Intelligent agent-based region division scheme for mobile sensor networks

  • Jian Shen
  • Chen Wang
  • Anxi Wang
Methodologies and Application


Mobile sensor networks (MSNs) are networks where nodes are dynamic and communicate with each other in wireless form. Many researchers focus on designing proper routing and energy conservation schemes for MSNs. However, for group authentication and local information upload in MSNs, a proper region division scheme is necessary. In this paper, we design a region division scheme based on intelligent agent which evaluates trustworthiness of nodes for MSNs. The trustworthiness evaluation is performed according to the important data collected by sensors on nodes. Taking vehicular networks as an example, some parameters, such as remaining gasoline and total mileage, determine the trustworthiness of a vehicle as a node in its network. The simulation indicates that our proposed scheme can achieve appropriate region division and packet delivery ratio with reasonable overhead and delay.


Intelligent agent Region division scheme Mobile sensor networks 



This work is supported by the National Natural Science Foundation of China under Grant No. 61672295 and No. U1405254, the State Key Laboratory of Information Security under Grant No. 2017-MS-10, the 2015 Project of six personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund and the PAPD fund.

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.


  1. Allouche Y, Segal M (2015) A cluster based beaconing process for vanet. Veh Commun 2(2):80–94CrossRefGoogle Scholar
  2. Aswathy MC, Tripti C (2012) A cluster based enhancement to aodv for inter-vehicular communication in vanet. Int J Grid Comput Appl 3(3):41–50Google Scholar
  3. Chan YWE, Soong BH (2016) Discrete weighted centroid localization (dwcl): performance analysis and optimization. IEEE Access 4:6283–6294CrossRefGoogle Scholar
  4. Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the chinese character encoding. J Internet Technol 18(2):313–320Google Scholar
  5. Das B, Cook DJ, Krishnan NC, Schmitter-Edgecombe M (2016) One-class classification-based real-time activity error detection in smart homes. IEEE J Sel Topics Signal Process 10(5):914–923CrossRefGoogle Scholar
  6. Dehak N, Kenny PJ, Dehak R, Dumouchel P, Ouellet P (2011) Front-end factor analysis for speaker verification. IEEE Trans Audio Speech Lang Process 19(4):788–798CrossRefGoogle Scholar
  7. He D, Chen C, Chan S, Bu J (2012) A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans Inf Technol Biomed A Pub IEEE Eng Med Biol Soc 16(6):1164–75CrossRefGoogle Scholar
  8. Jiang W, Wang G, Wu J (2014) Generating trusted graphs for trust evaluation in online social networks. Future Gener Comput Syst 31(1):48–58CrossRefGoogle Scholar
  9. Kong Y, Zhang M, Ye D (2017) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl Based Syst 115:123–132CrossRefGoogle Scholar
  10. Mai A, Liang Y, Li T (2016) Mobile coordinated wireless sensor network: an energy efficient scheme for real-time transmissions. IEEE J Sel Areas Commun 34(5):1663–1675CrossRefGoogle Scholar
  11. Nguyen LV, Kodagoda S, Ranasinghe R, Dissanayake G (2016) Information-driven adaptive sampling strategy for mobile robotic wireless sensor network. IEEE Trans Control Syst Technol 24(1):372–379CrossRefGoogle Scholar
  12. Satyajeet D, Deshmukh, AR, Dorle SS (2016) Heterogeneous approaches for cluster based routing protocol in vehicular ad hoc network (vanet). Int J Comput Appl 134Google Scholar
  13. Shen J, Wang C, Lai CF, Wang A, Chao HC (2016a) Direction density-based secure routing protocol for healthcare data in incompletely predictable networks. IEEE Access 4:9163–9173. CrossRefGoogle Scholar
  14. Shen J, Wang C, Wang A, Sun X, Moh S, Hung PC (2016b) Organized topology based routing protocol in incompletely predictable ad-hoc networks. Comput CommunGoogle Scholar
  15. Shen J, Shen J, Chen X, Huang X, Susilo W (2017a) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415CrossRefGoogle Scholar
  16. Shen J, Zhou T, Chen X, Li J, Susilo W (2017b) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13:912–925. CrossRefGoogle Scholar
  17. Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y (2017c) Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Dependable Secure Comput.
  18. Sugumar R, Rengarajan A, Jayakumar C (2016) Trust based authentication technique for cluster based vehicular ad hoc networks (vanet). Wirel Netw 1–10Google Scholar
  19. Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun 24(2):318–328CrossRefGoogle Scholar
  20. Wang Z, Xiao F, Ye N, Wang R, Yang P (2017) A see-through-wall system for device-free human motion sensing based on battery-free rfid. ACM Trans Embed Comput Syst (TECS) 17(1):6Google Scholar
  21. Xiao F, Wang Z, Ye N, Wang R, Li XY (2017) One more tag enables fine-grained rfid localization and tracking. IEEE/ACM Trans Netw. Google Scholar
  22. Zhang J, Tang J, Wang T, Chen F (2017) Energy-efficient data-gathering rendezvous algorithms with mobile sinks for wireless sensor networks. Int J Sensor Netw 23(4):248–257CrossRefGoogle Scholar
  23. Zhou Z, Wu QJ, Huang F, Sun X (2017) Fast and accurate near-duplicate image elimination for visual sensor networks. Int J Distrib Sensor Netw. Google Scholar
  24. Zhu H, Xiao F, Sun L, Wang R, Yang P (2017) R-ttwd: robust device-free through-the-wall detection of moving human with wifi. IEEE J Sel Areas Commun 35(5):1090–1103CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina
  2. 2.State Key Laboratory of Information SecurityInstitute of Information EngineeringBeijingChina
  3. 3.School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina

Personalised recommendations