ScienceDirect. Neighbor Adjacency based Hole Detection Protocol for Wireless Sensor Networks

Similar documents
Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Sensor Deployment Algorithm for Hole Detection and Healing By Using Local Healing

QoS-Enabled Video Streaming in Wireless Sensor Networks

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Context-aware Geographic Routing for Sensor Networks with Routing Holes

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Energy Aware Location Based Routing Protocols in Wireless Sensor Networks

Geographic Routing in Simulation: GPSR

New Active Caching Method to Guarantee Desired Communication Reliability in Wireless Sensor Networks

Mobile Agent Driven Time Synchronized Energy Efficient WSN

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

Available online at ScienceDirect. Procedia Computer Science 46 (2015 )

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Available online at ScienceDirect. Procedia Computer Science 89 (2016 )

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

A Survey on Routing Protocols and Challenge of Holes in Wireless Sensor Networks

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

Available online at ScienceDirect. Procedia Computer Science 54 (2015 ) 7 13

Literature Review on Hole Detection and Healing in Wireless Sensor Network

Energy Aware and Anonymous Location Based Efficient Routing Protocol

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Location Based Energy-Efficient Reliable Routing Protocol for Wireless Sensor Networks

Data-Centric Query in Sensor Networks

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

ScienceDirect. Analogy between immune system and sensor replacement using mobile robots on wireless sensor networks

Figure 1: Ad-Hoc routing protocols.

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

Available online at ScienceDirect. Procedia Computer Science 92 (2016 )

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Performance of DSDV Protocol over Sensor Networks

An efficient implementation of the greedy forwarding strategy

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

PERFORMANCE EVALUATION OF HOLE AVOIDANCE TECHNIQUES IN GEOGRAPHIC FORWARDING FOR MOBILE AD HOC NETWORKS

3. Evaluation of Selected Tree and Mesh based Routing Protocols

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Available online at ScienceDirect. Procedia Computer Science 34 (2014 )

Detection of Holes in Wireless Sensor Networks by Distributed Hole Detection Algorithm

Fig. 2: Architecture of sensor node

EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Routing Protocols in MANETs

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Balanced Load Sharing Protocol for Wireless Sensor Networks

Reliable Routing In VANET Using Cross Layer Approach

The Impact of the Number of Nodes, Speed of Nodes, Speed of Network and the Network Space to the Number of Nodes keeps Alive

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Simulations of the quadrilateral-based localization

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Energy Aware Node Placement Algorithm for Wireless Sensor Network

Energy Efficient EE-DSR Protocol for MANET

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Rumor Routing Algorithm

EFFICIENT DATA TRANSMISSION AND SECURE COMMUNICATION IN VANETS USING NODE-PRIORITY AND CERTIFICATE REVOCATION MECHANISM

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

A Survey - Energy Efficient Routing Protocols in MANET

COMPARISON OF ENERGY EFFICIENT DATA TRANSMISSION APPROACHES FOR FLAT WIRELESS SENSOR NETWORKS

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Available online at ScienceDirect. Procedia Computer Science 94 (2016 )

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Hole Detection and Boundary Recognition in Wireless Sensor Networks

A Localized Algorithm for Reducing the Size of Dominating Set in Mobile Ad Hoc Networks

PROJECT REPORT VIRTUAL COORDINATE GENERATOR AND ROUTING SIMULATION TOOL FOR WIRELESS SENSOR NETWORKS IN 2 AND 3-DIMENSIONAL NETWORK SPACE

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

Defending MANET against Blackhole Attackusing Modified AODV

References. Forwarding. Introduction...

Chapter 11 Chapter 6

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

Lecture 8 Wireless Sensor Networks: Overview

Available online at ScienceDirect. Procedia Computer Science 89 (2016 )

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments

MultiHop Routing for Delay Minimization in WSN

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Zonal Rumor Routing for. Wireless Sensor Networks

Transcription:

Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 79 (2016 ) 866 874 7th International Conference on Communication, Computing and Virtualization 2016 Neighbor Adjacency based Hole Detection Protocol for Wireless Sensor Networks Pearl Antil a, Amita Malik b, Sanjay Kumar c a,b DCR University of Science and Technology, Murthal, Sonepat-131039, Haryana, India c SRM University Haryana, Sonepat-131038, India a pearl.comfy@gmail.com, b amitamalik.cse@dcrustm.org, c skmalik9876@gmail.com Abstract Coverage and communication holes may appear in sensor networks due to limited battery life, presence of obstacles and physical destruction of nodes. These holes have a negative impact on the network performance. In order to ensure that optimum area in sensing field is covered by sensors, coverage holes must be detected. This paper proposes an adaptive routing algorithm based on neighbor adjacency for detecting coverage holes in sensor networks. Proposed algorithm can compute location of holes in the network from remote locations based on hop count measure computed from network statistics. Simulation results show that algorithm gives better performance in terms of end to end delay and packet delivery fraction as compared to previous works. Simplicity and efficiency are the key features that distinguish this work from existing routing and hole detection schemes. 2016 The The Authors. Authors. Published Published by Elsevier by Elsevier B.V. B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under responsibility of the Organizing Committee of ICCCV 2016. Peer-review under responsibility of the Organizing Committee of ICCCV 2016 Keywords: Wireless Sensor Network; Hole detection; Routing; Neighbor Adjacency 1. Introduction In Wireless Sensor Networks (WSNs), surveillance quality is dependent on coverage of a given target area. The sensing range of sensor nodes is limited by several resource constraints such as limited battery and processing power, small amount of memory and limited communication and computation capabilities [1]. Thus, a large number of sensors are deployed in the target region which collaborates to ensure complete coverage [2]. Coverage requirement is application dependent. Battlefield surveillance applications may want a region to be monitored by multiple sensors simultaneously to make system more resilient to failures while there may be some applications such as habitat monitoring that need low degree of coverage. With passage of time some of the nodes may exhaust their Corresponding author. Tel.+91-9416315432 E-mail address: skmalik9876@gmail.com 1877-0509 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Peer-review under responsibility of the Organizing Committee of ICCCV 2016 doi:10.1016/j.procs.2016.03.089

Pearl Antil et al. / Procedia Computer Science 79 ( 2016 ) 866 874 867 energy or may be destroyed by some exogenous disturbances leading to formation of coverage holes in the network [3]. Random deployment of nodes further aggravates the problem of coverage holes in WSNs. In order to prevent expansion of such holes in network, they must be detected. Moreover, holes provide significant information about geographic characteristics of target region [4]. They help in identifying damaged and inaccessible nodes in the network. Hole detection in WSN is one of the major challenges faced by researchers. In this paper, a novel and efficient method for adaptive routing and coverage monitoring is proposed. Proposed algorithm can compute location of holes in network from remote locations based on hop count measure computed from network statistics. The most alluring feature of the proposed protocol is that it uses only basic data traffic information to detect coverage holes in the network. The rest of paper is organized as follows: Section II presents related work. Section III details our proposed algorithm. In Section IV, results of extensive simulations are discussed. In Section V, we conclude with a summary of the contributions of this paper and present a preview of future research. 2. Related Works Geographic routing is a Hop by Hop routing where decisions are made on each hop. Each node upon receiving the packet consults its neighbor table and selects the most promising neighbor as the next hop. This process repeats until packet reaches the destination [5]. Two of the simplest geographic routing schemes are Greedy Forwarding and Face routing [6]. In Greedy forwarding, a node forwards packet to a neighboring node that is closer to destination than itself. Such routing scheme gets stuck in Local Minimum Problem. Face routing is an alternative to greedy forwarding where routing advances along the faces of planar graph and along the line joining source and destination. To improve upon basic greedy scheme, Karp and Kung proposed Greedy Perimeter Stateless Routing (GPSR). In this scheme Perimeter routing is introduced to route around stuck nodes in Local minimum problem. [7]. Some of the other Geographic routing algorithms are presented in [8-10]. Several works have addressed the issue of coverage hole detection in WSNs. Kun Bi et al. [11] used the basic fact that neighbors of a node sitting on hole boundary will always be less in number than other nodes which are well connected from all directions. There is huge communication overhead involved in this scheme. Peter Corke et al. [12] presented two distributed coverage hole detection schemes namely, local and global. In Local detection, a ping request is send by each node to collect its neighbor information. If acknowledgement is received then it is added to neighbor table. Thereafter, neighbors are pinged at regular intervals to verify connectivity. If no reply is received from a neighbor then it is considered as dead and is added to a list of dead nodes. When number of dead nodes surpass dead threshold, then node mark itself as hole boundary node. In global detection scheme, a randomly selected node broadcast a diagnostic packet in the network. When packet arrives at destination, the straight line distance from source to destination is divided by actual distance travelled by packet to get path density. If path density value is below threshold then a hole is present in the network. Jianjun et al. proposed HDAR [13] algorithm for adaptive routing and hole detection. When angle spanned by adjacent edges of a node becomes greater than 120 degrees [14], then node begins hole detection procedure. The location of hole is advertised to neighboring nodes so than they can avoid such paths. Babaie et al. [15] created a triangle like structure by joining centers of every three adjacent nodes. Some mathematical calculations helped to identify the area inside triangle which is not covered by sensing range of these three nodes. This exposed area is called hole [16]. 3. Neighbor Adjacency Based Adaptive Routing In this section, we state our assumptions, Neighbor Adjacency based Adaptive Routing algorithm (NA2R) and describe working of our algorithm for detecting holes in WSNs. 3.1. Assumptions We assume that sensor network is deployed in controlled manner with the goal to form grid topology. Unit length of grid is known to all nodes in the network. Nodes are static and each sensor is assumed to be geographically localized through some localization mechanisms. The assumptions regarding neighbors of a node are as follows:

868 Pearl Antil et al. / Procedia Computer Science 79 ( 2016 ) 866 874 A node S at coordinates (x, y) has four horizontal and vertical neighbors whose coordinates is given by [(x + 1, y), (x - 1, y), (x, y +1),(x, y -1)] This set of nodes, called 4-neighbors of p, is denoted by N4(S). The four diagonal neighbors of S, denoted by N D (S) have coordinates [(x + 1, y + 1), (x + 1, y - 1), (x - 1, y + 1), (x - 1, y -1)] This set of N D neighbors together with 4-neighbors is called 8-neighbors of S, denoted by N 8 (S). Two neighbors N1 and N2 are 8-adjacent if N2 is in N 8 (N1). Figure 1 shows N 8 (S) where four nodes in blue represent N4 (S) and those in red represent ND (S). Fig 1: 8 Adjacent neighbors of node S Each node maintains an eight-adjacency table (N 8 table). Each entry in adjacency table contains neighbor id (NID), neighbor location (NLOC) and neighbor state (NST). Node transmission range allows communication with direct neighbors only. 3.2. Routing Scheme The first step is to establish an optimal path to route data packets to all interested sink. There can be multiple paths available from a given source to sink but the real challenge is to find best path for routing. Various parameters such as maximum delay, minimum hop count or maximum residual energy can be used to evaluate the optimality of apath. In the Proposed scheme, optimal path istheoneinwhichrequires minimum number of hops to be traversed. The proposed routing algorithm is inspired from the concept of Neighbor adjacency often used in Image Processing. The routing algorithm is divided into three sub-schemes N 4,N D and N X routing depending on location of Source and Sink as shown in Figure 2. Priority is given to a routing sub-scheme which will route the packet in minimum number of hops. If source and sink are on same axis i.e. Case A and B, then N 4 routing is followed. If source and sink lies on same diagonal i.e. Case C then N D routing is used. If nodes are neither on same axisnoronsame diagonal, then N x routing is followed. The proposed routing algorithm for all these cases is further explained with the help of flowcharts. N 4 routing: When source and destination are on same axis, N 4 routing is given preference over N D routing. When source and destinationareonsamevertical axis,thensource node will compareits ycoordinate with that of destination. If Sy is less than Dy then node will increment Sy and will send the packet to a node present at newly computed location (Sx, Sy) and will waitfor the acknowledgement as shown in Figure 3. If Acknowledgement is received, then actual hop count field will be incremented and further node will check whether packet has reached the destination or not. The procedure will repeat itself until packet reaches the destination. If the next hop N 4 neighbor is dead then acknowledgement is not received. Algorithm will nowcheck status of Hflag (Hole detection flag). If false, then Hflag issettotrue and node consults its eight neighbor adjacencytablesoastosendpackettoan D neighbor whichisnearest to sink using the procedure Next_Fithop. Next_Fithop (Ix, Iy, Dx, Dy) Compute D = max ( Dx Ix, Dy Ix ) Send packet to a node having minimum D value If two nodes have same D values then choose one randomly. The above procedure will make sure that packet

Pearl Antil et al. / Procedia Computer Science 79 ( 2016 ) 866 874 869 reaches the destination even in presence of holes or voids in the network. Similarly, we can route the packet when source and destination are on the same horizontal axis. Figure 2: Routing sub-schemes Figure 3: N 4 routing N D routing: In case where source and destination are on same diagonal then ND routing is given priority. The working of ND routing is described in Figure 4. If ND routing fails (no acknowledgement received) then algorithm switches to N4 routing where packet is forwarded to a N4 neighbor who is nearest to sink using the procedure Next_Fithop. This time Procedure is repeated with a slight difference i.e N X routing: When source and destination are neither on same axis nor on same diagonal, then NX routing is followed. In N x routing sub-scheme, packet is first routed diagonally until it reaches a tentative target as shown in Figure 5. After reaching tentative target, algorithm switches to N4 routing. There may be a case when multiple with optimal hop count exist between a given Source Sink pair. To make sure that packet initially opts for ND routing, a tentative target is given to the source. The location of the tentative target represents the maximum distance up to which ND routing can be followed without compromising with the goal of the shortest path. In Nx routing, after computing the tentative target, packet is first routed to tentative destination using ND routing and then from location of tentative destination to actual destination, it follows N4 routing. The next step is to identify optimal number of hops for a given source sink pair. The optimal number of hops for all the above discussed cases can be calculated as given below:

870 Pearl Antil et al. / Procedia Computer Science 79 ( 2016 ) 866 874 Fig 4: N D routing Figure 5: Nx routing without holes 3.3. Hole Detection Scheme There can be two cases which identify whether there is a hole in the network or not. These two cases are discussed below: Condition 1: Hop count measure When the packet reaches destination, then actual hop count is compared with the optimal hop count. If actual hop count is found greater, implies packet was forced to travel a longer path. Due to presence of holes, packet has to adjust its path at the expense of greater hop count. Condition 2: Status of Hflag

Pearl Antil et al. / Procedia Computer Science 79 ( 2016 ) 866 874 871 As we have seen in the routing scheme, when a node send a packet to the next hop, but no acknowledgement is received in return then status of Hflag (Hole Detection flag) is set to be true. Now, algorithm reverts the routing scheme e.g. if old_next hop was N4 neighbor then it will now transmit packet to a ND neighbor which is nearest to Sink. This Hflag will guard against holes present on multiple paths between a given Source sink pair all having optimal hop count. If any of the above conditions is found to be true, then a hole detection query will be sent on the same path to check connectivity of all neighbors of nodes present on that path. Each node upon receiving the hole detection query verifies the connectivity of nodes present in its eight adjacency table. Location of neighbors which are no longer connected will be reported to base station. In this way, a hole detection is initiated only when a hole is present in network thereby reducing unnecessary overhead on the resource constrained sensor networks. Proposed algorithm can also detect the open holes present at the network boundaries. Fig 6: Nx routing 4. SIMULATION RESULTS In order to evaluate the efficiency and accuracy of our proposed algorithm, it is simulated in NS 2.34. Solution is applied to grid topology. This, in part, is fuelled by our belief that a realistic deployment of sensor networks is not always random. There are many applications where grid topology is best suited as sensors deployed in grid pattern gives best coverage ratio with a fixed number of sensors. Several simulations were conducted with simulation parameters as shown in Table 1. Table 1: Simulation Parameters Parameter Network Topology Grid Size Traffic Type Radio Propagation Model Transmission Range Value Grid 7x7, 10x10, 14x14 CBR Two Ray Ground Model 250 meters

872 Pearl Antil et al. / Procedia Computer Science 79 ( 2016 ) 866 874 Mobility Model Random Waypoint Mobility Model MAC Type 802.11 Routing Protocols AODV, NA2R Simulation time 500 seconds Workload (packets/sec) 2, 4, 8, 10 We compare performance of NA2R with AODV (Ad-hoc On Demand Distance Vector routing protocol) using two metrics, Packer Delivery fraction (pdf) i.e. the ratio of number of packets received at the destination to the number of packets sent from the source and End to End Delay i.e. time taken by a packet to route through the network from a source to its destination. Figure 7 represents how packet delivery fraction varies with the workload for both the protocols. Workload is the number of traffic streams flowing through the system. When workload is 2, performance of both the protocols is almost similar. As the workload is increased, contentions for medium increases due to which some of the packets are dropped. As a result, packet delivery fraction of both the protocols decreases, but NA2R has an edge over AODV for higher workloads. With the increase in workload, more of nodes exhaust their energy thus, increasing the number of holes in the network. NA2R make sure that packets are delivered to the destination by elegantly adjusting its path in presence of holes and opting for the next available shortest path in the network. Fig 7:pdf vs. workload for 7x7 Grid Fig 8: pdf vs. workload for 10x10 Grid Fig 9: pdf vs. workload for 14x14 Grid Significant improvement in performance of NA2R is seen for larger grid size as shown in Figure 8 and 9. In both the figures, AODV performs better for lightly loaded networks while NA2R leads as the workload is increased. With increase in grid size, control packets in the network is increased which has a negative impact on pdf of the network. This explains the decrease in pdf for both the protocols. Moreover, the number of dead nodes in the network also increases which further affects the pdf. Fig 10: eed vs. workload for 7x7 Grid Fig 11:eed vs. workload for 10x10 Grid Fig 12: eed vs. workload for 14x14 Grid Figure 10 represents end to end delay vs. workload for grid size 7x7. Delay incurred in case of NA2R is very low as compared to AODV. This is explained by the fact that packet is always forwarded in the direction of destination in NA2R. Localized forwarding process in NA2R leads to faster reaction and therefore avoids delays.

Pearl Antil et al. / Procedia Computer Science 79 ( 2016 ) 866 874 873 NA2R consistently outperforms AODV even for larger grid sizes as shown in Figure 11 and 12. There is an increase in end to end delay in NA2R under highest workload, though it is still low as compared to AODV. Nodes in NA2R use broadcasting only to inform their one hop neighbours about their locations while AODV floods RREQ and RREP packets in the network. Therefore, there is low routing overhead in case of NA2R. Proposed algorithm always forwards the packets on the shortest path in the network and thus, incurs low delay. Finally, the obtained results allow us to assert that NA2R is a robust routing scheme which incurs minimum end to end delay for all the configurations and workloads as compared to AODV. As far as packet delivery fraction is concerned, NA2R performs well as the workload is increased. 5. CONCLUSION We have demonstrated a technique for adaptive routing and hole detection in WSNs that is completely decentralized. Every node needs to communicate with only those nodes that are within its communication range, thus asynchronous. Hole detection is global as information about holes is extracted from underlying routing mechanism. There is very low communication overhead as compared to other existing approaches. Routing algorithms make sure that packet always follow the shortest path available and results in less number of hops. Protocol is well suited for in-door industrial applications where nodes can be manually placed and data can be routed on pre-determined paths. Simulation results show that algorithm gives better performance in terms of e2e delay and packet delivery fraction as compared to previous works. Future work will focus on an optimal hole healing process as well as estimating size of the holes. Acknowledgements The authors would like to thank University Grants Commission (UGC), Government of India, India for providing the financial assistance for this work under grant number 41-626/2012 (SR). References 1. Akyildiz, W. Su, Y. Sankarasubramaniam, and E.Cayirci, A survey on Sensor Networks, IEEE Communications Magazine, vol. 40, Issue: 8, pp. 102-114, August 2002. 2. S. Kalantary and S. Taghipour, A survey on architectures, protocols, applications and management in wireless sensor networks, Journal of Advanced Computer Science and Technology, 2014 3. N. Ahmed, S. S. Kanhere and S. Jha, The Holes Problem in Wireless Sensor Networks:A Survey, ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 9 Issue 2, April 2005 Pages 4-18 4. Q. Fang, J. Gao and L.J. Guibas, Locating and bypassing holes in sensor networks, IEEE Mob Network. Appl.,11, vol. 2, pp. 187 200, 2006 5. A.M. Popescu, I. G. Tudorache, B Peng and A.H. Kemp, Surveying position based routing protocols for wireless sensor and ad-hoc networks, International Journal of Communication Network and Information Security, vol 4, April 2012 6. E. Kranakis, H. Singh, and J. Urrutia, Compass routing on geometric networks, In Proc. 11th Canadian Conference on Computational Geometry, pp.51-54,1999 7. B. Karp and H. Kung, 2000. GPSR: greedy perimeter stateless routing for wireless networks, Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, p. 243 254. 8. H. Hwang, I. Hur and H. Choo, GOAFR Plus-ABC: Geographic Routing Based on Adaptive Boundary Circle in MANETs, International Conference on Information Networking (IEEE), pp.1-3 January, 2009 9. B. Leong, B. Liskov, and R. Morris,2006. Geographic routing without planarization, Artificial Intelligence, NSDI, 2006. 10. Y. Yu, R. Govindan and D. Estrin, Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks, 2001 11. Kun Bi, Kun Tu, Najie Gu and Wangli Dong, Topological Hole Detection in Sensor Networks with Cooperative Neighbors, in Proceedings of International Conference on Systems vol. 00, no. 60533020, pp.1 5., Oct 2006. 12. P. Corke, R. Peterson and D. Rus, Finding Holes in Sensor Networks, IEEE Workshop on Omniscient Space: Robot Control Architecture Geared toward Adapting to Dynamic Environments, ICRA 2007. 13. J. Yang and Z. Fei, HDAR: Hole Detection and Adaptive Geographic Routing for Ad Hoc Networks, 2010 Proc. 19th Int. Conf. Comput. Commun. Networks, pp. 1 6, Aug. 2010 14. S. Babaie and S. S. Pirahesh, Hole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure, IJCSI vol. 9,no. 1, pp. 213 218, 2012. 15. Q. Fang, J. Gao and L.J. Guibas, Locating and bypassing holes in sensor networks, IEEE Mob. Network. Appl.,11, vol. 2, pp. 187 200, 2006

874 Pearl Antil et al. / Procedia Computer Science 79 ( 2016 ) 866 874 16. Pearl Antil and Amita Malik, Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey, Journal of Computer Networks and Communications, 2014.