scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Multi-mobile agent itinerary planning-based energy and fault aware data aggregation in wireless sensor networks

TL;DR: This paper proposes multi-mobile agent itinerary planning-based energy and fault aware data aggregation in wireless sensor networks (MAEF) to plan itineraries for MAs by grouping nodes in clusters and planning itineraries efficiently among cluster heads (CHs) only.
Abstract: Mobile agent (MA)-based wireless sensor networks present a good alternative to the traditional client/server paradigm. Instead of sending the data gathered by each node to the sink as in client/server, MAs migrate to the sensor nodes (SNs) to collect data, thus reducing energy consumption and bandwidth usage. For MAs, to migrate among SNs, an itinerary should be planned before the migration. Many approaches have been proposed to solve the problem of itinerary planning for MAs, but all of these approaches are based on the assumption that MAs visit all SNs. This assumption, however, is inefficient because of the increasing size of the MAs after visiting each node. Also, in case of node(s) failure, as it is often the case in WSNs, the MAs may not be able to migrate among SNs. None of the proposed approaches takes into consideration the problem of fault tolerance. In this paper, we propose multi-mobile agent itinerary planning-based energy and fault aware data aggregation in wireless sensor networks (MAEF) to plan itineraries for MAs. This can be achieved by grouping nodes in clusters and planning itineraries efficiently among cluster heads (CHs) only. What is more, an alternative itinerary is planned in case of node(s) failure. The simulation result clearly shows that our novel approach performs better than the existing ones.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: MCTM uses mobile code to visit the SN s based on pre-defined itineraries while collecting necessary details about these SN s in preparation for assessing their trust, demonstrating a superior performance over a state-of-art technique that is energy-efficient management based on Software-Defined Network ( SDN ) for SN s.

50 citations

Journal ArticleDOI
TL;DR: A Mobile-Agent Distributed Intelligence Tangle-Based approach (MADIT) is proposed as a potential solution based on IOTA (Tangle), where Tangle is a distributed ledger platform that enables scalable, transaction-based data exchange in large P2P networks.
Abstract: It is estimated that there will be approximately 125 billion Internet of Things (IoT) devices connected to the Internet by 2030, which are expected to generate large amounts of data. This will challenge data processing capability, infrastructure scalability, and privacy. Several studies have demonstrated the benefits of using distributed intelligence (DI) to overcome these challenges. We propose a Mobile-Agent Distributed Intelligence Tangle-Based approach (MADIT) as a potential solution based on IOTA (Tangle), where Tangle is a distributed ledger platform that enables scalable, transaction-based data exchange in large P2P networks. MADIT enables distributed intelligence at two levels. First, multiple mobile agents are employed to cater for node level communications and collect transactions data at a low level. Second, high level intelligence uses a Tangle based architecture to handle transactions. The Proof-of-Work offloading computation mechanism improves efficiency and speed of processing, while reducing energy consumption. Extensive experiments show that transaction processing speed is improved by using mobile agents, thereby providing better scalability.

26 citations

Journal ArticleDOI
TL;DR: This paper implements, simulate and compare the most prominent itinerary planning algorithms upon a common parameter space, making realistic network-level assumptions.
Abstract: In wireless sensor networks (WSNs), mobile agent (MA) is a new paradigm that has gained more attention lately. In this paradigm, MA migrates among sensor nodes (SNs) for data fusion. However, in comparison to traditional client/server paradigm; where each SN in the network sends its collected data to the sink, MA presents a good alternative in terms of energy consumption, response time and network lifetime. In this paradigm, the most critical properties of MA is the itinerary planning, it has always been an issue and a NP-hard problem. In this paper, we present a survey of the proposed itinerary planning approaches for MAs in WSNs. MA itinerary planning techniques can be classified into three categories: static itinerary planning, dynamic itinerary planning and hybrid itinerary planing. The benefits and shortcomings of different MA itinerary planning approaches are presented. Furthermore, we implement, simulate and compare the most prominent itinerary planning algorithms upon a common parameter space, making realistic network-level assumptions.

15 citations

Journal ArticleDOI
TL;DR: An Energy Aware Decision Stump Linear Programming Boosting Node Classification based Data Aggregation (EADSLPBNC-DA) Model is proposed and significantly reduces the energy consumption, delay, data aggregation accuracy, network lifetime and data aggregation time when compared to the existing techniques.

10 citations

Journal ArticleDOI
TL;DR: An energy-efficient privacy-preserving data aggregation protocol based on slicing (EPPA) where a novel slicing mode is adopted to reduce the numbers of slices is presented, which can significantly prevent the data from being compromised and decrease the communication overhead.
Abstract: Wireless sensor networks (WSNs) have become one of the most vigorous techniques in the network domain. However, the sensor nodes of WSNs tend to become the target of attackers due to the broadcast communication mode and the unattended deployment nature. Although it can prevent the sensitive data from being compromised, Slice-Mix-AggRegaTe (SMART) needs to exchange messages frequently in a network, which put tremendous overhead on the sensor nodes with limited resources. Faced with these issues, this paper proposes an energy-efficient privacy-preserving data aggregation protocol based on slicing (EPPA) where a novel slicing mode is adopted to reduce the numbers of slices, which can significantly prevent the data from being compromised and decrease the communication overhead. Meanwhile, an enhanced scheme based on EPPA, called multi-function privacy-preserving data aggregation protocol (MPPA), is presented and it supports multiple functions in the process of data aggregation, such as max/min, count, and mean. The theoretical analysis and the simulation evaluation show that the proposed aggregation protocols demonstrate a better performance in the privacy preserving and the communication efficiency.

9 citations

References
More filters
Journal ArticleDOI
TL;DR: The concept of sensor networks which has been made viable by the convergence of micro-electro-mechanical systems technology, wireless communications and digital electronics is described.

17,936 citations


"Multi-mobile agent itinerary planni..." refers background in this paper

  • ...Wireless sensor networks (WSNs) [1] consist of a large number of SNs densely deployed in the monitoring area with sensing, wireless communication, and computing capabilities....

    [...]

Journal ArticleDOI
TL;DR: A survey of state-of-the-art routing techniques in WSNs is presented and the design trade-offs between energy and communication overhead savings in every routing paradigm are studied.
Abstract: Wireless sensor networks consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. Routing protocols in WSNs might differ depending on the application and network architecture. In this article we present a survey of state-of-the-art routing techniques in WSNs. We first outline the design challenges for routing protocols in WSNs followed by a comprehensive survey of routing techniques. Overall, the routing techniques are classified into three categories based on the underlying network structure: flit, hierarchical, and location-based routing. Furthermore, these protocols can be classified into multipath-based, query-based, negotiation-based, QoS-based, and coherent-based depending on the protocol operation. We study the design trade-offs between energy and communication overhead savings in every routing paradigm. We also highlight the advantages and performance issues of each routing technique. The article concludes with possible future research areas.

4,701 citations

Book ChapterDOI
12 Aug 1996
TL;DR: This work proposes a formal definition of an autonomous agent which clearly distinguishes a software agent from just any program, and offers the beginnings of a natural kinds taxonomy of autonomous agents.
Abstract: The advent of software agents gave rise to much discussion of just what such an agent is, and of how they differ from programs in general. Here we propose a formal definition of an autonomous agent which clearly distinguishes a software agent from just any program. We also offer the beginnings of a natural kinds taxonomy of autonomous agents, and discuss possibilities for further classification. Finally, we discuss subagents and multiagent systems.

2,504 citations

Journal ArticleDOI
TL;DR: An overview of the measurement techniques in sensor network localization and the one-hop localization algorithms based on these measurements are provided and a detailed investigation on multi-hop connectivity-based and distance-based localization algorithms are presented.

1,870 citations

Journal ArticleDOI
TL;DR: A comprehensive review of the data fusion state of the art is proposed, exploring its conceptualizations, benefits, and challenging aspects, as well as existing methodologies.

1,684 citations


"Multi-mobile agent itinerary planni..." refers background in this paper

  • ...MA is a special type of software entity that migrates among SNs to gather data [8, 13] ....

    [...]