ADBR: Accelerated Depth-Based Routing for Underwater Sensor Networks
Main Article Content
Abstract
It is challenging to propose an efficient routing algorithm for Underwater Wireless Sensor Networks (UWSNs) in terms of packet delivery ratio, end-to-end delay of packet delivery from the source to the destination, and energy consumption. The reasons of that are UWSNs have unique characteristics (e.g. using acoustic channels instead of radio channels for communications), and they have dynamic topology due to the movement of the sensor by the water flow. Depth-Based Routing (DBR) considers one of the well-known algorithms in this context. DBR is a very simple algorithm; however, it is inefficient in terms of packet delivery rate, end-to-end delay, and energy consumption. This study we developed DBR by adding an accelerated routine to it to improve its efficiency, the proposed algorithm; called Accelerated Depth-Based Routing (ADBR). In ADBR, a simple probabilistic mechanism is used to accelerate packet forwarding and provide more multi-path to the destination. In ADBR, each node immediately delivers received packet to the destination with a probability of and follows the DBR routine with a probability of 1 – Pf. The performance of ADBR is evaluated via a set of experiments by using J-SIM simulator. Experimental results indicate the superiority of the ADBR over the DBR algorithm.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Please find the rights and licenses in the Journal of Information Technology and Computer Engineering (JITCE).
1. License
The non-commercial use of the article will be governed by the Creative Commons Attribution license as currently displayed on Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
2. Author(s)’ Warranties
The author(s) warrants that the article is original, written by stated author(s), has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary permissions to quote from other sources have been obtained by the author(s).
3. User Rights
JITCE adopts the spirit of open access and open science, which disseminates articles published as free as possible under the Creative Commons license. JITCE permits users to copy, distribute, display, and perform the work for non-commercial purposes only. Users will also need to attribute authors and JITCE on distributing works in the journal.
4. Rights of Authors
Authors retain the following rights:
- Copyright, and other proprietary rights relating to the article, such as patent rights,
- the right to use the substance of the article in future own works, including lectures and books,
- the right to reproduce the article for own purposes,
- the right to self-archive the article.
- the right to enter into separate, additional contractual arrangements for the non-exclusive distribution of the article's published version (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal (Journal of Information Technology and Computer Engineering).
5. Co-Authorship
If the article was jointly prepared by other authors; upon submitting the article, the author is agreed on this form and warrants that he/she has been authorized by all co-authors on their behalf, and agrees to inform his/her co-authors. JITCE will be freed on any disputes that will occur regarding this issue.
7. Royalties
By submitting the articles, the authors agreed that no fees are payable from JITCE.
8. Miscellaneous
JITCE will publish the article (or have it published) in the journal if the article’s editorial process is successfully completed and JITCE or its sublicensee has become obligated to have the article published. JITCE may adjust the article to a style of punctuation, spelling, capitalization, referencing and usage that it deems appropriate. The author acknowledges that the article may be published so that it will be publicly accessible and such access will be free of charge for the readers.
References
[2] M. Jamshidi, M. Esnaashari, A. M. Darwesh and M. R. Meybodi, 2020. Using Time-Location Tags and Watchdog Nodes to Defend Against Node Replication Attack in Mobile Wireless Sensor Networks. International Journal of Wireless Information Networks, 27(1): 102-115.
[3] M. Jamshidi, M. Ranjbari, M. Esnaashari, N.N. Qader and M. R. Meybodi. 2018. Sybil Node Detection in Mobile Wireless Sensor Networks Using Observer Nodes. JOIV: International Journal on Informatics Visualization. 2(3): 159-165.
[4] A. Dalli and B. Seddik. 2016. ACQUISITION DEVICES IN INTERNET OF THINGS: RFID AND SENSORS. Journal of Theoretical and Applied Information Technology. 90(1): 194-200.
[5] J. H. Cui, J. Kong, M. Gerla and S. Zhou. 2006. Challenges: Building scalable mobile underwater wireless sensor networks for aquatic applications. IEEE Network. 20(3): 12-18.
[6] M. Jamshidi, E. Zangeneh, M. Esnaashari, A.M. Darwesh and M.R. Meybodi, 2018. A Novel Model of Sybil Attack in Cluster-Based Wireless Sensor Networks and Propose a Distributed Algorithm to Defend It. Wireless Personal Communications, pp.1-29 (in press).
[7] J. Partan, J. Kurose and B. N. Levine. 2007. A survey of practical issues in underwater networks. ACM SIGMOBILE Mobile Computing and Communications Review. 11(4): 23-33.
[8] H. Yan, Z. J. Shi and J. H. Cui. 2008. DBR: depth-based routing for underwater sensor networks. International conference on research in networking. Springer, Berlin, Heidelberg, 5 May: 72-86.
[9] Xie P., J.-H. Cui and L. Lao. 2006. VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks. Networking. 3976: 1216-1221.
[10] N. Nicolaou, A. See, P. Xie, J.-H. Cui and D. Maggiorini. 2007. Improving the robustness of location-based routing for underwater sensor networks. IEEE OCEANS Europe. Aberdeen, UK, 18-21 Jun: 1-6.
[11] C. Jinming, W. Xiaobing and C. Guihai. 2008. REBAR: a reliable and energy balanced routing algorithm for UWSNs. Seventh IEEE international conference on grid and cooperative computing. Shenzhen, China, 24-26 October: 349-355.
[12] J. M. Jornet, M. Stojanovic and M. Zorzi. 2008. Focused beam routing protocol for underwater acoustic networks. Third ACM International Workshop on UnderWater Networks WUWNet, San Francisco, California, USA, 15 September: 75-82.
[13] N. Chirdchoo, S. Wee-Seng and C. KeeChaing. 2009. Sector-based routing with destination location prediction for underwater mobile networks. International conference on advanced information networking and applications workshops. Bradford, United Kingdom, 26-29 May: 1148-1153.
[14] H. Daeyoup and K. Dongkyun. 2008. DFR: Directional flooding-based routing protocol for underwater sensor networks. IEEE OCEANS. 15 September: 1-7.
[15] K. R. Anupama, A. Sasidharan and S. Vadlamani. 2008. A location-based clustering algorithm for data gathering in 3D underwater wireless sensor networks. International Symposium on Telecommunications. Tehran, Iran, 27-28 August: 343-348.
[16] N. Javaid, N. Ilyas, A. Ahmad, N. Alrajeh, U. Qasim, Z. A. Khan, T. Liaqat and M. I. Khan. 2015. An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks. Sensors. 15(11): 29149-29181.
[17] J. Jiang, G. Han, H. Guo, L. Shu and J. J. Rodrigues. 2016. Geographic multipath routing based on geospatial division in duty-cycled underwater wireless sensor networks. Journal of Network and Computer Applications. 59: 4-13.
[18] M.R. Jafri, M. M. Sandhu, K. Latif, Z. A. Khan, A. U. H. Yasar and N. Javaid. 2014. Towards delay-sensitive routing in underwater wireless sensor networks. Procedia Computer Science. 37: 228-235.
[19] N. Javaid, M. R. Jafri, Z. A. Khan, N. Alrajeh, M. Imran and A. Vasilakos. 2015. Chain-based communication in cylindrical underwater wireless sensor networks. Sensors. 15(2): 3625-3649.
[20] M. Xu, G. Liu and H. Wu. 2014. An energy-efficient routing algorithm for underwater wireless sensor networks inspired by ultrasonic frogs. International Journal of Distributed Sensor Networks. 10(2): 351520.
[21] M. Xu and G. Liu. 2013. A multipopulation firefly algorithm for correlated data routing in underwater wireless sensor networks. International Journal of Distributed Sensor Networks. 9(3): 865154.
[22] M. Jamshidi, A. Andalib and L. Naseri. 2016. A Three-level Propagation Method of Routing Packets Specialized for Underwater Wireless Sensor Networks. International Journal of Computer Applications. 147(7): 29-33.
[23] R. Asgarnezhad and N. Nematbakhsh. 2015. A Reliable and Energy Efficient Routing Algorithm in Wsn Using Learning Automata. Journal of Theoretical and Applied Information Technology. 82(3): 401-409.
[24] A. Khan, I. Ahmedy, M. H. Anisi, N. Javaid, I. Ali, N. Khan, M. Alsaqer and H. Mahmood. 2018. A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks. Sensors. 8(18): 165-183.
[25] N. Javaid, S. Hussain, A. Ahmad, M. Imran, A. Khan, and M. Guizani. 2017. Region based cooperative routing in underwater wireless sensor networks. Journal of Network and Computer Applications. 95: 31-41.
[26] S. N. Pari, M. Sathish and K. Arumugam. 2018. An Energy-Efficient and Reliable Depth-Based Routing Protocol for Underwater Wireless Sensor Network (ER-DBR). Advances in Power Systems and Energy Management. 436: 451-463.
[27] W.K. Seach, and H. X. Tan. 2010. Multipath virtual sink architecture for underwater sensor networks. In Underwater Acoustic Sensor Networks. 19 May: 78-113.
[28] J-SIM Simulator, https://sites.google.com/site/jsimofficial/, Accessed on August 25, 2018.
[29] M. Jamshidi, E. Zangeneh, M. Esnaashari and M. R. Meybodi. 2017. A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks. Computers & Electrical Engineering. 64: 220-232.