Skip to main content

A Coverage Vulnerability Repair Algorithm Based on Clustering in Underwater Wireless Sensor Networks

Abstract

Topology control has drawn considerable attention in underwater wireless sensor networks. With the complexity of the underwater environment considered, the topological model of a three-dimensional dense network is adopted. The partition unit, cluster, and temporary control node are first defined. A clustering dormancy scheduling algorithm is then proposed. Accordingly, a vulnerability repair algorithm is presented with consideration of the vulnerability of sensor nodes to death due to external factors. The failure node, coverage vulnerability, coverage matrix, key position, and supplementary node are defined in the proposed algorithm. The algorithm also uses the coverage matrix and the vulnerability edge nodes to determine whether the overlay vulnerability requires repair. Experimental results indicate that this algorithm is more effective and efficient compared with similar algorithms.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

References

  1. 1.

    Han G, Long X, Zhu C, Guizani M, Zhang W (2019) A high-availability data collection scheme based on multi-AUVs for underwater sensor networks. IEEE Transactions on Mobile Computing. https://doi.org/10.1109/TMC.2019.2907854

  2. 2.

    Han G, Tang Z, He Y, Jiang J, Ansere J (2019) District partition-based data collection algorithm with event dynamic competition in underwater acoustic sensor networks. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2019.2912320

  3. 3.

    Han G, Shen S, Song H, Yang T, Zhang W (2018) A stratification-based data collection scheme in underwater acoustic sensor networks. IEEE Trans Vehicular Technol 67(11):10671–10682

    Article  Google Scholar 

  4. 4.

    Zhang W, Li L, Han G, Zhang L (2017) E2HRC: an energy-efficient heterogeneous ring clustering routing protocol for wireless sensor networks. IEEE ACCESS 5(2):1702–1713

    Article  Google Scholar 

  5. 5.

    Ahmed M, Salleh M, Channa M (2017) Routing protocols based on node mobility for underwater wireless sensor network (UWSN): a survey. J Netw Comput Appl 78:242–252

    Article  Google Scholar 

  6. 6.

    Lin C, Chen Y, Chen J, Deng D, Wang S, Jhong S (2017) Lifetime enhancement of dynamic heterogeneous wireless sensor networks with energy-harvesting sensors. Mobile Netw Appl 22(5):931–942

    Article  Google Scholar 

  7. 7.

    Zhang W, Wang J, Han G, Zhang X, Feng Y (2019) A cluster sleep-wake scheduling algorithm based on 3D topology control in underwater sensor networks. Sensors 19(1):1–25

    Article  Google Scholar 

  8. 8.

    Jiang J, Han G, Zhu C, Chan S, Rodrigues J (2017) A trust cloud model for underwater acoustic sensor networks. IEEE Commun Magazine 55(3):110–116

    Article  Google Scholar 

  9. 9.

    Han G, Long X, Zhu C, Guizani M, Bi Y, Zhang W (2019) An AUV location prediction-based data collection scheme for underwater wireless sensor networks IEEE Trans Vehicular Technol. https://doi.org/10.1109/TVT.2019.2911694

  10. 10.

    Zhang W, Liu Y, Han G, Feng Y, Zhao Y (2018) An energy efficient and QoS aware routing algorithm based on data classification for industrial wireless sensor networks. IEEE ACCESS 6(9):46495–46504

    Article  Google Scholar 

  11. 11.

    Hao K, Shen H, Liu Y, Wang B, Du X (2018) Integrating, localization, and energy-awareness: a novel geographic routing protocol for underwater wireless sensor networks. Mobile Netw Appl 23 (5):1427–1435

    Article  Google Scholar 

  12. 12.

    Jiang J, Han G, Shu L, Chan S, Wang K (2017) A trust model based on cloud theory in underwater acoustic sensor networks. IEEE Trans Industrial Inform 13(1):342–350

    Article  Google Scholar 

  13. 13.

    Feng X, Zhang X, Zhang J, Muhdhar A (2018) A coverage hole detection and repair algorithm in wireless sensor networks. Cluster Comput 5:1–8

    Google Scholar 

  14. 14.

    Xu Y, Zeng Z, Ding O (2015) An energy efficient hole repair node scheduling algorithm for WSN. Wireless Netw 23(1):1–14

    Article  Google Scholar 

  15. 15.

    So-In C, Nguyen T, Nguyen N (2019) An efficient coverage hole-healing algorithm for area-coverage improvements in mobile sensor networks. Peer-to-Peer Network Appl 12:541–552

    Article  Google Scholar 

  16. 16.

    Dang X, Ma R, Hao Z, Ma M (2017) An algorithm for hybrid nodes barrier coverage based on voronoi in wireless sensor networks, international conference of pioneering computer scientists. Engineers and Educators, pp 212–229

  17. 17.

    Sagar A, Lobiyal D (2013) Mobility based energy efficient coverage hole maintenance for wireless sensor network, vol 115. Springer, Berlin, pp 115–127

    Google Scholar 

Download references

Acknowledgements

The work is supported by the National Key Research and Development Program, No.2018YFC0407900, the National Natural Science Foundation of China under Grant No. 61971206, in part by Project of Fujian University of Technology, No. GY-Z19066, China Academy of Military Sciences Fund (2019), Liaoning BaiQianWan Talents Program (2017) .

Author information

Affiliations

Authors

Corresponding author

Correspondence to Guangjie Han.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Zhang, W., Han, G., Liu, Y. et al. A Coverage Vulnerability Repair Algorithm Based on Clustering in Underwater Wireless Sensor Networks. Mobile Netw Appl 26, 1107–1121 (2021). https://doi.org/10.1007/s11036-020-01621-4

Download citation

Keywords

  • UWSN
  • Vulnerability repair algorithm
  • Coverage matrix
  • Vulnerability edge nodes