Download now Free registration required
Perimeter surveillance is one of the major applications of sensor networks. The perimeter represents the physical extent of the region to be monitored and depending on the application, it is required to sense the intrusion enter the monitored region or leave from the monitored region of the object being monitored. In this paper, the problem of identifying the perimeter of the wireless network's coverage region is addressed. The authors present a distributed algorithm to find out those sensor nodes that are on the perimeter of coverage (or coverage holes) in the region. They have considered random sensor networks that have sensor nodes with heterogeneous sensing ranges.
- Format: PDF
- Size: 548.1 KB