You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

25 April 2021

Investigating Master–Slave Architecture for Underwater Wireless Sensor Network

,
,
,
,
,
and
1
Department of Computer Science and IT, University of Engineering and Technology Peshawar, Peshawar 25000, Pakistan
2
Malaysian Institute of Information Technology, Universiti Kuala Lumpur, Kuala Lumpur 50250, Malaysia
3
Department of Computer Systems Engineering, University of Engineering and Technology Peshawar, Peshawar 25000, Pakistan
*
Author to whom correspondence should be addressed.
This article belongs to the Collection Underwater Sensor Networks and Internet of Underwater Things

Abstract

A significant increase has been observed in the use of Underwater Wireless Sensor Networks (UWSNs) over the last few decades. However, there exist several associated challenges with UWSNs, mainly due to the nodes’ mobility, increased propagation delay, limited bandwidth, packet duplication, void holes, and Doppler/multi-path effects. To address these challenges, we propose a protocol named “An Efficient Routing Protocol based on Master–Slave Architecture for Underwater Wireless Sensor Network (ERPMSA-UWSN)” that significantly contributes to optimizing energy consumption and data packet’s long-term survival. We adopt an innovative approach based on the master–slave architecture, which results in limiting the forwarders of the data packet by restricting the transmission through master nodes only. In this protocol, we suppress nodes from data packet reception except the master nodes. We perform extensive simulation and demonstrate that our proposed protocol is delay-tolerant and energy-efficient. We achieve an improvement of 13% on energy tax and 4.8% on Packet Delivery Ratio (PDR), over the state-of-the-art protocol.

1. Introduction

Underwater Sensor Networks (UWSNs) have emerged as a field of research in recent years due to their applications for various purposes, e.g., monitoring water pollution, water quality testing, aquaculture, and exploration of geological resources (gas, oil, etc.). Such networks are composed of battery-powered nodes stationed in water to sense the environmental parameters, send them onwards to sink nodes floating on water and pass data to the monitoring station. These nodes can communicate using electromagnetic/radio signals, optical communication, and acoustic links. Electromagnetic communication is not suitable for underwater communication because of its limitation of higher attenuation resulting in higher absorption loss due to the conductivity of water. Similarly, optic signals are not supported by the aquatic environment because of the requirement of the direct line of sight between the sender and receiver [1]. The most suitable medium for underwater communication is the acoustic channel; however, there also exist several challenges, e.g., limited battery power, fading, limited bandwidth, high error rate [2].
UWSNs communication’s performance is gauged over several performance metrics including energy tax, Packet Delivery Ratio (PDR), End-to-End Delay (E2ED), and Accumulated Propagation Distance (APD). These parameters are affected by various factors, e.g., void holes, energy holes, duplication of packets. Energy optimization is one of the main requirements for increasing the lifetime of a battery and overcoming other challenges such as void/energy holes, packet duplication, etc. The void/energy holes are created when a sender node cannot find other appropriate nodes for forwarding the received data packets due to the lack of information about the surroundings. Similarly, the duplication of packets happens when the source transmits data in the Omni direction which is received by all neighbor nodes for further transmission. Due to such data duplication, a significant fraction of energy is used in the transmission phase resulting in reduced network lifetime. The battery replacement of an underwater node after deployment is not feasible. Several routing protocols and schemes are proposed in the literature for efficient communication in UWSNs; however, each of them has its overheads as discussed in Section 2: Related Work. In particular, high energy consumption is still an important concern, and therefore, in this research work, we propose a new protocol, called “An Efficient Routing Protocol based on Master–Slave Architecture for Underwater Wireless Sensor Network (ERPMSA-UWSN)” focusing on energy optimization.
Following are the main contributions of this research work:
  • Our proposed master–slave architecture helps to achieve lower energy consumption by limiting the broadcasting of packets to a specific region (set of nodes).
  • We avoid packet duplication due to the suppression of nodes and the lack of multiple paths for transmission.
  • We perform extensive simulation of our proposed protocol in various scenarios and demonstrate improvements in Packet Delivery Ratio (PDR) and energy tax.
The rest of the manuscript is organized as follows: Section 2 contains a detailed discussion on the previous work regarding UWSN-based routing protocols. Section 3 identifies the problem statement that we aim to address in this research work. The proposed system model is presented in Section 4. Section 5 delineates the experimental setup and simulation results, performance comparison, and analysis of our proposed approaches. The paper is concluded in Section 6.

3. Problem Statement

In this research work, we aim to address the problem of high energy consumption of data packet transmission in UWSNs. The two existing protocols i.e., DBR and WDFAD-DBR transmit data packets by broadcasting them across all over the Potential Forwarding Zone (PFZ), and all neighbor nodes receive the transmitted packet. Next, the node with higher priority (smaller holding time) transmits the received packet further while the remaining nodes drop it. In both schemes, there is a wastage of energy in the form of redundant data packet transmission and unnecessary reception of data packets by suppressed nodes. The data packet has a larger size than the other packets (e.g., Neighbor request and Acknowledgment), due to which the nodes consume more energy for transmission.
WDFAD-DBR is an improved version of DBR and is the basis of our work, therefore, we explain the data packet transmission in this protocol with the help of Figure 1. Node S is the source node that gathers information about the neighbor nodes by broadcasting the Neighbor request and gets the Acknowledgment packet in response. Next, the S node calculates and assigns the holding time of each node using a fitness function and starts its data packet transmission. As depicted in the figure, node A has a smaller holding time and starts data packet transmission while the other (four) nodes, with higher holding time than A, wait for their turns. Since these suppressed nodes are also in the transmission range of A, they receive the same packet back as node A transmits it. Although these nodes will not become part of further transmission, energy is still wasted due to the reception of packets. All other nodes outside the region of A (suppressed nodes of S) do not receive the data packet from node A and therefore start their transmission resulting in data packet duplication and high energy consumption. For resolving this problem, we propose the ERPMSA-UWSN protocol that mainly focuses on reducing high energy consumption in UWSNs.
Figure 1. Selection of next PFN in WDFAD.

4. System Model

In this section, we define some basic terminologies, network architecture, and our proposed network topology.

4.1. Basic Terminologies

Following are the basic terminologies used in our proposed protocol ERPMSA-UWSN protocol.
  • Master nodes: Master nodes are those nodes that fulfill the requirements of the Master Selector function (MSF) and are eligible for the forwarding data packets.
  • Slave nodes: Nodes other than masters are slave nodes and are not eligible for forwarding data packets.
  • Anchor nodes: Nodes which are statically bounded at the bottom of the water, also known as data collectors or source nodes.
  • Relay nodes: Nodes which are suspended in water and work as 3rd party between anchor nodes and sink nodes.
  • Sink nodes: Sink nodes are the receiver/destination nodes and they float on the surface of the water. Their responsibility is to collect data packets from sensor nodes and forward them to base stations through a radio link.
  • Transmission range of node S: This refers to the omnidirectional distance from source node S (Xs, Ys, Zs) which currently forwards the packet p until and unless the packet is transmitted.
  • Void hole: A state where the forwarding node cannot find any other node to further forward a packet.
  • Energy hole: A scenario where the forwarding node lacks the required energy for forwarding a data packet.
  • Eligible Neighbors (Eni) of Node i: Nodes spanning within the transmission range of a given node i. Let’s suppose N represents a set of nodes in a network
    N = n 1 , n 2 , n 3 , . . . . . . . , n k
    Therefore, the eligible neighbors of a Node i can be illustrated as E n i N
    E n i = j N D i s t j i R r i
    where (Distji) is the Euclidean distance between node i ( x i , y i , z i ) and node j ( x j , y j , z j ) in a 3-dimensional Euclidean space:
    D i s t j i = x i - x j 2 + y i - y j 2 + z i - z j 2
  • Potential Forwarders (Pfi) for a Node i: Nodes lying in the transmission range Rrs and with their depth (dj) less than the depth (di) form the potential forwarders for a node i, as given below:
    P f i E n i
    where
    P f i = j E n i d i < d
  • Potential Forwarding Zone (PFZ): The Potential Forwarding Zone (PFZ) creates a hemispherical zone, where the radius is similar to Rrs and the distance to the sink for each point of PFZ is lower than that of the source node. The PFZ is the sub-region of Rrs for node S and the nodes residing in the zone are Potential Forwarder Nodes (PFNs), i.e., the subsequent forwarders for the packet p.
All abbreviations/symbols used in this manuscript are listed in Table 2.
Table 2. Symbols/Abbreviations.

4.2. Network Architecture of ERPMSA-UWSN

In this section, the network architecture of our proposed protocol is presented. We describe the masters-slave technique of forwarding packets that aims to achieve low energy consumption.
The network architecture of ERPMSA-UWSN is constituted of anchor nodes, relay nodes, and sink nodes as depicted in Figure 2. Sink nodes float on the surface bearing radio and acoustic modems to communicate with each other and relay nodes, respectively. These nodes can receive signals from water and perform the transmission/reception in the external environment without any boundaries. Relay nodes are deployed at different levels of depth, act as the 3rd party between the transmitters (anchor nodes) and receivers (sink nodes), and carry the transmitted data towards the receiver. Anchor nodes are tethered alongside seabed and can move with water currents or with other environmental disruption. Their main task is to gather environmental data and pass it to the sink nodes via relay nodes. The centralized stations are the sink nodes that enable communication with other sink nodes as well as relay nodes. The reception of the data packet on any of the sink nodes is measured as a successful packet delivery.
Figure 2. Network architecture.

4.3. Impact of Acoustic Signal Velocity in the Underwater Environment

The velocity of the sound is affected by various factors including temperature, pressure, and the salinity level of the seawater. Mathematically, it can be elaborated as follows [40]:
c = 1446.961 + 4.591 T 5.305 × 10 2 T 2 + 2.374 × 10 2 T 3 + 1.340 ( S 35 ) + 1.63 × 10 1 D + 1.6750 × 10 7 D 2 1.025 × 10 2 T ( S 35 ) 7.1390 × 10 13 T D 3
where c is the velocity of the sound signal measured in m/s, T shows the temperature whose unit is Celsius, S indicates the salinity of water with the unit of Part Per Thousand i.e., PPT and D pertains to the depth measured in meters. The above equation qualifies for 0 C T 30 C, 30 S 40 PPT, 0 D 8000 m.

4.4. The Energy Propagation Model

The attenuation of the acoustic channel in UWSNs over depth d is explained by the following formula [41]:   
10 l o g A ( d , f ) = k . 10 l o g d + d . 10 l o g α ( f )
In the above equation, the right side occupies two terms, i.e., the spreading loss and absorption loss, respectively, where k is a constant whose values are 1, 1.5, and 2, and constitutes the geometry of propagation. Varying the values of k affects the geometry accordingly. In shallow water, the propagation geometry is cylindrical if the value of k = 1, spherical in deep water if k = 2. Similarly, for k = 1.5, the geometry of the propagation is practically spread, where α ( f ) represents the absorption coefficient.
The following expression can be used to find the underwater noise.
N ( f ) = N t ( f ) + N s ( f ) + N w ( f ) + N t h ( f )
where N t ( f ) , N s ( f ) , N w ( f ) and N t h ( f ) represent the turbulence noise, shipping noise, wave noise, and thermal noise, respectively.

4.5. Influence of Voice Signal Reflection/Refraction in an Underwater Environment

The channel geometry and its properties of reflection and refraction impact the impulse response of an acoustic channel. These characteristics determine the total count of the major paths and their relative strengths as well as delays. After discarding the echoes which undergo multiple reflections from almost infinite signal echoes, only a few significant paths are left. The total multi-path spread is governed by the longest path delay, which is for the tuning of tens of milliseconds. These types of values are reported in the shallow water experiments [42]. The total multi-path spread is far greater than the dispersion of the individual paths. Therefore, it can be ignored for the systems whose channel cutoff is greater than most of the frequencies. For systems currently in use, this is typically the case. We ignore the reflection phenomena for both ERPMSA-UWSN and WDFAD-DBR, in our simulations, for the sake of fair analysis.

4.6. Packet Types in ERPMSA-UWSN

Following are the four types of packets in ERPMSA-UWSN (i.e., NR, DATA, ACK, and CTRL).
  • Neighbor Request Packet (NR): The source node uses NR to get information about the neighbor forwarders. The format of the NR packet is NR (TYPO, SID, D, VA), where TYPO is the two-bit number indicating the type of the packet. For NR, the value of TYPO = 00. SID is the ID of the source node and D is the depth of the source node.
  • Acknowledgment Packet (ACK): ACK packet is a reply from the neighbor node in the response of NR, containing full information of its sender. The format of the ACK is ACK (TYPO, SID, D, E), where the value of TYPO for ACK is “01”, SID is the ID of that neighbor node, D is the depth and E is the energy of the ACK packet’s sender node. We store these values in a separate table called MTAB, in descending order corresponding to their IDs. In the table, the MSF value of the first index node is highest among all nodes and other indices are occupied accordingly.
  • Control Packet (CTRL): CTRL packet is used to invoke the masters for the forwarding procedure. By awakening the masters, it automatically turns slave nodes into the indolent state. The format is CTRL (TYPO, SID, PTR1, PTR2, D) where TYPO for this packet is “10”, SID is the ID of the sender node, PTR1 and PTR2 are pointers to the array that contain IDs of the three descending indexed Masters of PFZ1 and PFZ2 respectively, while D is the depth of the sender node.
  • Data Packet (DATA): DATA packet contains the real data with the payload and header. The format of the DATA packet is DATA (TYPO, SID, DID, D), where TYPO value is “11”, SID represents the source node ID, DID indicates the destination node, while D represents the depth of the sender node.

4.6.1. Division of Potential Forwarding Zone (PFZ) into PFN levels

In this scheme, the division of PFZ into different PFZ levels is based on the depth difference of the source node and the PFN zone. To achieve optimal transmission of the data packet, we tend to access the master node closer to the sink. For this purpose, PFZ is divided into two equal regions based on the depth difference as shown in Figure 3. As the transmission range is 2000 m, the region where the depth difference is between 1001 m to 2000 m is considered to be PFZ1, while from 1 m to 1000 m, it is considered to be PFZ2. This 3D division results in a truncated hemisphere with an upper cap (PFZ1).
Figure 3. Region division of PFZ1 and PFZ2.

4.6.2. Node Density in PFZ Levels

The node density in a certain place indicates less probability of void hole occurrence and the chances of getting the best nodes for forwarding. This results in two regions, i.e., the region with dense nodes but with more distance from a sink (PFZ1), and the region with less depth but with a sparse setup (PFZ2). The first choice PFZ1 can result in attaining high PDR on the cost of high APD and high energy use. On the other hand, in the second choice (PFZ2), low energy consumption and high PDR can be achieved because our proposed system topology outperforms in a sparse environment in terms of PDR and energy [43].
In ERPMSA-UWSN, the next forwarder (Master) is selected only if it has PFNs in its PFZs and has enough energy for transmission. Consequently, this minimizes the probability of void holes and energy holes in a less dense region. Therefore, to gain the desired output we prefer the first choice i.e., prioritizing PFZ1 over PFZ2 for master selection.
We established the knowledge about node density in PFZ1 and PFZ2 based on the theoretical analysis that we carried out with the volumetric information and then justified it by experimental results. By applying Equation (6), we calculated the volume for the upper cap of the hemisphere (PFZ1) using parameters h = 1000 m and r = 2000 m. Similarly, for the lower partial hemisphere, we used Equation (7), for the calculation of volume. Comparing the volumes, we found out that PFZ2 has more capacity than PFZ1, indicating that the probability of nodes is higher in PFZ2 as shown in Figure 4.
V u p p e r = 1 3 π ( 3 h r 2 h 3 )
V l o w e r = 1 3 π h ( 3 r 2 h 2 )
Figure 4. Number of Nodes in Each Region.

4.7. Distance-Based Adaptive Transmission Methods

In prior approaches, the use of transmission energy was not economical. In our proposed technique, we produced an idea to efficiently limit energy usage by ranging transmission energy on different depth levels. This approach mainly restricts the transmission energy to beneficial usage. We use adaptive energy levels that are devised, based on the distance between the source node and master node. In previous practices, two types of mechanisms were followed. First, the source node sends neighbor requests in its range with power P, and in response, the neighboring PFNs send Acknowledgments back to the source containing all required information. Secondly, when the source node receives Acknowledgments from its neighbors, it compares their depth parameter, broadcasts data packet with power P to all neighbors while setting the awaiting timer based on their depth information. At this stage, the node closer to the source might need less transmission energy from the source. However, it is transmitted towards the neighbor with the same power needed to transmit over R which is unacceptable in a scenario of optimizing energy consumption. To address this issue, we restrict additional energy costs that the network bear for data transmission in the close neighborhood of the source. For this purpose, we use the technique where the transmission energy assignment is based on the distance between the source node and master node. The larger distance between the source and master nodes means greater transmission energy and vice versa.

4.8. Distribution of PFNs into Masters and Slaves

The distribution of master and slave nodes is based on the values of the Master Selector Function (MSF). For the top 3 values of MSF, we rank the nodes as masters and the rest as slaves for that region. This master–slave race exists in both PFZ1 and PFZ2 regions.
M S F = ( P 1 + P 2 ) E n Z
where En is the normalized form of that PFN’s energy for whom we are finding the MSF. The parameter Z is the normalized depth, whose value ranges between 0 and 1 of that PFN. The parameters P1 and P2 are priority factors, dependent upon the population of PFNs in PFZ1 and PFZ2 regions of the next master respectively, while their values range between 1.0 and 0.5. These values are only applicable if the number of PFNs in both the regions (PFZ1 and PFZ2) is equal to or greater than 1. To find the next forwarder (master) closer to the sink, we considered these priority values. As discussed above, the forwarder will have a higher value of MSF. The value that contributes more in MSF is P1 = 1 as compared to P2 = 0.5 which clearly shows that the region PFZ1 gets the higher probability and hence the desired forwarder. Complete elaboration of this process is depicted in Figure 5.
Figure 5. Master and Slave division.
Our proposed approach is based on the master–slave architecture. The selection of master nodes is carried out via the defined Algorithm 1 (Master Selection Algorithm). The selection is based on the information of the neighboring nodes, stored in a neighboring table. Once a master node is selected, its information is stored in the master nodes table, which can be further used for selection at run time. The master node information of each node is stored in the mentioned master table. Before broadcasting a data packet to the surrounding, a control packet is sent to the neighborhood, to activate all master nodes and deactivate slave nodes. However, since it is a challenging task to accomplish at run time, we devised a formula called Master Selection Function (MSF). The mentioned formula filters out the best nodes among the neighbor nodes based on the energy, small depth difference, and number of PFNs. The resulted values from MSF are stored in an array, while the top 3 values from the array are stored in the master table. We assume that each transmitting node has the information of its neighbors as well as master nodes, as periodic requests are sent for updating the neighbor and master tables. These functions are achieved via control packets, which are used to broadcast control signals across the network and to enable or disable other nodes.
Algorithm 1: Masters selection algorithm
Sensors 21 03000 i001

4.9. Master-Range Extension to End Data Packet Duplication

In the transmission of the data packet, in rare cases, some of the master nodes cause data packet duplication. This happens when some masters are situated beyond the boundary of the master responsible for forwarding the data packet. Consequently, they cannot receive a control packet from it and, in response, after the expiry of their holding time, consider themselves eligible for forwarding. To deal with this issue, we change the range of the control packets adaptively with the position of masters which are out of the privileged master’s range as shown in Figure 6a. When master A sends a control packet to suppress the slave nodes of the next-hop and master nodes of the previous hop, master MO will not receive the control packet. Hence, after the holding time elapses, it will generate a duplicate data packet. To address this problem, node A checks the presence of all master nodes in its range before sending the control packet. If it finds any of them outside the range, it finds the distance between that node and itself using Equation (9), and re-adjusts its control packet energy for that new range as shown in Figure 6b. If it broadcasts the control packet, it will suppress node MO from generating a duplicate packet. This happens quite rarely in our topology because the selection process considers that the masters should be selected only when they are close to each other. Also, such deviation from MSF is possible in a sparse network.
Figure 6. (a) Packet duplication (b) Master-Range extension to end data packet duplication.
The master-range extension is based on the distance between the master nodes. This distance is calculated using the following Equation (4):
D i s t j i = x i - x j 2 + y i - y j 2 + z i - z j 2
in case the node is falling outside the range of the forwarding master node, we use this distance to calculate the extended region of the master node for suppressing the duplication of the data packet. Such calculation can be expressed using the following equation:
R e x t = D i s t M O M 1 R
where Rext represents the extra range (master-range extension), D i s t M O M 1 is the distance between first master (M1) and the other master which is the out-of-range (MO) node, while R is the transmission range.

4.10. Data Packet Forwarding Mechanism in ERPMSA-UWSN

The following steps are taken to transmit the data packet towards its destination point. First, when a node becomes a source node it will broadcast neighbor request (NR) in its range and gets the Acknowledgment (ACK) in response from neighbor nodes.
  • After receiving the ACK packet, the source node updates its neighbor table and sorts out the master and slaves.
  • The source node sends a Control packet in its surroundings, containing the IDs of Masters of each PFN region, which turn the slave nodes to the idle state while keeping the masters active.
  • The data packet is sent which is only received by the master nodes while the holding time is assigned based on their priority. In this way, masters nodes of the region PFZ1 get a higher priority than the region PFZ2.
  • Before forwarding data, master must check for the energy hole scenario. In case of an energy hole, the 2nd Master takes charge and forwards the data packet. If the 2nd Master also encounters the same situation, it hands over the responsibility to its subordinate master, i.e., the 3rd master. If it does not find a way out, the packet is dropped. This increases the chances of the data packet getting its destination most probably.
  • If there is no energy hole then the master beating the clock first will forward the data to the forwarder in its range in the same fashion, while the other master drops the packet after hearing the control packet from the forwarding master.
    The whole procedure is well elaborated in the sequence diagram in Figure 7.
    Figure 7. Sequence Diagram of ERPMSA-UWSN.

4.11. Holding Time and Activation Time Calculation

When a node transmits data, it must allocate two types of timer slots to the receiving masters i.e., activation time and holding time. Activation time and holding times are associated with the control packet and data packet, respectively. The control packet is released after completion of Activation time. Similarly, the data packet broadcasts right after the last tick of the holding time clock. These timers are allocated based on the MSF values of master nodes. Master node with small-time span is the nodes, whose depth is low compared to others and when its next-hop master lies in its PFZ1, while having more energy than others.
Furthermore, the timer is separately allocated to the three of the masters in that PFN region. If in case the source node does not find any master in PFZ1, forwarding will be formed in PFZ2, and their timer allocation will be of different magnitude.

4.11.1. Activation Time (AT) calculation

Activation time for the master node is the time before spreading the control packet in its neighborhood. For M1, ATM1, the value is zero, because M1 has high privileges, and it does not wait for other’s permission. It just sends a control packet in its surroundings, as illustrated in Equation (11) as:
A T M 1 = 0
A T M 2 = P D 1000 + P D M 1 M 2
A T M 3 = A T M 2 + P D C M 2 M 3
The above equations demonstrate activation time for M2, where the first term is propagation time taken by a data packet to travel over 1000 m, and the other term is for propagation delay of the data packet from M2 to M3. If we closely look at Figure 8, it demonstrates the first term i.e., when node S sends data packet in its neighborhood, node B receives data packet far earlier than node A. Similarly, the ATM2 and for activating M2, it must wait for the data packet to reach M1 and for the control packet to travel from M1 to M2. Equation (13) shows the activation time for M2, whose 1st term is the activation time of M2, while the 2nd term is the control packet’s propagation delay from M2 to M3. Activation time contributes a little to the E2E delay of the whole network.
Figure 8. Holding time and activation time calculation.

4.11.2. Holding Time (HT) Calculation

Holding time is the time slot for which a node possesses a data packet and the time in which it broadcasts the control packet in the range of 2000 m. It is known that all nodes have the data packet, but they are bounded to hear for control packet call from their priority master node. This call is only in the case when the former node is ready to send the packet forward. If any of these masters do not receive the control packet from their ex-master, it means the master that is next in the priority list is now eligible for forwarding the packet. This transfer of control on the master’s level only happens whenever a node encounters an energy hole or void hole on its way. Equations (14)–(16) are the holding time equations for M1, M2, and M3, respectively.
H T M 1 = A T M 1 + P D C 2000
H T M 2 = A T M 2 + P D C 2000
H T M 3 = A T M 3 + P D C 2000

4.12. Data Delivery Scheme

For the process of packet generation and packet forwarding, we follow a certain data delivery scheme. In this scheme, every node can generate packets (NR, ACK, CTRL, DATA) in the whole process. When a node becomes a source (i.e., node that holds/generates the DATA packet), it will first check the sink in its range for its existence, and then handover the DATA packet to sink without following the forwarding scheme. If there is no sink in its proximity, it follows the scheme in which the nodes are in the neighborhood. The nodes are divided into Suppressed and Potential Forwarding Nodes (PFN) based on depth greater than and less than the source node, respectively. The PFNs are further subdivided into masters and slaves based on MSF values. The MSF values are calculated on each PFN using Equation (10). The source node fetches these values from the PFNs through the neighbor request packet and evaluates the PFNs into masters and slaves based on higher and lower values, respectively. Algorithm 1 plays a major role in selecting the desired best master nodes for the forwarding of the data packet. Slave nodes are suppressed by the CTRL packet broadcast by the source node, containing the IDs of the masters. After the mentioned selection process, the clocks are allocated to the master nodes using the activation time and holding time Equations (10)–(15). The node that beats the timer forwards the data and then follows an Algorithm 2 and the flowchart in Figure 9, for forwarding data until it finds the sink, and marks the successful data delivery to the sink.
Figure 9. Flow Chart of the whole process.

4.13. Restricting Extra Reception of Packets

Our approach minimizes the data packet reception in the PFNs of a node that is not eligible to send data (i.e., slave nodes). In prior routing protocols, all PFNs receive the data packet; however, eventually, further transmission is carried out by one of them. Since we are focusing on optimizing our network in terms of energy, we cannot afford wastage of energy in the form of receiving energy. Therefore, we adopted a method that suppresses all nodes, ineligible for forwarding the data packet to save the receiving energy. One possible scenario is depicted in Figure 10. As shown in the figure, a node suppressed by the sender node may also reside in some other node’s range, while this node is the master node of its own PFN i.e., Node N is the slave node of Node S1 but the master node of S and therefore can receive data packets from S1 but not from S.
Algorithm 2: Packet’s transmission Algorithm
Sensors 21 03000 i002
Figure 10. Restricting extra reception of data packets.

5. Simulation

5.1. Simulation Setup

In this section, we thoroughly describe the simulations that we carried out using MATLAB software. Simulations are based on the comparative analysis of WDFAD with our proposed protocol (ERPMSA-UWSN) based on varying parameters i.e., PDR, energy tax, end-to-end delay, and the different number of sinks. Furthermore, most of the environmental parameters and settings are taken from the WDFAD protocol system setup. The 100–500 sensor nodes are randomly deployed in the 3D orientation inside water and over 10 Km3 volumetric space, as shown in Figure 11. The individual average coverage of a node ranges from 2 km3 to 10 Km3 in a sparse to denser network, respectively. Multiple sinks are deployed on the ocean surface stationary and set to receive data from relay nodes. These randomly deployed nodes follow the random walk mobility model (RWM) [44] for movement. They select their next direction based on random probability and move there with the random speed ranges from 1 m/s to 5m/s along the X-Y plane. They change their position after every 2 s and the RWM model keeps the node bounded in coverage boundary. The movement of the nodes is mostly considered in the horizontal axis, while along the vertical axis it is considered slightly. Data packet size taken is 83 Bytes (72 Bytes payload and 11 Bytes header), while other packets (i.e., neighbor request, acknowledgment, control packet) size is 50 bit (6 Bytes) each, with the data rate of 16Kbps. The transmission range of every node is at least 2 Km3, the initial energy of every node is 100 J and the threshold energy (i.e., the minimum amount of energy that a node needs to stay alive) is 5 wJ. Furthermore, the acoustic signal speed is 1500 m/s, while the bandwidth of the medium is 4000 Hz. Since we perform simulations in deep and shallow water, hence we must categorize the ocean based on depth. We figured out from the review study that up to 100 m depth the ocean is shallow, while onward 100 m it is deep. Therefore, we deploy the source node in the region of 10 km3 so that it covers both the shallow and deep domains of the ocean. The parameters under which we performed the simulation are listed in Table 3.
Figure 11. Network deployment.
Table 3. Simulation parameters.

5.2. Performance Breakdown and Comparison

We evaluate ERPMSA-UWSN performance in comparison with WDFAD-DBR based on performance metrics, i.e., the Packet Delivery Ratio (PDR), an End-to-End Delay (E2ED), energy tax, and the Accumulated Propagation Distance (APD).

5.2.1. Packet Delivery Ratio (PDR)

The packet delivery ratio is associated with the successful delivery of packets to the sink. PDR indicates the ratio of the packets count which reach their destination (Sink) and the total packets generated by the network. The duplicate packet is considered to be a single packet, while redundancy is not allowed.
P D R = P a c k e t s r e c e i v e d P a c k e t S e n t

5.2.2. Energy Tax

It is the total average amount of energy required per node to send a DATA packet to its destination. It includes the sending and receiving energy as well as the processing, computational and idle state energies.
E n e r g y T a x = E t o t a l n o d e s p a c k e t s
where Etotal is the energy expenditure, nodes are the total number of nodes in the network and packets are that which have successfully found their destination.

5.2.3. End-to-End Delay (E2ED)

End-to-end delay measures the average time from the instant of the packet generation to the moment it reaches to sink. Due to the multiple sink architecture, there is a possibility to receive the same packet by more than one sink. In this case, the E2ED of that node is considered, whose packet finds the sink earlier.

5.2.4. Accumulated Propagation Distance (APD)

The mean Accumulated Propagation Distance (APD) is equivalent to the mean accumulated distance covered by the successfully delivered packets on each hop. In this multi-sink architecture, there is a case where more than one sink receives the same packet. Hence in such a scenario, the shortest Accumulated Propagation Distance is considered to be the APD of that specific packet, while the APD is computed through the given equation as shown as:
A P D = 1 n p j = 1 n p i = 1 h d i s t i j
where the number of packets are denoted by np, h pertains to the hop count of the packet from the source node to the sink and D i s t j i is the distance measured from the ith hop to the jth packet.

5.3. Simulation Results

Simulations are performed in MATLAB (2017a) on the theoretical data to get the plots of the performance metrics to evaluate whether our proposed work is contributing to the main cause of saving energy or not. The main focus is to prolong the network life by saving energy as much as possible; however, we dealt with some trade-offs and compromised some metrics (E2ED and APD) to gain improvements in PDR and energy tax. We compare ERPMSA-UWSN and WDFAD-DBR based on different parameters including sink numbers variation and node density.

5.3.1. Simulation of ERPMSA-UWSN in Comparison with WDFAD

As shown in Figure 12a, the PDR increases with an increase in the number of nodes for both WDFAD-DBR and ERPMSA-UWSN. This is because the increase in the network density also increases the probability of active node occurrence, and reducing the void hole occurrence. ERPMSA-UWSN outclassed WDFAD in terms of PDR in both sparse as well as dense networks. WDFAD selects the next forwarding node based on the difference in weighting depth between the two hops. Alternatively, ERPMSA-UWSN selects the next forwarding node i.e., the master node based on the depth difference with higher energy and a greater number of PFNs. There are two types of holes in the network—, one is called void hole, while the other is referred to as energy hole. The void hole occurs due to the absence of PFNs in the forwarding area, while the energy hole exists due to the lack of sufficient transmission energy in the potential forwarding node, as shown in Figure 12. The difference of PDR between ERPMSA-UWSN and WDFAD decreases from sparse to dense networks due to the network density. Additionally, WDFAD drops the packet in the absence of PFN in its range i.e., void hole, but ERPMSA-UWSN keeps track of the void hole at the time of selecting the master node for transmission. Therefore, it rarely encounters void holes in its transmission period; however, sometimes there is a chance of an energy hole that occurs due to the additional use of the node. This is also resolved by adopting the 2nd or 3rd master in the region. In case, when the 2nd and 3rd master do not exist in the vicinity, we divide the PFZ into two portions, the lower PFZ2 portion which is denser in node population, and the upper PFZ1 which is mostly sparse. During the selection process, MSF filters out those masters whose PFZ1 has a minimum of 1 node, and if does not exist, a forwarding node from PFZ2 is selected. In a sparse network, WDFAD drops more packets which broaden the proportional gap between the plot of WDFAD and ERPMSA-UWSN, increases the probability of active nodes, and decreases the void holes, consequently decreases the packet drop as well as the gap in PDR results. To encounter the energy hole, our protocol provides additional support by suppressing redundant transmissions of the packet. This results in reducing the average energy consumption, which prolongs the node and network life, as a result of eliminating the energy holes.The void/energy holes and packet collision affect the network throughput and PDR. Like the WDFAD, we also use the two-hop mechanisms in our proposed protocol (ERPMSA-UWSN) to deal with the void holes. However, in ERPMSA-UWSN, it is ensured that the selected master has no void hole in its range. In addition, the problem of energy hole is significantly highlighted in ERPMSA-UWSN compared to WDFAD, as it mainly focuses on transmission energy economization. This is achieved by adapting distance-based transmission methods for packet transmission and selecting the best master for forwarding, whose responsibility is to keep the network free of energy holes. The collision of packets occurs whenever packet traffic is high since the ERPMSA-UWSN suppresses the redundant transmissions which leads the network to have low packet traffic and thus minimizes the collision of packets. For these reasons, the network throughput for our proposed protocol, in sparse as well as dense networks, is higher than the existing ones i.e., WDFAD-DBR whether sparse or dense networks. The slow growth noted in the dense network is justified because ERPMSA-UWSN has limited sources of data packet after suppressing the majority of the PFNs. In contrast to WDFAD, there are multiple packet resources in the network, which may cause a collision and cause packet loss in the network. In the case of a dense network, we produce more chance of finding the best master for the transmission, leading the network out of energy holes and void holes situations and preventing packet drop. This behavior of the PDR is well justified by the packet drop profile as shown in Figure 13. It can be seen that the amount of packet drop decreases with the increase in the number of nodes, and ERPMSA-UWSN shows less packet drop compared to WDFAD in both sparse as well as dense networks.
Figure 12. (a) PDR against the number of nodes; (b) energy tax versus the node count; (c) end-to-end delay against number of nodes; (d) APD compared to the node count. Comparison of ERPMSA-UWSN with WDFAD.
Figure 13. Packet drop profile.
Next, we breakdown the energy tax of the proposed scheme (ERPMSA-UWSN) and the competing protocol (WDFAD). Transmission energy has a higher proportion in energy consumption than the other energies i.e., idle state, receiving, processing, and sensing energies. In Underwater acoustic networks, packet transmission is the costliest process, especially since the transmission of the data packet is the most energy-consuming due to its large size compared to other packets. This evaluation of energy is already validated through experimental findings in [45]. The energy cost of transmitting one single bit is approximately equal to thousands of processing [46]. The algorithm’s computational complexity is also an energy-consuming factor i.e., the cost that a network must bear for the complex computation. A decreasing trend has been noted in the energy usage with the increase in node numbers. It is because of the increased probability of a master’s abounded existence, which leads to the successful transmission of packets. Furthermore, an increase in node number also suppresses the energy wastage, caused by the re-transmission of the packet. An increase in nodes also leads to the enriched energy resources that might contribute to this decreasing trend.
The method adopted for selecting the next forwarder (master) is superficially more contributive in the campaign of energy optimization. It targets the extra transmissions of the data packet by introducing a new packet (CTRL PACK), which is smaller in size and suppresses the additional data packet transmissions. Data packet has a size of 72 bytes, while CTRL PACK has a size of 5 bytes, which makes a mighty difference in the energy equation. Master nodes have only the privilege to receive the data packet, while slaves remain unprivileged in the sense of data packet reception. In contrast, WDFAD used to send the data packet to each node that lies in its range, and at last one of them must transmit, while the remaining one must drop that packet. Saving transmission energy put a great influence on the total energy cost which results in low energy consumption.
Our scheme adopted the adaptive transmission power leveling mechanism which consequently leads to the economization of energy. As transmission energy is applied based on the displacement of the node in the transmission range i.e., farther node means more transmission power is exerted and vice versa. In contrast to WDFAD, fix the amount of transmission energy is used for packets transmission on each hop irrespective of the next forwarder displacement. In the sparse environment, this approach does not play a major role in saving energy due to the wide dispersion of the nodes in the specified range. However, in a dense network, there is a mighty part played by this approach because a greater number of nodes is present in the maximum range. In general, trend (most rare), the source node must transmit with the maximum power so that it targets maximum numbers of the nodes in its proximity. Though, in WDFAD, the source node will transmit with the maximum fixed power even its next forwarder is closer to it. The process of adaptive transmission power leveling significantly reduces energy consumption without affecting any other performance metric. Therefore, either the sparse or the dense, the novel protocol (ERPMSA-UWSN) persuasively outperformed the competing protocol (WDFAD) in terms of energy usage.
End-to-end delay is associated with the average time taken by a packet to reach its destination. This average time includes transmission time, processing time, idle state time, and propagation time. Propagation time and processing time matter in delay-tolerant protocols, for instance, the presented protocol in which propagation time and the processing time are extended due to the distance-based calculation of the holding time and activation time. In contrast, the holding time calculation of WDFAD is based on the weighting depth of the nodes, which results in a minimal end-to-end delay. The E2ED is directly associated with the behavior of the APD curve. The APD of the presented protocol is higher than the competing protocol because of the longer route followed by the packet, in search of the best forwarder in the network. Our protocol keep account of whether the packet reached the destination successfully, irrespective of the length of the route. On the other hand, WDFAD keeps the track of the route followed by the packet, which leads to low APD.
We recorded the percentage improvement in the PDR and energy tax, as listed in Table 4.
Table 4. Qualitative analysis of the ERPMSA-UWSN based on PDR and energy tax with WDFAD.

5.3.2. Simulation Results Based on Sink Variation

To investigate the best economical options, we analyzed our protocol’s performance with the standard number of sinks (7) as well as a higher number (9) used by the existing WDFAD-DBR. Our proposed protocol does not perform well for 7 sinks as compared to 9 sinks, in both sparse and dense networks. This behavior is obvious as by decreasing the number of receivers in a network reduces the network’s performance. Consequently, the load on a single receiver increases which results in the increase of packets collision. Furthermore, this results in a lower PDR, higher energy tax, E2ED, and a higher APD, as shown in Figure 14a–d, respectively. Another limitation is the slow growth noted in a dense network. It is because ERPMSA-UWSN has limited sources of data packets after suppressing the majority of the PFNs, in contrast to WDFAD. The possibility of a void/energy hole and/or the absence of the potential forwarding node in the transmission range still exists.
Figure 14. (a) PDR against the number of nodes; (b) energy tax in comparison to the number of nodes; (c) end-to-end delay against the number of nodes; (d) APD vs. number of nodes. Comparison of ERPMSA-UWSN for 7 and 9 sinks.

6. Conclusions and Future Work

In this paper, we proposed a novel protocol, called Efficient Routing Protocol based on Master–Slave Architecture for Underwater Wireless Sensor Network (ERPMSA-UWSN) that aims to optimize energy consumption in the network. The routing scheme of ERPMSA-UWSN is based on several parameters including the neighboring nodes, hops count, energy level, master selection function, and holding time. We compared the performance of our proposed protocol with the closely related state-of-the-art Weighting Depth Forwarding Area Division Depth-Based Routing (WDFAD-DBR) protocol. Our simulation results demonstrated that ERPMSA-UWSN performs better than the WDFAD-DBR, i.e., an improvement of 13% on energy tax and 4.8% on PDR, on average, is achieved. In addition, the hidden terminal problem and the traffic overhead are controlled by suppressing the reproduction of data packets in the network which reduces the energy consumption. The existence of an energy hole or the absence of the potential forwarding node in the transmission range is still a challenging parameter resulting in slightly decreased reliability.
In future, sinking mobility can be added to the proposed routing scheme that may result in further decreasing the Accumulated Propagation Distance (APD) and End-to-End delay.

Author Contributions

Conceptualization, S.J. and Z.W.; methodology, E.Y.; software, R.A. and H.W.K.; validation, S.J., Z.W. and A.H.; formal analysis, S.H.; investigation, S.H. and H.W.K.; resources, E.Y.; data curation, S.J. and R.A.; writing—original draft preparation, S.J.; writing—review and editing, Z.W.; visualization, S.H.; supervision, Z.W.; project administration, A.H.; funding acquisition, E.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declared no conflict of interest.

References

  1. Felemban, E.; Shaikh, F.K.; Qureshi, U.M.; Sheikh, A.A.; Qaisar, S.B. Underwater Sensor Network Applications: A Comprehensive Survey. Int. J. Distrib. Sens. Netw. 2015. [Google Scholar] [CrossRef]
  2. Akyildiz, F.; Pompili, D.; Melodia, T. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 2005, 3, 257–279. [Google Scholar] [CrossRef]
  3. Khan, A.; Ali, I.; Ghani, A.; Khan, N.; Alsaqer, M.; Rahman, A.U.; Mahmood, H. Routing Protocols for Underwater Wireless Sensor Networks: Taxonomy, Research Challenges, Routing Strategies and Future Directions. Sensors 2018, 18, 1619. [Google Scholar] [CrossRef]
  4. Xie, P.; Cui, J.H.; Lao, L. VBF: Vector-based forwarding protocol for underwater sensor networks. In Proceedings of the 5th International IFIP-TC6 Conference, Coimbra, Portugal, 15–19 May 2006. [Google Scholar]
  5. Nicolaou, N.; See, A.; Xie, P.; Cui, J.-H.; Maggiorini, D. Improving the robustness of location-based routing for underwater sensor networks. In Proceedings of the OCEANS 2007-Europe, Aberdeen, UK, 18–21 June 2007. [Google Scholar]
  6. Yu, H.; Yao, N.; Liu, J. An adaptive routing protocol in underwater sparse acoustic sensor networks. Ad Hoc Netw. 2015, 34, 121–143. [Google Scholar] [CrossRef]
  7. Hafeez, T.; Javaid, N.; Hameed, A.R.; Sher, A.; Khan, Z.A.; Qasim, U. AVN-AHH-VBF: Avoiding void node with adaptive hop-by-hop vector based forwarding for underwater wireless sensor networks. In Proceedings of the 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Fukuoka, Japan, 6–8 July 2016; pp. 49–55. [Google Scholar]
  8. Wadud, Z.; Hussain, S.; Javaid, N.; Bouk, S.H.; Alrajeh, N.; Alabed, M.S.; Guizani, N. An energy scaled and expanded vector-based forwarding scheme for industrial underwater acoustic sensor networks with sink mobility. Sensors 2017, 7, 2251. [Google Scholar] [CrossRef] [PubMed]
  9. Qingwen, W.; Fei, C.; Zhi, L.; Qian, Q. A novel efficient forwarding protocol for 3-D underwater wireless sensor networks. In Proceedings of the IEEE 11th International Conference on Industrial Electronics and Applications, Hefei, China, 5–7 June 2016. [Google Scholar]
  10. IYazgi; Baykal, B. IYazgi; Baykal, B. Topology control vector based forwarding algorithm for underwater acoustic networks. In Proceedings of the IEEE 24th International Conference on Signal Processing and Communication Application, Zonguldak, Turkey, 16–19 May 2017. [Google Scholar]
  11. Walayat, A.; Javaid, N.; Akbar, M.; Khan, Z.A. MEES: Mobile energy efficient square routing for underwater wireless sensor networks. In Proceedings of the IEEE 31st International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, 26–29 March 2017. [Google Scholar]
  12. Zhong, X.; Chen, F.; Fan, J.; Guan, Q.; Ji, F.; Yu, H. Throughput analysis on 3-dimensional underwater acoustic network with one-hop mobile relay. Sensors 2018, 18, 252. [Google Scholar] [CrossRef]
  13. Bu, R.; Wang, S.; Wang, H. Fuzzy logic vector–based forwarding routing protocol for underwater acoustic sensor networks. Trans. Emerg. Telecommun. Technol. 2018, 29, 1–18. [Google Scholar] [CrossRef]
  14. Yan, H.; Shi, Z.J.; Cui, J.H. DBR: Depth-based routing for underwater sensor networks. In Proceedings of the IFIP International Conference on Networking, Singapore, 5–9 May 2008. [Google Scholar]
  15. Dubey, A.; Rajawat, A. Impulse effect of node mobility on delay sensitive routing algorithm in underwater sensor network. In Proceedings of the IEEE 10th International Conference on Internet of Things and Applications, Pune, India, 22–24 January 2016. [Google Scholar]
  16. Ahmed, T.; Chaudhary, M.; Kaleem, M.; Nazir, S. Optimized depth-based routing protocol for underwater wireless sensor networks. In Proceedings of the IEEE 10th International Conference on Open Source Systems and Technologies, Lahore, Pakistan, 15–17 December 2016; pp. 147–150. [Google Scholar]
  17. Majid, A.; Azam, I.; Waheed, A.; Abidin, M.Z.; Hafeez, T.; Khan, Z.A.; Qasim, U.; Javaid, N. An energy efficient and balanced energy consumption cluster based routing protocol for underwater wireless sensor networks. In Proceedings of the IEEE 30th International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, 23–25 March 2016. [Google Scholar]
  18. Noh, Y.; Lee, U.; Wang, P.; Vieira, L.F.M.; Gerla, J.H.C.M.; Kim, K. Hydrocast: Pressure routing for underwater sensor networks. IEEE Trans. Veh. Technol. 2016, 65, 333–347. [Google Scholar] [CrossRef]
  19. Yu, H.; Yao, N.; Wang, T.; Li, G.; Gao, Z.; Tan, G. WDFAD-DBR: Weighting depth and forwarding area division DBR routing protocol for UASNs. Ad Hoc Netw. 2016, 7, 256–282. [Google Scholar] [CrossRef]
  20. Wadud, Z.; Ullah, K.; Hussain, S.; Yang, X.; Qazi, A.B. Dow-pr DOlphin and whale pods routing protocol for underwater wireless sensor networks (UWSNs). Sensors 2018, 18, 1529. [Google Scholar] [CrossRef]
  21. Zhang, M.; Cai, W. Energy-Efficient Depth Based Probabilistic Routing Within 2-Hop Neighborhood for Underwater Sensor Networks. IEEE Sens. Lett. 2020, 4. [Google Scholar] [CrossRef]
  22. Kumar, R.; Bhardwaj, D.; Mishra, M. EBH-DBR: Energy-balanced hybrid depth-based routing protocol for underwater wireless sensor networks. Mod. Phys. Lett. B 2021, 35, 2150061. [Google Scholar] [CrossRef]
  23. Nguyen, N.-T.; Le, T.T.T.; Nguyen, H.-H.; Voznak, M. Energy-Efficient Clustering Multi-Hop Routing Protocol in a UWSN. Sensors 2021, 21, 627. [Google Scholar] [CrossRef] [PubMed]
  24. Diamant, R.; Casari, P.; Compagnro, F.; Kebkal, O.K.V.; Zorozi, M. Fair and throughput-optimal routing in multimodal underwater networks. IEEE Trans. Wirel. Commun. 2018, 17, 1738–1754. [Google Scholar] [CrossRef]
  25. Faheem, M.; Tuna, G.; Gungor, V.C. QERP: Quality-of-service (QOS) aware evolutionary routing protocol for underwater wireless sensor networks. IEEE Syst. J. 2017, 12, 2066–2073. [Google Scholar] [CrossRef]
  26. Rehman, M.A.; Lee, Y.; Koo, I. EECOR: An energy-efficient cooperative opportunistic routing protocol for Underwater acoustic sensor networks. IEEE Access 2017, 5, 14119–14132. [Google Scholar] [CrossRef]
  27. Li, M.; Du, X.; Huang, K.; Hou, S.; Liu, X. A routing protocol based on received signal strength for underwater wireless sensor networks (UWSNs). Information 2017, 8, 153. [Google Scholar] [CrossRef]
  28. Yang, J.; Liu, S.; Liu, Q.; Qiaoi, Q.G. UMDR: Multi-path routing protocol for underwater ad hoc networks with directional antenna. J. Phys. Conf. Ser. 2018, 960, 1–7. [Google Scholar] [CrossRef]
  29. Patil, K.; Jafri, M.R.; Fiems, D.; Marin, A. Stochastic modeling of depth based routing in underwater sensor networks. Ad Hoc Netw. 2019, 89, 132–141. [Google Scholar] [CrossRef]
  30. Coutinho, R.W.L.; Boukerche, A.; Loureiro, A.A.F. PCR: A Power Control-based Opportunistic Routing for Underwater Sensor Networks. In Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Montreal, QC, Canada, 28 October–2 November 2018; pp. 173–180. [Google Scholar]
  31. Gola, K.K.; Gupta, B. Underwater Acoustic Sensor Networks: An Energy Efficient and Void Avoidance Routing Based on Grey Wolf Optimization Algorithm. Arab. J. Sci. Eng. 2021, 46, 3939–3954. [Google Scholar] [CrossRef]
  32. Alfouzan, F.A.; Ghoreyshi, S.Y.; Shahrabi, A.; Ghahroudi, M.S. An AUV-Aided Cross-Layer Mobile Data Gathering Protocol for Underwater Sensor Networks. Sensors 2020, 20, 4813. [Google Scholar] [CrossRef]
  33. Gul, H.; Ullah, G.; Khan, M.K.M.Y. EERBCR: Energy-efficient regional based cooperative routing protocol for underwater sensor networks with sink mobility. J. Ambient. Intell. Humaniz. Comput. 2021, 1–13. [Google Scholar] [CrossRef]
  34. Fattah, S.; Gani, A.; Ahmedy, I.; Idris, M.Y.I.; Hashem, I.A.T. A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges. Sensors 2020, 20, 5393. [Google Scholar] [CrossRef] [PubMed]
  35. Lu, Y.; He, R.; Chen, X.; Lin, B.; Yu, C. Energy-Efficient Depth-Based Opportunistic Routing with Q-Learning for Underwater Wireless Sensor Networks. Sensors 2020, 20, 1025. [Google Scholar] [CrossRef] [PubMed]
  36. Yu, W.; Chen, Y.; Wan, L.; Zhang, X.; Zhu, P.; Xu, X. An Energy Optimization Clustering Scheme for Multi-Hop Underwater Acoustic Cooperative Sensor Networks. IEEE Access 2020, 8, 89171–89184. [Google Scholar] [CrossRef]
  37. Hu, T.; Fei, Y. QELAR: A machine-learning-based adaptive routing protocol for energy-efficient and lifetime-extended underwater sensor networks. IEEE Trans. Mob. Comput. 2010, 9, 796–809. [Google Scholar]
  38. Park, S.H.; Mitchell, P.D.; Grace, D. Reinforcement Learning Based MAC Protocol (UW-ALOHA-Q) for Underwater Acoustic Sensor Networks. IEEE Access 2019, 7, 165531–165542. [Google Scholar] [CrossRef]
  39. Gola, K.K.; Gupta, B. Underwater sensor networks: Comparative analysis on applications, deployment and routing techniques. IET Commun. 2020, 14, 2859–2870. [Google Scholar] [CrossRef]
  40. Climent, S.; Sanchez, A.; Capella, J.V.; Meratnia, N.; Serrano, J.J. Underwater acoustic wireless sensor networks: Advances and future trends in physical, MAC and routing layers. Sensors 2014, 14, 795–833. [Google Scholar] [CrossRef]
  41. Mackenzie, K.V. Nine-term equation for sound speed in the oceans. J. Acoust. Soc. Am. 1981, 70, 807–812. [Google Scholar] [CrossRef]
  42. Pottie, G.J.; Kaiser, W.J. Wireless integrated network sensors. Commun. ACM 2000, 43, 51–58. [Google Scholar] [CrossRef]
  43. Jafri, M.; Marin, A.; Torsello, A.; Ghaderi, M. On the optimality of opportunistic routing protocols for underwater sensor networks. In Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Montreal, QC, Canada, 28 October–2 November 2018; pp. 207–215. [Google Scholar]
  44. Chiang, K.H.; Shenoy, N. A 2-D random-walk mobility model for location-management studies in wireless networks. IEEE Trans. Veh. Technol. 2004, 53, 413–424. [Google Scholar] [CrossRef]
  45. Raghunathan, V.; Schurgers, C.; Park, S.; Srivastava, M.R. Energy-aware wireless microsensor networks. IEEE Signal Proc. Mag. 2002, 19, 40–50. [Google Scholar] [CrossRef]
  46. Stojanovic, M.; Preisig, J. Underwater acoustic communication channels: Propagation models and statistical characterization. IEEE Commun. Mag. 2009, 47, 84–89. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.