Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0062

Self-Identification of Boundary's Nodes in Wireless Sensor Networks  

Moustafa, Kouider Elouahed (Dept. of Computer Sciences, University of Oran1 Ahmed Benbella)
Hafid, Haffaf (Dept. of Computer Sciences, University of Oran1 Ahmed Benbella)
Publication Information
Journal of Information Processing Systems / v.13, no.1, 2017 , pp. 128-140 More about this Journal
Abstract
The wireless sensor networks (WSNs) became a very essential tool in borders and military zones surveillance, for this reason specific applications have been developed. Surveillance is usually accomplished through the deployment of nodes in a random way providing heterogeneous topologies. However, the process of the identification of all nodes located on the network's outer edge is very long and energy-consuming. Before any other activities on such sensitive networks, we have to identify the border nodes by means of specific algorithms. In this paper, a solution is proposed to solve the problem of energy and time consumption in detecting border nodes by means of node selection. This mechanism is designed with several starter nodes in order to reduce time, number of exchanged packets and then, energy consumption. This method consists of three phases: the first one is to detect triggers which serve to start the mechanism of boundary nodes (BNs) detection, the second is to detect the whole border, and the third is to exclude each BN from the routing tables of all its neighbors so that it cannot be used for the routing.
Keywords
Boundary Recognition; Military Applications; Military Surveillance; Wireless Sensor Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 P. Antil and A. Malik, "Hole detection for quantifying connectivity in wireless sensor networks: a survey," Journal of Computer Networks and Communications, vol. 2014, article ID. 969501, 2014.
2 A. Varga, "The OMNeT++ discrete event simulation system," in Proceedings of the European Simulation Multiconference (ESM2001), Prague, Czech Republic, 2001, pp. 1-7.
3 M. Aissani, S. Bouznad, A. Hariza, and S. E. Allia, "An effective mechanism for handling open voids in wireless sensor networks," in Proceedings of the 5th International Conference on Sensor Technologies and Applications, Nice, France, 2011, pp. 24-29.
4 N. Senouci, M. K. El Ouahed, and H. Haffaf, "Detecting boundary nodes in WSN," in Proceedings of the International Conference on Wireless Networks (ICWN), Las Vegas, NV, 2014, pp. 47-52.
5 A. Varga, "OMNeT++," in Modeling and Tools for Network Simulation. Heidelberg: Springer, 2010, pp. 35-59.
6 A. Boulis, "Castalia: revealing pitfalls in designing distributed algorithms in WSN," in Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, Sydney, Australia, 2007, pp. 407-408.
7 B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, 2000, pp. 243-254.
8 A. S. K. Pathan, H. W. Lee, and C. S. Hong, "Security in wireless sensor networks: issues and challenges," in Proceedings of the 8th International Conference Advanced Communication Technology (ICACT), Phoenix Park, Korea, 2006.
9 T. T. Vu, V. D. Nguyen, and H. M. Nguyen, "An energy-aware routing protocol for wireless sensor networks based on k-means clustering," in AETA 2013: Recent Advances in Electrical Engineering and Related Sciences. Heidelberg: Springer, 2014, pp. 297-306.
10 A. Cerpa and D. Estrin, "ASCENT: adaptive self-configuring sensor networks topologies," IEEE Transactions on Mobile Computing, vol. 3, no. 3, pp. 272-285, 2004.   DOI
11 J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE Wireless Communications, vol. 11, no. 6, pp. 6-28, 2004.
12 Khan, H Mokhtar, and M. Merabti, "A new self-detection scheme for sensor network boundary recognition," in Proceedings of IEEE 34th Conference on Local Computer Networks, Zurich, Switzerland, 2009, pp. 241-244.
13 G. X. Wu, T. L. Huang, P. Liu, and X. Y. Zhou, "Boundary recognition by topological methods in wireless sensor networks," in Proceedings of IEEE Conference Anthology, China, 2013, pp. 1-5.
14 V. Sukumaran and T. P. Saravanabava, "Modified sensor deployment algorithm for hole detection and healing using NS2," International Journal of Engineering Research and Applications, vol. 4, no. 4, pp. 43-50, 2014
15 M. Aissani, S. Bouznad, S. E. Allia, and A. Hariza, "Efficient forwarding approach on boundaries of voids in wireless sensor networks," International Journal on Advances in Telecommunications, vol. 5, No. 3-4, pp. 2012.
16 Khan, H. Mokhtar, and M. Merabti, "A survey of boundary detection algorithms for sensor networks," in Proceedings of the 9th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, 2008, pp. 1-5.
17 W. Merrill, L. Girod, B. Schiffer, D. McIntire, G. Rava, K. Sohrabi, F. Newberg, J. Elson, and W. Kaiser, "Defense systems: self healing land mines," in Wireless Sensor Networks: A Systems Perspective. Boston, MA: Artech House; 2005, pp. 273-288.
18 M. P. Durisic, Z. Tafa, G. Dimic, and V. Milutinovic, "A survey of military applications of wireless sensor networks," in Proceedings of 2012 Mediterranean Conference on Embedded Computing (MECO), Bar, Montenegro, 2012, pp. 196-199.
19 R. Dulski, M. Kastek, P. Trzaskawka, T. Piatkowski, M. Szustakowski, and M. Zyczkowski, "Concept of data processing in multisensor system for perimeter protection," in Proceedings of SPIE 8019: Defense, Security, and Sensing. Bellingham, WA: International Society for Optics and Photonics, 2011.
20 Saukh, R. Sauter, M. Gauger, P. J. Marron, and K. Rothermel, "On boundary recognition without location information in wireless sensor networks," in Proceedings of International Conference on Information Processing in Sensor Networks, St. Louis, MO, 2008, pp. 207-218.
21 A. Boudhir, B. Mohamed, and B. A. Mohamed, "New technique of wireless sensor networks localization based on energy consumption," International Journal of Computer Applications, vol. 9, no. 12, pp. 25-28, 2010.
22 F. Yan, P. Martins, and L. Decreusefond, "Connectivity-based distributed coverage hole detection in wireless sensor networks," in Proceedings of IEEE Global Telecommunications Conference, Houston, TX, 2011, pp. 1-6.
23 A. Pal, "Localization algorithms in wireless sensor networks: current approaches and future challenges," Network Protocols and Algorithms, vol. 2, no. 1, pp. 45-73, 2010.
24 K. Y. Hsieh and J. P. Sheu, "Hole detection and boundary recognition in wireless sensor networks," in Proceedings of 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, Tokyo, Japan, 2009, pp. 72-76.
25 Zhang, Y. Zhang, and Y. Fang, "Detecting coverage boundary nodes in wireless sensor networks," in Proceedings of 2006 IEEE International Conference on Networking, Sensing and Control, Ft. Lauderdale, FL, 2006, pp. 868-873.