Next Article in Journal
Single Phase Induction Motor Driver for Water Pumping Powered by Photovoltaic System
Previous Article in Journal
Analysis of Edge Termination Techniques for Gallium Nitride Pseudo-Vertical p-n Diodes: Modeling Based on Technology Computer-Aided Design and Review of Current Developments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Maritime Opportunistic Network Routing Strategies for Assessing Link Connectivity Based on Deep Learning

Institute of Information Engineering, Shanghai Maritime University, Shanghai 201306, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(6), 1187; https://doi.org/10.3390/electronics14061187
Submission received: 26 February 2025 / Revised: 10 March 2025 / Accepted: 13 March 2025 / Published: 18 March 2025

Abstract

:
In opportunistic networks, where link performance is often highly variable or extreme due to the intermittent nature of communication links between nodes, there may never be a continuous and complete path between the receiver and the sender, and packets of information can only be stored and carried by the movement of nodes, which then look for forwarding opportunities when they meet. Existing routing protocols for opportunistic networks suffer from problems such as excessive network memory consumption or insufficient link prediction that is focused on link connectivity determination. In this paper, we propose an efficient opportunistic network routing protocol that evaluates the historical values of encounter probability, movement posture, and acquired resource availability of all nodes within the communicable range based on link prediction. The intelligent prediction of link connectivity state provides a reliable aid for routing decisions, which can provide longer-period communication in the ocean; the consideration of nodes’ comprehensive attributes establishes the priority of message forwarding, avoids duplicate transmissions and route invalidation phenomena, and effectively improves the success rate of message delivery. It also reduces the transmission latency and routing overhead compared to the existing schemes.

1. Introduction

An opportunistic network mainly consists of nodes with limited energy; such nodes have various kinds of network cards such as WiFi, Bluetooth, 4G, 5G, satellite, etc., which come with functions such as data collection, computation, and transmission [1]. Any facility that carries a communication network can be a node, and, in maritime opportunistic networks, communication relies mainly on ships or fixed base stations at sea, such as buoys and platforms, which become nodes, as previously described. In opportunistic networks, the transmission of messages from the source node to the destination node also requires the assistance of relay nodes to store and carry the messages [2]; the nodes utilize the multi-hop mode to transmit all the data to the relay node, which fuses all the data to the network base station and, ultimately, sends the data required by the user to the user [3]. Due to the intermittent communication between nodes, the resources around the relay nodes are dynamic, changing, and uncertain [4]. Also, the maritime environment is different from the land, the meteorological conditions are complex and changeable, and the network users are highly mobile and sparsely distributed. The design of the maritime opportunistic network routing should contain a reasonable selection of communication resources to carry out an effective evaluation of the relay nodes [5] and to determine the forwarding priority of all the nodes in the candidate relay set, to avoid or inhibit the duplication of transmission [6].
In the current research that has bee nproposed for solving routing schemes for opportunistic networks, most works are based on replicating data copies for wide dissemination in order to improve the packet transmission performance [7], but this can lead to the wastage of network resources or even network congestion. There are also schemes that utilize link prediction to transform link availability between pairs of nodes into a probabilistic representation as a metric for routing decision making [8]. But the link prediction in which the sequence learner employed is concerned with learning the correlation in time series, while, in opportunistic networks with intermittent communication, more attention should be paid to link connectivity to cope with the highly variable link performance and improve the communication period. In [9], an opportunistic network routing scheme based on network connectivity assessment is proposed, where a breadth-first algorithm constructs a connectivity graph between a source node and a target node to determine the two nodes’ connectivity. But this algorithm has high space complexity, consumes a large amount of memory, and is not suitable for dealing with large-scale data. In a weighted graph, there is no guarantee that the path with the smallest weight can be found.
This research focuses on addressing the above limitations. The proposed deep learning-based link connectivity assessment for opportunistic network routing strategies firstly performs link prediction for link connectivity between pairs of nodes, takes into account the further forwarding state of the nodes in the future moments, and, on this basis, determines the forwarding priority of the nodes based on their comprehensive attributes in the set of candidate relays, then designs the routing scheme. The 6G networks will incorporate AI-driven dynamic spectrum access and spectrum agility mechanisms, where links adapt dynamically based on real-time spectrum conditions, interference levels, and coexistence requirements [10]. The link connectivity prediction model in this paper could be extended to predict spectrum availability, helping 6G networks to optimize routing based on real-time spectrum usage. Hence, deep learning-based link prediction will be crucial in 6G’s ultra-dynamic, software-defined network environments. The following are the major contributions of this work:
  • Intelligent prediction of link state can effectively determine the risk of link breakage, thus assisting routing decisions and improving communication efficiency [11];
  • In link prediction, more attention is paid to the link connectivity status in the ship characterization dataset (a ship characterization dataset consists of the communication data from multiple ships at a given moment in time) rather than the time series, in order to cope with the highly variable nature of the links in the maritime opportunistic network;
  • Determining the forwarding priority of a node based on its attributes can avoid the repeated transmission of messages and reduce the waste of network resources. This can also avoid the situation in which the current node has no available neighboring nodes to forward packets to the destination within the shortest path, and can only be broadcasted all the time by certain nodes with high-priority messages, resulting in invalid routes, which provides a longer period of communication in the ocean;
  • The special feature of opportunistic networks is the random movement of nodes, and, in this paper, we take into account the movement posture of nodes when evaluating them. This leads to a higher probability of forwarding a message to a node that is more convergent in its motion posture or to other nodes that are closer to the target node.
This paper is divided into six major sections. Section 2 introduces the main attribute factors of the evaluated nodes, including the node’s historical value encounter probability, the node’s posterior resource availability, and the node’s movement posture; Section 3 proposes the link prediction-based routing algorithm process in this paper; Section 4 specifically describes the link prediction algorithm based on Convolutional Neural Networks (CNNs) and an Efficient Additive Attention (EAA) mechanism, in which the ship communication data are first extracted from the attribute features by the CNN, and then processed using the EAA to process the feature representations and obtain the prediction results of link connectivity; Section 5 compares the algorithm in this paper with the replication-based routing SprayAndWait and node attribute-based routing RSNA in terms of network performance with different buffer sizes. This paper’s algorithm effectively improves the message delivery rate and reduces resource consumption and network overhead.

2. Comprehensive Attribute Evaluation of Nodes

2.1. Encounter Probability of Historical Values of Nodes

The biggest challenge facing marine communication networks is that nodes are in a mobile state and the link quality between nodes is constantly changing. Good link quality can improve the success rate of information reception: the higher the reception success rate, the more reliable the communication. Neighboring nodes form a link between them, and the link quality is inextricably linked to the interaction between pairs of nodes. From the perspective of data delivery, the more active a node is in the network, the higher the quality of its information carrier because it has a higher probability of encountering other nodes in the network, including the destination node [12]. In this paper, we use the node’s history value encounter probability to describe the interaction between pairs of nodes, as shown in Equation (1).
p l , r = e l , r c = 1 , c l n e l , c ,
where e l , r denotes the number of direct encounters between nodes l and r, and e l , c (1 ≤ c ≤ n) denotes the total number of encounters between all pairs of nodes in the period T.
The ability of nodes to forward packets can be effectively measured using p l , r to improve link quality.

2.2. Acquired Resource Availability of Nodes

In opportunistic networks, a node’s resources are fixed and non-renewable. In routing, if the node currently carrying a message cannot reach the destination node within the communication range and there is no available neighboring node to relay it, then certain nodes with high priority will frequently perform data transmission, resulting in the early exhaustion of resources, which reduces the lifetime of the network and leads to the phenomenon of invalid routing [12]. Alternatively, when a node has insufficient available resources, it will not be able to continue to relay the message, and the source message that it processed will also be lost. Therefore, resource metrics should be involved as a key factor in the forwarding decision: the richer the node’s acquired resource availability, the higher its participation in delivering messages [5]. In this paper, the acquired resource availability of a node is defined as the device capacity (DC), which is expressed as a percentage of the node’s available buffer, as shown in Equation (2).
DC = B r ( t ) B i n i t ,
where B r is the remaining buffer size of the node and B i n i t is the initial buffer size of the node.
Utilizing DC can effectively evaluate the node’s ability to forward messages, use the node’s limited resources more rationally, and reduce the loss rate of message transmission.

2.3. Kinematic Posture of Nodes

In Section 2.2, the forwarding ability of the node as the receiving party of the message is evaluated in the process of transmitting the data, whether it has enough device capacity for forwarding the message or not. In Section 2.3, the degree of willingness of the node to forward when it is the sending party of the message will be evaluated, and the node is more willing to use its resources to forward the message to the node that is related to it [13]. The special feature of the opportunistic network is the random movement of nodes, due to which the message cannot be directly transmitted to the destination node. The relay node is utilized to store and forward the message, and the message can be transmitted to the destination node hop by hop through the relay node. During the node’s movement, it is more likely to forward the message to the nodes that are more convergent with it in terms of its movement posture or other nodes that are closer to the destination node in terms of their movement posture, and the degree of willingness to forward the message to these nodes is also stronger. In this paper, we use the dot product to calculate the direction similarity (DS) on the node movement posture, as shown in Equation (3).
DS = | | d i | | | | d j | | c o s ( θ ) ,
where d i and d j denote the direction vector of the node carrying the message and the direction vector of the node in the candidate relay set, respectively, and θ denotes the angle between the motion directions of the two nodes, θ ϵ (0, π ).
When θ is smaller, DS is larger, and nodes that are judged to be more similar in terms of movement posture have a higher degree of willingness for nodes to forward messages to them.

3. Routing Algorithms

In this paper, we propose an opportunistic network routing strategy based on link connectivity assessment in the following steps:
Step 1. Network nodes are initialized and the packet is sent to all available nodes in the neighbor list of the source node N l . If the neighbor list contains the destination node N d , then the message is directly transmitted to N d . Otherwise, it will enter the relay node selection process;
Step 2. Firstly, determine the connectivity status of the relay node N r and its neighbor N r f according to the link prediction method, which is introduced in Section 4. If the predicted connectivity is 1, then there exists an encounter between the two. Then, from the historical encounter probability of the node p l , r , the link availability of the node pair can be defined as shown in Equation (4).
p l a = p l r , Link availability of node N r and node N l 0 , else ,
If the link availability p l a > 0 for relay node N r and its neighbor N r f means that N r has next hop, this also identifies the nodes in the candidate relay set that do not have more relay nodes to the destination node and narrows the candidate relay set;
Step 3. To further narrow down the candidate relay set, calculate DC( N r , N r f ) and filter out the dead nodes with insufficient acquired resources;
Step 4. Use the weighting function U( N r , N r f ) to determine the priority in the remaining candidate relay set, as shown in Equation (5):
U ( N r , N r f ) = α p l a + β D C + γ D S ,
where α + β + γ = 1 [14]. In order for all three node attributes mentioned in Section 3 to be involved in routing decisions, it is better to take α β γ . Based on DC( N r , N r f ) combined with the node’s motion posture, DS( N r , N r f ) can further identify the nodes that seem to be qualified, but there are no more subsequently available candidates to relay the data grouping to avoid data loss;
Step 5. Forward the message to the relay node Nr with higher priority based on the weighting function. The message is delivered by N r and goes back to the judgment in Step 1 if the neighbor list of N r does not contain the destination node N d ; it enters a new round of relay node selection. Finally, the message is passed hop by hop until it reaches the destination node.
To deal with the possible selfish behavior of the nodes, a reputation score is set for each node in the routing decision: the node will be rewarded with credit for forwarding the packet, and the credit score will be reduced if the node appears to refuse to forward the packet or prioritize its own transmission behavior. Only nodes with higher reputations are prioritized for data forwarding.

4. Intelligent Prediction of Link States

To improve the reliability of routing decisions, this paper proposes a link intelligent prediction scheme (CNN–EAA) based on the combination of a Convolutional Neural Network and attention mechanism for judging the link connectivity status to assist subsequent routing decisions. The algorithm is useful for opportunistic networks where nodes have high mobility to extract valid information about the nodes and focus on learning the connectivity status of the links. Applying this link prediction algorithm before routing decisions can effectively improve the communication efficiency and communication period of opportunistic networks.

4.1. Effective Additive Attention (EAA)

The EAA consists of four hierarchical stages of different scales { 1 4 , 1 8 , 1 16 , 1 32 } , each of which is consistent and composed of a Convolutional Encoder and a SwiftFormer encoder [15], with a downsampling layer introduced between two consecutive phases to halve the spatial size and increase the feature latitude. The structure of EAA is shown in Figure 1. The Convolutional Encoder consists of a 3 × 3 depth convolution [16] and two point-state convolutions [17]. The initial module of the SwiftFormer encoder consists of a 3 × 3 depth convolution followed by a point-state convolution [16], followed by an efficient additive attention module. Finally, the output features are fed into a linear module that consists of two 1 × 1 point-state convolution layers, batch normalization, and GeLU activation [15].
In SwiftFormer’ s attention module, the input embedding matrix x is transformed into a query (Q) and a key (K) via two matrices W q , W k , where Q, K R n × d , W q , W k R d × d , n is the length of tokens, and d is the dimension of embedding vectors. Next, the query matrix Q is multiplied with the learnable parameter vector w a R d to learn the attention weight of the query and generate the global attention query vector α R n , as in Equation (6):
α = Q · w α / d ,
The query matrix is then pooled based on the learned attention weights, resulting in a single global query vector q R d , as follows in Equation (7):
q = i = 1 n α i · Q i ,
Next, the interaction between the global query vector q R d and the key matrix K R n × d is encoded to form a global context via element-level multiplication ( R n × d ). A linear transformation layer for query–key interactions is employed to learn the hidden representation of the tokens. The output of the attention module x ^ can be described using Equation (8):
x ^ = Q ^ + T ( K · q ) ,
where Q ^ denotes the normalized query matrix and T denotes the linear transformation [15].

4.2. Convolutional Neural Networks (CNN)s

The CNN consists of two Conv1D (one-dimensional convolutional layers) combined with a fully connected layer and an attention mechanism. It merges a MaxPooling layer and a Rectified Linear Unit (ReLU) layer between two consecutive convolutional modules to fully capture spatial dependencies [8]. A Conv1D operation with input channel 1, output channel 16, convolution kernel length 3, and step size 1 is applied to the sample set in the first convolutional layer to filter the noise and extract the valid information. Figure 2 shows an example of a simple one-dimensional convolution operation. Denote y t ( i , 0 ) as the input matrix of the 0th convolutional layer in the i t h region matrix at time t. Then, the k t h network layer is represented as shown in Equation (9):
y t ( i , k ) = i ϵ x t f ( y t ( i , k 1 ) ) W i , t k + b t k ,
where x t denotes a set of input data, W i , t k is the convolution kernel, f is the nonlinear (rectified linear unit) activation function, ⊗ is the elemental product, and b t k and y t ( i , k ) denote the deviation of the convolution module k and the output value, respectively [18].
The convolutional layer is followed by a nonlinear activation function ReLU to improve the model’s ability to learn complex structures, as shown in Equation (10).
f ( x ) = m a x ( 0 , x ) ,
A MaxPooling layer is added to the CNN model, which is a downsampling method that reduces the spatial dimensionality value of the feature attribute map by half and retains the most important features [19]. The pooling operation is shown in Equation (11), and the input data feature set is partitioned into connected 1 × 2 modules by means of the window free-sliding. An activation function accelerates the convergence of the model.
y t ( l , k ) = s u b s m a p l i n g ( y t 1 ( i , k ) ) ,
The second layer of convolution is similar to the first layer, by applying a Conv1D convolution operation with 16 input channels, 32 output channels, convolution kernel length of 3, and step size of 1. This layer increases the complexity of the features and further reduces the data dimensions.

4.3. CNN–EAA

Figure 3 depicts the basic process of the CNN–EAA algorithm. The maritime vessel feature dataset with multi-attribute factors is used as the input to the CNN convolutional layer. Since there is no public dataset for maritime communication, this paper obtains it by constructing a maritime ship communication model, which has been introduced in Ref. [20]. Due to the limitation of the length of the article, Table 1 lists the communication data of the first group of ships generated in the first second; 80% of the collected sample data are used for the training set and 20% for the test set.
Before entering the convolutional layer, the input tensor dimensions are extended by the unsqueeze layer to adapt to the input format of the one-dimensional convolutional layer, and sample features can be extracted by using the CNN convolutional layer. The pooling module reduces the amount of data in the hidden intermediate layer without losing the scale-invariance of the features, and, at the same time, at each layer, the convolution module and pooling module utilize activation functions to accelerate model convergence. After the convolution is complete, the output of the convolutional layer is spread to a 2D tensor for input to the first fully connected layer.
If the best performance may not be achieved by simply applying convolutional operations to the information, the EAA (Efficient Additive Attention) mechanism [15] is used to weigh the input features so that the model can pay more attention to the important features and finally complete the classification task. Therefore, an unsqueeze layer is added between the CNN and EAA to map the features extracted by the CNN to a higher-dimensional space to fit the input format of the attention layer. The features adjusted after weighting by the EAA of the attention mechanism are then passed through the squeeze layer to recover the dimensionality in order to input to the second fully connected layer for classification.
To prevent the overfitting phenomenon, a dropout layer is also added between the CNN and EAA, which can effectively reduce the overfitting problem in deep learning training models [21].
The training of the CNN–EAA model on ship feature attributes can lead to the prediction of link connectivity, which assists in providing longer-period communication in the ocean and improving the efficiency of information transmission.

5. Simulation Results and Performance Analysis

To verify the rationality and efficiency of the proposed method, this section compares the network performance of routing in this paper with replication-based routing SprayAndWait [22] and node attribute-based routing RSNA [12] with different buffer sizes, analyzing them specifically.

5.1. Simulation Environment Parameters

In this paper, simulation experiments are carried out in the MATLAB 2018a software environment. Using a random walk model in an opportunistic network, the nodes’ corresponding geographic locations at different times are combined to represent the node’s movement trajectory, and each node in the network can be used as a source node, relay node, and destination node [23]. A distance threshold is used to define whether data exchange occurs when two nodes are in contact, and, to ensure the comparability of the experiments, the same packet caching and deletion strategies are used and the packet generation rate is adjusted based on the network load. In addition, it is assumed that all nodes are not selfish or malicious and that they can freely collaborate with each other to exchange information. The main parameter settings of the simulation scenario are shown in Table 2.
In the simulation experiments, packet delivery rate, average transmission delay, and routing overhead are used to evaluate the network performance of different routing protocols, which are defined in detail as follows:
  • Packet Delivery Ratio: the ratio between the total number of packets delivered to the destination and the total number of packets sent from the source node, reflecting the impact of routing on network performance;
  • Average Transmission Delay: the average value of the time taken by a packet to reach the destination node from the source node, which is affected by the frequency of encounters between nodes, packet storage waiting time, etc., and reflects the timeliness of the routing policy in delivering messages [24];
  • Routing Overhead: Routing overhead is usually related to the number of packet forwards and network bandwidth consumption, and is used to measure the resource usage efficiency and scalability of the routing policy.
The packet delivery rate, routing overhead, and average delay calculations are mainly dependent on the contact between nodes, the exchange of packets, and the store and forward process.

5.2. Comparative Analysis of Routing Performance with Different Buffers

The routing overhead of the three algorithms with different buffers is shown in Figure 4. As the buffer increases, each node may store more packets and participate in more transmission and forwarding processes, so the routing overhead of all three algorithms gradually increases. With different buffers, SprayAndWait has a large number of message copies in the network, which generates a large routing overhead and consumes a lot of network resources. RSNA decreases the routing overhead compared to SprayAndWait, but there is still some transmission of useless information. The routing strategy proposed in this paper reduces the transmission of useless messages and greatly reduces the routing cost, which is less than SprayAndWait and RSNA under different buffers.
The average transmission delay under different buffers of the three algorithms is shown in Figure 5. In SprayAndWait, the node carrying the message needs to wait for the relay forwarding from the auxiliary node, which increases the message transmission delay. The routing strategy in this paper determines the forwarding priority of all the candidate neighbor nodes more reasonably than RSNA, which effectively reduces the transmission delay, and the average transmission delay under different buffers is less than both SprayAndWait and RSNA.
The packet delivery rates of the three algorithms under different buffers are shown in Figure 6. SprayAndWait does not take into account the prediction and motion posture of relay nodes, and the packet delivery rate is relatively low in general. The further prediction of relay nodes by RSNA improves the packet delivery rate to a certain extent compared to SprayAndWait. The routing strategy proposed in this paper improves the further prediction conditions for relay nodes based on RSNA, effectively reduces the number of message replicas, and makes the packet delivery rate higher than both SprayAndWait and RSNA under different buffers.
From the above experimental results, it can be concluded that the routing strategy based on deep learning to evaluate link connectivity proposed in this paper improves the network performance under different buffer sizes, effectively increases the message delivery rate, and reduces the resource consumption and network overhead compared to SprayAndWait and RSNA. Thus, it is an ideal choice for transmitting data in the dynamically changing maritime opportunistic network.

6. Conclusions

In this paper, we propose a routing strategy for assessing link connectivity based on deep learning. Firstly, the CNN–EAA model is used to judge the link connectivity state: CNN can extract the effective features of the ship nodes, and EAA makes the model pay more attention to the important features and focuses on learning the connectivity prediction result of the link. Finally, the intelligent prediction of the link state is combined with the comprehensive attributes of the nodes, taking into account the node’s historical value of the probability of encounter, the availability of resources in the latter day and the movement situation, and the design of the routing scheme, which effectively improves the message delivery rate and reduces the resource consumption and network overhead. In this paper, we design a routing scheme based on link prediction, which can better adapt to the maritime opportunistic network environment where the link state is highly changeable. Furthermore, the prediction of broken or potentially unavailable links also improves the reliability of communication; it improves the traditional link prediction method based on time-series learning [25] and the link connectivity judgment method, which is computationally complex and occupies a large amount of memory.

Author Contributions

Supervision, S.J.; writing—original draft, H.X.; writing—review and editing, H.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by The Innovation Program of Shanghai Municipal Education Commission of China (No. 2021-01-07-00-10-E00121).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The program code used in the research can be obtained from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Trifunovic, S.; Kouyoumdjieva, S.T.; Distl, B.; Pajevic, L.; Karlsson, G.; Plattner, B. A decade of research in opportunistic networks: Challenges, relevance, and future directions. IEEE Commun. Mag. 2017, 55, 168–173. [Google Scholar] [CrossRef]
  2. Dede, J.; Förster, A.; Hernández-Orallo, E.; Herrera-Tapia, J.; Kuladinithi, K.; Kuppusamy, V.; Manzoni, P.; bin Muslim, A.; Udugama, A.; Vatandas, Z. Simulating opportunistic networks: Survey and future directions. IEEE Commun. Surv. Tutor. 2017, 20, 1547–1573. [Google Scholar] [CrossRef]
  3. Wei, T.; Feng, W.; Chen, Y.; Wang, C.X.; Ge, N.; Lu, J. Hybrid satellite-terrestrial communication networks for the maritime Internet of Things: Key technologies, opportunities, and challenges. IEEE Internet Things J. 2021, 8, 8910–8934. [Google Scholar] [CrossRef]
  4. Kidston, D.; Kunz, T. Challenges and opportunities in managing maritime networks. IEEE Commun. Mag. 2008, 46, 162–168. [Google Scholar] [CrossRef]
  5. Alajeely, M.; Doss, R.; Ahmad, A. Routing protocols in opportunistic networks—A survey. IETE Tech. Rev. 2018, 35, 369–387. [Google Scholar] [CrossRef]
  6. Chakchouk, N. A survey on opportunistic routing in wireless communication networks. IEEE Commun. Surv. Tutor. 2015, 17, 2214–2241. [Google Scholar] [CrossRef]
  7. Mahendran, V.; Murthy, C.S.R. Buffer dimensioning of DTN replication-based routing nodes. IEEE Commun. Lett. 2012, 17, 123–126. [Google Scholar] [CrossRef]
  8. Ge, L.; Jiang, S.; Wang, X.; Xu, Y.; Feng, R.; Zheng, Z. Link availability prediction based on machine learning for opportunistic networks in oceans. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2022, 105, 598–602. [Google Scholar] [CrossRef]
  9. Ji, M.; Cui, X.; Li, J.; Xu, T.; Li, S.; Liu, J. A routing algorithm based on network connectivity assessment for maritime opportunistic networks. Procedia Comput. Sci. 2021, 187, 200–205. [Google Scholar] [CrossRef]
  10. Bazzi, A.; Bomfin, R.; Mezzavilla, M.; Rangan, S.; Rappaport, T.; Chafii, M. Upper Mid-Band Spectrum for 6G: Vision, Opportunity and Challenges. arXiv 2025, arXiv:2502.17914. [Google Scholar]
  11. Kumar, A.; Singh, S.S.; Singh, K.; Biswas, B. Link prediction techniques, applications, and performance: A survey. Phys. A Stat. Mech. Its Appl. 2020, 553, 124289. [Google Scholar] [CrossRef]
  12. Ge, L.; Jiang, S. An efficient routing scheme based on node attributes for opportunistic networks in oceans. Entropy 2022, 24, 607. [Google Scholar] [CrossRef] [PubMed]
  13. Dalal, R.; Khari, M.; Anzola, J.P.; García-Díaz, V. Proliferation of opportunistic routing: A systematic review. IEEE Access 2021, 10, 5855–5883. [Google Scholar] [CrossRef]
  14. Zhang, S.; Zhou, Q.; Wu, X. Fast dynamic routing based on weighted kernel density estimation. In Proceedings of the International Symposium on Artificial Intelligence and Robotics, Paris, France, 21–22 August 2018; pp. 301–309. [Google Scholar]
  15. Shaker, A.; Maaz, M.; Rasheed, H.; Khan, S.; Yang, M.H.; Khan, F.S. Swiftformer: Efficient additive attention for transformer-based real-time mobile vision applications. In Proceedings of the IEEE/CVF International Conference on Computer Vision, Paris, France, 2–3 October 2023; pp. 17425–17436. [Google Scholar]
  16. Li, Y.; Yuan, G.; Wen, Y.; Hu, J.; Evangelidis, G.; Tulyakov, S.; Wang, Y.; Ren, J. Efficientformer: Vision transformers at mobilenet speed. Adv. Neural Inf. Process. Syst. 2022, 35, 12934–12949. [Google Scholar]
  17. Maaz, M.; Shaker, A.; Cholakkal, H.; Khan, S.; Zamir, S.W.; Anwer, R.M.; Shahbaz Khan, F. Edgenext: Efficiently amalgamated cnn-transformer architecture for mobile vision applications. In Proceedings of the European Conference on Computer Vision, Tel Aviv, Israel, 23–27 October 2022; pp. 3–20. [Google Scholar]
  18. Ye, S.; Zhijun, F.; Yongbin, G. Multi-model fusion of coronary cta segmentation based on attention mechanism. J. Front. Comput. Sci. Technol. 2020, 14, 1602. [Google Scholar]
  19. Zhao, L.; Zhang, Z. A improved pooling method for convolutional neural networks. Sci. Rep. 2024, 14, 1589. [Google Scholar] [CrossRef] [PubMed]
  20. Xie, H.; Jiang, S. Maritime Opportunity Network Link Evaluation Method Based on Convolutional Neural Network and Additive Attention Mechanism. Mob. Commun. 2025; in press. [Google Scholar]
  21. Zhang, Y.; Peng, C. A Hybrid Model based on Deep Learning and Cross-attention for Short-term Wind Power Prediction. In Proceedings of the 2022 5th International Conference on Renewable Energy and Power Engineering (REPE), Beijing, China, 28–30 September 2022; pp. 351–355. [Google Scholar]
  22. Derakhshanfard, N.; Sabaei, M.; Rahmani, A.M. Sharing spray and wait routing algorithm in opportunistic networks. Wirel. Netw. 2016, 22, 2403–2414. [Google Scholar] [CrossRef]
  23. Liao, Z.; Liu, L.; Chen, Y. A novel link prediction method for opportunistic networks based on random walk and a deep belief network. IEEE Access 2020, 8, 16236–16247. [Google Scholar] [CrossRef]
  24. Huang, T.K.; Lee, C.K.; Chen, L.J. Prophet+: An adaptive prophet-based routing protocol for opportunistic network. In Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications, Perth, Australia, 20–23 April 2010; pp. 112–119. [Google Scholar]
  25. Ge, L.; Jiang, S. An efficient opportunistic routing based on prediction for nautical wireless ad hoc networks. J. Mar. Sci. Eng. 2022, 10, 789. [Google Scholar] [CrossRef]
Figure 1. Structure of EAA.
Figure 1. Structure of EAA.
Electronics 14 01187 g001
Figure 2. One-dimensional convolution example.
Figure 2. One-dimensional convolution example.
Electronics 14 01187 g002
Figure 3. CNN–EAA algorithm framework.
Figure 3. CNN–EAA algorithm framework.
Electronics 14 01187 g003
Figure 4. Comparison of routing overhead with different buffers: (a) SprayAndWait; (b) RSNA; (c) Deep learning-based routing for assessing link connectivity.
Figure 4. Comparison of routing overhead with different buffers: (a) SprayAndWait; (b) RSNA; (c) Deep learning-based routing for assessing link connectivity.
Electronics 14 01187 g004
Figure 5. Comparison of average delay with different buffers: (a) SprayAndWait; (b) RSNA; (c) Deep learning-based routing for assessing link connectivity.
Figure 5. Comparison of average delay with different buffers: (a) SprayAndWait; (b) RSNA; (c) Deep learning-based routing for assessing link connectivity.
Electronics 14 01187 g005
Figure 6. Comparison of packet delivery rate with different buffers: (a) SprayAndWait; (b) RSNA; (c) Deep learning-based routing for assessing link connectivity.
Figure 6. Comparison of packet delivery rate with different buffers: (a) SprayAndWait; (b) RSNA; (c) Deep learning-based routing for assessing link connectivity.
Electronics 14 01187 g006
Table 1. Selected ship datasets.
Table 1. Selected ship datasets.
ShipID lon t lat t v t (km/h) θ t SNR (dB)Link_Connectivity
1113.1691−62.0405236.066614.1213.160
2146.095484.732212.85620.6311.440
3−134.230881.7312305.68655.5322.961
4148.8293−2.6385336.23750.9223.851
547.635354.0007244.34461.945.601
6−144.8721−64.0963272.786416.4714.691
7−79.7506−14.3215267.527613.8913.361
816.794975.0855141.20176.3419.390
9164.525252.1651235.972019.0121.281
10167.365382.788261.62720.6822.640
Table 2. Simulation parameters.
Table 2. Simulation parameters.
ParametersValuesDescription
Node Deployment Area100 m × 100 mSquare monitoring area
Transmission Speed200 kbpsThe speed at which a node transmits a message
Message Interval10 sPacket delivery cycle
Maximum Message Survival Time1000 sPacket survival time limit to prevent packets from looping indefinitely in the network
Nodal Velocity0∼20 km/hRandom speed range
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xie, H.; Jiang, S. Maritime Opportunistic Network Routing Strategies for Assessing Link Connectivity Based on Deep Learning. Electronics 2025, 14, 1187. https://doi.org/10.3390/electronics14061187

AMA Style

Xie H, Jiang S. Maritime Opportunistic Network Routing Strategies for Assessing Link Connectivity Based on Deep Learning. Electronics. 2025; 14(6):1187. https://doi.org/10.3390/electronics14061187

Chicago/Turabian Style

Xie, Huilin, and Shengming Jiang. 2025. "Maritime Opportunistic Network Routing Strategies for Assessing Link Connectivity Based on Deep Learning" Electronics 14, no. 6: 1187. https://doi.org/10.3390/electronics14061187

APA Style

Xie, H., & Jiang, S. (2025). Maritime Opportunistic Network Routing Strategies for Assessing Link Connectivity Based on Deep Learning. Electronics, 14(6), 1187. https://doi.org/10.3390/electronics14061187

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop