Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 8/2022

13.11.2021 | Research Article-Computer Engineering and Computer Science

Enhanced Border and Hole Detection for Energy Utilization in Wireless Sensor Networks

verfasst von: Y. Harold Robinson, T. Samraj Lawrence, E. Golden Julie, Raghvendra Kumar, Pham Huy Thong, Le Hoang Son

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 8/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Identification and repairing holes in ireless sensor networks (WSNs) are challenging with full and low complexity. A local healing approach based on distributed virtual forces will make the healing area of the hole possible. The construction of repairing design is a locally allocated and constructed methodology that will enhance the coverage area in WSNs. In this paper, an enhanced border and hole detection (EBHD) algorithm is proposed for the energy containment of WSN. The performance of the proposed EBHD methodology is compared with those of the existing methods through Network Simulator 2 (NS2). The simulation results prove that the proposed EBHD achieves a high packet reception ratio while improving the residual energy and reducing end-to-end delay.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Fu, X.; Yao, H.; Yang, Y.: Cascading failures in wireless sensor networks with load redistribution of links and nodes. Ad Hoc Netw. 93, 101900 (2019)CrossRef Fu, X.; Yao, H.; Yang, Y.: Cascading failures in wireless sensor networks with load redistribution of links and nodes. Ad Hoc Netw. 93, 101900 (2019)CrossRef
2.
Zurück zum Zitat Santhana Krishnan, R.; Julie, E.G.; Robinson, Y.H.; Son, L.H.; Kumar, R.; Abdel-Basset, M.; Thong, P.H.: A new algorithm for high power node multicasting in wireless sensor networks. IEEE Access 7, 38584–38592 (2019)CrossRef Santhana Krishnan, R.; Julie, E.G.; Robinson, Y.H.; Son, L.H.; Kumar, R.; Abdel-Basset, M.; Thong, P.H.: A new algorithm for high power node multicasting in wireless sensor networks. IEEE Access 7, 38584–38592 (2019)CrossRef
3.
Zurück zum Zitat Mohindru, V.; Bhatt, R.; Singh, Y.: Reauthentication scheme for mobile wireless sensor networks. Sustain. Comput. Inform. Syst. 23, 158–166 (2019) Mohindru, V.; Bhatt, R.; Singh, Y.: Reauthentication scheme for mobile wireless sensor networks. Sustain. Comput. Inform. Syst. 23, 158–166 (2019)
5.
Zurück zum Zitat Parras, J.; Zazo, S.: Learning attack mechanisms in wireless sensor networks using markov decision processes. Expert Syst. Appl. 122(15), 376–387 (2019)CrossRef Parras, J.; Zazo, S.: Learning attack mechanisms in wireless sensor networks using markov decision processes. Expert Syst. Appl. 122(15), 376–387 (2019)CrossRef
6.
Zurück zum Zitat Harold Robinson, Y.; Balaji, S.; Julie, E.G.: FPSOEE: Fuzzy-enabled particle swarm optimization-based energy-efficient algorithm in mobile ad-hoc networks. J. Intell. Fuzzy Syst. 36(4), 3541–3553 (2019)CrossRef Harold Robinson, Y.; Balaji, S.; Julie, E.G.: FPSOEE: Fuzzy-enabled particle swarm optimization-based energy-efficient algorithm in mobile ad-hoc networks. J. Intell. Fuzzy Syst. 36(4), 3541–3553 (2019)CrossRef
7.
Zurück zum Zitat Sun, Z.; Liu, Y.; Tao, Li.: Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization. J. Netw. Comput. Appl. 112(15), 29–40 (2018)CrossRef Sun, Z.; Liu, Y.; Tao, Li.: Attack localization task allocation in wireless sensor networks based on multi-objective binary particle swarm optimization. J. Netw. Comput. Appl. 112(15), 29–40 (2018)CrossRef
8.
Zurück zum Zitat Bhatt, R.; Maheshwary, P.; Shukla, P.; Shukla, P.; Shrivastava, M.; Changlani, S.: Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN). Computer Commun. 149, 134–145 (2020)CrossRef Bhatt, R.; Maheshwary, P.; Shukla, P.; Shukla, P.; Shrivastava, M.; Changlani, S.: Implementation of fruit fly optimization algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN). Computer Commun. 149, 134–145 (2020)CrossRef
9.
Zurück zum Zitat Khedr, A.M.; Osamy, W.; Salim, A.: Distributed coverage hole detection and recovery scheme for heterogeneous wireless sensor networks. Computer Commun. 124, 61–75 (2018)CrossRef Khedr, A.M.; Osamy, W.; Salim, A.: Distributed coverage hole detection and recovery scheme for heterogeneous wireless sensor networks. Computer Commun. 124, 61–75 (2018)CrossRef
10.
Zurück zum Zitat Robinson, Y.H.; Julie, E.G.; Balaji, S.; Ayyasamy, A.: Energy aware clustering scheme in wireless sensor network using neuro-fuzzy approach. Wireless Pers. Commun. 95(2), 703–721 (2017)CrossRef Robinson, Y.H.; Julie, E.G.; Balaji, S.; Ayyasamy, A.: Energy aware clustering scheme in wireless sensor network using neuro-fuzzy approach. Wireless Pers. Commun. 95(2), 703–721 (2017)CrossRef
11.
Zurück zum Zitat Han, L.; Zhou, M.; Jia, W.; Dalil, Z.; Xingbo, Xu.: Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf. Sci. 476, 491–504 (2019)CrossRef Han, L.; Zhou, M.; Jia, W.; Dalil, Z.; Xingbo, Xu.: Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model. Inf. Sci. 476, 491–504 (2019)CrossRef
13.
Zurück zum Zitat López, M.; Peinado, A.; Ortiz, A.: An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks. Computer Netw. 165, 106945 (2019)CrossRef López, M.; Peinado, A.; Ortiz, A.: An extensive validation of a SIR epidemic model to study the propagation of jamming attacks against IoT wireless networks. Computer Netw. 165, 106945 (2019)CrossRef
14.
Zurück zum Zitat Oh, S.; Cho, H.; Kim, S.-H.; Lee, W.; Lee, E.: Continuous object tracking protocol with selective wakeup based on practical boundary prediction in wireless sensor networks. Computer Netw. 162, 106854 (2019)CrossRef Oh, S.; Cho, H.; Kim, S.-H.; Lee, W.; Lee, E.: Continuous object tracking protocol with selective wakeup based on practical boundary prediction in wireless sensor networks. Computer Netw. 162, 106854 (2019)CrossRef
15.
Zurück zum Zitat Golden Julie, E.; Tamilselvi, S.; Harold Robinson, Y.: Performance analysis of energy efficient virtual back bone path based cluster routing protocol for WSN. Wireless Pers. Commun. 91(3), 1171–1189 (2016)CrossRef Golden Julie, E.; Tamilselvi, S.; Harold Robinson, Y.: Performance analysis of energy efficient virtual back bone path based cluster routing protocol for WSN. Wireless Pers. Commun. 91(3), 1171–1189 (2016)CrossRef
16.
Zurück zum Zitat Phoemphon, S.; So-In, C.; Leelathakul, N.: A hybrid localization model using node segmentation and improved particle swarm optimization with obstacle-awareness for wireless sensor networks. Expert Syst. Appl. 143, 113044 (2020)CrossRef Phoemphon, S.; So-In, C.; Leelathakul, N.: A hybrid localization model using node segmentation and improved particle swarm optimization with obstacle-awareness for wireless sensor networks. Expert Syst. Appl. 143, 113044 (2020)CrossRef
17.
Zurück zum Zitat Sun, Z.; Wei, M.; Zhang, Z.; Gang, Qu.: Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks. Appl. Soft Comput. 77, 366–375 (2019)CrossRef Sun, Z.; Wei, M.; Zhang, Z.; Gang, Qu.: Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks. Appl. Soft Comput. 77, 366–375 (2019)CrossRef
18.
Zurück zum Zitat Deebak, B.D.; Al-Turjman, F.: A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Netw. 97, 102022 (2020)CrossRef Deebak, B.D.; Al-Turjman, F.: A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks. Ad Hoc Netw. 97, 102022 (2020)CrossRef
19.
Zurück zum Zitat Yi, L.; Deng, X.; Zou, Z.; Ding, D.; Yang, L.T.: Confident information coverage hole detection in sensor networks for uranium tailing monitoring. J. Parallel Distrib. Comput. 118, 57–66 (2018)CrossRef Yi, L.; Deng, X.; Zou, Z.; Ding, D.; Yang, L.T.: Confident information coverage hole detection in sensor networks for uranium tailing monitoring. J. Parallel Distrib. Comput. 118, 57–66 (2018)CrossRef
21.
Zurück zum Zitat Le Nguyen, P.; Nguyen, K.; Vu, H.; Ji, Y.: TELPAC: a time and energy efficient protocol for locating and patching coverage holes in WSNs. J. Netw. Computer Appl. 147, 102439 (2019)CrossRef Le Nguyen, P.; Nguyen, K.; Vu, H.; Ji, Y.: TELPAC: a time and energy efficient protocol for locating and patching coverage holes in WSNs. J. Netw. Computer Appl. 147, 102439 (2019)CrossRef
22.
Zurück zum Zitat Etancelin, J.-M.; Fabbri, A.; Guinand, F.; Rosalie, M.: DACYCLEM: a decentralized algorithm for maximizing coverage and lifetime in a mobile wireless sensor network. Ad Hoc Netw. 87(1), 174–187 (2019)CrossRef Etancelin, J.-M.; Fabbri, A.; Guinand, F.; Rosalie, M.: DACYCLEM: a decentralized algorithm for maximizing coverage and lifetime in a mobile wireless sensor network. Ad Hoc Netw. 87(1), 174–187 (2019)CrossRef
23.
Zurück zum Zitat Prithi, S.; Sumathi, S.: LD2FA-PSO: a novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Netw. 97, 102024 (2020)CrossRef Prithi, S.; Sumathi, S.: LD2FA-PSO: a novel learning dynamic deterministic finite automata with PSO algorithm for secured energy efficient routing in wireless sensor network. Ad Hoc Netw. 97, 102024 (2020)CrossRef
24.
Zurück zum Zitat Kalaivanan, K.; Bhanumathi, V.: Reliable location aware and Cluster-Tap Root based data collection protocol for large scale wireless sensor networks. J. Netw. Computer Appl. 118, 83–101 (2018)CrossRef Kalaivanan, K.; Bhanumathi, V.: Reliable location aware and Cluster-Tap Root based data collection protocol for large scale wireless sensor networks. J. Netw. Computer Appl. 118, 83–101 (2018)CrossRef
25.
Zurück zum Zitat Kumar, P.; Chaturvedi, A.: Fuzzy-interval based probabilistic query generation models and fusion strategy for energy efficient wireless sensor networks. Comput. Commun. 117, 46–57 (2018)CrossRef Kumar, P.; Chaturvedi, A.: Fuzzy-interval based probabilistic query generation models and fusion strategy for energy efficient wireless sensor networks. Comput. Commun. 117, 46–57 (2018)CrossRef
26.
Zurück zum Zitat Xie, J., Xiong, Z., Dai, Q., Wang, X., Zhang, Y.: A local-gravitation-based method for the detection of outliers and boundary points, Knowledge-Based Systems, In press, corrected proof, Available online 6 December 2019, Article 105331 Xie, J., Xiong, Z., Dai, Q., Wang, X., Zhang, Y.: A local-gravitation-based method for the detection of outliers and boundary points, Knowledge-Based Systems, In press, corrected proof, Available online 6 December 2019, Article 105331
30.
Zurück zum Zitat Balaji, S.; Golden Julie, E.; Harold Robinson, Y.: Development of fuzzy based energy efficient cluster routing protocol to increase the lifetime of wireless sensor networks. Mobile Netw. Appl. 24(2), 394–406 (2019)CrossRef Balaji, S.; Golden Julie, E.; Harold Robinson, Y.: Development of fuzzy based energy efficient cluster routing protocol to increase the lifetime of wireless sensor networks. Mobile Netw. Appl. 24(2), 394–406 (2019)CrossRef
31.
Zurück zum Zitat Feng, X.; Zhang, X.; Zhang, J.; Muhdhar, A.A.: A coverage hole detection and repair algorithm in wireless sensor networks. Cluster Comput. 22, 12473–12480 (2019)CrossRef Feng, X.; Zhang, X.; Zhang, J.; Muhdhar, A.A.: A coverage hole detection and repair algorithm in wireless sensor networks. Cluster Comput. 22, 12473–12480 (2019)CrossRef
32.
Zurück zum Zitat Yan, F., Ma, W., Shen, F., Xia, W., Shen, L.: Connectivity based k-coverage hole detection in wireless sensor networks Mobile Netw. Appl. 1–11 (2019) Yan, F., Ma, W., Shen, F., Xia, W., Shen, L.: Connectivity based k-coverage hole detection in wireless sensor networks Mobile Netw. Appl. 1–11 (2019)
33.
Zurück zum Zitat Mehta, D.; Saxena, S.: MCH-EOR: multi-objective cluster head based energy-aware optimized routing algorithm in wireless sensor networks. Sustain. Comput. Inform. Syst. 28, 100406 (2020) Mehta, D.; Saxena, S.: MCH-EOR: multi-objective cluster head based energy-aware optimized routing algorithm in wireless sensor networks. Sustain. Comput. Inform. Syst. 28, 100406 (2020)
34.
Zurück zum Zitat Banerjee, P.S.; Mandal, S.N.; De, D.; Maiti, B.: RL-Sleep: temperature adaptive sleep scheduling using reinforcement learning for sustainable connectivity in wireless sensor networks. Sustain. Comput. Inform. Syst. 26, 100380 (2020) Banerjee, P.S.; Mandal, S.N.; De, D.; Maiti, B.: RL-Sleep: temperature adaptive sleep scheduling using reinforcement learning for sustainable connectivity in wireless sensor networks. Sustain. Comput. Inform. Syst. 26, 100380 (2020)
35.
Zurück zum Zitat Naghibi, M.; Barati, H.: EGRPM: energy efficient geographic routing protocol based on mobile sink in wireless sensor networks. Sustain. Comput. Inform. Syst. 25, 100377 (2020) Naghibi, M.; Barati, H.: EGRPM: energy efficient geographic routing protocol based on mobile sink in wireless sensor networks. Sustain. Comput. Inform. Syst. 25, 100377 (2020)
36.
Zurück zum Zitat Rajput, A.; Kumaravelu, V.B.: Scalable and sustainable wireless sensor networks for agricultural application of Internet of things using fuzzy c-means algorithm. Sustain. Comput. Inform. Syst. 22, 62–74 (2019) Rajput, A.; Kumaravelu, V.B.: Scalable and sustainable wireless sensor networks for agricultural application of Internet of things using fuzzy c-means algorithm. Sustain. Comput. Inform. Syst. 22, 62–74 (2019)
37.
Zurück zum Zitat Harold Robinson, Y.; Golden Julie, E.; Saravanan, K.; Son, L.H.; Kumar, R.; Abdel-Basset, M.; Thong, P.H.: Link-disjoint multipath routing for network traffic overload handling in mobile Ad-hoc networks. IEEE Access 7(1), 143312–143323 (2019)CrossRef Harold Robinson, Y.; Golden Julie, E.; Saravanan, K.; Son, L.H.; Kumar, R.; Abdel-Basset, M.; Thong, P.H.: Link-disjoint multipath routing for network traffic overload handling in mobile Ad-hoc networks. IEEE Access 7(1), 143312–143323 (2019)CrossRef
38.
Zurück zum Zitat Balaji, S.; Julie, E.G.; Robinson, Y.H.; Kumar, R.; Thong, P.H.; Son, L.H.: Design of a security-aware routing scheme in mobile Ad-hoc network using repeated game model. Computer Stand. Interfaces 66, 103358–103368 (2019)CrossRef Balaji, S.; Julie, E.G.; Robinson, Y.H.; Kumar, R.; Thong, P.H.; Son, L.H.: Design of a security-aware routing scheme in mobile Ad-hoc network using repeated game model. Computer Stand. Interfaces 66, 103358–103368 (2019)CrossRef
39.
Zurück zum Zitat Sahu, D.; Singh, K.; Manju, M.; Taniar, D.; Tuan, L.M.; Son, L.H.; Abdel-Basset, M.; Long, H.V.: Heuristic search based localization in mobile computational grid. IEEE Access 7, 78652–78664 (2019)CrossRef Sahu, D.; Singh, K.; Manju, M.; Taniar, D.; Tuan, L.M.; Son, L.H.; Abdel-Basset, M.; Long, H.V.: Heuristic search based localization in mobile computational grid. IEEE Access 7, 78652–78664 (2019)CrossRef
40.
Zurück zum Zitat Harold Robinson, Y.; Santhana Krishnan, R.; Golden Julie, E.; Kumar, R.; Son, L.H.; Thong, P.H.: Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in mobile Ad-hoc networks. Ad Hoc Netw. 93, 101896–101909 (2019)CrossRef Harold Robinson, Y.; Santhana Krishnan, R.; Golden Julie, E.; Kumar, R.; Son, L.H.; Thong, P.H.: Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in mobile Ad-hoc networks. Ad Hoc Netw. 93, 101896–101909 (2019)CrossRef
41.
Zurück zum Zitat Khan, T.; Singh, K.; Son, L.H.; Abdel-Basset, M.; Long, H.V.; Singh, S.P.; Manjul, M.: A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access 7, 58221–58240 (2019)CrossRef Khan, T.; Singh, K.; Son, L.H.; Abdel-Basset, M.; Long, H.V.; Singh, S.P.; Manjul, M.: A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access 7, 58221–58240 (2019)CrossRef
42.
Zurück zum Zitat Harold Robinson, Y.; Golden Julie, E.; Kumar, R.; Son, L.H.: Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Netw. Appl. 12(5), 1061–1075 (2019)CrossRef Harold Robinson, Y.; Golden Julie, E.; Kumar, R.; Son, L.H.: Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Netw. Appl. 12(5), 1061–1075 (2019)CrossRef
43.
Zurück zum Zitat Santhana Krishnan, R.; Golden Julie, E.; Harold Robinson, Y.; Son, L.H.; Kumar, R.; Abdel-Basset, M.; Thong, P.H.: A new algorithm for high power node multicasting in wireless sensor networks. IEEE Access 7, 38584–38592 (2019)CrossRef Santhana Krishnan, R.; Golden Julie, E.; Harold Robinson, Y.; Son, L.H.; Kumar, R.; Abdel-Basset, M.; Thong, P.H.: A new algorithm for high power node multicasting in wireless sensor networks. IEEE Access 7, 38584–38592 (2019)CrossRef
44.
Zurück zum Zitat Balamane, A.: Scalable biclustering algorithm considers the presence or absence of properties. Int. J. Data Warehous. Min. (IJDWM) 17(1), 39–56 (2021)CrossRef Balamane, A.: Scalable biclustering algorithm considers the presence or absence of properties. Int. J. Data Warehous. Min. (IJDWM) 17(1), 39–56 (2021)CrossRef
45.
Zurück zum Zitat Giang, N.L.; Tuan, N.A.; Ngan, T.T.; Son, N.N.; Thang, N.T.: Filter-wrapper incremental algorithms for finding reduct in incomplete decision systems when adding and deleting an attribute set. Int. J. Data Warehous. Min. (IJDWM) 17(2), 39–62 (2021)CrossRef Giang, N.L.; Tuan, N.A.; Ngan, T.T.; Son, N.N.; Thang, N.T.: Filter-wrapper incremental algorithms for finding reduct in incomplete decision systems when adding and deleting an attribute set. Int. J. Data Warehous. Min. (IJDWM) 17(2), 39–62 (2021)CrossRef
46.
Zurück zum Zitat Cicioğlu, M.; Çalhan, A.: Energy efficiency solutions for IEEE 802.15.6 based wireless body sensor networks. Wirel. Pers. Commun. 119, 1499–1513 (2021)CrossRef Cicioğlu, M.; Çalhan, A.: Energy efficiency solutions for IEEE 802.15.6 based wireless body sensor networks. Wirel. Pers. Commun. 119, 1499–1513 (2021)CrossRef
47.
Zurück zum Zitat Cicioğlu, M.; Çalhan, A.: Energy-efficient and SDN-enabled routing algorithm for wireless body area networks. Comput. Commun. 160, 228–239 (2020)CrossRef Cicioğlu, M.; Çalhan, A.: Energy-efficient and SDN-enabled routing algorithm for wireless body area networks. Comput. Commun. 160, 228–239 (2020)CrossRef
Metadaten
Titel
Enhanced Border and Hole Detection for Energy Utilization in Wireless Sensor Networks
verfasst von
Y. Harold Robinson
T. Samraj Lawrence
E. Golden Julie
Raghvendra Kumar
Pham Huy Thong
Le Hoang Son
Publikationsdatum
13.11.2021
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 8/2022
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-021-06330-y

Weitere Artikel der Ausgabe 8/2022

Arabian Journal for Science and Engineering 8/2022 Zur Ausgabe

Research Article-Computer Engineering and Computer Science

Watermarking Techniques for the Security of Medical Images and Image Sequences

Research Article-Computer Engineering and Computer Science

Probability Quantization Model for Sample-to-Sample Stochastic Sampling

Research Article-Computer Engineering and Computer Science

A Heuristic Local-sensitive Program-Wide Diffing Method for IoT Binary Files

Research Article-Computer Engineering and Computer Science

SR-Mine: Adaptive Transaction Compression Method for Frequent Itemsets Mining

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.