Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
11
Page No.
1655 - 1662
References
Ahmed, N., S.S. Kanhere and S. Jha, 2005. The holes problem in wireless sensor networks: A survey. ACM SIGMOBILE Mobile Comput. Commun. Rev., 9: 4-18.
CrossRef | Direct Link | Ammari, H.M. and S.K. Das, 2012. Centralized and clustered k-coverage protocols for wireless sensor networks. IEEE Trans. Comput., 61: 118-133.
CrossRef | Chang, C.Y., C.Y. Lin, G.J. Yu and C.H. Kuo, 2013. An energy-efficient hole-healing mechanism for wireless sensor networks with obstacles. Wirel. Commun. Mob. Comput., 13: 377-392.
CrossRef | Direct Link | Fang, Q., J. Gao and L.J. Guibas, 2006. Locating and bypassing holes in sensor networks. Mobile Network Appl., 11: 187-200.
CrossRef | Direct Link | Ghosh, A. and S.K. Das, 2008. Coverage and connectivity issues in wireless sensor networks: A survey. Pervasive Mobile Comput., 4: 303-334.
CrossRef | Direct Link | Gupta, H., Z. Zhou, S.R. Das and Q. Gu, 2006. Connected sensor cover: Self-organization of sensor networks for efficient query execution. IEEE. ACM. Trans. Networking, 14: 55-67.
CrossRef | Direct Link | Khedo, K., R. Doomun and S. Aucharuz, 2010. Reada: Redundancy elimination for accurate data aggregation in wireless sensor networks. Wirel. Sens. Network, 2: 300-308.
Direct Link | Kulothungan, K., S. Ganapathy, S.I. Gandhi, P. Yogesh and A. Kannan, 2012. Intelligent secured fault tolerant routing in wireless sensor networks using clustering approach. Int. J. Soft Comput., 6: 210-215.
CrossRef | Direct Link | Ram, S.S., D. Manjunath, S.K. Iyer and D. Yogeshwaran, 2007. On the path coverage properties of random sensor networks. Mob. Comput. IEEE. Trans., 6: 494-506.
CrossRef | Direct Link | Ren, H., X. Sun, Z. Ruan and B. Wang, 2011. An efficient scheme against node capture attacks using secure pairwise key for sensor networks. Inform. Technol. J., 10: 71-79.
CrossRef | Direct Link | Salehi, A.T. and A. Jadbabaie, 2010. Distributed coverage verification in sensor networks without location information. Autom. Control IEEE. Trans., 55: 1837-1849.
CrossRef | Direct Link | Senouci, M.R., A. Mellouk and K. Assnoune, 2014. Localized movement-assisted sensordeployment algorithm for holedetection and healing. Parallel Distrib. Syst. IEEE. Trans., 25: 1267-1277.
CrossRef | Direct Link | Sharma, S., R. Mishra and I. Kaur, 2011. New trust based security approach for Ad-Hoc networks. J. Mobile Commun., 5: 1-5.
Direct Link | Tseng, Y.C., P.Y. Chen and W.T. Chen, 2012. Angle object coverage problem in a wireless sensor network. Sensors J. IEEE., 12: 3408-3416.
CrossRef | Direct Link | Wang, B., 2011. Coverage problems in sensor networks: A survey. ACM. Comput. Surv., 43: 1-53.
CrossRef | Direct Link | Wang, M.Y. and X. Wang, 2005. A level-set based variational method for design and optimization of heterogeneous objects. Comput. Aided Des., 37: 321-337.
CrossRef | Direct Link | Wang, Y.C., C.C. Hu and Y.C. Tseng, 2005. Efficient deployment algorithms for ensuring coverage and connectivity of wireless sensor networks. Proceedings of the 1st International Conference on Wireless Internet, July 10-14, 2005, IEEE, Hsinchu, Taiwan, ISBN: 0-7695-2382-X, pp: 114-121.
Wenqing, C., L. Weimin, T. Yunmeng and Y. Zongkai, 2006. Research on the security in wireless sensor network. Asia J. Inform. Technol., 5: 339-345.
Direct Link | Yan, F., P. Martins and L. Decreusefond, 2014. Accuracy of homology based coverage hole detection for wireless sensor networks on sphere. Wirel. Commun. IEEE. Trans., 13: 3583-3595.
CrossRef | Direct Link | Yan, T., T. He and J. Stankovic, 2003. Differentiated surveillance for sensor networks. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Nov. 5-7, Los Angeles, California, USA., pp: 51-62.
Yangy, S., M. Liz and J. Wu, 2007. Scan-based movement-assisted sensor deployment methods in wireless sensor networks. IEEE. Trans. Parallel Distrib. Syst., 18: 1108-1121.
Direct Link | Yu, X., C. Wu, D. Chen and N. Hu, 2013. Level set based coverage holes detection and holes healing scheme in hybrid sensor network. Intl. J. Distrib. Sensor Networks, Vol. 2013,