Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2018

Open Access 01.12.2018 | Research

Multi-mobile agent itinerary planning-based energy and fault aware data aggregation in wireless sensor networks

verfasst von: Mohamed El Fissaoui, Abderrahim Beni-hssane, Mostafa Saadi

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2018

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile agent (MA)-based wireless sensor networks present a good alternative to the traditional client/server paradigm. Instead of sending the data gathered by each node to the sink as in client/server, MAs migrate to the sensor nodes (SNs) to collect data, thus reducing energy consumption and bandwidth usage. For MAs, to migrate among SNs, an itinerary should be planned before the migration. Many approaches have been proposed to solve the problem of itinerary planning for MAs, but all of these approaches are based on the assumption that MAs visit all SNs. This assumption, however, is inefficient because of the increasing size of the MAs after visiting each node. Also, in case of node(s) failure, as it is often the case in WSNs, the MAs may not be able to migrate among SNs. None of the proposed approaches takes into consideration the problem of fault tolerance. In this paper, we propose multi-mobile agent itinerary planning-based energy and fault aware data aggregation in wireless sensor networks (MAEF) to plan itineraries for MAs. This can be achieved by grouping nodes in clusters and planning itineraries efficiently among cluster heads (CHs) only. What is more, an alternative itinerary is planned in case of node(s) failure. The simulation result clearly shows that our novel approach performs better than the existing ones.
Hinweise

Authors’ information

Mohamed EL FISSOUI is a PhD candidate in wireless networks at the Faculty of Sciences, Chouaib Doukkali University, El Jadida, Morocco. He received his bachelor’s degree in computer science from the University Moulay Ismail and his Master’s Degree in computer science from Chouaib Doukkali University, El Jadida, Morocco.
Abderrahim BENI-HSSANE is a researcher and a professor (HDR) at the Faculty of Sciences, Chouaib Doukkali University, El Jadida, Morocco, since September 1994. He got his bachelor’s degree in Applied Mathematics and his Doctorate in computer sciences, respectively, in 1992 and 1997 from Mohamed V University, Rabat, Morocco. His research interests focus on performance evaluation in wireless networks, VANET, security in cloud computing, and big data.
Mostafa SAADI received the B.Sc. degree in Computer Sciences at the University Hassan 2nd, Faculty of Sciences Ain-Chook, Casablanca, Morocco, in 2003, and a M.Sc. degree in Mathematical and Computer engineering at the University Chouaib Doukkali, Faculty of Sciences, El Jadida (FSJ), Morocco, in 2009. He has been working as a professor of Computer Sciences in high school between 2003 and 2013, in Sidi Rahal Beach, Morocco. He received his Ph.D in evaluation, analysis, and simulation of wireless sensor networks at FSJ, Morocco (2009–2013). Actually, he worked as a research assistant professor at Mathematics and Computer Science Department at the National School of Applied Sciences at Khouribga (ENSA-K), Morocco. His research interests focus on performance evaluation in wireless networks.
Abkürzungen
CH
Cluster head
CS
Client/server
MA
Mobile agent
MST
Minimum spanning tree
SN
Sensor node

1 Introduction

The recent technological advances in wireless communications and microelectromechanical systems (MEMS) have made it possible to develop a tiny, low-power, and low-cost sensor node (SN). Wireless sensor networks (WSNs) [1] consist of a large number of SNs densely deployed in the monitoring area with sensing, wireless communication, and computing capabilities. SNs tend to gather data from the surrounding environment and send it back to the sink.
In WSNs, the most commonly used computing paradigm is client-server (CS), where each SN communicates its collected data to the sink via a multi-hop route [26]. But this traditional paradigm suffers from significant drawbacks, such as lack of scalability when the network size increases. Additionally, also the amount of data that should be processed to the sink become bigger and surpasses the capacity that the wireless link could handle given the low bandwidth of the wireless link used in WSNs. In the last few years, an efficient paradigm has emerged and been adopted by researchers as an alternative to the traditional CS paradigm, it is called mobile agent paradigm (MA) [711]. In this paradigm, instead of gathering data and sending it to the sink by SNs as is the case in traditional CS [11, 12], the mobile code migrates to SNs to collect data.
MA is a special type of software entity that migrates among SNs to gather data [8, 13]. In comparison with CS paradigm, MA paradigm has many features [4, 1416] that makes it more suitable for WSNs. It is important to note that the itinerary planning for MA is the most challenging issue with this paradigm. MAs’ efficiency-based data aggregation depends on the itinerary planning. An itinerary is the route that the MA follows during its migration among SNs [17]. It has been proved that planning itinerary for MA is an NP-hard problem [18, 19] and one of the most challenging issues with this paradigm. Therefore, to plan itineraries for MAs, it is essential to consider the following three key elements :
  • SNs grouping is a set of SNs that should be visited by each MA.
  • The itinerary planning for MA refers to the order in which these SNs should be visited by the MA.
  • The number of MAs is the number of MAs to be dispatched to gather data.
The itinerary planning for MA could be static or dynamic. In static itinerary planning (SIP), the itinerary of the MA is computed at the sink level, then the MA migrates among SNs based on the pre-computed itinerary presented by the sink. The dynamic itinerary planning (DIP) allows the MA to quickly decide on the fly the next destination node. The static approaches are more suitable for monitoring applications in which the collected information are gathered and communicated back to the sink. On the other hand, the dynamic approaches are often used in tracking applications. In addition, due to the nature of WSNs that are prone to failure [20], the act of planning the MAs’ itinerary without taking into consideration the faulty nodes (FNs) could pose a problem in case of node(s) failure. It may prevent the MA from continuing its migration among the SNs. In the present paper, in addition to the act of planning itineraries for MAs among CHs, we propose a fault tolerance based on alternative itinerary planning in case of the failure of the first itinerary.
Taking into consideration the aforementioned issues, the main contributions of this paper are as follows:
  • SN grouping in clusters
  • Itinerary planning among CHs
  • MA migration
  • Fault tolerance based on alternative itinerary planning
  • Evaluation of the proposed approach and comparing it with the other existing approaches using a Castalia simulator [9]
The rest of this paper is organized as follows: in Section 2, we briefly describe the related work. In Section 3, we introduce the network model. In Section 4, we present our proposed approach. In Section 5, we present a fault tolerance based on alternative itinerary planning. Section 6 is devoted to results and discussion. We summarize and conclude the main points discussed in this paper in Section 7.
There has been, in the last few years, a growing interest in the MA paradigm in WSNs. Consequently, a plethora of MA-based approaches have been proposed. The Local Closest First (LCF) and Global Closest First (GCF) are the first two heuristics algorithms which have been proposed by Hairong et al. [10] to plan the itinerary for the MA among SNs in order to perform data collection-related tasks. In LCF, the MA migrates to the nearest node to the sink, then it searches for the closest node to its current location. In GCF, the sink dispatches the MA to the next node that is nearest to the sink and it migrates again to the nearest node to the sink instead of its current location as in LCF. In LCF algorithm, the last SNs in the MAs’ itinerary are the SNs with longest distance from the sink, because LCF search for the next destination node among SNs based on its current location, not by looking at the global network distance matrix. On the other side, repetitive MA oscillations produced by GCF algorithm around the sink produce a long itinerary and poor performance [10]. Another approach-based directed diffusion has been proposed in [21]; the authors propose the mobile agent-based directed diffusion (MADD). MADD is quite similar to LCF, but instead of selecting the nearest node to the sink as the first node as is the case in LCF, MADD selects the farthest SN from the sink as the first node.
In [22], authors propose a better approach called itinerary energy minimum for first-source-selection (IEMF) algorithm, and the itinerary energy minimum algorithm (IEMA), the iterative version of IEMF. IMEF indicates the importance of choosing the first SN in the itinerary, IMEF estimates the energy costs of all alternatives of the first node and selects the nodes with the minimum energy cost. In each iteration, IEMA choose from the rest of SNs the SN with the optimal energy cost as the next destination. In [18], authors have proposed a genetic algorithm (GA) to solve the problem of the itinerary planning. The GA algorithm provides superior performance than the first proposed LCF and GCF algorithms in terms of energy cost, but it implies a time-expensive itinerary calculation, which is not tolerable for time-critical applications.
Another algorithm has been proposed in [17, 23] named single dynamic agent migration algorithm for a target tracking application. In this algorithm, a MA migrates to a SN that can get more accurate information about the target location, thus consuming less energy. The selection of the next destination node is based on cost function, which includes three components: information gain, energy consumption, and the remaining energy of nodes. Once the MA accumulates sufficient information so that the accuracy of the estimation meets the desired level, the MA will end the migration and migrate back to the sink [17, 23]. This algorithm is time-expensive and may face difficulties to migrate back to the sink without additional forwarding information.
In [24], authors propose a software agent-based directed diffusion, where the order of visiting SNs is determined at the sink node. This method takes the routing cost and the remaining energy of a node for selecting the next node to be visited by MA. A dynamic algorithm has been proposed in [25]. In this algorithm, a cost function is used by MA to decide on the fly the next SN to visit. Authors compare their proposed algorithm just to LCF/GCF.
Another routing strategy based on MA has been proposed in [26]. To plan the itinerary for the MA, authors use a cost function and an improved colony algorithm; also, a simple scheme that turns off redundant nodes according to the measurement requirement is designed to improve the energy efficacy.
Single itinerary planning (SIP) suffers from lack of scalability. With the growing size of the network, SIP becomes inefficient and multiple itinerary planning (MIP) approaches are proposed to solve the the problem.
For MIP for MAs, many approaches have been proposed. Near-optimal itinerary design (NOID) algorithm [27] adapts a method called the Esau-Williams heuristic originally designed for network design problems for the constrained minimum spanning tree (CMST) issue to the specific requirements of WSNs. In NOID, multiple itinerary planning for MAs is proposed where each MA visits a group of SNs. NOID suffers from low working speed and high computational complexity.
In [28], Chin et al. have proposed directional source grouping (DSG) algorithm to find near optimal itineraries for multiple MAs. This algorithm uses a disk around the sink by adjusting its radius and iteratively partitions a directional sector zone where the SNs are included in an itinerary. The radius of the circle is set to the maximum transmission range of a single SN. Every SN that lies in the circle is used as the first node of an itinerary. The angle size of the directional sector zone controls the size and the set of SNs that will be included in the itinerary. Another algorithm has been proposed in [29] to plan itineraries for MAs. Then the itinerary for each of the mobile agents can be planned by any SSIP algorithms.
Another data gathering system in WSNs has been proposed in [30] with mobile agents and mobile sink for agriculture application, to plan the itinerary, a dynamic itinerary planning approach DPMA is used. Energy-efficient itinerary planning for multiple mobile agent EMIP algorithm has been proposed in [31] that iteratively partitions a directional sector zone where source nodes are included in the itinerary; the length of th itinerary is controlled by the angle of the directional sector zone. Aloui et al. [32] propose a MIP solution that is based on two factors which have a direct impact on energy consumption, geographical distance, and data size. The number of required mobile agents and the SN grouping is based on these two factors. In [33], authors propose a mobile agent routing protocol called zone-based mobile agent in which a bottom-up mobile agent migration is used and the migration of the MAs start from the center of event regions toward the sink. In [34], authors have proposed a mechanism for scheduling mobile sensors in time-sensitive WSN applications. To schedule mobile sensors, authors have applied techniques derived from ant colony optimization and genetic algorithm. The network of static sensors are derived into small regions where a mobile sensor assigned to each region.
The MA paradigm has been proven to be efficient in terms of energy consumption and execution time, but the most challenging issue with this paradigm is the itinerary planning for MA. Many solutions have been proposed to solve this problem as we have surveyed in this section, but the most proposed multi-agent itinerary algorithms are either time-consuming or too complicated in practice, also these approaches are based on the assumption that MAs visit all SNs and no nodes’ failure takes place in the network. Herein, we propose multi-mobile agent itinerary planning-based energy and fault aware data aggregation in wireless sensor networks (MAEF) to plan itineraries for MAs among CHs, and then plan alternative itineraries in case of the failure of the first one. In our proposed approach, we use a clustering method to group SNs in clusters and select a CH for each cluster for data aggregation, then plan itineraries only among CHs using a minimum spanning tree. In the existing proposed algorithms, the MA visits all SNs in the network, but in our proposed approach, the MAs visit only the CHs for data gathering. Furthermore, in case of node(s) failure, the previous proposed algorithms did not take into consideration fault tolerance problem. Therefore, a fault tolerance based on fault tolerance is proposed here.

3 Network model

As a network model adopted for this work, we use a sensor network composed of N SNs distributed randomly in 500 ×500 square area. The SNs and the sink have the same maximum transmission range, but in terms of battery power and computational capabilities, the sink is more powerful than the other SNs. We use the network model as shown in Fig. 1. The sink is located at the center of monitoring area. We suppose that the sink has all the required information about SNs, such as location coordinates, either by using localization algorithms [3538] or GPS device; also, all SNs have the same amount of energy.

4 The proposed approach

In this section, we present our multi-mobile agent itinerary planning-based energy and fault aware data aggregation in wireless sensor networks MAEF that consists of three phases: (1) CH selection and cluster construction, (2) CH-based itinerary planning, (3) MA migration and data collection.

4.1 CHs selection and cluster construction

In this phase, the basic idea is to distribute the density impact factor of each node to other SNs in the network. Let i denote the number of SNs. Each SN will receive i−1 impact factors from other SNs and one from itself. After calculating the accumulated impact factor, the SN with the highest accumulated impact factor will be selected as CH. We use the following equation to calculate the density impact factor [29]:
$$ I_{jk}= e^{\frac{-\left(H_{k}^{j} - 2 \right)^{2}}{2\sigma^{2}}} $$
(1)
where σ is a parameter used to determine how strong SN impacts each other. \(H_{k}^{j} \) is the hop count estimation between node j and node k and is calculated by the following equation:
$$ H_{k}^{j}=\frac{d(k-1,k)}{R_{\text{max}}} $$
(2)
Rmax is the maximum transmission range of each SN.
In Algorithm 1, we calculate the impact factor I i of each SN in the network using the Eq. 1, then calculate the impact factor of each SN in relation to all nodes in the networks using the same equation. After that, we select the SN with the highest accumulated impact factor Iaccumulated as CH, then we include all SNs with a distance less then its maximum transmission range ((d CH ,i)<Rmax) in the cluster and take off these nodes from the remaining SNs V n , then add the selected CHs to the group of CHs for itinerary planning in the second phase. The output of this algorithm is a group of CHs V CH that will be used in Algorithm 2 to plan itineraries and the SNs in each cluster Vgroup.
https://static-content.springer.com/image/art%3A10.1186%2Fs13638-018-1099-0/MediaObjects/13638_2018_1099_Figa_HTML.gif
After calculating the impact factor of all SNs and select the SN with the highest value of the accumulated impact factor as CH, we construct the first cluster by including all SNs that lie in the range Rmax of CH in the cluster (Fig. 2a), thus creating the first cluster, then we repeat the same process with the rest of SNs, until there is no node left out of a cluster (Fig. 2bd). Figure 2 shows SN grouping and CH selection phase.
At first as in Fig. 2a, we use Algorithm 1 to select the first cluster head and include all SNs in its range in the cluster, source nodes included in the cluster would not be included in any other following clusters. Secondly, as in Fig. 2b, we use the same algorithm with the lifted SNs to select the second CH and construct the second cluster. Finally, we repeat the same process in Fig. 2bd till there is no SN left out of a cluster.

4.2 CH-based itinerary planning

In this phase as shown in Fig. 3, after constructing clusters based on node density and selecting CHs as illustrated in Fig. 2, we choose the nodes in the range of the sink as the first nodes in each branch stemming from the sink. Each branch present an itinerary, thus the number of itinerary will be the same as the number of the branches stemming from the sink. To generate the itinerary, we use Algorithm 2. We plan itineraries for mobile agents among CHs by using a minimum spanning tree (MST).
As we mentioned before, the sink has the coordinates of each node in the network, this way the sink can calculate the weights between CHs. To calculate weights between CHs, we use the following formula in which we use a balancing factor [39]:
$$ w = \alpha*H_{CHi}^{CHj} + (1- \alpha) * \left(H_{s}^{i} + H_{s}^{j} \right) $$
(3)
where 0<α≤1.
To generate a balanced MST branch, we adjust α to a suitable value. \(H_{s}^{i} \) is the hop count estimation between node i and the sink s and is calculated by the Eq. (2). \(H_{CHi}^{CHj} \) is the hop count estimation between CH i and the CH j .
In Algorithm 2, we start from the sink, then search for the first CH to visit by using weight function in Eq. (3) that gives the minimum cost to destination; after that, we add the CH with the minimum cost to the itinerary. We select the next CH by using the same process till the last CH in the itinerary. Thus, we construct the first itinerary T CH . We use the same algorithm to construct other itineraries as Fig. 3 shows.
https://static-content.springer.com/image/art%3A10.1186%2Fs13638-018-1099-0/MediaObjects/13638_2018_1099_Figb_HTML.gif
Figure 3 shows CH-based itinerary planning phase in details. As Fig. 3a shows, we select a set of CHs that will be included in the itinerary with minimum cost, then we plan itinerary among those CHs. We repeat the same process to construct the second itinerary as Fig. 3b shows. In Fig. 3c, d, the same process is repeated to construct the other itineraries.
In the next phase, multiple mobile agents will be dispatched by the sink in parallel to collect data from CHs.

4.3 MAs migration and data collection

After organizing the network in clusters and planning the itineraries among CHs, the sink dispatches MAs to gather data from the CHs as Fig. 4a shows. At first, when MAs visit the CHs for the first time, it notifies the nodes within the range of the CHs to send the collected data to the selected CHs (Fig. 4a), then when the MAs arrive to the last CH in the itinerary as Fig. 4b shows, it starts collecting the data from the CHs in its way back to the sink. This way, MAs consume less energy and spend less time for data collection tasks.
In Algorithm 3, after planning itineraries in the previous phases, we dispatch a MA to each of itinerary in M CH for data collection
https://static-content.springer.com/image/art%3A10.1186%2Fs13638-018-1099-0/MediaObjects/13638_2018_1099_Figc_HTML.gif

5 Fault tolerance based on alternative itinerary planning

Since the selected CHs are SNs that are prone to failure and malfunction, the fault tolerance property is indispensable in WSNs, especially in non-hostile and harsh environment [20]. In order to bypass node(s) failure that is always the case in WSNs, a re-clustering strategy is proposed. To achieve fault tolerance through re-clustering, we select alternative CHs and plan the itinerary among them using MST. This way, an alternative itineraries for MAs is planned in case the first ones fail.
In our proposed approach, we construct clusters based on SN density by using the impact factor, and select the nodes with the highest impact factor as CH, then plan the itinerary among CHs using a minimum spanning tree. But in case of malfunctioning CH, the MAs may not continue its migration. Therefore, we propose a fault tolerance based on alternative itinerary in case of losing the dispatched MAs due to node(s) failure. We consider the case of partial failure, where the node is able to communicate, but it cannot sense or collect any data.
We use the same impact factor as used to select primary CH p , but instead of choosing the nodes with the highest impact factor, we choose the nodes with the second highest impact factor as secondary CHs, then plan the itinerary among them by using MST; this way, we plan the alternative itinerary for MA. Figure 5 clearly illustrates the proposed fault tolerance based on alternative itinerary.
In Algorithm 4, after the selection of secondary cluster heads V S , we use MST to plan the itineraries among those CHs by choosing the itineraries with minimum weights. The input of this algorithm is T S that includes only the sink and group of secondary CHs V S . The output of th algorithm is the itinerary planned among secondary CHs T S .
https://static-content.springer.com/image/art%3A10.1186%2Fs13638-018-1099-0/MediaObjects/13638_2018_1099_Figd_HTML.gif

6 Results and discussion

We implemented our proposed approach and compared it with the other existing ones using a Castalia simulator [9]. Castalia is a simulator for WSNs, body area network BANs, and generally, networks of low-power embedded devices. It is based on the OMNeT ++ platform and used by researchers and developers to test protocols in realistic wireless channel and radio models, with a realistic node behavior especially relating to the access of the radio. Castalia can also be used to evaluate different platform characteristics for specific applications, since it is highly parametric, and can simulate a wide range of platforms.
SNs were randomly deployed in square monitoring area of 500 ×500 m, and varied from 200 to 800 nodes and the sink is located at the center of monitoring area; also, SNs had the same transmission range and battery power, except for the sink, that has more computation capabilities and battery power.
The rest of the simulation parameters are shown in Table 1.
Table 1
Simulation parameter
Parameter
Value
Number of nodes
[200, 800]
Network transfer rate
250 kbps
Monitoring field size
500 ×500
Node energy
1872 0J
Energy consumed by MA execution
5 nJ
MA processing delay
50 ms
MA instantiation delay
10 ms
Collected data size at each node
200 bytes
MA code size
1024 bytes
We use four metrics to evaluate our novel proposed approach:
  • Overall energy consumption is the energy consumed by all SN and MA execution.
  • Execution time is the required time for MAs to visit all CHs and returning back to the sink.
  • Total traveled distance is the total traveled distance by all MAs.
  • Dispatched MAs is the number of dispatched MAs to gather data from CHs.
Figure 6 illustrates the comparison of overall energy consumption per round of GCF, IEMF, MADD, DSG, NOID, our proposed approach MAEF, and its alternative A-MAEF with the increasing size of network from 200 to 800 SN. As shown in Fig. 6, the overall energy consumption per round increases as the number of SNs increase. As the figure shows, our proposed protocol consumes less energy than all the other protocols with the increasing size of the network. This is due to the strategy of visiting only CH nodes to gather data already sent by SNs and by using MST to plan itineraries among CHs that are close to each other. IEMF and MADD protocols consume almost the same amount of the energy, with better performance of IEMF. DSG and NOID consume less energy than GCF, IEMF, and MADD; this is due to the multiple MA usage, but with better performance of DSG. For our proposed protocol, MAEF and its alternative A-MAEF consume almost the same amount of energy, which is the lowest amount of energy consumption than all other protocols in all scenarios.
Figure 7 shows the execution time of MAs to visit all CHs including the time to return back to sink. It compares our proposed approach MAEF and A-MAEF to the other existing protocols (GCF, MADD, IEMF, DSG, NOID). As it can be observed, the execution time of all protocols increases as the number of SNs increases. GCF has the highest execution time than all other protocols, because of its poor strategy to migrate among SNs nearest to the sink. IEMF and MADD have almost the same execution time with less execution time of IEMF. For DSG, it has less time than all other single MA protocols (GCF, MADD, IEMF), because of multiple MA usage. The DSG perform better than all other protocols with a network of 200 to 400 nodes, but our proposed protocols MAEF/A-MAEF start to preform better than DGS with the increasing size of the network. Also the alternative A-MAFE has almost the same performance, since it spends less time for visiting CHs only and by using optimal itineraries.
Figure 8 compares the total itinerary length of our proposed protocols MAEF/A-MAEF with the other existing protocols IEMF, MADD, GCF, DSG, and NOID. Our proposed protocols have the shortest itinerary length than all the other protocols. This is due to the strategy of planning itineraries just among CHs and not all the SNs and by using MST to plan itineraries for MAs. GCF has the longest itinerary length because of its poor strategy of choosing nearest SN as the next destination and planning itinerary among all SNs. For DSG and NOID, the length of the itinerary is longer than MADD and IEMF. On the other side, MADD and IEMF have almost the same itinerary length.
Finally, Fig. 9 shows the number of dispatched MAs for multiple itinerary planning protocols; as it can be observed, NOID dispatch the highest number of MAs (more than 100 MAs) followed by DSG protocol (20 MAs). On the other side, our protocols (MAEF and A-MAEF) manage to dispatch the minimum number of MAs with better performance.
As it can be observed from the result, our approach perform better then all the other proposed protocols. It consumes less energy and it needs less execution time, also it has the shortest itinerary length. Also, our fault tolerance strategy to use an alternative path in case of failure of the first one makes sure that an alternative path is planned and ready to use in case of the failure of the first one.

7 Conclusions

In this paper, we have presented multi-mobile agent itinerary planning-based energy and fault aware data aggregation in wireless sensor networks MAEF. Instead of visiting all SNs, we select just some CHs based on node density, then we dispatch the MAs to collect data from the selected CHs. By using our novel proposed approach, the network lifetime and energy consumption improved significantly. Additionally, the execution time takes less than previous proposed approaches. The itinerary length of our proposed approach is the shortest among all previous proposed ones; this is due to the strategy of visiting only CHs and not all SNs. In case of the failure of the first itinerary due to node failure which is often the case in WSNs, alternative paths are calculated and ready to use by the MAs. Our findings have showed that our proposed approach perform better than the other previously proposed approaches.

8 Nomenclature

Rmax Maximum transmission range of SN
n Total number of SNs
V n The set of all SNs
T The set of CHs in normal itinerary
V CH The set of CHs
Vleft The set of remaining SNs
Vgroup The set of SNs in the same cluster
V CH The set of CHs
T CH The normal itinerary of MA among CHs
V S The set of alternative CHs
T S The alternative itinerary of MA among CHs
M CH The set of planned itineraries
E r The remaining energy of SN
I i The impact factor of SN i
I ij The impact factor between SNs i and j
Iaccumulated The accumulated impact factor of SN
(d CH ,i) The distance between CH and SN i

Funding

The author declares that there is no funding for this work.

Availability of data and materials

The datasets supporting the conclusions of this article are available in the github repository https://​github.​com/​kikosto/​castalia-Result.

Competing interests

The authors declare that they have no competing interests.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://​creativecommons.​org/​licenses/​by/​4.​0/​), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Authors’ information

Mohamed EL FISSOUI is a PhD candidate in wireless networks at the Faculty of Sciences, Chouaib Doukkali University, El Jadida, Morocco. He received his bachelor’s degree in computer science from the University Moulay Ismail and his Master’s Degree in computer science from Chouaib Doukkali University, El Jadida, Morocco.
Abderrahim BENI-HSSANE is a researcher and a professor (HDR) at the Faculty of Sciences, Chouaib Doukkali University, El Jadida, Morocco, since September 1994. He got his bachelor’s degree in Applied Mathematics and his Doctorate in computer sciences, respectively, in 1992 and 1997 from Mohamed V University, Rabat, Morocco. His research interests focus on performance evaluation in wireless networks, VANET, security in cloud computing, and big data.
Mostafa SAADI received the B.Sc. degree in Computer Sciences at the University Hassan 2nd, Faculty of Sciences Ain-Chook, Casablanca, Morocco, in 2003, and a M.Sc. degree in Mathematical and Computer engineering at the University Chouaib Doukkali, Faculty of Sciences, El Jadida (FSJ), Morocco, in 2009. He has been working as a professor of Computer Sciences in high school between 2003 and 2013, in Sidi Rahal Beach, Morocco. He received his Ph.D in evaluation, analysis, and simulation of wireless sensor networks at FSJ, Morocco (2009–2013). Actually, he worked as a research assistant professor at Mathematics and Computer Science Department at the National School of Applied Sciences at Khouribga (ENSA-K), Morocco. His research interests focus on performance evaluation in wireless networks.
Literatur
1.
Zurück zum Zitat IF Akyildiz, W Su, Y Sankarasubramaniam, E Cayirci, Wireless sensor networks: A survey. Comput. Netw.38(4), 393–422 (2002).CrossRef IF Akyildiz, W Su, Y Sankarasubramaniam, E Cayirci, Wireless sensor networks: A survey. Comput. Netw.38(4), 393–422 (2002).CrossRef
8.
Zurück zum Zitat B Khaleghi, A Khamis, FO Karray, SN Razavi, Multisensor data fusion: A review of the state-of-the-art. Inf. Fusion. 14(1), 28–44 (2013).CrossRef B Khaleghi, A Khamis, FO Karray, SN Razavi, Multisensor data fusion: A review of the state-of-the-art. Inf. Fusion. 14(1), 28–44 (2013).CrossRef
10.
Zurück zum Zitat H Qi, F Wang, Optimal Itinerary Analysis for Mobile Agents in Ad Hoc Wireless Sensor Networks (2001). H Qi, F Wang, Optimal Itinerary Analysis for Mobile Agents in Ad Hoc Wireless Sensor Networks (2001).
13.
Zurück zum Zitat S Franklin, A Graesser, in In Intelligent Agents III, ed. by JP Mueller, MJ Wooldridge, and NR Jennings. Is it an agent, or just a program?: A taxonomy for autonomous agents (SpringerBerlin, 1997), pp. 21–36. S Franklin, A Graesser, in In Intelligent Agents III, ed. by JP Mueller, MJ Wooldridge, and NR Jennings. Is it an agent, or just a program?: A taxonomy for autonomous agents (SpringerBerlin, 1997), pp. 21–36.
15.
Zurück zum Zitat D Chess, C Harrison, A Kershenbaum, in Mobile Object Systems Towards the Programmable Internet: Second International Workshop, MOS’96 Linz, Austria, July 8-9, 1996 Selected Presentations and Invited Papers, ed. by J Vitek, C Tschudin. Mobile agents: Are they a good idea? (SpringerBerlin, 1997), pp. 25–45.CrossRef D Chess, C Harrison, A Kershenbaum, in Mobile Object Systems Towards the Programmable Internet: Second International Workshop, MOS’96 Linz, Austria, July 8-9, 1996 Selected Presentations and Invited Papers, ed. by J Vitek, C Tschudin. Mobile agents: Are they a good idea? (SpringerBerlin, 1997), pp. 25–45.CrossRef
18.
Zurück zum Zitat Q Wu, NSV Rao, J Barhen, SS Iyengar, VK Vaishnavi, H Qi, K Chakrabarty, S Member, S Member, On computing mobile agent routes for data fusion in distributed sensor networks. IEEE Trans. Knowl. Data Eng.16:, 740–53 (2004).CrossRef Q Wu, NSV Rao, J Barhen, SS Iyengar, VK Vaishnavi, H Qi, K Chakrabarty, S Member, S Member, On computing mobile agent routes for data fusion in distributed sensor networks. IEEE Trans. Knowl. Data Eng.16:, 740–53 (2004).CrossRef
26.
Zurück zum Zitat Y Jing, Z Heng, W Xiao, Z Yuzhi, Y Ping, L Xuemei, S Yuefang, L Zetao, in 2017 29th Chinese Control And Decision Conference (CCDC). An energy-efficient routing strategy based on mobile agent for wireless sensor network, (2017), pp. 2632–6. https://doi.org/10.1109/CCDC.2017.7978959. Y Jing, Z Heng, W Xiao, Z Yuzhi, Y Ping, L Xuemei, S Yuefang, L Zetao, in 2017 29th Chinese Control And Decision Conference (CCDC). An energy-efficient routing strategy based on mobile agent for wireless sensor network, (2017), pp. 2632–6. https://​doi.​org/​10.​1109/​CCDC.​2017.​7978959.
28.
Zurück zum Zitat M Chen, S Gonzalez-Valenzuela, VCM Leung, in Information and Communication Technology Convergence (ICTC), 2010 International Conference On. Directional source grouping for multi-agent itinerary planning in wireless sensor networks, (2010), pp. 207–212. https://doi.org/10.1109/ICTC.2010.5674660. M Chen, S Gonzalez-Valenzuela, VCM Leung, in Information and Communication Technology Convergence (ICTC), 2010 International Conference On. Directional source grouping for multi-agent itinerary planning in wireless sensor networks, (2010), pp. 207–212. https://​doi.​org/​10.​1109/​ICTC.​2010.​5674660.
39.
Zurück zum Zitat M Chen, W Cai, S Gonzalez, VCM Leung, in Ad Hoc Networks, ed. by J Zheng, D Simplot-Ryl, and VCM Leung. Balanced Itinerary Planning for Multiple Mobile Agents in Wireless Sensor Networks (SpringerBerlin, 2010), pp. 416–28.CrossRef M Chen, W Cai, S Gonzalez, VCM Leung, in Ad Hoc Networks, ed. by J Zheng, D Simplot-Ryl, and VCM Leung. Balanced Itinerary Planning for Multiple Mobile Agents in Wireless Sensor Networks (SpringerBerlin, 2010), pp. 416–28.CrossRef
Metadaten
Titel
Multi-mobile agent itinerary planning-based energy and fault aware data aggregation in wireless sensor networks
verfasst von
Mohamed El Fissaoui
Abderrahim Beni-hssane
Mostafa Saadi
Publikationsdatum
01.12.2018
Verlag
Springer International Publishing
DOI
https://doi.org/10.1186/s13638-018-1099-0

Weitere Artikel der Ausgabe 1/2018

EURASIP Journal on Wireless Communications and Networking 1/2018 Zur Ausgabe