Mobile sensor networks (MSNs) are networks where nodes are dynamic and communicate with each other in wireless form. Many researchers focus on designing proper routing and energy conservation schemes for MSNs. However, for group authentication and local information upload in MSNs, a proper region division scheme is necessary. In this paper, we design a region division scheme based on intelligent agent which evaluates trustworthiness of nodes for MSNs. The trustworthiness evaluation is performed according to the important data collected by sensors on nodes. Taking vehicular networks as an example, some parameters, such as remaining gasoline and total mileage, determine the trustworthiness of a vehicle as a node in its network. The simulation indicates that our proposed scheme can achieve appropriate region division and packet delivery ratio with reasonable overhead and delay.
Intelligent agent Region division scheme Mobile sensor networks
This is a preview of subscription content, log in to check access
This work is supported by the National Natural Science Foundation of China under Grant No. 61672295 and No. U1405254, the State Key Laboratory of Information Security under Grant No. 2017-MS-10, the 2015 Project of six personnel in Jiangsu Province under Grant No. R2015L06, the CICAEET fund and the PAPD fund.
Compliance with ethical standards
Conflict of interest
The authors declare that they have no conflict of interest.
This article does not contain any studies with human participants or animals performed by any of the authors.
Allouche Y, Segal M (2015) A cluster based beaconing process for vanet. Veh Commun 2(2):80–94CrossRefGoogle Scholar
Aswathy MC, Tripti C (2012) A cluster based enhancement to aodv for inter-vehicular communication in vanet. Int J Grid Comput Appl 3(3):41–50Google Scholar
Chen X, Chen S, Wu Y (2017) Coverless information hiding method based on the chinese character encoding. J Internet Technol 18(2):313–320Google Scholar
Das B, Cook DJ, Krishnan NC, Schmitter-Edgecombe M (2016) One-class classification-based real-time activity error detection in smart homes. IEEE J Sel Topics Signal Process 10(5):914–923CrossRefGoogle Scholar
Dehak N, Kenny PJ, Dehak R, Dumouchel P, Ouellet P (2011) Front-end factor analysis for speaker verification. IEEE Trans Audio Speech Lang Process 19(4):788–798CrossRefGoogle Scholar
He D, Chen C, Chan S, Bu J (2012) A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans Inf Technol Biomed A Pub IEEE Eng Med Biol Soc 16(6):1164–75CrossRefGoogle Scholar
Jiang W, Wang G, Wu J (2014) Generating trusted graphs for trust evaluation in online social networks. Future Gener Comput Syst 31(1):48–58CrossRefGoogle Scholar
Kong Y, Zhang M, Ye D (2017) A belief propagation-based method for task allocation in open and dynamic cloud environments. Knowl Based Syst 115:123–132CrossRefGoogle Scholar
Mai A, Liang Y, Li T (2016) Mobile coordinated wireless sensor network: an energy efficient scheme for real-time transmissions. IEEE J Sel Areas Commun 34(5):1663–1675CrossRefGoogle Scholar
Nguyen LV, Kodagoda S, Ranasinghe R, Dissanayake G (2016) Information-driven adaptive sampling strategy for mobile robotic wireless sensor network. IEEE Trans Control Syst Technol 24(1):372–379CrossRefGoogle Scholar
Satyajeet D, Deshmukh, AR, Dorle SS (2016) Heterogeneous approaches for cluster based routing protocol in vehicular ad hoc network (vanet). Int J Comput Appl 134Google Scholar
Shen J, Wang C, Wang A, Sun X, Moh S, Hung PC (2016b) Organized topology based routing protocol in incompletely predictable ad-hoc networks. Comput CommunGoogle Scholar
Shen J, Shen J, Chen X, Huang X, Susilo W (2017a) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415CrossRefGoogle Scholar
Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y (2017c) Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Dependable Secure Comput. https://doi.org/10.1109/TDSC.2017.2725953
Sugumar R, Rengarajan A, Jayakumar C (2016) Trust based authentication technique for cluster based vehicular ad hoc networks (vanet). Wirel Netw 1–10Google Scholar
Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun 24(2):318–328CrossRefGoogle Scholar
Wang Z, Xiao F, Ye N, Wang R, Yang P (2017) A see-through-wall system for device-free human motion sensing based on battery-free rfid. ACM Trans Embed Comput Syst (TECS) 17(1):6Google Scholar
1.Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina
2.State Key Laboratory of Information SecurityInstitute of Information EngineeringBeijingChina
3.School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina