Research article Special Issues

Underwater routing protocols: Analysis of link selection challenges

  • The sensor nodes deployed in underwater environment has different routing mechanism in contrast to the terrestrial network. Getting underwater data on pollution detection, control of the ecosystem, marine mining, catastrophe avoidance and strategic surveillance thereby demands smooth packet transmission which can only be possible through a stable and astute communication link between sensor nodes. Therefore, selecting best link between source and destination node is a key challenge. The meticulous research has been conducted to search out the best link selection mechanism of bodacious underwater routing protocol EnOR, SURS‐PES and USPF; and recommended the protocol that offers a shrewd communication link. The performance has been evaluated through NS2 simulation for packet delivery ratio, end-to-end delay, network lifespan and network energy consumption.

    Citation: Shahzad Ashraf, Arshad Ahmad, Adnan Yahya, Tauqeer Ahmed. Underwater routing protocols: Analysis of link selection challenges[J]. AIMS Electronics and Electrical Engineering, 2020, 4(3): 234-248. doi: 10.3934/ElectrEng.2020.3.234

    Related Papers:

    [1] Efthymios N. Lallas . A survey on key roles of optical switching and labeling technologies on big data traffic of Data Centers and HPC environments. AIMS Electronics and Electrical Engineering, 2019, 3(3): 233-256. doi: 10.3934/ElectrEng.2019.3.233
    [2] B Naresh Kumar, Jai Sukh Paul Singh . Intelligence-based optimized cognitive radio routing for medical data transmission using IoT. AIMS Electronics and Electrical Engineering, 2022, 6(3): 223-246. doi: 10.3934/electreng.2022014
    [3] Saumen Dhara, Pradip Kumar Sadhu, Alok Kumar Shrivastav . Analysis of over current relay and hybrid filter including the utilization of SFCL in a distribution network with DG. AIMS Electronics and Electrical Engineering, 2022, 6(1): 81-107. doi: 10.3934/electreng.2022006
    [4] Farhan Khan, Sing Kiong Nguang . Location-based reverse data delivery between infrastructure and vehicles. AIMS Electronics and Electrical Engineering, 2021, 5(2): 158-175. doi: 10.3934/electreng.2021009
    [5] Yipeng Yang . Stability analysis of networked control systems with bounded random delay and state compensation: How large is the actual system scale?. AIMS Electronics and Electrical Engineering, 2019, 3(1): 16-32. doi: 10.3934/ElectrEng.2019.1.16
    [6] Hardeer Kaur, Jai Sukh Paul Singh . Software defined network implementation of multi-node adaptive novel quantum key distribution protocol. AIMS Electronics and Electrical Engineering, 2024, 8(4): 420-440. doi: 10.3934/electreng.2024020
    [7] Mohamed M. Albarghot, Mohamed T. Iqbal, Kevin Pope, Luc Rolland . Dynamic modeling and simulation of the MUN Explorer autonomous underwater vehicle with a fuel cell system. AIMS Electronics and Electrical Engineering, 2020, 4(1): 114-131. doi: 10.3934/ElectrEng.2020.1.114
    [8] Sundararajan Seenivasaan, Naduvil Madhusoodanan Kottarthil . Enhancing sensor linearity through the translinear circuit implementation of piecewise and neural network models. AIMS Electronics and Electrical Engineering, 2023, 7(3): 196-216. doi: 10.3934/electreng.2023012
    [9] Cristian Cadena-Zarate, Juan Caballero-Peña, German Osma-Pinto . Simulation-based probabilistic-harmonic load flow for the study of DERs integration in a low-voltage distribution network. AIMS Electronics and Electrical Engineering, 2024, 8(1): 53-70. doi: 10.3934/electreng.2024003
    [10] Dharmesh Faquir, Nestoras Chouliaras, Vlachou Sofia, Kalopoulou Olga, Leandros Maglaras . Cybersecurity in smart grids, challenges and solutions. AIMS Electronics and Electrical Engineering, 2021, 5(1): 24-37. doi: 10.3934/electreng.2021002
  • The sensor nodes deployed in underwater environment has different routing mechanism in contrast to the terrestrial network. Getting underwater data on pollution detection, control of the ecosystem, marine mining, catastrophe avoidance and strategic surveillance thereby demands smooth packet transmission which can only be possible through a stable and astute communication link between sensor nodes. Therefore, selecting best link between source and destination node is a key challenge. The meticulous research has been conducted to search out the best link selection mechanism of bodacious underwater routing protocol EnOR, SURS‐PES and USPF; and recommended the protocol that offers a shrewd communication link. The performance has been evaluated through NS2 simulation for packet delivery ratio, end-to-end delay, network lifespan and network energy consumption.


    Traditionally, a UWSN consists of underwater sensor nodes, which are used to sense the atmosphere and unusual activities, and shore sonobuoys (sinks), that are responsible for gathering sensed data from the nodes. Optical and radio frequency interactions in such networks are generally deemed infeasible because optical signals suffer from extreme interference, while high-energy radio signals are easily absorbed due to high attenuation [1]. The acoustic channel was therefore seen as the only feasible system for wireless contact underwater. None the less, this system brings restricted network efficiency, large and intermittent delays, transient loss of path and large noise, multi-path flickering, shadow zones and high energy cost of contact.

    Acoustically, the underwater wave operates at 1500 m/s, which is less than the electromagnetic wave frequency in five order magnitudes [2]. The acoustic channel has a continuum of temporal frequency with spatial underuse. Numerous challenges are faced by UWSN’s low bandwidth with absurdly high channel error rate, transient route failure and weak channel multipaths, including nodes displacement 2-3 m/s at water current unlike the terrestrial device [3]. Even while the speed of the acoustic wave is seemingly constant underwater, but due to the unpredictable nature of submarine organisms and water current, as it hits the sea, it reflects in multipurpose directions. Therefore, variations in sound speed are achieved, but a directional transmission can decrease this likelihood.

    The multi-hop routing causes packet failure with an expected delay factor contributing to poor communication, so enough re-transmissions are needed to transmit packets reliably. Under these volatile and tough environments, the localized sensor nodes are completely battery-dependent and hard to replace, though replacement will increase high bits [4]. UWSN enhances the dimensions of exploration from underwater warfare to unforeseen and uncertain circumstances, such as ocean collisions, atmosphere and seismic warnings, the quality of pollutants, situational monitoring, sampling offshore and navigation. The UWSNs have given incredible success in the petroleum and gas business. Oceanographic data, mine identifications, underwater tracking and seafood items may also be collected [5]. A submarine protocol specifies the size of a load and bit error packet. Not only does the network output degrade but also wastes resources through inadequate packet size selection. The efficiency of the underwater network depends greatly on topology architecture, which is driven by a selection process for epitome relief nodes that increases the likelihood of transmission to the destination node. Intelligent topology has a very smaller energy consumption ratio than an insecure and less efficient topology [6].

    The meticulously findings have been conducted in regards to the communication link selection process thereby considered three state of the art underwater routing protocols and their link establishment process has been analyzed by focusing the methodology which each protocol has adopted and through obtained results in terms of end-to-end delay, network throughput and energy consumption. At the end we came up with best link selection result adopted by one of these protocols. We came across some challenges still faced by the underwater routing and that needs to be considered for future findings.

    a. There are two types of routing topologies underwater: Motion dependent topologies, and Coverage dependent topologies. The fixed or localized nodes are followed by a motion-based routing, whereas the coverage-based routing allows UWSN two dimensional and three dimensions [7].

    b. Motion based UWSN: Sensor nodes are positioned at defined positions such as, surface buoys or bottom surface to track the other underwater constituent. Such localized sensor nodes had specific fidget characteristics; dynamically and continuously shifting position floats, driven primarily by a navigation device.

    c. Coverage based UWSN: It comprises primarily of two-dimensional architecture and three-dimensional architecture. The sensor nodes are anchored at the same depth for a two-dimensional topology and use the underwater bridge for contact that is responsible for capturing and transporting raw data to offshore station. The sink nods are set with a horizontal and vertical transceiver that captures sensed data from the nodes surrounding it. The sea is 10 km deep and the vertical transceiver is to be appropriately long, transmitting data to an offshore station while the horizontal transceiver performs the sensory node order for the acquisition of sensation data. The sinks are fitted with acoustic transceiver and wireless transmitter for the control of several parallel communications [8]. Underwater sensor nodes can have a direct connection via multi-hop path (relay node) to sink node or in-line link. For a sink node far from the sensor node the power needed to send the packet will decrease by a value of over two of the distance [9], the direct link is an easy communication route but not a resource-efficient solution indeed. It also entails high transmitting capacity and is likely to will the network efficiency and the effect may be significant acoustic interference [10]. A multi-shop communication strategy raises the latency factor as data is exchanged between intermediate nodes in the maze of the routing. Furthermore, in terms of contact ability, two-dimensional underwater routing faces main challenges; selection of the water surface and the size. An improved version of a 2D UWSN is a three-dimensional underwater sensor network; the sensor nodes freely float at arbitrary water level to collect sensed data. Adherence of the sensor nodes at the bottom is a more jingoistic strategy, so buoy retains the sensor nodes so draws into the surface of the water [11]. Depth of anchor nodes may be managed by changing the length of the cable. Some barriers to 3D undersea contact are obstructed, such as the sensor depth should be ingenuously modified to intelligently acquire sensed data and the network topology should be linked.

    Astute contributions

    It is essentially a daunting task to define the sagacious communication link between sensor nodes from source to destination. Our technique has yielded enough output in this reference. Following contributions have been made in this research work.

    ● We experience the identification by EnOR, SURS‐PES and USPF of the actual link selection mechanism; by description in specific figures as readers and researchers can easily understand without wasting time reading the entire paper.

    ● The performance of all protocol has been pragmatically observed in terms of packet delivery ratio, end-to-end delay, network lifespan and network energy consumption. We experienced amazing results i.e., all protocols have varying deficiencies but there is a protocol that was controlling the extra energy utilization, due to its bodacious link selection mechanism.

    ● We identified the feature that was preventing the energy utilization. In fact, it leads to three state link selection mechanism out of which, it only selects the link which has higher potential comparing with pre-assigned values through additive rise and fall method.

    ● This protocol came up, carrying maximum data rate from source to destination; which shows that it possessed sagacious link selection mechanism that was our prime task.

    The article is structured as follows. Section 2 describes the related findings with critical attributes. Acoustic signal propagation has been covered in section 3. Section 4 addresses the link selection methodologies. Results and discussion have been placed in section 5, while some open challenges and conclusions were outlined in sections 6 and 7 respectively.

    The underwater sensor network has developed sagacious advancements in connection environment, media connectivity, mapping, encoding and propagation technique. The energy use during the emergence of relay nodes is examined as an energy model in first exchange in [12], with sufficient energy route occupying exceptionally intermediate relay nodes at an optimal range, but without any implications for the forwarding structure. The author [13], suggested a vector-based forwarding mechanism (VBF), thereby a virtual pathway between source and destination node has been setup to deliver the data packets. The target node examines whether or not the packet is part of the virtual pipeline and, if so, validates factors that can be retained in time [14]. The packet is sent any time the same sender will quickly be forced to die, wasting exorbitant resources and growing the probability of packet loss. It is not possible for a fragmented network as pathways in virtual pipelines are fragile.

    An energy-aware, void routing concept is blowing out by [15], (EAVARP), in which the author structures the conical shells around the sinking node and the sensor nodes inside such shells dynamically. Where data packets are inside the same shell, residual energy is transmitted that lets every empty area be circumvented if it occurs. However, the authors suggest an imaginative solution to the energy loss module, which as a result, shortens the lifetime of the network.

    Huang et al [16], have designed a fuzzy-based routing approach to utilize the resource efficiently. The battery power is being utilized efficiently at a trivial level, the network overhead and packet delivery latency has been controlled. Indeed, in complex scenarios, this system increases uncertainty and offers no remedy for crash avoidance.

    An esteemed QELAR method is proposed for the application of the adaptive routing protocol by Tiansi Hu et al [17]. It initiates a reward feature which uses the residual energy of sensor nodes evenly to be calculated and distributed, while nodes will remain alive throughout the application. The recompense function allocates relay nodes to the routing debut. Although the efficiency is awesome, but regular residual changes are bottlenecking in the network.

    Sungryul et al [18], suggested a power transfer model making channel stability. The power effect has been evaluated by the amplitude of modifying waves, in the power transmission adjustment where the height of the wave determines the surface signal reflection and signal frequency transmitted to node. The value calculated may be used to determine the wave root mean square (RMS). Both nodes and corresponding frequencies should be equilibrated with wave height RMS, which is unable to be seen in the tests. The authors argue that the implementation of such a mechanism may lower significant energy consumption and thus reduce the transmission power of the node, but that no effective action to deal with this atrophy which can generate network congestion is addressed when the wave height is gradually reduced to empty level.

    By dividing transmission to two parts, Cao J, et al [19], proposed the BTM balance transmission system, dividing the transmission into node results. Depending upon the energy level of the nearest nodes, nodes determine the single-hop or multi-hop spread of the data. The direct transference of one-hop data to the sink takes place if the voltage of the surrounding node is below the intensity level of the transmission node [20]. Data is also transmitted to the destination sink through multi-hop transfers. This network integrates energy consumption in two opposing nodes. Nevertheless, there is only 1 relay node in each network, and unrealized transmissions are sometimes made when traffic, nodes and battery transmission effects are unevenly distributed.

    A highly dynamic undersea environment and acoustic communication is often subject to variable factors which require an acoustic channel’s bandwidth to remain and to only stay on the frequency and distance of a sensor node [21]. The communicating underwater varies shallow and deep by ocean division. Slightly shallow water had high temperature, a multipath effect, a surface disturbance, and a broad pause in propagation that eventually adversely affected the output of sound signals; whereas a deep-water sea had the same history with specific measurements [22]. Several malicious dissemination components are evaluated in sequence as pragmatically.

    Underwater environments are defined as major propagation factors that influence acoustic communication:

    i.) Path loss: the diffusion effect indirectly raises the

    underwater temperature resulting in vacillated movement between the sensor nodes and signal power. The lack of direction is further split into three parts.

    a. Geometric Spanning Error: the sound wave is distant but unchanged from frequency [23], where spheric spreading losses arise in deep water, creating a cylindrical lack of stretching in low water.

    b. Signal Attenuation: Attenuation is based on frequency and distance between the nodes [24]. That is since acoustic energy is transformed into another form of energy such as heat energy.

    c. Dispersion: This happens by shifting angles of acoustic waves. Varying wind speeds cause surface roughness to increase the decline of the dispersion barrier, ultimately causing a delay in transmission and loss of power in subsequent communications [25].

    ii.) High propagated delay: When the acoustic signal acts at 1500 m/s, the transmission has an endless delay factor of approximately 0.67 s/km, leading to a high propagated layoff.

    iii.) Noise Ratio: Any inevitable signal intensity condition atrophy forces the device to incorporate a noise ratio. Ambient noise exists in the case of UWSN because of multiple unidentifiable unknown sources. There are four types of ambient noises: (i) wind noise; (ii) noise; (iii) thermal noise. A wind noise created by the varying wind speeds causing acoustic waves to break down. Owing to the acoustic wave interference that is induced by shipping voyage produces acoustic signal hurdles. Sea surge induces small vibration, which creates noise during communication. A machine also generates a suitable noise, called an anto-noise, that doesn’t mimic other sounds, it has a similar relation to thermal noise level.

    iv.) Multipath Tangle: Multipath enigma: Multipaths are generated in underwater communication where sounds waves impact the water surface and the depths of the ocean, causing uncoherent acoustic communication interference, resulting in erroneous signal and a multipath effect [26]. An acoustic channel's impulse response leaves the variable propagation and power effect dissident. Due to uneven sound speed, many paths are created, and only limited reflection is taken into account and the loss of energy is taken into account.

    The geographical dynamic routing can be separated in three prominent categories for UWSNs, according to the number and location of destinations, namely unicast, anycast, and geocast. A comparative analysis among these transmission routings are placed in Table 1. Generally, all underwater routing approaches have local and global considerations whereas a global approach requires a high overhead computation relative to the local one, and the source node in the network thereby preserved [27]. Moreover, picking of next forwarding node is typically accomplished by dividing the opportunistic routing into two classes: location-base and location-free routing [28]. The location dependent routing picks the forwarding node by taking in account the distance or depth metric up to the node.

    Table 1.  Systematic review of unicast, anycast and geocast routing.
    Unicast Anycast Geocast
    Functions with single sink topological architecture, Uses a one-to-one connection between source and destination node. A single receiver endpoint is uniquely identified by each destination address. Functions in multi-sink environment. It is a one-connection in which data graphs are forwarded to each individual member of a group of potential recipients designated by the same target address. It delivers the information to a target group in a network defined by their geographic locations. It is a specialized type of multicast addressing, used for mobile ad hoc networks by some routing protocols.
    Designed for short range networks Preferable for large networks Ideal for large networks
    Packet distribution is successful if the single sink received the packet Packet distribution is effective if any sink receives packet Packet transmission is effective if all the nodes within the geocast area receive the packet
    With regard to the single sink, void communication is assessed Void shall be determined in respect of all the sinks Void communication is evaluated for the packet entry area of the geocast region
    Number of paths from source to destination restricted More paths from one source to another The paths available depend on the coverage area across the geocast region

     | Show Table
    DownLoad: CSV

    Deployed sensor nodes broadcast data packets within the transmission range to neighboring nodes, creating two transmission zones. A successfully generated transmission node transfers data to the sink node and transfers it for further processing to the offshore station. There are three separate communication channels from the source to the relay node and from the relay to the sink node [29]. A most secure connection is preferred and therefore named sagacious connection, although other connections are overlooked. A thorough analysis of the connection selection process under three state-of-the-art routing protocols was studied and efficiency assessed. Via the packet delivery radio, end-to-end delay, network lifespan and network energy consumption we concluded that connection selection strategy provides optimal and shrewd output. The key results of the wise selection process for such protocols were explored one at a time.

    Rodolfo W, et al [30], discussed one of the immutability problems relating to the priority level of transmission of nodes, resulting in balanced power usage and extended lifespan of UWSN network. It rotates the priority level of transmission for the transmission nodes, taking into account the remaining capacity, reliability of the connection and progression of packets as illustrated in Figure 1. Node i setup communication link by broadcasting p packets to neighbouring nodes. Eventually, node j found to be a most reliable node thereby, stable link has been setup.

    Figure 1.  EnOR communication linking mechanism.

    Link Selection methodology: When the packets like, p are periodically transmitted by each underwater sensor node. The lightning packet comprises the identity of the sender, the remaining information on its energy and its size. Algorithm 1 establishes the criteria of best link selection mechanism.

    Table 1.  Systematic review of unicast, anycast and geocast routing.
    Unicast Anycast Geocast
    Functions with single sink topological architecture, Uses a one-to-one connection between source and destination node. A single receiver endpoint is uniquely identified by each destination address. Functions in multi-sink environment. It is a one-connection in which data graphs are forwarded to each individual member of a group of potential recipients designated by the same target address. It delivers the information to a target group in a network defined by their geographic locations. It is a specialized type of multicast addressing, used for mobile ad hoc networks by some routing protocols.
    Designed for short range networks Preferable for large networks Ideal for large networks
    Packet distribution is successful if the single sink received the packet Packet distribution is effective if any sink receives packet Packet transmission is effective if all the nodes within the geocast area receive the packet
    With regard to the single sink, void communication is assessed Void shall be determined in respect of all the sinks Void communication is evaluated for the packet entry area of the geocast region
    Number of paths from source to destination restricted More paths from one source to another The paths available depend on the coverage area across the geocast region

     | Show Table
    DownLoad: CSV

    Algorithm 1 explanation

    Using i as a sensor node with a data packet to be sent while maintain the neighbouring table as Ni. The node analyses its adjacent nodes to choose the most suitable nodes to be forwarded (lines 2–7). For this function, only if a neighboring node advances towards the surface sonobuoys can a candidate node be considered (Lines 3–6). A difference between the current I node sender depth and j in Pj = depth(i) - depth(j) is used to measure a packet advancement for a neighbor j. The fitness of the neighbor j is then determined (line 5). Using connection reliability, packet progress and remaining energy to assess the suitability of a nearby node. This is measured in line 5 and thus as Eq (1).

    Fj=Pj×p(dj,m)×(EjremEjinit) (1)

    where Pj > 0 represents packet advancement of node j; p(dj, m) is an estimation of data packet of m between node i and node j; Ejrem shows remaining potency of j; and Ejinit is the initial value of potency of j. The nodes allowed the connection to be selected and sorted by fitness value (line 8). Finally, from the potential nodes the relation set is calculated. A limited link set can lead to low reliability of the link. At the other side, a wide connecting set may also damage the query, because it takes a long time. The possible node connections are applied to the whole collection until the required link reliability γ is reached.

    Using Porous Energy Shells (SURS‐PES) [31]: To transmit the data packet from source to sink-node, authors used a newly-developed link with residual energy and depth detail. In an area where energy usage has direct impact as the entire active underwater nodes rely on batteries and when cost-effective data packets are delivered, no charge or replacement steps are taken becomes a crucial factor. The authors utilized a shrewd link selection mechanism, if a link is less than or equivalent to 50% shaky, after broadcasting of a sensor node the destination node is checked, and the destination node is returned to the source node, adding some unusable porous energy shell to strengthen a link from 5% to full 90, and then transmitting it to the target.

    Link Selection methodology: The link quality inspection has been taken through link reparation mechanism that is depicted in Figure 2. Sensor node, a, broadcasts the packet, p, with substantial information such as depth, ID, and residual energy towards neighboring nodes, i.e., b, c, and d. The source node, Na is broadcasting the packet towards neighbors, upon receiving this packet node b includes the necessary information and sends it back as Nbp’ to node a. When a duplicate node a is attached to the required energy shells, the packet multizes again to node b as Na2p in a trivial time t,

    LinkGrain=Nap+Nbp+Na2p (2)
    Figure 2.  SURS-PES protocol link selection mechanism.

    the grain of the final relation is measured as shown in Eq (2).

    Eventually, the optimal link is being obtained holding energy utilization Eap, Ebp' and Ea2p respectively thereby remains unchanged thereupon Eq (3), The probability of connection status from 50 to 90 percent updates in due course.

    LinkGrain=t(Napp=1Eap+Nbpp=1Ebp+Na2p2p=1Ea2p) (3)

    There is exhaustive study of the contact connections between node a and others. Therefore, there is a stipulated connection quality control, which records the hop links are hit by more than 50% and which links are more stable than 50% at all. Unlike the consistency of the connection between the source node a and b, the connections to the node a and d are more than 50 percent stable, but not up to 90 percent stable. The suggested approach (SURS-PES) therefore takes account of the hop connection between node a or b for the more secure packet transmission, i.e. up to 90 percent.

    The authors [32], developed a shrewd data forwarding mechanism by taking three unique steps in regards to link selection and packet holding time namely called surrogate holding time. They implemented an angled approach in order to boost the distribution of data packets and to revitalize the life of the network. No single process consists of three stages, from source to sink. Forwarder Hop Angle (FHA) and Counterpart Hop Angle (CHA) are litigated for inclusion of data packets in the first phase of the same transmission field. If a value of FHA is equal to or higher than CHA, the packet produced will be in the same zone of transmission otherwise it would claim that the packet has another maverick. The next step selects the best relay scale node by again using the Additive-Rise and Additive-Fall method in three states connection consistency with prefix values. Ultimately, the third stage offers the exorbitant overhead fistula a definitive solution; the package holding time is built to avoid the risk of a packet loss.

    Link Selection methodology: The link quality of forwarding node considering P and the neighbor nodes has been explored using Additive-Rise and Additive-Fall methods [33] that shrewdly makes the adjustment to the states of the Forwarding hop angle values as illustrated in Figure 3.

    Figure 3.  USPF protocol link selection mechanism.

    The aforementioned three steps are described as under:

    Step 1: The forwarder node p changes the route by producing more αi packets to exploration more sparsely when the Connection status (Sh_L) is shaky or slanting compared to the prefix value (Prefix_v) with next nodes.

    Step 2: If the connection state (St_L) is secure and hence meets the prefix property (Prefix_v), packet forwarding takes place without any obstacles.

    Step 3: At a time if the connection state (Nr_L) is regular, but not ready for transmission due to certain salinity consequences, certain energy packets with additional shell have to go ahead and, for this reason, only fewer nodes are involved in transfers. With relation quality only from forwarder to neighboring nodes, the flood zone is modified. Eq (4) points,

    FHAp={αi+sh_L,ifαi<Prefix_vαj,ifαi=Prefix_vαk+(NrL)(sh_L),ifαi>Prefix_v (4)

    increasing node temporally updates the threshold value. A stronger connectivity also offers a slight delay. Throughout the reparation of the hop angle of the counterpart, a flood zone is never impacted by a nullity, since the hop angle is complex in hop by hop form. However, any relay node is aware of the hop angle of counterparts in the nodes around, which seem to preclude nodes from engaging in the forwarding process.

    After through discussion regarding link selection procedure by the aforementioned underwater routing protocols. The results in packet delivery ratio, end-to-end delay, and network throughput are being analyzed by conducting NS2 simulation sessions. The different sensor nodes between 100 to 400 have been deployed in 3D region with 800 m × 800 m × 800 m dimensions and rest of the simulation parameters are given in Table 2.

    Table 2.  Simulation Network parameters.
    Parameters Setting
    [1] Sensor node area occupied [2] 800 m x 800 x 800 m3
    [3] Nodes quantity [4] 400
    [5] Nodes initial energy [6] 48 J
    [7] Depth threshold [8] 8 m
    [9] Min: and Max: communication Range [10] 223 m, 245 m
    [11] Packet Size [12] 64 bytes
    [13] Packet generation frequency [14] 0.03 pkts/min
    [15] Node displacement [16] 0–4 m/s
    [17] Channel capacity [18] 10 Kbps
    [19] Frequency channel [20] 24 - 28 kHz
    [21] Transmission power [22] 1.8 W; 0.75 W; 8 mW
    [23] Data packet interval [24] 98 s
    [25] Channel bitrate [26] 140 b/s
    [27] SNR for Signal Acquisition [28] 18 dB
    [29] Number of rounds taken for simulation [30] 500 rounds
    [31] Number of Concentric Circular Rings [32] 7

     | Show Table
    DownLoad: CSV

    A number arrangement of distributed packets is regarded as the packet delivery ratio as it is obtained at the final destination, i.e. sink node of some shape or quantity. The average ratio of packets acknowledgment by sink node of all protocols i.e., EnOR, SURS‐PES and USPF are being analyzed though Figure 4. For EnOR, the delivery ratio is calculated as the fraction of the received packets during transmission cycle and based on the duration of the package distribution percentage reduces. This decrease takes place since the period decreases by the reduction of live nodes. Comparing with SURS-PES, as number of nodes are increasing the shrewd packet turnout has achieved. This is due to scrumptious link selection criteria and greater residual energy. Near about 100 to 350 nodes, it achieved a smooth delivery ratio than EnOR approximately 21% better. Finally, observing USPF performance, by surrogating the Nr_L𝐿 and Sh_L values which eventually altered the Sh_L angle from 0 to 30° and Nr_L 0 to 45° thereupon, due to changing size of flooding zone in lieu of packet delivery, it came up with unprecedent performance which is about linear from start to the end. Therefore, comparing performance in terms of packet delivery ration with other protocols, USPF gave pristine result.

    Figure 4.  Data packet delivery ratio v/s number of nodes.

    The average amount of time is defined as the end-to-end interval for all data packets obtained with performance in the sink node. For all protocols, the overall end-to-end delay has been reported to be decreased with the increasing number of nodes. Infact, this happens as the source seeks more eligible nodes that can forward packets to the corroborated surface sink as depicted in Figure 5.

    Figure 5.  End to end data packet delivery ratio v/s number of nodes.

    It can be observed that EnOR still has a large end-to-end delay as compare to others because due to fixing of high priority for rotating transmission relay nodes, in addition because of packet holding duration that depends on the nodes priority thereby it has added the greatest gape among sender and the sink node, that is why this delay approximately remained larger than even to the SURS-PES. While considering SURS-PES performance, although its performance well and reaching by 200 nodes the delay was drastically lowered while other times it remained linear and this condition remained same in sparse and dense environment, in light of still endless transmission cycle estimates. While considering USPF, once again superb performance can be seen. The USPF has managed minimum end-to-end delays and the highest of all due to the shrewd void prevention system. It can be shown that a node needs just 0.3 seconds to manage data from receiving to transmitting systems, meaning that every relay has been inducted for every transmission cycle for at least 0.3 seconds.

    The total amount of time when nodes remains operational in the network is known as network lifespan. The average network lifespan was measured for EnOR, SURS-PES and USPF protocol, as shown in Figure 6. Making judgment about EnOR, it should be noted that, because of its energy costs related to the reception of a packet and the existence of the transmission of subsea acoustic communication which causes it to be received from all its neighbors, even though it is addressed to a specific node the active node is quickly decreased by a high network density. While SURS-PES protocol outperformed as compared EnOR because increased residual energy with shrewd connection factor allowed the network lifetime to stretch throughout transmission. Moreover, it holds no packet keeping tangle, and thus, no smooth movement of the packet is avoided, no matter how much the network capacity is thick or spacious. Subsequently, the network life under the EnOR and SURS-PES protocols is naturally smaller than in the USPF system. It is due to countless reasons like residual energy has been considered when choosing best forwarding relay node and the link selection mechanism with FHA and CHA altering angles preventing the void fistula and thereby no energy wastage has been reported which eventually broaden the network lifespan.

    Figure 6.  Overall network operational duration.

    An average amount of energy used for full packet transmission from source to the sink node is called Network energy consumption. The simulation result shows the statistics in Figure 7. About the total energy usage by number of nodes for each protocol USPF uses negligible resources to achieve packets to the surface sink node, because it selects the shrewd communication link based on additive rise and fall method in each packet transmission and the holding time of each forwarding relay node prevents packet collisions and retransmissions. While SURS-PES has taken the residual energy and link quality into account for making confine use of energy but cannot use this strategy for all times, thereon, this condition initially confronted SURS-PES. The energy consumption across the entire v/ s network of nodes was therefore, marginally higher than before the transfer was done and the energy use ratio could be regulated. Considering EnOR protocol, it utilized the rotating transmission priority levels which engulfed maximum energy reaching by 300 nodes and showed worse performance. Considering overall performance by all protocols in terms of packet delivery ratio, end-to-end delay, network lifespan and network energy consumption it can be ratified that USPF gave outstanding results in all situations.

    Figure 7.  Energy utilization by entire network v/s number of nodes.

    The extensive findings regarding communication link selection mythologies and its impact on various underwater routing factors have been presented which unveiled numerous hidden aspects of this amazing field and many open challenges are still need to address and left behind out of which some are highlighted as.

    ● The noise and reduction channel models are methodological in UWSNs. This field is already available for theoretical or numerical research and study of new models. Furthermore, prototype models may be built to represent the characteristics of the medium underwater.

    ● With water flows, sensor nodes shift, continuously shifting their locations [33]. This often shifts their place details. It is a challenging task in finding the sensor nodes. Node movement often includes frequent new locations changes. This causes uncertainty and energy usage, since these knowledges has to be shared at nodes.

    The objective of reviewed communication link selection methodologies by underwear state of the art protocols EnOR, SURS-PES and USPF is to overcome the data routing challenges. It is essential to enhance the link selection mechanism for better and maximum packet delivery yield. The EnOR protocol uses the spinning transfer priority stage uses the available capacity, stability and advancement of the packet to the forwarding relay nodes. While SURS‐PES is utilizing a resurrect link factor with residual energy and depth data for the selection of best link and thus forward the packet to the sink node from the source node. The USPF introduced new technique for link selection mechanism which based on directional flooding by considering two angles namely Forwarder Hop Angle (FHA) and Counterpart Hop Angle (CHA) with special packet holding time. The performance has been evaluated in relation to packet delivery ratio, end-to-end delay, network lifespan and network energy consumption through NS2 simulator. The entire finding has revealed that USPF is remained best during all transmission rounds and it performed outstanding in all stages.

    The authors declare that there is no conflict of interest in this manuscript.



    [1] Awan KM, Shah PA, Iqbal K, et al. (2019) Underwater Wireless Sensor Networks: A Review of Recent Issues and Challenges. Wirel Commun Mob Comput 2019: 1-20.
    [2] Zenia NZ, Aseeri M, Ahmed MR, et al. (2016) Energy-efficiency and reliability in MAC and routing protocols for underwater wireless sensor network: A survey. J Netw Comput Appl 71: 72-85. doi: 10.1016/j.jnca.2016.06.005
    [3] Ashraf S, Raza A, Aslam Z, et al. (2020) Underwater Resurrection Routing Synergy using Astucious Energy Pods. J Robot Control JRC 1: 173-184.
    [4] Tilwari V, Maheswar R, Jayarajan P, et al. (2020) MCLMR: A Multicriteria Based Multipath Routing in the Mobile Ad Hoc Networks. Wireless Pers Commun 112: 2461-2483. doi: 10.1007/s11277-020-07159-8
    [5] Ashraf S, Saleem S, Ahmed T, et al. Multi-biometric Sustainable approach for human Appellative. Trends Comput Sci Inf Technol 5: 001-007.
    [6] Ashraf S, Ahmed T (2020) Underwater Routing Protocols Analysis of Intrepid Link Selection Mechanism, Challenges and Strategies. Int J Sci Res Comput Sci Eng 8: 1-9.
    [7] Somani AK, Shekhawat RS, Mundra A, et al. (2020) Smart Systems and IoT: Innovations in Computing: Proceeding of SSIC 2019. Singapore: Springer Singapore.
    [8] Ullah I, Chen J, Su X, et al. (2019) Localization and Detection of Targets in Underwater Wireless Sensor Using Distance and Angle Based Algorithms. IEEE Access 7: 45693-45704. doi: 10.1109/ACCESS.2019.2909133
    [9] Awan KM, Shah PA, Iqbal K, et al. (2019) Underwater Wireless Sensor Networks: A Review of Recent Issues and Challenges. Wirel Commun Mob Comput 2019: 1-20.
    [10] Ashraf S, Saleem S, Ahmed T, Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network. Int J Wirel Microw Technol 10: 12-25.
    [11] Ullah I, Liu Y, Su X, et al. (2019) Efficient and Accurate Target Localization in Underwater Environment. IEEE Access 7: 101415-101426. doi: 10.1109/ACCESS.2019.2930735
    [12] JINGGUO Q, ZILONG Z, YUHUAN C, et al. (2019) Research and Application of Multi-Node Communication and Energy Consumption Prediction Control in Underwater Acoustic Network. IEEE Access 7: 41220-41229. doi: 10.1109/ACCESS.2019.2907376
    [13] Safkhani M (2018) Cryptanalysis of R2AP an Ultralightweight Authentication Protocol for RFID. J Electr Comput Eng Innov 6: 107-114.
    [14] Ashraf S, Saleem S, Chohan AH, et al. (2020) Challenging strategic trends in green supply chain management. Int J Res Eng Appl Sci JREAS 5: 71-74.
    [15] Guleria K and Verma AK (2019) Comprehensive review for energy efficient hierarchical routing protocols on wireless sensor networks. Wirel Netw 25: 1159-1183. doi: 10.1007/s11276-018-1696-1
    [16] Yang H, Zhou Y, Hu YH, et al. (2018) Cross-Layer Design for Network Lifetime Maximization in Underwater Wireless Sensor Networks. 2018 IEEE International Conference on Communications (ICC), 1-6
    [17] Coutinho RWL, Boukerche A, Vieira LFM, et al. (2017) Performance modeling and analysis of void-handling methodologies in underwater wireless sensor networks. Comput Netw 126: 1-14. doi: 10.1016/j.comnet.2017.06.027
    [18] Grant RM (1996) Prospering in Dynamically-Competitive Environments: Organizational Capability as Knowledge Integration. Organ Sci 7: 375-387. doi: 10.1287/orsc.7.4.375
    [19] Cao J, Dou J, Dong S (2015) Balance Transmission Mechanism in Underwater Acoustic Sensor Networks. Int J Distrib Sens Netw 11: 429340. doi: 10.1155/2015/429340
    [20] Ashraf S, Ahmed T, Saleem S, et al. (2020) Diverging Mysterious in Green Supply Chain Management. Orient J Comput Sci Technology 12: 34-38.
    [21] Ashraf S, Arfeen ZA, Khan MA, et al. (2020) SLM-OJ: Surrogate Learning Mechanism during Outbreak Juncture. Int J Mod Trends Sci Technol 6: 162-167.
    [22] Ullah I, Shen Y, Su X, et al. (2019) A Localization Based on Unscented Kalman Filter and Particle Filter Localization Algorithms. IEEE Access.
    [23] Balsamo S, Marin A, Vicario E (2018) New Frontiers in Quantitative Methods in Informatics. Springer International publishig.
    [24] Sharma N, Chakrabarti A, Balas VE (2019) Data Management, Analytics and Innovation. Proceedings of ICDMAI 2019.
    [25] Wahid A, Lee S, Jeong HJ, et al. (2011) EEDBR: Energy-Efficient Depth-Based Routing Protocol for Underwater Wireless Sensor Networks. Advanced Computer Science and Information Technology, 223-234. Springer.
    [26] Ashraf S, Yahya A, Khan MA, Culminate coverage for sensor network through Bodacious-instance Mechanism. Manag J Wirel Commun Netw 8: 1-7.
    [27] Ghoreyshi SM, Shahrabi A, Boutaleb T (2017) Void-Handling Techniques for Routing Protocols in Underwater Sensor Networks: Survey and Challenges. IEEE Commun Surv Tutor 19: 800-827. doi: 10.1109/COMST.2017.2657881
    [28] Ashraf S and Ahmed T, Machine Learning Shrewd Approach For An Imbalanced Dataset Conversion Samples. J Engneering Technol 10: 7-25.
    [29] Ashraf S, Muhammad D, Khan MA, et al. Fuzzy based efficient Cosmetology Paradigm. Int J Multidiscip Curr Res 8: 421-425.
    [30] Coutinho RWL, Boukerche A, Vieira LFM, et al. (2016) Geographic and Opportunistic Routing for Underwater Sensor Networks. IEEE Trans Comput 65: 548-561. doi: 10.1109/TC.2015.2423677
    [31] Ashraf S, Ahmed T, Raza A, et al. (2020) Design of Shrewd Underwater Routing Synergy Using Porous Energy Shells. Smart Cities 3: 74-92. doi: 10.3390/smartcities3010005
    [32] Ashraf S, Gao M, Mingchen Z, et al. (2020) USPF: Underwater Shrewd Packet Flooding Mechanism through Surrogate Holding Time. Wirel Commun Mob Comput 2020: 1-12.
    [33] Ashraf S, Gao M, Chen Z, et al. (2017) Efficient Node Monitoring Mechanism in WSN using Contikimac Protocol. Int J Adv Comput Sci Appl 8: 429-439.
  • This article has been cited by:

    1. Shahzad Ashraf, Omar Alfandi, Arshad Ahmad, Asad Masood Khattak, Bashir Hayat, Kyong Hoon Kim, Ayaz Ullah, Farman Ullah, Bodacious-Instance Coverage Mechanism for Wireless Sensor Network, 2020, 2020, 1530-8677, 1, 10.1155/2020/8833767
    2. Shahzad Ashraf, Sehrish Saleem, Tauqeer Ahmed, Zeeshan Aslam, Durr Muhammad, Conversion of adverse data corpus to shrewd output using sampling metrics, 2020, 3, 2524-4442, 10.1186/s42492-020-00055-9
    3. Shahzad Ashraf, Tauqeer Ahmed, Sehrish Saleem, NRSM: node redeployment shrewd mechanism for wireless sensor network, 2020, 2520-8438, 10.1007/s42044-020-00075-x
    4. Qichun Zhang, Xuewu Dai, Special Issue “Uncertainties in large-scale networked control systems”, 2020, 4, 2578-1588, 345, 10.3934/ElectrEng.2020.4.345
    5. Shahzad Ashraf, Mingsheng Gao, Zhengming Chen, Hamad Naeem, Arshad Ahmad, Tauqeer Ahmed, Underwater Pragmatic Routing Approach Through Packet Reverberation Mechanism, 2020, 8, 2169-3536, 163091, 10.1109/ACCESS.2020.3022565
    6. Shahzad Ashraf, Tauqeer Ahmed, 2020, Sagacious Intrusion Detection Strategy in Sensor Network, 978-1-7281-9488-2, 1, 10.1109/UCET51115.2020.9205412
    7. Shahzad Ashraf, Sehrish Saleem, Tauqeer Ahmed, Zeeshan Aslam, Muhammad Shuaeeb, 2020, Iris and Foot based Sustainable Biometric Identification Approach, 978-953-290-099-6, 1, 10.23919/SoftCOM50211.2020.9238333
    8. Rodríguez-Díaz Rubí, Blanes-Zamora Raquel, Gómez-Rodríguez Jorge, Hardisson Arturo, Paz Soraya, E González-Dávila, What is the consequence of metals on human health?, 2022, 8, 24555479, 068, 10.17352/2455-5479.000176
    9. Nishad A., Sajimon Abraham, Contact tracing and mobility pattern detection during pandemics – a trajectory cluster based approach, 2022, 1742-7371, 10.1108/IJPCC-05-2021-0111
    10. Comfort Sekga, Mhlambululi Mafu, Tripartite Quantum Key Distribution Implemented with Imperfect Sources, 2022, 3, 2673-3269, 191, 10.3390/opt3030019
    11. Junghun Byun, Yong-Ho Cho, Taeho Im, Hak-Lim Ko, Kyungseop Shin, Juyeop Kim, Ohyun Jo, Iterative Learning for Reliable Link Adaptation in the Internet of Underwater Things, 2021, 9, 2169-3536, 30408, 10.1109/ACCESS.2021.3058981
    12. Ashraf Shahzad, Rasheed Zeeshan, Arbaz Muhammad, Adopting proactive results by developing the Shrewd model of pandemic COVID-19, 2022, 8, 24555479, 062, 10.17352/2455-5479.000175
    13. Quadri Noorulhasan Naveed, Hamed Alqahtani, Riaz Ullah Khan, Sultan Almakdi, Mohammed Alshehri, Mohammed Aref Abdul Rasheed, An Intelligent Traffic Surveillance System Using Integrated Wireless Sensor Network and Improved Phase Timing Optimization, 2022, 22, 1424-8220, 3333, 10.3390/s22093333
    14. Howard Schneider, The emergence of compositionality in a brain-inspired cognitive architecture, 2024, 86, 13890417, 101215, 10.1016/j.cogsys.2024.101215
    15. Shahzad Ashraf, Zeeshan Aslam, Data leakage analysis in wireless networks using Super-vised and Unsupervised Testing, 2023, 4, 2708-0935, 52, 10.48168/innosoft.s12.a108
    16. Kamal Kumar Gola, A comprehensive survey of localization schemes and routing protocols with fault tolerant mechanism in UWSN- Recent progress and future prospects, 2024, 83, 1573-7721, 76449, 10.1007/s11042-024-18525-0
    17. Xiao Zhang, Ling Ye, Xinrui Zhu, Zhangqing He, Low-cost Anti-Modeling Attack PUF Circuit Based on Configurable APUF, 2024, 1349-2543, 10.1587/elex.21.20240336
    18. Yuchao Song, Wenwen Zhang, Jinkun Zheng, Yang Yang, Yonglin Bai, Anpeng La, Jinyao Duan, Design of electronic readout system for resistive anode based on FPGA, 2024, 21, 1349-2543, 20240117, 10.1587/elex.21.20240117
    19. A. Caroline Mary, A. V. Senthil Kumar, Omar S. Saleh, 2024, Chapter 39, 978-981-99-4070-7, 495, 10.1007/978-981-99-4071-4_39
    20. Dingmi Sun, Yimin Chen, Hao Li, Intelligent Vehicle Computation Offloading in Vehicular Ad Hoc Networks: A Multi-Agent LSTM Approach with Deep Reinforcement Learning, 2024, 12, 2227-7390, 424, 10.3390/math12030424
    21. Gopal Lal Rajora, Miguel A. Sanz‐Bobi, Lina Bertling Tjernberg, José Eduardo Urrea Cabus, A review of asset management using artificial intelligence‐based machine learning models: Applications for the electric power and energy system, 2024, 18, 1751-8687, 2155, 10.1049/gtd2.13183
    22. Shahzad Ashraf, Furqan Memon, Fouzia Akram, Zeeshan Rasheed, Shahzad Sarwar Bhatti, Innam Ullah, Development of Sustainable Wireless Resource model through Shrewd Neural Network, 2024, 6, 2096-7004, 649, 10.3724/2096-7004.di.2024.0034
    23. Jingjing Wang, Jia Gao, Wei Shi, Shefeng Yan, Guangjie Han, Cross-Layer Topology Control Algorithm Based on Supermodular Game and Optimal Rigid Graph, 2024, 24, 1530-437X, 39868, 10.1109/JSEN.2024.3470798
    24. Shahzad Ashraf, Furqan Memon, Fauzia Akram, Tauseef Ahmed Siddique, Yasir Aziz, 2025, 9780443303005, 373, 10.1016/B978-0-443-30300-5.00021-X
  • Reader Comments
  • © 2020 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(6569) PDF downloads(309) Cited by(24)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog