Next Article in Journal
HGNN−BRFE: Heterogeneous Graph Neural Network Model Based on Region Feature Extraction
Previous Article in Journal
Dual-Attention Multiple Instance Learning Framework for Pathology Whole-Slide Image Classification
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Coverage Hole Recovery Method for 3D UWSNs Based on Virtual Force and Energy Balance

College of Information Engineering, North China University of Water Resources and Electric Power, Zhengzhou 450046, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(22), 4446; https://doi.org/10.3390/electronics13224446
Submission received: 8 September 2024 / Revised: 6 November 2024 / Accepted: 11 November 2024 / Published: 13 November 2024
(This article belongs to the Section Networks)

Abstract

:
Underwater wireless sensor networks (UWSNs) have been applied in lots of fields. However, coverage holes are usually caused by complex underwater environment. Coverage holes seriously affect UWSNs’ performance and quality of service; thus, their recovery is crucial for 3D UWSNs. Although most of the current research recovery algorithms demand hole detection, the number of additional mobile nodes is too large, the communication and computing costs are high, and the coverage and energy balance are poor. Therefore, these methods are not suitable for UWSN hole repairing. In order to enhance the performance of hole recovery, a coverage hole recovery method for 3D UWSNs in complex underwater environments based on virtual force guidance and energy balance is proposed. The proposed method closely combines the node energy and considers complex environmental factors. A series of multi-dimensional virtual force models are established based on energy between nodes, area boundaries, zero-energy holes, low-energy coverage holes, underwater terrain, and obstacle forces. Then, a coverage hole recovery method for 3D UWSNs based on virtual force guidance and energy balance (CHRVE) is proposed. In this method, the direction and step size of mobile repairing node movement is guided by distributed computation of virtual forces, and the nodes are driven towards the target location by means of AUV or other carrier devices. The optimal position to improve coverage rate and node force balance is obtained. Simulation experiments show good adaptability and robustness to complex underwater terrain and different environments. The algorithm does not require precise coverage hole boundary detection. Furthermore, it balances network energy distribution significantly. Therefore, this method reduces the frequency of coverage hole emergence and network maintenance costs.

1. Introduction

In recent years, underwater wireless sensor networks (UWSNs) [1] have been applied in lots of fields such as environment monitoring, military surveillance, data collection, etc. [2]. Due to some undesirable reasons, such as complex underwater environment, degradation of node electronic components, water flow, erosion, and underwater life damage, the sensor nodes deployed in UWSNs tend to be invalid or be incomplete of the monitoring perception. Hence, the coverage holes of UWSNs are easy to be caused. The coverage holes seriously affect network performance and quality of service; therefore, coverage hole recovery has become a research hotspot in recent years.
Hole recovery by additional mobile nodes with Autonomous Underwater Vehicles (AUV) is an important type of hole recovery methodology [3,4]. In these methods, when the coverage holes appear, the mobile nodes are added dynamically to form hybrid UWSNs. Then, the mobile nodes are moved to their deterministic locations to repair coverage holes driven by AUV according to the location of the holes [4]. However, in recent years, more research has been done on coverage hole recovery methods for 2D planar networks [5], while little research has been done on coverage hole recovery methods for 3D spatial networks. Moreover, the few current approaches use the target event as the algorithmic coverage objective and do not take enough account of network topology characteristics [6]. In fact, the area coverage of UWSNs has more extensive applications in underwater environment monitoring and security surveillance [2]. Furthermore, the load characteristics of bottom-up multi-hop transmission in UWSNs make the nodes consume energy unevenly. If the network energy consumption is more balanced after coverage hole repairing, it will help to reduce the frequency of hole emergence, further reduce the maintenance cost of keeping the UWSNs working properly, and prolong the life of the network.
In recent years, the virtual force-based network coverage method [7] has received a lot of attention from scholars because of its good performance in terms of coverage and connectivity. However, all these methods require precise location information of nodes and also require that the nodes are all movable nodes. Therefore, these methods cannot really be applied to coverage hole repairing in UWSNs.
To repair coverage holes by adding a limited number of additional mobile nodes, and to quickly improve area coverage, reduce energy consumption, and balance the overall energy of the network to make it suitable for repairing 3D UWSN coverage holes in complex underwater environments, a coverage hole recovery method for 3D UWSNs in complex underwater environments based on virtual force guidance and energy balance (CHRVE) is proposed in this paper. The contributions of this work are the following:
(1) Multi-dimensional virtual force models are established, which consider multi factors such as energy between nodes, area boundaries, zero-energy holes, low-energy coverage holes, underwater complex terrain, and obstacle forces. In these models, some novel concepts such as energy density, zero-energy holes, and low-energy coverage holes are defined to construct more efficient virtual force models. Different from the traditional virtual force model, the proposed virtual force models not only depend on the distance between nodes, but also closely combine the node energy, and consider complex environmental factors. Therefore, the proposed models are closely combined with the characteristics of the underwater environment and are more suitable for repairing UWSN coverage holes. Moreover, the models make the energy distribution of the patched UWSNs more balanced.
(2) The CHRVE algorithm is proposed. In this method, the direction and step size of mobile repairing node movement is guided by the defined virtual forces above distributed, and the nodes are driven towards the target location by means of AUV or other carrier devices. This algorithm does not require precise coverage hole boundary detection, and it has good adaptability and robustness to complex underwater terrain and different environments. The minimum number of additional repairing nodes by theoretical estimation is presented in this algorithm. For different scenarios, the different corresponding mobile node patching schemes are proposed, thus the algorithm has higher node coverage utilization and robustness. Furthermore, the proposed strategy for redundant repairing of low-energy coverage holes significantly balances the network energy distribution; thus, this method reduces the frequency of new coverage hole emergence and network maintenance costs.
The rest of the paper is organized as follows: The related works are addressed in Section 2. Section 3 defines our novel concepts for virtual force models. The proposed virtual force models based on energy for hole coverage of 3D UWSNs is described in Section 4 in detail, and the CHRVE algorithm is proposed in Section 5. Simulation and analysis are provided in Section 6. Finally, conclusions are given in Section 7.

2. Related Work

As mentioned above, hole recovery is some of the most active research in coverage control issue of UWSNs. However, for 2D planar networks coverage hole recovery, more research has been done [5], while little research has been done on coverage hole recovery for 3D UWSNs.

2.1. Coverage Hole Recovery for 2D Planar WSN

Based on the different repair methods, the 2D WSNs coverage hole repair includes five types of repair methods: (1) hole recovery methods based on Voronoi diagrams [8,9,10,11,12,13], (2) hole recovery methods based on virtual forces [14,15,16], (3) hole recovery methods based on geometric calculations [17,18,19,20,21], (4) hole recovery methods based on trees or graphs [22,23,24,25,26], and (5) hole recovery methods based on intelligent algorithms [27,28,29,30,31,32,33].
These hole repair methods have shown better performance in 2D planar space. However, due to the complexity of the 3D underwater space and environment, these 2D hole repair methods are not suitable for 3D UWSN coverage hole repair. For instance, we proposed a fish swarm-inspired holes recovery algorithm for 2D planar space in [34]. It can effectively solve the problem of coverage hole repair for the 2D water surface of UWSNs. However, in the 3D underwater, when the artificial fish searches for the best position, the dimensions of each artificial fish increase from 2k to 3k (k is the number of additional mobile repairing nodes). Then, this problem is converted to a vector extremum problem in 3k high-dimensional space. Therefore, this method is extremely time-consuming, and it is suitable for 3D UWSNs space.

2.2. Coverage Hole Recovery for 3D UWSNs

There is relatively little research on 3D UWSN coverage hole recovery. The existing research can be categorized into three types of methods: hole recovery methods based on AUV mobile node, hole recovery methods based on depth adjustment, and hole recovery methods based on node communication power enhancement.
(1) Hole recovery methods based on AUV mobile node
For the topology healing problem of UWSNs, Liu et al. [4] proposed a topology healing algorithm based on the full Steiner tree with the aid of AUV nodes. He et al. [35] proposed a fish swarm optimization method for network topology healing using AUV nodes. Hao et al. [36] proposed a dynamic detection and repair method for 3D WSN coverage holes. This method detects and recovers 3D coverage holes based on meshing 3D spatial regions. Zhang et al. [37] proposed a three-dimensional iterative enhancement algorithm for UWSN coverage hole recovery using intelligent search followed by virtual force.
(2) Hole recovery methods based on depth adjustment
Erkay et al. [38] proposed a topology recovery method based on depth adjustment of nodes and presented two topology recovery algorithms: a block movement repair (BMR) algorithm and a distributed underwater repair (DURA) algorithm. The BMR algorithm simply moves all nodes below the failed node upwards to recover network connectivity. However, the energy consumption of the network is accelerated, and the network lifetime is shortened due to the large number of node movements. The DURA algorithm does not take into account the energy of nodes while selecting a node for movement. This may cause the network to be disconnected again shortly after hole recovery. Moreover, this method is time-consuming in hole recovery.
(3) Hole recovery methods based on node communication power enhancement
Wang et al. [39] proposed a strategy to enhance the communication power of neighboring nodes of the failed node, thus increasing the communication radius of neighboring nodes to re-establish network connection and achieve topology recovery. However, in UWSNs, the energy of nodes is limited. Therefore, this approach will increase the energy consumption of neighboring nodes of the failed node. This may lead to new failed nodes appearing quickly and shortening the network lifetime.

2.3. Coverage Control for 3D WSNs Based on 3D Virtual Forces

In recent years, virtual force-based network coverage methods have attracted the attention of many scholars for their good performance in terms of coverage and connectivity [40]. Miao et al. [41] proposed a self-deployment algorithm called 3DSD for deployment of 3D WSNs. In this method, a 3D virtual force model is constructed. A negotiation tactic is utilized to ensure network connectivity, and a density control strategy is used to balance the node distribution. In order to completely cover the 3D region of interest, Boufares et al. [42] proposed a virtual force-based 3D distributed deployment algorithm, 3D-DVFA. This method assumes that the sensor nodes are all mobile nodes, all of which can gradually move towards the specified position. These two methods above belong to the redeployment methods after node failure of WSNs. Although they are regional coverage, the nodes are all required to be mobile nodes. Therefore, these methods are too costly for repairing coverage holes. Hao et al. [43] proposed a three-dimensional curved wireless sensor coverage hole repair algorithm for land hybrid networks called 3D-SCHDR. This approach requires precise positioning information of nodes and also requires that the nodes are all mobile nodes. Thus, this method is not suitable for coverage hole recovery of 3D UWSNs.

3. Preliminaries

3.1. Network Model

In this paper, we adopt the same network model as ref. [44]. The coverage model of sensor nodes is based on the Boolean model with the following assumptions.
(1) The UWSN has been deployed in the monitoring area based on a specific approach. The energy of each sensor node is limited and cannot be replenished. The initial energy of sensor is denoted as E0i, and its current residual energy is denoted as Ecuri. When the node energy is less than the threshold Eᶿ, the node enters a sleep state after sending a failure location and warning to its neighbor nodes.
(2) The communication power for each deployed sensor node is adjustable. The transmit power can be determined according to the distance, and the distance dist(Nsi,Nsj) between node Nsi and Nsj can be calculated based on the received signal strength. Then, the neighbor nodes of Nsi can be represented as:
φ i = { N s j | d i s t ( N s i , N s j ) 2 R s ,   i j }
where Rs is the sensing radius of the sensor.
(3) The additional nodes used for coverage hole recovery are mobile nodes. These mobile sensors can be moved to a designated underwater location in the monitoring area, driven by AUV and supported by the relevant communication protocols.

3.2. Movement Energy Consumption of Nodes Under the Influence of Water Flow

In complex underwater environments, moving sensors to a designated location requires more energy than in land environments. The overall energy consumption of the algorithm in this paper consists of computational energy, communication energy, and node movement energy. Computational energy and communication energy are very small compared to movement energy consumption, so only movement energy consumption is calculated.
Due to water flow and the different physical structures of underwater nodes, the nodes’ energy consumption generated by moving unit distance in different directions is different. Underwater sensor nodes consume more energy per unit distance to float than to sink. Nodes moving against the water flow consume more energy than those moving with the water flow.
Definition 1 [Movement energy consumption].
Let Ex1, Ey1, Ez1 denote the energy consumption of node Nsi moving in a positive direction per unit distance along the x, y, z axes, respectively. On the contrary, let Ex2, Ey2, Ez2 denote the energy consumption of node Nsi moving in a negative direction per unit distance along the x, y, z axes, respectively. Let the energy consumption of Nsi moving unit distance in a certain direction d i r { d i r x , d i r y , d i r z }  be E φ i , and the moving distance of Nsi in this direction be denoted as di. Then, the total movement energy consumption Ei of node Nsi moving in direction d i r  is represented as follows:
E i = E φ i d i
where:
E φ i = j { x k , y k , z k | k = 1 , 2 } E j d i r j d i r

3.3. Energy Density

When the coverage holes are generated after the UWSN is running for a while, the residual energy of surviving nodes varies greatly. Similarly, when the coverage holes are patching, the residual energy of the additional repairing nodes is also greatly different when they move different distances to the proper positions. In order to measure the distribution of energy, the energy density is defined as follows.
Definition 2 [Energy density].
Let an arbitrary point in the monitoring area be denoted as Q, the Euclidean distance between Q and node Nsi be dist(Q, Nsi), the residual energy of Nsi be Ecuri. The energy density at point Q in the monitoring area is defined by Equation (4):
ρ E ( Q ) = d i s t ( Q , N s i ) R s , N s i N s E cur i d i s t ( Q , N s i ) + 1

3.4. Zero-Energy Holes

Because of the great complexity of hole boundary detection in 3D space, most topology methods cannot be extended from 2D WSN to 3D UWSN. Thus, the existing topology-based methods [16] are not suitable for distributed autonomous boundary detection in 3D UWSNs. The proposed algorithm in this paper does not require precise detection of 3D holes boundaries; instead, it only requires coarse-grained detection of the relative spatial grid positions of holes. The monitoring area is divided into several grids. Let the maximum number of grid points that a sensor node can cover be denoted as ξ, which can be calculated using Equation (5). The smaller the granularity of grids is, the larger the value of ξ will be.
ξ = c a r d ( Q i | d i s t ( N s i , Q i ) R s )
Definition 3 [Zero energy hole].
Let the probability that the grid point Qi(x,y,z) is covered by the sensor node Nsi be pcov(x,y,z,Nsi). The grid points that are not covered by any existing sensing node Nsi form a zero-energy hole grid point set, which is denoted as holl in Equation (6) and is called a zero-energy hole.
h o l l = { Q i ( x , y , z ) | p cov ( x , y , z , N s i ) = 0 , N s i N s }

3.5. Low-Energy Coverage Holes

In the grid points collection of the monitoring area, with the energy consumption of nodes in the network running, there will be more grid point areas with low residual energy of surrounding nodes, which is defined as low-energy coverage holes. The node residual energy in this type of coverage hole is usually very low, which easily leads to the generation of new zero-energy holes.
Definition 4 [Low-energy coverage holes].
Let the probability that the grid point Qi(x,y,z) is covered by the sensor node Nsi be pcov(x,y,z,Nsi). The low-energy coverage hole is defined by Equation (7):
L o w h o l l = Q i ( x , y , z ) p cov ( x , y , z , N s i ) = 1 E cur i < E thlow , N s i N s
where Ecuri is the residual energy of node Nsi, Ethlow is the threshold value of energy, which is calculated using Equation (8).
E thlow = m e a n ( E cur i ) 2

4. The Virtual Force Models Based on Energy for Hole Recovery of 3D UWSNs

The parameters related to this method are defined as shown in Table 1.

4.1. Calculation of the Number of Additional Nodes for Holes Recovery

The structure of underwater sensors is more complex than those used on land. The underwater sensors require a variety of treatments such as corrosion protection. They also have higher energy requirements and much higher prices. Therefore, using the minimum number of repairing nodes to maximize the coverage effect is the primary consideration.
The number of additional mobile repairing nodes is closely related to the size and shape of coverage holes. When coverage holes are in the center of the area, the coverage utilization of additional nodes is higher, which results in fewer repairing nodes being required to significantly increase coverage. However, if the holes are scattered or located more at the boundary of the area, the coverage utilization of the additional nodes is significantly reduced. Thus, more repairing nodes are required to achieve the same network coverage for these holes’ recovery.
Alam et al. [45] researched 3D network coverage and connectivity problem with the deterministic deployed nodes. In [45], they demonstrated that the truncated regular octahedron requires fewer cells to cover a given 3D space. In this case, R c / R s 4 / 5 , the volume of this truncated octahedron is 8 2 a 3 , and the volume of the circum-sphere is 4 3 π ( 10 2 a ) 3 . Therefore, the effective coverage utilization of the node-sensing sphere is up to 8 2 a 3 / 4 3 π 10 2 a 3 = 0.68329 . In this case, the least number of nodes is required for filling the same volume of space.
Based on the above analysis, considering the monitoring area boundaries, the number of additional nodes for holes recovery can be calculated as follows by theoretical estimation:
A d d min = V ( 1 η ) 0.68329 × μ × 4 3 π R s 3
where μ is the correction factor, taking the value (0, 1). Its value is related to the size and shape of the monitoring area, as well as the node-sensing radius. In the case of the same monitoring area, the value of μ is larger when the node-sensing radius is smaller, and, conversely, the value of μ is smaller when the node sensing radius is larger. In the simulation of this paper, its values are taken by experimental verification under this principle. V is the volume of the monitoring area.

4.2. The Virtual Force Models Based on Energy

(1) The inter-node forces based on energy
The distance between sensor nodes within communication range 0 < dist(Nsi,Nsj) < 2Rs; thus, the area of sensing overlap will be formed. In order to avoid over-densification of nodes and improve node coverage utilization, the virtual repulsion force, denoted as F rep , between nodes is defined to guide the neighbor nodes away from each other. The closer the distance between node Nsi and node Nsj, the higher the virtual repulsion force is.
In order to improve the energy balance of UWSNs after hole repair, the residual energy of nodes is considered when defining the virtual repulsion force in this paper. The more residual energy Nsj has, the more repulsive it is to Nsi. When the residual energy of a node is very small, it is about to die of energy depletion; thus, there is almost no repulsion.
Therefore, in the Nsi repulsive force field U1 defined by Equation (10), the virtual repulsive force F rep i to which Nsi is subjected is calculated as Equation (11):
U 1 = { N s j | d i s t ( N s i , N s j ) 2 R s }
F rep i = k rep E cur j d i s t 2 ( N s i , N s j ) E cur j d opt 2 ,   α i j , 0 < d i s t ( N s i , N s j ) < d opt 0 ,     d i s t ( N s i , N s j )   > d opt  
where krep is the repulsive force coefficient, Ecurj is the current residual energy of node Nsj, αij is the direction of the force, dopt is the optimal distance between nodes, which is calculated as Equation (12). The residual energy Ecurj in Equation (11) is obtained from the sensor nodes via UWSNs communication.
d opt = 2 R s , A d d node < A d d min 4 R s 5 , A d d node A d d min
where Addmin is the minimum number of additional repairing nodes by theoretical estimation, and Addnode is the actual number of additional repairing mobile nodes.
The virtual repulsive force F rep i to which Nsi is subjected in force field U1 is depicted in Figure 1.
When AddnodeAddmin, not only should the zero-energy hole be patched, but also, redundant nodes should be added moderately to the area around the low-energy node where the residual energy Ecur is lower than the threshold Eth, which is set with engineering requirements. These redundant nodes assist in carrying the communication data transit load of other nodes to reduce the frequency of re-patching.
In this paper, we set the low energy nodes to generate a virtual attractive force on the additional nodes to attract the additional nodes towards the low energy nodes. These low-energy nodes form a low-energy area, and this area creates a large resultant force on the nodes, guiding the additional nodes to move to repair this area.
Based on the above analysis, the less residual energy of the nodes within the communication range, the greater the virtual attractive force. Similarly, the greater the distance between nodes, the greater the virtual attractive force. Therefore, in the Nsi gravitational field U2 defined by Equation (13), the virtual attractive force F att i on Nsi is calculated by Equation (14):
U 2 = { N s j | E cur j < E th & & d i s t ( N s i , N s j ) R c }
F att i = ( k att ( ( E 0 E cur j ) × d i s t ( N s i , N s j ) ) , α i j ) , A d d node A d d min
where katt is the attractive force coefficient between nodes, E0 is the initial energy value of node Nsj, Ecurj is the current residual energy of node Nsj, αij is the direction of the force.
The virtual attractive force F att i on Nsi in field U2 is depicted in Figure 2.
Then, the node Nsi is subjected to energy-based forces in the field U1 and U2, as shown in Equation (15).
F E i = N s j U 1 F rep i + N s j U 2 F att i
(2) The forces at the boundary of monitoring area
In UWSNs, the boundaries of the monitoring area have a great impact on the coverage utilization of nodes. In order to improve the effectiveness of hole recovery with a limited number of additional nodes, based on Hooke’s law, we assume that there is a virtual force F bor on the sensor node at the area boundary, which guides the node moderately away from the boundary. This force consists of the repulsive force generated by the boundary of the hexahedral area of the 3D space. Assuming that the 3D monitoring space is a cubic region, this force consists of the repulsive force generated by the boundary of the cubic region on the sensor node. Let the six boundaries of the cubic region be δ = { x 0 , x l , y 0 , y w , z 0 , z h } . Then, the virtual repulsion of boundary δ * δ on node Nsi is shown in Equation (16):
F box i ( δ * ) = ( k six ( d δ * d opt 1 ) , α i j ) ,   0 < d i s t ( N s i , δ * ) d o p t 1 0 , d i s t ( N s i , δ * ) > d o p t 1
where ksix is the boundary repulsion coefficient, d δ * is the distance of node Nsi from boundary δ * , αij is the direction of the force, dopt1 is the optimal distance between the node and the boundary, which is calculated using Equation (17).
d opt 1 = 3 R s 2 , A d d node < A d d min 3 R s 3 , A d d node A d d min
When AddnodeAddmin, the distance of the node from the boundary is 3 R s / 3 , which guarantees that the boundary area is all within the node’s sensing range.
Then, the resultant force of the six boundaries on the node Nsi is depicted in Figure 3, and it is calculated using Equation (18).
F bor i = δ * δ F box i ( δ * )
(3) Energy-based hole forces
In order to improve node movement speed and the effectiveness of hole recovery, we set the hole to generate a virtual attractive force on the additional node to guide the node to move to the center of the hole quickly. In the presented hole recovery strategy, the zero-energy holes are repaired preferentially under conditions of insufficient additional nodes. On the contrary, the low-energy coverage holes are redundantly repaired under conditions of sufficient additional nodes.
(a) Zero-energy hole recovery
The set of neighboring hole grid points of any grid point Qi in holl is denoted as H(Qi), where holl represents the grid points of zero-energy holes. Its number of neighboring hole grid points is denoted as Nneighbor(Qi). Then, H(Qi) and Nneighbor(Qi) are calculated as follows.
H ( Q i ) = { Q j | d i s t ( Q i , Q j ) R s , Q i , Q j h o l l }
Nneighbor(Qi) = card(H(Qi))
The average number of neighboring hole grid points N ¯ for all grid points in holl is as follows.
N ¯ = m e a n ( N neighbor ( Q i ) )
During hole repairing, the mobile node preferentially moves to the hole grid point Qi whose number of neighboring hole grid points is larger than the average value N ¯ . A higher number of neighbor hole grid points of the hole grid point indicates a larger range of holes in this area and a greater virtual attractive force on the nodes generated by the center of this hole grid points set. Thus, the additional mobile node Nsi within the communication range is attracted to move towards this location so that the node coverage utilization is large. In the later stages of hole repairing, all large holes have been repaired, and the mean value of neighboring hole grid points around the hole grid points has been reduced accordingly. The more neighboring hole grid points Qi has, the farther away it is from the mobile node in the communication range, and the more attractive force it generates. In this way, the nodes are attracted to move quickly towards the larger hole area, always maintaining the optimal coverage utilization of the nodes.
Based on the above analysis, the attractive force field of zero-energy holes that the node Nsi is subject to is defined by Equation (22).
U 3 = { Q j | N n e i g h b o r ( Q j ) > N ¯ & & d i s t ( N s i , Q j ) R c , Q j h o l l }
The virtual attractive force of the hole grid point Qj on Nsi in U3 is calculated as follows:
F holl ( Q j ) = ( k holl ( N neighbor ( Q j ) × d i s t ( N s i , Q j ) ) , α i j ) , Q j U 3
where kholl is the attractive force coefficient of hole grid points, αij is the direction of the force.
In Figure 4, the virtual attractive force of the hole grid point Qj on Nsi is shown. The red points, green points, and blue points form the hole grid point set. The brown point represents the mobile node Nsi. The green points represent the grid points in U3, which is obtained by Equation (22).
Then, the attractive force on the node Nsi by holl is calculated using Equation (24), where holl represents the zero-energy hole.
F h i = Q j U 3 F holl ( Q j )
(b) Low energy coverage holes recovery
Redundant repair of low-energy coverage holes can reduce the frequency of new coverage hole emergence due to node energy exhaustion. This redundant recovery strategy guarantees that the network maintains high coverage for a longer period of time and avoids frequent coverage hole patching. Furthermore, it reduces the variance of the network energy density and makes the energy of the patched network more balanced.
The attractive force field of low-energy holes that the node Nsi is subject to is defined by Equation (25).
U 4 = Q j | d i s t ( N s i , Q j ) R c , Q j L o w h o l l
Then, the virtual attractive force of the hole grid point Qj on Nsi in U4 is calculated as follows:
F lowholl ( Q j ) = ( k lowholl ( N neighbor ( Q j ) × d i s t ( N s i , Q j ) ) , α i j ) , Q j U 4
where klowholl is the attractive force coefficient of low energy hole grid points, αij is the direction of the force.
Then, the attractive force on the node Nsi by Lowholl is as Equation (27), where Lowholl represents the low energy coverage hole.
F l i = Q j U 4 F Lowholl ( Q j )
(4) The forces of the water bottom or the obstacle
In oceans or lakes, it is common for the water bottom to be very undulating or for there to be large reefs. The algorithm in this paper considers two scenarios in order to better fit the real-world environment. One is the case where the bottom surface of the monitoring area is flat; the other is the case where the bottom surface shows an irregular curved surface or obstacle. For the former case, the nodes are only subjected to the water bottom boundary repulsive force, calculated using Equation (16). For the latter case, the nodes cover the irregular surface and cannot touch or traverse the bottom surface.
The irregular bottom surfaces or obstacles are mesh discretized. The set of grid points with an irregular bottom or obstacles is denoted as Bottom. Their force fields U5 that the node Nsi is subject to is defined by Equation (28).
U 5 = { Q j | d i s t ( N s i , Q j ) R s ,   Q j B o t t o m }
That is, each grid point Qj generates the virtual force on the nodes within the sensing radius. When the distance between node and grid point is less than or equal to dth, which is a threshold, an infinite force will be generated to keep the node away from the bottom surface or obstacles, guaranteeing that the node will not touch the bottom surface. The virtual force of the grid point Qj on Nsi in U5 is calculated using Equation (29):
F flo ( Q j ) = d i s t ( N s i , Q j ) d th ( k f × ( d opt 2 d i s t ( N s i , Q j ) ) ,   α i j )       d th < d i s t ( N s i , Q j ) R s 0 d i s t ( N s i , Q j ) > R s
where kf is the coefficient of force acting on the bottom surface or obstacle, αij is the direction of the force, dopt2 is the same as dopt1.
Figure 5 shows the force of the mesh point Qj on the node Nsi in U5, and it is calculated using Equation (30).
F f i = Q i U 5 F flo ( Q i )
(5) Calculation of total virtual force on nodes
Based on the above analysis, the resultant force acting on node Nsi is calculated by Equation (31).
F N s i = F E i + F bor i + F h i + F l i + F f i A d d node A d d min F E i + F bor i + F h i + F f i   otherwise
That is, when AddnodeAddmin, the attractive force of the low-energy coverage hole is considered; otherwise, this force is not considered. In the simulation, the values of all force coefficients are obtained by experimental tuning with reference to the comparative literature.

4.3. Calculation of Node Movement Direction and Step Size

By acquiring information around the sensor node, the resultant force F N s i on the node Nsi and the distance the node has moved Di determine the position of the node at the next moment in time. In the initial phase, the move step size should be larger, in order for the node to reach the balance position faster. In the later phase, to avoid repeated oscillations of the nodes at the equilibrium position, the step size should decrease with time or the number of iterations until it finally converges to zero. In this paper, the sigmoid function is applied for variable step size calculation.
Let the modulus of F N s i be denoted as F N s i , Fmin be the minimum force threshold for node movement, Stepmax be the maximum movement step, and the coordinate position of node Nsi at moment t be X(Nsi,t) =(xi(t),yi(t),zi(t)). When F N s i F min , the position of node Nsi at moment t + 1 is updated as X’(Nsi,t+1) =(xi(t+1),yi(t+1),zi(t+1)). When F N s i < F min , the node position is not updated, thus reducing the consumption of repeated movement energy.
The movement distance of node is calculated with Equation (32):
D i = S t e p max × 2 1 + e α F N s i 1 F N s i F min 0   F N s i < F min  
where α is the step adjustment factor.
Then, the node position at the moment t+1 is calculated with Equation (33).
X ( N s i , t + 1 ) = X ( N s i , t ) + D i F N s i F N s i
In order to improve the node coverage utilization, when the node moves outside the network boundary region according to Equation (33), the node position is corrected to within the region.

5. Description of the CHRVE Algorithm

After initial UWSN deployment, the coverage rate is tested periodically. When a large coverage hole emerges due to some node movement, damage, energy depletion, etc., and the coverage rate falls below the threshold Cth, according to the current state of UWSNs, the appropriate repair strategy is adopted.
In the first scenario, if the UWSN has a sufficient number of redundant and sleep mobile nodes, a certain number of these nodes are woken up to move to repair the hole. In the second scenario, if the UWSN does not have a sufficient number of redundant and sleep mobile nodes, all of these sleep mobile nodes are woken up, and then a certain number of additional mobile nodes are randomly deployed on the water surface.
Both of these scenarios are suitable for launching the proposed hole recovery algorithm in this paper. Based on the virtual force model mentioned in Section 4, the direction and step size of node movement is guided by the distributed computation of virtual forces on the additional nodes, and the nodes are driven towards the target location by means of AUV or other carrier devices. The optimal position for improving coverage rate and node force balance is obtained. Finally, the nodes are secured by ropes and anchors to establish communications.
The CHRVE is described as follows. Algorithm 1 gives the detailed description of the pseudo code.
Step 1. Initialization. The monitoring area is gridded, and the coverage rate is tested periodically. When ƞ < Cth, where ƞ is the coverage rate of UWSNs, compute the hole grid points Qi to form the hole grid point set holl1. The number of neighbor hole grid points Nneighbor(Qi) for each hole grid point is calculated with Equation (20), and the average number of neighboring hole grid points N ¯ is calculated with Equation (21). Let the number of iterations k = 1.
Step 2. Sleep nodes in the fixed position are woken up. Monitor whether the coverage rate ƞ now meets coverage requirements of UWSNs. If the coverage rate reaches coverage requirements, the process enters the sleep scheduling procedure, which can be based on the method in [46]. If the awakened nodes are movable and insufficient, and, moreover, the coverage rate ƞ does not meet the monitoring requirements, Addmin is calculated on the water surface with Equation (9), based on which the number of Addnode additional mobile nodes are deployed in monitoring area.
Step 3. Calculate the current existing holes, denoted as holl2, with Equation (6), and the number of neighboring hole grid points for each existing hole grid point, denoted as N neighbor ( Q i ) , with Equation (20). Calculate the number of grid points cnumi for each mobile node covering the grid points of holl1.
Step 4. When k < Iter and Equation (34) is satisfied, where Iter is the maximum number of iterations, the virtual resultant force is calculated by Equation (31) acting on c n u m i < θ ξ mobile nodes only, where θ and σ are the two threshold coefficients and ξ is the maximum number of grid points that a sensor node can cover, calculated with Equation (5). Then, move the node to the new position calculated with Equation (33).
max Q i h o l l 2 ( N neighbor ( Q i ) ) > σ ξ
When k ≥ Iter, go to step 6.
Step 5. When ƞ > β and cnumi < γ, where ƞ is the coverage rate, cnumi is the number of grid points for mobile node covering the grid points of holl1, and β and γ are preset thresholds, in order to avoid nodes falling into local equilibrium and oscillating back and forth, inspired by the fish-swarming algorithm, let the nodes move randomly by one step within the sense range [−αRs, αRs], where α represents the random move step adjust factor. Calculate the virtual force of low-energy coverage holes on the nodes with Equation (26) to guide the nodes to redundantly repair the low-energy holes. Further, the virtual attractive force of the low-energy nodes on the nodes within the communication range is calculated by Equation (14), so that the additional nodes are guided towards the low-energy nodes by the virtual force to balance the energy distribution of the repaired UWSNs. When the node is located outside the network boundary area after moving, correct the node position to be within the area to improve node coverage utilization. k = k + 1 and go to step 3.
Step 6. End of the algorithm.
The pseudo-code for CHRVE is described as follows.
Algorithm 1. Pseudo-code for CHRVE
Initialization of CHRVE parameters (shown as Table 1)
Return: The position of additional mobile repairing nodes
1.  The monitoring area is gridded.
2.  Compute the hole grid points Q i   to   form   the   hole   grid   point   set   holl 1 ,   N neighbor ( Q i )   with   Equation   ( 20 ) ,   N ¯ with Equation (21), k ← 1
3. If (ƞ < Cth)
4.  Calculate Addmin with Equation (9). Set the value of Addnode based on Addmin.
5.  Deploy Addnode additional mobile nodes in monitoring area.
6. End if
7.While (k < Iter and Equation (34))
8.   Calculate holl 2   with   Equation   ( 6 ) ,   N neighbor ( Q i ) , with Equation (20) and cnumi
9.   Calculate the virtual resultant force with Equation (31) acting on c n u m i < θ ξ mobile nodes only.
10.   If (Addnode > Addmin)
11.    Calculate the virtual force of low-energy coverage holes on the additional mobile nodes with Equation (26).
12.    Calculate the virtual attractive force of the low energy nodes on the additional mobile nodes within the communication
13.    range is by Equation (14).
14.   End if
15.   Move the mobile node to the new position calculated with Equation (33).
16.   kk+1
17.  End while

6. Simulation and Experimental Analysis

6.1. Simulation Scenario and Parameter Settings

The proposed CHRVE algorithm is implemented and simulated by MATLAB 2020 program. The parameters are set as follows: The monitoring area underwater is set to 100 m × 100 m × 100 m, Rs = 20 m, Rc = 2Rs = 40 m. The base station Sink is located on the water surface with coordinates (50, 50, 100) m.
The parameter settings of the algorithm are shown in Table 2. In this simulation, when the coverage rate falls below 75%, it will be very poor coverage and connectivity performance, possibly due to the emergence of coverage holes, and then launch the CHRVE algorithm. Thus, Cth is set with 75% in the following simulation. The energy consumption of node moving in different directions per unit distance along the x, y, z axes is set with reference to [35]. The other parameters are set with experiments based on the current literature [35,36,37,38,39,40,41,42,43].
In order to fully validate the performance of the CHRVE algorithm, the hole repair simulation experiments are performed under the different coverage hole scenarios generated by different deployment modes for various situations, such as random deployment, static deployment of truncated regular octahedron, and specific deployment, with different coverage hole shapes and locations.
In order to verify the adaptability and robustness of the algorithm to the shape, number, and size of coverage holes, a series of simulation experiments is carried out for a variety of scenarios with only one central closure hole, multiple non-closed holes and different holes shapes, respectively. Some verification experiments and analyses are also performed for the impact of the number of additional nodes on the coverage rate and the impact of the different initial positions of additional nodes on the performance of the algorithm. The parameter settings for these verification experiments are the same as in Table 1. The hole recovery situations that the water bottom surface is curved or there are obstacles are simulated and analyzed. Furthermore, for the case Addnode > Addmin, the balance of energy distribution after hole recovery by the CHRVE algorithm is analyzed based on the energy density variance of Definition 2, and the node movement energy consumption in the case of water movement is also simulated.
In the experiments, the additional repairing nodes take two random scattering patterns to deploy in UWSNs. One is to randomly spread the additional repairing nodes in the monitoring area and then randomly dive down to a certain depth as their initial position. For convenience of description, this scattering pattern is called RDHPM (random diving hole patching mode). The other is to randomly spread the additional repairing nodes on the water surface as their initial position, which is called RSWFHPM (random scattering for water surface hole patching mode). The robustness of the CHRVE algorithm to the initial position of the additional nodes is verified through experiments and analyses of the two patching modes.

6.2. Experiments and Analyses on Holes Repair with Different Hole Sizes, Numbers, and Shapes

(1) Experiment and analyses on repairing irregular coverage holes after random deployment
The coverage hole formed by the remaining 34 nodes of the random deployment network in Figure 6a is taken as the initial state for hole recovery, where the blue grid spheres indicate the coverage area of the remaining nodes, the coverage rate of which is 57.5%. Calculate Addmin = 27 using Equation (9) and set Addnode = 27. The additional repairing nodes are deployed with RDHPM mode, with an initial coverage rate of 75.9%. As shown in Figure 6b, for the initial simulation of 27 additional mobile nodes to repair the holes, the red solid spheres indicate the coverage area of the additional node. Figure 6c shows the coverage of the CHRVE algorithm after 11 iterations, and the coverage rate after hole recovery is 93.3%.
Figure 7 shows the average coverage rate variation for 30 runs of this algorithm with the additional repairing nodes. As can be seen from Figure 7, the CHRVE algorithm converges fast. In this experiment, the coverage rate can reach more than 92% after 11 iterations and tends to converge stably.
(2) Experiment and analyses on repairing multiple non-closed holes after static deployment
Figure 8a shows the boundary non-closed coverage holes after the static deployment of a truncated regular octahedron. The coverage rate before repairing is 70.34% initially. Calculate Addmin = 19 using Equation (9) and set Addnode = 19 in the actual experiment. The additional repairing nodes are deployed with RDHPM mode, with an initial coverage rate of 81.91%. Its coverage simulation is shown in Figure 8b. The coverage rate is 94.94% after eight iterations of the CHRVE algorithm. If the additional repairing nodes are deployed with RSWFHPM mode as shown in Figure 8c, the initial coverage rate is 74.23%. The coverage rate reaches 93.44% after running the CHRVE algorithm for 20 iterations.
Figure 9 shows the variation of the average coverage rate with the number of iterations for running the experiment 30 times using two patching modes with different numbers of additional repairing nodes.
(3) Experiment and analyses on repairing central closure holes after static deployment
The simulation experiments are performed for repairing the central closure holes after the fixed static deployment network shown in Figure 10a. The initial number of nodes before hole repairing is 39, and the coverage rate before repairing is 69.1%. Calculate Addmin = 20 using Equation (9). Figure 10b shows the initial hole repair situation after the 20 additional repairing nodes deployed with RDHPM mode, at which the initial coverage rate is 83.22%. After 10 iterations of the CHRVE algorithm, the coverage rate is 94.72%. If the additional repairing nodes are deployed with RSWFHPM mode as shown in Figure 10c, the initial coverage rate is 69.99%. The coverage rate is 93.15% after running the CHRVE algorithm for 25 iterations.
Figure 11 shows the variation of the average coverage rate with the number of iterations for running the experiment 30 times using two patching modes.
As can be seen from Figure 9 and Figure 11, although the difference in coverage rate between the RDHPM and RSWFHPM patching modes is large at the beginning, this difference in coverage rate between them decreases as the number of iterations increases. Both patching modes can achieve high coverage rates of over 95% after 40 iterations. This validates the robustness of the CHRVE algorithm to the initial position of the additional repairing nodes. Furthermore, when Addmin > Addnode, there is little difference in coverage rate across iterations between the two patching modes. This suggests that after the number of additional nodes has reached the theoretical number of nodes to repair the holes, further additional nodes to repair the holes have a limited effect on further improving the network coverage rate. Therefore, based on the proposed algorithm in this paper, these extra additional nodes can be used for redundant repair of low-energy coverage holes. This redundant repair strategy is used to improve the balance of energy distribution after repairing holes, increase network reliability, and reduce the frequency of coverage holes that occur again when nodes run out of energy in a short period of time.

6.3. Experiments and Analyses on Energy Density Distribution for Coverage Holes Recovery

According to the energy density and variance calculated by Definition 2, the energy distribution balance is measured and analyzed in this experiment. Figure 12 shows the coverage holes formed by the remaining 38 nodes. The coverage rate before repairing is 70.24% initially, in which six nodes have residual energy below the threshold value of 3 J, and the rest of the nodes have residual energy in the range of [10, 20] J, with an average energy of 15.17J. Calculate Addmin = 19 using Equation (9) and set the actual number of additional nodes Addnode = 25. Since Addnode > Addmin, a redundant repair of low-energy coverage holes is required based on the repair strategy of the CHRVE algorithm.
Figure 13a shows the variation of coverage rate, energy density variance with the number of iteration rounds. Figure 13b shows the comparison of the energy density variance between enabling redundant repair and not enabling redundant repair for the coverage hole recovery shown as Figure 12. The calculation results are the average for running experiments 30 times in respective conditions.
As can be seen in Figure 13a, both patching modes obtain a significant increase in coverage rate as the number of iterations increases. The RDHPM mode converges quickly and achieves a high coverage rate of over 90% in four iterations, and the RSWFHPM mode achieves an over-90% coverage rate in sixteen iterations. The energy density variance, which reflects the energy balance of the nodes in UWSNs, decreases significantly with the increasing number of iterations for both patching modes. Therefore, the redundant repair of low-energy coverage holes by the CHRVE algorithm effectively balances the network energy, which can reduce the frequency of new coverage hole emergence due to node energy exhaustion. Thus, the CHRVE algorithm can guarantee that the network maintains a high coverage rate for a longer period of time and avoids frequent coverage hole repairing. As can be seen from Figure 13b, when Addnode > Addmin, enabling node redundant repair effectively reduces energy density variance compared to not enabling node redundant repair. This furtherly demonstrates that the redundant repair strategy in the CHRVE algorithm can effectively repair low energy coverage holes and balance the network energy distribution.

6.4. Experiments and Analyses on Coverage Hole Recovery with Water Bottom Curved Surfaces and Obstacles

In order to verify the performance of the CHRVE algorithm for coverage hole recovery in the scenarios where the water bottom has complex terrain or obstacles, the simulation experiments for holes recovery are carried out on the monitoring area shown in Figure 14a, in which the bottom is an irregularly curved surface and contains complex underwater terrain such as reefs and crustal uplifts. The sensors are deployed in the monitoring area shown in Figure 14b, which contains the complex underwater terrain and obstacles of Figure 14a. The simulation experiments are performed for the coverage holes in this scenario, as shown in Figure 14b, and the initial coverage rate before hole repairing is 66.3%. Calculate Addmin = 21 using Equation (9). Figure 14c shows the initial hole repair situation after the 26 additional nodes deploying with RDHPM mode, at which the initial coverage rate is 76.8%. Figure 14d shows the coverage state after 11 iterations of the CHRVE algorithm, at which the coverage rate achieves 94.9%. As shown in the figure, the nodes not only cover the holes in the network but also provide good coverage of complex environments such as underwater surfaces (including obstacles).
Similarly, for the monitoring area shown in Figure 14a, the 26 additional nodes are deployed with RSWFHPM mode to perform the simulation experiments. Figure 15 shows the variation of node coverage rate and energy density variance with the number of iteration rounds. As can be seen from this figure, with the number of iterations increasing, the overall trend of the energy density variance keeps decreasing while the coverage rate of the two repair modes RDHPM and RSWFPM gradually increases. This validates that, for the case of coverage hole recovery in underwater complex terrain, the redundant repair strategy of the CHRVE algorithm for low-energy coverage holes can also effectively balance the network energy distribution.

6.5. Experiments and Analyses on Movement Energy Consumption of Additional Nodes in Complex Underwater Environments

The structure of the additional underwater sensor nodes is quite different from that of land-based sensors. Due to the water flow, nodes consume different amounts of energy per unit of distance movement in different directions. The experiments and analyses are also performed on movement energy consumption when hole repairing in complex underwater environments.
Figure 16 shows the variation of movement energy consumption with the number of iterations by the two patching modes for the examples in Section 6.3 and Section 6.4, respectively, when the number of iterations is 40. Let the algorithm be ended when the preset coverage rate p0 ≥ 92%. Then, for the example of Section 6.3, the hole repairing with RDHPM mode requires four iterations on average to achieve the preset coverage rate. The total movement energy consumption, including the random sinking and each iteration of movement for each mobile node, is 50.3 J. In contrast, the hole repairing with RSWFHPM mode requires 20 iterations to achieve the preset coverage rate, and its movement energy consumption is 119.1J. For the example of Section 6.4, the hole repairing with RDHPM mode requires nine iterations to reach the preset coverage rate, and its total energy consumption is 49.5J. The hole repairing with RSWFHPM mode requires 26 iterations to reach the preset coverage rate, and its total energy consumption is 257.2J.
Although both patching modes can eventually achieve the preset coverage rate, the number of iterations and movement energy consumption of the RDHPM mode is less than that of the RSWFHPM mode. Therefore, the experimental analyses show that the RDHPM is more suitable for hole repairing in water flow if the actual conditions allow. Under the actual patching mode, the nodes are randomly sunk to a certain depth by node gravity, and then the virtual force on the nodes is calculated and the nodes are moved. This repair approach not only improves network coverage rate faster but also consumes less energy for node movement.

6.6. Comparative Experiments on Different Algorithms

In order to fully validate the performance of the CHRVE algorithm in terms of coverage rate, energy balance, and so on, taking the central closure coverage hole shown in Figure 10a as the scenario, the CHRVE algorithm is compared with 3D-SCHDR [43], 3D-DVFA [42], and 3DSD [41] algorithms, which have been investigated in recent years for 3D coverage and hole repair based on virtual forces. The 3D-DVFA and 3DSD algorithms are redeployment algorithms that require all nodes to be mobile nodes, and, in this paper, the simulation is performed using its virtual force calculation method only for the additional mobile nodes.
The comparison of coverage rates using each algorithm with different numbers of additional repairing nodes is shown in Figure 17, where the number of additional repairing nodes is incremented from 10 to 28 in steps of three. As can be seen from the figure, the four algorithms have the lowest coverage rate at the minimum number of additional repairing nodes. With the increase in the number of additional repairing nodes, the coverage rate of each algorithm increases gradually, and the coverage performance of the CHRVE algorithm is better than that of the other three algorithms. In addition, when the number of additional repairing nodes is greater than 19, the growth of the coverage rate of the CHRVE algorithm will gradually become flat as the number of additional repairing nodes continues to increase. This is due to the redundant repair strategy of low-energy coverage hole in this paper. In this experiment, Addmin = 20 is calculated with Equation (9). After the number of additional repairing nodes reaches Addmin, the extra additional nodes will be mainly used for redundant repair of low-energy coverage holes, which will have limited effect on further improvement of the coverage rate.
Figure 18 shows the distribution of energy density variance for the four algorithms at different numbers of additional repairing nodes. The energy density variance values of the 3D-SCHDR, 3D-DVFA, and 3DSD algorithms in the figure are calculated after the hole repairing according to Definition 2. As can be seen from the figure, the energy density variance of the CHRVE algorithm is lower than that of the other three algorithms at each number of additional repairing nodes. In particular, the energy density variance of the CHRVE algorithm is even more significantly lower than that of the other three algorithms after the number of additional repairing nodes reaches 19. This is due to the redundant repair strategy of low-energy coverage holes, which guarantees that the hole repair can achieve a good energy balance.
From these experiments, we can see that the CHRVE algorithm in this paper has good adaptability to the underwater environment, regardless of whether the initial coverage is random deployment or static deployment based on some rules, whether the coverage holes are large single holes, multiple non-closed holes or irregular coverage holes, whether the initial additional repairing nodes are deployed at the water surface or randomly sunk to a certain depth, and whether the terrain of the water bottom surface is flat, curved, or there are large obstacles. The CHRVE algorithm has a high node-utilization rate, so it requires a small number of additional repairing nodes for hole recovery. In addition, the algorithm has a great effect in improving the coverage rate, fast convergence speed, and strong robustness. Furthermore, the algorithm significantly improves the network energy balance under the premise of guaranteeing the network coverage quality, which can reduce the frequency of new coverage holes emergence due to node energy depletion and reduce the number of holes to repair. Therefore, the CHRVE algorithm effectively improves network reliability and reduces the cost of maintaining the network.

7. Conclusions

In this paper, a coverage hole recovery method based on virtual force guidance and energy balance is proposed. Some new concepts such as energy density, zero-energy holes, and low-energy coverage holes are defined to improve the energy balance. The energy-based virtual force model is constructed considering complex environmental factors such as water flow, complex underwater terrain and obstacles, and energy balance of sensor nodes, etc. Based on this model, the CHRVE algorithm for UWSNs is proposed.
The simulation experiments verify the performance of the CHRVE algorithm. They are analyzed in terms of coverage rate and energy density variance in comparison with the recent 3D coverage algorithms 3D-SCHDR, 3D-DVFA, and 3DSD. The simulation results show that the CHRVE algorithm has very good adaptability and robustness to the form of network deployment, the number, shape, size, and location of 3D coverage holes, as well as the initial scattering location of the additional repairing nodes. The algorithm requires fewer repairing nodes with a high node utilization rate, and it has fast convergence and significantly improves the coverage rate. Moreover, the proposed redundant repair strategy of low-energy coverage holes significantly improves the network energy balance under the premise of guaranteeing the network coverage quality, which can reduce the frequency of new coverage holes emerging. Thus, it can reduce the hole repair frequency. Therefore, the methodology proposed in this paper is of great significance for further improving the network service quality and extending the network life cycle.
In some special underwater situations, if the boundary position of the underwater coverage holes can be accurately detected, more efficient and precise methods can be used for coverage hole repair. Therefore, as future work, we plan to study the detection of underwater 3D coverage holes boundaries. We also plan to study the node clustering and node sleep scheduling strategies in the future.

Author Contributions

Conceptualization, L.Y.; Data curation, Z.H.; Formal analysis, L.Y.; Funding acquisition, L.Y.; Investigation, L.Y.; Methodology, L.Y.; Project administration, L.Y.; Resources, Z.H.; Software, Z.H.; Supervision, L.Y.; Validation, L.Y. and Z.H.; Visualization, Z.H.; Writing—original draft, L.Y.; Writing—review and editing, Z.H. All authors have read and agreed to the published version of the manuscript.

Funding

Supported by the fund of the Henan Province Science and Technology Research Project of China (No. 242102210213).

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Nain, M.; Goyal, N.; Dhurandher, S.K.; Dave, M.; Verma, A.K.; Malik, A. A survey on node localization technologies in UWSNs: Potential solutions, recent advancements, and future directions. Int. J. Commun. Syst. 2024, 7, e5915. [Google Scholar] [CrossRef]
  2. Khan, M.S.; Petroni, A.; Biagi, M. Cooperative communication based protocols for underwater wireless sensors networks: A review. Sensors 2024, 24, 4248. [Google Scholar] [CrossRef]
  3. Yan, L.; He, Y.; Huangfu, Z. An uneven node self-deployment optimization algorithm for maximized coverage and energy balance in underwater wireless sensor networks. Sensors 2021, 21, 1368. [Google Scholar] [CrossRef]
  4. Liu, L.F.; Liu, Y. Study of topology recovery algorithm based on full Steiner minimum tree problem in underwater wireless sensor networks. J. Commun. 2010, 31, 30–37. [Google Scholar]
  5. Das, S. A comparative study of various coverage-hole patching algorithms in wireless sensor networks. Adhoc Sens. Wirel. Netw. 2023, 57, 1–34. [Google Scholar]
  6. He, M.; Liu, F.X.; Shi, Y.H.; Zheng, X.; Zhou, H. Mechanism of topology optimization for underwater acoustic sensor networks based on double-AUVs. Control Des. 2017, 32, 124–130. [Google Scholar]
  7. Tian, W.; Guo, J.R.; Hou, R. Optimization method for underwater sensor networks based on a virtual force-oriented enhanced whale optimization algorithm. Electron. Lett. 2024, 60, e13189. [Google Scholar] [CrossRef]
  8. Gou, P.Z.; Mao, G.; Li, F.Z.; Jia, X.D. Optimized algorithm for recovering coverage holes in heterogeneous wireless sensor networks with node stable matching. Chin. J. Sens. Actuators 2019, 32, 908–914, 930. [Google Scholar]
  9. Abdelkader, K.; Rachid, B.; Amar, K. 3HA: Hybrid hole healing algorithm in a wireless sensor networks. Wirel. Pers. Commun. 2020, 112, 587–605. [Google Scholar]
  10. Xu, P.F.; Chen, Z.G.; Deng, X.H. Distributed Voronoi coverage algorithm in wireless sensor networks. J. Commun. 2010, 31, 25–34. [Google Scholar]
  11. Deng, L.X.; Ma, X.; Gu, J.; Li, Y.B. Detection and repair of coverage holes in mobile sensor networks using sub-voronoi cells. Int. J. Robot. Autom. 2018, 33, 601–610. [Google Scholar] [CrossRef]
  12. Wu, Q. Research on Gap Fixing and Data Transmission Technology of Wireless Sensor Network for Harmful Gas Detection; Harbin University of Science and Technology: Harbin, China, 2019. [Google Scholar]
  13. Yu, Q.; Wang, W.D.; Li, L.J.; Qian, T. Improved recovery algorithms of coverage holes in hybrid WSN. J. Univ. Electron. Sci. Technol. China 2017, 46, 534–539. [Google Scholar]
  14. Senouci, M.R.; Mellouk, A.; Assnoune, K. Localized movement-assisted sensor deployment algorithm for hole detection and healing. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 1267–1277. [Google Scholar] [CrossRef]
  15. So-In, C.; Nguyen, T.G.; Nguyen, N.G. An efficient coverage hole-healing algorithm for area-coverage improvements in mobile sensor networks. Peer-to-Peer Netw. Appl. 2019, 12, 541–552. [Google Scholar] [CrossRef]
  16. Kadu, R.; Malpe, K. Movement-assisted coverage improvement approach for hole healing in wireless sensor networks. In Proceedings of the 2017 2nd IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT2017), Coimbatore, Tamil Nadu, India, 22–24 February 2017; pp. 1–4. [Google Scholar]
  17. Sahoo, P.K.; Tsai, J.Z.; Ke, H.L. Vector method based coverage hole recovery in wireless sensor. In Proceedings of the Communication Systems and Networks (COMSNETS2010), Bangalore, India, 5–9 January 2010; pp. 1–9. [Google Scholar]
  18. Han, Y.L. Coverage hole repair algorithm based on non-parallel dichotomy. Comput. Eng. Appl. 2020, 56, 87–92. [Google Scholar]
  19. Khalifa, B.; Aghbari, Z.A.; Khedr, A.M. A distributed self-healing coverage hole detection and repair scheme for mobile wireless sensor networks. Sustain. Comput. Inform. Syst. 2021, 30, 1–10. [Google Scholar] [CrossRef]
  20. Yang, K.; Liu, Q.; Zhang, S.K.; Li, J.; Weng, D.L. Hole recovery algorithm based on mobile inner nodes in wireless sensor networks. J. Commun. 2012, 9, 116–117. [Google Scholar]
  21. Su, H.; Wang, Y. A self-healing algorithm without location information in sensor networks. Chin. J. Comput. 2009, 32, 1957–1970. [Google Scholar]
  22. Wang, L.L.; Wu, X.B. Decentralized detection and patching of trap coverage holes for sensor networks. Control Decis. 2012, 27, 1810–1815. [Google Scholar]
  23. Wang, L.M.; Fei, L.; Qin, Y. Resilient method for recovering coverage holes of wireless sensor networks by using mobile nodes. J. Commun. 2011, 32, 1–8. [Google Scholar]
  24. Li, W.; Wu, Y.W. Tree-based coverage hole detection and healing method in wireless sensor networks. Comput. Netw. 2016, 103, 33–43. [Google Scholar] [CrossRef]
  25. Das, S.; Debbarma, M.K. A coverage-hole boundary detection approach based on tree-traversal in wireless sensor networks. Adhoc Sens. Wirel. Netw. 2022, 52, 97–122. [Google Scholar]
  26. Yang, M.X.; Fang, K.; Wang, X.D.; Peng, F.; Zhou, X.L. Search and repair method of perception coverage hole in wireless sensor network. Chin. J. Sens. Actuators 2020, 33, 750–756. [Google Scholar]
  27. Giada, S.; Mario, G.C.A.C. Swarm intelligence for hole detection and healing in wireless sensor networks. Comput. Netw. 2024, 250, 110538. [Google Scholar]
  28. Wang, J.; Ju, C.W.; Kim, H.J.; Sherratt, R.S.; Lee, S. A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs. Clust. Comput. 2019, 22, 1787–1795. [Google Scholar] [CrossRef]
  29. Jiang, D. Research on the Discovery and Restoration of Blind Spots in Wireless Sensor Networks; Northeastern University: Shen Yang, Chian, 2008. [Google Scholar]
  30. Gou, P.Z.; Sun, X.C.; Mao, G. Optimization of recovering coverage holes based on improved genetic algorithm. Chin. J. Sens. Actuators 2020, 33, 1800–1807. [Google Scholar]
  31. Zhuang, Y.M.; Wu, C.D.; Zhang, Y.Z. A coverage hole recovery algorithm for wireless sensor networks based on cuckoo search. In Proceedings of the 7th Annual IEEE International conference on Cyber Technology in Automation, Control and Intelligent Systems (CYBER2017), Honolulu, HI, USA, 31 July–4 August 2017; pp. 1552–1557. [Google Scholar]
  32. Neda, N.D.; Hamid, B. A distributed energy-efficient approach for hole repair in wireless sensor networks. Wirel. Netw. 2020, 26, 1839–1855. [Google Scholar]
  33. Rajib, C.; Mrinal, K.D.B. Enhancing Network Reliability: Exploring Effective Strategies for Coverage-Hole Analysis and Patching in Wireless Sensor Networks. Wirel. Pers. Commun. 2024, 134, 487–517. [Google Scholar]
  34. Yan, L.H.; He, Y.Y.; Huangfu, Z.M. A fish swarm inspired holes recovery algorithm for wireless sensor network. Int. J. Wirel. Inf. Netw. 2020, 27, 89–101. [Google Scholar] [CrossRef]
  35. He, M.; Liang, W.H.; Chen, Q.L.; Chen, X.L.; Wang, L.H. Topology self-healing algorithm of mobile underwater wireless sensor networks. Control Decis. 2015, 30, 251–255. [Google Scholar]
  36. Hao, Z.J.; Xu, H.W.; Dang, X.C.; Duan, Y. A dynamic detection and repair algorithm for three-dimensional coverage holes in WSN. Comput. Eng. 2020, 46, 178–186. [Google Scholar]
  37. Zhang, L.L.; Luo, C.M.; Ge, X.Y.; Cao, Y.X.; Zhang, H.B.; Xin, G.F. Three-Dimensional Iterative Enhancement for Coverage Hole Recovery in Underwater Wireless Sensor Networks. J. Mar. Sci. Eng. 2023, 11, 2365. [Google Scholar] [CrossRef]
  38. Uzun, E.; Senel, F.; Akkaya, K.; Yazici, A. Distributed connectivity restoration in underwater acoustic sensor networks via depth adjustment. In Proceedings of the 2015 IEEE International Conference on Communications, London, UK, 8–12 June 2015; pp. 6357–6362. [Google Scholar]
  39. Wang, Y.; Li, F.; Dahlberg, T.A. Energy-efficient topology control for three-dimensional sensor network. Int. J. Sens. Netw. 2008, 4, 68–78. [Google Scholar] [CrossRef]
  40. Wei, L.S.; Cai, S.B.; Pan, S. Research on mobile strategy of anchor node based on weighted virtual force model. J. Commun. 2017, 38, 97–107. [Google Scholar]
  41. Miao, C.Y.; Dai, G.Y.; Zhao, X.M.; Tang, Z.Z.; Chen, Q.Z. 3D self-deployment algorithm in mobile wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 11, 721921. [Google Scholar] [CrossRef]
  42. Boufares, N.; Khoufi, I.; Minet, P.; Saidane, L.; Saied, Y.B. Three dimensional mobile wireless sensor networks redeployment based on virtual forces. In Proceedings of the 2015 International Wireless Communications and Mobil Computing Conferece (IWCMC), Dubrovnik, Croatia, 24–28 August 2015; pp. 563–568. [Google Scholar]
  43. Hao, Z.J.; Xu, H.W.; Dang, X.C.; Qu, N.J. Method for patching three-dimensional surface coverage loopholes of hybrid nodes in wireless sensor networks. J. Sens. 2020, 2020, 6492457. [Google Scholar] [CrossRef]
  44. Senel, F. Coverage-aware connectivity-constrained unattended sensor deployment in underwater acoustic sensor networks. Wirel. Commun. Mob. Comput. 2016, 30, 70–77. [Google Scholar] [CrossRef]
  45. Alam, S.; Haas, Z.J. Coverage and connectivity in three-dimensional networks. Ad Hoc Netw. 2015, 34, 157–169. [Google Scholar] [CrossRef]
  46. Zhang, W.B.; Wang, J.; Han, G.J. A cluster sleep-wake scheduling algorithm based on 3D topology control in underwater sensor networks. Sensors 2019, 19, 156. [Google Scholar] [CrossRef]
Figure 1. The virtual repulsive force.
Figure 1. The virtual repulsive force.
Electronics 13 04446 g001
Figure 2. The virtual attractive force.
Figure 2. The virtual attractive force.
Electronics 13 04446 g002
Figure 3. The virtual repulsion forces at the boundary of the monitoring area.
Figure 3. The virtual repulsion forces at the boundary of the monitoring area.
Electronics 13 04446 g003
Figure 4. The virtual attractive force of hole grid point Qj on Nsi.
Figure 4. The virtual attractive force of hole grid point Qj on Nsi.
Electronics 13 04446 g004
Figure 5. The force on the bottom or obstacle.
Figure 5. The force on the bottom or obstacle.
Electronics 13 04446 g005
Figure 6. Coverage hole recovery with CHRVE.
Figure 6. Coverage hole recovery with CHRVE.
Electronics 13 04446 g006
Figure 7. The variation of network coverage rate with number of iterations.
Figure 7. The variation of network coverage rate with number of iterations.
Electronics 13 04446 g007
Figure 8. Multiple non-closed coverage holes and their initial coverage state.
Figure 8. Multiple non-closed coverage holes and their initial coverage state.
Electronics 13 04446 g008
Figure 9. The coverage rate variation diagram for recovery of multiple open holes with different patching mode and number of nodes.
Figure 9. The coverage rate variation diagram for recovery of multiple open holes with different patching mode and number of nodes.
Electronics 13 04446 g009
Figure 10. Central closure coverage holes and their initial coverage state.
Figure 10. Central closure coverage holes and their initial coverage state.
Electronics 13 04446 g010
Figure 11. The coverage rate variation diagram for recovery of central closure holes with different patching mode and number of nodes.
Figure 11. The coverage rate variation diagram for recovery of central closure holes with different patching mode and number of nodes.
Electronics 13 04446 g011
Figure 12. The coverage holes formed by the remaining 38 nodes.
Figure 12. The coverage holes formed by the remaining 38 nodes.
Electronics 13 04446 g012
Figure 13. The analyses for coverage rate and energy density variance.
Figure 13. The analyses for coverage rate and energy density variance.
Electronics 13 04446 g013aElectronics 13 04446 g013b
Figure 14. Experiment on water bottom with complex terrain or obstacles.
Figure 14. Experiment on water bottom with complex terrain or obstacles.
Electronics 13 04446 g014
Figure 15. The coverage rate and energy density variance with number of iteration rounds for coverage holes recovery with underwater curved surfaces and obstacles.
Figure 15. The coverage rate and energy density variance with number of iteration rounds for coverage holes recovery with underwater curved surfaces and obstacles.
Electronics 13 04446 g015
Figure 16. The movement energy consumption variance with number of iteration rounds for coverage holes recovery.
Figure 16. The movement energy consumption variance with number of iteration rounds for coverage holes recovery.
Electronics 13 04446 g016
Figure 17. The comparison of coverage rates for different algorithms.
Figure 17. The comparison of coverage rates for different algorithms.
Electronics 13 04446 g017
Figure 18. The comparison of energy density variance for different algorithms.
Figure 18. The comparison of energy density variance for different algorithms.
Electronics 13 04446 g018
Table 1. Parameter description table.
Table 1. Parameter description table.
ParameterDefinition
CthThe threshold value of coverage rate
AddminThe minimum number of additional repairing nodes by theoretical estimation
AddnodeThe actual number of additional repairing nodes
ηThe coverage rate of UWSNs
μThe correction factor for node utilization rate
StepmaxThe maximum movement step
E0The initial value of energy
EcurThe current residual energy
EᶿThe minimum energy threshold
EthThe energy threshold for repairing nodes
IterThe maximum number of iterations
FminThe minimum force threshold for node movement
krepThe repulsive force coefficient
kattThe attractive force coefficient
ksixThe boundary repulsion coefficient
khollThe attractive force coefficient of hole grid points
klowhollThe attractive force coefficient of low-energy hole grid points
kfThe coefficient of force acting on the bottom surface or obstacle
Table 2. Simulation parameter settings.
Table 2. Simulation parameter settings.
Parameter NamesDefinitionValue
CthThe threshold value of coverage rate75%
αThe random move step adjustment factor0.6
βThe preset thresholds for redundancy repairing low-energy node coverage 90%
γThe preset thresholds for coverage hole points 5
μThe correction factor for node utilization rate0.7
StepmaxThe maximum movement step6 (m)
E0The initial value of energyrand [1, 20] J
E′0The initial value of energy for the additional nodesrand [18, 20] J
EthThe energy threshold for repairing nodes3 J
FminThe minimum force threshold for node movement10
krepThe repulsive force coefficient of inter-node106
kattThe attractive force coefficient of inter-node105
ksixThe repulsive force coefficient of boundary surface200
khollThe attractive force coefficient of grid point10
kfThe repulsive force coefficient of obstacle10
klowhollThe attractive force coefficient of low-energy coverage holes10
σ, θThe threshold factor0.1, 0.8
Ex1, Ey1, Ez1The energy consumption of node moving in positive direction per unit distance along the x, y, z axes0.02 J, 0.05 J, 0.08 J
Ex2, Ey2, Ez2The energy consumption of node moving in negative direction per unit distance along the x, y, z axes0.05 J, 0.02 J, 0.01 J
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yan, L.; Huangfu, Z. A Coverage Hole Recovery Method for 3D UWSNs Based on Virtual Force and Energy Balance. Electronics 2024, 13, 4446. https://doi.org/10.3390/electronics13224446

AMA Style

Yan L, Huangfu Z. A Coverage Hole Recovery Method for 3D UWSNs Based on Virtual Force and Energy Balance. Electronics. 2024; 13(22):4446. https://doi.org/10.3390/electronics13224446

Chicago/Turabian Style

Yan, Luoheng, and Zhongmin Huangfu. 2024. "A Coverage Hole Recovery Method for 3D UWSNs Based on Virtual Force and Energy Balance" Electronics 13, no. 22: 4446. https://doi.org/10.3390/electronics13224446

APA Style

Yan, L., & Huangfu, Z. (2024). A Coverage Hole Recovery Method for 3D UWSNs Based on Virtual Force and Energy Balance. Electronics, 13(22), 4446. https://doi.org/10.3390/electronics13224446

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop