{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T04:47:57Z","timestamp":1654145277718},"reference-count":25,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7,1]]},"abstract":"<p>Wireless Sensor Networks (WSNs) can be widely utilized in many applications, especially in environmental surveillance. However, some holes exist within the WSNs caused by factors like non-uniform deployment of sensor nodes, depletion of energy from sensor nodes, the destruction from external forces, and the existence of physical obstacles, such as mountains and lakes. These holes degrade the performance of wireless sensor networks (WSNs). Hence, finding the position of the holes and utilizing the information to improve the performance of WSNs is a significant issue. To solve this problem, the authors propose a detection scheme for grid-based hole in WSNs. By means of grid architecture, they use the grid head to broadcast and forward the request and respond the holes detection. Sink then calculates the position of the holes for improving the performance of the WSNs.<\/p>","DOI":"10.4018\/jdst.2012070105","type":"journal-article","created":{"date-parts":[[2013,2,5]],"date-time":"2013-02-05T22:20:00Z","timestamp":1360102800000},"page":"53-71","source":"Crossref","is-referenced-by-count":2,"title":["A Grid-Based Hole Detection Scheme in WSNs"],"prefix":"10.4018","volume":"3","author":[{"given":"Ying-Hong","family":"Wang","sequence":"first","affiliation":[{"name":"Tamkang University, Taiwan"}]},{"given":"Kuo-Feng","family":"Huang","sequence":"additional","affiliation":[{"name":"Tamkang University, Taiwan"}]},{"given":"Shaing-Ting","family":"Lin","sequence":"additional","affiliation":[{"name":"Tamkang University, Taiwan"}]}],"member":"2432","reference":[{"key":"jdst.2012070105-0","doi-asserted-by":"publisher","DOI":"10.1145\/1072989.1072992"},{"key":"jdst.2012070105-1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"jdst.2012070105-2","doi-asserted-by":"crossref","unstructured":"Bejerano, Y. (2008). Simple and efficient k-coverage verification without location information. In Proceedings of the IEEE Conference on Computer Communications (pp. 291-295).","DOI":"10.1109\/INFOCOM.2008.67"},{"key":"jdst.2012070105-3","doi-asserted-by":"crossref","unstructured":"Fang, Q., Gao, J., & Guibas, L. J. (2004). Locating and bypassing holes in sensor networks. In Proceedings of IEEE International Conference INFOCOM (pp. 187-200).","DOI":"10.1007\/s11036-006-4471-y"},{"key":"jdst.2012070105-4","doi-asserted-by":"crossref","unstructured":"Ghosh, A., & Givargis, T. (2005). LORD: A localized, reactive and distributed protocol for node scheduling in wireless sensor networks. In Proceedings of the IEEE Design, Automation and Test in Europe (Vol.1, pp. 190-195).","DOI":"10.1109\/DATE.2005.200"},{"key":"jdst.2012070105-5","unstructured":"Hu, Y., Heidemann, J., & Estrin, D. (2001). Geography-informed energy conservation for ad hoc routing. In Proceedings of the 7th ACM Annual International Conference on Mobile Computing and Networking, Rome, Italy (pp. 70-84)."},{"key":"jdst.2012070105-6","doi-asserted-by":"crossref","unstructured":"Ikeda, M., Kulla, E., Barolli, L., Takizawa, M., & Miho, R. (2011, September 7-9). Performance evaluation of wireless mobile ad-hoc network via NS-3 simulator. In Proceedings of the 14th International Conference on Network-Based Information Systems, Tirana, Albania (pp. 135-141).","DOI":"10.1109\/NBiS.2011.29"},{"key":"jdst.2012070105-7","doi-asserted-by":"crossref","unstructured":"Kumar, S., Lai, T. H., & Balogh, J. (2004). On k-coverage in a mostly sleeping sensor network. In Proceedings of the 10th Annual International Conference on Mobile Computing and Networking, Philadelphia, PA (pp. 144-158).","DOI":"10.1145\/1023720.1023735"},{"key":"jdst.2012070105-8","doi-asserted-by":"crossref","unstructured":"Lederer, S., Wang, Y., & Gao, J. (2008). Connectivity-based localization of large scale sensor networks with complex shape. In Proceedings of the IEEE Conference on Computer Communications, Phoenix, AZ (pp. 789-797).","DOI":"10.1109\/INFOCOM.2008.130"},{"key":"jdst.2012070105-9","doi-asserted-by":"crossref","unstructured":"Li, X., Hunter, D. K., & Yang, K. (2006). Distributed coordinate-free hole detection & recovery. In Proceedings of the IEEE International Conference on Global Communications (pp. 1-5).","DOI":"10.1109\/GLOCOM.2006.680"},{"key":"jdst.2012070105-10","unstructured":"Liu, X., Hou, H., Yang, J., Yu, H., & Hu, H. (2005). Coverage and energy information gathering protocol in wireless sensor networks. In Proceedings of the IEEE Parallel and Distributed Computing, Applications and Technologies (pp. 649-654)."},{"key":"jdst.2012070105-11","doi-asserted-by":"crossref","unstructured":"Man, S., Cho, A., & Ye, Y. (2005). On solving coverage problems in a wireless sensor network using Voronoi Diagrams. In Proceedings of the International Workshop on Internet and Network Economics (pp. 584-593).","DOI":"10.1007\/11600930_58"},{"key":"jdst.2012070105-12","doi-asserted-by":"crossref","unstructured":"Meguerdichian, S., Koushanfar, F., Potkonjak, M., & Srivastava, M. B. (2001). Coverage problems in wireless ad-hoc sensor networks. In Proceedings of the IEEE Conference on Computer Communications, Anchorage, AK (pp. 1380-1387).","DOI":"10.1109\/INFCOM.2001.916633"},{"key":"jdst.2012070105-13","doi-asserted-by":"crossref","unstructured":"Rao, A., Ratnasamy, S., Papadimitriou, C., Shenker, S., & Stoica, I. (2003). Geographic routing without location information. In Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, San Diego, CA (pp. 96-108).","DOI":"10.1145\/938985.938996"},{"key":"jdst.2012070105-14","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2005.8"},{"key":"jdst.2012070105-15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"jdst.2012070105-16","doi-asserted-by":"crossref","unstructured":"Shakkottai, S., Srikant, R., & Shroff, N. (2003). Unreliable sensor grids: Coverage, connectivity and diameter. In Proceedings of the IEEE Conference on Computer Communications (pp. 1073-1083).","DOI":"10.1109\/INFCOM.2003.1208944"},{"key":"jdst.2012070105-17","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-004-0138-0"},{"key":"jdst.2012070105-18","doi-asserted-by":"crossref","unstructured":"Shih, E., Cho, S., Ickes, N., Min, R., Sinha, A., Wang, A., & Chandrakasan, A. (2001). Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In Proceedings of the ACM Conference on Mobile Communications (pp. 272-286).","DOI":"10.1145\/381677.381703"},{"key":"jdst.2012070105-19","doi-asserted-by":"publisher","DOI":"10.1145\/565702.565708"},{"key":"jdst.2012070105-20","unstructured":"Wang, G., Cao, G., & La, P. T. (2004). Movement-assisted sensor deployment. In Proceedings of the IEEE Conference on Computer Communications (pp. 2469-2479)."},{"key":"jdst.2012070105-21","doi-asserted-by":"crossref","unstructured":"Wang, Y. H., Huang, K. F., & Chang, T. W. (2009, July 7-9). An efficient mechanism for mobile target tracking in grid-based wireless sensor networks. In Proceedings of the Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, Brisbane, Australia (pp. 1-6).","DOI":"10.1109\/UIC-ATC.2009.19"},{"key":"jdst.2012070105-22","doi-asserted-by":"crossref","unstructured":"Wang, Y. H., Huang, K. F., & Lin, S. T. (2011, September 7-9). A grid-based hole detection scheme in WSNs. In Proceedings of the 14th International Conference on Network-Based Information Systems, Tirana Albania (pp. 202-207).","DOI":"10.1109\/NBiS.2011.37"},{"key":"jdst.2012070105-23","doi-asserted-by":"crossref","unstructured":"Wang, Y. H., Lin, Y. C., & Tsai, C. H. (2011, November 30-December 2). A routing protocol based on power-controlled sleep scheduling for wireless sensor networks. In Proceedings of the Third IEEE International Conference on Intelligent Networking and Collaborative Systems, Fukuoka, Japan (pp. 136-140).","DOI":"10.1109\/INCoS.2011.34"},{"key":"jdst.2012070105-24","doi-asserted-by":"crossref","unstructured":"Wang, Y. H., Yu, C. Y., & Fu, P. F. (2007, May 21-23). A coverage and connectivity method to cluster topology in wireless sensor networks. In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, Niagara Falls, ON, Canada (pp. 97-102).","DOI":"10.1109\/AINAW.2007.16"}],"container-title":["International Journal of Distributed Systems and Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=67558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T01:41:29Z","timestamp":1654134089000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdst.2012070105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,7,1]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jdst.2012070105","relation":{},"ISSN":["1947-3532","1947-3540"],"issn-type":[{"value":"1947-3532","type":"print"},{"value":"1947-3540","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,7,1]]}}}