<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462019000100185</article-id>
<article-id pub-id-type="doi">10.13053/cys-23-1-2815</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Node Position Estimation for Efficient Coverage Hole-Detection in Wireless Sensor Network]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[Smita]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Kanti DebBarma]]></surname>
<given-names><![CDATA[Mrinal]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,National Institute of Technology Department of Computer Science and Engineering ]]></institution>
<addr-line><![CDATA[Agartala Tripura]]></addr-line>
<country>India</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2019</year>
</pub-date>
<volume>23</volume>
<numero>1</numero>
<fpage>185</fpage>
<lpage>195</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462019000100185&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462019000100185&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462019000100185&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: In recent times, Wireless Sensor Networks (WSNs) have active involvement in diverse applications such as: environment monitoring, security &amp; surveillance, health care, precision agriculture, industrial applications and many more. Generally, sensor nodes are deployed randomly in such applications. Therefore, estimation of node location is a legitimate problem in WSNs, due to the fact that uncovered region can result in coverage-holes in the network. One state-of-art solution of this problem is Global Positioning System (GPS) but GPS based solution to localize a node might not be worthy due to the cost of extra hardware and power requirements. Therefore, a low cost solution to this problem might be Computational Geometry based approach to localize a node. In this paper, we first find out distance between Anchor Node (AN) and Unknown Node (UN) based on RSSI Profiling. Subsequently, the node location is estimated using Trilateration. Finally, a Delaunay Triangle is constructed on the basis of node location information. Then the property of empty circle is used to recognize whether coverage hole is present or not in the given ROI. Correctness of the algorithm is checked based on the simulations and theoretical proofs.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Sensor node localization]]></kwd>
<kwd lng="en"><![CDATA[GPS]]></kwd>
<kwd lng="en"><![CDATA[RSSI profiling]]></kwd>
<kwd lng="en"><![CDATA[coverage-hole]]></kwd>
<kwd lng="en"><![CDATA[empty circle property]]></kwd>
<kwd lng="en"><![CDATA[Delaunay triangulation]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alrajeh]]></surname>
<given-names><![CDATA[N. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bashir]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Shams]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Localization techniques in wireless sensor networks]]></article-title>
<source><![CDATA[International Journal of Distributed Sensor Networks]]></source>
<year>2013</year>
<volume>9</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>304628</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amgoth]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Jana]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Coverage hole detection and restoration algorithm for wireless sensor networks]]></article-title>
<source><![CDATA[Peer-to-Peer Networking and Applications]]></source>
<year>2017</year>
<volume>10</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>66-78</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barton]]></surname>
<given-names><![CDATA[R. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Performance capabilities of long-range uwb-ir tdoa localization systems]]></article-title>
<source><![CDATA[EURASIP Journal on Advances in Signal Processing]]></source>
<year>2007</year>
<volume>2008</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>236791</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Botta]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Simek]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adaptive distance estimation based on rssi in 802.15. 4 network]]></article-title>
<source><![CDATA[Radioengineering]]></source>
<year>2013</year>
<volume>22</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1162-8</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boukerche]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Fei]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A coverage-preserving scheme for wireless sensor network with irregular sensing range]]></article-title>
<source><![CDATA[Ad hoc networks]]></source>
<year>2007</year>
<volume>5</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1303-16</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chruszczyk]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zajac]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparison of indoor/outdoor, rssi-based positioning using 433, 868 or 2400 mhz ism bands]]></article-title>
<source><![CDATA[International Journal of Electronics and Telecommunications]]></source>
<year>2016</year>
<volume>62</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>395-9</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dai]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Lv]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel coverage holes discovery algorithm based on voronoi diagram in wireless sensor networks]]></article-title>
<source><![CDATA[International Journal of Hybrid Information Technology]]></source>
<year>2016</year>
<volume>9</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>273-82</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Faheem]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Virrankoski]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Elmusrati]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Improving rssi based distance estimation for 802.15. 4 wireless sensor networks]]></article-title>
<source><![CDATA[Wireless Information Technology and Systems (ICWITS), 2010 IEEE International Conference on]]></source>
<year>2010</year>
<page-range>1-4</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Farooq-i Azam]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ayyaz]]></surname>
<given-names><![CDATA[M. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Location and position estimation in wireless sensor networks]]></article-title>
<source><![CDATA[Wireless Sensor Networks: Current Status and Future Trends]]></source>
<year>2012</year>
<page-range>179</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grosicki]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Abed-Meraim]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new trilateration method to mitigate the impact of some non-line-of-sight errors in toa measurements for mobile localization]]></article-title>
<source><![CDATA[Acoustics, Speech, and Signal Processing, 2005. Proceedings.(ICASSP'05). IEEE International Conference on]]></source>
<year>2005</year>
<volume>4</volume>
<page-range>iv-1045</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar Sahoo]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chiang]]></surname>
<given-names><![CDATA[M.-J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[S.-L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An efficient distributed coverage hole detection protocol for wireless sensor networks]]></article-title>
<source><![CDATA[Sensors]]></source>
<year>2016</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>386</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel graphic coverage hole description in wireless sensor networks]]></article-title>
<source><![CDATA[IEEE Communications Letters]]></source>
<year>2014</year>
<volume>18</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>2205-8</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tree-based coverage hole detection and healing method in wireless sensor networks]]></article-title>
<source><![CDATA[Computer Networks]]></source>
<year>2016</year>
<volume>103</volume>
<page-range>33-43</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Coverage hole and boundary nodes detection in wireless sensor networks]]></article-title>
<source><![CDATA[Journal of network and computer applications]]></source>
<year>2015</year>
<volume>48</volume>
<page-range>35-43</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohanty]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Panigrahi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarma]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Satapathy]]></surname>
<given-names><![CDATA[S. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security issues in wireless sensor network data gathering protocols: A survey]]></article-title>
<source><![CDATA[Journal of Theoretical &amp; Applied Information Technology]]></source>
<year>2010</year>
<volume>13</volume>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oberholzer]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sommer]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Wattenhofer]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spiderbat: Augmenting wireless sensor networks with distance and angle information]]></article-title>
<source><![CDATA[Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on]]></source>
<year>2011</year>
<page-range>211-22</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patil]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Zaveri]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mds and trilateration based localization in wireless sensor network]]></article-title>
<source><![CDATA[Wireless Sensor Network]]></source>
<year>2011</year>
<volume>3</volume>
<numero>06</numero>
<issue>06</issue>
<page-range>198</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rahman]]></surname>
<given-names><![CDATA[M. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Hanuranto]]></surname>
<given-names><![CDATA[M. I. A. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Mayasari]]></surname>
<given-names><![CDATA[S. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Trilateration and iterative multilateration algorithm for localization schemes on wireless sensor network]]></article-title>
<source><![CDATA[Control, Electronics, Renewable Energy and Communications (ICCREC), 2017 International Conference on]]></source>
<year>2017</year>
<page-range>88-92</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hussain]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A top-down hierarchical multi-hop secure routing protocol for wireless sensor networks]]></article-title>
<source><![CDATA[International Journal of Ad hoc and Sensor and Ubiquitous Computing]]></source>
<year>2010</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stojmenovic]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of sensor networks: algorithms and architectures]]></source>
<year>2005</year>
<volume>49</volume>
<publisher-name><![CDATA[John Wiley &amp; Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ye]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Point in triangle testing based trilateration localization algorithm in wireless sensor networks]]></article-title>
<source><![CDATA[TIIS]]></source>
<year>2012</year>
<volume>6</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>2567-86</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
