<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462020000100121</article-id>
<article-id pub-id-type="doi">10.13053/cys-24-1-3133</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Review on Coverage-Hole Boundary Detection Algorithms in Wireless Sensor Networks]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[Smita]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Debbarma]]></surname>
<given-names><![CDATA[Mrinal Kanti]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,National Institute of Technology Department of Computer Science and Engineering ]]></institution>
<addr-line><![CDATA[Agartala Tripura]]></addr-line>
<country>India</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2020</year>
</pub-date>
<volume>24</volume>
<numero>1</numero>
<fpage>121</fpage>
<lpage>140</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462020000100121&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462020000100121&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462020000100121&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Wireless sensor nodes are extremely useful in different security and surveillance related applications which may be compromised with the existence of coverage-holes. Coverage-hole is the area in a wireless sensor network (WSN) where sensing or transmitting of data is not achievable and therefore, detecting such region is a prominent research topic in WSN. Subsequent to hole-detection, another significant task is to detect the boundary nodes outlining the coverage-holes. In this paper, we have gone through different research articles describing the various boundary-detection techniques those have been recommended to facilitate hole-detection inside the sensor network. On the basis of the literature review, we have done categorization of the boundary-detection methods, their characteristics, pros &amp; cons and their effect on sensor network's performance for better understanding and future reference.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Sensor nodes]]></kwd>
<kwd lng="en"><![CDATA[wireless sensor network]]></kwd>
<kwd lng="en"><![CDATA[coverage-hole]]></kwd>
<kwd lng="en"><![CDATA[hole-detection algorithm]]></kwd>
<kwd lng="en"><![CDATA[hole-boundary detection]]></kwd>
<kwd lng="en"><![CDATA[network performance]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aliouane]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Benchaiba]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efficient boundary detection of coverage hole in wsns]]></article-title>
<source><![CDATA[Networks, Computers and Communications (ISNCC), 2016 International Symposium on]]></source>
<year>2016</year>
<page-range>1-6</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aslam]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Butler]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Constantin]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Crespi]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Cybenko]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Rus]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tracking a moving object with a binary sensor network]]></article-title>
<source><![CDATA[Proceedings of the 1st international conference on Embedded networked sensor systems]]></source>
<year>2003</year>
<page-range>150-61</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barton]]></surname>
<given-names><![CDATA[R. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rao]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Performance capabilities of long-range uwb-ir tdoa localization systems]]></article-title>
<source><![CDATA[EURASIP Journal on Advances in Signal Processing]]></source>
<year>2007</year>
<volume>2008</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>236791</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beghdad]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Lamraoui]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Boundary and holes recognition in wireless sensor networks]]></article-title>
<source><![CDATA[Journal of Innovation in Digital Ecosystems]]></source>
<year>2016</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chakrabarty]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Iyengar]]></surname>
<given-names><![CDATA[S. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Qi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Cho]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Grid coverage for surveillance and target location in distributed sensor networks]]></article-title>
<source><![CDATA[IEEE transactions on computers]]></source>
<year>2002</year>
<volume>51</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>1448-53</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[DebBarma]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hole detection in wireless sensor network: A review]]></article-title>
<source><![CDATA[Recent Findings in Intelligent Computing Techniques]]></source>
<year>2018</year>
<page-range>87-96</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Debbarma]]></surname>
<given-names><![CDATA[M. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey on coverage problems in wireless sensor network based on monitored region]]></article-title>
<source><![CDATA[In Advances in Data and Information Sciences]]></source>
<year>2019</year>
<page-range>349-59</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Das]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kanti DebBarma]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Computational geometry based coverage hole-detection and hole-area estimation in wireless sensor network]]></article-title>
<source><![CDATA[Journal of High Speed Networks]]></source>
<year>2018</year>
<volume>24</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>281-96</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[de Morais Cordeiro]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Agrawal]]></surname>
<given-names><![CDATA[D. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ad hoc and sensor networks: theory and applications]]></source>
<year>2011</year>
<publisher-name><![CDATA[World Scientific]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Enge]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The global positioning system: Signals, measurements, and performance]]></article-title>
<source><![CDATA[International Journal of Wireless Information Networks]]></source>
<year>1994</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>83-105</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Guibas]]></surname>
<given-names><![CDATA[L. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Locating and bypassing holes in sensor networks]]></article-title>
<source><![CDATA[Mobile networks and Applications]]></source>
<year>2006</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>187-200</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fekete]]></surname>
<given-names><![CDATA[S. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Kaufmann]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kröller]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Lehmann]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[A new approach for boundary recognition in geometric sensor networks]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Greenspan]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Welsh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Juang]]></surname>
<given-names><![CDATA[R. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Alm]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Vital signs monitoring and patient tracking over a wireless network]]></article-title>
<source><![CDATA[Engineering in Medicine and Biology Society, 2005. IEEE-EMBS 2005. 27th Annual International Conference of the]]></source>
<year>2006</year>
<page-range>102-5</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ghosh]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gasparri]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Krishnamachari]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Distributed hole detection algorithms for wireless sensor networks]]></article-title>
<source><![CDATA[Mobile Ad Hoc and Sensor Systems (MASS), 2014 IEEE 11th International Conference on]]></source>
<year>2014</year>
<page-range>257-61</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grosicki]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Abed-Meraim]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A new trilateration method to mitigate the impact of some non-line-of-sight errors in toa measurements for mobile localization]]></article-title>
<source><![CDATA[Acoustics, Speech, and Signal Processing, 2005. Proceedings.(ICASSP'05). IEEE International Conference on]]></source>
<year>2005</year>
<page-range>iv-1045</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hsieh]]></surname>
<given-names><![CDATA[K.-Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Sheu]]></surname>
<given-names><![CDATA[J.-P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hole detection and boundary recognition in wireless sensor networks]]></article-title>
<source><![CDATA[Personal, Indoor and Mobile Radio Communications, 2009 IEEE 20th International Symposium on]]></source>
<year>2009</year>
<page-range>72-6</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Recognizing boundaries in wireless sensor networks based on local connectivity information]]></article-title>
<source><![CDATA[International Journal of Distributed Sensor Networks]]></source>
<year>2014</year>
<volume>10</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>897039</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jing]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Kong]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Kong]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Boundary detection method for large-scale coverage holes in wireless sensor network based on minimum critical threshold constraint]]></article-title>
<source><![CDATA[Journal of Sensors]]></source>
<year>2014</year>
<volume>2014</volume>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kang]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Xiong]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detection and recovery of coverage holes in wireless sensor networks]]></article-title>
<source><![CDATA[Journal of Networks]]></source>
<year>2013</year>
<volume>8</volume>
<numero>4</numero>
<issue>4</issue>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kanno]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Buchart]]></surname>
<given-names><![CDATA[J. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Selmic]]></surname>
<given-names><![CDATA[R. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Phoha]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting coverage holes in wireless sensor networks]]></article-title>
<source><![CDATA[2009 17th Mediterranean Conference on Control and Automation]]></source>
<year>2009</year>
<page-range>452-7</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kar]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Banerjee]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Node placement for connected coverage in sensor networks]]></article-title>
<source><![CDATA[WiOpt'03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks]]></source>
<year>2003</year>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[I. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jabeur]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Zeadally]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hop-based approach for holes and boundary detection in wireless sensor networks]]></article-title>
<source><![CDATA[IET Wireless Sensor Systems]]></source>
<year>2012</year>
<volume>2</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>328-37</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Khedr]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Attia]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New holes and boundary detection algorithm for heterogeneous wireless sensor networks]]></article-title>
<source><![CDATA[International Journal of Communication Networks and Information Security (IJCNIS)]]></source>
<year>2018</year>
<volume>10</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kröller]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Fekete]]></surname>
<given-names><![CDATA[S. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Pfisterer]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Fischer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deterministic boundary recognition and topology extraction for large sensor networks]]></article-title>
<source><![CDATA[Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm]]></source>
<year>2006</year>
<page-range>1000-9</page-range><publisher-name><![CDATA[Society for Industrial and Applied Mathematics]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kumar Sahoo]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chiang]]></surname>
<given-names><![CDATA[M.-J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[S.-L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An efficient distributed coverage hole detection protocol for wireless sensor networks]]></article-title>
<source><![CDATA[Sensors]]></source>
<year>2016</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>386</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Tree-based coverage hole detection and healing method in wireless sensor networks]]></article-title>
<source><![CDATA[Computer networks]]></source>
<year>2016</year>
<volume>103</volume>
<page-range>33-43</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Coverage hole and boundary nodes detection in wireless sensor networks]]></article-title>
<source><![CDATA[Journal of network and computer applications]]></source>
<year>2015</year>
<volume>48</volume>
<page-range>35-43</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Hunter]]></surname>
<given-names><![CDATA[D. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Distributed coordinate-free hole recovery]]></article-title>
<source><![CDATA[Communications Workshops, 2008. ICC Workshops' 08. IEEE International Conference on]]></source>
<year>2008</year>
<page-range>189-94</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Darabi]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Banerjee]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Survey of wireless indoor positioning techniques and systems]]></article-title>
<source><![CDATA[IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)]]></source>
<year>2007</year>
<volume>37</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1067-80</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lorincz]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Malan]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Fulford-Jones]]></surname>
<given-names><![CDATA[T. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Nawoj]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Clavel]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Shnayder]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Mainland]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Welsh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Moulton]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sensor networks for emergency response: challenges and opportunities]]></article-title>
<source><![CDATA[IEEE pervasive Computing]]></source>
<year>2004</year>
<numero>4</numero>
<issue>4</issue>
<page-range>16-23</page-range></nlm-citation>
</ref>
<ref id="B31">
<label>31</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mistry]]></surname>
<given-names><![CDATA[H. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Mistry]]></surname>
<given-names><![CDATA[N. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Rssi based localization scheme in wireless sensor networks: a survey]]></article-title>
<source><![CDATA[Advanced Computing &amp; Communication Technologies (ACCT), 2015 Fifth International Conference on]]></source>
<year>2015</year>
<page-range>647-52</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<label>32</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oberholzer]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Sommer]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Wattenhofer]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Spiderbat: Augmenting wireless sensor networks with distance and angle information]]></article-title>
<source><![CDATA[Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on]]></source>
<year>2011</year>
<page-range>211-22</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<label>33</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ratnasamy]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Karp]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Shenker]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Estrin]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Govindan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Yin]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Data-centric storage in sensornets with ght, a geographic hash table]]></article-title>
<source><![CDATA[Mobile networks and Applications]]></source>
<year>2003</year>
<volume>8</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>427-42</page-range></nlm-citation>
</ref>
<ref id="B34">
<label>34</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ratnasamy]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Karp]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Yin]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Estrin]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Govindan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Shenker]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ght: a geographic hash table for data-centric storage]]></article-title>
<source><![CDATA[Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications]]></source>
<year>2002</year>
<page-range>78-87</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<label>35</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Roman]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lopez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Applying intrusion detection systems to wireless sensor networks]]></article-title>
<source><![CDATA[IEEE Consumer Communications &amp; Networking Conference (CCNC 2006)]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B36">
<label>36</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Senouci]]></surname>
<given-names><![CDATA[M. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mellouk]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Assnoune]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Localized movement-assisted sensorde-ployment algorithm for holedetection and healing]]></article-title>
<source><![CDATA[IEEE Transactions on parallel and distributed systems]]></source>
<year>2014</year>
<volume>25</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1267-77</page-range></nlm-citation>
</ref>
<ref id="B37">
<label>37</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Staddon]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Balfanz]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Durfee]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efficient tracing of failed nodes in sensor networks]]></article-title>
<source><![CDATA[Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications]]></source>
<year>2002</year>
<page-range>122-30</page-range><publisher-name><![CDATA[ACM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<label>38</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wan]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Coverage hole bypassing in wireless sensor networks]]></article-title>
<source><![CDATA[The Computer Journal]]></source>
<year>2017</year>
<volume>60</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1536-44</page-range></nlm-citation>
</ref>
<ref id="B39">
<label>39</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[J. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Boundary recognition in sensor networks by topo-logical methods]]></article-title>
<source><![CDATA[Proceedings of the 12th annual international conference on Mobile computing and networking]]></source>
<year>2006</year>
<page-range>122-33</page-range><publisher-name><![CDATA[ACm]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<label>40</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yan]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Martins]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Decreusefond]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Connectivity-based distributed coverage hole detection in wireless sensor networks]]></article-title>
<source><![CDATA[Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE]]></source>
<year>2011</year>
<page-range>1-6</page-range><publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<label>41</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yu]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Govindan]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Estrin]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Geographical and energy aware routing: A recursive data dissemination protocol for wireless sensor networks]]></source>
<year>2001</year>
</nlm-citation>
</ref>
<ref id="B42">
<label>42</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Qi]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Ren]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estimation and healing of coverage hole in hybrid sensor networks: A simulation approach]]></article-title>
<source><![CDATA[Sustainability]]></source>
<year>2017</year>
<volume>9</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1733</page-range></nlm-citation>
</ref>
<ref id="B43">
<label>43</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hou]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Maintaining sensing coverage and connectivity in large sensor networks]]></article-title>
<source><![CDATA[Ad Hoc &amp; Sensor Wireless Networks]]></source>
<year>2005</year>
<volume>1</volume>
<numero>1-2</numero>
<issue>1-2</issue>
<page-range>89-124</page-range></nlm-citation>
</ref>
<ref id="B44">
<label>44</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[L.-H.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Lei]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Tan]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Detecting boundary nodes and coverage holes in wireless sensor networks]]></article-title>
<source><![CDATA[Mobile Information Systems]]></source>
<year>2016</year>
<volume>2016</volume>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
