Overlapping-Node Removal Algorithm Considering the Sensing Coverage of the Node in WSN

  • Doo-Wan Lee
  • Chang-Joon Kim
  • Kyung-Sik Jang
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 215)


In this paper, we propose Overlapping-node Removal Algorithm that utilizes the backup node to the detection of the nodes in the WSN sensing coverage overlapping node. Overlapping sensing coverage of the node that has a data network, energy efficiency is very low. In the proposed algorithm, the initial network connection each node to know the location information of neighbor nodes within their communication coverage, because according to the radius of the sensing coverage overlapping node may be able to identify. Overlapping node that occurs during the network tasks is changed to the standby-node until a specific event occurs, replace the fault node can improve the network lifetime.


Overlapping node Sensing coverage WSN Self-organization 


  1. 1.
    Lloret J, Farcia M, Bri D, Diaz JR (2009) A cluster-based architecture to structure the topology of parallel wireless sensor networks. Open Access Sens 9:10513–10544Google Scholar
  2. 2.
    Chen Y-S, Lo T-T, Ma W-C (2010) Efficient localization scheme based on coverage overlapping in wireless sensor networks. In: 5th international ICST conference on communications and networking in China (CHINACOM), 2010Google Scholar
  3. 3.
    Maraiya K, Kant K, Gupta N (2011) Application based study on wireless sensor network. Int J Comput Appl (0975–8887) 21(8):9–15Google Scholar
  4. 4.
    Iqbal M, Gondal I, Dooley LS (2007) HUSEC: a heuristic self configuration model for wireless sensor networks. Comput Commun Science Direct 30:1624–1640Google Scholar
  5. 5.
    Shirmohammadi MM, Chhardoli M, Faez K, (2009) CHEFC: cluster head election with full coverage in wireless sensor networks. In: Proceedings of the 2009 IEEE 9th Malaysia international conferenceGoogle Scholar
  6. 6.
    Kim C-J, Lee D-W, Jang K-S (2011) Fault tolerant routing algorithm using the backup-node in WSN. In: IEEK conferenceGoogle Scholar
  7. 7.
    Hussain S, Rahman MS (2009) Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks. In: SPIE Proceedings on data mining, intrusion detection, information assurance, and data networks security, Orlando, vol 7344Google Scholar
  8. 8.
    Smolau S (2009) Evaluation of the received signal strength indicator for node localization in wireless sensor networksGoogle Scholar
  9. 9.
    Ye Y, Hilaire V, Koukam A, Wandong C (2008) A cluster based hybrid architecture for wireless sensor networks. In: 2008 international symposium on information science and engineering, pp 297–302Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Korea University of Technology and Education Byeongcheon-myeonCheonan-siSouth Korea

Personalised recommendations