You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

30 August 2016

On Reliable and Efficient Data Gathering Based Routing in Underwater Wireless Sensor Networks

,
,
,
,
,
,
and
1
Institute of Space Technology, Islamabad 44000, Pakistan
2
COMSATS Institute of Information Technology, Park Road, Islamabad 44000, Pakistan
3
Cameron Library, University of Alberta, Edmonton, AB T6G 2J8, Canada
4
Internetworking Program, FE, Dalhousie University, Halifax, NS B3J 4R2, Canada
This article belongs to the Special Issue Scalable Localization in Wireless Sensor Networks

Abstract

This paper presents cooperative routing scheme to improve data reliability. The proposed protocol achieves its objective, however, at the cost of surplus energy consumption. Thus sink mobility is introduced to minimize the energy consumption cost of nodes as it directly collects data from the network nodes at minimized communication distance. We also present delay and energy optimized versions of our proposed RE-AEDG to further enhance its performance. Simulation results prove the effectiveness of our proposed RE-AEDG in terms of the selected performance matrics.

1. Introduction

Underwater WSNs are getting their deserved economical, social and ecological importance due to its extended range of applications such as seismic monitoring, data logging, military applications, disaster management, etc. For UWSNs multiple unmanned underwater vehicles are deployed to form a network. Deployed sensors form a collaboration and help humanity in underwater resources’ exploration. Generally these nodes are equipped with the required sensors and are responsible for collection of scientific or environmental information from the defined atmosphere.
Under water is a harsh environment and poses a lot of unique challenges [1,2] like higher latency, greater attenuation levels, higher transmission energy, lower data authenticity, difficult extraction of data, unexpected failure of node, limited availability of bandwidth, confined battery power, etc. Therefore, to communicate data in underwater environment radio signals require larger antennas and demand higher transmission power which is purely unfeasible. Aforementioned are the few reasons acoustic channels are considered to be more appropriate for UWSN communications as compare to radio waves [3]. For an underwater environment they are proved to be immune towards attenuations, signal distortion, end to end delays, higher BER due to multi path fading, etc.
A number of protocols have been designed by the scientists to affix the above stated issues. Whereas; the key point to insight here is that, un till now most of the designed protocols works on the network’s energy conservation while does not contributes towards higher level data reliability. Keeping all that challenges in mind a protocol was required that should be well organized, cost effectual and handles energy to upgrade the data validity factor for enhanced outcomes. Therefore, as a consequence of these mentioned features we propose a routing protocol named as RE-AEDG. It is focused on magnifying the system reliability by improvement in throughput rate and successful packets delivery ratio at the surface sink. Moreover, in order to attain the stated objectives, a strategy known as cooperative routing is applied in RE-AEDG. This scheme is appropriate because it substantially boosts the spectrum utilization without placing any extra cost liability over the system.
In cooperative routing, each in range node plays the role of a potential relay and eventually the destination receiver hears the packets from multiple transmitters. It combine them using some predefined diversity combining techniques e.g., Maximal Ratio Combining technique (MRC), Equal Ratio Combining technique (ERC) and others [4,5]. However, these all advantages comes at the cost of faster battery power dissipation mechanism that leads towards an ill-favored state known as energy-hole problem.
Mobile sink appears to alleviate this problem through network load balancing. Furthermore, it cuts short the communication paths through eliminating source and destination connection. Although the mobile sinks are highly desirable due to lots of advantages they pose in terms of network lifetime and throughput, their mobility mechanism causes a-lot of challenges in system designing process, moreover, complicates the efficient distributed data routing. Controlled sink mobility restricts the path selection frequency hence, reduces the protocol overhead caused by sink mobility.
The rest of the paper is organized as follows. Section 2 describes related work; overview of counterpart schemes is given in Section 3; Section 4 presents underwater acoustic communication models; Section 5 presents system model; Section 6 discusses the proposed scheme; Section 7 deals with possible relay selection; Section 8 describes AUV trajectory and Section 9 defines the optimization models for the proposed scheme; Section 10 elaborates the applications of the proposed model; In Section 11, performance efficiency of the proposed scheme is validated via simulations. The hierarchy of paper is also presented in Figure 1.
Figure 1. Paper hierarchy.

3. Overview of Counterpart Schemes

AEDG and LVRP are chosen for comparison because of their conceptual relevancy with RE-AEDG. In LVRP a model is designed which considers multiple mobile sinks following unconstrained sink trajectories. In the data transmission process control packets are generated in order to track the recent sojourn stop of sink. In LVRP, the major objective is to minimize the packet overhead, caused due to the flow of these control packets. Therefore, at LVRP the packet overload is reduced through proper linking of an anchor node to the sink. Anchor node gathers the data on the behalf of sink and the sink issues new routing updates only when it switches its sojourn stop and no more remains in its transmission range. It is selected through proper election from the nearest member nodes, moreover; it is a casual node and is responsible for making a connection between nodes and sink.
Whereas in AEDG, heterogeneous nodes are deployed in vicinity of a predefined elliptical AUV trajectory, nearer nodes are GWs and the farther ones are MNs. GWs gather data from MNs and hold it until AUV approaches them. Deployment of GWs reduces the control packet overhead as lesser number of nodes track the recent AUV locality. MNs form a chain among themselves with a GW node as chain head. Moreover, number of nodes connected in a chain is also restricted to avoid longer intercommunication distances. Conservation of energy is the distinguishing factor of AEDG. Thus the design objective of our proposed technique is the effective utilization of that conserved energy to intensify network’s operational efficiency in terms of network lifetime and throughput rate. Pictorial view of AEDG and LVRP with single AUV is shown in Figure 2.
Figure 2. Network architecture.

4. UWSNs: Communication Models

As discussed in the introduction section, the characteristics of acoustic wave propagation are different from the characteristics of radio wave propagation. Thus, precise models are needed.

4.1. Attenuation Model

Underwater acoustic signals experience power level degradation. Attenuation is calculated for distance “R” in meters and frequency “f” in KHz and is given as follows:
A ( R , f ) = R k a u ( f ) R
a u ( f ) is measured in dB/km where as k differs with geometry of propagation. It is 2 and 1 for spherical and cylindrical spreading respectively [38,39,40]. The absorption coefficient a is calculated using Thorp’s empirical formula:
10 l o g a ( f ) = 0.11 f 2 1 + f 2 + 22 f 2 4100 + f 2 + 2.75 × 10 4 f 2 + 0.003

4.2. Transmission Loss Model: Deep and Shallow Water

Transmission loss also known as propagation loss, defines the decrease in energy level of signal as wave propagates through the specified medium. For shallow water, the propagating acoustics signals experience cylindrical spreading [41,42].
For shallow water transmission loss is calculated as follows:
T L = 10 l o g ( R ) + a u ( R ) × 10 3
For deep sea transmission loss is calculated as follows:
T L = 20 l o g ( R ) + a u ( R ) × 10 3

4.3. Noise Model

Underwater noise is due to three main factors: scattering, absorption and spreading loss. These losses are mainly caused by unsteady movement of water, ships motion for the sake of tourism or trade, military operations, etc.
Total noise power spectral density is calculated in the following set of equations:
N L ( f ) = N t ( f ) + N s ( f ) + N ω ( f ) + N t h ( f )
whereas;
10 l o g N s ( f ) = 40 + 20 ( s 0.5 ) + 26 l o g ( f ) 60 l o g ( f + 0.03 )
10 l o g N ω ( f ) = 50 + 7.5 ω 1 / 2 + 20 l o g ( f ) 40 l o g ( f + 0.4 )
10 l o g N t h ( f ) = 15 + 20 l o g ( f )
All the four noise factors directly depend on frequency, that’s why fluctuation in frequency effects the communication undergoing the environment.

5. System Model

Figure 3 shows that nodes are randomly deployed in the network field. Depending upon the features that are represented in Table 2, we categorize the network nodes into member nodes (MNs), gateway nodes (GNs) and autonomous underwater vehicle (AUV). In this work, the following assumptions are made:
  • MNs continuously sense the required information from the surroundings.
  • Nodes repeatedly measure their residual energies and deliver their energy states towards their predecessors using a control packet.
  • Upon reception of location information from the in-range nodes, each member node maintains and updates its neighbors list.
  • Nodes are capable to accept or discard a packet on the basis of BER. To enhance the data reliability they may also ask forsingle or double retransmissions of the erroneous data packet from the sender node.
Figure 3. Network architecture.
Table 2. Attributes of types of deployed nodes.
Furthermore, we use three different transmission ranges that correspond to different regions called slices. Nodes that belong to the same slice are the Sibling nodes.
Rule 1: 
Sibling nodes are restricted to do not exchange data packets with each other.
This rule minimizes the number of hops between source and destination nodes. However, eligible neighbors are also minimized in number. This situation is highly undesirable during later simulation time when most of the network nodes are dead. To avoid this situation, an intermediate rule is defined, which provides the solution by dividing the 1st slice further into two layers. Layering is conducted by partitioning the width of slice 1 into two regions, such that upper and lower region of 1st slice makes the 1st and 2nd layer respectively. Source node itself lies in the 2nd layer.

6. RE-AEDG: The Proposed Scheme

With the help of heterogeneous nodes’ deployment and a central AUV, AEDG proved its improved network performance in terms of network energy consumption and E2E delay. However, factor of reliability has not been considered much while network designing. Therefore, in this paper we propose RE-AEDG which is the improved version of AEDG in terms of data reliability. RE-AEDG takes the advantage of that conserved energy and better utilizes it for secured data transmission at the destination node.
Underwater networks are generally harsh environments consisting of larger area networks. While considering the limited energy of nodes, data transmission in this sort of network could be challenging. Therefore, underneath is the proposed scheme for RE-AEDG that shows how nodes are deployed and grouped together to create network layers for relatively convenient data collection and transmission process. Let N denotes the set of sensor nodes; N = n whereas, deployed network nodes are fairly portioned into N U a n d N L . For further elaboration consider a deployed node i that may belong to N U or N L depending upon the following conditions:
i ϵ N U i f d ( i ) 1 2 ( D e ) N L i f d ( i ) > 1 2 ( D e )
where, d ( i ) be the depth of considered node and D ( e ) be the depth of the network under examination. Furthermore, the above written equation states that a node i belongs to the set of upper nodes if its depth is lesser or equals to half of the network’s depth and belongs the set of lower nodes otherwise.
Right after the completion of the deployment phase, the hand shaking process begins among nodes. Nodes broadcast a control packet in their surroundings that includes its ID, residual energy and depth information. Surrounding in-range nodes of the source node receive the packet and check for eligible neighborhood criterion which is as follows:
Rule 2: 
j ϵ N i ^ i f i ϵ N U a n d d ( i ) d ( j ) o r i f i ϵ N L a n d d ( i ) > d ( j )
This rule states that j belongs to the neighboring list of i if the following conditions are fulfilled. Stated as:
  • i belongs to the upper node’s list and depth of i is less than the depth of j.
  • i belongs to the lower node’s list and depth of i is higher than the depth of j.
For convenient data transmission process and energy conservation, transmission range of the source node is divided into three slices such that the first slice contains source node itself and possible cooperating nodes η c , the second slice also contains possible cooperating nodes η c (see Figure 4 whereas, the third slice contains η d only.
Figure 4. Slicing of transmission range of source node.
It is stated that neighboring node of a source node consists of possible cooperating and destination nodes N i ^ = η c + η d . This rule qualifies source node to transmit data such that only eligible cooperating nodes receive and compute that packet whereas eligible destination nodes discard it immediately and thus conserves energy. In the reference of i as a source node now consider a node j that may belong to η c or η d depending upon the conditions written as follows:
j ϵ η c i f d t h α < | d j d i | < d t h β i , j ϵ N η d i f | d j d i | > d t h β i , j ϵ N
where d t h α and d t h β (positive real numbers) are two thresholds that change according to current node density. Regarding nodes’ density two possibilities arise here;
  • Node density is greater than the marginal value,
  • Nodes density drops to the marginal value.
Whereas, marginal value is equivalent to half of the total number of deployed nodes.
Moreover, as stated earlier, the threshold values are dynamic in nature therefore; initially the difference between the two thresholds is kept low so that lesser nodes fulfills the eligible neighborhood criterion. This causes energy conservation as lesser nodes receive the information being sent by the source node. However, with the passage of time nodes deplete their energies and at that instant keeping lower difference among thresholds would not be a good approach. This is due to the fact that the source node is unable to find sufficient neighbors around and remains unattended. This situation could lead to a degraded reliability factor due to fewer or non availability of cooperating nodes. Hence, as a solution of sparsity we keep on increasing the threshold difference. Therefore, our proposed model is adaptive in this aspect. Mathematically,
d t h α d t h β > δ i f N 1 / 3 ( N ) Ω < d t h α d t h β < δ i f N > 1 / 3 ( N )
where, ω and δ are real numbers.
For our proposed model, another important feature is the GWs involvement. GWs are nodes with relatively higher initial energy levels as compare to MNs. This is because of the reason that in our technique, each node transmits its own data packet as well as the data packets being generated by the predecessor nodes. Since data forwarding burden is highest on the chain heads which causes their rapid early energy depletion and leads to shorter network lifetime and stability period. Moreover, AUV also assists the process while moving on its predefined trajectory and collecting and forwarding data from GWs towards sink. AUV ensures data communication at minimized distance leading to network lifetime prolongation and it takes stops at specific positions known as sojourn locations for specific time called sojourn time.

7. Relays Selection

Relays selection is another basic concern of our proposed protocol since proper relays selection immensely contributes in network’s enhanced performance. Multiple protocols have been suggested up-till now that incorporates relay selection method to achieve specified parameters considering different factors e.g., number of alive neighbors, node’s energy, node’s depth and others. However, as our main objective is the network’s energy conservation and data reliability, therefore, considering these parameters our protocol selects relays by keeping in view the channel characteristics and depth information of nodes. Furthermore, in order to ensure successful packet acceptance at the destination, all nodes are enabled to demand for two retransmissions of a single received packet. This is done via transmitting NACK1 and NACK2 in consecutive phases.
A new set B c is generated by the following steps:
  • Sender nodes broadcast the packet in their respective transmission ranges.
  • Nodes residing in the list of possible cooperation set takes part in cooperation process one by one.
  • If BER exceeds the threshold value , receiver sends NACK message towards the sender node as well as the source node.
  • Source node updates the history of wireless link quality based on the number of retransmission requests.
  • We assume a slow and flat Rayleigh faded environment.
  • B c is updated occasionally depending upon the weight updates carried out for that specific path.
  • In this way multiple cooperating nodes are available to cooperate with the sender node.
In our suggested technique, relay communication takes place in two stages as depicted in Figure 5. In the first stage, the source node broadcasts whereas cooperative and destination nodes receive that packet. Upon reception, the cooperative node uses AF to relay the received data. In comparison to DF, AF requires reduced E2E delay as the relay node operates time-slot by time-slot [43]. Moreover, AF demands lesser computational powers because of absence of decoding and quantizing at the relay node. In secondary stage, this processed data is re-forwarded towards the destination. Upon reception, the destination node applies the Maximal Ratio Combining technique (MRC) over the entire copies of received packets. MRC is adopted because it is the optimum combiner for independent AWGN channels. MRC functions by adding the signals such that different proportionality constraints are employed for each channel.
Figure 5. Cooperative diversity system.
Suppose η c consists of two nodes ( C 1 and C 2 ), x is the original message signal being transmitted and AF is used as a cooperative relay model, then:
S S , D ( t ) = α S , D x ( t ) + n S , D ( t )
S S , C i ( t ) = α S , C i x ( t ) + n S , C i ( t ) , C i ϵ η C
S C i , D ( t ) = α C i , D x ( t ) + n C i , D ( t ) , C i ϵ η C
Considering the above equations, S S , D ( t ) be the representation of a signal being sent from S and received at D. Whereas, S S , C i and S C i , D be the signals sent from S towards C i and from C i towards D respectively. Moreover, α S , D and n S , D be the channel gain and channel noises existing on the link in between S and D whereas α S , C i and n S , C i be the channel gain and channel noises in between S and C i respectively. Similarly, α C i , D and n C i , D be the channel gain and channel noises existing at the C i and D link.
In order to mitigate the impact of fading over the received signal, receive diversity is employed in our protocol. Thus, the probability that all the copies of that signal get faded is minimized. Initially, nodes broadcast control packets and maintain the neighboring list. Soon after, the destination and cooperative nodes are finalized (Algorithm 1).
Algorithm 1 : RE-AEDG
1:procedure: NODE-INITIALIZATION
2:MinorAxisb
3:MajorAxis ← 2b
4:CentralPoints x 0 , y 0
5:Energy(MemberNodes)μJ
6:return TRUE
7:end procedure
8:procedure: GATEWAY-NODE-SELECTION
9:GWsNodeliesInTheRangeOfSinkNode
10:if Node.GWs = TRUE
11:E(GWsNode)E(MemberNodes) + ζ
12:return TRUE
13:end procedure
14:procedure: NEIGHBOR-FINDING-MODULE
15:if d(i) > 1 2 ( L e n g t h O f N e t w o r k ) and d(i) > d(j)
16:ϕ d ( i ) d ( j )
17:elseif d(i) < 1 2 ( L e n g t h O f N e t w o r k ) and d(j) > d(i)
18:ϕ d ( j ) d ( i )
19:end if
20:if ϕTxRange
21:NeighborFound = TRUE
22:return TRUE
23:end procedure
24:procedure: NEXT-HOP-FINALIZATION
25:ϑ = and (Neighbor, GWsNode)
26:if SumOf(ϑ)1
27:NextHopMinimumOfDownNeighbors(ϑ)
28:elseif SumOf(ϑ)1
29:NextHopMinimumDepthNeighbor
30:elseif ϑ = = FALSE and NodeIsGWsNode
31:NextHopSink
32:end if
33:return TRUE
34:end procedure
35:procedure: BIT-ERROR-CHECK
36:if BEROfPacketThreshholdBER
37:PacketAccepted
38:elseif BEROfPacketThreshholdBER
39:PacketDiscarded
40:return TRUE
41:end procedure
42:procedure: PACKET-RESEND-REQUEST
43:if BEROfPacketThreshholdBER
44:if PacketResendRequest == 0 or 1
45:SendPacketResendRequest
46:PacketResendRequest = PacketResendRequest + 1
47:end if
48:end if
49:end procedure
The source nodes broadcast sensed data within their transmission ranges. The receiver node checks the BER of the packet; if it exceeds the threshold BER (0.5 out of 1) then it drops the packet immediately and asks the sender node for re-transmission. If it is not the case then the cooperative nodes apply the AF mechanism and re-broadcast the packet. As soon as the destination nodes receive the required copies of packet, these apply the MRC technique. After the required processing, the destination node re forwards the packet. This process continues till data reaches the AUV.

8. Sink Trajectory

Successive retransmissions in cooperative routing lead to excessive energy consumption of the network nodes, which is unfavorable due to limited battery capacity of nodes. In order to mitigate this issue, we use mobile sink which moves on an elliptical trajectory [44]. AUV cooperates with MNs and GWs such that it goes to the near locality of GWs, receives the data packets and conveys them towards the surface sink. In this way, the overall communication distance is minimized. We consider an elliptically trajectory with horizontal major axis, such that;
( x x o ) 2 M A U V 2 + ( y y o ) 2 m A U V 2 = 1
and;
M A U V = 2 × m A U V
Foci points for non centered ellipse are defined at ( ± c , y o ) and ( ± c , y o ) and vertices of ellipse are at ( ± a , y o ) and ( ± a , y o ) whereas, c = M A U V 2 m A U V 2 and x and y show the running time coordinates of AUV and they are scaled using the following equations:
( 18 a ) x = x o + M A U V C o s ( θ ) ( 18 b ) y = y o + m A U V S i n ( θ )
where θ is the angle that AUV makes with the center of ellipse as shown in Figure 6.
Figure 6. Sink mobility pattern.

9. RE-AEDG: Optimization Models

In this section, we discuss an energy consumption model and a delay optimization model to overcome the limitations of cooperative communication technique and mobility assisted routing.

9.1. Delay Minimization Model

Our proposed RE-AEDG implements cooperative communication to improve reliability while paying the cost of energy consumption and data latency. After energy consumption minimization model in the previous sub section, we present delay minimization model in this portion of paper.
Min i = 1 n D y i i ϵ N
Subject to:
( 19 a ) d t h d i h i T x R i ϵ ( M N s | | G W s ) ( 19 b ) 0 h i h m a x i ϵ M N s ( 19 c ) d i h i d i η i ( 19 d ) t m i n S t t m a x ( 19 e ) 0 ρ h i ρ t h i ϵ M N s ( 19 f ) 0 H i H m a x i ϵ ( M N s | | G W s ) w h e r e a s H = 1 R e × d i h i ( 19 g ) P i ( t ) C c a p i ϵ ( M N s | | G W ) ( 19 h ) M A U V 1 3 W n e t
Our objective in Equation (19) is to minimize the time delay created in data transmission process. Equation (19a) defines that depth difference between i and its next hop h i must remains in between depth threshold and predefined transmission range. Whereas depth threshold is kept to a value, such that sender node may not be able to define its priority node at an extremely near vicinity. Applicability of this law causes larger depth difference between transmitter and receiver which in turn results in greater energy consumption and lowered delay. This can also be written as DNo.o f hops. Equation (19b) indicates that the total no. of hops a packet requires to reach destination must not exceed than the maximum allowable no. of hops. Implementation of this clause prevents extra per packet network energy consumption. Equation (19c) depicts that depth difference in between i and h i must be maximum out of Eligible Neighbors set. This rule in incorporated because transmission at lower distance node increases packet transmission reception rate. Equation (19d) states that sojourn stop time for an AUV must be an optimum duration. Failing to implement this constraint causes GWs to hold packets for larger time which causes extensive delays. Equation (19e) shows that if a node has lesser number of predecessor nodes then queuing delay for packet sufficiently reduces which in turn leads to lowered processing delays. For the purpose of delay optimization Equation (19f) suggests that holding time of a packet must be an optimum value. Moreover, it also states that nodes with higher residual energy have lower holding time. Therefore, lowered energy nodes also prevents them from data transmission by holding this specified clause. Equation (19g) indicates that packets being generated by i at time t must not exceeds the channel capacity. This clause mitigates the channel congestion possibilities and lowers overall packets drop rate. Implication of this law lowers data re-transmissions probability. Equation (19h) defines that major axis of sink trajectory must cover at least one third portion of the network width, this causes reduced transmission distance between source and destination nodes.

9.2. Energy Consumption Minimization Model

In order to improve PAR at the destination, our proposed model incorporates cooperative communication technique, however; at the cost of excessive energy consumption. Thus, our objective to minimize the energy consumption cost is formulated as follows:
Min i = 1 n E i i ϵ N
Subject to:
( 20 a ) 0 ρ h i ρ t h ( 20 b ) h i = z i f d i , z T x R i ϵ M N s & z ϵ G W s j i f d i , z T x R i , j ϵ M N s & z ϵ G W s ( 20 c ) R e h i R e N i ^ h i ϵ w i d e h a t N i i ϵ M N s ( 20 d ) P e m i n P e P e m a x ( 20 e ) h z = A U V z ϵ G W s
Our objective in Equation (20) is to minimize the overall network energy consumption. Equation (20a) indicates that the number of predecessor nodes of the selected hop of i should be less than or equal to the predefined threshold predecessors. Therefore, it causes equal data flow burden among nodes. Violation of this rule can cause an extensive data flow at a node and may result in enhanced energy depletion and a shorter network stability period. Equation (20b) illustrates that if z is a GW and it lies inside transmission range of a sender node i then z would be a preferred node. Hence, number of hops a packet takes to reach to the destination are lowered resulting is lesser energy consumption is single packet transmission process. Equation (20c) provides the the balanced energy consumption among nodes. It depicts that next hop of i should have maximum residual energy out of the Eligible Neighborhood set of a node. Equation (20d) defines that per packet energy consumption P e should be an optimum value, provided the upper and lower bounds P e m i n and P e m a x of per packet energies. This energy bound limits transmission distance among communicating nodes. Equation (20e) states that for z being a GW the next hop is always an AUV and no inter-hop communication exists between the two GWs. Failing to implement this clause can enhance the number of retransmissions of data packets and as a result an increased energy consumption.

10. Applications of Proposed Methods

The proposed model can be used for most of the applications that can tolerate additional delays however, requires lesser average energy consumptions and desires the network to remain operational for longer duration of time e.g., Oceanography, seismic predictions, pollution detection, oil/gas field monitoring and others. Moreover, implementation of our proposed architecture is also feasible for data sensitive applications such as tactical surveillance and navigation, etc.
Along with all the above mentioned applications our proposed energy consumption optimized version is also cost effective because it performs long term aquatic monitoring and requires lesser replacement and recharging of batteries. Besides that delay optimized method has better applications where data provision at central unit is desired in lesser time while insuring information reliability such as earthquake sensing, tsunami detections, military applications and others.

11. Simulation Results and Discussions

In this section, we assess the performance efficiency of RE-AEDG in comparison of other two protocols; U-LVRP and AEDG. LVRP is a protocol designed for terrestrial WSNs. It is chosen because its layering layout resembles our schematic in many aspects. We have simulated LVRP in underwater environment (U-LVRP). In the simulations we considered a 500 m × 500 m network field. The other selected simulation parameters are depicted in Table 3.
Table 3. Simulation specifications for RE-AEDG.
We chose the following performance matrices.
  • Network lifetime: Time in which network is considered to be operational. i.e., from network configuration till the death of last node. It is calculated in seconds.
  • Stability period: Time (in second) from network establishment till the death of last node.
  • PAR: It is the ratio of total number of packets reached at the sink to the number of packets being sent by sink in specified interval.
  • Throughput rate: Throughput is defined as the number of packets successfully reached the water surface sink. It is measured in packets per second.
  • E2E delay: It is the time taken for a packet to be transmitted across a network from source to destination.

11.1. Results and Discussions

The discussions are divided along two sub sections where the originally designed protocols are examined along with their delay and energy optimized versions.

11.2. Non Optimized and Delay Optimized Protocols

This portion evaluates the performance of non-optimized in contrast to delay optimized protocols. Plots and their discussions are as follows.

11.2.1. Throughput and PAR

RE-AEDG has maximum throughput both in optimized and non optimized versions. In RE-AEDG, presence of GWs at both sides of AUV and sink trajectories highly influence the number of packets that successfully reach sink in a given time interval. In RE-AEDG, AUV comes in the near vicinity of the nodes causing the GWs to be selected nearer the MNs. As a result, the number of hops and the required re-transmissions decreases significantly. In addition to that shorter communication routes also lower the probability of data collision and causes the loss of sensitive information; as shown in Figure 7 and Figure 8.
Figure 7. PAR in delay optimized and non optimized protocols.
Figure 8. Packets received at sink in delay optimized and non optimized protocols.
In the figures, AEDG shows an intermediate state PAR due to the fact that it does not involve cooperative routing mechanism in its transmission process. Hence, it has lowered number of packets received at sink and PAR as compare to RE-AEDG. Whereas; for U-LVRP random movement of AUVs demand the nodes to dynamically define their communication paths. Therefore, a relatively higher packet drop rate is observed for this scheme as compare to the other protocols.
Furthermore, the implication of d t h is also visible in the optimized version of the schemes in terms of their lowered PAR and the number of packets being received at sink. d t h reduces the size of eligible neighbourhood set for sender nodes and sometime causes them to stand alone in network specifically when the network becomes sparse.

11.2.2. E2E Delay

From Figure 9, it is clear that the delay optimized versions of the protocols show lower delay than their respective non-optimized versions. In both versions of AEDG and RE-AEDG, the GWs are the major cause of delay. RE-AEDG-Dopt shows the highest computational and holding delays as the nodes in RE-AEDG carry out the cooperation.
Figure 9. Message latency in delay optimized and non optimized protocols.
Whereas, U-LVRP’s random AUV motion causes an increased overhead on the nodes to dynamically select their routing tracks. At every sojourn stop, anchor node reselection also results in higher computational delays. Thus these are the major delay creation factors for both versions of U-LVRP. The steep behavior for both curves of U-LVRP is because they initially lead to rapid network sparseness. Sparseness influences delays because nodes need to compromise their priority for neighbor node selection. However, with the passage of time nodes in U-LVRP start energy conservation causing rapid reduction in delays as compared to the other two protocols.

11.2.3. Death Rate of Nodes and Rate of Energy Utilization

In Figure 10, AEDG shows rapid sparseness due to absence of optimized AUV trajectory. Moreover, for AEDG no restriction is implemented on the number of predecessors that can be attached to a node. Therefore, over burdened nodes discharge their batteries earlier causing predecessors to search for some other non feasible cooperating node. This causes nodes’ energy depletion at an earlier stage.
Figure 10. Death rate of nodes in delay optimized and non optimized protocols.
Figure 11 shows that despite cooperative routing in RE-AEDG, AEDG initially shows comparatively equivalent energy dissipation rate, however, afterwards it depicts comparatively reduced network energy consumption. This happens because of the AUV trail in RE-AEDG: it employs an extended AUV trail so that it may select the GWs from both sides of its trajectory covering more number of MNs and supporting them in data gathering and communication phase. Later on the reduced energy consumption of AEDG is because of the fact that with the passage of time its packet drop rate increases (Figure 8) causing lesser packet forwarding burden on the intermediated nodes and consequently lesser network energy consumption. AEDG also remains with lower alive number of nodes causing per instance reduced energy consumption.
Figure 11. Energy consumption in delay optimized and non optimized protocols.
AEDG-Dopt shows the minimum energy consumption because of optimized version of sink trajectory and predecessors attached to a specific node. On the other hand, U-LVRP consumes relatively higher energy. In-spite of random motion of sink U-LVRP-Dopt still shows reduced energy consumption. Delay optimization also leads to lower energy consumption in AEDG and RE-AEDG because the number of predecessors attached to a node (Equation (19e) and Equation (19b)) that restricts the maximum number of hops a data packet travels form source to destination. Figure 10 also strengthens our claim by depicting the relative number of nodes died among different protocols per interval of time.

11.3. Non Optimized and Energy Optimized Protocols

This portion analyzes the energy optimized and non optimized versions of the selected protocols. Plots and their discussion are presented as follows.

11.3.1. Number of Alive Nodes and Network Energy Consumption

In RE-AEDG, the defined sink trajectories and higher number of GWs lead to prolonged network lifetime. Initially both versions of U-LVRP protocol show less difference in energy consumption but with the passage of time the difference gets higher. This is due to the fact that initially nodes find their neighbors in their vicinity. However, with the passage of time the number of nodes in the network decreases. Ultimately, increased transmission distance between the neighboring nodes results on higher energy consumption of the sender node. On the other hand, for optimum RE-AEDG and AEDG, nodes create links by updating the number of predecessors already attached with the neighbor under consideration. This check reduces the packet reforwarding burden on the nodes. Eventually, the energy consumption is balanced in the network. Avoidance of intercommunication between the GWs leads to enhanced stability period as shown in Figure 12 and Figure 13. In RE-AEDG-Eopt, the lowest energy consumption depicts that the cost being payed for achieving higher throughput rate could be minimized through controlled optimization process.
Figure 12. Number of alive nodes per interval in comparison to energy optimized protocols.
Figure 13. Energy consumption in energy optimized and non optimized protocols.

11.3.2. Packets Loss and PAR

To minimize energy consumption we employ a constraint Equation (20a) that limits the predecessors attached to every node. However, there exists a tradeoff between energy utilization and packet drop rate. It is to note that, although energy remains conserved in optimized protocols but at the cost of high packet drop rate due to inability of sender node to find the next hop node. RE-AEDG shows the minimum packet drop rate because AUV itself comes in the vicinity of nodes and shortens their communication path. Eventually, lowered packet collision rate and improved reception of data at destination. Additionally; more the number of packets being generated more is the possibility of successful packet reception at sink. Since the packet drop rate is measured only for alive nodes, therefore; the down fall of the packet drop curves in Figure 14 and Figure 15 shows the rate at which the network becomes sparse.
Figure 14. PAR of networks in energy optimized and non optimized protocols.
Figure 15. Packets drop rate in energy optimized and non optimized protocols.

11.3.3. E2E Delay

In the Figure 16 it is visibly shown that both versions of AEDG have induced higher E2E delay as compared to RE-AEDG. This is due to the fact that data reaching at their respective gatherer stays there for the time until AUV approaches to them. Moreover for AEDG, AUV track is smaller as compare to RE-AEDG so; the intercommunication distance between the source and destination node (AUV) is enlarged. Whereas for RE-AEDG, threshold based neighbors assignment to a node leads to comparatively reduced queuing delay. This is because it specifies the number of predecessor nodes that could be attached to another node. Thus, the E2E delay of RE-AEDG is relatively lesser than both versions of AEDG. However, despite of the random movement of AUVs in U-LVRP the presence of two of mobile sinks normalizes the additional message latencies created by dynamic selection of communication routes between nodes and AUVs.
Figure 16. E2E delay in energy optimized and non optimized protocols.

12. Performance Tradeoffs

AEDG provides a good throughput rate due to the involvement of GWs and AUV. AUV itself visits the GWs and gathers data from them, thereby, increasing the throughput. This throughput improvement in AEDG is achieved at the cost of higher energy consumption and greater message latency. Both are caused by predefined but non optimized trail followed by AUV in the protocol. On the other hand E2E delay for AEDG is minimized by applying a set of constraints but for AEDG-Dopt the considered network shows degraded PAR. Implication of d t h is visible here. It reduces the number of hops that a packet takes while reaching to sink but it also reduces the eligible neighbors for the sender node. Similarly AEDG-Eopt performs better in terms of energy conservation at the cost of low PAR. For energy optimization Equation (20a) is applied which limits the number of predecessors attached with a node. This saves computational powers at receivers but highly effects the PAR.
RE-AEDG shows better throughput but depicts higher delays in data packet arrival at the sink. One of the two reasons is the involvement of cooperative communication mechanism. Whereas, the other is that the GWs hold data for more amount of time causing the extended E2E delays. To suppress the above mentioned deficiency, we optimized the RE-AEDG scheme for minimized delay but it pays the cost of lowered packet delivery at the sink. In delay optimization, d t h reduces the network performance in terms of data throughput. Similarly, RE-AEDG-Eopt conservers the overall network energy but enhances the packet drop rate. This is due to the restricted number of hops a data packet could avail on its one way path.
Two AUVs that aid MNs and GWs in data transmission phase causes them to remain alive for a longer duration. However, in spite of this stated argument the ULVRP’s performance is still the worst in terms of throughput achievement. This is because the AUVs that take random sojourn stops, lead towards an interference in the voronoi scope of each other. Their random movement causes repeated selection and reselection of data path for nodes hence, reduced data arrival rate at sink. ULVRP-Dopt achieves advancement in delay at the cost of increased energy consumption because d t h assigned to nodes causes the hops at farther distance.
RE-AEDG has higher PAR due to incorporation of cooperative communication. RE-AEDG-Eopt has lesser E2E delay because queues for every node are limited in this case. The AEDG has better throughput at the cost of delay. A comprehensive over view of performance tradeoffs is shown in Table 4.
Table 4. Performance tradeoffs.

13. Conclusions

In this paper, we have presented the RE-AEDG protocol for UWSNs. The RE-AEDG employs the cooperative routing scheme to improve reliability of data. However, the introduced cooperative routing leads to high energy consumption of nodes. In order to solve this problem, mobile sink is used for data gathering. Also, to further reduce the cost being paid, two optimized versions of RE-AEDG are presented catering the issues of high energy consumption and high E2E delay. Simulation results demonstrate that RE-AEDG has improved data reliability as compared to AEDG and U-LVRP. In the terms of energy consumption and message latency, optimized versions of RE-AEDG perform better than the selected existing techniques.
RE-AEDG induces additional message latencies, comparative to the counterpart schemes. Since relay selection highly affects the network performance, therefore, a more comprehensive relay selection model to overcome this limitation is under consideration. Moreover, the sink mobility and sojourn time for AUV can be optimized further to reduce the E2E delay.

Author Contributions

Tayyaba Liaqat, Mariam Akbar, and Nadeem Javaid proposed main idea. Tayyaba Liaqat performed simulations. Umar Qasim, Zahoor Ali Khan, and Qaisar Javaid did mathematical formulations. Turki Ali Alghamdi and Iftikhar Azim Niaz decided flow of and refined the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

WSNsWireless sensor networks
UWSNsUnderwater wireless sensor networks
AUVAutonomous underwater vehicle
C-ARQCooperative automatic repeat request routing protocol
SRCSelective relay cooperation
DNCDynamic node cooperation based protocols
COBRACooperative best relay assessment
EASREASR
(ACH)2Adaptive clustering habit
CoUWSNCooperative Energy-Efficient Protocol for Underwater WSNs
BTMBalance Transmission Mechanism
SEECHScalable Energy Efficient Clustering Hierarchy
EDITEnergy Delay Index for Trade-off
LAFRLink-state based Adaptive Feedback Routing for UASNs
IAMCTDImproved Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR
AURPAn AUV-Aided Underwater Routing Protocol
SPARCOStochastic Performance Analysis with Reliability and Cooperation for UWSNs
LESCALocation-Energy Spectral Cluster Algorithm
WDFAD-DBRWeighting depth and forwarding area division DBR
BLM-MCTBoundary detection for large-scale coverage holes in WSN based on minimum critical threshold constraint
GAECHGenetic Algorithm Based Energy Efficient Clustering Hierarchy in WSNs
GPNCGeographic and partial network coding based routing protocol for UWSNs
DEADSDepth and energy aware dominating set based algorithm for cooperative routing along with sink mobility
AEDGAn efficient data-gathering routing protocol
LVRPLayered voronoi scoping-based routing protocol
RE-AEDGReliable AUV-aided Efficient Data Gathering Routing Protocol for UWSNs
DoptDelay optimized
EoptEnergy optimized
AFAmplify and forward
DFDecode and forward
MRCMaximal ratio combining technique
ERCEqual ratio combining technique
GWsGateways
MNsMember nodes
NACKNegative acknowledgement
DimDimensional
BERBit error rate
PARPackets acceptance ratio
SNRSignal to noise ratio
E2EEnd to end
ItranAcoustic intensity at transmitter
IreceiverAcoustic intensity at receiver
RDistance between transmitter and receiver (m)
auAbsorption coefficient
fFrequency (KHz)
kSpreading factor
NsShipping noise
NwWind noise
NthThermal noise
NtTurbulence noise
SSource node
CCooperating node
DDestination node
sSlice
E S s 1 Energy consumption at S for sending data towards slice 1
E S s 2 Energy consumption at S for sending data towards slice 2
E S s 3 Energy consumption at S for sending data towards slice 3
S e 1 Total sensors belonging to first layer
nTotal number of nodes
NSet of n nodes
NUNodes deployed above to the center of the deployment field
NLNodes deployed below to the center of the deployment field
DeDepth of the field
dDepth between the transmitter and surface sink
N ^ Set of neighbors
N′Alive nodes
ηcPossible cooperating nodes set
ηdPossible destination nodes set
BcBest cooperation set
βWireless link quality
seSender node
rereceiver node
SS,DSignal sent from source and receive at destination
SS,CSignal sent from source and receive at cooperating node
SC,DSignal sent from cooperating node and receive at destination node
αChannel responses
nS,CChannel noises between source and cooperative relay
nS,DChannel noises between source and destination
xOriginal sent signal
p z D Probability that z belongs to destination node
MAUVLength of major axis
mAUVLength of minor axis
EEnergy
i, j, zNode’s ID
hiHop of i
ρ h i Predecessors of hop i
ReResidual energy
PePacket energy
DyDelay
StSojourn time
HHolding time
PPackets generated
CcapChannel capacity
WnetNetwork width
TxRTransmission range
TTransmission of packets

References

  1. Akyildiz, I.F.; Pompili, D.; Melodia, T. Challenges for efficient communication in underwater acoustic sensor networks. ACM Sigbed Rev. 2004, 1, 3–8. [Google Scholar] [CrossRef]
  2. Shi, Z.J.; Fei, Y. Exploring architectural challenges in scalable underwater wireless sensor networks. In Proceedings of the Annual Boston Area Computer Architecture Workshop (BARC), Kingston, RI, USA, 3 February 2006; Volume 2006, pp. 38–42.
  3. Da, P. Evaluation of Wi-Fi Underwater Networks in Freshwater. Ph.D. Thesis, Universidade Do Porto, Porto, Portugal, 2014. [Google Scholar]
  4. Tan, D.D.; Le, T.T.; Kim, D.S. Distributed cooperative transmission for underwater acoustic sensor networks. In Proceedings of the Wireless Communications and Networking Conference Workshops (WCNCW), Shanghai, China, 7–10 April 2013; pp. 205–210.
  5. Silva, A.; Jesus, S.M. A post-detection Maximum Ratio Combiner: Experimental assessment on high diversity underwater channels. In Proceedings of the 2011 7th International Workshop on Systems, Signal Processing and their Applications, Tipaza, Algeria, 9–11 May 2011; pp. 335–338.
  6. Lee, J.W.; Cheon, J.Y.; Cho, H.S. A cooperative ARQ scheme in underwater acoustic sensor networks. In Proceedings of the 2010 OCEANS IEEE-Sydney, Sydney, Australia, 24–27 May 2010; pp. 1–5.
  7. Zhang, Y.; Chen, Y.; Zhou, S.; Xu, X.; Shen, X.; Wang, H. Dynamic Node Cooperation in An Underwater Data Collection Network. IEEE Sens. J. 2015, 16, 4127–4136. [Google Scholar] [CrossRef]
  8. Luo, Y.; Pu, L.; Peng, Z.; Zhou, Z.; Cui, J.H.; Zhang, Z. Effective relay selection for underwater cooperative acoustic networks. In Proceedings of the 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS), Hangzhou, China, 14–16 October 2013; pp. 104–112.
  9. Gao, C.; Liu, Z.; Cao, B.; Mu, L. Relay selection scheme based on propagation delay for cooperative underwater acoustic network. In Proceedings of the 2013 International Conference on Wireless Communications and Signal Processing (WCSP), Hangzhou, China, 24–26 October 2013; pp. 1–6.
  10. Umar, A.; Javaid, N.; Ahmad, A.; Khan, Z.A.; Qasim, U.; Alrajeh, N.; Hayat, A. DEADS: Depth and Energy Aware Dominating Set Based Algorithm for Cooperative Routing along with Sink Mobility in Underwater WSNs. Sensors 2015, 15, 14458–14486. [Google Scholar] [CrossRef] [PubMed]
  11. Wang, C.F.; Shih, J.D.; Pan, B.H.; Wu, T.Y. A network lifetime enhancement method for sink relocation and its analysis in wireless sensor networks. Sens. J. 2014, 14, 1932–1943. [Google Scholar] [CrossRef]
  12. Ahmad, A.; Javaid, N.; Khan, Z.A.; Qasim, U.; Alghamdi, T.A. Routing Scheme to Maximize Lifetime and Throughput of Wireless Sensor Networks. Sens. J. 2014, 14, 3516–3532. [Google Scholar] [CrossRef]
  13. Ahmed, S.; Javaid, N.; Khan, F.A.; Durrani, M.Y.; Ali, A.; Shaukat, A.; Sandhu, M.M.; Khan, Z.A.; Qasim, U. Co-UWSN: Cooperative energy-efficient protocol for underwater WSNs. Int. J. Distrib. Sens. Netw. 2015, 75, 4891410. [Google Scholar] [CrossRef] [PubMed]
  14. Cao, J.; Dou, J.; Dong, S. Balance Transmission Mechanism in Underwater Acoustic Sensor Networks. Int. J. Distrib. Sens. Netw. 2015, 11, 3429340. [Google Scholar] [CrossRef]
  15. Latif, K.; Javaid, N.; Saqib, M.N.; Khan, Z.A.; Qasim, U.; Mahmood, B.; Ilahi, M. Energy Hole Minimization with Field Division for Energy Efficient Routing in WSNs. Int. J. Distrib. Sens. Netw. 2015, 11, 10953134. [Google Scholar] [CrossRef]
  16. Javaid, N.; Jafri, M.R.; Ahmed, S.; Jamil, M.; Khan, Z.A.; Qasim, U.; Al-Saleh, S.S. Delay-sensitive routing schemes for underwater acoustic sensor networks. Int. J. Distrib. Sens. Netw. 2015, 2015, 1. [Google Scholar] [CrossRef]
  17. Liao, Y.; Qi, H.; Li, W. Load-balanced clustering algorithm with distributed self-organization for wireless sensor networks. Sens. J. 2013, 13, 1498–1506. [Google Scholar] [CrossRef]
  18. Tarhani, M.; Kavian, Y.S.; Siavoshi, S. SEECH: Scalable energy efficient clustering hierarchy protocol in wireless sensor networks. Sens. J. 2014, 14, 3944–3954. [Google Scholar] [CrossRef]
  19. Thakkar, A.; Kotecha, K. Cluster head election for energy and delay constraint applications of wireless sensor network. Sens. J. 2014, 14, 2658–2664. [Google Scholar] [CrossRef]
  20. Gupta, H.P.; Rao, S.V.; Yadav, A.K.; Dutta, T. Geographic Routing in Clustered Wireless Sensor Networks Among Obstacles. Sens. J. 2015, 15, 2984–2992. [Google Scholar] [CrossRef]
  21. Lin, H.; Wang, L.; Kong, R. Energy Efficient Clustering Protocol for Large-Scale Sensor Networks. Sens. J. 2015, 15, 7150–7160. [Google Scholar] [CrossRef]
  22. Zhang, S.; Li, D.; Chen, J. A link-state based adaptive feedback routing for underwater acoustic sensor networks. Sens. J. 2013, 13, 4402–4412. [Google Scholar] [CrossRef]
  23. Javaid, N.; Jafri, M.R.; Khan, Z.A.; Qasim, U.; Alghamdi, T.A.; Ali, M. Iamctd: Improved adaptive mobility of courier nodes in threshold-optimized dbr protocol for underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014, 2014. [Google Scholar] [CrossRef]
  24. Yoon, S.; Azad, A.K.; Oh, H.; Kim, S. AURP: An AUV-aided underwater routing protocol for underwater acoustic sensor networks. Sensors 2012, 12, 1827–1845. [Google Scholar] [CrossRef] [PubMed]
  25. Ahmed, S.; Javaid, N.; Ahmed, A.; Ahmed, I.; Durrani, M.Y.; Ali, A.; Haider, S.B.; Ilahi, M. SPARCO: Stochastic Performance Analysis with Reliability and Cooperation for Underwater Wireless Sensor Networks. J. Sens. 2016, 2016, 7604163. [Google Scholar] [CrossRef]
  26. Javaid, N.; Jafri, M.R.; Khan, Z.A.; Alrajeh, N.; Imran, M.; Vasilakos, A. Chain-based communication in cylindrical underwater wireless sensor networks. Sensors 2015, 15, 3625–3649. [Google Scholar] [CrossRef] [PubMed]
  27. Jorio, A.; El Fkihi, S.; Elbhiri, B.; Aboutajdine, D. An Energy-Efficient Clustering Routing Algorithm Based on Geographic Position and Residual Energy for Wireless Sensor Network. J. Comput. Netw. Commun. 2015, 2015, 170138. [Google Scholar] [CrossRef]
  28. Yu, H.; Yao, N.; Wang, T.; Li, G.; Gao, Z.; Tan, G. WDFAD-DBR: Weighting depth and forwarding area division DBR routing protocol for UASNs. Ad Hoc Netw. 2016, 37, 256–282. [Google Scholar] [CrossRef]
  29. Jing, R.; Kong, L.; Kong, L. Boundary detection method for large-scale coverage holes in wireless sensor network based on minimum critical threshold constraint. J. Sens. 2014, 2014, 985854. [Google Scholar] [CrossRef]
  30. Yu, H.; Yao, N.; Liu, J. An adaptive routing protocol in underwater sparse acoustic sensor networks. Ad Hoc Netw. 2015, 34, 121–143. [Google Scholar] [CrossRef]
  31. Baranidharan, B.; Santhi, B. GAECH: Genetic Algorithm Based Energy Efficient Clustering Hierarchy in Wireless Sensor Networks. J. Sens. 2015, 2015, 715740. [Google Scholar] [CrossRef]
  32. Jiang, P.; Liu, J.; Wu, F. Node Non-Uniform Deployment Based on Clustering Algorithm for Underwater Sensor Networks. Sensors 2015, 15, 29997–30010. [Google Scholar] [CrossRef] [PubMed]
  33. Khan, J.U.; Cho, H.S. A Distributed Data-Gathering Protocol Using AUV in Underwater Sensor Networks. Sensors 2015, 15, 19331–19350. [Google Scholar] [CrossRef] [PubMed]
  34. Hao, K.; Jin, Z.; Shen, H.; Wang, Y. An Efficient and Reliable Geographic Routing Protocol Based on Partial Network Coding for Underwater Sensor Networks. Sensors 2015, 15, 12720–12735. [Google Scholar] [CrossRef] [PubMed]
  35. Uddin, M.A. Link Expiration Time-Aware Routing Protocol for UWSNs. J. Sens. 2013, 2013, 625274. [Google Scholar] [CrossRef]
  36. Shi, L.; Yao, Z.; Zhang, B.; Li, C.; Ma, J. An efficient distributed routing protocol for wireless sensor networks with mobile sinks. Int. J. Commun. Syst. 2014, 28, 1789–1804. [Google Scholar] [CrossRef]
  37. Javaid, N.; Ilyas, N.; Ahmad, A.; Alrajeh, N.; Qasim, U.; Khan, Z.A.; Liaqat, T.; Khan, M.I. An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks. Sensors 2015, 15, 29149–29181. [Google Scholar] [CrossRef] [PubMed]
  38. Lucani, D.E.; Médard, M.; Stojanovic, M. Underwater acoustic networks: Channel models and network coding based lower bound to transmission power for multicast. IEEE J. Sel. Areas Commun. 2008, 26, 1708–1719. [Google Scholar] [CrossRef]
  39. Stojanovic, M. On the relationship between capacity and distance in an underwater acoustic communication channel. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2007, 11, 34–43. [Google Scholar] [CrossRef]
  40. Brekhovskikh, L.M.; Lysanov, I.P. Fundamentals of Ocean Acoustics; Springer Science and Business Media: New York, NY, USA, 2003. [Google Scholar]
  41. Domingo, M.C. Overview of channel models for underwater wireless communication networks. Phys. Commun. 2008, 1, 163–182. [Google Scholar] [CrossRef]
  42. Available online: http://www.arc.id.au/UWAcoustics.html (accessed on 12 November 2015).
  43. Available online: https://en.wikipedia.org/wiki/Relay_channel (accessed on 20 January 2016).
  44. Available online: http://www.mathwarehouse.com/ellipse/equation-of-ellipse.php (accessed on 12 November 2015).

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.