2006 International Conference on Systems and Networks Communications (ICSNC'06) 2006
DOI: 10.1109/icsnc.2006.71
|View full text |Cite
|
Sign up to set email alerts
|

Topological Hole Detection in Sensor Networks with Cooperative Neighbors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 5 publications
0
16
0
Order By: Relevance
“…In order to ensure accuracy, both of these techniques require a uniform deployment and an average node degree greater than 100. Bi et al [1] present another statistical method that identifies boundary nodes because boundary nodes typically have smaller degrees than their 2-hop neighbors do.…”
Section: Related Workmentioning
confidence: 99%
“…In order to ensure accuracy, both of these techniques require a uniform deployment and an average node degree greater than 100. Bi et al [1] present another statistical method that identifies boundary nodes because boundary nodes typically have smaller degrees than their 2-hop neighbors do.…”
Section: Related Workmentioning
confidence: 99%
“…The holes are merged into a composite hole. The network is again flooded from the hole boundary nodes to find the network boundary (a) synchronising nodes before constructing the tree the network connectivity degree must be 11 or higher (b) flooding the network twice for holes and then network boundaries detection (c) merging holes Kroller [14] searches for flowers and then augments all the cycles until boundaries are reached (a) searching for flower structures (a) may not find a flower for network connectivity degree less than 10 (b) finding the 8-hop neighbours of every node (b) in random topology, the flower structure appears only for average network degree between 20-30 Saukh [15] searches for patterns nodes inside the pattern are considered as inner nodes (a) searching for patterns that may not always appear can work for minimum degree of 4 and 6, but requires 6-hop neighbourhood information to be accurate Bi [18] boundary nodes have smaller degrees than their 2-hop neighbours do (a) high exchange of messages between every node and its 2-hop neighbours during their cooperation to find the position of that node no information is available of the network connectivity degree required but the approach produces bad results for randomly deployed dense networks our proposed hop-based approach every node determines its x-hop neighbours. The connectivity of these neighbours is reviewed to create a communication path.…”
Section: Fundamentalsmentioning
confidence: 99%
“…Topological approaches [4,5,7,14,15,18] use the information on the connectivity of sensor nodes to detect holes and WSN boundaries. In this context, Funke and Klein [4] have presented an algorithm based on the idea of iso-levels each of which represents a set of nodes having the same hop distance from a specific root node [19].…”
Section: Related Workmentioning
confidence: 99%
“…Another issue in [9] is that the decision by one-hop information has higher variance, so Bi. et al [10] improved the threshold by averaging the number of one-hop neighboring nodes in the two-hop region. The algorithm proposed by Ghrist et al [11] detects the hole via homology.…”
Section: Introductionmentioning
confidence: 99%