Abstract
Mobile sensor networks (MSNs) are networks where nodes are dynamic and communicate with each other in wireless form. Many researchers focus on designing proper routing and energy conservation schemes for MSNs. However, for group authentication and local information upload in MSNs, a proper region division scheme is necessary. In this paper, we design a region division scheme based on intelligent agent which evaluates trustworthiness of nodes for MSNs. The trustworthiness evaluation is performed according to the important data collected by sensors on nodes. Taking vehicular networks as an example, some parameters, such as remaining gasoline and total mileage, determine the trustworthiness of a vehicle as a node in its network. The simulation indicates that our proposed scheme can achieve appropriate region division and packet delivery ratio with reasonable overhead and delay.



Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Allouche Y, Segal M (2015) A cluster based beaconing process for vanet. Veh Commun 2(2):80–94
Aswathy MC, Tripti C (2012) A cluster based enhancement to aodv for inter-vehicular communication in vanet. Int J Grid Comput Appl 3(3):41–50
Chan YWE, Soong BH (2016) Discrete weighted centroid localization (dwcl): performance analysis and optimization. IEEE Access 4:6283–6294
Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the chinese character encoding. J Internet Technol 18(2):313–320
Das B, Cook DJ, Krishnan NC, Schmitter-Edgecombe M (2016) One-class classification-based real-time activity error detection in smart homes. IEEE J Sel Topics Signal Process 10(5):914–923
Dehak N, Kenny PJ, Dehak R, Dumouchel P, Ouellet P (2011) Front-end factor analysis for speaker verification. IEEE Trans Audio Speech Lang Process 19(4):788–798
He D, Chen C, Chan S, Bu J (2012) A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans Inf Technol Biomed A Pub IEEE Eng Med Biol Soc 16(6):1164–75
Jiang W, Wang G, Wu J (2014) Generating trusted graphs for trust evaluation in online social networks. Future Gener Comput Syst 31(1):48–58
Kong Y, Zhang M, Ye D (2017) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl Based Syst 115:123–132
Mai A, Liang Y, Li T (2016) Mobile coordinated wireless sensor network: an energy efficient scheme for real-time transmissions. IEEE J Sel Areas Commun 34(5):1663–1675
Nguyen LV, Kodagoda S, Ranasinghe R, Dissanayake G (2016) Information-driven adaptive sampling strategy for mobile robotic wireless sensor network. IEEE Trans Control Syst Technol 24(1):372–379
Satyajeet D, Deshmukh, AR, Dorle SS (2016) Heterogeneous approaches for cluster based routing protocol in vehicular ad hoc network (vanet). Int J Comput Appl 134
Shen J, Wang C, Lai CF, Wang A, Chao HC (2016a) Direction density-based secure routing protocol for healthcare data in incompletely predictable networks. IEEE Access 4:9163–9173. https://doi.org/10.1109/ACCESS.2016.2637887
Shen J, Wang C, Wang A, Sun X, Moh S, Hung PC (2016b) Organized topology based routing protocol in incompletely predictable ad-hoc networks. Comput Commun
Shen J, Shen J, Chen X, Huang X, Susilo W (2017a) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415
Shen J, Zhou T, Chen X, Li J, Susilo W (2017b) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13:912–925. https://doi.org/10.1109/TIFS.2017.2774439
Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y (2017c) Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2017.2725953
Sugumar R, Rengarajan A, Jayakumar C (2016) Trust based authentication technique for cluster based vehicular ad hoc networks (vanet). Wirel Netw 1–10
Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun 24(2):318–328
Wang Z, Xiao F, Ye N, Wang R, Yang P (2017) A see-through-wall system for device-free human motion sensing based on battery-free rfid. ACM Trans Embed Comput Syst (TECS) 17(1):6
Xiao F, Wang Z, Ye N, Wang R, Li XY (2017) One more tag enables fine-grained rfid localization and tracking. IEEE/ACM Trans Netw. https://doi.org/10.1109/TNET.2017.2766526
Zhang J, Tang J, Wang T, Chen F (2017) Energy-efficient data-gathering rendezvous algorithms with mobile sinks for wireless sensor networks. Int J Sensor Netw 23(4):248–257
Zhou Z, Wu QJ, Huang F, Sun X (2017) Fast and accurate near-duplicate image elimination for visual sensor networks. Int J Distrib Sensor Netw. https://doi.org/10.1177/1550147717694172
Zhu H, Xiao F, Sun L, Wang R, Yang P (2017) R-ttwd: robust device-free through-the-wall detection of moving human with wifi. IEEE J Sel Areas Commun 35(5):1090–1103
Acknowledgements
This work is supported by the National Natural Science Foundation of China under Grant No. 61672295 and No. U1405254, the State Key Laboratory of Information Security under Grant No. 2017-MS-10, the 2015 Project of six personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund and the PAPD fund.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Shen, J., Wang, C. & Wang, A. Intelligent agent-based region division scheme for mobile sensor networks. Soft Comput 23, 4903–4910 (2019). https://doi.org/10.1007/s00500-018-3149-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-018-3149-2