1 Introduction

Recently, wireless sensor networks (WSNs) [2] have received great attention for wide application potentials. WSNs applications such as, battlefield surveillance, target tracking [44], home appliances and inventory tracking enlarge human capabilities to remotely interact with the physical world. In most of these applications, data fusion [19] is needed. WSN consists of a hundreds or thousands of autonomous sensor nodes (SNs) spatially distributed to collect data from the surrounding environment then send it back to the sink. WSNs also provide the possibility of collaborative information processing [48], which require a sensor network system to process data cooperatively and to combine information from multiple sources. Since data from multiple SNs with overlapping sensing regions is almost always correlated, one can remove the redundant information in the data, through in-network aggregation [13] and compression [41] local to the nodes that generate the data, before shipping it to a remote node.

In WSNs, the most commonly used paradigm for data fusion is client–server (CS); where the SNs send the collected data to the sink where the data processing take place [1]. As Fig. 1a shows, all SNs send the collected data to the sink via multi-hop routing [40]. There are some shortcomings with this paradigm [38]. In one hand, it requires many round trip to complete one transaction, also the network needs to be alive and healthy the entire time of the transaction. Thus consumes network resources such as bandwidth and energy, and decreasing the life time of the network. In the other hand, some super nodes with bigger storage and high computation capabilities need to be available in this model.

To overcome the aforementioned shortcomings of CS paradigm, a new computing paradigm have been proposed [38] based on mobile agent (MA). In this paradigm, instead of sending the collected data by the SNs to the sink, the processing code (MA) is moved to the data locations through MA for data fusions. Fig. 1b illustrates the MA paradigm. As the figure shows, the migration of MA starts from the sink and visits the SNs in its itinerary collecting data from these SNs, then the MA migrates back to the sink with the collected data. However, this paradigm has some disadvantages in some particular scenarios, such as security issues [43]. Figure 1 illustrates Client/Server and Mobile Agents Paradigms.

Fig. 1
figure 1

Data fusion paradigms in WSNs

In [33] authors listed many features of this paradigm including : scalability, reliability, extensibility and task adaptivity, energy awareness, progressive accuracy. In comparison to the traditional data fusion model in WSNs, where individual SNs send the collected data to the sink, MA paradigm has been proven to be efficient in terms of energy consumption, network lifetime and over all time response [28, 46].To migrate amongst SNs, an itinerary should be planned for MA. An itinerary is a route that the MA follow when migrating amongst SNs. It has been proved that planning itinerary for MA is an NP-Hard problem [45] and the most challenging issue facing this paradigm.

The efficiency of MAs in the WSNs, make suitable for this kind of networks. Many applications adopt MAs based paradigm in WSN such as object detection/tracking [42, 48], healthcare [3], agriculture [14], control/assistant [20], security systems [32], medical/human-care systems, unmanned aerial vehicles, and mobile robots. The overall scheme of MA-based applications in WSNs is illustrated in Fig. 2.

Fig. 2
figure 2

Mobile Agents paradigm based application in the WSNs

The desire to design the itinerary for MA for data fusion in an energy efficient manner makes the use of MA paradigm in WSNs applications, largely, determined by the methods used to plan the itinerary for the MA [7]. The itinerary planning for MA can be classified into three main categories: static, dynamic or hybrid which can be classified in its turn in single and multiple.

In single static itinerary planning (SSIP), the sink collects the information of network then based on this information the MA itinerary is computed, the MA migration starts form the sink then next node in the itinerary and so on till the last SN in the network. SSIP is satisfactory for small to medium scale WSN.

The type of the itinerary planning for MAs deponds on the desired application, as Table 1 shows, SIP are suitable for data fusion application, DIP are used by target traking, intrusion detection, and localization applications. The HIP can be used for target traking, intrusion detection.

To bypass the lack of scalability in SSIP, multiple static itinerary planning (MSIP) present a good choice.In MSIP, the sink collect the global information of network topology and computes multiple itineraries or paths of the MAs by using the collected information ,then each all MA start its migration in parallel. Static itinerary planning (SIP) is more suitable for data monitoring applications.

Table 1 WSN application based itinerary planning for MAs

Single dynamic itinerary planning (SDIP) allow more flexibility, deciding the next destination node on the fly, SDIP can avoid the node failure and choose another node to continue its migration, even the high cost of SDIP in terms of energy consumption and over all time response this scheme is more flexible in case of node failure. But the same as SSIP, SDIP suffer from lack of scalability with the growing size of the network.

SDIP became inefficient with the growing size of the network, therefore a multiple dynamic itinerary planning MDIP solution have been adopted by researchers. This approach allow more scalability, also due to the critical issue of energy consumption in WSN, the usage and parallel deployment of multiple mobile agents for data aggregation has been proven to be an efficient scheme in energy consumption cost and overall response time.

MDIP approach give the MAs the choice to decide the next destination node on the fly (based on residential energy, trust level...), it means that if there is any node failure, the MAs choose another destination node and so on, but also this approach may not be the best solution, because the more intelligent within the MAs the bigger the MAs are, which affect the energy and the overall time response.

MDIP allow more flexibility, even its high energy consumption an overall time response, as Fig. 2a shows, without node failure MDIP normally, and after node failure in Fig. 2 the MAs agent detect the failure of node and choose another node as its next destination node.

2 Mobile Agents Technology

Mobile agent technology is a paradigm for programming distributed applications over large networks such as wireless sensor networks (WSNs). The mobile agent is of great interest for implementing applications whose performance varies depending on the availability and quality of services and resources. As a result, mobile agents are an obvious choice in the field of wireless sensor networks. Several researches have proposed schemes to effectively use the mobile agent in this kind of networks. They have been found particularly useful for facilitating the fusion and efficient dissemination of data in sensor networks [7]. In mobile agent-based data fusion tasks, the choice of agent routes is of critical importance affecting the overall cost of energy consumption.

2.1 Mobile Agent Concept

The growth in user requirements and preferences, as well as the need for incremental scalability of applications, ensures that a centralized, rigid and passive vision reaches its limits. On the other hand, recent technological progress has led to the emergence of a new means facilitating the task of designing and developing these applications. Indeed, the rise of distributed computing has been accompanied by the emergence of the paradigm of mobile agents (MAs). The latter offers greater flexibility and treatment efficiency [12, 21, 22, 33]. Mobile agent technology presents interesting prospects for various application domains of the present era.

A mobile agent (MA) is a special kind of software that migrates among SNs to autonomously carry out task(s) in response to changing conditions in the network environment to achieve the objectives of the agent dispatcher [48].

2.2 Characteristics of a Mobile Agent

An agent is essentially characterized by the following points [Qih]:

  • Nature The agent can be a physical or virtual entity; the physical entity is something that acts in the real world, for example: a robot, an airplane or a car.On the other hand, the virtual entity is an entity that does not exist physically and represents a software component or a computer module.

  • Autonomy This means that it is not driven by commands from the user or another agent, but by itself.Therefore it has a certain freedom of movement.

  • The environment it represents the space in which the agent is able to perceive and act.

  • Communication: The agent has the ability to communicate directly with other agents.

  • Efficiency it represents the speed of execution and intervention of the agent.

  • Representational capacity Agents only have a partial representation of their environment, that is, they do not have a global vision of everything that happens to their environment. An agent does not know all the details, it has only three types of knowledge; domain knowledge, control knowledge, communication and interaction skills.

  • Own resources To enable the agent to act in the environment, it needs a number of resources: energy, CPU, amount of memory, access to some sources of information. These resources make the agent dependent on his environment, but they give it a certain independence, being able to manage them.

  • The objective The agent is thus a kind of “living organism” whose behavior, which is summarizes to communicate, to act and possibly to reproduce, aims at the satisfaction of its needs and objectives from all other elements (perceptions, representations, actions, communications and resources).

    There are other optional features that distinguish agents such as [30]:

  • The reasoning the agent can be linked to an expert system or other mechanisms of more or less complex reasoning.

  • The control it can be totally distributed between the agents, but can be dedicated to a certain class of agents as facilitator agents.

  • Anticipation the agent can more or less have the ability to anticipate events future.

  • Granularity or complexity the agent can be very simple like a neuron but also more complex.

  • The contribution the agent participates more or less in solving the problem or in the activity overall system.

  • Intentionality An intentional agent is an agent guided by his goals. An intention expresses the will of an agent to reach a goal or to perform an action.

  • Rationality Rational agents have criteria for evaluating their actions, and select according to these criteria the best actions to reach the goal.

  • Adaptability An adaptable agent is an agent able to control his abilities (communicational, behavioral, etc.) according to the environment.

  • Commitment The notion of commitment is one of the essential qualities of cooperative agents. A cooperative agent plans its actions by coordination and negotiation with the other agents. By building a plan to achieve a goal, the agent gives himself the means to achieve it and therefore commits to accomplish the actions that satisfy this goal; the agent believes he has developed, which leads him to act accordingly.

  • Intelligence An intelligent agent is a cognitive agent, rational, proactive and adaptive.

2.3 Mobility

Mobility can be referred to as physical mobility or software mobility. Physical mobility is the movement of a physical terminal, such as a laptop or phone. While software mobility is the movement of a software program between two or more physical terminals. The mobile software entity is then called component, agent, mobile application [35]. Figure 3 illustrates the mobility degree of a Mobile Agent.

Fig. 3
figure 3

Mobility degree

2.3.1 Degree of Mobility

There are two degrees of mobility of applications: weak and strong [5]:

2.3.2 Weak Mobility

It consists of transferring only the data and code of an application that moves during its execution on a source machine to a destination machine. So, if we find an interruption in the execution of the application, the latter resumes its execution from the beginning, while having the updated values of its data.

2.3.3 Strong Mobility

It consists of transferring the data, the code plus the execution state of an application that is moving during its execution on a source machine to a destination machine. So, if we find an interruption in the execution of the application, the latter resumes its execution from the point where it was interrupted on the starting machine.

2.3.4 Resources Needed for Mobility

If a system supports weak or strong mobility, there are always specific resources that should emigrate with the agent depending on the degree of mobility. These resources are as follows: [35]

  • State The state of an agent can be considered as a snapshot of its execution. It allows the agent to resume his execution as soon as he arrives at his destination.

  • Implementation The mobile agent needs a code to run.

  • Interface An agent provides an interface that allows other agents and other systems to interact with it.

  • ID Each agent has a unique ID during its life cycle, which allows it to be identified and located.

  • Authority An authority is an entity whose identity can be authenticated by any system it tries to access. There are two main types of authority, the manufacturer who is the provider of the agents’ implementation code and the owner who is responsible for the agents’ behavior.

2.4 Operation of a Mobile Agent

The client gives a mission to an agent. To achieve this mission, the agent moves in the network of machines accessing the services offered by these machines locally. Three phases can be distinguished [4] as the Fig. 4 shows:

  1. 1.

    Activation of the mobile agent with the description of its mission.

  2. 2.

    The execution of the mission by the agent.

  3. 3.

    Possible recovery of the results of the mobile agent.

Fig. 4
figure 4

Operation of a mobile agent

Fig. 5
figure 5

Differents proposed approaches for itinerary planning for MAs in WSNs

3 Mobile Agent Itinerary Planning

3.1 Static Itinerary Planning

Figure 5 illustrates the classification of different approaches based on the Itinerary planning algorithms.

3.1.1 Single Itinerary Planning

Local closest first (LCF) and global closest first (GCF) are the two first heuristics proposed algorithms in [37] to optimize the itinerary of MA performing data fusion tasks. In one hand, LCF plan the itinerary by starting from the sink then searches for the closest SN to its current location as the next destination, the same process is repeated until all SNs are included in the itinerary. Figure 6 illustrates LCF Algorithm . In the other hand, GCF searches for the SN with the shortest distance to the sink as its next destination SN instead of closest SN to its current location as in LCF. Figure 7 illustrates GCF Algorithm.

Fig. 6
figure 6

Local closest first LCF

Fig. 7
figure 7

Global closest first GCF

The output of LCF-like algorithms highly depends on the MA original location, while the SNs left to be visited last are typically associated with high migration cost; the reason for this is that they searches for the next destination among the SNs adjacent to the MAs’ current location, instead of looking at the global network distance matrix. On the other hand, GCF produces messier routes than LCF and repetitive MA oscillations around the region center, resulting in long route paths and unacceptably poor performance [37].

In [11] the authors propose a better scheme named IEMF itinerary energy minimum for first-source-selection (IEMF) algorithm, as well as the itinerary energy minimum algorithm (IEMA), the iterative version of IEMF. IMEF denotes the importance of choosing the first visiting node. Based on this conclusion, it estimates energy costs of different choices of the first node and adopts the best solution to achieve energy efficiency. During each iteration, IEMA selects an optimal source node as the next source to visit among the remaining set of source nodes.

Usman et al. [45] proposed a Genetic Algorithm (GA) to exploit the global information of sensor detection signal levels and link power consumption. This algorithm provides superior performance than the LCF and GCF algorithms ,but it implies a time-expensive optimal itinerary calculation (genetic algorithms typically start their execution with a random solution ‘vector’ which is improved as the execution progresses), which is unacceptable for time-critical applications. The original LCF, GCF [37] and GA schemes [45] are all based on the following two assumptions: (1) a cluster-based network architecture, where all nodes (e.g., sink and source nodes) can communicate with each other in one hop; (2) high redundancy among the sensory data, which can be fused into a single data packet with a fixed size. This implies that a perfect aggregation model is used. These assumptions limit the scope of the existing schemes.

Authors in [15,16,17] have proposed an approach based on SNs density. At first, SNs are grouped in clusters based on SNs density, then a SN is selected as the cluster head. second, minimum spanning tree is used to plan th itinerary amongst cluster heads. finally, MA is dispatched to collect data from cluster heads. In addition a fault tolerant is proposed in [17] in case of SN failure.

3.1.2 Multiple Itinerary Planning

Mpitziopoulos et al. [31] have proposed a near-optimal itinerary design (NOID) algorithm.This algorithm adapts a method originally designed for network design problems, namely the Esau-Williams heuristic [11] for the Constrained Minimum Spanning Tree (CMST) problem, in the specific requirements of WSNs. In NOID, the parallel deployment of multiple agents is suggested where each agent visits a subset of nodes. NOID suffers from low working speed and high computational complexity.

Chen [6] proposed scheme entitled MST-MIP based on minimum spanning tree, where each branch stemmed from the sink corresponds to a group of source nodes assigned for a mobile agent to visit. A SIP algorithm is then executed to decide on the order in which cluster nodes will be visited. Furthermore, a balancing factor a is introduced to achieve a flexible trade-off control between energy cost and task duration.

In [9] the Authors propose The Directional Source Grouping (DSG) algorithm to find near optimal itineraries for multiple agents. This Algorithm uses a circle around the PE and iteratively partitions a directional sector zone where the source nodes are included in an itinerary. The radius of the circle is set to the maximum transmission range of a single SN. Every SN that lies in the circle is used as the first node of an itinerary. The number of source nodes included in the itinerary is controlled by the angle of the directional sector zone in such a way that routes for MAs can be obtained by selecting the appropriate angle.

In [8], the authors proposed multi-agent itinerary planning (MIP) algorithms. The basic idea of the proposed visiting central location (VCL) selection algorithm is to distribute each source’s impact factor to other source nodes to determine a set of SNs that will act as central points in each cluster. Then the itinerary for each of the Mobile agents can be planned by any SIP algorithms.

The Tree-Based Itinerary Design (TBID) algorithm [26] find near optimal itineraries for multiple agents. , the algorithm determines a spanning forest of trees in the network, calculates efficient tree traversal orders (itineraries), and eventually, assigns these itineraries to individual MAs. The main theme of the TBID algorithm is to divide the area around the sink into concentric zones to construct the near optimal itinerary tree from inner zones to the outer zones. . The first zone includes all SNs that are within a certain distance of the PE and a MA is assigned to each itinerary rooted at those SNs. They used post order traversal with a possible shortcutting of the itinerary tree to derive an itinerary for each agent. authors in Gupta et al. [27] have present a Scalable and Load-balanced Mobile Agents-based Data Aggregation (SLMADA) algorithm which is based on TBID with scalability and load-balancing.

Gavalas et al. [24] have proposed a meta-heuristic approach-based itinerary planning algorithm for multiple agents. Proposed method uses iterated local search (ILS) to improve the migration path of the MAs. Like TBID [26] , ILS also divides the area around the sink into a set of concentric zones and uses ILS algorithm for grouping the nodes in the separate itineraries. This method is generally formed radial-like itineraries that gradually grow up towards the border of the network. ILS scheme is centralized and does not deal with the MA bloated state problem.

In [23], the authors have proposed an itinerary algorithm for the MA, based on iterated local search approach. The proposed algorithm is designed for heterogeneous WSN with multiple mobile sinks. The main limitation of this algorithm is that it also derives static itineraries which may be based on the old observations of the network topology. Due to this reason, agents are unable to complete its itinerary when any nodes of the itinerary list become faulty or dead.

In [16, 18] authors have proposed a multiple itinerary planing approach based on SNs density. At first, a density impact factor is used to calculate the density in the network, then based on this density, SNs are grouped in clusters b,after that a SN is selected as the cluster head in each Cluster. In the next phase, minimum spanning tree is used to plan th itinerary amongst cluster heads. finally, MAs are dispatched to collect data from cluster heads. In addition a fault tolerant is proposed in [18] in case of SN failure.

Qadori et al. [36] have proposed a spawn multi-mobile agent itinerary planning scheme which is based on agent spawning approach. The proposed scheme first uses x-means clustering algorithm for the partitioning the network area into a set of clusters. This scheme uses LCF algorithm for deriving the itineraries of the agent in each partition based on the global topology information available at the sink. This scheme is also suffers from the same problem as scheme proposed in [23].

3.2 Dynamic Itinerary Planning

3.2.1 Single Itinerary Planning

A Single Dynamic Itinerary Planning Algorithm (SDIP) has been proposed in [10], the authors proposed the mobile agent-based directed diffusion (MADD). In this approach, authors adapt the directed diffusion [29] in CS paradigm to MA paradigm. Although quite similar to LCF, MADD selects the farthest SN from the sink as the first SN in the itinerary. Figure 8 illustrate MAAD algorithms.

Fig. 8
figure 8

Mobile Agent based Directed Diffusion (MADD)

[47, 49] proposed a Single dynamic agent migration algorithm for a target tracking application. In this Algorithm, a MA migrates to a source node that can get more accurate information about the target location by consuming less energy. to select the next node, they defined a cost function, which includes the following three components: energy consumption, information gain, and the remaining energy of a node. Once an agent accumulates sufficient information so that the accuracy of the estimation meets the desired level, the agent will terminate the migration and return to the sink [47, 48]. This algorithm is more time expensive and may face difficulty in returning back to the sink without additional forwarding information.

Qi and Wang [39] proposed a software agent-based directed diffusion where the order of node visits is determined at the sink node, but the authors did not describe the procedure. This method takes the routing cost and the remaining energy of a node for selecting a next node to be visited by an agent.

3.2.2 Multiple Itinerary Planning

Gupta et al. [25] proposed a multiple mobile agents with dynamic itineraries-based data dissemination (MMADIDD) protocol where nodes are organized in a set of the wedge regions and each agent is responsible for gathering aggregated data from each wedge region. The route of an agent is dynamically decided at each hop using cost function. MMADIDD adapts to unexpected node failures during an agent migration, but consumes slightly more energy than TBID [26]. This protocol provides a fair amount of fault tolerance, but the migration of agents depends on the wedge structure.

3.3 Hybrid Itinerary Planning

In hybrid planning, the selection of the source-visiting set is static, whereas the decision of the source-visiting sequence is dynamic. We did check the literature related to Hybrid Itinerary planning, No hybrid itinerary planning approach have bee, proposed.

4 Results and Discussion

We implemented the most prominent single itinerary planning and multiple itinerary planning algorithms. Taking into consideration that MIP outperforms SIP, we did compare SIP algorithms with each other and MIP with each other using castalia simulator [34]. Castalia is a simulator for WSNs, body area networks BANs and generally networks of low-power embedded devices. It is based on the OMNeT++ platform and used by researchers and developers to test protocols in realistic wireless channel and radio models, with a realistic node behavior especially relating to the access of the radio. Castalia can also be used to evaluate different platform characteristics for specific applications, since it is highly parametric, and can simulate a wide range of platforms.

SNs were randomly deployed in square monitoring area of \(500\times 500\) m, and varied from 200 to 800 nodes, the sink is located at the center of monitoring area, also SNs had the same transmission range and battery power, except for the sink, that has more computation capabilities and battery power.

The rest of the simulation parameters are shown in Table 2.

Table 2 Simulation parameters

For data aggregation model used in this work, we adopted the model proposed in [11] :

$$\begin{aligned} S_{MA}^k=S_{MA}^0 + S_D + \sum _{n=1}^{k-1} (1- \alpha )*S_D \end{aligned}$$
(1)

Where \(S_{MA}^k\) is the size of MA after visiting \(kth\) SN, \(S_{MA}^0\) is the MA size after being dispatched by the sink for the first time, \(S_D\) is the size of data at each cluster head, and \(\alpha\) is the data aggregation ratio. When data aggregation ration \(\alpha\) = 1:

$$\begin{aligned} S_{MA}^k=S_{MA}^0 + S_D \end{aligned}$$
(2)

In the other hand, where \(\alpha\) = 0 which means that there is no data aggregation taking place by mobile agents at cluster heads:

$$\begin{aligned} S_{MA}^k=S_{MA}^0 + k.S_D \end{aligned}$$
(3)

The following four metrics were used to compare SIP and MIP:

  • Overall energy consumption is the energy consumed by all SNs and MAs execution.

  • Execution time is the required time for MAs to visit all CHs and returning back to the sink.

  • Total traveled distance is the total traveled distance by all MAs.

  • Dispatched MAs is the number of dispatched MAs to gather data from CHs (this metric is used for MIP algorithms).

Fig. 9
figure 9

Energy Consumption

Fig. 10
figure 10

Execution time

Fig. 11
figure 11

Itinerary length

Figure 9 illustrate the comparison of overall energy consumption per round of GCF, IEMF, MADD, EFTA and A-EFTA algorithms with the increasing size of network from 200 to 800 SN. As shown in Fig. 6, the overall energy consumption per round increases as the number of SNs increase. IEMF and MADD protocols consume almost the same amount of the energy, with better performance of IEMF. GCF consumes the biggest amount of energy thean all other algorithms. For MAEF it consumes almost the smallest amount of energy.

Figure 10 shows the execution time of MAs to visit all SNs including the time to return back to sink. It compares MAEF, GCF, MADD, EFTA and A-EFT Aalgorithms. As it can be observed, the execution time of all algorithmes increases as the number of SNs increases. GCF has the highest execution time than all other protocols, because of its poor strategy to migrate amongst SNs neare preforms better since it spends less time for visiting CHs only.

Figure 11 compares the total itinerary length of MAEF, IEMF, MADD EFTA and A-EFTA algorithmes. MAEF has the shortest itinerary length than all the other algorithmes. This is due to the itinerary planning just among CHs and not all the SNs. GCF has the longest itinerary length because its poor strategy of choosing nearest SN as the next destination and planning itinerary among all SNs. On the other side, MADD and IEMF have almost the same itinerary length.

Fig. 12
figure 12

Energy Consumption

Fig. 13
figure 13

Execution time

Fig. 14
figure 14

Itinerary length

Figure 12, illustrate the comparison of overall energy consumption per round of TBID, VCL, DSG, NOID and MAEF algorithms with the increasing size of network from 200 to 800 SN. As shown in Fig. 12, the overall energy consumption per round increases as the number of SNs increase. NOID and VCL algorithms consume the highest amount of energy, with better performance of VCL followed by DSG algorithme. TBID and MAEF manages to consume less energy in comparaison to the all other algorithmes withe better performance of TBID when the network size increase.

Figure 13 shows the execution time required by the MAs to visit all SNs in the network including the time to return back to sink. It compares the execution time(task duration) of TBID, VCL, DSG, NOID and MAEF algorithms. As the figure shows, the execution time of all algorithmes increases as the number of SNs increases. NOID and DSGhas the highest execution time than all other Protocols, followeb by MAEF and and VCL which have less execution time. TBID manages to consume less energy the all other protocoles.

Figure 14 compares the total itinerary length of TBID, VCL, DSG, NOID and MAEF algorithmes. NOID has the longest itinerary length than all other algorithms because it’s a tree based algorithme. followed by VCL then TBID NOID and DSG. MAEF manages to have the shortest itinerary of all other algorithms. Because of its strategy of dispatching the minumuim number of MAs.

Finally, Fig. 15 shows the number of dispatched MAs by each algorithme. as the figure shows, NOID algorithm dispatches the highest number of MAs followed by VCL algrorithme. DSG and TBID manages to dispatche 20 MA in a network of 800 SN. MAEF dispatches the minimuim number of MAs (Fig. 15).

Fig. 15
figure 15

Dispatched MAs

5 Summary and Perspectives

The mobile agents paradigm is currently adopted by many researchers in WSNs especially for data fusion application. In comparison to the traditional CS paradigm, MAs is efficient in terms of energy consumption, execution time and network lifetime. The efficiency of MA paradigm is largely related to the itinerary followed by the MA during the data fusion task. Thus, many approaches have been proposed to solve the problem of itinerary planning.

In this paper, we survey the literature related to the itinerary planning for MA in WSNs for data fusion application. We did simulate the most prominent approaches to evaluate and compare their performances. It is obvious that planning multiple itineraries for multiple agents is more complicated then planning single itinerary for one agents and it’s a NP-hard problem as we mentioned in the manuscript. The simulation results shows that MIP outperform SIP.