Comparison between Existing and Proposed Method for Coverage Hole Detection and Recovery in WSN
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 10
Abstract
A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. Several problems occur in the WSN. They decreases efficiency of WSN. The coverage problem is one of the fundamental issue in WSN. In the paper, we propose an effective approach for coverage holes detection. The network is dividing into square shape zones .Every zone is the combination of several sensor nodes. Also patching nodes based algorithm is applied for the removal of holes. Simulation demonstrates that our algorithm can detect and recover coverage hole and guarantee full coverage with simplified manner.
Authors and Affiliations
Manisha Saini, Prashant Aggarwal
Design and Implementation of Area Efficient BPSK and QPSK Modulators Based On FPGA
Digital communications devices designed on FPGAs are capable of affording multiple communications protocols without the need to arrange new hardware, and can support new protocols in a matter of seconds. In addition, FP...
A Comparative Study of Contention-Based Mac Protocol for Wireless Sensor Network
Wireless sensor network has become a leading area of research because of its various applications such as environmental monitoring, target detection and tracking, health monitoring, industrial process monitoring, energy...
slugIs hedonism present in the purchase of academic books? An empirical analysis in online and traditional purchase methods
This paper examines hedonism in Indian consumer behaviour and its exploration in the consumer’s perceptions towards purchasing behaviour in the world of academic and non-academic books. This study also explores the fact...
Confidential and Efficient Query Service with RASP Data Perturbation in Cloud
Todays, people groups are widely utilized cloud computing foundations and infrastructure. So the end-user can save their expense and time by utilizing query services as a part of cloud. At the same time infrequently dat...
A Survey on Black Hole Attack Detection and Prevention Techniques
Mobile Ad Hoc Network can be defined as a system of self governing, independent mobile nodes that communicate over wireless links with no fixed infrastructure. Due to its fundamental characteristics like lack of fixed i...