33\u201343.","journal-title":"Computer Networks"},{"issue":"1","key":"6079_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11276-007-0021-1","volume":"15","author":"C Zhang","year":"2009","unstructured":"Zhang, C., Zhang, Y., & Fang, Y. (2009). Localized algorithms for coverage boundary detection in wireless sensor networks. Wireless Networks, 15(1), 3\u201320.","journal-title":"Wireless Networks"},{"key":"6079_CR10","doi-asserted-by":"crossref","unstructured":"Zhang, C., Zhang, Y., & Fang, Y. (2006). Detecting coverage boundary nodes in wireless sensor networks. In Networking, sensing and control, 2006. ICNSC\u201906. Proceedings of the 2006 IEEE international conference on (pp. 868\u2013873). IEEE.","DOI":"10.1109\/ICNSC.2006.1673261"},{"key":"6079_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2014.05.015","volume":"23","author":"H Chizari","year":"2014","unstructured":"Chizari, H., Poston, T., Razak, S. A., Abdullah, A. H., & Salleh, S. (2014). Local coverage measurement algorithm in GPS-free wireless sensor networks. Ad Hoc Networks, 23, 1\u20137.","journal-title":"Ad Hoc Networks"},{"issue":"5","key":"6079_CR12","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1016\/j.jnca.2011.06.007","volume":"34","author":"HC Ma","year":"2011","unstructured":"Ma, H. C., Sahoo, P. K., & Chen, Y. W. (2011). Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks. Journal of Network and Computer Applications, 34(5), 1743\u20131756.","journal-title":"Journal of Network and Computer Applications"},{"key":"6079_CR13","first-page":"2014","volume":"7","author":"P Antil","year":"2014","unstructured":"Antil, P., & Malik, A. (2014). Hole detection for quantifying connectivity in wireless sensor networks: A survey. Journal of Computer Networks and Communications, 7, 2014.","journal-title":"Journal of Computer Networks and Communications"},{"issue":"19","key":"6079_CR14","doi-asserted-by":"publisher","first-page":"1074","DOI":"10.1016\/j.procs.2013.06.151","volume":"1","author":"N Jabeur","year":"2013","unstructured":"Jabeur, N., Sahli, N., & Khan, I. M. (2013). Survey on sensor holes: A cause\u2013effect\u2013solution perspective. Procedia Computer Science, 1(19), 1074\u20131080.","journal-title":"Procedia Computer Science"},{"key":"6079_CR15","unstructured":"Ghrist, R. & Muhammad, A. (2005). Coverage and hole-detection in sensor networks via homology. In: Information processing in sensor networks, 2005. IPSN 2005. Fourth International Symposium on (pp. 254\u2013260). IEEE."},{"key":"6079_CR16","unstructured":"Lambrou, T. P. & Panayiotou, C. G. (2007). Collaborative event detection using mobile and stationary nodes in sensor networks. In: Collaborative computing: Networking, applications and worksharing, 2007, Collaborate Com 2007. International Conference on (pp. 106\u2013115). IEEE."},{"issue":"2009","key":"6079_CR17","first-page":"7","volume":"1","author":"TP Lambrou","year":"2009","unstructured":"Lambrou, T. P., & Panayiotou, C. G. (2009). Collaborative area monitoring using wireless sensor networks with stationary and mobile nodes. EURASIP Journal on Advances in Signal Processing, 1(2009), 7.","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"issue":"3","key":"6079_CR18","doi-asserted-by":"publisher","first-page":"3163","DOI":"10.3390\/s110303163","volume":"11","author":"H Chizari","year":"2011","unstructured":"Chizari, H., Hosseini, M., Poston, T., Razak, S. A., & Abdullah, A. H. (2011). Delaunay triangulation as a new coverage measurement method in wireless sensor network. Sensors, 11(3), 3163\u20133176.","journal-title":"Sensors"},{"issue":"4","key":"6079_CR19","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1049\/iet-wss.2012.0076","volume":"2","author":"IM Khan","year":"2012","unstructured":"Khan, I. M., Jabeur, N., & Zeadally, S. (2012). Hop-based approach for holes and boundary detection in wireless sensor networks. IET Wireless Sensor Systems, 2(4), 328\u2013337.","journal-title":"IET Wireless Sensor Systems"},{"issue":"4","key":"6079_CR20","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1109\/TMC.2011.85","volume":"11","author":"Y Bejerano","year":"2012","unstructured":"Bejerano, Y. (2012). Coverage verification without location information. IEEE Transactions on Mobile Computing, 11(4), 631\u2013643.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"6079_CR21","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1109\/TNET.2012.2190620","volume":"20","author":"GS Kasbekar","year":"2012","unstructured":"Kasbekar, G. S., Bejerano, Y., & Sarkar, S. (2012). Generic coverage verification without location information using dimension reduction. IEEE\/ACM Transactions on Networking, 20(6), 1991\u20132004.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"4","key":"6079_CR22","doi-asserted-by":"publisher","first-page":"822","DOI":"10.4304\/jnw.8.4.822-828","volume":"8","author":"Z Kang","year":"2013","unstructured":"Kang, Z., Yu, H., & Xiong, Q. (2013). Detection and recovery of coverage holes in wireless sensor networks. Journal of Networks, 8(4), 822\u2013828.","journal-title":"Journal of Networks"},{"issue":"12","key":"6079_CR23","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1177\/0278364906072252","volume":"25","author":"V Silva De","year":"2006","unstructured":"De Silva, V., & Ghrist, R. (2006). Coordinate-free coverage in sensor networks with controlled boundaries via homology. The International Journal of Robotics Research, 25(12), 1205\u20131222.","journal-title":"The International Journal of Robotics Research"},{"issue":"70","key":"6079_CR24","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.comnet.2014.05.005","volume":"9","author":"WC Chu","year":"2014","unstructured":"Chu, W. C., & Ssu, K. F. (2014). Location-free boundary detection in mobile wireless sensor networks with a distributed approach. Computer Networks, 9(70), 96\u2013112.","journal-title":"Computer Networks"},{"issue":"16","key":"6079_CR25","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.adhoc.2014.01.001","volume":"31","author":"I El Korbi","year":"2014","unstructured":"El Korbi, I., & Zeadally, S. (2014). Energy-aware sensor node relocation in mobile sensor networks. Ad Hoc Networks, 31(16), 247\u2013265.","journal-title":"Ad Hoc Networks"},{"key":"6079_CR26","doi-asserted-by":"crossref","unstructured":"Mahendrababu, K. & Joshitha, K. L. (2014) A solution to energy hole problem in wireless sensor networks using WITRICITY. In: Information communication and embedded systems (ICICES), 2014 international conference on (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICICES.2014.7034150"},{"key":"6079_CR27","unstructured":"Lakshmi Joshitha, K. & Jayashri, S. (2015). Location free approach for coverage verification in distributed wireless sensor network. International Journal of Applied Engineering Research, 10(20), 16084\u201316090. ISSN 0973-4562."},{"key":"6079_CR28","unstructured":"Joshitha, K. L. & Jayashri, S. Modified coverage hole detection algorithm for distributed WSNs. LNCS. Elseviers."},{"issue":"2","key":"6079_CR29","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s11036-006-4471-y","volume":"11","author":"Q Fang","year":"2006","unstructured":"Fang, Q., Gao, J., & Guibas, L. J. (2006). Locating and bypassing holes in sensor networks. Mobile Networks and Applications, 11(2), 187\u2013200.","journal-title":"Mobile Networks and Applications"},{"issue":"5","key":"6079_CR30","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1109\/TPDS.2013.137","volume":"25","author":"MR Senouci","year":"2014","unstructured":"Senouci, M. R., Mellouk, A., & Assnoune, K. (2014). Localized movement-assisted sensor deployment algorithm for hole detection and healing. IEEE Transactions on Parallel and Distributed Systems, 25(5), 1267\u20131277.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"30","key":"6079_CR31","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.inffus.2015.11.005","volume":"31","author":"M Abo-Zahhad","year":"2016","unstructured":"Abo-Zahhad, M., Sabor, N., Sasaki, S., & Ahmed, S. M. (2016). A centralized immune-Voronoi deployment algorithm for coverage maximization and energy conservation in mobile wireless sensor networks. Information Fusion, 31(30), 36\u201351.","journal-title":"Information Fusion"},{"issue":"48","key":"6079_CR32","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.jnca.2014.10.011","volume":"28","author":"W Li","year":"2015","unstructured":"Li, W., & Zhang, W. (2015). Coverage hole and boundary nodes detection in wireless sensor networks. Journal of Network and Computer Applications, 28(48), 35\u201343.","journal-title":"Journal of Network and Computer Applications"},{"issue":"4","key":"6079_CR33","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/TPDS.2013.134","volume":"25","author":"C Qiu","year":"2014","unstructured":"Qiu, C., & Shen, H. (2014). A delaunay-based coordinate-free mechanism for full coverage in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(4), 828\u2013839.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"6079_CR34","unstructured":"Bai, F. & Helmy, A. (2004). A survey of mobility models. In Wireless Adhoc Networks, University of Southern California, USA. (Vol. 206, p. 147)."},{"key":"6079_CR35","doi-asserted-by":"publisher","first-page":"926420","DOI":"10.1155\/2010\/926420","volume":"1","author":"S Mehta","year":"2010","unstructured":"Mehta, S., & Kwak, K. S. (2010). An energy-efficient MAC protocol in wireless sensor networks: A game theoretic approach. EURASIP Journal on Wireless Communications and Networking, 1, 926420.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"6079_CR36","doi-asserted-by":"crossref","unstructured":"Milan, F., Jaramillo, J. J., & Srikant, R. (2006) Achieving cooperation in multihop wireless networks of selfish nodes. In Proceeding from the 2006 workshop on game theory for communications and networks (p. 3). ACM.","DOI":"10.1145\/1190195.1190197"},{"issue":"1","key":"6079_CR37","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/s11277-014-2246-5","volume":"82","author":"I Memon","year":"2015","unstructured":"Memon, I., Kumar, P., Memon, N. A., & Chowdhry, B. S. (2015). Secure coverage tree construction scheme for wireless sensor networks. Wireless Personal Communications, 82(1), 659\u2013674.","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"6079_CR38","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1049\/iet-wss.2015.0017","volume":"6","author":"S Singh","year":"2016","unstructured":"Singh, S., Chand, S., Kumar, R., Malik, A., & Kumar, B. (2016). NEECP: Novel energy-efficient clustering protocol for prolonging lifetime of WSNs. IET Wireless Sensor Systems., 6(5), 151\u2013157.","journal-title":"IET Wireless Sensor Systems."},{"issue":"4","key":"6079_CR39","doi-asserted-by":"publisher","first-page":"985","DOI":"10.1007\/s11277-016-3226-8","volume":"88","author":"N Hemavathi","year":"2016","unstructured":"Hemavathi, N., & Sudha, S. (2016). A novel regression based clustering technique for wireless sensor networks. Wireless Personal Communications, 88(4), 985\u20131013.","journal-title":"Wireless Personal Communications"},{"key":"6079_CR40","doi-asserted-by":"crossref","unstructured":"Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000) Energy-efficient communication protocol for wireless microsensor networks. In System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on (p. 10). IEEE.","DOI":"10.1109\/HICSS.2000.926982"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-6079-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-6079-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-6079-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:56:42Z","timestamp":1775253402000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-6079-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["6079"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-6079-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"26 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}