ArticlePDF Available

NADEEM: Neighbor-node Approaching Distinct Energy Efficient Mates for reliable data delivery in IoT enabled underwater WSNs

Authors:

Abstract and Figures

In this research work we propose three schemes: neighbor node approaching distinct energy efficient mates (NADEEM), fallback approach NADEEM (FA-NADEEM) and transmission adjustment NADEEM (TA-NADEEM). In NADEEM, immutable forwarder node selection is avoided with the help of three distinct selection parameters. Void hole is avoided using fallback recovery mechanism to deliver data successfully at the destination. The transmission range is dynamically adjusted to resume greedy forwarding among the network nodes. The neighbor node is only eligible to become forwarder when it is not a void node. Additionally, linear programming based feasible regions are computed for an optimal energy dissipation and to improve network throughput. Extensive simulations are conducted for three parameters: energy, packet delivery ratio (PDR) and fraction of void nodes. Further, an analysis is performed by varying transmission range and data rate for energy consumption and fraction of void node. The results clearly depict that our proposed schemes outperform the baseline scheme (GEDAR) in terms of energy consumption and fraction of void nodes.
This content is subject to copyright. Terms and conditions apply.
Received: 26 January 2019 Revised: 2 September 2019 Accepted: 13 October 2019
DOI: 10.1002/ett.3805
SPECIAL ISSUE ARTICLE
NADEEM: Neighbor node approaching distinct
energy-efficient mates for reliable data delivery in
underwater WSNs
Nadeem Javaid
Department of Computer Science,
COMSATS University Islamabad,
Islamabad 44000, Pakistan
Correspondence
Nadeem Javaid, Department of Computer
Science, COMSATS University Islamabad,
Islamabad 44000, Pakistan.
Email: nadeemjavaidqau@gmail.com
Abstract
In this research work, we propose three schemes: neighbor node approach-
ing distinct energy-efficient mates (NADEEM), fallback approach NADEEM
(FA-NADEEM), and transmission adjustment NADEEM (TA-NADEEM). In
NADEEM, immutable forwarder node selection is avoided with the help of
three distinct selection parameters. Void hole is avoided using a fallback recov-
ery mechanism to deliver data successfully at the destination. The transmission
range is dynamically adjusted to resume greedy forwarding among the network
nodes. The neighbor node is only eligible to become forwarder when it is not
a void node. Additionally, linear programming–based feasible regions are com-
puted for an optimal energy dissipation and network throughput improvement.
Extensive simulations are conducted for three parameters: energy, packet deliv-
ery ratio (PDR), and fraction of void nodes. Further, an analysis is performed by
varying transmission range and data rate for energy consumption and fraction
of void node. The results clearly depict that our proposed schemes outperform
the baseline scheme (GEDAR) in terms of energy consumption and fraction of
void nodes.
1INTRODUCTION
In the last decade, UWSNs have gained a lot of attention fromresearchers because of their potential to monitor underwater
environment. UWSNs have an extensive variety of applications such as military defense, monitoring aquatic environment,
disaster prevention, oil/gas extraction, offshore exploration, commercial and scientific purposes, etc.1,2
In underwater atmosphere, protocols of terrestrial wireless sensor networks (TWSNs) cannot work perfectly. The TWSN
and UWSN have differences in many aspects such as use of acoustic links instead of radio links. UWSN topology is more
dynamic than that of TWSNs because nodes move freely with water currents and change their position frequently, local-
ization of nodes is difficult as compared with TWSNs, deployment of nodes is comparatively sparse, energy is limited, and
after deployment, it is difficult to recharge the batteries. In addition, UWSNs face many challenges like low bandwidth,
high propagation delay, and high communication cost.3
Various routing protocols are proposed to minimize the energy consumption and to avoid void occurrence.4-6 The void
node is defined as the node that fails to deliver its information towards the destination because of the unavailability of
the forwarder node. To recover data from the void node, a fallback recovery mechanism and transmission adjustment
approaches are widely used. In the fallback method, the void node looks for every alternate route in its communication
range to resume the greedy forwarding. While transmission adjustment is the process of changing the transmission power
dynamically to bypass the void communication area and to find an immediate forwarder node for carrying out the data
Trans Emerging Tel Tech. 2019;e3805. wileyonlinelibrary.com/journal/ett © 2019 John Wiley & Sons, Ltd. 1of22
https://doi.org/10.1002/ett.3805
2of22 JAVAID
communication among the network nodes. However, these two approaches follow greedy forwarding where every node
finds the node that is closest to the sink to save energy. This greedy approach selects node based on a single parameter
such as distance and cause an immature death of the intermediate node. Thus, to avoid the aforementioned immutable
forwarder selection, multiple parameters need to be considered for cyclic selection of the node to avoid the sudden death
of the forwarder node. Therefore, an efficient protocol is required, which can minimize energy consumption and be able
to avoid void node occurrence.
To minimize energy consumption, geographic routing is used because of its simplicity and scalability. Moreover, it does
not require to maintain complete route from a source to a destination.3Whereas, opportunistic routing is exploited to
transmit data reliably by selecting multiple neighbor nodes at each hop. This set consists of nodes that are aligned with
respect to certain priorities. Only the node with the highest priority is able to forward the data packet. Other nodes will
cancel their transmissions when they are acknowledged that the data packet is delivered successfully.
However, the geographic routing paradigm causes void hole problems because of the selection of only one node for
data transmission. On the other hand, the opportunistic routing results in redundant transmission and consumes more
energy.7Thus, to achieve multiple objectives at the same time, both schemes are combined to improve energy efficiency
and avoid void node occurrence in the network.
1.1 Motivation and contribution
Motivated by above consideration, we propose neighbor node approaching distinct energy-efficient mates (NADEEM)
and its two variants with special features of void recovery using fallback and transmission adjustment approaches. The
NADEEM uses geographic and opportunistic routing for energy-efficient data communication. While in transmission
adjustment NADEEM (TA-NADEEM), the transmission of the void node is adjusted to bypass the void region and
forwards the data to the immediate available node. While fallback recovery NADEEM (FA-NADEEM) uses backward
transmission and finds a different routing path for successful data delivery at the destination. The contributions of our
proposed schemes are given as follows.
The contributions of the proposed work are as follows. First, the NADEEM routing scheme considers three metrics
(energy, depth, and number of neighbors) to select the neighbor node and prioritize the forwarders for data packet trans-
mission at the destination. Second, the FA-NADEEM uses backward transmissions to avoid the void node. It selects a
node that is closest to it in the backward direction and finds route towards the destination. This avoids the void node;
however, the trade-off of energy consumption exists. Third, the TA-NADEEM adjusts the transmission range of the void
node adaptively to forward the data packet at the destination successfully.
The rest of this paper is organized as follows. Section 2 discusses related work about routing protocols in UWSNs and
the problem statement is defined. Section 3 presents the system model and propagation model of the acoustic signal.
In Section 4, the proposed work is presented in detail. In Section 5, the feasible regions of energy minimization and
throughput maximization using linear programming are discussed in detail. We present the performance evaluation of
our schemes using simulation in Section 6. Finally, the performance trade-offs of proposed schemes are presented in
Section 7 followed by our conclusion in Section 8.
2RELATED WORK
In this section, related work on routing protocols in UWSNs is presented based on proposed features, advantages, and
disadvantages. A summary of the contributions of the discussed existing literature is given in Table 1.
Depth-based routing (DBR)8only requires depth information to forward data packets towards the sink with a greedy
approach. Each node forwards the data packet based on depth parameter and suppresses communication to avoid redun-
dant transmission via calculating holding time. The priority is assigned to the forwarder node solely based on depth;
however, it depends that packet is new and not delivered at the destination. The DBR provides improved network life-
time and high data delivery ratio. However, this greedy mechanism with one parameter forces immutable selection of the
forwarder node due to which network nodes get partitioned and resources remain under utilized.
An improved adaptive mobility of courier nodes in threshold-optimized DBR (iAMCTD)9is a location free routing
protocol, which is designed for time-critical applications. It provides an improved network lifetime, minimized end-to-end
delay with the help of mobile courier nodes. However, this scheme results in low throughput, because of avoidance of the
unnecessary transmission.
JAVAID 3of22
TABLE 1 Summary of UWSN routing schemes discussed in related work
Technique Feature (s) Achievement (s) Limitation (s)
DBR8Requires only local depth Improved network lifetime Void holes, increased energy consumption
information and greedy forwarding and packet delivery ratio and high end-to-end delay
iAMCTD9Location free routing protocol specially Improved network lifetime, Void hole problem still exists and communication
designed for time-critical applications minimized end-to-end delay overhead due to control packets exchange
BLOAD10 Data is divided in to fractions, transmission Network lifetime, energy balancing, Energy consumption increases
range is logically adjusted stability period and reduce energy holes
Delay-sensitive schemes1Improved delay-sensitive versions, Minimize end-to-end delay and improve Duplicate packets, high energy consumption
adaptable to time-critical applications performance and network lifetime
ARCR11 Network is divided into clusters and Achieves energy efficiency, maximum Network disconnects when the
mobile nodes are used to collect data network lifetime and load balancing relay nodes are disorganized
from other sensor nodes
E-CARP12 Distributed cross layer reactive protocol Improved network lifetime and Reduced throughput and high
reduced energy consumption path loss due to mobility
HydroCast3Pressure-based routing and efficient Improved packet delivery ratio Low performance and increased
anycast routing algorithms energy consumption
WDFAD-DBR13 Depth-based routing, depth difference of two hops, Reduced energy consumption and Forwarding using two hops never
neighbor node prediction and forwarding area division low probability of void holes eliminates the void hole problem
AHH-VBF14 Location-aware routing protocol and concept of Reduced duplicate packets and unnecessary Void hole problem exists
adaptive virtual pipeline energy consumption is avoided
ORR15 To calculate the best number of forwarders based on Mitigate the negative effects caused This protocol is not low as required, Number
forwarding cost approximation and considers by redundant packet forwarding of forwarders can wake up simultaneously
residual energy while selecting forwarder sets resulting in duplication of packets
ELBAR16 Approach to forward packets in the Enhances the lifetime of network and Longer routing path, end-to-end
occurrence of routing holes reduces the energy consumption. delay increases and more energy depletion
H2-DARP-PM17 Hop-by-hop dynamic addressing–based Improved packet delivery ratio High energy consumption
routing protocol for pipeline monitoring
(ACH)218 Free association mechanism where Minimizing energy consumption and Transmission delay
nodes associate with CHs enhances network lifetime
CBSST19 Cluster-based sleep/wakeup scheduling Reduced energy consumption, enhanced Keeping the same CH throughout the network
technique designed for WSN network lifetime and packet delivery ratio causes problem to network lifetime in future lifetime
UCBNL20 A high efficiency uneven cluster deployment Enhanced packet delivery ratio, less energy Irregular clustering causes a
algorithm Based on network layered for event consumption and improved network lifetime lteration in the network.
coverage in UWSNs
PSO-ECHS21 Energy-efficient CH selection that is based Energy efficiency achieved It works only for homogeneous networks
on particle swarm optimization
EDDEEC22 Enhanced developed distributed energy Shows improved performance with respect to Imbalanced clustering and
efficient clustering stability period, network lifetime and packet reelection increases overhead
delivery ratio
SEEC, CSEEC and CDSEEC23 Sparsity and density–aware algorithms and sink mobility Reduced energy consumption Low packet delivery ratio
4of22 JAVAID
In balanced load distribution (BLOAD),10 the problem of energy holes is tackled using the mechanism of fragmentation
of data packet. The fragments of every data are delivered via direct and multihop transmissions towards the destination.
Moreover, nodes deployed away from the destination are equipped with higher battery, resulting in improved network
lifetime.
Kong et al11 provided an advancement of localization free routing protocols of DBR, ie, energy efficient DBR and
AMCTD as improved delay-sensitive versions. In this paper, the authors made the aforementioned schemes adapt-
able according to the requirements of the applications. These schemes achieve minimum end-to-end delay and less
consumption of energy. However, duplication of packets, transmission loss, and void hole exist.
In an adaptive relay chain routing (ARCR),12 mobile nodes are introduced to retrieve data from energy hole while
keeping the sink fixed at its particular location over the water surface. Moreover, redundant transmissions are avoided
through the formation of clusters in the network, and mobile nodes directly gather a composite packet from the head
node by moving into its vicinity. Thus, it gains energy efficiency by balancing the data load among the network nodes at
the cost of delay.
An energy-efficient channel-aware routing protocol (E-CARP)13 is a distributed cross-layer reactive scheme. It solves
the limitations of conventional CARP by reducing the control overhead among the network nodes during communication.
It improves network lifetime with minimal energy consumption through exclusion of control packets in the network.
However, this scheme achieves less throughput because of high path loss.
In hydraulic-pressure-based anycast (HydroCast)1routing algorithm, the objective of void avoidance is tackled with
consistent broadcasting of control message at the sink. With the availability of recent neighbor information, data packets
are relayed reliably towards lower depth forwarders in the direction of destination. Although the use of gauge apparatus
does provide accurate information because of inhostile acoustic environment. However, it has high throughput at the cost
of more energy consumption.
In weighting depth and forwarding area division–DBR (WDFAD-DBR),14 the depth of current and next forwarding
node in the direction of the sink deployed at the water surface is considered. The information helped in avoiding void
node selection with a less packet drop ratio. However, knowledge up to hops never guarantees reliable forwarder selection
especially when the deployment is sparse.
An adaptive hop-by-hop vector-based forwarding (AHH-VBF)15 uses a pipeline whose radius can be adjusted adaptively
to retrieve data packets from the void region. Additionally, the restriction of forwarding area allows minimum battery
dissipation because of very few redundant transmissions. This scheme improved packet delivery ratio and reduced energy
utilization and delay.
An opportunistic routing based on residual energy (ORR)16 designed for asynchronous duty-cycled wireless sensor
networks. It considers residual energy to compute most energy-efficient forwarder nodes. Moreover, the problems of load
balancing, disconnection in coverage, and immature death of intermediate nodes are considered for optimal network
lifetime. However, asynchronous duty cycling causes additional delay because of switching from active to sleep mode
and vice versa.
In energy-efficient and load-balanced distributed routing (ELBAR),17 Abbas et al enabled the collaboration of sensor
nodes to find out the expected polygon of a particular region in the network. The computed polygon's information is
shared in complete network to avoid data loss. The sensed data from each polygon is collected and forwarded through
the escape route, which surrounds the polygon hole based on computed view angle and hole covering parallelogram.
Moreover, the objective is to transmit data successfully in the presence of void holes via an alternate route. Addition-
ally, this scheme increases the lifetime and minimizes the energy consumption of the network nodes; however, escape
route leads to longer routing path, which increases delay and energy consumption when the sparsity of the network
increases.
A hop-by-hop dynamic addressing–based routing protocol for pipeline monitoring (H2-DARP-PM) was proposed by
Ahmad et al18 for efficient forwarder node selection. It uses dynamic addressing to obtain reliable and most effective
forwarder node in terms of energy consumption. Also, assigns dynamic hop address to each node which contributes in
delivering data at the destination. Although, the PDR is enhanced, however, at the cost of high energy consumption.
An adaptive clustering habit ((ACH)2)is presented by Sasikala and Chandrasekar,19 which proposes the mechanism of
free association of nodes with cluster heads (CHs). The CHs are first elected on the premise of threshold value and then, an
optimal number of CHs is selected based on the distance between each head node. In this way, data load managed among
the head nodes that significantly minimizes the energy consumption. Moreover, it reduces propagation distance and
evades back transmissions to reduce energy dissipation; however, there is high communication overhead in associating
normal nodes with head nodes.
JAVAID 5of22
Cluster-based sleep wake scheduling is performed by assuming initiator nodes.20 The initiator nodes initiate commu-
nication and select the CHs. The CH with high energy is set to active mode, while other nodes are sent to sleep mode.
The transmission is resumed once the head node is nominated, and this decreases energy consumption along with high
lifetime and throughput. However, the immutable selection of CH degrades the network performance.
An irregular formation of clusters is performed using a layered approach for event coverage in the work of Rao et al.21
Moreover, a theoretical analysis obtains the expected value and density of nodes on every layer. After acquiring all the
information, network field is divided into various irregular clusters to distribute data traffic across the network. Addi-
tionally, a recovery strategy is exploited to balance the utilization of the node energy in each cluster. Thus, it achieved
enhanced packet delivery ratio and improved network lifetime.
An energy-efficient cluster head selection using heuristic technique named particle swarm optimization (PSO-ECHS)
is proposed by Javaid et al.22 Two parameters are taken into the consideration for calibration called particle encoding and
fitness function. To improve the performance of the algorithm, various metrics including distance between the clusters,
distance between sinks, and residual energy of nodes are taken into account. Thus, using aforementioned metrics, a
weighting function is derived for all clusters that enabled a high packet delivery ratio with minimal loss of data packets.
An enhanced developed distributed energy-efficient clustering (EDDEEC)23 is proposed to minimize energy consump-
tion. It uses two models: The first one is the heterogeneous model, and the second model is the energy consumption
model. The earlier said models are used to make clusters and elect head nodes based on the computed probability via
fitness function. This algorithm achieved improved performance based on stability period, network lifetime, and packet
delivery ratio.
Three schemes, ie, sparsity-aware energy-efficient clustering (SEEC), circular SEEC (CSEEC), and circular depth–based
SEEC (CDSEEC), are proposed for energy-efficient communication in the work of Heidemann et al.24 In SEEC, two
mobile sinks are deployed in sparse region to collect the information and to reduce the probability of energy hole cre-
ation. In CSEEC, mobile sinks are deployed in a circular network to evade energy hole creation. Likewise, CDSEEC is
proposed in this paper to minimize the consumption of energy. However, these schemes result in low throughput, because
of aggregated data packet transmission through cluster heads.
Problem description. The immutable selection of forwarder nodes based on fixed parameters like depth or energy results
in sudden depletion of node battery. Additionally, it leads to the creation of communication voids in the network.2
Although the void node is recovered via depth adjustment in vertical direction, it dissipates energy even quicker to resume
network operations. Further, after the depth adjustment, reconfiguration of network nodes is required. In case of void
node recovery, the void node is moved to a new depth to resume greedy data forwarding among the network nodes. How-
ever, the movement of nodes to new depth as shown in Figure 1 causes excessive energy consumption and also movement
of void nodes without taking into account the change in topology increases void occurrence in a sparse network. Moreover,
communication overhead increases due to continuous exchange of beacon messages.
To tackle the aforementioned problems, an energy-efficient scheme is required; thus, we propose NADEEM and its two
variants to avoid void hole occurrence and to minimize the energy dissipation with a fall back recovery mechanism and
transmission power adjustment. The details of the proposed work are presented in the following sections.
3PROPOSED SYSTEM MODEL
In our proposed schemes, an acoustic multisink architecture is used to enable communication among sensor nodes.
Nodes are randomly deployed to sense, collect, and transmit data to sink nodes positioned at the surface of water2as
shown in Figure 2. Nodes are of two types: relay nodes and anchored nodes.13 Anchored nodes are static at the bottom of
the ocean surface, whereas relay nodes are deployed randomly in the acoustic environment. The relay and anchor nodes
use acoustic signal to carry information towards the destination. The anchored nodes obtain the sensed information and
forward it towards the sink located at the surface with the help of relay nodes. Whereas, at the surface, sink nodes relay
data through radio signals for transmitting information at the base station. It is assumed that packets received at a single
sink are considered to be received at all sink nodes successfully.
In our work, we made some assumptions because our focus was on the energy efficiency and void avoidance. First, a
consideration has been made that every node (relay, anchored, and sink nodes) can obtain its coordinates with the help of
localization services.7Second, the communication is symmetric, where communication between any two random nodes
results in the consumption of the same amount of energy. For instance, node i transmits data to node j with energy E and
when j sends data to i, the battery dissipation remains the same. It only changes when the distance between two nodes
6of22 JAVAID
FIGURE 1 Illustration of depth adjustment and void hole
problem in GEDAR
FIGURE 2 System model
JAVAID 7of22
vary. Third, all acoustic nodes have the power to adjust communication range autonomously and sink node can receive
multiple packets at the same time without any data loss or collision. Fourth, the effect of water currents is in the direction
of horizontal, while in vertical direction the movement is almost negligible. In the following paragraph an overview of
Thorp's propagation model2has been presented to model the energy consumption according to the distance between the
source and the destination.
The path loss due to unhindered propagation route for a signal having frequency fover a distance lis given as24:
A(l,𝑓)=ls𝛼(𝑓)l,(1)
where sis the spreading factor and 𝛼(f)is the absorption coefficient. The geometry of propagation is described using
the spreading factor kand its values for spherical, cylindrical,l and practical spreading are s=2, s=1, and s=1.5,
respectively. The absorption coefficient 𝛼(f),indB/kmforfin KHz, is described by the Thorp's formula2as
10logA(l,𝑓)=s.10logl+l.10log𝛼(𝑓).(2)
The common signal-to-noise ratio (SNR) over lis given as
SNR(l)= EnergybA(l,𝑓)
Noise0
=Energyb
Noise0ls𝛼(𝑓)l,(3)
where Energ𝑦band Noise0are constants that reveal per bit energy transmission and noise power density on a nondeclining
additive white Gaussian noise channel.3As in the work of Noh et al,25 Rayleigh fading is used to model a small-scale
system where SNR has the following distribution probability:
𝜌l(Y)=
0
1
SNR(l)eY
SNR(l).(4)
The probability of error is given as
𝜌e(l)=
0
𝜌e(Y)𝜌l(Y)lY.(5)
Here, 𝜌e(Y)denotes the random modulation at a specific value of SNR and Yis the probability of error. In this paper, we
use the binary phase shift keying (BPSK) modulation in which each bit is carried by a symbol.26 The error probability
over lis taken from the works of Yang et al27 and Noh et al28:
𝜌e(l)= 1
2
1SNR(l)
1+SNR(l)
.(6)
The data packet delivery probability for nbits is given by
𝜌(l,n)=(1𝜌e(l))n.(7)
4PROPOSED WORK
In this section, we describe our proposed schemes in detail. Initially, we will discuss the beacon message dissemination
in the network for configuration. Additionally, neighbor node selection mechanism will be presented for successful data
communication. Moreover, an efficient mate selection is discussed to show its effectiveness for reliable data transmission.
Dissemination of beacon message. The beacon dissemination is vital to enable the configuration of the nodes for suc-
cessful data communication. Once all nodes and sinks are deployed in the network volume, collaboration is important
to relay data in a multihop fashion from a source to a destination. Thus, a beacon is transmitted by a sink node from
the surface of water, which is also equipped with an acoustic modem. This message includes unique information like
identification coordinates (x,y,z). The sinks are equipped with positioning system and have the area facts of each other.2
8of22 JAVAID
Similar is the case for sensor nodes. The beacon transmitted by sensor nodes consists of sequence number, ID, and x,y,
zcoordinates. The positioning system is ineffective in underwater due to excessive frequency signal absorption.2There-
fore acoustic localization services are used for acquiring node information.7Moreover, to reduce the energy consumption
and minimize the communication overhead, the size of the beacon is reduced by only keeping information of node ID
and coordinates. After receiving the information, a node updates its entry in the neighbor table. Beacons are generated
to inform about the location of the sensor node. With this knowledge, neighbor nodes can also access an energy optimal
forwarder node within the communication range. Algorithm 1 represents the process of dissemination of beacon trans-
mission and reception. Each beacon consists of seqnum, its ID, and its dimensions (x,y,z). To avoid protracted sizes of
beacon, source node only considers the x,ydimensions of sink node as shown in lines 5 to 12. At line 20, when the source
node receives the beacon message from the sink node, it updates the entry in that particular sink set Sn; else, it updates
its neighbor node set. Line 25 shows that on every update the source node changes its flag to zero that data is not sent to
the neighbor node. In this way, in each iteration, a beacon message is tracked and according to lines 7 to 10.
4.1 The NADEEM
To ensure reliable data transmission among the network nodes, the forwarder selection is based on multiple parameters:
energy, depth, and number of neighbors. The consideration of three parameters improves the energy consumption and
avoids the void occurrence. The high communication overhead is reduced by only disseminating position information.
First, a set of neighbor nodes is nominated to avoid retransmission of the packet, while most energy efficient mate is
appointed for relaying the packet at the destination, One node transmits a packet at a time to minimize collision and
reduce data packet loss. The details of each phase are given in the following.
Distinct mate selection. An optimal utilization of resources is always desired. In an acoustic environment, a node battery
is one of the most crucial asset that needs to be efficiently consumed during the process of data communication. The void
JAVAID 9of22
occurrence causes network partition; thus, an approach that can avoid the occurrence or bypass it is required. Therefore,
we opt to select various forwarding mates from a neighborhood.29,30 The multiple neighbor selection concept is to ensure
backup when node with the highest priority fails to deliver the desired data packet at the respective destination. The
following mathematical expression is used to find out mates with desired features.
M(i)= E(i)
(Trange ×N)+1.(8)
In the given equation, M(i)shows the mate selected for data communication in the network, while idepicts the number
of mates selected (ivaries from 0 to N,whereNcould be any real positive integer). The right-hand side of the expression
shows a computation mechanism of the priority factor. Here, E(i)denotes the energy of node iand it is multiplied with
Nnumber of neighbors to increase its suitability because higher the neighbor number is, more will be backup available
incase of transmission failure and 1 is added to avoid when Nnumber is 0. The fundamental concept of this approach is
to boost the data packet in the direction of sinks on the surface. The selection of multiple neighbor nodes results in fewer
number of retransmissions of the data packets.27,28
Moreover, one more factor is considered before nominating the forwarder node, ie, packet advancement (ADV),27 to
choose the forwarder node that leads the packet towards the destination. The ADV is defined as the difference between
distance of a source node Siand destination node Diwith difference of distance between neighbor Yand Ni.2njis the
node that has a packet to transmit, its neighbor set is represented as Nj(t)and the set of sinks is represented as Sj(t),where
tis representing the time. Therefore, the neighbor node set in geographic and opportunistic routing is given as
Ni=nkN𝑗(t)∶∃svS𝑗(t)Ndn𝑗,s
iNd(nk,sv)>0,(9)
where S
iis from the set of sinks Si(t)and it is the closest sink of node njas
s
i=argmins𝑗S𝑗(t){Nd(n𝑗,s𝑗)}∕ (10)
Energy-efficient mate selection. The sender node set selection is based on normalized ADV (NADV) as proposed by
Coutinho et al2and Noh et al.3,28 Using NADV, the most appropriate next hop forwarder mate from the neighbor node
set Niis selected. The NADV relates the foremost economical trade-off between the proximity and link cost to choose the
priorities of the eligible nodes. So, the greater the NADV of the node is, the greater will be its priority for selection as the
next forwarder. For every next-hop forwarder node nfNi,NADVis
NADV(n𝑓)=ADV(n𝑓𝜌l𝑗
𝑓,n.(11)
Here, ADV(n𝑓)=D(n𝑗,s
𝑗)−D(n𝑓,s
𝑓)is the nfADV towards the closest sink, s
𝑓;l𝑗
𝑓is the distance between source node
njand forwarder node nf,and𝜌(l𝑗
𝑓,n)is the probability of nbits over distance l𝑗
𝑓and it is given in Equation 7.
Then, the node set selection and next hop forwarder set selection assumes fiNiis the set that is formed according
to the priorities of NADV.2,28 As the goal of geographic and opportunistic routing is to find the fiNito maximize the
expected packet advance (EPA). The EPA of fiis formulated in Equation 11.
EPA(𝑓i)=Σ
k
d=1NADV(ndd1
𝑗=01𝜌l𝑗
i,n.(12)
Ultimately, the set with maximum EPA is chosen as the next forwarder node set. The node with the highest precedence
is chosen from the forwarder set as a next hop forwarder. It declares its location records to its neighbor node. If a node is
not decided as a next hop forwarder node for a longer period, its packet is discarded. Algorithm 2 presents the next hop
sender selection. In this algorithm, the first NADV of eligible nodes is calculated corresponding to Equation 10. Then, Ni
is aligned corresponding to the priority of NADV. After that, from line 8 to line 18, it finds the set from candidate set Ni.
Every set in fistarts from the high priority node in Niand gradually includes all the nodes that have transmission range
less than 1
2cr. Every node in set fjis then included in Ci. Each set is expanded while keeping the restriction that every node
do not hear one another. At the end, a set fwith high EPA is chosen as the next hop forwarder.
10 of 22 JAVAID
4.2 The FA-NADEEM
When the sparsity of the network increases, the void node occurrence probability also rises. However, the lack of a recovery
mechanism makes it vulnerable to a high packet drop ratio. Therefore, FA-NADEEM is used to ensure that the packet
from the void region must be recovered and delivered at the destination via an alternate path. Figure 3 illustrates the
mechanism of FA-NADEEM. It is evident that when source node Stransmits the data packet, it obtains the information
up to two hops, along with neighbor information to ensure the suitability of the elected node to proceed with the data
communication. There are four neighbor nodes: n1, n2, n3, and n4. The first hop node is n2 because it is more effective to
relay packet in terms of energy and helps in reducing the hop number. The NADEEM further explores the neighbors of
n2andthenn3 and so on. When the n3 is reached, it encounters a void region. Thus, the fallback approach is adopted in
NADEEM and called FA-NADEEM. Figure 3 shows that n3 declares it void, and instead of dropping the packet, it looks
in its list based on the priority to ensure that it has to traverse the least number of hops in a recovery procedure. Similarly,
n3 falls back and transmits the data to n4 in its communication range. Then from n4, the process of data forwarding
is continued in the direction of sink deployed at the water surface. In the communication period, a fallback recovery
procedure is then adopted to discover different routes, which leads towards the destination. As soon as a node is found,
greedy forwarding is resumed to save node battery. Let us assume a scenario depicted in Figure 3, where node Sforwards
the data packet to the node n2, and when at node n3, it detects the void hole region then it uses the fall back mechanism
to forward the data packet towards node n4.
The primary steps of our proposed scheme FA-NADEEM are presented in Algorithm 3. In the given algorithm, first, if
a node is in a fallback restoration mechanism, new data packets might be queued and the greedy forwarding mechanism
is rearranged to resend these data packets. If the node is not inside the communication void hole region, then it will
forward the sensed information greedily towards the sink node. In any other case, it will transfer to fall back restoration
mechanism for successful data communication among the network nodes.
JAVAID 11 of 22
FIGURE 3 Working
mechanism of FA-NADEEM
4.3 The TA-NADEEM
The TA-NADEEM has the same steps of NADEEM, except the adjustment of transmission to avoid the void hole problem,
which is illustrated in Figure 4. During communication, TA-NADEEM computes the number of neighbors of the for-
warder node after adjusting the transmission range. Let us assume a scenario as depicted in Figure 4, where node Shas to
send a data packet towards the destination, it has no neighbor in its transmission range. Instead of opting for the fallback
procedure, it simply adjusts the transmission range and delivers the data packet directly to the immediate node comes
into its adjusted communication range.
When Sfails to find a neighbor node, it adjusts its transmission range as we mentioned earlier in the system model
that every node has the ability to adjust the transmission range in case of void occurrence to avoid the packet drop. The
immediate forwarder is n1, Sacquires the information about the neighbors of n1 to ensure that the selected node is not
a void. Thus, it looks into the neighbor table of n1 and finds that it has two neighbors at higher depth than n1. Thus,
12 of 22 JAVAID
FIGURE 4 Adjustment of transmission range in TA-NADEEM
n1 is selected as the effective forwarder node to continue with the process of data routing. If there is no neighbor in the
communication vicinity of n1, then further adjustment in the transmission range is done until a suitable forwarder is
located. Additionally, it updates the information in packet queue if there is no report regarding the packet delivery. It
helps in avoiding redundant data packet transmission resulting in less energy consumption, which prolongs the network
lifespan. Moreover, in future, nodes look into the neighbor table and avoids the void occurrence. In this way, extra energy
consumed in transmission adjustment is accommodated.
5FEASIBLE REGION
In this section, linear programming is used for fixing the optimization problem and calculating feasible solution. Lin-
ear programming is the simplest mathematical technique, which is used to achieve optimal results. To achieve optimal
results, an objective function needs to satisfy the defined constraints. In the following sections, energy minimization and
throughput maximization are presented.
5.1 Energy minimization
To minimize energy consumption, the proposition of the linear programming–based mathematical technique is used to
achieve best possible results. This approach begins with an objective function followed by linear constraints. The objective
function must satisfy the constraints in order to achieve best results. The objective function is defined as
minΣrmax
r=1Energytax(r)∀rrmax (13)
The linear constraints for energy minimization are given in Equations 12(a)-12(c).
C1Etx,Ercv Ei(13a)
C2n𝑓nmin
𝑓(13b)
C3CrCrmax (13c)
Equation (13a) ensures that the energy required for transmission and reception should be less than the initial energy Ei
of the node. Equation (13b) shows the constraint for the selection of the forwarder node, which has the minimum energy
consumption, where nfis the forwarder node with minimum energy consumption. Equation (13c) ensures that to receive
a good quality signal, the data should be transmitted within its transmission range, where Tris the transmission range of
the node and Trmax is the maximum transmission range of the node.
Energytax(r)=Σ
rmax
r=1(Energyconsumed(r)) ∀rrmax (14)
JAVAID 13 of 22
01234567
Etx (J)
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
Ercv (J)
P (1, 0.2)
E +E = 0.42
P (4, 0.2)
P (4, 0.1)
P (1, 0.1)
FIGURE 5 Feasible region: Energy minimization
The proposed schemes use Equation (14) to calculate the energy consumption per node, where Energ𝑦consumed includes
both reception and transmission energies of the nodes in the network, ie,
Energyconsumed(r)=Etx +Ercv rrmax ,(15)
where
Etx =Ptx Datasize
Datarate .(16)
Etx is the energy consumed during the transmission of data, and Ptx is the transmission power.
Ercv =Prcv Datasize
Datarate (17)
where Ercv is the energy consumed in receiving the data and Prcv is the receiving power.
Graphical analysis. To provide clear visualization of the proposed problem, graphical analysis is presented to compute
all possible values within the feasible region. Assuming Datasize =100B,Datarate =50kbs,Ptx ={0.5,1,2}W,and
Prcv ={0.025,0.05,,0.1}W, the feasible solution for energy minimization is computed as follows from aforementioned
constraints in Equations (13a)-(13c).
1Etx 4 (18)
0.1Ercv 0.2 (19)
1.1Etx +Ercv 0.42 (20)
The feasible region is plotted in Figure 5 via points extracted from Equations 21a-21c and the points on the boundary of
this feasible region are:
P1(1,0.1)=1.1J
P2(1,0.2)=1.2J
P3(4,0.2)=4.2J
P4(4,0.1)=4.1J
Hence, selecting any value from these points will minimize the energy consumption.
5.2 Throughput maximization
To improve throughput, we formulate the objective function of throughput and take its linear constraints according to
the following expression.
MaximumΣrmax
r=1Thr(r)∀rrmax (21)
14 of 22 JAVAID
FIGURE 6 Feasible region: Throughput maximization
0 50 100 150 200 250 300 350 400
BFrw
(KHz)
0
50
100
150
200
250
300
350
400
BNFrw
(KHz)
P(50, 150)
B +B = 350
P (100, 150)
P(50, 250)
Constraints of the objective function are given as follows:
C1Etx,Ercv Ei,(21a)
C2Etx Ere,(21b)
C3CrCrmax,(21c)
C4Di𝑗Dmax
i𝑗,(21d)
C5minΣrmax
r=1Br
Frw.(21e)
Equation (21a) ensures that the energy required for transmission and reception should be less than the initial energy Ei
of the node. Equation (21b) shows the constraint of transmission energy Etx, which must be less than the residual energy
Ere. Equation (21c) ensures that to receive a good quality signal, the data packet ought be transmitted within its maximum
transmission range Crmax,whereTnis the transmission range of the node and Trmax is the maximum transmission range
of the node. Equation (21d) ensures a threshold for distance between sender iand receiver jfor successful communica-
tion. Equation (22) shows restriction that load on forwarder nodes and nodes that have less residual energy ought to be
minimum, where BFrw is the bandwidth of the forwarder nodes.
Graphical analysis. Assume a scenario where a total bandwidth is between 150 KHz to 250 KHz, where BFrw shows
the bandwidth allocated to the forwarding nodes with high residual energy, and BNFrw is the bandwidth assigned to
nonforwarding nodes. The bandwidth Ballocated to BFrw and BNFrw is computed using aforementioned constraints in
Equations 21a to 21d:
50 BFrw 100 (22)
150 BNFrw 250 (23)
200 BFrw +ENFrw 350.(24)
The feasible region is plotted in Figure 6 via points extracted from Equations 22 to 24 and the points on the boundary of
this feasible region are as follows:
P1(50,150)=200KHz
P2(100,150)=250KHz
P3(50,250)=300KHz
Hence, selecting any value from these points will maximize the throughput.
6SIMULATION RESULTS AND DISCUSSION
To evaluate the performance of proposed schemes (NADEEM, FA-NADEEM, and TA-NADEEM), we conducted extensive
simulations against existing scheme GEDAR.3Three parameters: energy consumption per packet, packet delivery ratio,
JAVAID 15 of 22
Parameter Value
Nodes 150-450
Sinks 45
Network volume (m3)1500 ×1500 ×1500
Initial energy (J) 70
Transmission range (m) 250
Transmission power (W) 2
Reception power (W) 0.1
Idle power (W) 0.01
Frequency (kHz) 10
Packet size (bytes) 100
Data rate (kbps) 16, 32, 64, 128
TABLE 2 Simulation parameter of UWSNs
and fraction of void nodes are analyzed in detail. Additionally, our major focus is on the maximization of network lifetime
through efficient energy utilization and avoidance of void occurrence to achieve continuous data communication among
the deployed network nodes. Thus, only analysis of transmission range and data rate is conducted to observe variations
in the results. The definition of each parameter is given as follows:
1. Fraction of void nodes: A node that has the ability to sense, collect, and transmit information, but the unavailability
of any node in its transmission range makes it void node. Thus, the fraction of void nodes is termed as the proportion
of void nodes occurred during node communication.
2. PDR: It is termed as the number of packets transmitted from the network nodes to the amount of data packets
successfully reached the destination (sink).
3. Energy consumption: It is defined as the quantity of a node's battery dissipated in monitoring and exchanging
information without concerning with successful data transmission. It is measured in joules (J).
6.1 Performance control parameters
To perform simulations, the calibration of input parameters, which directly affect the performance of the network system.
The simulations are run for ten times and average is plotted using the line graphs. Moreover, the number of nodes is
randomly deployed in a three-dimensional (3D) network volume of 1500 m×1500 m×1500 mwith an increment of
50 nodes to 150 until it reaches to 450 nodes. Additionally, the transmission range is set to 250 m for comparison, and it
varies in transmission analysis from 150 m to 350 m. Also, the data rate is set to 16 kbps for performance evaluation against
existing scheme GEDAR,3whereas the deviation in energy and void occurrence is observed on 32 kbps, 64 kbps, and
128 kbps. In addition, the payload of the data packet is set to 150 B. The values of energy consumption are: Pt=2W,
Pr=0.1Wand Pi=10mW for transmission, reception, and idle energies, respectively.3The aforementioned parameters
are given in Table 2.
6.2 Fraction of local maximum nodes
Figure 7 illustrates the ratio of void nodes of NADEEM and its variants against the GEDAR. It is evident from the results
that the behavior of all schemes is homogeneous and the void ratio decreases with the increase in node number. Ini-
tially, the highest transmission failure ratio can be observed of FA-NADEEM, which falls significantly up to 250 nodes;
however, again a small rise is evident for 250-300 nodes. Then, again, the amount of void node occurrence decreases to
a certain level, which remains consistent until 450 nodes. The decrease in ratio is because of the fall back mechanism
of FA-NADEEM, which looks for an alternative route from all nodes in the communication range to recover and deliver
data packet successfully at the destination.
NADEEM has fewer void appearances at the end of the node increment because it does not have transmission adjust-
ment and fallback and depth adjustment mechanisms (see Figure 7). This help in saving node battery ultimately leading
to fewer nodes and more number of alive nodes. Thus, when the sparsity of the nodes decreases, the probability of void
occurrence also decreases.
GEDAR and TA-NADEEM show almost identical trend in rise and fall of void proportion during the node commu-
nication. Although, the values are different and, at the end, TA-NADEEM beats the baseline scheme because of direct
transmission adjustment, instead of exchanging beacon message to find out the different route (see Figure 7). When a
different route is not available then the depth of the node is adjusted, these aspects consume a lot of energy and suddenly
16 of 22 JAVAID
FIGURE 7 Comparison of fraction of void nodes
150 200 250 300 350 400 450
Number of nodes
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
Fraction of local maximum nodes
node battery depletes. Whereas, TA-NADEEM adaptively adjusts its transmission power and bypass the void node
successfully.
From 150 to 200 nodes, GEDAR shows sudden decrease in fraction of void nodes (see Figure 7). As GEDAR considers
movement of void node towards its neighbor node without checking whether the neighbor nodes have enough forwarder
nodes or not, it therefore has high fraction of void nodes compared with the proposed schemes.
6.3 Packet delivery ratio
Figure 8 shows that the energy tax gradually decreases with the increase in density of network. The highest PDR is
achieved by FA-NADEEM due to its ability of finding data route from an alternate node within the communication vicin-
ity. When a trap of void node occurs, instead of dropping the packet, the source node proceed with a fallback procedure
and looks in 360to resume the data transmission process.
NADEEM depicts the moderate success ratio of packet transmission compared with other schemes in Figure 8. The
performance is neither high nor low, and it operates on static parameters; however, the forwarder selection is not based on
single parameter of depth. The consideration of depth and energy ensures rotation of node constantly for efficient node
battery dissipation.
On the other hand, the performance regarding the success ratio of GEDAR and TA-NADEEM is identical in Figure 8.
The energy consumption is high in both of the methodologies because, in GEDAR, depth adjustment in vertical
direction consumes more energy as compared to that of simple recovery methods. Similarly, the TA-NADEEM opts
towards the adjustment of transmission range; the energy consumption depends on the distance between the source and
FIGURE 8 Comparison of PDR
150 200 250 300 350 400 450
Number of nodes
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
Packet delivery ratio
JAVAID 17 of 22
150 200 250 300 350 400 450
Number of nodes
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Energy per data packet per node (J)
FIGURE 9 Comparison of energy consumption
destination. When the transmission power is adjusted, it requires more energy to transmit the signal to overcome the
issues of attenuation and fading in dynamic acoustic environment.
6.4 Energy consumption
The comparison of energy consumption in delivering single packet at the destination of all the schemes is depicted in
Figure 9. The minimum energy consumption can be observed from the graphical representation of TA-NADEEM and
slightly high of GEDAR. The energy consumed for one packet is almost 0.02J of TA-NADEEM, whereas the node battery
dissipation in GEDAR is higher than all the proposed schemes, which is a very small number of nearly 0.12 J.
The energy consumption of FA-NADEEM is comparatively more than the other two proposed schemes and almost the
same with GEDAR (see Figure 9). The reason of more energy is of an alternate route that increases the route length,
resulting in more energy requirement. Although it achieves better PDR (see Figure 8), the utilization of limited resource
battery is still considerably higher.
On the contrary, TA-NADEEM shows minimum energy dissipation in delivering a single data packet. It happens
because the only energy required in adjusting power and factors such as message exchange and depth adjustment are not
involved. Thus, a significant amount of energy is saved in TA-NADEEM. Although the NADEEM has initially low energy
requirements, when node density increases, the collision rate of data packets also maximizes resulting in high packet loss.
6.5 Influence of control parameters
In the following discussion, we analyze the performance of NADEEM and TA-NADEEM schemes based on transmission
ranges, data rate, and payload for energy and void fraction. The input value is changed while all other input variables are
the same.
6.5.1 Influence of various transmission ranges on void occurrence
The relationship of transmission range with transmission due to void node occurrence is shown in Figure 10. The lower
the communication range is, the higher the failure rate will be during the data transmission. When the node density is
150, the void ratio is higher than 0.8, almost 0.7, more than 0.57, and greater than 0.3 and 0.2 in the case of 150, 200, 250,
300, and 350 transmission ranges. The pattern described is homogeneous where the decrease is observed until the node
density reaches 450. At 150 transmission range, the minimum ratio is slightly lower than 0.6 when the 450 nodes are
deployed. Still, the ratio is higher than every other transmission range used for the performance analysis. The minimum
is when the range is 350 and density of nodes is 450. The reason of this increase and decrease trends; when range is
more, the probability of finding neighbor nodes in the transmission is high, and thus voids can be easily avoided. On the
other hand, with a smaller communication region, the success ratio becomes low due to the availability of fewer nodes,
especially in sparse deployment. However, it increases with the increase in the transmission range.
18 of 22 JAVAID
FIGURE 10 Occurrence of void nodes in TA-NADEEM at various
transmission ranges
150 200 250 300 350 400 450
Number of nodes
0
0.2
0.4
0.6
0.8
1
Fraction of local maximum nodes
FIGURE 11 Energy consumption in TA-NADEEM at different
transmission ranges
150 200 250 300 350 400 450
Number of nodes
0
0.05
0.1
0.15
Energy per data packet per node (J)
6.5.2 Influence of various transmission ranges on energy consumption
The comparison of energy dissipation is depicted in Figure 11 of various transmission ranges. As we have discussed, the
phenomenon of void occurs due to transmission ranges. It is concluded that when the communication range is high,
the energy consumption is more because of proportionality of distance and transmission with each other. However, it
is clearly evident that the smaller transmission range consumes less amount of energy at the cost of high void fraction
(see Figure 10).
At node density of 150, the energy consumption is lower than 0.05, and this ratio remains the constant until the node
number 300. However, a very slight increment can be observed until the time the node number approaches 450. On the
contrary, the trend for other transmission ranges is different; a continuous decrease is evident from the results. Although
there is a minor increase in the case of 250 and 300, when energy increased during node number of 250 to 300. After that,
we can observe a decrement pattern for all the schemes.
As we have mentioned earlier, energy is directly proportional to distance; thus, the more communication distance is
between the source and the destination, the higher the energy utilization would be. The fall is seen because when the
number of nodes increases in fixed network volume, the ratio of nodes per meter square also increases, thus leading to
higher success of neighbor availability when helping in quick finding of the forwarder node. This is the reason of decrease
in energy with the increase in the node number.
6.5.3 Influence of data rate on energy consumption
In order to verify the performance of NADEEM, we have conducted simulations on different data rates as illustrated in
Figure 12. It is evident from the results that with a higher data rate, the energy consumption is higher. With high data rates,
the time required to transmit data from the source is very less in case of 128 Kb/s; therefore, the chances of collision and
JAVAID 19 of 22
FIGURE 12 NADEEM:
Energy consumption at
different data rates
retransmission factors are evaded. Thus, the node battery is saved, and the lifetime of the network is optimized. Initially,
the utilization is high compared at 64, 32, and 16 Kb/s because the transmission rate is quicker and the probability of
forwarder node is less. Thus, the drop ratio is high. However, as the node density increases, the consumption drops to a
significant extend (around 0.02 J per packet).
On the other hand, at 128 Kb/s, the energy consumption is very low of approximately 0.01 J as compared to other data
rates (see Figure 12). The major point of focus is that the ratio of energy required to transmit data successfully at the
destination increases while at other rates, the quantity falls. This reason is as the node density increases, the collision rate
increases on the wireless channel, which results in high data packet drop.
6.5.4 Influence of data rate on void occurrence
Figure 13 shows the impact of transmission rate on void occurrence in the network. The relationship between void node
appearance during communication and data rate is analysed at 16, 32, 64, and 128 Kb/s. The minimum ratio is evident
at very low data rate or very high data rate. The effective performance can be observed when the data rate is low because
of dynamic acoustic environment. The inevitable mobility because of water currents plays a vital role in discovering or
vanishing neighbors from the vicinity of the communication range. Moreover, the high case helps in minimizing the
transmission delay and easily data can be delivered at the destination without encountering void regions.
Similarly, a linear decrease is clear that at 64 and 32 Kb/s, the ratio is higher, although the ratio is falling with the
increment of node number. At 64 Kb/s, the ratio is 0.7 and came down to around 4.5. While, 32 Kb/s started with just
over 0.5 and ends at 0.3. Thus, the trend of void ratio reduction is the same from top to bottom, and no irregularities exist;
however, a significant difference can be observed between each transmission rate.
7PERFORMANCE TRADE-OFFS
In this section, we review the performance trade-offs of our proposed schemes: NADEEM, FA-NADEEM, and
TA-NADEEM along with the existing base scheme GEDAR. The GEDAR considers movement of void node without check-
ing whether the neighbor nodes have enough forwarder node or not. The number of retransmissions increases the overall
energy consumption in GEDAR due to high probability of void nodes. However, in dense region, the energy consumption
decreases due to less probability of void nodes. The FA-NADEEM reduces void holes and increases PDR. Also, it selects
nodes with minimum neighbors at the cost of low throughput. The TA-NADEEM reduces the void holes by adaptively
20 of 22 JAVAID
FIGURE 13 NADEEM: occurrence of void nodes at various data
rates
TABLE 3 Performance trade-offs
Scheme Features Achieved parameters Trade-offs
GEDAR 2, 2Geographic and opportunistic routing Void hole avoidance results in High energy consumption
with depth adjustment based topology increased performance and high probability
control for communication Recovery of the network of void nodes
over void regions
NADEEM Geographic and Opportunistic Routing Void hole avoidance High propagation
using Backward Transmission results in increased PDR distance
FA-NADEEM Geographic and Opportunistic Routing Improved network performance Low throughput
using Collision Avoidance
TA-NADEEM Geographic and Opportunistic Routing Improved PDR High energy consumption
using Adaptive Transmission Range in sparse region
adjusting its transmission range; however, it results in increased energy consumption. The performance trade-offs are
shown in Table 3.
8CONCLUSION
In this paper, we have proposed NADEEM, FA-NADEEM, and TA-NADEEM routing protocols to enhance the energy effi-
ciency and minimize the fraction of void node occurrence. The NADEEM minimizes the energy consumption by avoiding
immutable forwarder selection. It also achieves higher packet delivery ratio. Whereas, FA-NADEEM avoids successfully
the void node through sending data from the alternate route. However, the use of alternate path increases the number of
hops, which resulted in more energy consumption. Moreover, it has higher throughput as compared with NADEEM. On
the other hand, when FA-NADEEM fails to find another forwarding path, then the transmission of NADEEM is adjusted
to ensure data delivery at the destination node. Additionally, TA-NADEEM looked for an immediate forwarder node and
its neighbors to ensure that the selected node is not void. It has a low network throughput but a minimum energy con-
sumption for one packet. The results are validated through extensive simulations against fraction of void node, energy
consumed per packet, and packet delivery ratio. The outcome clearly shows that the proposed schemes outperformed
the baseline existing scheme (GEDAR) in terms of energy consumption and void avoidance. Further, to see the impact
of transmission adjustment and data rate, results are obtained which illustrate energy consumption rise when transmis-
sion range is increased and void fraction decreases. On the other hand, when the data rate is varied, it shows an opposite
behavior, ie, with an increase in transmission rate, energy dissipation reduces and the fraction of void increases.
As future work, we plan to improve the delay using heuristic techniques. Additional analysis of payload, packet size,
and number of sinks will be conducted to measure variations in the performance of algorithm. Further, the transmission
range adjustment will be dynamic based on various parameters like link quality, energy, and distance. The aforementioned
factors considered will help in achieving an optimal throughput and network lifetime.
JAVAID 21 of 22
ORCID
Nadeem Javaid https://orcid.org/0000-0003-3777-8249
REFERENCES
1. Javaid N, Jafri MR, Ahmed S, et al. Delay-sensitive routing schemes for underwater acoustic sensor networks. Int J Distrib Sens Netw.
2015;11(3):532676.
2. Coutinho R, Boukerche A, Vieira L, Loureiro AA. Geographic and opportunistic routing for underwater sensor networks. IEEE Trans
Comput. 2016;65(2):548-561.
3. Noh Y, Lee U, Lee S, et al. Hydrocast: pressure routing for underwater sensor networks. IEEE Trans Veh Technol. 2016;65(1):333-347.
4. Kheirabadi MT, Mohamad MM. Greedy routing in underwater acoustic sensor networks: a survey. IntJDistribSensNetw. 2013;9(7):701834.
5. Li N, Martínez J-F, Meneses Chaus J, Eckert M. A survey on underwater acoustic sensor network routing protocols. Sensors. 2016;16(3):414.
6. Han G, Jiang J, Bao N, Wan L, Guizani M. Routing protocols for underwater wireless sensor networks. IEEE Commun Mag.
2015;53(11):72-78.
7. Coutinho RW, Boukerche A, Vieira LF, Loureiro AA. GEDAR: geographic and opportunistic routing protocol with depth adjustment for
mobile underwater sensor networks. Paper presented at: 2014 IEEE International Conference on Communications (ICC); 2014; Sydney,
Australia.
8. Yan H, Shi ZJ, Cui J-H. DBR: depth-based routing for underwater sensor networks. In: NETWORKING 2008 Ad Hoc and Sensor Net-
works, Wireless Networks, Next Generation Internet: 7th International IFIP-TC6Networking Conference Singapore, May 5-9, 2008 Proceedings.
Berlin, Germany: Springer; 2008:72-86.
9. Javaid N, Jafri MR, Khan ZA, Qasim U, Alghamdi TA,Ali M. iAMCTD: improved adaptive mobility of courier nodes in threshold-optimized
DBR protocol for underwater wireless sensor networks. Int J Distrib Sens Netw. 2014;10(11):213012.
10. Azam I, Javaid N, Ahmad A, Abdul W, Almogren A, Alamri A. Balanced load distribution with energy hole avoidance in underwater
WSNs. IEEE Access. 2017;5:15206-15221.
11. Kong L, Ma K, Qiao B, Guo X. Adaptive relay chain routing with load balancing and high energy efficiency. IEEE Sens J . 2016;
16(14):5826-5836.
12. Zhou Z, Yao B, Xing R, Shu L, Bu S. E-CARP: an energy efficient routing protocol for UWSNs in the internet of underwater things.
IEEE Sens J. 2015;16(11):4072-4082.
13. Yu H, Yao N, Wang T, Li G, Gao Z, Tan G. WDFAD-DBR: weighting depth and forwarding area division DBR routing protocol for UASNs.
Ad Hoc Netw. 2016;37:256-282.
14. Yu H, Yao N, Liu J. An adaptive routing protocol in underwater sparse acoustic sensor networks. Ad Hoc Netw. 2015;34:121-143.
15. So J, Byun H. Load-balanced opportunistic routing for duty-cycled wireless sensor networks. IEEE Trans Mob Comput.
2017;16(7):1940-1955.
16. Nguyen K-V, Le Nguyen P, Vu QH, Van Do T. An energy efficient and load balanced distributed routing scheme for wireless sensor
networks with holes. JSystSoftw. 2017;123:92-105.
17. Abbas MZ, Bakar KA, Ayaz M, Mohamed MH, Tariq M. Hop-by-hop dynamic addressing based routing protocol for monitoring of long
range underwater pipeline. KSII Trans Internet Inf Syst. 2017;11(2):731-763.
18. AhmadA,JavaidN,KhanZA,QasimU,AlghamdiTA.(ACH)2: routing scheme to maximize lifetime and throughput of wireless sensor
networks. IEEE Sens J. 2014;14(10):3516-3532.
19. Sasikala V, Chandrasekar C. Cluster based sleep/wakeup scheduling technique for WSN. Int J Comput Appl. 2013;72(8).
20. Yu S, Liu S, Jiang P. A high-efficiency uneven cluster deployment algorithm based on network layered for event coverage in UWSNs.
Sensors. 2016;16(12):2103.
21. Rao PS, Jana PK, Banka H. A particle swarm optimization based energy efficient cluster head selection algorithm for wireless sensor
networks. Wireless Networks. 2017;23(7):2005-2020.
22. Javaid N, Rasheed MB, Imran M, et al. An energy-efficient distributed clustering algorithm for heterogeneous WSNs. EURASIP J Wirel
Commun Netw. 2015;2015(1):151.
23. Sher A, Javaid N, Azam I, et al. Monitoring square and circular fields with sensors using energy-efficient cluster-based routing for
underwater wireless sensor networks. Int J Distrib Sens Netw. 2017;13(7). 1550147717717189.
24. Heidemann J, Stojanovic M, Zorzi M. Underwater sensor networks: applications, advances and challenges. Philos Trans R Soc A Math
Phys Eng Sci. 2012;370(1958):158-175.
25. Noh Y, Lee U, Han S, et al. DOTS: a propagation delay-aware opportunistic MAC protocol for mobile underwater networks. IEEE Trans
Mob Comput. 2014;13(4):766-782.
26. Stojanovic M, Preisig J. Underwater acoustic communication channels: propagation models and statistical characterization.
IEEE Commun Mag. 2009;47(1):84-89.
27. Yang H, Liu B, Ren F, Wen H, Lin C. Optimization of energy efficient transmission in underwater sensor networks. In: Proceedings of the
28th IEEE Conference on Global Telecommunications (GLOBECOM); 2009; Honolulu, HI.
28. Noh Y, Lee U, Wang P, Choi BSC, Gerla M. VAPR: void-aware pressure routing for underwater sensor networks. IEEE Trans Mob Comput.
2013;12(5):895-908.
22 of 22 JAVAID
29. Climent S, Sanchez A, Capella J, Meratnia N, Serrano J. Underwater acoustic wireless sensor networks: advances and future trends in
physical, MAC and routing layers. Sensors. 2014;14:795-833.
30. Yadav S, Kumar V. Optimal clustering in underwater wireless sensor networks: acoustic, EM and FSO communication compliant
technique. IEEE Access. 2017;5:12761-12776.
Howtocitethisarticle: Javaid N. NADEEM: Neighbor node approaching distinct energy-efficient mates for
reliable data delivery in underwater WSNs. Trans Emerging Tel Tech. 2019;e3805. https://doi.org/10.1002/ett.3805
... Another article in which introduced the approach for reliable data delivery underwater. The neighbor node approaches distinct energy efficient mates (NADEEM) [17] with two invariants like fallback and transmission. Both these are following the greedy approach to forwarding the data among the nodes of the network. ...
... In order to calculate the achievable regions inside the network in an optimized manner, we used a linear programming approach in this section. To obtain the optimal result, the mathematical technique linear programming is used as same as [17]. The objective function that we analyzed through linear programming, minimum energy consumption, and maximum throughput is discussed in Figures 10 and 11. ...
... The proposed scheme of calculation of the maximum throughput is the bandwidth assigned for the next forwarder node in the case of empty regions and is in Equation (23) such that 'B_frwˆn' and for non-forwarding node is 'B_(N-frw)ˆn'. The overall bandwidth is calculated for the aforementioned equations are below where bandwidth is assigned for 150-300 KHz as from [17]. ...
Article
Full-text available
The Internet of Things (IoT) is an emerging technology in underwater communication because of its potential to monitor underwater activities. IoT devices enable a variety of applications such as submarine and navy defense systems, pre-disaster prevention, and gas/oil exploration in deep and shallow water. The IoT devices have limited power due to their size. Many routing protocols have been proposed in applications, as mentioned above, in different aspects, but timely action and energy make these a challenging task for marine research. Therefore, this research presents a routing technique with three sub-sections, Tri-Angular Nearest Vector-Based Energy Efficient Routing (TANVEER): Layer-Based Adjustment (LBA-TANVEER), Data Packet Delivery (DPD-TANVEER), and Binary Inter Nodes (BIN-TANVEER). In TANVEER, the path is selected between the source node and sonobuoys by computing the angle three times with horizontal, vertical, and diagonal directions by using the nearest vector-based approach to avoid the empty nodes/region. In order to deploy the nodes, the LBA-TANVEER is used. Furthermore, for successful data delivery, the DPD-TANVEER is responsible for bypassing any empty nodes/region occurrence. BIN-TANVEER works with new watchman nodes that play an essential role in the path/data shifting mechanism. Moreover, achievable empty regions are also calculated by linear programming to minimize energy consumption and throughput maximization. Different evaluation parameters perform extensive simulation, and the coverage area of the proposed scheme is also presented. The simulated results show that the proposed technique outperforms the compared baseline scheme layer-by-layer angle-based flooding (L2-ABF) in terms of energy, throughput, Packet Delivery Ratio (PDR) and a fraction of empty regions.
... But in the greedy forwarding technique, immutable selection of the forwarder node is unavoidable, which results in exhausting the battery energy of the nodes rapidly and this will create a void hole in the network [17], [18]. To tackle this issue, opportunistic routing (OR) protocols are exploited to select an optimal node in each hop as a forwarding candidate to send the data reliably [19]. In OR protocols, the source node selects the best node from its neighboring set to forward the data. ...
... In addition, the advantage of mobile sinks is taken to capture the data from the void nodes. In [19], the author has proposed three schemes. Out of those three schemes, one scheme named Fallback Approach NADEEM (FA-NADEEM) is given for tackling the issue of void nodes. ...
... Let us assume that this single node drains its energy completely, then ultimately a void space will be created in the routing path. Although many geographic and OR protocols are available in the UWSN literature to cope with the void issue [16], [19], [23], [24], [46]. Yet the void space remains un-sensed. ...
Article
Full-text available
Reliable data transfer seems a quite challenging task in Underwater Wireless Sensor Networks (UWSN) in comparison with Terrestrial Wireless Sensor Networks due to the peculiar attributes of UWSN communication. However, the reliable data transmission in UWSN is very limited. Yet, there is a way to achieve reliable data transfer metrics through the design of routing protocols by considering the exceptional features of UWSN communications. With this aim, we propose two schemes with multiple sinks-based network architecture: Anchor Nodes assisted Cluster-based Routing Protocol (ANCRP) to achieve reliable data transfer metrics and Void Handling technique in ANCRP (VH-ANCRP) to cope with the local maximum nodes. For which, the network space is divided into small cubes to form clusters. Then, each cube is assigned with an anchor node as a cluster head (CH). All cluster heads are supposed to be anchored at the centroid of a cube via a string, while source nodes are randomly distributed. In ANCRP, the source nodes are liable to send the sensed data to their designated CH. The CH transmits the sensed data to the next-hop CH and continues this procedure till the successful delivery of the data packets at the surface sinks. In VH-ANCRP, a void handling technique of making the ad-hoc CH is used by the void nodes to reconnect with the network operations. We perform extensive simulations in NS3 to validate our schemes. The simulation outcomes expel that both proposed schemes have improved the network performance when compared with the baseline schemes.
... The sensor nodes have limited energy resources, therefore, the SFNs robustness decreases due to the nodes' failure. Many researchers study the methods to increase the lifetime of nodes [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31]. ...
... Variable attacks in this study are performed by randomly selecting the number of removed nodes in the range of 1 to 10. The number of nodes in the MCS 24 Thesis by: Muhammad Usman is calculated after each attack. Due to multiple nodes are randomly removed, therefore, the effect on network connectivity with multiple nodes removal in a single instant is analyzed. ...
Thesis
Full-text available
During the past few decades, the Internet of Things (IoT) has made remarkable progress in many real-world applications including healthcare, military, transportation, etc. Multiple sensor nodes are deployed in these _elds to get the required data. Different network topologies are used in IoT and scale-free is one of them. It is mostly preferred due to its robust behavior against random node removal, however, the network collapsed because of malicious attacks. Therefore, in this thesis, robustness of the scale-free networks is enhanced against malicious attacks through optimization. To achieve this, the edge's degree and nodes' distance based edge swap operations are used in the proposed Improved Scale-Free Networks (ISFNs) scheme. In the edge's degree based operation, nodes of similar degrees are linked. Moreover, the connections of the nearest nodes are made in distance based edge swap. These operations help to achieve a better onion-like structure without changing the degree distribution of the network. Therefore, the network becomes robust against malicious attacks. Moreover, no new links or nodes are added in the optimization process, therefore, no extra cost is incurred. Furthermore, to make the network more robust against realistic attacks, the variable attacks are considered. Simulation results of the proposed scheme are compared with ROSE and Simulated Annealing (SA) for different number of nodes. The proposed scheme outperforms the existing techniques for different numbers of nodes and against the low degree, high degree and random attacks. Moreover, ISFNs has 13% and 23% better network robustness as compared to ROSE and SA, respectively. Network Topology Evolution Scheme (NTES) is proposed to prevent the scale-free networks from random and malicious attacks. In this scheme, the network field is divided into two parts with uniformly distributed nodes. After the network's evolution, the nodes are linked with each other through one-to-many correspondence. The division of the network field is made by considering that a network is robust if its size is small. Moreover, to study the hierarchical changes in the degree of nodes, k-core decomposition is used. In addition, nodes' degrees and core based attacks are performed on the network to evaluate the performance of the proposed scheme. Furthermore, the network robustness is analyzed using three optimization techniques: Artificial Bee Colony (ABC), Bacterial Foraging Optimization (BFO) and Genetic Algorithm (GA). The techniques are compared with each other and a technique that efficiently optimizes the network to increase the robustness is selected. In the optimization process, we make use of three edge swap methods. Due to the edge swap, the network robustness is enhanced without changing the degree distribution, so the addition of nodes/links is not required to increase the robustness. Furthermore, NTES is compared with Barabasi Albert (BA) model and Hill Climbing (HC) algorithm against random and malicious attacks. The simulation results show that the proposed NTES optimized using GA outperforms BA and HC by 46.90% and 57.08%, respectively, in terms of robustness. In addition, the network robustness of Scale Free Networks (SFNs) is enhanced against the malicious attacks. For that purpose, initially, a parameterless optimization algorithm JAYA is used because it requires less computational efforts as compared to the heuristic techniques. Then, as the edge swap plays an important role to enhance the robustness of SFNs, therefore, the edge swaps are classified into three categories. For each category, effects on the network's topological parameters such as average shortest path length, assortativity and clustering coefficient are analyzed. Next, the robustness is enhanced with the addition of nodes in the maximum connected subgraphs and the protection of bridge edges maintain the network connectivity. Moreover, optimized network is analyzed for different attack strengths. In simulations, the comparison of JAYA is made with two existing algorithms: ROSE and Simulated Annealing (SA). The network optimized by JAYA has a better robustness against random and malicious attacks, as compared to the existing algorithms. Furthermore, among the edge swap categories, the degree dependent edge swap is better to increase the robustness of SFNs. Moreover, the addition of nodes into the maximum connected subgraphs enhances the robustness and the protection of bridge edges ensures the network connectivity in all the algorithms. Furthermore, the robustness against different attack strengths are analyzed and the results show that high attacks strength paralyzed the network more efficiently.
... Different types of protocols are proposed for optimal route finding including the geographic routing [3], fuzzy routing [4], transmission adjustment routing [5], etc. The geographic routing is also referred as position based routing that provides services, e.g., content-centric networking and location-aware services. ...
Article
Full-text available
In the above article [1] , reference [2] is updated and the missing DOI is provided. In Section IV “Proposed System Model” of the article, a two-point distance formula is added which is taken from [3] . The text is updated as follows: “In order to send the sensed data, the OSN follows the shortest path. The OSN finds the shortest distance between itself and nearby SN using the x and y coordinates. As we have deployed a two-dimensional (2D) network. So, the above-mentioned distance is being calculated with the help of the two-point distance formula:
... Different types of protocols are proposed for optimal route finding including the geographic routing [3], fuzzy routing [4], transmission adjustment routing [5], etc. The geographic routing is also referred as position based routing that provides services, e.g., content-centric networking and locationaware services. ...
Article
Full-text available
Wireless Sensor Internet of Things (WSIoTs) face various challenges such as unreliable data communication, less cost efficiency, security issues and high energy consumption due to their deployment in hostile and unattended environments. Moreover, the node's rapid energy dissipation due to the void holes and imbalanced network deployment has a bad impact on the network performance. To overcome the aforementioned issues, a blockchain based trust model for WSIoTs is proposed in this paper. Moreover, the Dijkstra algorithm is used to propose a routing protocol for performing efficient communication between network nodes while simultaneously avoiding void holes between ordinary sensor nodes and a sink node. Furthermore, to provide transparency in the network, all the transactions performed by the nodes are recorded in the blockchain in an immutable manner. Moreover, the Proof of Authority (PoA) consensus algorithm is used to validate and add the transactions in the blocks. Besides, a distributed platform, known as interplanetary file system, is used in WSIoTs for reliable and cost-effective storage. The simulation results show that PoA performs 13% better than proof of work consensus algorithm. The proposed routing protocol and trust model are validated in terms of gas consumption, throughput, nodes' status and energy consumption.
... The sensor nodes have limited energy resources, therefore, the Scale-Free Networks (SFNs) robustness decreases due to the nodes' failure. Many researchers study the methods to increase the lifetime of nodes [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31]. ...
Research Proposal
Full-text available
In this synopsis, robustness of the Scale-Free Networks (SFNs) is enhanced against malicious attacks through optimization. To achieve this, the edge’s degree and nodes’ distance based edge swap operations are used in the proposed Improved Scale-Free Networks (ISFNs) scheme. In the edge’s degree based operation, nodes of similar degrees are linked. Moreover, connections of the nearest nodes are made in distance based edge swap. These operations help to achieve a better onion-like structure without changing the degree distribution of the network. Therefore, the network becomes robust against malicious attacks. Furthermore, to make the network robust against realistic attacks, the variable attacks are considered. Apart from that, a Network Topology Evolution Scheme (NTES) is proposed to prevent SFNs from random and malicious attacks. In this scheme, the network field is divided into two parts with uniformly distributed nodes. After the network’s evolution, the nodes are linked with each other through one-to-many correspondence. The division of the network field is made by considering that a network is robust if its size is small. Moreover, to study the hierarchical changes in the degree of nodes, k-core decomposition is used. In addition, nodes’ degrees and core based attacks are performed on the network to evaluate the performance of the proposed scheme. Furthermore, the network robustness is analyzed using three optimization techniques: Artificial Bee Colony (ABC), Bacterial Foraging Optimization (BFO) and Genetic Algorithm (GA). The techniques are compared with each other and a technique that efficiently optimizes the network to increase the robustness is selected. In the optimization process, we make use of three edge swap methods. Due to the edge swap, the network robustness is enhanced without changing the degree distribution, so the addition of nodes/links is not required to increase the robustness. In addition, the network robustness of SFNs is enhanced against the malicious attacks. For that purpose, initially, a parameterless optimization algorithm JAYA is used because it requires less computational efforts as compared to the heuristic techniques. Then, as the edge swap plays an important role to enhance the robustness of SFNs, therefore, the edge swaps are classified into three categories. For each category, effects on the network’s topological parameters such as average shortest path length, assortativity and clustering coefficient are analyzed. Next, the robustness is enhanced with the addition of nodes in the maximum connected subgraphs and the protection of bridge edges maintain the network connectivity. Moreover, optimized network is analyzed for different attack strengths.
... Therefore, the IoT network faces many issues, which capture the interest of researchers to improve its efficiency. The last few decades have been quite active in IoT research, which resulted in a huge amount of proposals for various routing protocols [5], [6], security models [7], [8] and clustering techniques [9] that provide secure and trustful communication in the IoT networks. However, IoT networks are always threatened to be compromised by the external nodes, which mislead the networks by sending false data for their benefit. ...
Article
Full-text available
Internet of Things (IoT) is an emerging domain in which different devices communicate with each other through minimum human intervention. IoT devices are usually operated in hostile and unattended environments. Moreover, routing in current IoT architecture becomes inefficient due to malicious and unauthenticated nodes' existence, minimum network lifetime, insecure routing, etc. This paper proposes a lightweight blockchain based authentication mechanism where ordinary sensors' credentials are stored. As IoT nodes have a short lifespan due to energy depletion, few credentials are stored in the blockchain to achieve lightweight authentication. Moreover, the route calculation is performed by a genetic algorithm enabled software defined network controller, which is also used for on-demand routing to optimize the energy consumption of the nodes in the IoT network. Furthermore, a route correctness mechanism is proposed to check the existence of malicious nodes in the calculated route. Moreover, a detection mechanism is proposed to restrict the malicious nodes' activities, while a malicious node's list is maintained in the blockchain, which is used in the route correctness mechanism. The proposed model is evaluated by performing intensive simulations. The effectiveness of the proposed model is depicted in terms of gas consumption, which shows the optimized utilization of resources. The residual energy of the network shows optimized route calculation, while the malicious node detection method shows the number of packets dropped.
... However, the greedy forwarding approach is not suitable for immutable forwarder node selection, which causes premature depletion of the node's battery and creates a void hole [4]. These void holes (usually created near the sink) in the network cause limited network lifetime, unnecessary delays, data packet losses, and throughput and network connection problems, as in NADEEM [5]. Another reason for a void hole in the network is the continuous and random movement of nodes in the I-UWSAN that cannot be neglected [6]. ...
Article
In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and network isolation occur because of long routing distances between nodes. Void holes usually occur around the sink because nodes die early due to the high energy consumed to forward packets sent and received from other nodes. These void holes are a major challenge for I‐UWSANs and cause high end‐to‐end delay, data packet loss, and energy consumption. They also affect the data delivery ratio. Hence, this paper presents an energy efficient watchman based flooding algorithm to address void holes. First, the proposed technique is formally verified by the Z‐Eves toolbox to ensure its validity and correctness. Second, simulation is used to evaluate the energy consumption, packet loss, packet delivery ratio, and throughput of the network. The results are compared with well‐known algorithms like energy‐aware scalable reliable and void‐hole mitigation routing and angle based flooding. The extensive results show that the proposed algorithm performs better than the benchmark techniques.
... Thus more effort are made to create and control WSNs in harsh environments where overcoming routing holes is typical. Several protocols have been proposed to solve the void hole problem in underwater WSNs, which is due to frequent topology changes (nodes moving around because of water flows) and signal attenuation and long delay [31][32][33][34]. Also, in [35] a virtual force based routing strategy is proposed to handle the energy hole problem, while in [36] a routing algorithm is created to overcome dynamic holes. ...
Article
Full-text available
A quest for geographic routing schemes of wireless sensor networks when sensor nodes are deployed in areas with obstacles has resulted in numerous ingenious proposals and techniques. However, there is a lack of solutions for complicated cases wherein the source or the sink nodes are located close to a specific hole, especially in cavern-like regions of large complex-shaped holes. In this paper, we propose a geographic routing scheme to deal with the existence of complicated-shape holes in an effective manner. Our proposed routing scheme achieves routes around holes with the (1+ϵ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\epsilon$$\end{document})-stretch. Experimental results show that our routing scheme yields the highest load balancing and the most extended network lifetime compared to other well-known routing algorithms as well.
Article
In Wireless Sensor Networks (WSNs), reliable and rapid neighbour node discovery is considered as the crucial operation which frequently needs to be executed over the entire lifecycle. Several neighbour node discovery mechanisms are proposed for reducing the latency or extending the sensor nodes’ lifetime. But majority of the existing neighbour node discovery mechanisms failed in addressing the critical issues of real WSNs related to energy consumptions, constraints of latency, uncertainty of node behaviors, and communication collisions. In this paper, Hybrid Interval Type-2 Fuzzy Analytical Hierarchical Process (AHP) and Complex Proportional Assessment using Grey Theory (COPRAS-G)-based trusted neighbour node discovery scheme (FAHPCG) is proposed for better data dissemination process. In specific, Interval Type 2 Fuzzy AHP is applied for determining the weight of the evaluation criteria considered for neighbour node discovery, and then Grey COPRAS method is adopted for prioritizing the sensor nodes of the routing path established between the source and destination. It adopted the merits of fuzzy theory for handling the uncertainty and vagueness involved in the change in the behavior of sensor nodes during the process of neighbour discovery. It is proposed with the capability of exploring maximized number of factors that aids in exploring the possible dimensions of sensor nodes packet forwarding potential during the process of neighbour node discovery. The simulation results of the proposed FAHPCG scheme confirmed an improved neighbour node discovery rate of 23.18% and prolonged the sensor nodes lifetime to the maximum of 7.12 times better than the baseline approaches used for investigation.
Article
Full-text available
With a wide scope for exploration and research, underwater wireless sensor network (UWSN) is a fast growing research area in current scenario. UWSNs need energy efficient designing approach because underwater sensor nodes are battery driven. Also the deployed batteries can not be easily recharged by non-conventional energy resources like solar energies. Clustering is an effective technique to design an energy efficient UWSNs. Due to the sparse deployment of nodes and dynamic nature of the channel, the clustering characteristics of UWSNs are different from those of terrestrial wireless sensor networks (TWSNs). In this paper, we focused on optimal clustering for UWSNs which are compliant with any one of the acoustic, free space optical (FSO) and electromagnetic (EM) wave based communication techniques. Besides, we proposed an energy dissipation model of sensor node for FSO and EM wave based communication and compared with contemporary energy dissipation model for acoustic based communication. In particular, the suitability of the above three techniques for underwater communication is investigated and their performance is compared on the basis of energy consumption and optimal clustering.
Article
Full-text available
In Underwater Linear Sensor Networks (UW-LSN) routing process, nodes without proper address make it difficult to determine relative sensor details specially the position of the node. In addition, it effects to determine the exact leakage position with minimized delay for long range underwater pipeline monitoring. Several studies have been made to overcome the mentioned issues. However, little attention has been given to minimize communication delay using dynamic addressing schemes. This paper presents the novel solution called Hop-by-Hop Dynamic Addressing based Routing Protocol for Pipeline Monitoring (H2-DARP-PM) to deal with nodes addressing and communication delay. H2-DARP-PM assigns a dynamic hop address to every participating node in an efficient manner. Dynamic addressing mechanism employed by H2-DARP-PM differentiates the heterogeneous types of sensor nodes thereby helping to control the traffic flows between the nodes. The proposed dynamic addressing mechanism provides support in the selection of an appropriate next hop neighbour. Simulation results and analytical model illustrate that H2-DARP-PM addressing support distribution of topology into different ranges of heterogeneous sensors and sinks to mitigate the higher delay issue. One of the distinguishing characteristics of H2-DARP-PM has the capability to operate with a fewer number of sensor nodes deployed for long-range underwater pipeline monitoring.
Article
Full-text available
Due to limited energy resources, energy balancing becomes an appealing requirement/ challenge in Underwater Wireless Sensor Networks (UWSNs). In this paper, we present a Balanced Load Distribution (BLOAD) scheme to avoid energy holes created due to unbalanced energy consumption in UWSNs. Our proposed scheme prolongs the stability period and lifetime of the UWSNs. In BLOAD scheme, data (generated plus received) of underwater sensor nodes is divided into fractions. The transmission range of each sensor node is logically adjusted for evenly distributing the data fractions among the next hop neighbor nodes. Another distinct feature of BLOAD scheme is that each sensor node in the network sends a fraction of data directly to the sink by adjusting its transmission range and continuously reports data to the sink till its death even if an energy hole is created in its next hop region. We implement the BLOAD scheme, by varying the fractions of data using adjustable transmission ranges in homogeneous and heterogeneous simulation environments. Simulation results show that the BLOAD scheme outperforms the selected existing schemes in terms of stability period and network lifetime.
Article
Full-text available
Most existing deployment algorithms for event coverage in underwater wireless sensor networks (UWSNs) usually do not consider that network communication has non-uniform characteristics on three-dimensional underwater environments. Such deployment algorithms ignore that the nodes are distributed at different depths and have different probabilities for data acquisition, thereby leading to imbalances in the overall network energy consumption, decreasing the network performance, and resulting in poor and unreliable late network operation. Therefore, in this study, we proposed an uneven cluster deployment algorithm based network layered for event coverage. First, according to the energy consumption requirement of the communication load at different depths of the underwater network, we obtained the expected value of deployment nodes and the distribution density of each layer network after theoretical analysis and deduction. Afterward, the network is divided into multilayers based on uneven clusters, and the heterogeneous communication radius of nodes can improve the network connectivity rate. The recovery strategy is used to balance the energy consumption of nodes in the cluster and can efficiently reconstruct the network topology, which ensures that the network has a high network coverage and connectivity rate in a long period of data acquisition. Simulation results show that the proposed algorithm improves network reliability and prolongs network lifetime by significantly reducing the blind movement of overall network nodes while maintaining a high network coverage and connectivity rate.
Article
In this paper, to monitor the fields with square and circular geometries, three energy-efficient routing protocols are proposed for underwater wireless sensor networks (UWSNs). First one is, sparsity-aware energy efficient clustering (SEEC), second one is, circular SEEC (CSEEC), and the third one is, circular depth based SEEC (CDSEEC) routing protocol. All three protocols are proposed to minimize the energy consumption of sparse regions. Whereas, sparsity search algorithm (SSA) is proposed to find sparse regions and density search algorithm (DSA) is used to find dense regions of the network field. Moreover, clustering is performed in dense regions to minimize redundant transmissions of a data packet. While, sinks mobility is exploited to collect data from sensor nodes with an objective of minimum energy consumption. A depth threshold (d th) value is also used to minimize number of hops between source and destination for less energy consumption. Simulation results show that our schemes perform better than their counterpart schemes (DBR, EEDBR) in terms of energy efficiency.
Article
In duty-cycled wireless sensor networks running asynchronous MAC protocols, the time when a sender waits for its receiver to wake up and receive the packet is the major source of energy consumption. Opportunistic routing can reduce the sender wait time by allowing multiple candidate receivers, but by doing that it suffers from redundant packet forwarding due to multiple receivers waking up at the same time. Thus, number of forwarders should be controlled in a way that overall forwarding cost is minimized considering both sender wait time and cost of redundant packet forwarding. Also, in order to prolong network lifetime, candidate forwarders should be selected so that load is balanced among nodes. We propose ORR, an opportunistic routing protocol that addresses the two issues. First, optimal number of forwarders is calculated based on forwarding cost estimation, which is derived from duty cycle and network topology. Second, the metric used for selecting forwarders considers residual energy so that more traffic is guided through nodes with larger remaining energy. The resulting routing protocol is proven to avoid loops and shown to achieve longer network lifetime compared to other protocols regardless of duty cycle and network topology.
Article
The concentration of data traffic toward sink makes sensor nodes nearby have heavier communication burden and more quickly use up their energy, leading to energy hole problem. Sink mobility can realize load balancing data delivery by changing the hotspots around the sink as the sink moves. However, sink mobility also brings about the problem of localization of sink. Frequently broadcasting of mobile sinks' position will generate significant overhead. In this paper, we propose a novel heterogeneous adaptive relay chain routing protocol with a few mobile relay nodes, which is applied to large-scale 1-D long chain network. Mobile relay node is the sink of local subnetwork. The protocol achieves the following performances. First, through scheduled movement of the mobile relay nodes, load balancing is achieved not only among sensor nodes but also among high tier relay nodes in continuous data delivery model. Second, in the context of clock synchronization among nodes, every node decides its operating state by algorithm stored in its own processor. So, there is no need for advertisement of mobile relay nodes' location. Only a few messages for clock synchronization among nodes are needed. Third, by synthetically utilizing node deployment strategy and routing protocol, base station can real-time monitoring residual energy of sensor nodes for timely maintenance, which can extend the protocol to be suitable for event-driven and query-driven data delivery models. Finally, the performances are evaluated via extensive simulations.