Abstract and Applied Analysis

Boundary Recognition by Simulating a Diffusion Process in Wireless Sensor Networks

De Gu, Jishuai Wang, and Ji Li

Full-text: Open access


Wireless sensor networks (WSN) are becoming increasingly promising in practice. As the predeployment design and optimization are usually unpractical in random deployment scenarios, the global optimum of the WSN’s performance is achievable only if the topology dependent self-organizing process acquires the overview of the WSN, in which the boundary is the most important. The idea of this paper comes from the fact that contours only break on the geometrical boundary and the WSN are discrete sampling systems of real environments. By simulating a diffusion process in discrete form, the end point of semi-contours suggests the boundary nodes of a WSN. The simulation cases show the algorithm is well worked in WSN with average degree higher than 10. The boundary recognition could be very valuable for other algorithms dedicated to optimize the overall performance of WSN.

Article information

Abstr. Appl. Anal., Volume 2014, Special Issue (2013), Article ID 236279, 11 pages.

First available in Project Euclid: 6 October 2014

Permanent link to this document

Digital Object Identifier

Zentralblatt MATH identifier


Gu, De; Wang, Jishuai; Li, Ji. Boundary Recognition by Simulating a Diffusion Process in Wireless Sensor Networks. Abstr. Appl. Anal. 2014, Special Issue (2013), Article ID 236279, 11 pages. doi:10.1155/2014/236279. https://projecteuclid.org/euclid.aaa/1412605737

Export citation


  • I. F. Akyildiz and I. H. Kasimoglu, “Wireless sensor and actor networks: research challenges,” Ad Hoc Networks, vol. 2, no. 4, pp. 351–367, 2004.
  • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422, 2002.
  • L. Lazos and R. Poovendran, “Stochastic coverage in heterogeneous sensor networks,” ACM Transactions on Sensor Networks, vol. 2, no. 3, pp. 325–358, 2006.
  • X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, and C. Gill, “Integrated coverage and connectivity configuration in wireless sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys \textquotesingle 03), pp. 28–39, November 2003.
  • N. Ahmed, S. S. Kanhere, and S. Jha, “The holes problem in wireless sensor networks: a survey,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 9, no. 2, pp. 4–18, 2005.
  • D. Gu, N. G. Chunyue Song, and Z. Song, “Bottleneck recognition by virtual temperature field in wireless sensor networks,” Ad-Hoc and Sensor Wireless Networks, vol. 15, no. 2–4, pp. 127–150, 2012.
  • D. Gu and Z. Song, “Segment and organize irregular shaped sensor networks by importing a virtual scalar field,” in Proceedings of the IET International Conference on Wireless Sensor Network (IET-WSN '10), pp. 227–232, November 2010.
  • M. Li, Z. Li, and A. V. Vasilakos, “A survey on topology control in wireless sensor networks: taxonomy, comparative study, and open issues,” Proceedings of the IEEE, vol. 101, no. 12, pp. 2538–2557, 2013.
  • M. Peng, Y. Xiao, H. Chen, Q. Hao, A. V. Vasilakos, and J. Wu, “Sensor distribution on coverage in sensor networks,” in Quality, Reliability, Security and Robustness in Heterogeneous Networks, pp. 328–344, Springer, 2012.
  • Q. Fang, J. Gao, and L. J. Guibas, “Locating and bypassing routing holes in sensor networks,” in Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), pp. 2458–2468, March 2004.
  • Q. Fang, J. Gao, L. J. Guibas, V. De Silva, and L. Zhang, “Glider: gradient landmark-based distributed routing for sensor net-works,” in Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), pp. 339–350, March 2005.
  • S. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann, “Neighborhood-based topology recognition in sensor networks,” in Algorithmic Aspects of Wireless Sensor Networks, S. Nikoletseas and J. Rolim, Eds., pp. 123–136, Springer, Berlin, Germany, 2004.
  • Y. Wang, J. Gao, and J. S. B. Mitchell, “Boundary recognition in sensor networks by topological methods,” in Proceedings of the 12th Annual International Conference on Mobile Computing and Networking (MOBICOM '06), pp. 122–133, September 2006.
  • A. Kröller, S. P. Fekete, D. Pfisterer, and S. Fischer, “Deterministic boundary recognition and topology extraction for large sensor networks,” in Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1000–1009, January 2006.
  • R. Ghrist and A. Muhammad, “Coverage and hole-detection in sensor networks via homology,” in Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), pp. 254–260, April 2005.
  • O. Saukh, R. Sauter, M. Gauger, and P. J. Marrón, “On Boundary recognition without location information in wireless sensor networks,” ACM Transactions on Sensor Networks, vol. 6, no. 3, article 20, 2010.
  • S. Funke, “Topological hole detection in wireless sensor networks and its applications,” in Proceedings of the Joint Workshop on Foundations of Mobile Computing (DIALM-POMC '05), pp. 44–53, 2005.
  • W. Wei, X.-L. Yang, P.-Y. Shen, and B. Zhou, “Holes detection in anisotropic sensornets: topological methods,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 135054, 9 pages, 2012.
  • Cntr-Map-1, 2008, http://en.wikipedia.org/wiki/File:Cntr-map- 1.jpg.
  • H. Zhou, H. Wu, and M. Jin, “A robust boundary detection algorithm based on connectivity only for 3D wireless sensor networks,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '12), pp. 1602–1610, March 2012. \endinput