{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T21:53:38Z","timestamp":1723154018684},"reference-count":46,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T00:00:00Z","timestamp":1530144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"In wireless sensor networks (WSNs), Radio Signal Strength Indicator (RSSI)-based localization techniques have been widely used in various applications, such as intrusion detection, battlefield surveillance, and animal monitoring. One fundamental performance measure in those applications is the sensing coverage of WSNs. Insufficient coverage will significantly reduce the effectiveness of the applications. However, most existing studies on coverage assume that the sensing range of a sensor node is a disk, and the disk coverage model is too simplistic for many localization techniques. Moreover, there are some localization techniques of WSNs whose coverage model is non-disk, such as RSSI-based localization techniques. In this paper, we focus on detecting and recovering coverage holes of WSNs to enhance RSSI-based localization techniques whose coverage model is an ellipse. We propose an algorithm inspired by Voronoi tessellation and Delaunay triangulation to detect and recover coverage holes. Simulation results show that our algorithm can recover all holes and can reach any set coverage rate, up to 100% coverage.<\/jats:p>","DOI":"10.3390\/s18072075","type":"journal-article","created":{"date-parts":[[2018,6,28]],"date-time":"2018-06-28T14:53:33Z","timestamp":1530197613000},"page":"2075","source":"Crossref","is-referenced-by-count":9,"title":["Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4934-3640","authenticated-orcid":false,"given":"Shuangjiao","family":"Zhai","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Northwest University, Xi\u2019an 710127, China"}]},{"given":"Zhanyong","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northwest University, Xi\u2019an 710127, China"}]},{"given":"Dajin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Montclair State University, Montclair, NJ 07043, USA"}]},{"given":"Qingpei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northwest University, Xi\u2019an 710127, China"}]},{"given":"Zhanglei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northwest University, Xi\u2019an 710127, China"}]},{"given":"Xiaojiang","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northwest University, Xi\u2019an 710127, China"}]},{"given":"Dingyi","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northwest University, Xi\u2019an 710127, China"}]},{"given":"Feng","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Northwest University, Xi\u2019an 710127, China"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6157-0662","authenticated-orcid":false,"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science & Technology, Xi\u2019an University of Posts & Telecommunications, Xi\u2019an 710121, China"},{"name":"School of Computing and Communications, Lancaster University, Lancaster LA1 4WA, UK"}]}],"member":"1968","published-online":{"date-parts":[[2018,6,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/1978802.1978811","article-title":"Coverage problems in sensor networks: A Survey","volume":"43","author":"Wang","year":"2011","journal-title":"ACM Comput. Surv."},{"key":"ref_2","unstructured":"Li, X., Hunter, D.K., and Yang, K. (December, January 27). Distributed Coordinate-free Hole Detection and Recovery. Proceedings of the IEEE Global Telecommunications Conference, San Francisco, CA, USA."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Meguerdichian, S., Koushanfar, F., Potkonjak, M., and Srivastava, M.B. (2001, January 22\u201326). Coverage Problems in Wireless Ad-hoc Sensor Networks. Proceedings of the IEEE INFOCOM, Anchorage, AK, USA.","DOI":"10.1145\/381677.381691"},{"key":"ref_4","first-page":"518","article-title":"The Coverage Problem in a Wireless Sensor Network","volume":"10","author":"Huang","year":"2005","journal-title":"Mob. Netw. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Wang, Y., and Cao, G. (2011, January 17\u201319). Barrier Coverage in Camera Sensor Networks. Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Paris, France.","DOI":"10.1145\/2107502.2107518"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/TNET.2011.2164620","article-title":"Exploiting Data Fusion to Improve the Coverage of Wireless Sensor Networks","volume":"20","author":"Tan","year":"2012","journal-title":"IEEE ACM Trans. Netw."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1267","DOI":"10.1109\/TPDS.2013.137","article-title":"Localized Movement-Assisted Sensor Deployment Algorithm for Hole Detection and Healing","volume":"25","author":"Senouci","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.jnca.2014.10.011","article-title":"Coverage hole and boundary nodes detection in wireless sensor networks","volume":"48","author":"Li","year":"2015","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.adhoc.2015.08.005","article-title":"Deployment and reallocation in mobile survivability-heterogeneous wireless sensor networks for barrier coverage","volume":"36","author":"Tian","year":"2016","journal-title":"Ad Hoc Netw."},{"key":"ref_10","first-page":"240","article-title":"A Survey of Coverage Problems in Wireless Sensor Networks","volume":"163","author":"Liang","year":"2014","journal-title":"Sens. Transducers"},{"key":"ref_11","first-page":"8640","article-title":"Distributed Hybrid Coverage Hole Recovery in Wireless Sensor Networks","volume":"16","author":"Abolhasan","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"7209","DOI":"10.1109\/JSEN.2017.2755122","article-title":"Coverage Hole Repair in WSNs Using Cascaded Neighbor Intervention","volume":"17","author":"Khalifa","year":"2017","journal-title":"IEEE Sens. J."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Rafiei, A., Abolhasan, M., Franklin, D.R., Safaei, F., Smith, S., and Ni, W. (2017, January 22\u201324). Effect of the Number of Participating Nodes on Recovery of WSN Coverage Holes. Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, VIC, Australia.","DOI":"10.1109\/ATNAC.2017.8215433"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"2205","DOI":"10.1109\/LCOMM.2014.2366094","article-title":"A Novel Graphic Coverage Hole Description in Wireless Sensor Networks","volume":"18","author":"Li","year":"2014","journal-title":"IEEE Commun. Lett."},{"key":"ref_15","first-page":"1570","article-title":"A Minimal Rigid Topology Control Algorithm Based on Voronoi Coverage and Delaunay Triangulation in Wireless Sensor Networks","volume":"42","author":"Xue","year":"2016","journal-title":"Acta Autom. Sin."},{"key":"ref_16","unstructured":"Bi, K., Tu, K., Gu, N., Dong, W.L., and Liu, X. (November, January 29). Topological Hole Detection in Sensor Networks with Cooperative Neighbors. Proceedings of the International Conference on Systems and Networks Communications (ICSNC\u201906), Tahiti, French Polynesia."},{"key":"ref_17","unstructured":"Ghrist, R., and Muhammad, A. (2005, January 15). Coverage and Hole-Detection in Sensor Networks via Homology. Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, (IPSN 2005), Boise, ID, USA."},{"key":"ref_18","unstructured":"Silva, V.D., Ghrist, R., and Muhammad, A. (2005, January 8\u201311). Blind Swarms for Coverage in 2-D. Proceedings of the Robotics: Science and Systems, Cambridge, MA, USA."},{"key":"ref_19","unstructured":"Stefan, F., and Christian, K. (2006, January 5\u20137). Hole Detection or: How Much Geometry Hides In Connectivity?. Proceedings of the 22nd Annual Symposium on Computational Geometry (SCG\u201906), Sedona, AZ, USA."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Wang, Y., Gao, J., and Mitchell, J.S. (2006, January 23\u201329). Boundary Recognition in Sensor Networks by Topological Methods. Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MobiCom\u201906), Los Angeles, CA, USA.","DOI":"10.1145\/1161089.1161104"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/s11036-006-4471-y","article-title":"Locating and Bypassing Holes in Sensor Networks","volume":"11","author":"Fang","year":"2006","journal-title":"Mob. Netw. Appl."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Kr\u00f6ller, A., Fekete, S.P., Pfisterer, D., and Fischer, S. (2006, January 22\u201326). Deterministic Boundary Recognition and Topology Extraction for Large Sensor Networks. Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithm, Miami, FL, USA.","DOI":"10.1145\/1109557.1109668"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Zhang, D., Ma, J., Chen, Q., and Ni, L.M. (2007, January 19\u201323). An RF-based system for tracking transceiver-free objects. Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, White Plains, NY, USA.","DOI":"10.1109\/PERCOM.2007.8"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1751","DOI":"10.1007\/s11276-016-1253-8","article-title":"FISCP: Fine-grained device-free positioning system for multiple targets working in sparse deployments","volume":"22","author":"Xie","year":"2016","journal-title":"Wirel. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Liu, C., Fang, D., Yang, Z., Chen, X., Wang, W., Xing, T., An, N., and Cai, L. (2012, January 10\u201315). RDL: A Novel Approach for Passive Object Localization in WSN Based on RSSI. Proceedings of the IEEE International Conference on Communications, Ottawa, ON, Canada.","DOI":"10.1109\/ICC.2012.6363894"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Zhang, D., and Ni, L.M. (2009, January 9\u201313). Dynamic clustering for tracking multiple transceiver-free objects. Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, USA.","DOI":"10.1109\/PERCOM.2009.4912777"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Zhang, D., Yang, Y., Cheng, D., Liu, S., and Ni, L.M. (2010, January 23\u201327). Cocktail: An RF-based hybrid approach for indoor localization. Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa.","DOI":"10.1109\/ICC.2010.5502137"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Kaltiokallio, O., Bocca, M., and Eriksson, L.M. (2010, January 12\u201316). Distributed RSSI processing for intrusion detection in indoor environments. Proceedings of the 9th ACM\/IEEE International Conference on Information Processing in Sensor Networks, Stockholm, Sweden.","DOI":"10.1145\/1791212.1791276"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Adewumi, O.G., Djouani, K., and Kurien, A.M. (2013, January 25\u201328). RSSI based indoor and outdoor distance estimation for localization in WSN. Proceedings of the IEEE International Conference on Industrial Technology (ICIT), Cape Town, South Africa.","DOI":"10.1109\/ICIT.2013.6505900"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"7236","DOI":"10.3390\/s100807236","article-title":"Wireless Sensor Network Deployment for Monitoring Wildlife Passages","volume":"10","author":"Losilla","year":"2010","journal-title":"Sensors"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Mistry, H.P., and Mistry, N.H. (2015, January 21\u201322). RSSI Based Localization Scheme in Wireless Sensor Networks: A Survey. Proceedings of the 2015 Fifth International Conference on Advanced Computing & Communication Technologies (ACCT), Haryana, India.","DOI":"10.1109\/ACCT.2015.105"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"973","DOI":"10.1109\/LCOMM.2014.2320939","article-title":"Energy-Efficient RSSI-Based Localization for Wireless Sensor Networks","volume":"18","author":"Yaghoubi","year":"2014","journal-title":"IEEE Commun. Lett."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"3155","DOI":"10.1109\/JSEN.2016.2524532","article-title":"RSSI-Based Localization Through Uncertain Data Mapping for Wireless Sensor Networks","volume":"16","author":"Luo","year":"2016","journal-title":"IEEE Sens. J."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"6638","DOI":"10.1109\/TWC.2016.2586844","article-title":"RSSI-Based Distributed Self-Localization for Wireless Sensor Networks Used in Precision Agriculture","volume":"15","author":"Abouzar","year":"2016","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.adhoc.2017.11.008","article-title":"An accurate prediction method for moving target localization and tracking in wireless sensor networks","volume":"70","author":"Ahmadi","year":"2018","journal-title":"Ad Hoc Netw."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Liu, C., Li, B., Fang, D., Guo, S., Chen, X., and Xing, T. (2011, January 1\u20134). Demo: Rhinopithecus roxellana monitoring and identification using wireless sensor networks. Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems (SenSys \u201911), Seattle, WA, USA.","DOI":"10.1145\/2070942.2071022"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Dyo, V., Ellwood, S.A., Macdonald, D.W., and Markham, A. (2009, January 4\u20136). Poster Abstract: Wildlife and Environmental Monitoring using RFID and WSN Technology. Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys \u201909), Berkeley, CA, USA.","DOI":"10.1145\/1644038.1644107"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1961","DOI":"10.1109\/JPROC.2010.2052010","article-title":"RF sensor networks for device-free localization: Measurements, models, and algorithms","volume":"98","author":"Patwari","year":"2010","journal-title":"Proc. IEEE"},{"key":"ref_39","unstructured":"Wu, C.H., Lee, K.C., and Chung, Y.C. (2006, January 12\u201315). A Delaunay Triangulation Based Method for Wireless Sensor Network Deployment. Proceedings of the International Conference on Parallel & Distributed Systems, Minneapolis, MN, USA."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.comnet.2016.04.005","article-title":"Tree-based coverage hole detection and healing method in wireless sensor networks","volume":"103","author":"Li","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_41","unstructured":"Rappaport, T.S. (1996). Wireless Communications Principles and Practice, Prentice Hall PTR."},{"key":"ref_42","unstructured":"Lee, W.C. (1982). Mobile Communications Engineering, McGraw-Hill."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Zhao, M., Lei, J., Wu, M., Liu, Y., and Shu, W. (2009, January 19\u201325). Surface Coverage in Wireless Sensor Networks. Proceedings of the IEEE INFOCOM, Rio de Janeiro, Brazil.","DOI":"10.1109\/INFCOM.2009.5061912"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/BF01840357","article-title":"A Sweepline Algorithm for Voronoi Diagrams","volume":"2","author":"Fortune","year":"1987","journal-title":"Algorithmica"},{"key":"ref_45","unstructured":"Krause, A., and Guestrin, C. (2007, January 22\u201326). Near-optimal Observation Selection using Submodular Functions. Proceedings of the 22nd national conference on Artificial Intelligence, Vancouver, BC, Canada."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Zhai, S., Tang, Z., Wang, D., Li, Z., Chen, X., Fang, D., and Chen, F. (2017, January 21\u201324). Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization. Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China.","DOI":"10.1109\/CSE-EUC.2017.231"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/7\/2075\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,11]],"date-time":"2024-06-11T11:46:31Z","timestamp":1718106391000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/7\/2075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,28]]},"references-count":46,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2018,7]]}},"alternative-id":["s18072075"],"URL":"https:\/\/doi.org\/10.3390\/s18072075","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,28]]}}}