1 Introduction

A sensor node, also termed as mote or sensor, is an autonomous, compact device that assimilates sensors and also contains capability to process, gather and transmit collected sensory data [1]. A sensor node collects information from sensing physical quantities such as temperature, pressure, smoke, sound etc. A wireless sensor network (WSN) refers to a group of spatially distributed sensor nodes, and one or more than one sink nodes [2]. Sink nodes are also termed as base positions. Sensors sense physical quantities such as, pressure, vibration, temperature or motion, in real time and produce sensory data [3]. A sensor acts as a data originator as well as data router. A sink node, receives and collects data from sensor nodes. In an application of event monitoring by WSN, first sensors collect information (data) from physical conditions when they sense the existence of events of interest and then sensor node conveys this collected data to the sink [4]. Sink node transmits data to the end-user by direct connections, such as satellite, internet or any other type of wireless communication. A WSN is also an environment comprised of measuring the sense data, computing, and communicating such that it provides a user the ability to observe, instrument, and respond as per the event in that particular infrastructure [5]. It comprises a large number of nodes deployed then via relay node or cluster heads, and data is passed onto the base station (sink). Here the information is being sent as a wireless link, and hence the term wireless is being used [6]. New developments in the computing hardware and software are responsible for its widespread use. In the early days, it served as the purpose in the battlefield, motivated by military applications [7]. These were used to identify, find, or detect enemy movements as well as in surveillance. However, in today’s time, the focus is on simple uses such as seismic monitoring and others directed to consumer uses. Due to the potential that WSN has its industry is overgrowing [8]. Although it can serve a lot of purposes there are major challenges to it. The lifetime of these WSN seems to be a major setback as we would require it to stay longer and in some cases a few node failures would let the entire WSN fail [9]. Also, some harsh tropical condition, enemy inhabited area would make things worse to change the batteries for these sensors [10]. Hence we would require load balancing and other deploying techniques to improve its lifetime. Another problem is coverage and one might need to cover the maximum area possible with a limited number of sensor. This would again require efficient handling of these sensors [11]. Depending upon our need we must be able to configure these sensors. Thus we would require mobile sensors. Similarly, it can be noted that mobile sinks would be a good boost in these WSNs [12]. There is sometimes the need of multi-objective sensors that not only sense the data but also performs various other tasks such as to locate a coverage hole [13], to minimize the power consumption by moving itself and likewise [14]. Also with this we need to take care of the cost as eventually we must go for a cost effective deployment techniques [15]. Some of the challenges in WSN like power consumption, localization, deployment and routing [16,17,18,19] in WSN have been represented in Fig. 1.

Fig. 1
figure 1

Challenges in WSN

Scientists are attempting to address these issues by considering different effective methodologies. This paper deals with the objective, strategy and constraints related to WSNs deployment as well as result oriented analysis of various deployment scheme. Also result of various deployment scheme is discussed and provided in tabular form.

This paper has been separated into five sections. Section 2 deals with some of the preliminary definitions, the objective, strategy and constraints related to WSNs deployment. Section 3 deals with the WSN deployment approaches which is divided into two categories: static sensor deployment and dynamic sensor deployment. Further deterministic deployment is discussed in tabular forms in reference of various coverage model. Also results of various deployment strategies are deliberated. In Sect. 4 the open research area and future work have been depicted. Lastly, this paper closes with the conclusion in Sect. 5.

2 Preliminaries

This section deals with some of the preliminary definitions, the objective, strategy and constraints related to WSNs deployment.

2.1 Preliminary Definitions

In order to understand deployment strategy in details, certain terms must be made clear. These definitions are provided here and has been illustrated in Fig. 2.

  • Definition I: Heterogeneous WSN These sensors are capable of doing multiple processing such as limiting power consumption, distribution of data and so on. These sensors are much more complicated to other types and pose a great deal to handle energy consumption and lifetime [20].

  • Definition II Homogeneous WSN They have same sensing, storage, processing, power and communication capabilities. Homogeneous WSN increases the risk of cluster head nodes being overloaded with transmissions. Hence it would require for protocol coordination and data aggregation. However, they are quite simpler to handle [21].

  • Definition III Relay node Relay nodes are different from other nodes as they have extra storage space to accommodate more data. Also they are accountable for accumulating sensed data and retransmitting it to sink via other relay nodes or cluster heads [22].

  • Definition IV Redundant node They are the similar nodes that are not used in the network for sensing. It means if removed it won’t affect the network. They are helpful in case if some nodes fail then they would take the place of the failed nodes.

  • Definition V Mobile node They are similar to other nodes except that they are movable and hence can change places as per our requirement. They play an important role in case of improving coverage, connectivity as well as in failure of a few nodes. Also the recovery task can be achieved when mobile node work as a router in weak or no coverage area.

  • Definition VI Mobile sink These are similar to mobile nodes but unlike sensing the data, they gather the sensed information. These are then used by the user. They are beneficial as it extends the network lifetime and helps in load balancing. Also energy consumption is reduced significantly [23].

  • Definition VII Energy hole This situation arises due to the irregular dispersal of data load on the nodes. Since the nodes closer to the sink would get heavier data traffic hence are more prone to fail. This can be corrected by deploying more redundant nodes at the sink area [24].

Fig. 2
figure 2

Preliminary definitions

2.2 The Objective of the Sensor Node Deployment

WSNs deployed to extract data from the events that happens at certain known points in a given region of interest or geographical area. WSN deployment is important to develop for real-life applications. After deployment WSN (WSN) provides too many occasions for monitoring and regulating the geographical area [25].

2.3 The Strategy of the Sensor Node Deployment

Selection of accurate position in the region of interest (RoI) is an important issue in WSNs. Sometimes requirements of system and network performance metrics are affected by the position of sensors. Vigilant deployment of sensors is very necessary to achieve the set goals [26]. If we take example of network coverage our main objective is, how to cover every target point in RoI is enclosed by the WSN. The sensor nodes placed neither too close or not too far for full utilization of sensors. A good placement of sensors will ensure a good performance for desired data extraction and communication with sink.

2.4 The Constraints of the Sensor Node Deployment

There are many constraints in deployment of WSNs, some are explained below and illustrated in Fig. 3.

Fig. 3
figure 3

Constraints of the sensor node deployment

  • Definition Coverage The first and most fundamental problem raises in sensors deployment, is how to cover a region of interest completely [27]. Coverage rate states to the ratio of the covered area, to the size of the RoI. Coverage rate shows great effect on the performance of WSNs. Figure 4 depicts coverage of the RoI with 120 sensors when deployed randomly in 100 × 100 m2 area with rs = 10 m.

    Fig. 4
    figure 4

    Coverage of the RoI with 120 sensors were randomly deployed in 100 X 100 m area with rs = 10 m

  • Definition II:Network connectivity Connectivity is an key issue in WSN deployment [28]. WSN performance reduces exponentially without connectivity because that collected data would not reach up to the sink node. There is no benefit of coverage without connectivity in WSN deployment. Network connectivity and coverage are related to each other closely because both are affected by the position of sensors Fig. 5 represents the connectivity of 30 randomly deployed nodes.

    Fig. 5
    figure 5

    Connectivity of 30 randomly deployed sensor node inside RoI

  • Definition III:Network lifetime Lifetime of a network is big challenge in the deployment of WSNs because energy resources in sensors are very limited [29]. Replacing or recharging the battery of sensors after deployment is very difficult or almost impossible. Positions and number of sensors is directly proportional to lifetime of WSN. A weak lifetime of WSN is achieved when after deployment of a smaller number of sensors. But deployment of large number of sensors is not a possible solution to increase the network lifetime, because volume of traffic also increases as well as the number of sensors increases. Hence consumption of energy also increases and network lifetime of WSN decreases. Thus, deployment of larger number of sensors does not essentially solve the network lifetime problem. For the enhancement of lifetime, sensors must be placed at exact places according to many factors (signal frequency, the position of the sink).

  • Definition IV Energy efficiency Sensors have limited energy resources, so it is necessary to use the sensor nodes in an efficient way to enhance the lifetime of WSN [30]. There are two methods to conserve energy in sensor networks, which are connected to each other with best placement. The first method is to develop a schedule sleep plan of redundant sensors while maintaining remaining sensors in active state to maintain network connectivity and coverage. The second method for conservation of energy is regulation of the sensing range of sensors.

  • Definition V Signal strength Measurement of communication quality of sensor nodes called signal strength. Strength of a received wireless signal shown with parameter ‘Received signal strength indication (RSSI)’ [31]. It is defined in (1)

    $$RSSI{ } = { } - 10*n*log10{ }\left( d \right) + { }P$$
    (1)

d = Distance from the sensor (in meter), \(n\)= Path-loss exponent (Propagation constant), \(P\)= Reception mode power (in Dbm).

  • Definition VI Accuracy Credibility of collected data is clearly a significant factor for WSNs deployment. Accuracy represents the efficiency in data transmission from node to destination. Data fusion increases the accuracy of the stated incident by reducing the probability of false alarms. Increasing the number of sensors RoI will increase the accuracy of the fused data.

  • Definition VII Deployment cost As well as number of sensors increases in WSN the deployment cost increases. In homogeneous WSNs, where all sensors have same cost, deployment cost can be decrease by achieving lowest sensor count with the satisfaction of the user’s requirements. In heterogeneous WSN, cost of deployment can be calculated by adding the costs of different type of sensors. Because various type of sensors possesses different costs, so for reducing the cost of deployment we try to find best possible combination of sensors that can satisfy requirements of application with the minimum possible cost.

3 WSN Deployment Approaches

In general, WSNs deployment divided into two categories: static sensor deployment and dynamic sensor deployment [32]. Choice of an appropriate method depends on various factors, such as the nature of the region of interest, type of sensors and the type of application. Figure 6 depicts classification of deployment techniques.

Fig. 6
figure 6

WSN deployment approaches

After deployment if sensors do not change their position, this type of deployment is known as static sensor deployment. When sensors are able to change their position this type of deployment called dynamic sensor deployment. There are two types of methods exists for static sensor deployment:

  • Random deployment

  • Deterministic deployment

3.1 Random Deployment

Random deployment is generally used in remote area, or contrary environments [33]. Deterministic deployment method is optimum if sensor nodes are deployed at predestined coordinates in RoI with the assured network connectivity. Sometimes deterministic deployment is impractical and almost impossible due to the inaccessibility or the harshness of the region of interest. In such type of situations as like natural disaster or a war, deterministic sensor deployment is very impractical and infeasible. Generally, in such type of conditions random deployment is only available option. Sometimes random deployment acts as essential part of other deployment methods. Figure 7 depicts a scenario of 324 randomly deployed nodes in 100 × 100 m2.

Fig. 7
figure 7

Random deployment N = 324 Area = 100*100 m

For example, in dynamic deployment of mobile sensors, it is assumed that initially sensor deployment takes place randomly. In random deployment, positions of sensors are shown by a mathematical function termed as probability density function (PDF). If region of interest is given as following (as in (2)):

$$RoI = \left\{ {x_{1} \ge X \le x_{2} ,y_{1} \ge Y \le y_{2} } \right\}$$
(2)

then probability density function is given by (3):

$$P\left( {x_{1} \ge X \le x_{2} ,y_{1} \ge Y \le y_{2} } \right) = \mathop \smallint \limits_{{x_{1} }}^{{x_{2} }} \mathop \smallint \limits_{{y_{1} }}^{{y_{2} }} f\left( {x,y} \right)dxdy$$
(3)

According to the strategy of deployment, the positional coordinates of the sensors follows a specific and distinct distribution. Random deployment is categorized in two methods:

  • Simple random deployment

  • Compound random deployment

3.1.1 Simple Random Deployment

There are many methods for the implementation of simple deployment. Some methods are explained below and been depicted in Fig. 8.

Fig. 8
figure 8

Simple random deployment approach

3.1.1.1 Simple Diffusion

Simple Diffusion is a simplest way to deploy sensors. In simple diffusion we scatter sensor nodes from the air [34]. So that all extracted information must transmit up to the sink nodes, distribution must be centered on the sink node. Lightweight sensors have high air resistance so sensors can randomize their position in RoI. Such type of sensor distribution is known as simple diffusion. In simple diffusion process of deployment is characterized by a linear diffusion equation and solution of this equation is a two-dimensional normal distribution. The probability density function of locations of sensors is given in (4) and (5):

$$f\left( x \right) = \frac{1}{{2\pi \sigma^{2} }}h\left( {||x - c||} \right), \quad x \in R^{2}$$
(4)
$$h\left( r \right) \triangleq e^{{\left( {\frac{{ - r^{2} }}{{2\sigma^{2} }}} \right)}}$$
(5)

In the above equation c is the mean position at ground, c is located under the point where sensors are scattered. Here σ2 is variance and σ is standard deviation of sensor distribution. Variance is calculated by numerous factors such as weight, size and shape of sensors, or the height of scattering.

3.1.1.2 Continuous Diffusion

In continuous diffusion sensor nodes are dropped from an airplane that flies over the middle of the region of interest, in this process we expect that most sensors fall at positions which are very close to the central line [35]. Central line is represented by B. Node distribution is found uniform along the axis of flight while along the perpendicular direction of axis of flight node distribution is found Gaussian. This type of distribution of sensors is termed as continuous diffusion as shown in Fig. 9. In continuous diffusion position of sensors is decided according to the following PDF given in (6) and (7).

$$f\left( x \right) = \frac{1}{\left| B \right|} ,\quad x \in R$$
(6)
$$f\left( y \right) = \frac{1}{{\sqrt {2\pi \sigma^{2} } }}e^{{ - \frac{{\left( {y - m} \right)^{2} }}{{2\sigma^{2} }}}} , \quad y \in R$$
(7)
Fig. 9
figure 9

Continous diffusion

3.1.1.3 Discontinuous Diffusion

In discontinuous diffusion, the sensor nodes are thrown by an airplane that flies over the middle of the region of interest. The authors of [36] proposed a discontinuous diffusion of the sensor nodes defined as follows: sensors are dropped discontinuously in a one flying-over. In each drop, n sensor nodes will be thrown. Finally, for N thrown sensors,

$$N = n \times number\;of\;drops$$
(8)

As well as number of drops increases, discontinuous diffusion converges towards continuous diffusion.

3.1.2 Compound Random Deployment

There are many methods for the implementation of simple deployment as represented in Fig. 10. Some methods are explained below.

Fig. 10
figure 10

Compound deployment

3.1.2.1 Constant diffusion

If density of sensors remains constant in region of interest after drop of sensors, such type of random distribution of sensors is known as constant diffusion [37] as shown in Fig. 11. Position of sensors is decided according to the following PDF given in (9):

$$f\left( x \right) = \frac{1}{{\left| {RoI} \right|}} , \quad x \in R^{2}$$
(9)
Fig. 11
figure 11

Constant diffusion

3.1.2.2 R-random

This distribution is used, if uniform scattering of sensors takes place with respect to the angular and radial directions from the sink [34]. Inside a distance R from the sink, position of sensors in polar coordinate system is decided according to PDF in (10):

$$f\left( {r,\theta } \right) = \frac{1}{2\pi R} \quad 0 \le r \le R,\quad 0 \le \theta \le 2\pi$$
(10)
3.1.2.3 Power-Law Diffusion

Power-law diffusion is random node placement algorithm in which sensor density is higher near the sink node, and a power law is followed by sensors [38]. The Probability density function of the position of sensors in polar coordinates is defined in (11):

$$f\left( {r,\theta } \right) = \frac{\alpha + 1}{{2\pi R}}\left( \frac{r}{R} \right)^{\alpha } \user2{ }0 \le r \le R,\quad 0 \le \theta \le 2\pi ,\quad - 1 \le \alpha \le 1$$
(11)
3.1.2.4 Exponential Diffusion

In exponential diffusion, if the distribution changes according to an exponential law [39]. Exponential diffusion follows the given probability density function in (12):

$$f\left( x \right) = \lambda e^{ - \lambda x}$$
(12)

Exponential diffusion takes place according to Fig. 12.

Fig. 12
figure 12

Exponential diffusion

3.1.2.5 Stensor

Stensor is a random node placement algorithm which is based on partition of RoI. In stensor algorithm, we assumed a rectangular region of interest divided into small cells. One cell can host only one sensor. Placement of sensors takes place according to the given probability density function as in (13):

$$f\left( x \right) = \frac{{e^{ - \sqrt \lambda } \lambda^{\frac{x}{2}} }}{x!} ,\; x \ge 0$$
(13)
3.1.2.6 Hybrid Diffusion

Hybrid diffusion is a hybridization of simple diffusion and constant diffusion [40]. Simple diffusion with large sensor count, near the sink node and constant diffusion with high network coverage and connectivity gives rise to hybrid diffusion. We select simple diffusion over the R-random because simple diffusion has a greater detection rate than R-random deployment strategy. PDF of simple diffusion is characterized by the variance \({\sigma }^{2}\) which makes it able to control the density of sensors around the sink node. Diffusion of N sensors using hybrid diffusion is same as the simple diffusion of α.N sensors and constant diffusion of β.N sensors, where α + β = 1 and 0 < α, β < 1.

3.2 Deterministic Deployment

The fundamental aim of deterministic deployment methods is to precompute the position of sensor nodes earlier to achieve the desired objectives or we try to guess performance of WSN before deployment of sensors by simulations and we develop the optimum methodology that tries to fulfil given user needs [25]. The real-world WSN deployment takes place according to obtained methodology. The fundamental concept is to confirm that the deployed WSN attains the desired goals. At present time, there is no clear methodology for deployment of a WSN that achieves the desired goals. Additionally, present work delivers algorithms of placement with no practical authentication. Generally, deterministic deployment is used for indoor applications, when sensors are costly. If operation of sensors significantly affected by their positions, such type of deployment method is used. In a comparison between deterministic and random deployment, optimum network configuration is offered by deterministic deployment. In case of deterministic deployment positions of sensors is pre-calculated to achieve the desired goals such as preferential coverage, network connectivity, and network lifetime. Figure 13 shows a scenario of 324 nodes in a RoI of 20 × 20 m2.

Fig. 13
figure 13

Deterministic deployment N = 324 Area = 20*20 m2

Coverage is considered as a most important factor in deterministic deployment. In deployment process, an algorithm in which we find maximum coverage with minimum sensor nodes is used. The taxonomy of deployment methods represents the presence of different classifications according to desired goals. Generally, sensor coverage model is divided in to three categories as shown in Fig. 14.

  • Binary coverage model.

  • Probabilistic coverage model.

  • Evidential coverage model.

Fig. 14
figure 14

Sensor coverage models

Based on the above coverage model, recent development in deterministic deployment is discussed below.

3.2.1 Based on Binary Coverage Model

Binary deployment methods are used if binary coverage model is used for sensor coverage model. Problem of sensor deployment in case of binary coverage model could be epitomized as the infamous Art Gallery Theorem (AGT). The art gallery problem can solve by calculating the lowest number of cameras which are positioned in a polygonal area so each point in the peripheral area is covered by cameras. Similarly, problem of sensor deployment can be solved with positioning sensors in accurate positions according to application such that whole region of interest is covered. Development and selection of optimal placement pattern is most important so that each and every point in region of interest can be covered with sensors. According to [41] regular triangular lattice can be used as placement model for blanket-cover condition of an unbounded plane. In a pattern-based/regular deployment, placement of sensors follows a set methodology such as star, ring, hexagonal etc. In a comparison between regular deployment and constant diffusion, it is found that the quality of monitoring and the covered environment in pattern-based deployment is found more effective than constant diffusion. Mathematically binary coverage models are given in (14):

$$C_{xy} \left( {s_{i} } \right) = \left\{ {\begin{array}{*{20}c} 1 & {if\, d\left( {s_{i} ,{\uprho }} \right) < r_{s} } \\ 0 & {otherwise} \\ \end{array} } \right.$$
(14)

where Cxy (si) represents probability of coverage of point ρ by the sensor si. d (si, ρ) is the Euclidean seperation between the node and point ρ and can be calculated by the expression in (15).

$$d\left( {s_{i} ,\rho } \right) = \sqrt {\left( {x_{i} - x} \right)^{2} + \left( {y_{i} - y} \right)^{2} }$$
(15)

where (xi,yi) is the coordinates of the sensor si and (x, y) are the coordinates of point ρ.

In comparison among different pattern-based topologies, result comes that it is advantageous to deploy sensors using grid topology. To achieve maximum coverage with minimum sensors in the case of underwater WSN, generally triangular grid topology is used. Some authors proposed an incremental deployment process for the same. Table 1 shows some recent development in deterministic deployment techniques using Binary deployment strategies.

Table 1 Determinsitic deloyment using binary coverage model

Sequential deployment is often infeasible because in most practical applications deployment of sensors takes place without any former information of the target. If the RoI is large or number of sensors, sequential deployment may be undesirable. Therefore, deployment method with only one step is found more beneficial in such type of situations. Problem of sensor deployment on three and two dimensional grids had been expressed as a combinatorial optimization problem and shown to be NP-complete [52]. There are two main downsides of this approach. First, the grid coverage method depends on “perfect” sensor detection concept, it means that it is expected that sensor generates binary yes/no detection result in each case. Second, due to computational complexity for large problem instances this method is found infeasible. Deployment problem of grid-based WSN has been studied widely and some methods have been intended to solve it, such as local search algorithm, simulated annealing, integer linear programming, ant colony optimization, and genetic algorithm.

It should be noted that in binary deployment strategies there is a connection between network coverage and connectivity. If we consider a convex ROI, covered by a set of sensors, it is found that communication graph containing of these sensor nodes is connected. In other words, if \({R}_{c}\) ≥ 2 \({r}_{s}\), WSN only needs to be configured to assurance coverage to satisfy both connectivity and coverage. Figure 15 shows the relationship between Communication range (\({R}_{c}\)) and Sensing range (\({r}_{s}\)) of a sensor. Hence, if the sensing range rs of a sensor is much shorter than its transmission range Rc then it is observed that connectivity is not a fundamental issue. In the case of k-coverage, same result can be generalized. In short, assurance of k-coverage also implies the assurance of k-connectivity in WSN deployment.

Fig. 15
figure 15

A sensor with communication range (\({R}_{c}\)), Sensing range (\({r}_{s}\))

3.3 Based on Probabilistic Deployment Strategies

Deployment strategies in which probabilistic sensor detection [53] takes place such type of deployment strategies refers as probabilistic deployment strategies. Figure 16 shows probability of coverage of point p for different values of ω. In probabilistic coverage model, a 2-D \(n*n\) grid is considered as RoI. Mathematically, it is given in (16):

$$C_{xy} (S_{i} ) = \left\{ {\begin{array}{ll} {0,} & {if\, r_{s} + r_{e} \le d\left( {s_{i} ,p} \right)} \\ {e^{{ - \delta a^{\beta } }} ,} & {if\, r_{s} - r_{e} < d\left( {s_{i} ,p} \right) < r_{s} + r_{e} } \\ {1,} & {if\, r_{s} - r_{e} \le d\left( {s_{i} ,p} \right)} \\ \end{array} } \right.$$
(16)

where δ and β are constant and α is given in (17).

$$a = d\left( {s_{i} ,p} \right) - r_{s} - r_{e}$$
(17)

Table 2 shows some recent development in deployment techniques using Probabilistic deployment strategies.

Fig. 16
figure 16

Probability of coverage of point p for different values of ω

Table 2 Development in uniform deployment tehniques using probabilistic Coverage model

The above mentioned deployment methods can be used in the case of uniform deployment. In uniform deployment problem, recorded event has equal significance at each point of region of interest and entreated detection probabilities for complete region of interest are found same. Required detection probabilities are found different at different positions in the case of non-uniform deployment. So aforementioned placement algorithms cannot be used. Some placement algorithms for non-uniform deployment problem are mentioned below in Table 3.

Table 3 Development in non-uniform deployment tehniques using probabilistic coverage model

3.4 Evidential Deployment Strategies

If we consider an evidential coverage model, deployment problem of WSNs solemnizes as a nonconvex and binary nonlinear optimization problem. If we take only two factors in consideration cost and uniform coverage, the authors of [67] suggested a deployment heuristic EBDA. EDBA algorithm is based on evidence and it considers grid-like node deployment. Primary objective of this algorithm, is to confirm that each target point in region of interest is covered, this projected result is the first conclusion condition. Second conclusion condition is number of available sensors. In EDBA algorithm computational complexity is equal to \(O(n.m)\), where \(n\times m\) is known as scope of the region of interest. Two other metrics, preferential coverage and connectivity have also been considered by the authors [68]. For EDBA deployment algorithm, the total number of different sub problems is an exponential in the input size. This concept gives rise to an exponential-time algorithm. A substitute E2BDA can be utilized to develop a sub optimal solution. E2BDA algorithm is considered as a polynomial-time algorithm.

E2BDA algorithm uses a restricted region which is based on the sliding window method and do not check all grid points to calculate coverage. If E2BDA having large number of sensor nodes then the computational complexity is found equal to the \(O\left(k{w}^{2}mn\right)\), Where:

\(k\): Number of best deployments at each repetition. \(w\): Window size, equal to sensing range of sensor. \(m\times n\): Size of the RoI.

Experimental results reported E2BDA outperforms these deployment strategies.

4 Open Research Issue

Since WSN is a newly developed concept, there is no universal theory applied for it. We need to choose from the techniques as per our requirement. In recent times, WSNs have garnered much attention. Although it is under constant progress, there are many grey areas left in its development.

Coverage hole detection improvement is always on everyone’s radar while studying the deployment of WSNs. The recovery mechanism for coverage hole yet seems to be a common problem in any method of deployment. The problem remains still open to detect such holes as well as repair it. Another challenge that poses to WSNs is improving node detection and connectivity recovery algorithms. In this paper, this problem is addressed, and to an extent, we can improve the node failure. However, in a limited number of nodes, re-connectivity cannot be guaranteed.

Another critical issue is improving the Energy Efficiency. As sensors run on batteries, it is evident that they would someday die. They are hence preserving energy such that it could have a long run. Efficient deployment scheme needs to be developed for sleep mode for the sensors without affecting the Quality of Service (QoS) parameters.

In cases where multiple sinks are in play, there is some adherent possibility of data aggregation. As a result, it would raise two common problems. Firstly, a wrong route to base station and secondly, a wrong route to the node. In either case, it would lead to the disruption of network communication. These must be taken care of for improving the WSNs.

5 Conclusion

In this paper, we have discussed most of the prominent deployment techniques in WSNs and identified its significant drawback as well as its advantages. Not only this, we have also discussed the challenges or precautions that arise while installation and deploying WSNs. Also, a table is drawn on comparing each of the deployment techniques in each section. A comprehensive table is drawn in the last section to give the overview and comparison of each technique discussed. We can efficiently use the schemes as per our region of operation, whether it is a 3D or 2D deployment. All other factors that are prominent while deploying WSNs have been discussed, such as cost, energy distribution, range, and availability of nodes. With the schemes discussed here, one can selectively determine the deployment technique with ease.