{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T11:46:00Z","timestamp":1753875960461,"version":"3.41.2"},"reference-count":25,"publisher":"Oxford University Press (OUP)","license":[{"start":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T00:00:00Z","timestamp":1565827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Area detection and measuring is one of the most important problems in wireless sensor network because it mainly relates to the continuity and functionality of most routing protocols applied to the region of interest (ROI). Electronics failure, random deployment of nodes, software errors or some phenomena such as fire spreading or water flood could lead to wide death of sensor nodes. The damage on ROI can be controlled by detecting and calculating the area of the holes, resulting from the damaged sensor networks. In this paper, a new mathematical algorithm, wireless sensor hole detection algorithm (WHD), is developed to detect and calculate the holes area in ROI where the sensor nodes are spread randomly. WHD is developed for achieving quality of service in terms of power consumption and average hole detection time. The dynamic behavior of the proposed WHD depends on executing the following steps. Firstly, WHD algorithm divides down the ROI into many cells using the advantage of the grid construction to physically partition the ROI into many small individual cells. Secondly, WHD algorithm works on each cell individually by allocating the nearest three sensor nodes to each of the cell\u2019s coordinates by comparing their positions, WHD connects each cell\u2019s coordinate points with the selected sensor nodes by lines that construct a group of triangles, then WHD calculates the area of upcoming triangles. Repeating the previous step on all the cells, WHD can calculate and locate each hole in the ROI. The performance evaluation depends on the NS-2 simulator as a simulation technique to study and analyze the performance of WHD algorithm. Results show that WHD outperforms, in terms of average energy consumption and average hole discovery time, path density algorithm, novel coverage hole discovery algorithm and distriputed coverage hole Detection.<\/jats:p>","DOI":"10.1093\/comjnl\/bxz054","type":"journal-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T11:08:04Z","timestamp":1557745684000},"source":"Crossref","is-referenced-by-count":3,"title":["Improving the Mechanism of Detecting and Measuring Holes in Ad hoc Wireless Sensor Network"],"prefix":"10.1093","author":[{"given":"Mohamed A","family":"Bayoumi","sequence":"first","affiliation":[{"name":"Systems and Computers Engineering Department, Faculty of Engineering, Al-Azhar University, Nasr City, Cairo, Egypt"}]},{"given":"Tarek M","family":"Salem","sequence":"additional","affiliation":[{"name":"Electronics Research Institute, Tahrir Street - Dokki, Cairo, Egypt"}]},{"given":"Samir M","family":"Koriem","sequence":"additional","affiliation":[{"name":"Systems and Computers Engineering Department, Faculty of Engineering, Al-Azhar University, Nasr City, Cairo, Egypt"}]}],"member":"286","published-online":{"date-parts":[[2019,8,15]]},"reference":[{"key":"2019081510350028900_ref1","doi-asserted-by":"crossref","DOI":"10.1155\/2017\/7538190","article-title":"Energy-Efficient Broadcasting Scheme for Smart Industrial Wireless Sensor Networks","author":"Chen","year":"2017","journal-title":"Mob. Inform. Syst."},{"key":"2019081510350028900_ref2","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i45\/99032","article-title":"A comprehensive survey of coverage problem and efficient sensor deployment strategies in wireless sensor networks","volume":"9","author":"Debnath","year":"2016","journal-title":"Indian J. Sci. Technol."},{"key":"2019081510350028900_ref3","first-page":"1371","article-title":"Environmental monitoring using wireless sensor networks based on IOT","volume":"4","author":"Zhao","year":"2017","journal-title":"Int. Res. J. Eng. Technol. (IRJET)"},{"key":"2019081510350028900_ref4","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1016\/j.ins.2015.10.004","article-title":"Data prediction, comparison, and recovery in clustered wireless sensor networks for environmental monitoring applications","volume":"329","author":"Wua","year":"2016","journal-title":"Inform. Sci. J."},{"key":"2019081510350028900_ref5","first-page":"27","article-title":"LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring","volume":"9","author":"Ahadipour","year":"2017","journal-title":"Int. J. Inform. Security"},{"key":"2019081510350028900_ref6","first-page":"501","article-title":"Optimal power control in green wireless sensor networks with wireless energy harvesting","volume":"5","author":"Mahapatra","year":"2017","journal-title":"WakeUp Radio Transmission Control"},{"key":"2019081510350028900_ref7","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.3986","article-title":"PAWN: a payload-based mutual authentication scheme for wireless sensor networks","volume":"29","author":"Jan","year":"2017","journal-title":"Concurrency Computat Pract Exper."},{"key":"2019081510350028900_ref8","first-page":"70","article-title":"Hole detection and healing for improving coverage in WSNs","volume":"3","author":"Kadu","year":"2015","journal-title":"Int. J. Recent Innov. Trends Comput. Commun."},{"issue":"4","key":"2019081510350028900_ref9","first-page":"540","article-title":"Coverage hole detection in wireless sensor networks","volume":"5","author":"Kumar","year":"2015","journal-title":"Int. J. Comput. Netw. Wirel. Commun. (IJCNWC)"},{"key":"2019081510350028900_ref10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jides.2016.04.001","article-title":"Boundary and holes recognition in wireless sensor networks","volume":"3","author":"Beghdad","year":"2016","journal-title":"J. Innov. Digit. Ecosyst."},{"key":"2019081510350028900_ref11","first-page":"21","article-title":"Circles routing protocol for wireless sensor networks","volume":"16","author":"oriem","year":"2016","journal-title":"Int. J. Intell. Comput.Inform. Sci. IJICIS"},{"key":"2019081510350028900_ref12","article-title":"A comparative study of target tracking approach in wireless sensor networks","volume":"2","author":"Zaidi","year":"2016","journal-title":"J. Sensors"},{"key":"2019081510350028900_ref13","first-page":"866","volume-title":"7th Int. Conf. on Communication and Virtualization","author":"Antil","year":"2016"},{"key":"2019081510350028900_ref14","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1109\/JSEN.2014.2347137","article-title":"VGDRA: a virtual grid-based dynamic routes adjustment scheme for mobile sink-based wireless sensor networks","volume":"15","author":"Khan","year":"2015","journal-title":"IEEE Sensors J."},{"key":"2019081510350028900_ref15","first-page":"724","article-title":"Improved hole detection healing and replacing algorithm coverage in wireless sensor networks","volume":"2","author":"Jewel","year":"2016","journal-title":"Int. J. Sci. Res. Sci. Eng. Technol. (IJSRSET)"},{"key":"2019081510350028900_ref16","doi-asserted-by":"crossref","DOI":"10.1155\/2016\/8310296","article-title":"Detecting boundary nodes and coverage holes in wireless sensor networks","author":"Zhao","year":"2016","journal-title":"Mobile Inform. Syst."},{"key":"2019081510350028900_ref17","first-page":"380","article-title":"Detection and healing of holes in wireless sensor networks","volume":"13","author":"Snega","year":"2015","journal-title":"Int. J. Emerg. Technol. Comput. Sci. Electron. (IJETCSE)"},{"volume-title":"Proc. of Springer, Science + Business Media","year":"2015","author":"Xu","key":"2019081510350028900_ref18"},{"key":"2019081510350028900_ref19","first-page":"234","article-title":"Hole detection and healing for a ROI in wireless sensor networks","volume":"3","author":"Suku","year":"2015","journal-title":"Int. J. Eng. Res. Gen. Sci."},{"key":"2019081510350028900_ref20","first-page":"1423","article-title":"Sensor deployment algorithm for hole detection and healing by using energy based local healing","volume":"5","author":"Febil","year":"2016","journal-title":"Int. J. Eng. Sci. Res. Technol."},{"key":"2019081510350028900_ref21","doi-asserted-by":"publisher","first-page":"386","DOI":"10.3390\/s16030386","article-title":"An efficient distributed coverage hole detection protocol for wireless sensor networks","volume":"2016","author":"Prasan","year":"2016","journal-title":"Sensors"},{"key":"2019081510350028900_ref22","doi-asserted-by":"crossref","first-page":"273","DOI":"10.14257\/ijhit.2016.9.3.25","article-title":"A novel coverage holes discovery algorithm based on Voronoi diagram in wireless sensor networks","volume":"9","author":"Dai","year":"2016","journal-title":"Int. J. Hybrid. Info. Technol."},{"key":"2019081510350028900_ref23","first-page":"1","volume-title":"1st Int. Conf. on Electronics, Materials Engineering and Nano-Technology (IEMENTech)","author":"Soundarya","year":"2017"},{"key":"2019081510350028900_ref24","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/s12083-015-0407-2","article-title":"Coverage hole detection and restoration algorithm for wireless sensor networks","volume":"10","author":"Amgoth","year":"2017","journal-title":"Peer Peer Netw. Appl."},{"key":"2019081510350028900_ref25","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.jnca.2013.09.002","article-title":"Localization-free and energy-efficient hole bypassing techniques for fault-tolerant sensor networks","volume":"10","author":"Yilmaz","year":"2014","journal-title":"J. Netw. Comput. Appl."}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/advance-article-pdf\/doi\/10.1093\/comjnl\/bxz054\/29164406\/bxz054.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T16:41:23Z","timestamp":1565973683000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/advance-article\/doi\/10.1093\/comjnl\/bxz054\/5540369"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,15]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxz054","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published":{"date-parts":[[2019,8,15]]},"article-number":"bxz054"}}