ArticlePDF Available

iAMCTD: Improved Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR Protocol for Underwater Wireless Sensor Networks

Authors:

Abstract and Figures

We propose forwarding-function (íµí°¹ íµí°¹) based routing protocol for underwater sensor networks (UWSNs): improved adaptive mobility of courier nodes in threshold-optimized depth-based-routing (iAMCTD). Unlike existing depth-based acoustic protocols, the proposed protocol exploits network density for time-critical applications. In order to tackle flooding, path loss, and propagation latency, we calculate optimal holding time (íµí°» íµí±‡) and use routing metrics: localization-free signal-to-noise ratio (LSNR), signal quality index (SQI), energy cost function (ECF), and depth-dependent function (DDF). Our proposal provides on-demand routing by formulating hard threshold (íµí°» th), soft threshold (íµí±† th), and prime energy limit (íµí±… prime). Simulation results verify effectiveness and efficiency of the proposed iAMCTD.
This content is subject to copyright. Terms and conditions apply.
Research Article
iAMCTD: Improved Adaptive Mobility of Courier Nodes in
Threshold-Optimized DBR Protocol for Underwater Wireless
Sensor Networks
N. Javaid,1,2 M. R. Jafri,2Z. A. Khan,3U. Qasim,4T. A. Alghamdi,5and M. Ali6
1CAST, COMSATS Institute of Information Technology, Islamabad 44000, Pakistan
2EE Department, COMSATS Institute of Information Technology, Islamabad 44000, Pakistan
3InternetworkingProgram,FE,DalhousieUniversity,Halifax,NS,CanadaB3J4R2
4University of Alberta, AB, Canada T6G 2J8
5CS Department, College of CIS, Umm AlQura University, Makkah 21955, Saudi Arabia
6Institute of Management Sciences, Peshawar 25000, Pakistan
Correspondence should be addressed to N. Javaid; nadeemjavaid@comsats.edu.pk
Received  February ; Accepted  June ; Published  July 
Academic Editor: Aneel Rahim
Copyright ©  N. Javaid et al. is is an open access article distributed under the Creative Commons Attribution License, which
permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
We propose forwarding-function (𝐹) based routing protocol for underwater sensor networks (UWSNs): improved adaptive
mobility of courier nodes in threshold-optimized depth-based-routing (iAMCTD). Unlike existing depth-based acoustic protocols,
the proposed protocol exploits network density for time-critical applications. In order to tackle ooding, path loss, and propagation
latency, we calculate optimal holding time (𝑇) and use routing metrics: localization-free signal-to-noise ratio (LSNR), signal
quality index (SQI), energy cost function (ECF), and depth-dependent function (DDF). Our proposal provides on-demand routing
by formulating hard threshold (th), so threshold (th), and prime energy limit (prime). Simulation results verify eectiveness and
eciency of the proposed iAMCTD.
1. Background
Underwater acoustic sensor networks (UASNs), as a subclass
of wireless sensor networks (WSNs), are specically used for
monitoring purposes in aqueous environment. e acoustic
wireless sensors along with sink(s), distributed under water,
constitute the basic body of UASN, where acoustic sensors
gather the information of interest and then following a
routing strategy forward these data to the end station.
WHOI Micro-Modem []andCrossbowMica[]are
among the commercially available sensors for underwater
environments. Sink is generally supposed to have no power
constraint, whereas the acoustic sensors are equipped with
limited battery power. ese networks provide diversied
rangeofapplicationslikepollutionmonitoring,oceancur-
rent detection, submarine discovery, deep sea explorations,
and seabed management.
Due to the nature of aqueous environment, improving
energy eciency at routing layer is a challenging task.
Moreover, as there are major dierences between terrestrial
and underwater conditions, hence the basic concepts of
terrestrial routing can not be implemented in UWSNs. To
tackle these problems, researchers exercise the role of low
speed acoustic signals for aqueous communication and sea
navigation systems, leading to high propagation delay and
transmission losses. High shipping activity, thermal noise,
and turbulent noise also increase the error rate. Authors in
[] design the underwater acoustic channel to descriptively
analyze the total noise density and path loss. On the other
hand [], it investigates diverse routing architectures for -
dimensional and -dimensional UWSNs. Fundamental anal-
yses of aqueous conditions show that reactive routing is more
challenging than the proactive one. Battery replacement and
ecient routing are among the solutions to overcome the
Hindawi Publishing Corporation
International Journal of Distributed Sensor Networks
Volume 2014, Article ID 213012, 12 pages
http://dx.doi.org/10.1155/2014/213012
International Journal of Distributed Sensor Networks
power constrained problem of acoustic sensors; however, the
leading solution is not practical; thereby, we focus on the
lagging one.
e two major categories of underwater routing protocols
are localization-based and localization-free. e fundamental
dierence between these two is the awareness of location by
the sensor nodes. Localization-free protocols are also termed
as ooding based schemes, where nodes are only aware about
their depth. On the other hand, location-based protocols
assume that the sensor nodes are location aware. In literature,
both localization-based and localization-free schemes are
available: QELAR [], R-ERPR [], EEDBR [], and MPT
[]. ese protocols attempt to tackle high transmission
delay, path loss, and receiving energy consumption. However,
deciencies do exist. Depth Based Routing (DBR) protocol
[] is based on depth of sensor nodes as the trivial parameter
in ooding-based forwarding schemes. EEDBR []improves
the deciencies of DBR by considering residual energy while
selecting data forwarder(s). R-ERPR []isanothermagni-
cent depth-based routing scheme, which implements “ETX”
routing metric for improving energy eciency. QELAR []
designs routing architecture and cross-layer approach on the
basis of Q-machine learning, thereby improving localization-
based routing. MPT [] employs power-controlled and
source-initiated transmission by examining the deciencies
at the physical layer in UASNs, specically to deal with on-
demand applications. H-DAB []achievestheminimum
delay and higher network lifetime by using hop count as
routing metric. It also employs courier nodes to provide
adaptability for time-critical and data-sensitive applications.
ere is always a need of less complex and highly reliable
communication scheme in WSNs and UWSNs. Liu et al. []
improve reliability in transmissions by proposing a network
coding based cooperative communications scheme (NCCC).
It provides a scalable implementation of NCCC by selecting
coding vectors from nite eld. Localization schemes for
sensor nodes are not so accurate in UWSN, as in WSN. In
WSN, mobile beacon assisted localization is used.
In [], the authors propose -curve, which is a path
planing mechanism for mobile beacons to localize the sensor
nodes. Zou et al. [] develop a generic algorithm to control
the movement of autonomous underwater vehicles (AUVs) in
UWSN by gathering network information from sensor nodes.
Limited residual energy is one of the main challenges for sen-
sor nodes in UWSN. High numbers of (re)transmissions and
collisions cause consumption of energy. In [], the authors
tackle the issue by proposing contention-free multichannel
MAC protocol for UWSNs.
Another technique has been proposed by []inwhich
authors design spatially fair MAC (SFMAC) protocol for
UWSNs. It avoids the collisions with postponing clear-to-
send(CTS)foraspecicdurationascalculatedbythereceiver
node. Mobility of the target object is always an issue for
WSN.Furthermore,itisverydiculttoupdatethelocation
information of the target object by sensor nodes. In []; the
authors suggest an accurate target tracking scheme for WSNs.
ey achieve energy eciency in the scheme by minimizing
the missing rate of an object.
MUAP in [] examines the acoustic channel as well as
its losses and then proposes an energy model for the compu-
tation of channel losses in aqueous environment. Stojanovic
[] carefully examines the association between transmission
distance and channel capacity in underwater communi-
cation. CEDC [] uses doppler compensation model to
improve the scrutinizing of acoustic signals and present a
high data-rate communication model. In dense underwater
conditions, PULRP [] provides a cross-layer model as well
as a descriptive algorithm to maximize networks throughput.
is model is localization-free technique with ecient energy
consumption model. AMCTD [] exploits the adaptive
mobility of courier nodes to maximize the network lifetime.
It computes the holding time on the basis of weight function
to cope with the problems of high transmission loss and low
network lifetime. e work presented in this paper is the
extension of [].
2. Motivation and Contribution
By examining the ooding as well as depth-based rout-
ing protocols, we compensate for the deciencies in these
schemes. In DBR and EEDBR, stability period quickly ends
due to unnecessary data forwarding and high load on low-
depth nodes. Another main deciency of these protocols is a
sharpinstabilityperiodduetothequickenergyconsumption
of medium-depth nodes. In AMCTD, the high transmission
loss is due to distant transmissions of medium-depth nodes.
AMCTD is not suitable for data-sensitive applications, espe-
cially during instability period due to the mobility pattern
of courier nodes. e consideration of only two parameters,
depth and residual energy, is not sucient for global load
balancing throughout the network lifetime.
We investigate the problems of medium-depth nodes in
the earlier rounds like high end-to-end delay and transmis-
sion loss, low stability period, and fast energy consumption.
Based on these, we optimize the movement of courier nodes
in sparse conditions for load balancing. Although AMCTDs
performance is better than DBR and EEDBR, respectively;
however, deciencies do exist. We try to overcome the
deciencies as follows.
(i) In iAMCTD, the ecient movement of courier nodes
minimizes end-to-end delay and decreases the energy
consumption of low-depth nodes in sparse condi-
tions.
(ii) e 𝐹𝑠 computation technique causes longer stability
period than the previous ones along with reduced
transmission loss. It also decreases average end-to-
end delay of packets which is crucial for time-critical
applications.
(iii) Implementation of threshold-optimized data for-
warding is resourceful process for on-demand routing
and removes forwarding of unnecessary data in the
network.
(iv) Optimized mobility pattern of sink, in later rounds,
maintains end-to-end delay of the network, especially
International Journal of Distributed Sensor Networks
for delay-sensitive applications even in sparse condi-
tions.
(v) We examine nodes’ depth and control overhead at
physicallayeraswellasnetworklayerandproposea
model which caters for the major acoustic problems.
We consider arbitrary deployment of nodes in D aque-
ous environment. e network consists of sensor nodes,
courier nodes, multiple sinks, and onshore data centers.
Sensor nodes and courier nodes communicate with low-
range acoustic modems, whereas sinks (equipped with both
RF and acoustic modems) communicate with onshore data
centers and sensor nodes. Upon the detection of physical
environmental attributes, the sensor nodes transmit the
sensed data to either of the in-range node or sink. Courier
nodes are equipped with mechanical modules for movement
control; however, these can only relay the network data
towards sink. Aer collecting threshold-based data, sensor
nodes transfer the data to sink, as soon as possible, either
by direct transmission or through courier nodes; otherwise
they broadcast the data towards their neighbors. Nodes
communicate with each other using low-range commercial
acoustic modems. In ooding-based techniques, control
packets’ transmission is the requirement of network in order
to achieve better management with the varying network
density. e multiple-sink model is procient at balancing the
networkloadandithasbeenanalyzedin[].
3. The Proposed iAMCTD
We divide operation of the proposed iAMCTD into the
following four phases:
(i) network initialization and underwater channel
model,
(ii) implementation of on-demand data routing,
(iii) data forwarding phase,
(iv) adaptive mobility patterns of courier nodes.
e rst phase deals with nodes’ deployment, network
initialization, and thorp’s model [] for path loss and noise
density calculation in aqueous environment. Second phase
discusses implementation of on-demand data routing to facil-
itate the time-sensitive and critical-data applications. ird
phase expresses the data forwarding along with the variations
in depth thresholds for sensor nodes to cope with varying
network density. We develop ecient forwarding functions
for optimal data forwarding in aqueous environment. We also
discuss the data packet structure and the tradeo between
control overhead and network lifetime. On the basis of
control packets, sink identies the network density and
manages the network specications and mobility of courier
nodes. Last phase uses mixed integer linear programming
(MILP) to analyze adaptive mobility patterns of courier nodes
and their multiple cases.
3.1. Network Initialization and Underwater Channel Model.
We assume that sensor nodes broadcast the data using
ooding-based approach. As each neighbor of the node
receives data of the sender node, courier nodes devise their
sojourntouratthestartofthenetworkandthenstart
collecting data from the source nodes. ese also report
the network density information to sinks in order to devise
mobility patterns and depth-threshold variations. During
knowledge acquisition, nodes share the depth and residual
energy information among themselves. As the network initi-
ates, courier nodes remain at equal horizontal distances from
each other and these start vertical movement towards the
bottom.
Given below channel model is used to calculate spreading
loss and total noise loss in underwater acoustics. We calculate
the total attenuation of signal on the bases of spreading loss
[] and thorps model for signal absorption loss. At a given
frequency ,thechannelmodelcalculatesabsorptionloss
()[] as follows:
10log 
=
0.112
1+2+442
4100+ +2.751042 0.4
+0.003
0.002+0.11
1++0.011, <0.4,
()
where ()is measured in dB/km and in kHz. Here, thorps
model denes formula for the calculation of absorption loss.
By using the value of absorption loss, we calculate the value
of as follows:
=10𝛼(𝑓)
10 .()
Accordingly, all tunable parameters are given in .
Combining absorption loss and spreading loss, the total
attenuation (,)canbecomputedasfollows:
10log , =∗10log ()+∗10log ,()
where the rst term denotes spreading loss and the second
term is the absorption loss. e spreading coecient
denes the geometry of the signal propagation in underwater
acoustics (i.e., =1for cylindrical, =2for spherical,
and  = 1.5 for practical spreading []). For the calculation
of ambient noise in underwater networks, total noise is
comprisedoffourmainparts:turbulentnoise,shippingnoise,
wind noise, and thermal noise. e following formulae give
the power spectral density [] of the four noise components
in , as a function of in kHz:
10log 𝑡=1730log ,
10log 𝑠 = 40+20(0.5)+26log 
−60log +0.03,
International Journal of Distributed Sensor Networks
Sense attribute
No
No
No
Ye s
Ye s
Ye s
V≥H
th
Sth ≤V<H
th
Ri≥R
prime
Send data in next
round
Send data
F : Routing of on-demand data.
10log 𝑤 = 50+7.51/2 +20log 
−40log +0.4,
10log th =−15+20log , ()
where 𝑡,𝑠,𝑤,andth represent the noise due to turbu-
lence, shipping, wind, and thermal activities respectively. e
overall noise power spectral density is calculated as
=
𝑡+𝑠+𝑤+th .()
e ooding-based approaches employ receiver-based
data forwarding due to un-awareness of location. Each node
shares depth information with other nodes and the eligible
neighbors for forwarding are decided on the basis of depth
threshold. e neighbor nodes compute the forwarding
functions by considering channel losses, residual energy, and
depth dierences.
3.2. Implementation of On-Demand Data Routing. e pro-
posed protocol performs on-demand data routing as the
nodes react immediately to sudden and drastic changes
considering the value of sensed attribute. Figure  depicts the
transmission algorithm for threshold-based data.
Where is the current sensed value, th is the so
threshold, th is the hard threshold, 𝑖is the residual energy
of the th node, and prime is the residual energy limit for data
transmission. Aer sensing the attribute value, each node
compares it with the hard threshold. If it nds the value above
than th , then immediately it sends the data. Else, if the
value is between th and th, it compares its residual energy
with prime; if the residual energy is greater than prime,it
transmits data towards sink; otherwise it waits for the next
Sender ID Packet sequence Depth Payload...
number
F : Data packet format.
round. For temperature sensing applications, we assume th
as C, th as 20C, and prime as  Joules. We analyze that
traditional techniques consume surplus energy in two cases:
transmission of redundant data and retransmission of sensi-
tive data. We exploit receiver based forwarding and minimize
the transmission of normal data messages in number; the
transmission energy loss is minimized. We also apply power
control strategies at physical layer to avoid aqueous channel
losses preventing critical data loss.
3.3. Data Forwarding Phase. e sensor nodes send sensed
data to in-range courier node(s). Upon reception, the courier
node(s) acknowledge the sender node(s) to reduce further
ooding. In the absence of courier nodes, sensor node
sends data towards their neighbor nodes. Each sensor node
calculates holding time for received packet on the basis of
forwarding function. In order to avoid packet collisions, all
nodes maintain a timer to send threshold-based sensitive
data. Nodes sense packets buer and maintain priority queue
to avoid transmission of same data and to forward packets
on the basis of holding time. us, the end-to-end delay
of critical data decreases, increasing network’s feasibility for
time sensitive applications. e sensor nodes, aer every
 rounds, transmit control packets for the computation
of network density at the sink, which is further utilized to
manage the variation in the mobility patterns of courier
nodes and depth-thresholds. e data packet format of our
technique is shown in Figure  which consists of sender ID,
packet sequence number, depth information, and payload.
e trade-o between control overhead and network
lifetime is a serious consideration in the design of ooding-
based routing techniques, so we attempt to control this trade-
o by employing minimal overhead.
3.3.1. Variation in Depth reshold. In preceding depth-based
schemes, nonvarying depth-threshold is another key reason
of ooding in dense situations. It is also due to the absence
of eligible neighbors in sparse conditions specically during
instability period, which causes the loss of critical data.
erefore, we implement variations in depth-threshold of
nodes according to network density. e three optimal values
for depth thresholds are th1,th2,andth3,whichare
calculated by the base station in the network according to the
number of dead nodes in the network. In Figure ,1and 2
are the limits for the implementation of thresholds.
With a network of  nodes and each nodes’ range
100m, we assume the values of th1,th2,andth3as  m,
 m, and  m, and 1and 2are set as  and , respectively.
3.3.2. Forwarding Function Computation. In this section,
we analytically model the optimal value selection for 𝐹.
ere are three types of main 𝐹: signal quality index (SQI),
International Journal of Distributed Sensor Networks
Check number of
dead nodes
If number of
nodes <𝜀
1
Ye s
Ye s
No
No
dead
If number of dead
nodes ≤𝜀
1
and number
of dead nodes ≥𝜀
2
Dth = Dth3
Dth = Dth2
Dth = Dth1
Implement depth
threshold
Transmit packet
F : Variations in depth threshold.
energy cost function (ECF), and depth dependent function
(DDF). As sensor node sends data, the neighbor node
having highest 𝐹has least holding time; hence, the optimal
forwarder will be selected. Sensor nodes select the 𝐹on
the basis of depth information. For a specic region (low-
depth, medium-depth, high-depth), appropriate type of 𝐹is
selected on the bases of residual energy, SNR ratio, and depth
dierences between sender and receiver. e mechanism for
the implementation of 𝐹is given in Figure .
Where, 1and 2are depth-distributions, and are
assumed  m and  m, respectively, in the region of
depth  m. 𝐹formulation considers the overall conditions
of aqueous environment. e upper region of water has
maximum interference, noise, and shipping activity; hence
the SQI prioritizes SNR to achieve minimal transmission loss
of the signal.
In medium-depth region, load on nodes is high due to
frequent data forwarding, so the ECF grants the signicance
of residual energy of nodes to attain global load balancing in
the network. In last region, we formulate DDF to accomplish
distant forwarding and minimum ooding scenarios. e
formulae for these functions and holding time 𝑇calculation
are given below:
𝑇=1−𝐹𝑡max,()
where 𝑡max is the maximum holding time and can be
selected according to environmental conditions. In depth-
based techniques, sensor nodes are not mindful of their loca-
tion but only of their depth. erefore, we dene localization-
free signal-to-noise ratio LSNR based on the notion of SNR
[] to assess transmission loss of the signal between two
nodes. In addition, we introduce SQI as a routing metric
on the basis of LSNR in low-depth acoustic region. LSNR
is computed on the basis of (,)which considers depth
dierence instead of euclidean distance ,asthereceivercan
only compute the depth dierence with the sender node:
LSNR =𝑡
,,()
where 𝑡is the constant transmitted power. Attenuation noise
(AN factor) is the product of path loss and ambient noise.
indicates the frequency of the signal in kHz. By applying
LSNR, SQI is calculated as
SQI =LSNR 𝑖
𝑖,()
where 𝑖denotes the residual energy of th receiver node and
𝑖is the depth dierence between sender and the receiver
nodes. Figure  demonstrates the overall data forwarding
mechanism of iAMCTD. In medium-depth region, the nodes
are burdened due to maximum packet forwarding. eir
energy depletes earlier than the others, causing network
instability and loss of critical data (received from high-
depth nodes). erefore, it is a major requirement to con-
sider the residual energy of nodes while selecting optimal
forwarder(s). We compute ECF in such a manner that it
prioritizes both residual energy and depth of receiver nodes:
ECF =priorityvalue 𝑖
𝑖,()
where 𝑖is the depth of the sensor node and priorityvalue
isaconstantwhichcanbeadjustedaccordingtostability
requirement. In the last region, the channel losses are not
so high; however, forwarding load is higher than the other
regions; therefore, courier nodes help to reduce load on these
nodes to acquire network stability. High-depth region of
aqueous environment has high interference due to aqueous
noises, sea life, and mineral density. In order to deal with
these problems, we formulate DDF prioritizing both residual
energy and SQI of received signal, expressed as
DDF =SQI ×𝑖
𝑖.()
In receiver-based forwarding, multiple nodes choose the
optimal forwarder between themselves. It is also important to
decrease the ooding mechanism during forwarding. Multi-
ple transmissions of same data cause higher average energy
consumption by the network than by other interferences. So,
it is necessary to cope with it. A simple algorithm for data
forwarding using 𝐹is given in Algorithm .
International Journal of Distributed Sensor Networks
Network
If depth of node Ye s
Ye s
Calculate SQI as
is less than D1
is less than D1
function
function
function
No
If depth of node
Calculate ECF as
more than D2
No
Calculate DDF as
forwarding
forwarding
forwarding
forwarding functions on
received packet
Forward packet
initialization
Implement
and
F : Analytical model for data forwarding.
3.4. Adaptive Mobility Patterns of Courier Nodes. Courier
nodes are highly resourceful in stabilizing network condition
as these collect data from sensor nodes by their adaptive
mobility. Aer network initialization, courier nodes start
their movement towards the bottom of network along with
collecting data from the nodes in their vicinity. us, reduce
the load on medium-depth nodes by acting as a relay(s)
and then receive data from high-depth nodes, an ecient
approach for time-critical applications. Furthermore, courier
nodes change the mobility pattern as network density (con-
trolled by BS) varies. ese nodes maintain the depth and
vertical movement by using mechanical module [].
3.4.1. Aggregate Trac Model for Mobile Courier Nodes. We
propose Aggregate-Trac-Model (ATM) and formulate the
objective functions to achieve higher throughput by utilizing
adaptive mobility patterns of courier nodes.
Intheproposedmobilitypattern,weareinterestedin
maximizing the total information ow towards the sink by
all courier nodes, that is,
Maximize ()
subject to :
𝑦𝑦≥ ∀ ()
𝑗
𝑘
𝑖=1𝑦
𝑖,𝑗 ≥
𝑦∀,()
𝑘
𝑖=1𝑦
𝑖,𝑗 ≥𝑦
𝑗∀,()
𝑦,𝑜 −𝑜,𝑦 ≥0 ()
𝑖,𝑗 ={0,1}∀,()
𝑗,𝑜 ={0,1}∀ ()
𝑠=
𝑢𝑢∀ ()
0≤
𝑢≤
max ∀ ()
2. ()
Equation () denes the objective function: maximize
the total information ow towards the sink. Equation ()
ensures that the total information ow towards sink from
courier node will not surpass the sum of information ows
of all couriers nodes towards sink. Equation () describes
that 𝑦is less than or equal to the sum of information ows
International Journal of Distributed Sensor Networks
Onshore data center
Neighbor of A
having highest
Neighbor of B
having highest
SQI
ECF
Neighbor of E
having highest
DDF
A
B
C
E
D
Radio link
Accoustic link
Courier node
Sensor node Sink
Depth-based boundaries for FF computations
F:MechanismofdatatransmissioniniAMCTD.
1Upper limit for depth
2Lower limit for depth
𝑖Depth of th node
SQI𝑖Signal Quality Index of th node
ECF𝑖Energy Cost Function of th node
DDF𝑖Depth Dependent Function of th node
𝐹𝑖 Forwarding Function of node
if 𝑖≤1then
𝐹𝑖 =SQI𝑖
else {1<𝑖≤2}
𝐹𝑖 =ECF𝑖
else
𝐹𝑖 =DDF𝑖
end if
A : Data forwarding mechanism.
from all descendent nodes in its one sojourn tour at dierent
sojourn locations, where shows the sojourn location of the
th courier node. Equation () deals with ow conservation
at sojourn location of the courier node. Equation ()shows
ow conservation between any courier node and sink, where
is the location of sink. Equations ()and()ensurethe
presence of courier nodes in the vicinity of sensor nodes
and sink, respectively, where “” shows the presence and “”
shows the absence of courier node(s). By providing the upper
bound max ,()and() limit the total sojourn time of any
courier node in one sojourn tour and the sojourn time at
any particular sojourn location, where denotes the duration
at any particular sojourn location. Furthermore, ()implies
distance-constrained and delay-bounded mobility model by
employing 2to limit the total distance covered by a courier
node in one sojourn tour. Under these constraints, we suggest
two mobility patterns for courier nodes (refer to Figure ).
Figure  illustrates the two specic mobility patterns of
courier nodes. ey also provide support to nodes with no
neighbors in the later rounds, which eciently deals with
instability period. Aer receiving packets in each round, they
broadcast the received packet sequence number(s) to reduce
ooding.
Figure  shows that if the number of alive nodes is greater
than 1, then courier nodes follow the second pattern in
which they are at equal horizontal distances from each other.
International Journal of Distributed Sensor Networks
Onshore date center
Mobility pattern 1
(dense condition)
Mobility pattern
Mobility pattern
2
(sparse condition)
Radio link
Courier nodes Sink
F : Adaptive mobility pattern in dense and sparse conditions.
If the number of alive nodes is less than or equal to 1then
these follow the rst pattern in which the courier nodes
areinthesamehorizontaldistance.Insparseconditions,it
causes minimum end-to-end delay for remaining nodes. In
pollution monitoring application, we assume 1as , 2as
, and the horizontal distance between the courier nodes as
 m to idealize the real scenario of underwater acoustics.
4. Performance Evaluation
To evaluate the performance of iAMCTD, we compare
it with the selected existing schemes with the extensive
simulations. Following multiple-sink model of conventional
methods, we randomly deploy  nodes in the network
eld along with  courier nodes. We assume 100m as nodes’
transmission range and LinkQuest UWM []asthe
acoustic modem(s) having  kbps bit rate. Moreover, the
power consumptions in sending, receiving, and idle mode
areW,.W,andmW,respectively.esizeofdata
packets is  bytes and the size of control packet is  bytes.
We implement .-DYNAV [] protocol as a core media
access control protocol. Nodes are initially equipped with
70J and hello packets are exchanged aer every th round.
In each round, all alive nodes transmit threshold-based
data towards sink. Aer every th round, courier nodes
compute and then report the network density to sink which
supervises the depth thresholds and the adaptive mobility
of courier nodes. Moreover, variations in depth threshold
make our proposed scheme a feasible contender for time-
critical applications such as submarine detection and tsunami
detection. Aer network initialization, the courier nodes start
moving downward from the surface of water with a mutual
distance of  m between them.
e proposed and the existing protocols are evaluated in
terms of the following performance metrics.
(i) Network lifetime: duration between network initial-
ization and complete energy exhaustion of all the
nodes.
(ii) Average energy consumption: it is the average energy
consumption of all active nodes in one round.
(iii) End-to-end delay: it is the duration for a packet to be
transmitted from source to destination.
(iv) Number of dead nodes: it shows the number of nodes
having no energy.
(v) Transmission loss: it shows the average transmission
loss (dB) between source node and sink in one round.
Figure  illustrates that our scheme improves the stability
period of network by avoiding the forwarding of unnecessary
data along with maintaining lower transmission loss. It
reduces end-to-end delay by utilizing LSNR and DDF in
extreme low-depth and high-depth regions, thus providing
exibility for delay-sensitive applications in UWSN. In iAM-
CTD, the instability period starts from almost th round,
aer which the transmission loss (Figure ) remains even;
however, end-to-end delay (Figure )decreasesveryslowly.
Due to prioritization of SQI in the upper region, load
balancing is achieved. Moreover, the load on medium-depth
nodes is shared because of the adaptive movement of courier
nodes. Aer the expiry of initial nodes, the network destabi-
lizes due to diminution of eligible neighbors. In EEDBR, the
stability period is greater than DBR; however, the network
energy consumption is greater. In DBR, the stability period
is lesser than the other techniques as it considers only depth
of forwarding nodes as the ultimate determining factor;
however, the instability period is much better than EEDBR
as there is gradual increase in network energy consumption.
When the network becomes sparse, number of neighbors
decreases quickly causing network instability. In AMCTD,
International Journal of Distributed Sensor Networks
Number of alive nodes
0
50
100
150
200
0 0.5 1 1.5 2 2.5
Rounds (r)
iAMCTD
AMCTD
EEDBR
DBR
×104
F : Number of alive nodes in iAMCTD, AMCTD, EEDBR,
and DBR.
there are only two forwarding selection attributes; depth
and residual energy. is consideration causes a trade-o
between the network lifetime and transmission loss which
isnotsuitableforreactiveapplications.eloadonhigh-
depth nodes becomes low due to the existence of courier
nodes in stability period causing load balancing in AMCTD.
During the instability period of AMCTD, network gradually
becomes sparse causing load on high residual-energy nodes,
whereasthenumberofneighborsismanagedbyvariations
in depth threshold. Lifetime of iAMCTD is increased due
to lower throughput by responsive network. Moreover, it
provides minimum transmission loss and delay which is
specically suitable for time-decisive applications such as
pollution monitoring.
Inoursuggestedscheme,employmentoforpsenergy
model species the detailed channel losses, which are useful
for selective data forwarding in responsive networks. Increase
in stability period also conrms reduction in redundant
transmissions.
Figure  shows the comparison of dead nodes in iAM-
CTD, AMCTD, EEDBR, and DBR. e condence interval of
results veries that iAMCTD has almost  more rounds of
stabilityperiodthanAMCTDduetobetter𝐹𝑠 and mobility
of courier nodes, which discourages multihop forwarding.
Number of dead nodes sharply increases in EEDBR as there
is high load on the nodes. In DBR, low-depth nodes die at an
earlier stage due to high data forwarding rate and constant
depth threshold. It neglects residual energy of nodes as well
as SNR. us, badly aecting network’s throughput.
To balance load on nodes, iAMCTD selects forwarders
on the bases of SNR, depth, and depth dierences. us,
preventing the creation of coverage holes which is to converse
the previous techniques. Main reason behind better stability
period is the implementation of ecient 𝐹𝑠 and removal
of unnecessary data forwarding in network. We conclude
Number of dead nodes
0
50
100
150
200
0 0.5 1 1.5 2 2.5
Rounds (r)
iAMCTD
AMCTD
EEDBR
DBR
×104
F : Number of dead nodes in iAMCTD, AMCTD, EEDBR,
and DBR.
0 0.5 11.5 2 2.5
0
0.5
1
1.5
2
2.5
3
3.5
Rounds (r)
Average energy consumption (J)
iAMCTD
AMCTD
EEDBR
DBR
×104
F : Total energy consumption in iAMCTD, AMCTD,
EEDBR, and DBR.
that none of the proactive routing protocols are accept-
able in delay-sensitive underwater applications. Furthermore,
proactive routing is more expensive and less competent than
on-demand routing in rapidly varying underwater environ-
ments.
Figure  showsthatiAMCTDconsumesalmostconstant
energy throughout the network lifetime as compared to the
selected protocols. is is due to the implementation of well
organized 𝐹𝑆. Our scheme mainly concerns reactive net-
works due to the requirement of time-sensitive applications
and addresses the problem of higher energy consumption
by utilizing depth dierence between data forwarders. In
AMCTD, nodes consume high energy as these transmit from
far distance; however, in DBR, energy consumption increases
 International Journal of Distributed Sensor Networks
0
50
100
150
200
roughput of network
0 0.5 11.5 2 2.5
Rounds (r)
iAMCTD
AMCTD
EEDBR
DBR
×104
F : Comparison of network throughput in iAMCTD,
AMCTD, EEDBR, and DBR.
0
5
10
15
20
25
30
35
40
45
50
Transmission loss (dB)
0 0.5 1 1.5 2
Rounds (r)
iAMCTD
AMCTD
EEDBR
DBR
×104
F : Comparison of transmission loss (dB) in iAMCTD,
AMCTD, EEDBR, and DBR.
steadily as number of eligible neighbor drops o with the net-
work density. In EEDBR, energy consumption is higher than
other techniques due to frequent selection of high energy
nodes, whereas, iAMCTD balances the energy consumption
by proper forwarder selection and mobility patterns of
courier nodes. In AMCTD, movements of courier nodes
provide stability up to some extent to the remaining nodes;
however, it is not sucient for the whole network. In our sys-
tem, there is higher energy consumption than the other pro-
tocols in the later rounds because of uniform network density.
DBR shows better energy consumption management than
EEDBR; however, it compromises on stability period. e
adaptive mobility of courier nodes reduces distant forwarding
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
End-to-end delay of network (s)
0 0.5 1 1.5 2 2.5
Rounds
iAMCTD
AMCTD
EEDBR
DBR
×104
F : End-to-end delay in iAMCTD, AMCTD, EEDBR, and
DBR.
inthelaterroundsandmaintainstheloadonmedium-depth
nodes.
Figure  portrays throughput comparison of iAMCTD,
AMCTD, EEDBR, and DBR. e throughput of iAMCTD
demonstrates the amount of threshold-optimized data for
responsive networks, as the proposed protocol avoids unnec-
essary data transmission, thereby leading to lower through-
put. However, it ensures minimal transmission loss and end-
to-end delay while delivering data. Previous schemes send
unnecessary data along with high propagation losses; the
throughput decreases sharply due to quick fall in network
density. In our protocol, throughput steadily decreases due to
maintenance of network density and low energy consump-
tion.
e throughput of DBR and EEDBR declines very
quickly, which is unsuitable for both delay-tolerant and
delay-sensitive applications. AMCTD performs better than
the previous schemes in instability period, but our scheme
outperforms AMCTD due to less time lag in data delivery,
thus validating its better performance in ooding-based
protocols.
Figure  shows that transmission loss of the network in
iAMCTD is much less than the previous techniques due to
prioritization of SNR in calculations of 𝐹𝑠.Higherthrough-
put in AMCTD is achieved in compromise of transmission
loss as number of redundant transmissions between sender
nodes and sink is increased. In DBR, there are preferences
of distant transmissions; however, in EEDBR multiple trans-
missions increase transmission loss between sender node and
the sink. We utilize thorp’s attenuation model for underwater
acoustics to calculate the transmission loss in packet for-
warding between a source node and sink. It considers trans-
mission frequency, bandwidth eciency, and noise density
which scrutinize the signal quality during data transmission.
International Journal of Distributed Sensor Networks 
EEDBR has higher loss than other techniques as it employs
distantpropagationsaswellasmultipleforwarding.InDBR,
the initial rounds show low losses due to high network
density; however, as networks become sparse there is a sharp
decrease in network performance causing high packet loss.
In AMCTD, channel loss conditions are better than DBR and
EEDBR, as the weight function computations consider both
depth and residual energy of forwarding nodes; therefore,
the propagations remain stable. In later rounds, the perfor-
mance of AMCTD gradually decreases with the decrement in
qualied forwarders; therefore, both the packet loss and delay
increase.
In our proposed scheme, transmission loss is one of
the key factors concerning the signicance of data-sensitive
responsive networks. e 𝐹𝑠 computations and adaptive
mobility of courier nodes cause almost constant path loss
throughout the network lifetime. Variations in depth thresh-
olds assist in selecting optimal data forwarder which increase
the overall network throughput.
Figure  shows that end-to-end delay of network in
iAMCTD is less than the previous techniques due to mini-
mum forwarding distances between the nodes in both dense
and sparse conditions. e delay in DBR suddenly increases
because of sharp energy depletion of medium-depth nodes.
However, in EEDBR higher delay is caused due to prioritiza-
tion of residual energy. In DBR, delay is much higher in initial
rounds due to distant data forwarding. It decreases gradually
with the sparseness of the network, aer about  rounds.
In EEDBR, delay increases whenever the network becomes
scattered causing data forwarding at minimum distance. End-
to-end delay in AMCTD is better than previous techniques
as both threshold variations and weight functions perform
global load balancing. In our technique, there is a minimum
possible time lag due to consideration of signal quality and
depth dierences between sender and receiver nodes. It is
more suitable for delay-sensitive applications specically in
on-demand routing.
5. Conclusion and Future Work
In this paper, we have proposed iAMCTD routing protocol
to maximize the lifetime of reactive UWSNs. Amendments
in 𝐹𝑠 calculation technique enhance the network lifetime
and reduce the transmission loss. Optimized mobility pat-
tern of sink, in later rounds, minimizes end-to-end packet
delay, especially for delay-sensitive applications and even in
sparse conditions. Furthermore, variations in depth thresh-
old increase the number of eligible neighbors thus minimize
critical data loss in delay-sensitive applications.
As for future directions, we intend to design mathemati-
cal analysis of courier nodes’ mobility. We are also interested
in performing detailed analysis of the acoustic channel model
to devise further routing metrics for optimal data forwarding.
Conflict of Interests
e authors declare that there is no conict of interests
regarding the publication of this paper.
References
[] L. Freitag, M. Grund, S. Singh, J. Partan, P. Koski, and K. Ball,
“e WHOI Micro-Modem: an acoustic communications and
navigation system for multiple platforms,” in Proceedings of the
MTS/IEEE (OCEANS ’05),vol.,pp.,Washington,
DC, USA, September .
[] S. Sanka and G. Konchady, “Communication between wireless
sensor devices and gnu radio,http://wenku.baidu.com/view/
cadebdedbfd.html.
[] A. F. Harris III and M. Zorzi, “Modeling the underwater
acoustic channel in ns,” in Proceedings of the 2nd International
Conference on Performance Evaluation Methodologies and Tools
(ICST ’07), p. , Institut e for Computer Sciences, Social
Informatics and Telecommunicat ions Engineering, .
[] I.F.Akyildiz,D.Pompili,andT.Melodia,“Underwateracoustic
sensor networks: Research challenges,” Ad Hoc Networks,vol.,
no.,pp.,.
[] T. Hu and Y. Fei, “QELAR: a machine-learning-based adaptive
routing protocol for energyecient and lifetime-extende d
underwater sensor networks,IEEE Transactions on Mobile
Computing,vol.,no.,pp.,.
[] A. Wahid, S. Lee, and D. Kim, “A reliable and energy-ecient
routing protocol for underwater wireless sensor networks,”
International Journal of Communication Systems,.
[] A. Wahid, S. Lee, H.-J. Jeong, and D. Kim, “Eedbr: energy-
ecient depth-based routing protocol for underwater wireless
sensor networks,” in Advanced Computer Science and Informa-
tion Technology,vol.ofCommunications in Computer and
Information Science, pp. –, Springer, Berlin, Germany,
.
[] Z.Zhou,Z.Peng,J.-H.Cui,andZ.Shi,“Ecientmultipath
communication for time-critical applications in underwater
acoustic sensor networks,IEEE/ACM Transactions on Network-
ing,vol.,no.,pp.,.
[] H.Yan,Z.J.Shi,andJ.-H.Cui,“DBR:Depth-BasedRouting
for underwater sensor networks,” in NETWORKING 2008 Ad
Hoc and Sensor Networks, Wireless Networks, Next Generation
Internet,vol.ofLecture Notes in Computer Science,pp.
, Springer, .
[] M. Ayaz, A. Abdullah, I. Faye, and Y. Batira, “An ecient
dynamic addressing based routing p rotocol for underwater
wireless sensor networks,” Computer Communications,vol.,
no. , pp. –, .
[] X. Liu, X. Gong, and Y. Zheng, “Reliable cooperative commu-
nications based on random ne twork coding in multi-hop relay
WSNs,” IEEE Sensors Journal,vol.,no.,pp.,.
[] J. Rezazadeh, M. Moradi, A. Ismail, and E. Dutkiewicz, “Supe-
rior path planning mechanism for mobile beacon-assisted
localization in wireless sensor networks,IEEE Sensors Journal,
.
[] J. Zou, S. Gundry, J. Kusyk, M. ¨
U. Uyar, and C. S. Sahin, “D
genetic algorithms for underwater sensor networks,” Interna-
tional Journal of Ad Hoc and Ubiquitous Computing,vol.,no.
,pp.,.
[] C.-M. Chao and M.-W. Lu, “Energyecient transmissions for
bursty trac in underwater sensor networks,International
JournalofAdHocandUbiquitousComputing,vol.,no.,p.
, .
[] W. Liao and C. Huang, “SF-MAC: a spatially fair MAC protocol
for underwater acoustic sensor networks,IEEE Sens ors Journal,
vol.,no.,pp.,.
 International Journal of Distributed Sensor Networks
[] M. Mirsadeghi and A. Mahani, “Energy ecient fast predictor
for wsn-based target tracking,Annals of Telecommunications,
.
[] B. Borowski and D. Duchamp, “Measurement-based underwa-
ter acoustic physical layer simulation,” in Proceedings of the
MTS/IEEE Seattle (OCEANS ’10), pp. –, IEEE, Seattle, Wash,
USA, September .
[] M. Stojanovic, “On the relationship between capacity and
distance in an underwater acoustic communication channel,
ACM SIGMOBILE Mobile Computing and Communications
Review,vol.,no.,p.,.
[]B.S.Sharif,J.Neasham,O.R.Hinton,andA.E.Adams,“A
computationally ecient doppler compensation system for
underwater acoustic communications,IEEE Journal of Oceanic
Engineering,vol.,no.,pp.,.
[] S. Gopi, G. Kannan, D. Chander, U. B. Desai, and S. N. Mer-
chant, “PULRP: path unaware layered routing protocol for
underwater sensor networks,” in Proceedings of the IEEE Inter-
national Conference on Communications (ICC ’08),pp.
, IEEE, May .
[] M. Jafri, S. Ahmed, N. Javaid, Z. Ahmad, and R. Qureshi,
AMCTD: adaptive mobility of courier nodes in threshold-
optimized DBR protocol for underwater wireless sensor net-
works,” in Proceedings of the 8th IEEE International Conference
on Broadband and Wireless Computing, Communication and
Applications (BWCCA '13), Compiegne, France, October .
[] S. Ibrahim, J. Cui, and R. Ammar, “Surface-level gateway
deployment for underwater sensor networks,” in Proceedings of
the IEEE Military Communications Conference (MILCOM ’07),
pp.,Orlando,Fla,USA,October.
[] W. K. Seah and H.-X. Tan, “Multipath virtual sink architecture
for underwater sensor networks,” in Proceedings of the Asia
Pacic Conference (OCEANS ’06), pp. –,IEEE, Singapore, May
.
[] Z. Zhou, J.-H. Cui, and S. Zhou, “Localization for large-scale
underwater sensor networks,” in NETWORKING 2007: Ad
Hoc and Sensor Networks, Wireless Networks, Next Generation
Internet,vol.ofLecture Notes inComputer Science,pp.
,Springer,NewYork,NY,USA,.
[] R. J. Urick, Principles of Underwater Sound, McGraw-Hill
Ryerson, .
[] J. Wills, W. Ye, and J. Heidemann, “Low-power acoustic modem
for dense underwater sensor networks,” in Proceedings of the
1stACMInternationalWorkshoponUnderwaterNetworks
(WUWNet ’06), pp. –, ACM, September .
[] D. Shin and D. Kim, “A dynamic NAV determination protocol
in . based underwater networks,” in Proceeding of the IEEE
International Symposium on Wireless Communication Systems
(ISWCS '08), pp. –, Reykjavik, Iceland, October .
... The usable bandwidth for audio communication is under 100 kHz. While most sensors in UWSNs are stationary, they can still move at a speed of 1 to 3 m/sec [16,[26][27][28][29]. Figure 1 shows the UWSNs architecture. The sensor nodes deployed in UWSNs environment are labeled as sensor node A, B . . . . ...
... The usable bandwidth for audio communication is under 100 kHz. While most sensors in UWSNs are stationary, they can still move at a speed of 1 to 3 m/sec [16,[26][27][28][29]. Figure 1 shows the UWSNs architecture. The sensor nodes deployed in UWSNs environment are labeled as sensor node A, B …. O and these nodes communicate under the water via acoustic waves. ...
Article
Full-text available
The exponentially growing concern of cyber-attacks on extremely dense underwater sensor networks (UWSNs) and the evolution of UWSNs digital threat landscape has brought novel research challenges and issues. Primarily, varied protocol evaluation under advanced persistent threats is now becoming indispensable yet very challenging. This research implements an active attack in the Adaptive Mobility of Courier Nodes in Threshold-optimized Depth-based Routing (AMCTD) protocol. A variety of attacker nodes were employed in diverse scenarios to thoroughly assess the performance of AMCTD protocol. The protocol was exhaustively evaluated both with and without active attacks with benchmark evaluation metrics such as end-to-end delay, throughput, transmission loss, number of active nodes and energy tax. The preliminary research findings show that active attack drastically lowers the AMCTD protocol’s performance (i.e., active attack reduces the number of active nodes by up to 10%, reduces throughput by up to 6%, increases transmission loss by 7%, raises energy tax by 25%, and increases end-to-end delay by 20%).
... The usable bandwidth for audio communication is under 100 kHz. While most sensors in UWSNs are stationary, they can still move at a speed of 1 to 3 m/sec [16,[26][27][28][29]. Figure 1 shows the UWSNs architecture. The sensor nodes deployed in UWSNs environment are labeled as sensor node A, B . . . . ...
... The usable bandwidth for audio communication is under 100 kHz. While most sensors in UWSNs are stationary, they can still move at a speed of 1 to 3 m/sec [16,[26][27][28][29]. Figure 1 shows the UWSNs architecture. The sensor nodes deployed in UWSNs environment are labeled as sensor node A, B …. O and these nodes communicate under the water via acoustic waves. ...
Article
Full-text available
The exponentially growing concern of cyber-attacks on extremely dense underwater sensor networks (UWSNs) and the evolution of UWSNs digital threat landscape has brought novel research challenges and issues. Primarily, varied protocol evaluation under advanced persistent threats is now becoming indispensable yet very challenging. This research implements an active attack in the Adaptive Mobility of Courier Nodes in Threshold-optimized Depth-based Routing (AMCTD) protocol. A variety of attacker nodes were employed in diverse scenarios to thoroughly assess the performance of AMCTD protocol. The protocol was exhaustively evaluated both with and without active attacks with benchmark evaluation metrics such as end-to-end delay, throughput, transmission loss, number of active nodes and energy tax. The preliminary research findings show that active attack drastically lowers the AMCTD protocol's performance (i.e., active attack reduces the number of active nodes by up to 10%, reduces throughput by up to 6%, increases transmission loss by 7%, raises energy tax by 25%, and increases end-to-end delay by 20%).
... AMCTD protocol is not appropriate for data-sensitive applications. Thus, an Improved-AMCTD (I-AMCTD) was developed in [28]. I-AMCTD joined both the soft depth threshold and hard thresholds. ...
... AMCTD protocol is not appropriate for data-sensitive applications. Thus, an Improved-AMCTD (I-AMCTD) was developed in [28]. I-AMCTD joined both the soft depth threshold and hard thresholds. ...
Article
Full-text available
The Internet of Underwater Things (IoUT) is an emerging technology that promised to connect the underwater world to the land internet. It is enabled via the usage of the Underwater Acoustic Sensor Network (UASN). Therefore, it is affected by the challenges faced by UASNs such as the high dynamics of the underwater environment, the high transmission delays, low bandwidth, high-power consumption, and high bit error ratio. Due to these challenges, designing an efficient routing protocol for the IoUT is still a trade-off issue. In this paper, we discuss the specific challenges imposed by using UASN for enabling IoUT, we list and explain the general requirements for routing in the IoUT and we discuss how these challenges and requirements are addressed in literature routing protocols. Thus, the presented information lays a foundation for further investigations and futuristic proposals for efficient routing approaches in the IoUT.
... Other challenges include the environmental characteristics, technical challenges, and design challenges that are discussed in Sections 2.2 and 2.3. Many researchers provide a survey on additional challenges that aided UIoT networks and provided some of the solutions to overcome the challenges in UIoT networks, such as network configuration issues [59,[67][68][69], internal or external damages to devices [59,[70][71][72][73][74][75][76], noise issues [77][78][79][80][81][82][83][84][85][86][87][88], high-cost issues [89][90][91][92][93][94][95][96][97][98][99][100][101][102][103][104], insecure UIoT environment [105][106][107][108][109][110][111][112][113][114][115][116][117][118][119], limited resources [120][121][122][123][124][125][126][127][128][129][130], environmental limitation [131][132][133][134][135][136][137][138][139][140], and transmission loss [141][142][143][144][145][146][147][148][149][150][151][152][153][154][155][156][157], etc. Figure 4 shows the comparison of techniques that have been proposed to solve various UIoT issues vs. battery issues in UIoT networks. Additionally, the result identifies that 14.9% of research focused on solving battery issues in UIoT devices [58]. ...
Article
Full-text available
The underwater internet of things (UIoT) has emerged as a booming technology in today’s digital world due to the enhancement of a wide range of underwater applications concerning ocean exploration, deep-sea monitoring, underwater surveillance, diver network monitoring, location and object tracking, etc. Generally, acoustic, infrared (IR), visible light (VL), radiofrequency (RF), and magnet induction (MI) are used as the medium of communication in order to transfer information among digitally linked underwater devices. However, each communication medium has its advantages and limitations: for example, the acoustic communication medium is suitable for long-range data transmission but has challenges such as narrow bandwidth, long delay, and high cost, etc., and the optical medium is suitable for short-range data transmission but has challenges such as high attenuation, and optical scattering due to water particles, etc. Furthermore, UIoT devices are operated using batteries with limited capacity and high energy consumption; hence, energy consumption is considered as one of the most significant challenges in UIoT networks. Therefore, to support reliable and energy-efficient communication in UIoT networks, it is necessary to adopt robust energy optimization techniques for UIoT networks. Hence, this paper focuses on identifying the various issues concerning energy optimization in the underwater internet of things and state-of-the-art contributions relevant to inducement techniques of energy optimization in the underwater internet of things; that provides a systematic literature review (SLR) on various power-saving and optimization techniques of UIoT networks since 2010, along with core applications, and research gaps. Finally, future directions are proposed based on the analysis of various energy optimization issues and techniques of UIoT networks. This research contributes much to the profit of researchers and developers to build smart, energy-efficient, auto-rechargeable, and battery-less communication systems for UIoT networks
... To improve the performance of AMCTD, such as the holding time calculation, the path loss factor due to distant transmission, and the flooding of packet and energy limit, another novel protocol [21], iAMCTD-DBR, is proposed. The author for iAMCTD-DBR adopted the existing phases of AMCTD with the addition of some other phases, which are discussed here. ...
Article
Full-text available
There exist numerous applications for deploying Underwater Wireless Sensor Networks (UWSNs), including submarine detection, disaster prevention, oil and gas monitoring, off-shore exploration, and military target tracking. The acoustic sensor nodes are deployed to monitor the underwater environment, considering the area under observation. This research work proposes an energy scarcity-aware routing protocol for energy efficient UWSNs. Moreover, it aims to find the feasible region on the basis of the objective function, in order to minimize the energy tax and extend the network life. There are three different sensors nodes in the network environment, i.e., anchor nodes, relay nodes, and the centralized station. Anchor nodes originate data packets, while relay nodes process them and broadcast between each other until the packets reach the centralized station. The underline base scheme Weighting Depth and Forwarding Area Division Depth-Based Routing (WDFAD-DBR) for routing is based on the depth differences of the first- and second-hop nodes of the source node. The propose work, Betta and Dolphin Pods Routing via Energy Scarcity Aware protocol (BDREA) for packet forwarding from the forwarding nodes considers the first and second hops of the source node, i.e., the packet advancement, the network traffic, the distance to the centralized station, and the inverse normalized energy of the forwarding zone. It is observed that the proposed work improves the performance parameters by approximately 50% in terms of energy efficiency, and prolongs the network life compared to Dolphin and Whale Pod (DOW-PR) protocols. Furthermore, the energy efficiency directly relates to the other parameters, and its enhancement can be seen in terms of an 18.02% reduction in end-to-end delay when compared with the Weighting Depth and Forwarding Area Division Depth-Based Routing (WDFAD-DBR) protocol. Furthermore, BDREA improves the Packet Delivery Ratio (PDR) by approximately 8.71%, compared to DOW-PR, and by 10% compared with the benchmark, WDFAD-DBR, the energy tax by 50% in comparison to DOW-PR, the end-to-end delay by 18%, and the APD by 5% in comparison to WDFAD-DBR.
Article
Full-text available
Citation: Saeed, K.; Khalil, W.; Al-Shamayleh, A.S.; Ahmed, S.; Akhunzada, A.; Alharthi, S.Z.; Gani, A. A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks. Sustainability 2023, 15, 7198. https://doi.
Article
Full-text available
Underwater wireless sensor networks (UWSNs) are comprised of sensor nodes that are deployed under the water having limited battery power and other limited resources. Applications of UWSNs include monitoring the quality of the water, mine detection, environment monitoring, military surveillance, disaster prediction, and underwater navigation. UWSNs are more vulnerable to security attacks as compared to their counterparts such as wireless sensor networks (WSNs). The possible attacks in UWSNs can abrupt the operation of entire network. This research work presents the analysis of relevant research done on security-based schemes in UWSNs. The security-based schemes are categorized into five sub-categories. Each technique in each category is analyzed in detail. The major contribution in each security-based scheme along with technique used, possible future research issues and implementation tool are discussed in detail. The open research issues and future trends identified and presented in this research can be further explored by the research community.
Article
Sensors in underwater wireless sensor networks (UWSNs) can drift up to 3 m/s due to ocean currents, marine organisms, or passing vessels. In existing node deployment and localization techniques, node mobility and network disconnections are not taken into account. This article proposes a dynamic topology control algorithm for node deployment (DTCND) in mobile UWSN. This work aims to monitor the node mobility to predict nodes' location for ensuring coverage and connectivity. The sensor nodes are deployed randomly at different depths. The anchor nodes observe the signal quality index, energy drain rate, and node density at every time interval and detect node disconnections based on the variations in these observed metrics. After receiving the beacon messages from the anchor nodes, the courier nodes incline to move toward the target region for satisfying the coverage and connectivity constraints. Simulation results show that the proposed algorithm attains 5% higher connectivity when compared to energy‐efficient localization algorithm (EELA) and 9% higher connectivity when compared to adaptive triangular deployment algorithm (ATDA). The residual energy is also higher by 3% and 18% when compared to EELA and ATDA, respectively. The deployment cost and delay of DTCND also decrease when compared to EELA and ATDA, which results into efficient data collection.
Article
Full-text available
The underwater acoustic channel is characterized by a path loss that depends not only on the transmission distance, but also on the signal frequency. As a consequence, transmission bandwidth depends on the transmission distance, a feature that distinguishes an underwater acoustic system from a terrestrial radio system. The exact relationship between power, transmission band, distance and capacity for the Gaussian noise scenario is a complicated one. This work provides a closed-form approximate model for 1) power consumption, 2) band-edge frequency and 3) bandwidth as functions of distance and capacity required for a data link. This approximate model is obtained by numerical evaluation of analytical results which takes into account physical models of acoustic propagation loss and ambient noise. The closed-form approximations may become useful tools in the design and analysis of underwater acoustic networks.
Article
Full-text available
In many Wireless Sensor Network (WSN) applications such as warning systems or healthcare services it is necessary to update the captured data with location information. A promising solution for statically deployed sensors is to benefit from mobile beacon assisted localization. The main challenge is to design and develop an optimum path planning mechanism for a mobile beacon to decrease the required time for determining location, increase the accuracy of the estimated position and increase the coverage. In this paper, we propose a novel superior path planning mechanism called Z-curve. Our proposed trajectory can successfully localize all deployed sensors with high precision and the shortest required time for localization. We also introduce critical metrics including the ineffective position rate for further evaluation of mobile beacon trajectories. In addition, we consider an accurate and reliable channel model which helps to provide more realistic evaluation. Z-curve is compared with five existing path planning schemes based on three different localization techniques such as Weighted Centroid Localization and trilateration with time priority and accuracy priority. Furthermore, the performance of the Z-curve is evaluated at the presence of obstacles and Z-curve obstacle-handling trajectory is proposed to mitigate the obstacle problem on localization. Simulation results show the advantages of our proposed path planning scheme over the existing schemes.
Article
Full-text available
Underwater acoustic sensor networks (UWSN) have attracted a lot of attention recently. The long propagation delay of acoustic signals in UWSN causes spatial-temporal uncertainty making spatial fairness in UWSN a challenging problem. Time of arrival of the packets depends on both the sending time and the distance between the transmitter and the receiver. Hence, it is difficult to avoid collision and guarantee the fairness of transmission in underwater environment. In this paper, we propose a spatially fair multiple access control (SF-MAC) protocol called SF-MAC in UWSN. The SF-MAC can avoid collision by postponing the clear-to-send frame equal to period of request-to-send (RTS) contention period. The receiver collects RTSs from all the contenders during the RTS contention period and calculates the potential sending time of each of contender. It determines the earliest transmitter with a probability rule that compares with the first RTS. In case of multiple contenders, the SF-MAC can maintain a more exact order of transmission to achieve fairness of transmission. Finally, we present a comprehensive performance study via simulations. The results show that SF-MAC can perform better than existing MAC schemes (such as MACA, MACA-U, and T-Lohi) in terms of the spatial fairness and network throughput.
Article
Full-text available
In dense underwater sensor networks (UWSN), the major confronts are high error probability, incessant variation in topology of sensor nodes, and much energy consumption for data transmission. However, there are some remarkable applications of UWSN such as management of seabed and oil reservoirs, exploration of deep sea situation and prevention of aqueous disasters. In order to accomplish these applications, ignorance of the limitations of acoustic communications such as high delay and low bandwidth is not feasible. In this paper, we propose Adaptive mobility of Courier nodes in Threshold-optimized Depth-based routing (AMCTD), exploring the proficient amendments in depth threshold and implementing the optimal weight function to achieve longer network lifetime. We segregate our scheme in 3 major phases of weight updating, depth threshold variation and adaptive mobility of courier nodes. During data forwarding, we provide the framework for alterations in threshold to cope with the sparse condition of network. We ultimately perform detailed simulations to scrutinize the performance of our proposed scheme and its comparison with other two notable routing protocols in term of network lifetime and other essential parameters. The simulations results verify that our scheme performs better than the other techniques and near to optimal in the field of UWSN.
Article
We introduce a genetic algorithm-based topology control mechanism, named 3D-GA, for Autonomous Underwater Vehicles (AUVs) operating in Underwater Sensor Networks (UWSNs). Using limited information collected from a node's local neighbours, 3D-GA runs autonomously at each AUV and provides guidance for its speed and direction towards a uniform spatial distribution while maintaining network connectivity. Imprecise and limited neighbourhood knowledge could potentially disrupt convergence towards a uniform and stable spatial coverage. We demonstrate that AUVs running our 3D-GA create a highly resilient network that can adapt to changing conditions such as the addition, loss or malfunction of number of AUVs. We also show that the ambiguity in detecting neighbours' exact locations does not prevent 3D-GA from achieving a uniform coverage but requiring AUVs travel longer distances to stabilise. Our simulation software results verify that 3D-GA is an effective tool for providing a robust solution for volumetric spatial control of AUVs in UWSNs.
Article
In Underwater Sensor Networks (UWSNs), sensor nodes have limited energy resource and consume a lot of power during message transmission. Since expensive transmitting power consumption is an inevitable feature of underwater acoustic transmission, to extend network operation time, it is desirable for nodes to avoid energy wastage resulting from transmission collisions. Enabling nodes to use multiple channels in a contention-free way helps reduce transmission collisions. To the best of our knowledge, when nodes have bursty traffic loads, existing UWSN multi-channel solutions do not support contention-free transmission while available UWSN single-channel contention-free protocols generally suffer from low utilisation. In this paper, we propose a contention-free multi-channel MAC protocol for UWSNs that work well even when nodes experience uneven and bursty traffic loads. Simulation results verify that the proposed protocol conserves energy and is extremely suitable for a heavy-loaded environment.
Article
SUMMARY Recently, underwater wireless sensor networks (UWSNs) have attracted much research attention to support various applications for pollution monitoring, tsunami warnings, offshore exploration, tactical surveillance, etc. However, because of the peculiar characteristics of UWSNs, designing communication protocols for UWSNs is a challenging task. Particularly, designing a routing protocol is of the most importance for successful data transmissions between sensors and the sink. In this paper, we propose a reliable and energy-efficient routing protocol, named R-ERP2R (Reliable Energy-efficient Routing Protocol based on physical distance and residual energy). The main idea behind R-ERP2R is to utilize physical distance as a routing metric and to balance energy consumption among sensors. Furthermore, during the selection of forwarding nodes, link quality towards the forwarding nodes is also considered to provide reliability and the residual energy of the forwarding nodes to prolong network lifetime. Using the NS-2 simulator, R-ERP2R is compared against a well-known routing protocol (i.e. depth-based routing) in terms of network lifetime, energy consumption, end-to-end delay and delivery ratio. The simulation results proved that R-ERP2R performs better in UWSNs.Copyright © 2012 John Wiley & Sons, Ltd.
Article
Reliability is an important issue when designing wireless sensor networks (WSNs), since WSNs need to work for a long time without manual interventions. Many techniques, such as multi-input-multi-output (MIMO) systems and low density parity check (LDPC) codes, have been devised to improve the reliability of computer networks and wireless networks. However, these techniques are too complicated to apply in WSNs due to the extremely limited resources of the wireless sensor nodes. Hence, it is a hot research topic to design a reliable scheme with low complexity in WSNs. In recent years, there are a few schemes proposed to improve transmission reliability in WSNs, such as multi-path routing and cooperative transmission. In this paper, a network coding based cooperative communications scheme (NCCC) is proposed. Combining the advantages of both cooperative communications and network coding, NCCC can improve the packet loss-resistant capability through network coding and the communications fail-resistant capability through cooperative communications. In NCCC, coding vectors in network coding procedure are chosen from a finite field randomly, which makes NCCC easy to be implemented in the resource-limited sensor nodes. Theoretic analyses and experimental results show that NCCC can achieve a good reliability performance at the cost of neglectable delay.
Article
Power source replacement of the sensor nodes, which are once deployed in the network area, is generally difficult. So, energy saving is one of the most important issues for object tracking in wireless sensor networks. To reduce the consumed energy and prolong the network lifetime, the nodes surrounding the mobile object should be responsible for sensing the target. The number of participant nodes in target tracking can be reduced by an accurate prediction of the object location. In this paper, we present a fast energy efficient with high-accuracy target tracking scheme which is based on location prediction. The missing rate of proposed predictor is very low in comparison with other predictors especially in a random waypoint mobility model in which after pause time, the three main parameters direction, velocity and, acceleration would be changed. The accuracy of predictor has a direct effect on missing rate and so strongly reduces the consumed energy. Additionally, a new node selection criterion is proposed in which minimum nodes surrounding the object are wakened and track the object. Simulation results show that our proposed predictor has low consumed energy and complexity in comparison with Extended Kalman Filter (EKF) and Unscented Kalman Filter (UKF) predictors.
Chapter
Recently, Underwater Wireless Sensor Networks (UWSNs) have attracted much research attention from both academia and industry, in order to explore the vast underwater environment. However, designing network protocols is challenging in UWSNs since UWSNs have peculiar characteristics of large propagation delay, high error rate, low bandwidth and limited energy. In UWSNs, improving the energy efficiency is one of the most important issues since the replacement of the batteries of such nodes is very expensive due to harsh underwater environment. Hence, in this paper, we propose an energy efficient routing protocol, named EEDBR (Energy-Efficient Depth Based Routing protocol) for UWSNs. Our proposed protocol utilizes the depth of the sensor nodes for forwarding the data packets. Furthermore, the residual energy of the sensor nodes is also taken into account in order to improve the network life-time. Based on the comprehensive simulation using NS2, we observe that our proposed routing protocol contributes to the performance improvements in terms of the network lifetime, energy consumption and end-to-end delay. KeywordsUnderwater wireless sensor networks–routing–network life-time–residual energy