Abstract
Now-a-days Wireless Sensor Networks (WSNs) have massive significance in different surveillance related applications where coverage plays an important role. While arranging the sensor nodes in a large scale WSN, covering the region of interest (ROI) is a complicated job and this quality of coverage is compromised in the presence of coverage holes. As holes can cause permanent or temporary interruption in sensing or in communicating task, therefore detection of holes in a coverage area is an essential job. In this paper, we first construct a Delaunay Triangle on the basis of node location information. Then we propose an algorithm based on the property of empty circle to recognize whether coverage hole is present or not in the given ROI of a large scale WSN. Also, we have estimated the area of the coverage-hole based on computational geometry. We have shown the correctness of the algorithm based on the theoretical proofs. Simulations are also conducted to show the effectiveness of the algorithm for coverage-hole detection and area estimation (CHDAE).
Keywords
Introduction
WSNs have drawn global attention due to a wide range of applications like environmental observation to endangered species recovery, habitat monitoring to home automation, waste management to wine production, medical science to military surveillance. In all such applications one criterion is common, that every point in the ROI must be covered by at least one sensor. Coverage quantifies how well an area is sensed by the nodes they are deployed into where each sensor has to wrap up some sub-region and summing up these entire covered sub-regions one can have a totally covered region in the WSN. But sometimes, a few sub-regions might not be covered by any of the deployed nodes and are termed as coverage holes. As a result, a few nodes might fail to sense data or loss communication with other nodes which ultimately degrades the performance of the network. A sensor network with full coverage is almost impossible to achieve i.e. there might be some holes in the coverage area. In the network,there may be a variety of reasons behind the creation of coverage holes such as: random deployment of nodes in remote places, out of power situation for long duration unattended nodes, ambiguity in the network topology, obstacle in the sensing field etc. Coverage holes are the reason behind the performance deterioration of the sensor network. If there is some coverage hole in the network, then communication becomes weak between the nodes due to the fact that, sensed data is routed along the boundary of the hole repeatedly. Therefore, detection of coverage hole is very important with respect to research challenges in WSNs. Moreover, proximity of coverage holes points to the fact that there are possible uncovered region in the WSN that needs extra sensors to be deployed and hence, the estimation of Coverage-Hole area is also equally important. Detection of hole in a WSN identifies whether a node is fully operational or not and guarantees elongated network lifetime which in turn provides sufficient quality of service in network coverage. Again, with the help of hole area estimation, we can measure the number of extra nodes required to be deployed in the ROI.
In this paper, our aim is to detect the coverage hole in a large scale WSN using the computational geometry based property called empty circle. Therefore, we need to define the network topology by creating the Delaunay Triangulation. After detection of hole, our next target is to estimate the area of the coverage hole. For this we have considered the intersection between two or more disks and thus we have designed the algorithm CHDAE for detection of coverage holes and hole-area estimation.
The rest of the paper is organized as follows: In Section 2, there is a precise literature review about the existing works done in case of coverage hole-detection. In Section 3, we discussed about some preliminary definitions and system models required for coverage hole-detection in sensor network. In Section 4, there is an elaborate description about our coverage hole-detection algorithm along with theoretical proofs. Simulation and result analysis is done in Section 5. And finally, we have concluded in Section 6.
Related work
In this section, we are going to discuss about various coverage hole-detection algorithms, especially based on computational geometry. So far we have studied the literature; we found the pioneer work in hole-detection in 2005, by R. Ghrist & A. Muhammad [7] who had proposed a centralized algorithm that detects holes via homology in which prior node location is not obligatory. This algorithm detects only single level coverage holes but unable to detect boundary holes. In 2008, X. Li & D. Hunter [13] proposed one distributed algorithm named 3MeSH (Triangle Mesh Self-Healing) for hole-detection as well as hole-recovery and is useful for large hole-recovery. Another prominent work in this field is from J. Kanno et al. [8] in 2009 who proposed a distributed algorithm that finds out the number of holes alongside their location in a non-planar sensor network. In 2010, Yang and Fei [17] proposed a hole-detection and adaptive geographical routing (HDAR) algorithm to detect coverage holes to solve the local minimum problem. In 2011, F. Yan et al. [16] used the concepts of Rips complex and Cech complex to determine coverage holes and classify them to be triangular or non-triangular. In 2012, S. Babaie & S.S. Pirahesh [2] proposed an algorithm based on triangular structure for coverage hole-detection and calculate its size.
In the most recent literature, W. Li [10] in 2014 has proposed a graph based coverage hole description algorithm. On the basis of empty circle property, first the coverage hole was being detected and then a graphic hole-description method was introduced to show the vulnerable parts in the holes. In 2014, P. Ghosh et al. [6] has proposed two novel distributed algorithms as DVHD (distance vector hole-determination) and GCHD (Gaussian curvature based hole-determination). DVHD calculates the shortest distance path between a pair of nodes in a weighted Delaunay graph utilizing the Bellman–Ford algorithm and GCHD calculates the distributed curvature to detect the number of holes using Gauss–Bonnet theorem. Li and Zhang [12] in 2015 proposed empty circle property based algorithm to detect coverage holes by forming Delaunay triangulation of the network. In 2016, G. Dai et al. [5] proposed Voronoi diagram based coverage hole detection algorithm (VCHDA) that can identify the coverage holes and can label the border nodes of the coverage-hole area. Again in 2016, Li Zhao et al. [18] proposed a novel coverage hole detection algorithm having two phases namely: Distributed Sector Cover Scanning (DSCS), which is used to identify the nodes on hole-borders and the outer boundary of WSN and Directional Walk (DW), which can trace the coverage holes based on the boundary nodes identified with DSCS. P.K. Sahoo et al. [9] in 2016 suggested a distributed coverage hole detection (DCHD) algorithm to detect the bounded or non-bounded coverage holes in the sensor network. Again in 2016, R. Beghdad & A. Lamraoui [3] proposed an algorithm based on Connected Independent Sets (BDCIS) for coverage hole detection. On the basis of neighbor discovery, the independent sets (IS) with specific cardinality are found with the help of the minimum or maximum id in the communication graph. W. Li. & Y. Wu [11] in 2016 has suggested a tree based algorithm for coverage hole-detection and healing. In this algorithm, based on tree concept location, size and shape of the detected coverage hole can be estimated. In 2017, Amgoth and Jana [1] proposed an algorithm having two phases namely: coverage hole-detection (CHD) and coverage restoration (CR). In CHD, each sensor node disjointedly detects hole by updating definite information with its neighbor nodes. For CR, a sensor node with relatively high residual energy is given precedence to cover up the hole closer to it by increasing its sensing range up to a maximum limit. From the above literature, we have found that graph based approaches are very promising for coverage hole-detection. Also, distributed algorithms for coverage hole-detection is much more efficient than centralized one. Further, we had the observation that node location information is the most important prerequisites for coverage hole-detection algorithm.
Preliminaries
In this section, we have discussed about the network model and few terminologies required for explaining the proposed hole-detection algorithm.
Network model
In this paper we have made a few assumptions required to set up the network model. Let
Terminologies
Following are the few terminologies required in the subsequent sections:
Sensing disk
It is the circular shaped disk with radius
Communication range
It is the circular shaped disk with radius
Delaunay triangulation
It is a well known tool in computational geometry and can be constructed for a given set of discrete points (sensor nodes) in a 2D plane. A triangulation of a finite point set S is called a Delaunay triangulation, if the circumcircle of every triangle is empty, i.e., there is no point from S in its interior. Figure 1 show a Delaunay triangulation of a set of six points where the circumcircle of each of the five triangles are empty. The circle with the dotted line is not empty but it is not a circumcircle of any triangle. Let us assume a connected WSN where no four sensors are co-circular. Also we have supposed a coordinate free sensor location finding technique which is distributed in nature and is appropriate for large scale WSN. Based on relative positioning of the sensor nodes we have to create the Delaunay triangulation.

Delaunay triangulation with 6 points.

Representation of empty circle property.
Empty Circle or Empty Circumcircle property is used to define the Delaunay Triangulation. The circumcircle of a triangle is the unique circle that passes through the three vertices of the triangle, as shown in Fig. 2.
Here
Therefore,
Therefore,
From (6) and (7) we have the following matrix:
Proposed hole-detection algorithm
In the proposed coverage hole-detection algorithm (CHDAE), we have three phases namely: (1) Constructing the Delaunay Triangle by estimating the position of sensor nodes, (2) Coverage Hole-detection in a large scale WSN and (3) Estimating the area of the detected coverage hole based on computational geometry.
Node position estimation
It is a prerequisite to hole-detection algorithm. In this step, we have used [14] to find node position and based on their position, the Delaunay Triangle is constructed. For this, we need any arbitrary node as reference node
Coverage-hole detection algorithm
For detecting the coverage hole, the following theorem is required to be proved.
If
Let us assume,
In the previous section we have found the procedure to get the location information of each sensor node and its neighbor nodes. On the basis of node location information, Delaunay Triangle is formed from which we studied the empty circle property. Based on the above theorem now we can comment that if radius of empty circle

Uncovered region inside the empty circle.
This section is executed only after the evidence of coverage-hole in the empty circle. Here in this paper we are considering the coverage-hole area estimation in special scenario only. We have assumed that area estimation of coverage-hole may be done only when two sensing disks are intersecting among themselves. Before calculating coverage-hole area, we have to find out the area of two intersecting disks. When two circular shaped disks are intersecting among themselves, we will get circular sector from each of the circles. To determine each of the circular segments of the sector, we have to deduct the triangular area of each circle from their sector. Finally the coverage-hole area will be estimated by deducting area of each circular sector and area of two intersecting disks from the area of the Delaunay Triangle.

Intersection area of two disks.
According to Fig. 4 let us first consider that,
From the general equation of circle we get:
Therefore,
As per Fig. 4,
Now we have to find out area of each circular sector. Again from Fig. 4, let us assume that,
Now, area of circular sector of circle 1 (with center
And, area of circular sector of circle 2 (with center
Now the triangular area of each circle can be estimated as following:
Coverage-hole area with one intersection
In this section we are considering the area estimation of coverage hole when there is exactly one intersection between the sensing disks of the sensor nodes.

Coverage-hole created by one intersection of 2 disks (a)
From Fig. 5, in each of the three cases, only one intersection area is found. Let us assume the three sides of the Delaunay Triangle are: a, b and c respectively. So, area of triangle,
Let
Now, assuming

Coverage-hole created by two intersections: (a)
In this case, we are regarding the area estimation of coverage hole when there are two intersections between any two of the sensing disks of the sensor nodes. If we look at Fig. 6, in each of the three scenario, two intersections are visible. Thus, area of hole,

Coverage-hole created by three intersections of all three disks.
In this case, we are considering the coverage-hole area when there are three intersections between any two of the sensing disks of the sensor nodes. In Fig. 7, there are three intersections formed with two sensing disks. Let us assume
Therefore,

Pseudo code for CHDAE algorithm.
In this section we have presented some simulations to check the correctness of hole-detection algorithm. In the simulation, empty circle based hole-detection was implemented and for this first the Delaunay Triangles are being detected.

Detection of coverage-hole with varying sensor nodes and sensing range:
Also we have analyzed a few properties while detecting the coverage holes. For simulation purpose we have used MATLAB as it is a widely accepted platform to design computational geometry based hole-detection.
The simulations are conducted with different parameters such as: number of nodes, size of ROI, dimension of sensing radius etc. Here we have used three different sizes of ROI varying from 400 m to 1500 m and the number of sensor nodes varying from 400 to 3000. Apparently, the sensing radius also varies between 25 m to 50 m. While detecting the coverage hole, a few properties related with holes like: number of Delaunay Triangle, number of holes and run time are being considered. As the nodes are deployed randomly, hence arrangement of nodes changes frequently which in turn changes these properties. Therefore, we have executed each simulation for on an average 20 times and taken the average values. In Fig. 9, simulation shows the detection of coverage-hole using empty circle property with different sensing range and different number of nodes. With the increasing no. of nodes, the number of Delaunay Triangles also gets increased, so does the run time of simulation and the number of holes gets lower.

Run time for detection of coverage-hole with varying sensor nodes and sensing range.
Figure 10 shows the different run time for varying sensing range along with different number of sensor nodes. To obtain the above mentioned graph we have reduced the sensing range with the increasing number of sensor nodes. From the graph we can comment that run time will increase drastically with increasing number of nodes and decreasing sensing range.

Number of delaunay triangle with varying sensor nodes and sensing range.
Figure 11 shows the number of Delaunay Triangle (DT) created for hole-detection with varying sensing range and different number of sensor nodes. From the above mentioned graph it is found that number of DT rapidly increases with the increasing number of nodes and decreasing sensing range.

Number of coverage-holes with varying sensor nodes and sensing range.
Again Fig. 12 depicts the number of coverage-holes created with varying sensing range and different number of sensor nodes. In that figure we can find that the number of coverage-holes decreases with the increasing number of sensor nodes. As the increasing number of nodes enlarges the node density in the ROI, hence holes decreases.
Here we are discussing about some assumptions that are required while applying our CHDAE algorithm to a real life WSN system. It is obvious that the design complexity of WSN is purely application dependent while the application requirements may be the number of nodes, type of deployment, power consumption, sensing time etc. CHDAE is suitable to be applied on surveillance related applications where coverage-holes can cause permanent or temporary interruptions in the monitoring task. In fact, quality of surveillance depends on the fact that whether every point in the ROI is covered by at least one sensor or not. As full coverage is almost impossible to achieve, there must be some coverage-hole in the ROI and by assuming the existence of holes in the WSN, CHDAE is primarily applied.
Again, in a WSN, a coverage hole primarily occurs due to the failure of the sensor nodes, where distance between nodes or energy consumption can accelerate the node-failure. If the distance between nodes are much higher, a sophisticated quality of transmission is required which in turn needs high energy consumption. Hence, if certain node in the ROI fail to operate, then a technique is required that can quickly organize the rest of the nodes for coverage control. To obtain this autonomous self-organizing coverage control, hole-area is required to be calculated because it gives an idea about how much area is still uncovered. Therefore, in a surveillance system, based on hole-area size, more sensors can be deployed on an urgent basis in a larger hole-area.
Concluding remarks
As WSN is very much application specific, hence to support those multidisciplinary applications, sensor node deployment should be arranged properly. At the time of node deployment in the ROI, QoS can be at risk due to the occurrence of holes. That’s why, in this paper, we have tried to detect any kind of coverage hole present in the ROI using empty circle property. Also, we have calculated the area of hole while there is intersection between the sensing disks. In this work we have not merged those empty circles falling in the boundary of the same coverage holes, therefore we may try to keep it as our future scope of work. Simulation shows the correctness of the algorithm as well as we have shown the dependability of number of holes, number of DT and run time with respect to number of nodes being deployed along with sensing range.
