{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T07:01:13Z","timestamp":1774162873982,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11277-021-08424-0","type":"journal-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T18:02:41Z","timestamp":1617300161000},"page":"3631-3649","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Development of Fuzzy Enabled Coverage Hole Detection Algorithm in Wireless Sensor Networks"],"prefix":"10.1007","volume":"119","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4881-7103","authenticated-orcid":false,"given":"Y. Harold","family":"Robinson","sequence":"first","affiliation":[]},{"given":"T. Samraj","family":"Lawrence","sequence":"additional","affiliation":[]},{"given":"E. Golden","family":"Julie","sequence":"additional","affiliation":[]},{"given":"S.","family":"Vimal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,1]]},"reference":[{"key":"8424_CR1","doi-asserted-by":"publisher","first-page":"101900","DOI":"10.1016\/j.adhoc.2019.101900","volume":"93","author":"X Fu","year":"2019","unstructured":"Fu, X., Yao, H., & Yang, Y. (2019). Cascading failures in wireless sensor networks with load redistribution of links and nodes. Ad Hoc Networks, 93, 101900.","journal-title":"Ad Hoc Networks"},{"issue":"8","key":"8424_CR2","doi-asserted-by":"publisher","first-page":"2655","DOI":"10.1007\/s00500-018-3636-5","volume":"23","author":"KP Vijayakumar","year":"2019","unstructured":"Vijayakumar, K. P., Kumar, K. P. M., Kottilingam, K., Karthick, T., Vijayakumar, P., & Ganeshkumar, P. (2019). An adaptive neuro-fuzzy logic based jamming detection system in WSN. Soft Computing, 23(8), 2655\u20132667. https:\/\/doi.org\/10.1007\/s00500-018-3636-5","journal-title":"Soft Computing"},{"key":"8424_CR3","first-page":"158","volume":"23","author":"V Mohindru","year":"2019","unstructured":"Mohindru, V., Bhatt, R., & Singh, Y. (2019). Re authentication scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems, 23, 158\u2013166.","journal-title":"Sustainable Computing: Informatics and Systems"},{"issue":"2","key":"8424_CR4","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1007\/s11277-016-3793-8","volume":"95","author":"Y Harold Robinson","year":"2017","unstructured":"Harold Robinson, Y., Golden Julie, E., Balaji, S., & Ayyasamy, A. (2017). Energy aware clustering scheme in wireless sensor network using neuro-fuzzy approach. Wireless Personal Communications, 95(2), 703\u2013721.","journal-title":"Wireless Personal Communications"},{"issue":"15","key":"8424_CR5","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.eswa.2019.01.023","volume":"122","author":"J Parras","year":"2019","unstructured":"Parras, J., & Zazo, S. (2019). Learning attack mechanisms in wireless sensor networks using markov decision processes. Expert Systems with Applications, 122(15), 376\u2013387.","journal-title":"Expert Systems with Applications"},{"key":"8424_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01523-8","author":"M Shelke","year":"2019","unstructured":"Shelke, M., Malhotra, A., & Mahalle, P. N. (2019). Fuzzy priority based intelligent traffic congestion control and emergency vehicle management using congestion-aware routing algorithm. Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-019-01523-8","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"15","key":"8424_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.jnca.2018.03.023","volume":"112","author":"Z Sun","year":"2018","unstructured":"Sun, Z., Liu, Y., & Tao, Li. (2018). Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization. Journal of Network and Computer Applications, 112(15), 29\u201340.","journal-title":"Journal of Network and Computer Applications"},{"key":"8424_CR8","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1016\/j.comcom.2019.09.007","volume":"149","author":"R Bhatt","year":"2020","unstructured":"Bhatt, R., Maheshwary, P., Shukla, P., Shukla, P., Shrivastava, M., & Changlani, S. (2020). Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in wireless sensor networks (WSN). Computer Communications, 149, 134\u2013145.","journal-title":"Computer Communications"},{"key":"8424_CR9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.comcom.2018.04.002","volume":"124","author":"AM Khedr","year":"2018","unstructured":"Khedr, A. M., Osamy, W., & Salim, A. (2018). Distributed coverage hole detection and recovery scheme for heterogeneous wireless sensor networks. Computer Communications, 124, 61\u201375.","journal-title":"Computer Communications"},{"key":"8424_CR10","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11276-018-1848-3","volume":"26","author":"K Kalaikumar","year":"2020","unstructured":"Kalaikumar, K., & Baburaj, E. (2020). Fuzzy enabled congestion control by cross layer protocol utilizing OABC in WSN: Combining MAC, routing, non-similar clustering and efficient data delivery. Wireless Networks, 26, 1085\u20131103. https:\/\/doi.org\/10.1007\/s11276-018-1848-3","journal-title":"Wireless Networks"},{"key":"8424_CR11","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.ins.2018.06.017","volume":"476","author":"L Han","year":"2019","unstructured":"Han, L., Zhou, M., Jia, W., Dalil, Z., & Xu, X. (2019). Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Information sciences, 476, 491\u2013504.","journal-title":"Information sciences"},{"key":"8424_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00825-0","author":"R Elavarasan","year":"2020","unstructured":"Elavarasan, R., & Chitra, K. (2020). An efficient fuzziness based contiguous node refining scheme with cross-layer routing path in WSN. Peer-to-Peer Networks Applications. https:\/\/doi.org\/10.1007\/s12083-019-00825-0","journal-title":"Peer-to-Peer Networks Applications"},{"key":"8424_CR13","doi-asserted-by":"publisher","first-page":"106945","DOI":"10.1016\/j.comnet.2019.106945","volume":"165","author":"M L\u00f3pez","year":"2019","unstructured":"L\u00f3pez, M., Peinado, A., & Ortiz, A. (2019). An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks. Computer Networks, 165, 106945.","journal-title":"Computer Networks"},{"key":"8424_CR14","doi-asserted-by":"publisher","first-page":"106854","DOI":"10.1016\/j.comnet.2019.07.010","volume":"162","author":"S Oh","year":"2019","unstructured":"Oh, S., Cho, H., Kim, S. H., Lee, W., & Lee, E. (2019). Continuous object tracking protocol with selective wakeup based on practical boundary prediction in wireless sensor networks. Computer Networks, 162, 106854.","journal-title":"Computer Networks"},{"key":"8424_CR15","doi-asserted-by":"publisher","first-page":"2229","DOI":"10.1007\/s10489-017-1077-y","volume":"48","author":"S Arjunan","year":"2018","unstructured":"Arjunan, S., & Sujatha, P. (2018). Lifetime maximization of wireless sensor network using fuzzy based unequal clustering and ACO based routing hybrid protocol. Applied Intelligence, 48, 2229\u20132246. https:\/\/doi.org\/10.1007\/s10489-017-1077-y","journal-title":"Applied Intelligence"},{"key":"8424_CR16","doi-asserted-by":"publisher","first-page":"739","DOI":"10.1007\/s11277-019-06588-4","volume":"109","author":"Y Harold Robinson","year":"2019","unstructured":"Harold Robinson, Y., & Golden Julie, E. (2019). MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks. Wireless Personal Communications, 109, 739\u2013760.","journal-title":"Wireless Personal Communications"},{"key":"8424_CR17","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.asoc.2019.01.034","volume":"77","author":"Z Sun","year":"2019","unstructured":"Sun, Z., Wei, M., Zhang, Z., & Gang, Qu. (2019). Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks. Applied Soft Computing, 77, 366\u2013375.","journal-title":"Applied Soft Computing"},{"key":"8424_CR18","doi-asserted-by":"publisher","first-page":"102022","DOI":"10.1016\/j.adhoc.2019.102022","volume":"97","author":"BD Deebak","year":"2020","unstructured":"Deebak, B. D., & Al-Turjman, F. (2020). A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Networks, 97, 102022.","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"8424_CR19","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jpdc.2017.03.005","volume":"118","author":"L Yi","year":"2018","unstructured":"Yi, L., Deng, X., Zou, Z., Ding, D., & Yang, L. T. (2018). Confident information coverage hole detection in sensor networks for uranium tailing monitoring, . Journal of Parallel and Distributed Computing, 118(1), 57\u201366.","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"1","key":"8424_CR20","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s11277-019-06859-0","volume":"111","author":"YH Robinson","year":"2020","unstructured":"Robinson, Y. H., Julie, E. G., Saravanan, K., & Kumar, R. (2020). DRP: Dynamic routing protocol in wireless sensor networks. Wireless Personal Communications, 111(1), 313\u2013329.","journal-title":"Wireless Personal Communications"},{"key":"8424_CR21","doi-asserted-by":"publisher","first-page":"102439","DOI":"10.1016\/j.jnca.2019.102439","volume":"147","author":"P Le Nguyen","year":"2019","unstructured":"Le Nguyen, P., Nguyen, K., Vu, H., & Ji, Y. (2019). TELPAC: A time and energy efficient protocol for locating and patching coverage holes in WSNs. Journal of Network and Computer Applications, 147, 102439.","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"8424_CR22","first-page":"174","volume":"87","author":"AF Jean-MatthieuEtancelin","year":"2019","unstructured":"Jean-MatthieuEtancelin, A. F., & Fr\u00e9d\u00e9ricGuinand, M. R. (2019). DACYCLEM: A decentralized algorithm for maximizing coverage and lifetime in a mobile wireless sensor network. Ad Hoc Networks, 87(1), 174\u2013187.","journal-title":"Ad Hoc Networks"},{"issue":"4","key":"8424_CR23","doi-asserted-by":"publisher","first-page":"3541","DOI":"10.3233\/JIFS-181472","volume":"36","author":"Y Harold Robinson","year":"2019","unstructured":"Harold Robinson, Y., Balaji, S., & Golden Julie, E. (2019). FPSOEE: Fuzzy-enabled particle swarm optimization-based energy-efficient algorithm in mobile ad-hoc networks. Journal of Intelligent & Fuzzy Systems, 36(4), 3541\u20133553.","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"issue":"15","key":"8424_CR24","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.jnca.2018.06.005","volume":"118","author":"K Kalaivanan","year":"2018","unstructured":"Kalaivanan, K., & Bhanumathi, V. (2018). Reliable location aware and Cluster-Tap Root based data collection protocol for large scale wireless sensor networks. Journal of Network and Computer Applications, 118(15), 83\u2013101.","journal-title":"Journal of Network and Computer Applications"},{"key":"8424_CR25","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.comcom.2018.01.004","volume":"117","author":"P Kumar","year":"2018","unstructured":"Kumar, P., & Chaturvedi, A. (2018). Fuzzy-interval based probabilistic query generation models and fusion strategy for energy efficient wireless sensor networks. Computer Communications, 117, 46\u201357.","journal-title":"Computer Communications"},{"key":"8424_CR26","doi-asserted-by":"publisher","first-page":"105331","DOI":"10.1016\/j.knosys.2019.105331","volume":"192","author":"J Xie","year":"2019","unstructured":"Xie, J., Xiong, Z., Dai, Q., Wang, X., & Zhang, Y. (2019). A local-gravitation-based method for the detection of outliers and boundary points. Knowledge-Based Systems, 192, 105331.","journal-title":"Knowledge-Based Systems"},{"key":"8424_CR27","doi-asserted-by":"crossref","unstructured":"Khelil, A., Beghdad, R., & Khelloufi, A. (2020). 3HA: Hybrid hole healing algorithm in a wireless sensor networks. Wireless Personal Communications, 1\u201313","DOI":"10.1007\/s11277-020-07062-2"},{"issue":"2","key":"8424_CR28","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/s11277-016-3213-0","volume":"90","author":"YH Robinson","year":"2016","unstructured":"Robinson, Y. H., & Rajaram, M. (2016). A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile ad hoc network. Wireless Personal Communications, 90(2), 769\u2013791.","journal-title":"Wireless Personal Communications"},{"key":"8424_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-019-02157-6","author":"P Hadikhani","year":"2019","unstructured":"Hadikhani, P., Eslaminejad, M., Yari, M., & Mahani, A. M. (2019). An energy-aware and load balanced distributed geographic routing algorithm for wireless sensor networks with dynamic hole. Wireless Networks. https:\/\/doi.org\/10.1007\/s11276-019-02157-6.","journal-title":"Wireless Networks"},{"key":"8424_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06948-0","author":"B Bhushan","year":"2019","unstructured":"Bhushan, B., & Sahoo, G. (2019). ISFC-BLS (intelligent and secured fuzzy clustering algorithm using balanced load sub-cluster formation) in WSN environment. Wireless Personal Communication. https:\/\/doi.org\/10.1007\/s11277-019-06948-0","journal-title":"Wireless Personal Communication"},{"issue":"5","key":"8424_CR31","doi-asserted-by":"publisher","first-page":"12473","DOI":"10.1007\/s10586-017-1665-y","volume":"22","author":"X Feng","year":"2019","unstructured":"Feng, X., Zhang, X., Zhang, J., & Muhdhar, A. A. (2019). A coverage hole detection and repair algorithm in wireless sensor networks. Cluster Computing, 22(5), 12473\u201312480.","journal-title":"Cluster Computing"},{"issue":"2","key":"8424_CR32","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/s11036-019-01301-y","volume":"25","author":"F Yan","year":"2020","unstructured":"Yan, F., Ma, W., Shen, F., Xia, W., & Shen, L. (2020). Connectivity based k-coverage hole detection in wireless sensor networks. Mobile Networks and Applications, 25(2), 783\u2013793.","journal-title":"Mobile Networks and Applications"},{"key":"8424_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07094-8","author":"N Mittal","year":"2020","unstructured":"Mittal, N. (2020). An energy efficient stable clustering approach using fuzzy type-2 bat flower pollinator for wireless sensor networks. Wireless PersCommun. https:\/\/doi.org\/10.1007\/s11277-020-07094-8","journal-title":"Wireless PersCommun"},{"key":"8424_CR34","doi-asserted-by":"publisher","first-page":"1459","DOI":"10.1007\/s11277-019-06795-z","volume":"110","author":"A Jain","year":"2020","unstructured":"Jain, A., & Goel, A. K. (2020). Energy efficient fuzzy routing protocol for wireless sensor networks. Wireless Personal Communications, 110, 1459\u20131474. https:\/\/doi.org\/10.1007\/s11277-019-06795-z","journal-title":"Wireless Personal Communications"},{"key":"8424_CR35","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01698-5","author":"H Zain Eldin","year":"2020","unstructured":"Zain Eldin, H., Badawy, M., Elhosseini, M., Arafat, H., & Abraham, A. (2020). An improved dynamic deployment technique based-on genetic algorithm (IDDT-GA) for maximizing coverage in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing. https:\/\/doi.org\/10.1007\/s12652-020-01698-5.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"8424_CR36","doi-asserted-by":"publisher","first-page":"102024","DOI":"10.1016\/j.adhoc.2019.102024","volume":"97","author":"S Prithi","year":"2020","unstructured":"Prithi, S., & Sumathi, S. (2020). LD2FA-PSO: A novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Networks, 97, 102024.","journal-title":"Ad Hoc Networks"},{"key":"8424_CR37","doi-asserted-by":"publisher","first-page":"113044","DOI":"10.1016\/j.eswa.2019.113044","volume":"143","author":"S Phoemphon","year":"2020","unstructured":"Phoemphon, S., So-In, C., & Leelathakul, N. (2020). A hybrid localization model using node segmentation and improved particle swarm optimization with obstacle-awareness for wireless sensor networks. Expert Systems with Applications, 143, 113044.","journal-title":"Expert Systems with Applications"},{"key":"8424_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-020-07092-w","author":"R Das","year":"2020","unstructured":"Das, R., Dash, D., & Sarkar, M. K. (2020). HTMS: Fuzzy based hierarchical trust management scheme in WSN. Wireless Personal Communications. https:\/\/doi.org\/10.1007\/s11277-020-07092-w","journal-title":"Wireless Personal Communications"},{"key":"8424_CR39","doi-asserted-by":"crossref","unstructured":"Khalifa, B., Al Aghbari, Z., & Khedr, A. M. (2020). A distributed self-healing coverage hole detection and repair scheme for mobile wireless sensor networks. Sustainable Computing: Informatics and Systems, 100428","DOI":"10.1016\/j.suscom.2020.100428"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08424-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-08424-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-08424-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T19:18:21Z","timestamp":1630091901000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-08424-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,1]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["8424"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-08424-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,1]]},"assertion":[{"value":"22 March 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they do not have any conflict of interest. This research does not involve any human or animal participation. All authors have checked and agreed the submission.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}