Abstract

Perimeter protection aims at identifying intrusions across the temporary base established by army in critical regions. Convex-hull algorithm is used to determine the boundary nodes among a set of nodes in the network. To study the effectiveness of such algorithm, we opted three variations, such as distributed approach, centralized, and mobile approach, suitable for wireless sensor networks for boundary detection. The convex-hull approaches are simulated with different node density, and the performance is measured in terms of energy consumption, boundary detection time, and accuracy. Results from the simulations highlight that the convex-hull approach is effective under densely deployed nodes in an environment. The different approaches of convex-hull algorithm are found to be suitable under different sensor network application scenarios.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call