{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T18:05:55Z","timestamp":1770487555411,"version":"3.49.0"},"reference-count":41,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2017,1]]},"abstract":"<jats:p> Recently, wireless sensor networks have employed the concept of mobile agent to reduce energy consumption and obtain effective data gathering. Typically, in data gathering based on mobile agent, it is an important and essential step to find out the optimal itinerary planning for the mobile agent. However, single-agent itinerary planning suffers from two primary disadvantages: task delay and large size of mobile agent as the scale of the network is expanded. Thus, using multi-agent itinerary planning overcomes the drawbacks of single-agent itinerary planning. Despite the advantages of multi-agent itinerary planning, finding the optimal number of distributed mobile agents, source nodes grouping, and optimal itinerary of each mobile agent for simultaneous data gathering are still regarded as critical issues in wireless sensor network. Therefore, in this article, the existing algorithms that have been identified in the literature to address the above issues are reviewed. The review shows that most of the algorithms used one parameter to find the optimal number of mobile agents in multi-agent itinerary planning without utilizing other parameters. More importantly, the review showed that theses algorithms did not take into account the security of the data gathered by the mobile agent. Accordingly, we indicated the limitations of each proposed algorithm and new directions are provided for future research. <\/jats:p>","DOI":"10.1177\/1550147716684841","type":"journal-article","created":{"date-parts":[[2017,1,9]],"date-time":"2017-01-09T05:00:41Z","timestamp":1483938041000},"page":"155014771668484","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":17,"title":["Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: A review paper"],"prefix":"10.1177","volume":"13","author":[{"given":"Huthiafa Q","family":"Qadori","sequence":"first","affiliation":[{"name":"Department of Wireless and Communication Technology, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia (UPM), Serdang, Malaysia"}]},{"given":"Zuriati A","family":"Zulkarnain","sequence":"additional","affiliation":[{"name":"Department of Wireless and Communication Technology, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia (UPM), Serdang, Malaysia"}]},{"given":"Zurina Mohd","family":"Hanapi","sequence":"additional","affiliation":[{"name":"Department of Wireless and Communication Technology, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia (UPM), Serdang, Malaysia"}]},{"given":"Shamala","family":"Subramaniam","sequence":"additional","affiliation":[{"name":"Department of Wireless and Communication Technology, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia (UPM), Serdang, Malaysia"}]}],"member":"179","published-online":{"date-parts":[[2017,1,8]]},"reference":[{"key":"bibr1-1550147716684841","doi-asserted-by":"publisher","DOI":"10.9790\/0661-0412630"},{"issue":"9","key":"bibr2-1550147716684841","first-page":"15","volume":"66","author":"Jayram BG","year":"2013","journal-title":"Int J Comput Appl"},{"key":"bibr3-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2010.2063020"},{"key":"bibr5-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1145\/959060.959072"},{"key":"bibr6-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.000000"},{"key":"bibr7-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1145\/605432.605407"},{"issue":"1","key":"bibr8-1550147716684841","first-page":"219","volume":"2007","author":"Chen M","year":"2007","journal-title":"EURASIP J Appl Si Pr"},{"key":"bibr9-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27299-8_35"},{"key":"bibr10-1550147716684841","first-page":"288","volume-title":"2014 IEEE 39th conference on local computer networks (LCN)","author":"Paul T"},{"key":"bibr11-1550147716684841","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.1.14-21"},{"key":"bibr12-1550147716684841","first-page":"11","volume-title":"Proceedings of 5th international conference on information fusion","author":"Qi H","year":"2001"},{"key":"bibr13-1550147716684841","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.5.10.1160-1168"},{"issue":"6","key":"bibr14-1550147716684841","first-page":"51","volume":"3","author":"Lingaraj K","year":"2012","journal-title":"Int J Comput Commun Technol"},{"key":"bibr15-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4407223"},{"key":"bibr16-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2006.07.004"},{"key":"bibr17-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1161-6"},{"issue":"1","key":"bibr18-1550147716684841","first-page":"7","volume":"8","author":"Di Francesco M","year":"2011","journal-title":"ACM T Sensor Network"},{"issue":"6","key":"bibr19-1550147716684841","first-page":"7122","volume":"5","author":"Gowri K","year":"2014","journal-title":"Int J Comput Sci Inform Tech"},{"key":"bibr20-1550147716684841","first-page":"44","volume-title":"Advances in wireless sensor networks","author":"Chen Y","year":"2012"},{"key":"bibr21-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.113"},{"key":"bibr22-1550147716684841","first-page":"271","volume-title":"2012 IEEE international conference on industrial technology (ICIT)","author":"Vukasinovic I"},{"key":"bibr23-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.03.001"},{"key":"bibr24-1550147716684841","first-page":"1","volume-title":"IEEE international conference on communications (ICC\u201909)","author":"Chen M"},{"key":"bibr25-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.12"},{"key":"bibr27-1550147716684841","first-page":"105","volume-title":"2014 sixth international conference on ubiquitous and future networks (ICUFN)","author":"Venetis IE"},{"key":"bibr28-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.003"},{"key":"bibr29-1550147716684841","first-page":"352","volume-title":"2010 international conference on advances in computer engineering (ACE)","author":"Kallapur PV"},{"key":"bibr30-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.02.018"},{"issue":"11","key":"bibr31-1550147716684841","first-page":"13","volume":"3","author":"Bendjima M","year":"2012","journal-title":"Int J Adv Comput Sci Appl"},{"key":"bibr32-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2010.0638"},{"key":"bibr33-1550147716684841","first-page":"1","volume-title":"IEEE 18th international symposium on personal, indoor and mobile radio communications (PIMRC 2007)","author":"Mpitziopoulos A"},{"key":"bibr34-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3184"},{"key":"bibr35-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1147\/sj.53.0142"},{"key":"bibr37-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.203"},{"key":"bibr38-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0140-z"},{"key":"bibr39-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10625-5_37"},{"key":"bibr40-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0269-z"},{"key":"bibr41-1550147716684841","first-page":"305","volume-title":"Proceedings of Symposium of the Korean Institute of communications and Information Sciences","volume":"11","author":"Cai W","year":"2009"},{"key":"bibr42-1550147716684841","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-015-9985-9"},{"issue":"2","key":"bibr43-1550147716684841","first-page":"116","volume":"7","author":"Aloui I","year":"2015","journal-title":"Int J Comm Network Inform Secur"},{"key":"bibr44-1550147716684841","first-page":"1","volume":"1","author":"Pelleg D","year":"2000","journal-title":"ICML"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147716684841","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147716684841","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147716684841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,14]],"date-time":"2021-01-14T07:44:16Z","timestamp":1610610256000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147716684841"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["10.1177\/1550147716684841"],"URL":"https:\/\/doi.org\/10.1177\/1550147716684841","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1]]}}}