EconPapers    
Economics at your fingertips  
 

VMRF: revolutionizing military border surveillance with extensive coverage and connectivity

S. P. Subotha () and L. Femila
Additional contact information
S. P. Subotha: Rohini College of Engineering and Technology
L. Femila: St. Xavier’s Catholic College of Engineering

Telecommunication Systems: Modelling, Analysis, Design and Management, 2024, vol. 86, issue 3, No 7, 502 pages

Abstract: Abstract Nowadays, wireless sensor networks (WSNs) are utilised in military-based applications like border surveillance. However, existing border surveillance methods have difficulties with energy efficiency, latency, security, connectivity, optimal path selection and coverage. In this paper, a Voronoi Modified Red Fox (VMRF) algorithm is proposed as a solution to these problems. Initially, secure cluster head (CH) selection and clustering is performed using Secure Spatial Intelligence-Enhanced Voronoi Clustering (SIEVC) to boost energy efficiency, security, and extend network coverage and connectivity. The SIEVC algorithm dynamically selects CHs based on past and present trust, identity trust, and energy trust to identify malicious nodes and form optimal clusters for improved network coverage and connectivity. It also employs dynamic cluster size adjustment to maintain proximity between CHs and cluster members and utilizes node alternation to ensure equitable cluster sizes. This approach minimizes energy depletion, enhances network longevity, and improves load balancing. The algorithm introduces a node alternation mechanism to balance cluster sizes and prevent energy holes. This approach ensures secure and efficient CH selection and promotes even energy distribution. Then the proposed modified red fox (MRF) optimization method, based on the fitness metric, computes the energy-efficient and safe path for data transmission. Trust, energy, distance, link quality and traffic intensity are the factors that the fitness function takes into account. Finally, the data is transmitted to the base station (BS) through CH along the path with the highest fitness value. Then the proposed VMRF algorithm is evaluated using the NS-2 platform, and the outcomes are compared with existing protocols. Based on the evaluations, the VMRF algorithm performs better than existing ones in terms of delay, energy consumption, throughput, packet delivery ratio (PDR), malicious node detection ratio, and residual energy.

Keywords: WSN; Border surveillance; Attacks; Malicious node; RFO; Clustering; Path selection (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s11235-024-01125-6 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:86:y:2024:i:3:d:10.1007_s11235-024-01125-6

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235

DOI: 10.1007/s11235-024-01125-6

Access Statistics for this article

Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan

More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:telsys:v:86:y:2024:i:3:d:10.1007_s11235-024-01125-6