You are on page 1of 20

1

Geographic and Opportunistic Routing for


Underwater Sensor Networks
Abstract—Underwater wireless sensor networks (UWSNs) have been showed as a promising technology to monitor and explore the
oceans in lieu of traditional undersea wireline instruments. Nevertheless, the data gathering of UWSNs is still severely limited because
of the acoustic channel communication characteristics. One way to improve the data collection in UWSNs is through the design of
routing protocols considering the unique characteristics of the underwater acoustic communication and the highly dynamic netw ork
topology. In this paper, we propose the GEDAR routing protocol for UWSNs. GEDAR is an anycast, geographic and opportunistic
routing protocol that routes data packets from sensor nodes to multiple sonobuoys (sinks) at the sea’s surface. When the node is in a
communication void region, GEDAR switches to the recovery mode procedure which is based on topology control through the depth
adjustment of the void nodes, instead of the traditional approaches using control messages to discover and maintain routing p aths
along void regions. Simulation results show that GEDAR significantly improves the network performance when compared with the
baseline solutions, even in hard and difficult mobile scenarios of very sparse and very dense networks and for high network traffic
loads.

Index Terms—Geographic routing, local minimum problem, topology control, underwater sensor networks

1 I NTR OD U C TION In this context, geographic routing paradigm seems a


promising methodology for the design of routing protocols
for UWSNs [6], [7], [8], [9]. Geographic routing, also called
O
CEANS represent more than 2/3 of the Earth’s surface.
These environments are extremely important for hu- of position-based routing, is simple and scalable. It does not
man life because their roles on the primary global produc- require the establishment or maintenance of complete routes
tion, carbon dioxide (CO2) absorption and Earth’s climate to the destinations. Moreover, there is no need to transmit
regulation, for instance. In this context, underwater wireless routing messages to update routing path states [10]. Instead,
sensor networks (UWSNs) [1] have gained the attention of route decisions are made locally. At each hop, a locally
the scientific and industrial communities due their potential optimal next-hop node which is the neighbor closest to the
to monitor and explore aquatic environments. UWSNs have destination, is selected to continue forwarding the packet.
a wide range of possible applications such as to monitoring This process proceeds until the packet reaches its
of marine life, pollutant content, geological processes on the destination. Geographic routing can work together with op-
ocean floor, oilfields, climate, and tsunamis and seaquakes; portunistic routing (geo-opportunistic routing) to improve
to collect oceanographic data, ocean and offshore sampling, data delivery and reduce the energy consumption relative to
navigation assistance, and mine recognition, in addition to packet retransmissions.
being utilized for tactic surveillance applications [2], [3], [4]. Using opportunistic routing (OR) paradigm, each packet
is broadcast to a forwarding set composed of neighbors. In
this set, the nodes are ordered according to some metric,
Acoustic communication has been considered as the only defining their priorities. Thus, a next-hop node in the for-
feasible method for underwater communication in USWNs. warding set that correctly received the packet, will forward
High frequency radio waves are strongly absorbed in water it only whether the highest priority nodes in the set failed in
and optical waves suffer from heavy scattering and are to do so. The next-hop forwarder node will cancel a sched-
restricted to short-range-line-of-sight applications. Never- uled transmission of a packet if it hears the transmission of
theless, the underwater acoustic channel introduces large that packet by a higher priority node. In OR paradigm, the
and variable delay as compared with radio frequency (RF) packet will be retransmitted only if none of the neighbors in
communication, due to the speed of sound in water the set receives it.
that is approximately 1.5 × 103 m/s (five orders of The main disadvantage of geo-opportunistic routing is
magnitude lower than the speed of light (3 × 108 m/s));
temporary path loss and the high noise resulting in
a high bit error rate;
severely limited bandwidth due to the strong
attenuation in the acoustic channel and multipath
fading; shadow zones; and the high communication
energy cost, which is of the order of tens of watts [5].
the communication void region problem. The communi- routing protocols,
cation void region problem occurs whenever the current 2) a more detailed theoretical framework and pro-
forwarder node does not have a neighbor node closest to the posed algorithms description,
destination than itself, i.e., the current forwarder node is the 3) more simulation results including different traffic
closest one to the destination [11]. The node located in a load analysis and topology related and opportunis-
communication void region is called void node. Whenever a tic routing protocol related performance evaluation
packet gets stuck in a void node, the routing protocol should metrics.
attempt to route the packet using some recovery method or The rest of this paper is organized as follows. Section 2
it should be discarded. provides an overview of the existing geographic routing
In this paper, we propose the GEDAR (GEographic and approaches and their communication void node recovery
opportunistic routing with Depth Adjustment-based topol- strategies. In Section 3, we provide a brief overview of
ogy control for communication Recovery over void regions) GEDAR. In Section 4, we present some preliminary concepts
routing protocol. GEDAR utilizes the location information of used by the proposed protocol. Section 5 shows our newly
the neighbor nodes and some known sonobuoys to select a proposed GEDAR routing protocol. The performance eval-
next-hop forwarder set of neighbors to continue forwarding uation of the proposed protocol is described in Section 6.
the packet towards the destination. To avoid un- necessary Finally, Section 7 presents our conclusions and future work.
transmissions, low priority nodes suppress their
transmissions whenever they detect that the same packet
was sent by a high priority node. The most important aspect 2 R ELATED W ORK
of the GEDAR is its novel void node recovery method- ology. Xie et al. [6] proposed the VBF routing protocol. In VBF, data
Instead of the traditional message-based void node recovery packets are routed along a virtual “routing pipe” of pre-
procedure, we propose a void node recovery depth determined radius, calculated from the position locations of
adjustment based topology control algorithm. The idea is to the sender and destination nodes. When a node receives a
move void nodes to new depths to resume the geographic packet, it either verifies its distance to the forwarding vector
routing whenever it is possible. To the best of our knowl- and continue forwarding the packet whether this distance is
edge, this work is the first that considers depth adjustment less than a predefined threshold or discard it. If the network
node capabilities to organize the network topology of a density is high, many nodes are involved in the forwarding
mobile underwater sensor network to improve routing task. process. This guarantees the existence of redundant paths
Simulation results showed that GEDAR is able to reduce the to forward data, improving the packet delivery ratio.
amount of void nodes through the depth adjustment- based However, it also increases the network energy consumption.
void node recovery strategy. Consequently, GEDAR In order to cope with this drawback, the authors proposed a
improves the packet delivery ratio and decreases the end-to- self-adaptation algorithm. In this algo- rithm, each node
end delay for the critical scenarios of low and high densities calculates its desirableness factor which measures the
and diverse network traffic load, when compared with the suitability of a node to forward packets. This factor is given
state-of-the art routing protocols [7], [9] and the simple as a function of the distance between the current node and
geographic and opportunistic routing (GOR) without any the forwarder node, the projection of the node to the
recovery mode. routing vector, and the angle between the vectors from the
This work significantly enhances our previous solutions forwarder to the destination and from the forwarder to the
[12], [13] by investigating the routing problem and the current node. If the desirableness factor is less than a defined
maximum local problem in mobile underwater network sce- threshold, the node will schedule the data packet
narios. Moreover, in this work we design an opportunistic transmission according to its priority.
routing protocol to cope with underwater acoustic com- DBR [7] routing protocol is the first underwater sensor
munication impairments. In [12], [13], a static underwater network routing protocol that uses node depth information
sensor network scenario was considered with sensor nodes to route data packets. The basic idea of DBR is to forward
attached into buoys and anchors. In those solutions, routing data packets greedily towards the water surface. Thus,
decisions and the topology organization were done in a packets can reach multiple data sinks deployed at the water
proactive way, before the monitoring phase. The contribu- surface. During the forwarding, the current sender broad-
tions of this work are i) an enhanced beaconing algorithm to casts the packet. After receiving it, if the receiver is closer to
disseminate the location of the neighbor nodes and known the water surface, it becomes qualified as a candidate to for-
sonobuoys to avoid overloading the acoustic channel; ii) an ward the packet. Otherwise, it will discard the packet. Each
anycast geo-opportunistic routing protocol advancing the qualified candidate will forward the packet in a prioritized
packet, at each hop, in a directed way towards to the closest manner if its distance to the current forwarder is at least dth
sonobuoy; iii) a novel reactive maximum local routing strat- and it has not previously sent this packet previously. Node
egy based on the depth adjustment of the nodes, to improve priority is given by means of the holding time. The farther
the packet delivery ratio by avoid long hop paths, which can the candidate node is on the current forwarder, the lower is
increase packet collisions and, consequently, the packet error its holding time. After the holding time, the packet is
rate, end-to-end delay and energy consumption. Moreover, broadcast if the node has not received the same data from a
this work extends our preliminary solution [14] in that we neighbor.
include RPR [15] routing protocol extends DBR by dealing with
malicious attackers, such as spoofing attacks. In RPR pro-
1) an enhanced review of underwater sensor network tocol, the packet header and payload are encrypted. Each
3

node has a pair of keys (public and secret keys), and a depth adjustment system, computes the trade-off network
certificate for the key pair generated by a trusted party. Also, energy cost and data latency based on the amount of data
a network wide secret key (NSK) is used to encrypt needed to be sent and the cost of surfacing; and, the sensor
information shared among the nodes. During the packet node then decides what technology should be used to send
forwarding process, the sender encrypts the packet payload the data. Once a node decides to surface, nodes that will form
with a Gateway Public Key (GPK). The packet header, at each the radio link path to the destination, are informed via
forwarder, is encrypted with NSK and signed with the node acoustic communication to surface. The authors pro- posed
public key. Upon receiving a packet, the node decrypts the and evaluated algorithms to determine the set of surface
head and checks if the packet is signed by a legitimate node. nodes. The disadvantage of this approach is that all nodes
Only packets with a proper signature are accepted. should have both acoustic and RF transmission modems.
VBVA routing protocol [16] extends the VBF routing Moreover, for the typical the application scenario of deepest
protocol [6] by including a communication void region place monitoring, the multi-modal communica- tion
recovery mode. Data packets are routed using the same approach can result in high end-to-end delay due to the time
strategy as VBF. During the void node recovery phase, VBVA required to move sensor nodes until the sea surface to
attempts to route the packet along the boundary of the transmit the gathered data.
communication void region by either shifting the In [12] and [13], the authors proposed a centralized and
forwarding vector or by means of a back-pressure method distributed geographic routing protocol with depth adjust-
when the communication void region is convex. In the vector ment based topology control as a void node recovery strat-
shifting mechanism, the void node asks its neighbors to egy for long-term underwater monitoring static network
change the current routing vector. After, the node keeps architecture. The proposed protocols organize the network
listening to the channel to check if a neighboring node topology to reduce the void and the number of disconnected
forwarding the packet is using the new routing vector. If a nodes before the beginning of the sensing phase.
node is a final node (void node), that is, even with the vector
Key differences. Herein, we point out some key dif-
shifting the packet cannot be forwarded, the back-pressure
ferences of our proposed protocol to the aforementioned
mechanism is used. In the back-pressure mechanism, the
related proposals. VBF, DBR and RPR routing protocols do
packet is routed back in the direction moving away from the
not employ any communication void region routing recov-
destinations. This is performed until the packet reaches a
ery procedure. In these protocols, the packet is discarded
node which can do vector shifting to forward the packet
when it reaches a communication void region. In this paper,
towards the destination.
we propose a novel depth-adjustment based communication
Lee et al. [8] proposed the Hydrocast routing protocol
void region routing recovery procedure. Thus, nodes located
also exploiting the pressure (depth) level information of the
into communication void region are moved for new depths
nodes to greedily route packets towards sonobuoys (sinks)
in order to resume the geo-opportunistic forwarding.
at the sea surface. Hydrocast also employs the opportunistic
routing paradigm in which the next-hop node priority is Hydrocast and VAPR explicitly discover and maintain a
given according to the trade-off between the progress of the routing path to forward packets from void nodes. This can
packet towards the surface and the link cost of reaching the be expensive in terms of energy since the high energy cost of
neighbor node. To cope with redundant transmissions, the underwater acoustic communication and the impairments of
authors proposed a greedy heuristic to determine a cluster the acoustic channel. Moreover, as packets will be routed
of next-hop forwarders without hidden terminal problems. through more hops to circumvent the communication void
When a node determines that it is in a communication void region, the acoustic channel can be overloaded, increasing
region, it performs a search for a node whose depth is lower the average end-to-end delay and reducing the packet de-
than its depth by means of controlled flooding and explicitly livery ratio due to more collisions and retransmissions. In
maintains a path to the node. our proposed protocol, we present a novel paradigm to cope
Void-aware pressure routing (VAPR) [9] uses the depth with communication void regions in mobile scenarios, tak-
information of the nodes to forward data packets towards ing advantage of the depth adjustment mechanism present
the sea surface. VAPR is a geographic and opportunistic in the current sensor nodes. Our idea is to move void nodes
routing protocol where a next-hop forwarder set to con- to new depths in order to resume the geo-opportunistic
tinue the packet forwarding is determined from the greedy routing. With this approach we have an energy cost to move
pressure strategy. In VAPR, each node is aware of the void void nodes. However, we can avoid overloading the acoustic
nodes from the sonobuoy’s reachability information channel and the unnecessary energy expenditure relative to
disseminated in the network via periodic beaconing. Each the greater number of packet retransmissions.
node uses that information to build a directional (upwards The works [12], [13], [17] proposed a node’s depth
or downwards) path towards some surface sonobuoy. The adjustment to improve data packet delivery in static un-
next-hop forwarding set is selected according to the neigh- derwater sensor networks. Differently, our node’s depth
bor forwarding direction, that is, those directions in which adjustment algorithm is devoted to the communication void
there is a match of the forwarding direction with the current region routing problem in mobile underwater sensor
forwarder (upward or downward). networks, acting in a reactive way to overcome changes in
O’Rourke et al. [17] proposed a multi-modal communi- the network topology. Moreover, we implement an op-
cation approach. In the proposed approach, a sensor node portunistic routing mechanism to mitigate the impairments
equipped with acoustic communication modem, surface of the underwater acoustic communication, which was not
level radio frequency (RF) communication modem, and a considered in those solutions.
4

3 B ASIC IDEA OF GEDAR


GEDAR is an anycast, geographic and opportunistic proto-
col that tries to deliver a packet from a source node to some
sonobuoys. During the course, GEDAR uses the greedy
forwarding strategy to advance the packet, at each hop,
towards the surface sonobuoys. A recovery mode procedure
based on the depth adjustment of the void node is used to
route data packet when it get stuck at a void node. ?
The proposed routing protocol employs the greedy for-
warding strategy by means of the position information of the
current forwarder node, its neighbors, and the known
sonobuoys, to determine the qualified neighbors to continue
forwarding the packet towards some sonobuoys. Despite
greedy forwarding strategy being a well known and used Fig. 1. SEA Swarm architecture and the communication void region
next-hop forwarder selection strategy, GEDAR considers the problem
anycast nature of underwater routing when multiple surface
sonobuoys are used as sink nodes.
We consider that, as in [9], each sonobuoy at the sea ture, as shown in Fig. 1. In this architecture, we have a large
surface is equipped with a GPS (Global Positioning System) number of mobile underwater sensor nodes at the ocean
and uses periodic beaconing to disseminate its location in- bottom and sonobuoys, also named sinks nodes, at the
formation to the underwater sensor nodes. We assume that ocean surface. They move as a group with the water current
each underwater sensor node knows its location. The loca-
[22]. Our model consists of a set N = Nn ∪ Ns of nodes with
tion of the neighbors is known through periodic beaconing. a communication range of rc, so that Nn represents the set of
Despite the exact knowledge of the node’s location being a sensor nodes, and Ns is the set of sonobuoys.
strong assumption mainly for a mobile scenario, some
The sensor nodes Nn = {n1, n2 , . . . , n|Nn |} are ran-
proposals have been devoted to solve this problem [18], [19],
[20]. Moreover, the localization problem in underwater domly deployed in a geographic area of interest D ∈ R3
to provide 4 D (space and time) monitoring. Each node
networks continues to attract research efforts due to the
is equipped with various sensor devices and with a low
importance of nodes’ localization to tag the collected data,
bandwidth acoustic modem which is used to periodically
track underwater nodes and targets, and to group nodes
report the sensed data to the destinations (sonobuoys).
coordinated motion [19].
Underwater sensor nodes can adjust its depth by means of
Furthermore, GEDAR is opportunistic routing (OR) aim-
inflatable buoys or winch based apparatus. In a buoyancy-
ing to mitigate the effects of the acoustic channel. Thus,
based depth adjustment system, a buoy can be inflated by a
a subset of the neighbor nodes is determined to continue
pump, bladders or other device to change the buoyancy of
forwarding the packet towards some surface sonobuoy
the float relative to the water. This system does not use
(next-hop forwarder set). The research challenge of OR
propulsion mechanisms, reducing the energy cost to the
next-hop forwarder set selection is how to determine a
depth adjustment. In winch-based apparatus, sensor nodes
list of neighbors such that the hidden terminal problem is
are attached to surface buoys or anchors by means of cables.
reduced. The next-hop forwarder set selection mechanism of
A cable is then adjusted to move and maintain a node in a
GEDAR considers the position of the neighbors and known
determined depth. Some proposals, which consider depth
sonobuoys to select the most qualified candidate neighbors.
adjustment capability of the nodes for coverage improve-
When a node is in a communication void region, GEDAR
ments [23] and localization systems [24], for instance, did not
moves it to a new depth to resume the greedy forwarding
consider the cost relative to this task. In this work, as we
strategy. To the best of our knowledge, GEDAR is the first
consider that sensor nodes can freely drift with ocean
routing protocol proposed for mobile underwater sensor
current, Drogue [21] is a preferable candidate to be used as a
networks to consider the depth adjustment capability of
sensor node. However, we have considered the vertical
the sensor nodes to deal with communication void region
movement speed and energy cost values of the depth
problem. The motivations for the use of this new paradigm
adjustment mechanism proposed in [17] as that work
are threefold. First, the node depth adjustment technology
provides information about the vertical movement speed
is already available [17], [21]. Second, the communication
and cost. However, it is worth highlighting that winch- based
task in the underwater sensor network is highly expensive.
approaches are energy hungry as compared with buoyancy-
Third, the cost needed to move the nodes to new depths is
based approaches. Thus, each sensor node can move
diluted along the network operation when compared with
vertically with velocity v = 2.4 m/min at an energy cost of
the case where the node must route data packets along more
Em = 1500 mJ/m.
hops.
The sonobuoys Ns = {s 1 , s 2 , . . . , s |N s |} are special
nodes randomly deployed at the sea surface. Each sonobuoy
4 P RELIMIN AR IE S
is equipped with GPS (Global Positioning System) in order
4.1 System model to determine its location. Moreover, they are equipped with
In this paper, we consider an underwater wireless sensor both acoustic and radio transceiver modems; each sonobuoy
network SEA (Sensor Equipped Aquatic) swarm architec- uses acoustic links to send commands and to receive data
5

from underwater sensor nodes, and the radio links are used The probability of error can be evaluated as:
to forward the data packets to a monitoring center for future ∫ ∞
processing. Like [7] and [9], we consider that if a packet pe(d) = pe (X)p d (X)dX. (5)
arrives at any sonobuoy, it can be delivered to the 0

monitoring center. This assumption is reasonable because Here, pe(X) is the probability of error for an arbitrary
acoustic communication is more hard than radio frequency modulation at a specific value of SNR X. In this paper, we use
communication since sound propagates (speed of the BPSK (Binary Phase Shift Keying) modulation that is
1.5 × 103 m/s in water) five orders of magnitudes slower widely used in the state-of-the-art acoustic modems [5], [8],
than radio (with a propagation speed of 3 × 108 m/s in air). [9], [30], [31].
We represent the network topology as an undirected In BPSK, each symbol carries a bit. In [32], the probability
graph tt(t) = (V, E(t)) at time t, where V = N is the set of of bit error over distance d is given as:
vertices corresponding to the sensor nodes and sonobuoys; . . Σ
1 Γ(d)
and, E(t) = {eij(t)} is the finite set of links between them. p e(d) = 1− . (6)
Two nodes u and v ∈ V are neighbors at time t and are 2 1 + Γ(d)

directly connected via a link, if they can directly, mutually, and


Thus, for any pair of nodes with distance d, the delivery
consistently communicate over an acoustic channel at time t.
probability of a packet with size m bits is simply given by:
We define Nu(t) as the set of underwater sensor

nodes that are node u’s neighbors with u ∈


/ Nu(t) and p(d, m) = (1 − pe(d))m . (7)

Su (t) = {ns 1 , ns 2 , . . . , nsk } where nsi is defined as the


quintuple (sequence number, ID, X, Y, Λ) of the ID sonobuoy,
5 D ESIGN OF GEDAR
located in the (X, Y )-coordinate, known by its (sequence
number)-th beacon. The flag Λ = 0 indicates that the node has 5.1 Enhanced beaconing
not disseminated this information for its neighbors. Periodic beaconing plays an important role in GEDAR. It
is through periodic beaconing that each node obtains the
4.2 Underwater packet delivery probability estimation location information of its neighbors and reachable
sonobuoys. Unlike the solutions [12] and [13], where each
In this subsection, we estimate the underwater packet deliv-
node can be informed beforehand concerning the location of
ery probability p(m, d) of m bits for any pair of nodes with
all sonobuoys (as long-term underwater monitoring archi-
distance d, which is used in the next-hop subset forward- ing
tecture is formed by static nodes attached to buoys and/or
selection procedure of the proposed geo-opportunistic
anchors), we need an efficient beaconing algorithm that
routing protocol.
keeps the size of the periodic beacon messages short as
Like [8] and [25], we use the following underwater
possible. For instance, if each node ni embeds its known
acoustic channel model [26], [27]. The path loss, that de-
scribes the attenuation on a single, unobstructed propaga- sonobuoy locations |Si | together with its location, the size of
its beacon message in the worst case, without considering
tion path, over a distance d for a signal of frequency f due to
large scale fading, is given as: lower layer headers, is 2(m+n)×|N s |+2m+3n bits, where
m and n are the size of the sequence number and ID fields,
A(d, f) = dka(f)d , (1) and each geographic coordinates, respectively. Given that the
transmission of large packets in the underwater acoustic
where k is the spreading factor and a(f) is the absorption
channel is impractical [33], we propose an enhanced beacon
coefficient. The geometry of propagation is described using
algorithm that takes this problem into consideration.
the spreading factor k. Its commonly used values are k = 2
Algorithm 1 is an enhanced periodic beaconing used by
for spherical spreading, k = 1 for cylindrical spreading, and GEDAR to broadcast periodic beacons and to handle
for a practical scenario, k is given as 1.5. The absorption received beacons. In the beacon messages, each sonobuoy
coefficient a(f), in dB/km for f in kHz, is described by the embeds a sequence number, its unique ID, and its X, Y location.
Thorp’s formula [26] given by:
We assume that each sonobuoy at the surface is equipped
0.11 × f 2 44 × f 2 −4 2 with GPS (Global Positioning System) and can determine
10 log a(f) = + +2.75×10 f +0.003. its location. The sequence number of the beacon message
1 + f2 4100 + f
(2) does not need to be synchronized among all sonobuoys.

The average Signal-to-Noise Ratio (SNR) over distance d It is used together with the ID to identify the most recent
is thus given as: beacon of each sonobuoy (line 24). The depth information

Eb /A(d, f) = Eb of sonobuoys is omitted from the beacon message since the


Γ(d) = , (3) sonobuoys are deployed on the surface and vertical move-
N0 N0dka(f)d ment is negligible with respect to the horizontal movement

where Eb and N0 are constants that represent the average non-fading additive white Gaussian noise (AWGN) channel. As in
transmission energy per bit and noise power density in a [28] and [29], we use Rayleigh fading to model small scale fading
where SNR has the following probability distribution: [34].

∫ 1 X Similarly, each sensor node embeds a sequence number, its
pd (X) = e−
Γ(d) . (4) unique ID and X, Y, and Z position information. Moreover,
0 Γ(d)
the beacon message of each sensor node is augmented with
the information of its known sonobuoys from its set Si(t).
Each node includes the sequence number, ID, and the X, Y
location of the its known sonobuoys. The goal is for the
neighboring nodes to have the location information of the
6

all reachable sonobuoys. GPS cannot be used by underwater both collisions and synchronization. Moreover, after a node
sensor nodes to determine their locations given that the high broadcasts a beacon, it sets up a new timeout for the next
frequency signal is rapidly absorbed and cannot reach nodes beaconing.
even localized at several meters below the surface. Thus,
each sensor node knows its location through localization 5.2 Neighbors candidate set selection
services, such as [20]. Localization services incur additional
Whenever a sensor node has a packet to send, it should
costs in the network. However, the knowledge regarding the
determine which neighbors are qualified to be the next- hop
location of sensor nodes can eliminate the large number of
forwarder. GEDAR uses the greedy forwarding strategy to
broadcast or multicast queries that leads to unnecessary
determine the set of neighbors able to continue the
network flooding that reduces the network throughput [35].
forwarding towards respective sonobuoys. The basic idea of
In addition, the location information is required to tag the
the greedy forwarding strategy is, in each hop, to advance
collected data, track underwater nodes and targets, and to
the packet towards some surface sonobuoy.
coordinate the motion of a group of nodes [19].
The neighbor candidate set is determined as follows. Let
Algorithm 1 Periodic beaconing ni be a node that has a packet to deliver, let its set of
1: procedure BroadcastPeriodicBeacon(node) neighbors be Ni(t) and the set of known sonobuoys Si(t) at
2: m: a new beacon message with the next seq num time t. We use the packet advancement (ADV) [36] metric to
3: if beacon timeout expired then determine the neighbors able to forward the packet towards
4: m.coordinate ← location(node) 5: some destination. The packet advancement is defined as the
if node ∈ Nn then distance between the source node S and the destination node
6: for s ∈ Si(node) do D minus the distance between the neighbor X and
7: if Λ(s) = 0 then D. Thus, the neighbors candidate set in GEDAR is given as:
8: m.addSon.(seq num(s), ID(s), X(s), Y(s)) Ci = {nk ∈ Ni(t) : ∃sv ∈ Si(t) | D(ni, is∗)−D(nk, sv) > 0},
9: Λ(s) ← 1 (8)
10: end if where D(a, b) is the Euclidean distance between the nodes
11: end for a and b and, s∗i ∈ Si (t) is closest sonobuoy of ni as:
12: end if s∗ = argmin {D(n , s )}. (9)
13: Broadcast m i ∀sj ∈Si (t) i j

14: Set a new timeout


15: end if 5.3 Next-hop forwarder set selection
16: end procedure GEDAR uses opportunistic routing to deal with underwa-
17: ter acoustic channel characteristics. In traditional multihop
18: procedure ReceiveBeacon(node, m) routing paradigm, only one neighbor is selected to act as a
19: if m is from a sonobuoy then next-hop forwarder. If the link to this neighbor is not
20: update(Si (node), m) performing well, a packet may be lost even though other
21: else neighbor may have overheard it. In opportunistic routing,
22: update neighbor(m.seq num, m.id, m.location) taking advantage of the shared transmission medium, each
23: for s ∈ m do packet is broadcast to a forwarding set composed of several
24: if seq num(s, m) > seq num(s, Si(node)) then neighbors. The packet will be retransmitted only if none of
25: update(Si (node), s) the neighbors in the set receive it. Opportunistic rout- ing
26: end if (OR) has advantages and disadvantages that impact on the
27: end for network performance. OR reduces the number of possible
28: end if retransmissions, the energy cost involved in those
29: end procedure retransmissions, and help to decrease the amount of possible
collisions. However, as the neighboring nodes should wait
In order to avoid long sizes of beacon messages, a sensor for the time needed to the packet reaches the furthest node
node includes only the position information of the in the forwarding set, OR leads to a high end-to-end latency
sonobuoys it has not disseminated in the predecessor round [25].
(lines 5-12). Whenever a node receives a new beacon mes- For each transmission, a next-hop forwarder set F is
sage, if it has come from a sonobuoy, the node updates the determined. The next-hop forwarder set is composed of the
corresponding entry in the known sonobuoy set Si(t) (line most suitable nodes from the next-hop candidate set Ci so
20). Otherwise, it updates its known sonobuoys Si set in that all selected nodes must hear the transmission of each
the corresponding entries if the information location other aiming to avoid the hidden terminal problem. The
contained in the beacon message is more recent than the problem of finding a subset of nodes, in which each one can
location information in its set Si . For each updated entry, the hear the transmission of all nodes, is a variant of the
node changes the appropriate flag Λ to zero, indicating that maximum clique problem, that is computationally hard [8].
this information was not propagated to its neighbors (line The next-hop forwarder set selection algorithm of GEDAR
25). Thus, in the next beacon message, only the entries in Si(t) is based on the proposed in [8] and [9]. We use
in which the Λ is equal to zero are embedded (lines 7-10). We normalized advance (NADV) [37] to measure the “goodness”
add random jitters between 0 and 1 during the broadcast of of each next-hop candidate node in Ci . NADV corresponds
beacon messages, to minimize the chance of the optimal trade-off between the proximity and link cost to
7

determine the priorities of the candidate nodes. This is nec- Algorithm 2 presents a heuristic for the next-hop for-
essary because the greater the packet advancement is, the warder set selection. First, lines 2 to 4 determine the NADV
greater the neighbor priority becomes. However, due to the of each qualified neighbor according to Equation (10). Sec-
underwater channel fading, the further the distance is from ondly, the neighbor candidate set Ci is ordered according to
the neighbor, the higher the signal attenuation becomes as the priority of the nodes as a result of the NADV (line 5).
well as the likelihood of packet loss. For each next-hop Thirdly, lines 8 to 18 determine the clusters from the neighbor
candidate node nc ∈ Ci , normalized packetiadvancement is: candidate set Ci . Each cluster Fj starts with the
NADV (n ) = ADV (n ) × p(d , m), (10) greatest priority node from Ci and is expanded1by including
all nodes in Ci which have a distance less than rc. Fourthly,
c c c 2
each cluster Fj is expanded to include those nodes in Gi (a
where ADV (nc) = D(ni , s∗ ) − D(nc, s ∗) is the nc packet copy from Ci ) that have a distance of less than the commu-
i c
advancement towards its closest sonobuoy s∗; di is the nication radius rc for all nodes already in the cluster (lines
c c
Euclidean distance between the source node ni and the 19-25). The idea is to expand each cluster while maintaining
forwarder candidate nc and, p(dci , m) is the packet delivery the restriction that each node should hear the transmissions
probability of m bits over distance dci given according with of each other node in the cluster. Finally, the cluster F with
Equation (7). the highest EPA is selected as the next-hop forwarder set.
Let Fj ⊆ Ci be a set formed by candidate forwarder After computing the forwarding set, the current for-
nodes, ordered according to their priorities (NADV) as n1 > warder node includes the address of the next-hop forwarder
n2 > . . . > n k, that must hear each other. The Expected nodes in the packet and then broadcast it. Each node that has
Packet Advance (EPA) of the set F j, which is the normalized correctly received the packet, verifies if it is a next-hop
sum of advancements made by this set [8], [38], is defined forwarder and then sets the timer to broadcast it according
by Equation (11). The objective of the greedy opportunistic to its priority. The greater the priority of the node is, the
forwarding strategy is to determine the subset F ⊆ Ci such shorter is its waiting time. The packet will be discarded by
that the (EPA) is maximized. the nodes that are not listed as the next-hop forwarder.
k l−1 In opportunistic routing, the highest priority node be-
Σ Y comes a next-hop forwarder and the rest of the lower pri-
EPA(F j ) = NADV (nl) (1 − p(dji, m)) (11) ority nodes transmit the packet only if the highest priority
l=1 j=0
node fails to do so. The lower priority nodes suppress their
transmissions after listening the data packet transmission of
Algorithm 2 Next-hop forwarder set selection the next-hop forwarder. In GEDAR, when the ith priority
1: procedure GetNextHopForwarders(source node ni ) node receives the packet, it will wait for the remaining
2: for nc ∈ Ci do
time to complete propagation of the packet plus the time
corresponding to the delay propagation between the 1th to
3: NADV (nc) ← dc × p(dci, m)
4: end for the 2th priority nodes, the delay between the 2th to the
5: Order Ci according with the NADV of the nodes 3th priority nodes, and so on until the delay between the
6: j ← 1 (i − 1)th to the ith priority node. After this time, if the ith
7: Gi ← Ci {Gi is a copy of Ci } node does not hear the transmission of the packet, it will
broadcast it. Thus, the ith waiting is:
8: while | Ci |> 0 do

9: Fj ← {n1 ∈ Ci } {n1 is the highest priority node of i


Σ D(nk, nk+1 )
Ci } Twi = Tp + + i × Tproc, (12)
s
10: Ci ← Ci − {n1} k=1

11: for nu ∈ Ci do where Tp is the remaining propagation time and Tproc is the
12: if D(n1, nu ) < 1 2rc then
packet processing time. The remaining propagation time
13: Fj ← Fj ∪ {nu} represents the delay needed for the complete propagation of
14: Ci ← Ci − {nu} the packet broadcast by the sender node. This time is defined
15: end if as
16: end for (rc − D(na, nb ))

17: j← j+1 Tp = , (13)


s
18: end while

19: for Fj do 26: Calculate the EPA for each cluster Fj according to Equation
20: for nk ∈ Gi do (11)
21: if D(nk , nt ) < rc ∀nt ∈ F j then 27: return the cluster F with the highest EPA
22: Fj ← Fj ∪ {nk} 28: end procedure
23: end if
24: end for
25: end for
where na is the receiver node, nb is the sender node, and 5.4 Recovery mode
s is the speed of sound underwater. The second term
Void node recovery procedure is used when the node fails to
in Equation (12) corresponds to the time required for
forward data packets using the greedy forwarding strategy.
the node to hear the transmission of its predecessor
Instead of message-based void node recovery procedures,
priority node.
GEDAR takes advantage of the already available node
depth adjustment technology to move void nodes for new
8

c ?

(a) Example of recovery mode procedure at c (b) Nodes b and d start the recov- ery (c) Scenario after the recovery mode proce-
mode procedure after receiving a c’s void dure at nodes a, b, c, d, e. All generated data
node announcement message packet from these nodes will be discard.

Fig. 2. Example of a communication void region scenario

depths trying to resume the greedy forwarding. We advo- for a void node recovery procedure can be briefly described
cate that depth-adjustment based topology control for void as follows. During the transmissions, each node locally
node recovery is more effective in terms of data delivery and determines if it is in a communication void region by exam-
energy consumption than message-based void node recov- ining its neighborhood. If the node is in a communication
ery procedures in UWSNs given the harsh environment and void region, that is, if it does not have any neighbor lead- ing
the expensive energy consumption of data communication. to a positive progress towards some surface sonobuoy

(C = ∅), it announces its condition to the neighborhood and


Algorithm 3 Void node recovery algorithm waits the location information of two hop nodes in order to
1: procedure RecoveryMode() decide which new depth it should move into and the greedy
2: is void node ← true forwarding strategy can then be resumed. After, the void
3: Stop beaconing node determines a new depth based on 2-hop connectivity
4: Ω ← ∅ ⊲ Set of neighbors to topology control such that it can resume the greedy forwarding.
5: Send void node announcement message Algorithm 3 is used for void node recovery. In the
6: CalculateNewDepth(t) recovery mode procedure, the void node changes its sta- tus,
7: end procedure stops the beaconing, sends a void node announce- ment
8: message to announce its void node condition to the
9: {nvn
is the void node.} neighborhood, and schedules the procedure to calculate its
10: {Ω set of neighbors to act as next-hop forwarder.} new depth (Lines 1-7). When a neighbor node receives a void
11: {D set of depth candidates to the void node nvn .} node announcement message, it removes the sender from its
12: procedure CalculateNewDepth(time) neighbor table and, from the updated neighbor table,
13: if | Ω |> 0 then determines whether it is a void node or not. If the receiver
14: for nu ∈ Ω do node will be not a void node, it replies the received message
15: if D(nvn , nu ) ≤ rc then with a void node announcement reply message containing
16: du ← D(nu, s∗u) its location information and the location of its neighbors.
17: (xvn −xs ∗vn
)2 +(y vn −ys ∗ vn
)2 +(z ∗ −z
vn s ∗ ) vn≥ d
2 2
u Otherwise, it will start the void node recovery procedure.
18: D ← D ∪ {z vn ∗ }
This strategy is used to avoid cascading effects

19: else during the depth adjustment of void nodes. For instance,

20: d ← (xvn − xu )2 + (yvn − yu) 2 consider the worst scenario of a “mountain-like” commu-
21: if d ≤ rc then nication void region, as depicted in Fig. 2. The picture shows
22: (xvn − xu )2 + (yvn − yu )2 + (z ∗vn − zu)2 ≤ r2 underwater sensor nodes, such as the a, b, c, d, and

23: D ← D ∪ {z ∗vn} 33: end procedure


24: end if
25: end if The GEDAR depth-adjustment based topology control
26: end for
27: z = arg min∀zi ∈D {|zvn − zi |}
28: nvn moves to new depth z
29: is void node ← false
30: else
31: RecoveryMode();
32: end if
c
e nodes, that should deliver collected data to sonobuoys
at sea surface through multihop underwater acoustic
com- munication. In this example, the node c has data
packet to be sent. It discovers that it is in a
communication void region and then it starts the void
node recovery algorithm (Algorithm 3). At this
moment, nodes b and d using node c as the next-hop
forwarder. During the void node recovery, node c
sends a void node announcement message to its
neighbor nodes (see Fig. 2a). After receiving that
control packet, nodes b and d remove c from its
neighbor table and determine whether they can
continue forwarding the packet, using the greedy
geographic and opportunistic strat- egy, through other
neighbor nodes. In this scenario, as they
9

Frac. of local maximum nodes

40000
0.25

GEDAR
GUF

Depth adjustment (m)

Packet delivery ratio


0.20

30000
0.15

0.3 0.4 0.5 0.6 0.7 0.8


20000
0.10

DBR

10000
VAPR
0.05

GOR

150 200 250 300 350 400 450 150 200 250 300 350 400 450 150 200 250 300 350 400 450

Number of nodes Number of Nodes Number of nodes

(a) Fraction of void nodes (b) Average depth adjustment (c) Packet delivery ratio

Fig. 3. Simulation results

cannot, b and d start the recovery mode procedure (see Fig. tunistic routing protocol (GOR) without recovery mode and
2b). The same procedure is performed by nodes a and e. At the two other most popular previously proposed routing
the end, none of them can continue the recovery void node protocols for UWSN: DBR (Depth-Based Routing) [7] and
procedure as they have not received any replay of a void VAPR (Void-Aware Pressure Routing) [9]. All evaluated
node announcement message. Thus, all generated packets routing protocols have been implemented using Aqua-Sim
from these nodes will be discarded as they do not have a [39]. Aqua-Sim is a high fidelity and flexible packet level
next-hop forwarder candidate, as shown Fig. 2c. underwater sensor network simulator developed on NS- 2
After the waiting time t (Line 6), the void node runs the to simulate the impairment of the underwater acoustic
procedure CalculateNewDepth (Lines 12-33). The set Ω channel.
contains the location information of the 2-hop connectivity In our simulations, the number of sensor nodes range
obtained from the void node announcement replay mes- from 150 to 450 and the number of sonobuoys is 45. They are
sage received from the non-void node neighbors. The new randomly deployed in a region the size of 1,500 m
depth of the void node is calculated from 2-hop connectivity × 1,500 m × 1,500 m. In each sensor, data packets are
neighbor set Ω. Let vn be the void node and u ∈ Ω a possible generated according to a Poisson process with the same
next-hop forwarder node. If node u is a 1-hop parameter λ = {0.01, 0.05} pkts/min to very low traffic
neighbor, the void node vn must determine a new depth such load; λ = {0.1, 0.15} pkts/min to low traffic load; and, λ
that its distance to the closest sonobuoy is larger than the = {0.2, 0.25} pkts/min to medium traffic load. We adopt
distance from node u to its closest sonobuoy (Lines 15- 18). an extended 3 D version of the Meandering Current Mo-
This is done by solving the inequality in Line 17. The bility (MCM) [34], to simulate a mobile network scenario,

new possible depth z∗vn is then added to the set of candidate considers the effect of meandering sub-surface currents (or

depths D (Line 18). If node u is a 2-hop neighbor of nv, nv jet streams) and vortices. We set the main jet speed to
determines whether there is a new depth z∗ vn such that vn 0.3 m/s. Due to the mobility, nodes would move beyond

can communicate directly with u and can forward its packet the deployment region.
through u using the greedy forwarding strategy (Lines 19- In all experiments, the nodes have a transmission range
25). In Line 20, the void node vn determines its Euclidean (rc) of 250 m and a data rate of 50 kbps. They use the CSMA
distance to u considering only the X, Y coordinate location. protocol at the MAC layer. The size of the packet is
This is because, in the worst scenario, vn will be at the same determined by the size of the data payload and by the space
depth of u. If this distance is less than the communication required to include the information of the next-hop
range rc, the void node vn determines a new candidate forwarder set. We consider that data packets have a payload

depth z∗vn relative to the node u such that vn can use u of 150 bytes. As in [8] and [9], we use a Bloom filter to

as a next-hop forwarder (Lines 21-24). This new candidate recovery mode procedure (Line 31).
depth is then added to the set D (Line 23). At the end, the
void node vn chooses a new depth from the set D such that
its displacement is minimum (Line 27), starts its vertical 6 P ERF OR M AN C E E V ALU ATION
movement (Line 28) and changes its condition of void node In this section, we evaluate the performance of our pro- posed
(Line 29). If vn can not determine a new depth, it restarts the protocol against the simple geographic and oppor-
reduce the space required by the forwarding set in the
data packet. Thus, a filter size of 19 bytes can be used
to represent 15 items with a false positive rate smaller
than 1 percent [8], [9]. The energy consumption at
each sensor node is a combination of the
communication and depth adjustment energy
consumption. The values of the energy consumption
were Pt = 2 W, Pr = 0.1 W, Pi = 10 mW and Em =
1500 mJ/m for the respective sensor operations of
transmission, reception, idle and depth adjustment per
meter. In our simulation, each run lasted 1 hour. The
above mentioned parameters are similar to those ones
explored in [7], [8], [9], [17], [40]. The results correspond
with an average
10

BR GO
10

DBR
Redundant packets

20
APR GEDAR

Transmissions
GOR
8

15
GEDAR
6

10
4

5
2

150 200 250 300 350 400 450 150 200 250 300 350 400 450

Number of nodes Number of nodes

(a) Average number of redundant packet (b) Number of transmissions for delivery

Energy per data packet per node (J)


3.5

6
DB
3.0

VAPR

5
DBR GOR GO
2.5

VAPR GEDAR
Latency

4
GEDAR
2.0

3
1.5

2
1.0

1
0.5

150 200 250 300 350 400 450 150 200 250 300 350 400 450

Number of nodes Number of nodes

(c) Average end-to-end delay (d) Energy consumption per message per node

Fig. 4. Simulation results

comparison to GUF and approximately 44% as compared to GOR.


value of 50 runs with a 95 percent confidence interval.

6.1 Topology-related results


In this section, we analyze the results relative to the network
topology when the network density is varied. Our objective
is to investigate how the greedy forwarding strategy be-
haves as the network density ranges from low to high densi-
ties. The results concern the greedy upward (GUF) strategy,
greedy opportunistic (GOR) strategy, and GOR strategy with
depth-adjustment based topology control (GEDAR). In the
GUF strategy, used by DBR and VAPR, the neighbor closest
to the surface is selected as the next-hop forwarder. In the
GOR strategy, the neighbor closest to some sonobuoys in
terms of the Euclidean distance is selected as the next-hop
forwarder. GEDAR works as GOR but moves void nodes to
new depths to resume the greedy forwarding.
Fig. 3a shows the fraction of void nodes after 1 hour
of simulation. As shown in the plot, the fraction of void
nodes decreases when the network density increases for all
greedy strategies. On the other hand, GEDAR and GOR
achieve the best results as compared with the GUF. This
happens because nodes deployed closest to the surface that
are not in the communication range of any sonobuoy fail to
maintain the greedy routing process when the GUF strategy
is used. When GEDAR is used, the proposed depth-
adjustment based topology control mechanism reduces 58%
the fraction of void nodes for medium density scenarios in
Fig. 3b depicts simulation results for the average
dis- placement of void nodes in GEDAR. When the
network density is low, the displacement of void nodes
is high. For instance, when the network has 200 sensor
nodes where approximately 15% is in a communication
void region (Fig. 3a), each void node moves 133 meters
on average. As the network density increases, the total
displacement decreases. This happens because the
fraction of nodes located in com- munication void
regions decreases, as corroborated by the results of
GOR in Fig. 3a.

6.2 Network density-related results


In this section, we evaluate the DBR, VAPR, GOR and
GEDAR for different network densities. To do this, the
number of nodes was varied and the traffic load was
main- tained in λ = 0.15 pkts/min. We focused on the
network performance mainly for the hard scenarios of
low and high densities. In these scenarios, we have a
high incidence of void nodes and high congestion
occasioned by the concur- rent transmissions of a large
number of sensor nodes.
Fig. 3c shows the results concerning the packet
delivery ratio. This result is quite consistent with the
topological results presented in Fig. 3a. The overall
trend is an incre- ment in the packet delivery ratio
when the network density increases. GEDAR has the
best packet delivery ratio perfor- mance because of its
void node recovery procedure. VAPR outperforms
DBR and GOR mainly in low density scenarios. The
reason is that packets generated and forwarded by void
nodes are routed through directional trails to
circumvent
11

DBR GOR DBR GOR


VAPR GEDAR VAPR GEDAR
150 250 350 450 150 250 350 450

0.8 20
0.7
0.6 15
Packet delivery ratio

0.5

Redundant packets
10
0.4
0.3 5

0.8 20
0.7
0.6 15
0.5 10
0.4
0.3 5

150 250 350 450 150 250 350 450 150 250 350 450 150 250 350 450

Number of nodes Number of nodes

(a) Packet delivery ratio (b) Average number of redundant packet

DBR GOR DBR GOR


VAPR GEDAR VAPR GEDAR
150 250 350 450 150 250 350 450

3.5
30 3.0
2.5
20 2.0
1.5
Transmissions

10
Latency (s)

1.0
0.5

3.5
30 3.0
2.5
20 2.0
1.5
10 1.0
0.5
150 250 350 450 150 250 350 450 150 250 350 450 150 250 350 450

Number of nodes Number of nodes

(c) Number of transmissions for delivery (d) Average end-to-end delay

Fig. 5. Simulation results

surface that are within the communication range of more than one
communication void regions instead of being discarded as sonobuoy.
in DBR and GOR. Fig. 4b shows the results concerning the average number
Fig. 4a shows the results concerning the average number
of redundant copies by received packet. As shown in Fig. 4a,
the number of redundant copies increases in DBR and VAPR
when the network density increases. In DBR, this happens
due to both multipath packet delivery and failures in the
suppression of data transmission. For some low priority
nodes, the transmission is not suppressed given that the DBR
next-hop set selection heuristic does not guarantee that the
selected nodes will hear the transmission of each other. The
increment in redundant packets in VAPR occurs because low
priority nodes cannot hear the transmission of high priority
ones as we have more interferences. The redundant data
packet copies in GEDAR and GOR result from the broadcast
nature of the transmission of some nodes closest to the
of packet transmissions needed to deliver a data
packet, including the recovery process. This plot
suggests that the average number of packet
transmissions needed to deliver a packet is closely
related to the redundant packets shown in Fig. 4a. As
the overall trend, when the network density increases,
more transmissions are necessary for delivery. This
increment is significant in DBR and VAPR. In GEDAR
and GOR this cost is amortized given the better
performance of packet delivery ratio, as corroborated
by Fig. 3c.
Fig. 4c shows the results concerning the average
end-to- end delay. As expected, the average delay
experienced by a packet in GEDAR, VAPR and GOR is
higher than in DBR. The cause of this is that these
protocols use opportunistic routing paradigm to
improve the data delivery. Besides the time needed to
move void nodes to new depths in GEDAR, its end-to-
end delay is lower than VAPR. This is due to the fact
that during the depth adjustment, the generated data
packets are discarded. DBR presented the lowest delay
which corresponds to the time needed to receive,
process
12

Fig. 5b shows the average number of redundant copies


DBR GOR
VAPR GEDAR for delivered packet. Notice that the received redundant
150 250 350 450 copies in DBR decreases significantly when the traffic load
increases. For the scenario of 450 nodes, this reduction is of
50% when we compare its performance with the traffic load
40
of 0.01 and 0.25 pkts/min. The reason for this behavior is that
Energy per packet per node (J)

30
with the network traffic load increment, more packets are
20
lost along the routing path and less redundant copies are then
10
generated (please refer to Fig. 5a). Quite a trend can be
observed for VAPR. The Fig. 5b shows that the redundant
40 copies of delivered packets are low for GOR and GEDAR.
30 This happens thanks to the proposed low priority node
20 transmission suppression algorithm.
10 Fig. 5d shows the average end-to-end latency. As a
general trend, the latency increases when the network traffic
150 250 350 450 150 250 350 450 load increases. This is expected given that the increment in
Number of nodes the traffic load results in more transmissions competing to
access the shared medium. This leads to nodes staying in
Fig. 6. Energy consumption per message per node the back-off collision avoidance mechanism of the CSMA
protocol before attempting to sense the carrier again. VAPR,
GOR and GEDAR have high delay when compared to DBR
and send the data packets until they reach any sonobuoy. mainly in high traffic scenarios because of the opportunistic
VAPR has the worst performance mainly due to the incre- forwarding.
ment in the number of transmissions. Fig. 6 shows the average energy consumption per re-
Fig. 4d shows the results concerning the energy con- ceived packet per node. For low density and traffic load,
sumption per received packet per node. Notice that GEDAR GEDAR has a high energy cost incurred by received packets
has a high energy consumption for low density scenarios. per node. However, when the traffic load increases, the en-
This cost is relative to the depth adjustment of the void ergy cost per packet significantly decreases. This is because
nodes. As we can see in Fig. 3b, the average displacement per the initial energy consumption needed to move void nodes
node is high in low density scenarios. However, as the is diluted along the network lifetime. The energy cost per
network density increases, the energy consumption de- received packet per node for DBR, GOR and VAPR is almost
creases; it becomes approximately the same as that in DBR constant.
and VAPR. This happens because the average displacement Figs. 7a and 7b show the show the percentage of the net-
per node decreases, as shown in Fig. 3b; and, the high packet work energy consumption relative to the acoustic commu-
delivery ratio (Fig. 3c) amortizes the energy cost relative to nication and physical actuation (nodes’ depth adjustment),
node movement. for a low and medium network traffic load, respectively. As
depicted in the plot, the nodes depth adjustment is respon-
sible for most of the energy expenditure of the network. For
6.3 Traffic load-related results
low density network scenario, the depth adjustment task is
In this section, the routing protocols are evaluated when the responsible by more than 80% of the network en- ergy
network traffic load is varied. The motivation for this analy- consumption. This is because the high energy cost required
sis is that GOR, VAPR and GEDAR use beacon messages as by the depth adjustment technology to vertically move the
an important part of the next-hop forwarding selection that node, as the designed in [17]. Moreover, the impact of the
can be affected by collisions when the traffic load is high. nodes movement operation on the network energy
Furthermore, the multipath packet delivery of DBR can consumption is high on scenarios of high traffic load (please
degrade the network performance when we have diverse refer to Fig. 7b). The increment of the network traffic load
network traffic loads. increases the energy consumption’s percentage of the node
Fig. 5a shows the packet delivery ratio for different traffic movement task because the highly dynamic network
load. As shown in the plot, the packet delivery ratio topology and the reactive nature of the communication void
decreases when the network traffic load increases. For high region recovery algorithm proposed in this paper. Thus, as
traffic loads, more transmissions will compete for access to more nodes have packet to be sent, more decisions of depth
the shared acoustic medium and more transmissions will adjustment will take place.
suffer from collisions, reducing the packet delivery ratio. For Discussion: From the simulation results, the proposed
instance, the packet delivery ratio in DBR is reduced to 38% GEDAR routing protocol with the depth adjustment based
when we compare its performance in high density scenarios communication void region recovery procedure showed
when the traffic load goes from the minimum to the great potential to improve the routing task in the harsh un-
maximum. The decrement of packet delivery ratio in GOR, derwater acoustic communication environment. This strat-
VAPR and GEDAR is less than in DBR because they use egy appears more useful, in terms of the energy consump-
opportunistic routing to mitigate the effects of the tion, on moderate to high network density scenarios, despite
underwater acoustic channel more expressively experienced this approach improves the network performance even in
during high traffic load. harsh low density scenarios when compared against ex-
13

100

100
Energy cost per task (%)

Energy cost per task (%)


80

80
60

60
40

40
20

20
0

0
150 200 250 300 350 400 450 150 200 250 300 350 400 450

Number of nodes Number of nodes

(a) Packet generation rate of 0.01 pkts/min (b) Packet generation rate of 0.15 pkts/min

Fig. 7. Energy consumption per task.

isting related solutions. This is because the energy cost to NSERC DIVA Network Research Program, and ORF/MRI
vertically move the nodes on the current technology that was Program. The authors also wish to thank CNPq and CAPES.
considered in this work. However, as the buoyancy based
nodes depth adjustment technology advances in re- ducing
the energy cost to vertically move the nodes, the main REFERENCES
drawback of our proposed methodology which is the energy [1] I. F. Akyildiz, D. Pompili, and T. Melodia, “Underwater acoustic
cost of nodes movement, will be overcome. sensor networks: research challenges,” Ad Hoc Networks, vol. 3, no.
3, pp. 257–279, 2005.
7 C ONCLUSION [2] I. Vasilescu et al., “Data collection, storage, and retrieval with an
underwater sensor network,” in Proc. 3rd ACM Int’l Conf. on
In this paper, we proposed and evaluated the GEDAR rout- Embedded Networked Sensor Systems (SenSys), 2005, pp. 154–165.
ing protocol to improve the data routing in underwater sen- [3] J. Partan, J. Kurose, and B. N. Levine, “A survey of practical issues
in underwater networks,” in Proc. 1st ACM Int’l Workshop on
sor networks. GEDAR is a simple and scalable geographic Underwater Networks (WUWNet), 2006, pp. 17–24.
routing protocol that uses the position information of the [4] J. Heidemann, M. Stojanovic, and M. Zorzi, “Underwater sensor
nodes and takes advantage of the broadcast communication networks: applications, advances and challenges,” Philosophical
medium to greedily and opportunistically forward data Transactions of the Royal Society A: Mathematical, Physical and En-
gineering Sciences, vol. 370, no. 1958, pp. 158–175, 2012.
packets towards the sea surface sonobuoys. Furthermore, [5] M. Stojanovic and J. Preisig, “Underwater acoustic communication
GEDAR provides a novel depth adjustment based topology channels: Propagation models and statistical characterization,”
control mechanism used to move void nodes to new depths IEEE Commun. Mag., vol. 47, no. 1, pp. 84–89, 2009.
[6] P. Xie, J. hong Cui, and L. Lao, “VBF: vector-based forwarding
to overcome the communication void regions. Our simula- protocol for underwater sensor networks,” in Proc. 5th Int’l IFIP-
tion results showed that geographic routing protocols based TC6 NETWORKING, 2006, pp. 1216–1221.
on the position location of the nodes are more efficient than [7] H. Yan, Z. J. Shi, and J.-H. Cui, “DBR: depth-based routing for
pressure routing protocols. Moreover, opportunistic routing underwater sensor networks,” in Proc. 7th Int’l IFIP-TC6 NET-
WORKING, 2008, pp. 72–86.
proved crucial for the performance of the network besides [8] U. Lee et al., “Pressure routing for underwater sensor networks,”
the number of transmissions required to deliver the packet. in Proc. IEEE INFOCOM, 2010, pp. 1–9.
The use of node depth adjustment to cope with commu- [9] Y. Noh, U. Lee, P. Wang, B. S. C. Choi, and M. Gerla, “VAPR: void-
aware pressure routing for underwater sensor networks,” IEEE
nication void regions improved significantly the network
Trans. on Mobile Comput., vol. 12, no. 5, pp. 895–908, 2013.
performance. GEDAR efficiently reduces the percentage of [10] D. Chen and P. Varshney, “A survey of void handling techniques
nodes in communication void regions to 58% for medium for geographic routing in wireless networks,” IEEE Commun.
density scenarios as compared with GUF and reduces these Surveys and Tuts., pp. 50–67, 2007.
[11] F. Kuhn, R. Wattenhofer, and A. Zollinger, “Worst-case optimal and
nodes to approximately 44% as compared with GOR. Conse- average-case efficient geometric ad-hoc routing,” in Proc. 4th ACM
quently, GEDAR improves the network performance when Int’l Symp. on Mobile Ad Hoc Network. & Comput. (MobiHoc), 2003,
compared with existing underwater routing protocols for pp. 267–278.
different scenarios of network density and traffic load. [12] R. W. L. Coutinho, L. F. M. Vieira, and A. A. F. Loureiro, “DCR:
depth-controlled routing protocol for underwater sensor
As future work, we plan to apply this topology control of networks,” in Proc. IEEE Symp. on Comput. and Commun. (ISCC),
depth adjustment principles to the design of opportunistic 2013, pp. 453–458.
routing protocols for UWSNs, considering different QoS re- [13] R. W. Coutinho, L. F. Vieira, and A. A. Loureiro, “Movement
quirements for data delivery, the cost for reaches a neighbor assisted-topology control2 and geographic routing protocol for
underwater sensor networks,” in Proc. 6th ACM Int’l Conf. on
node, and the lifetime of the network. Modeling, Analysis & Simulation of Wireless and Mobile Systems
(MSWiM), 2013, pp. 189–196.
ACKNOWLEDGMENTS [14] R. W. L. Coutinho, A. Boukerche, L. F. M. Vieira, and A. A. Loureiro,
“GEDAR: geographic and opportunistic routing pro- tocol with
This work was partially supported by the Canada Research depth adjustment for mobile underwater sensor net- works,” in
Chairs program, NSERC Strategic Project Program and Proc. IEEE Int’l Conf. on Commun. (ICC), 2014.
14

[15] Z. S. M. Zuba, M. Fagan and J. Cui, “A resilient pressure routing [40] Y. Ren, W. K. G. Seah, and P. D. Teal, “Performance of pressure
scheme for underwater acoustic networks,” in Proc. 57th IEEE routing in drifting 3d underwater sensor networks for deep water
Global Telecommun. Conf. (GLOBECOM), 2014, pp. 637–642. monitoring,” in Proc. 7th ACM Int’l Conf. on Underwater Networks
[16] P. Xie et al., “Void avoidance in three-dimensional mobile un- and Systems (WUWNet), 2012, pp. 28:1–28:8.
derwater sensor networks,” in Wireless Algorithms, Systems, and
Applications. Springer, 2009, vol. 5682, pp. 305–314.
[17] M. O’Rourke, E. Basha, and C. Detweiler, “Multi-modal communi-
cations in underwater sensor networks using depth adjustment,”
in Proc. 7th ACM Int’l Conference on Underwater Networks and
Systems (WUWNet), 2012, pp. 31:1–31:5.
[18] M. Erol, F. Vieira, and M. Gerla, “AUV-Aided localization for
underwater sensor networks,” in Proc. Int’l Conf. on Wireless Al-
gorithms, Systems and Applications (WASA), 2007, pp. 44–54.
[19] M. Erol-Kantarci, H. Mouftah, and S. Oktug, “A survey of architec-
tures and localization techniques for underwater acoustic sensor
networks,” IEEE Commun. Surveys Tuts., vol. 13, no. 3, pp. 487–502,
2011.
[20] Z. Yu, C. Xiao, and G. Zhou, “Multi-objectivization-based localiza-
tion of underwater sensors using magnetometers,” IEEE Sensors J.,
vol. 14, no. 4, pp. 1099–1106, 2014.
[21] J. Jaffe and C. Schurgers, “Sensor networks of freely drifting au-
tonomous underwater explorers,” in Proc. 1st ACM Int’l Workshop
on Underwater Networks (WUWNet), 2006, pp. 93–96.
[22] Z. Zhou et al., “Scalable localization with mobility prediction for
underwater sensor networks,” IEEE Trans. on Mobile Comput., vol.
10, no. 3, pp. 335–348, 2011.
[23] E. Cayirci et al., “Wireless sensor networks for underwater survel-
liance systems,” Ad Hoc Networks, vol. 4, no. 4, pp. 431–446, 2006.
[24] M. Erol, L. F. M. Vieira, and M. Gerla, “Localization with dive’n’rise
(DNR) beacons for underwater acoustic sensor net- works,” in Proc.
2nd Workshop on Underwater Networks (WuWNet), 2007, pp. 97–100.
[25] L. F. M. Vieira, “Performance and trade-offs of opportunistic
routing in underwater networks,” in Proc. IEEE Wireless Communi-
cations and Networking Conference (WCNC), 2012, pp. 2911–2915.
[26] L. M. Brekhovskikh and Y. Lysanov, Fundamentals of Ocean Acous-
tics. Springer, 2003.
[27] M. Stojanovic, “On the relationship between capacity and distance
in an underwater acoustic commun. channel,” in Proc. 1st ACM
Int’l Workshop on Underwater Networks (WUWNet), 2006, pp. 41–47.
[28] M. Stojanovic, “Recent advances in high-speed underwater acous-
tic communications,” IEEE J. Oceanic Eng., pp. 125–136, 1996.
[29] C. Carbonelli and U. Mitra, “Cooperative multihop communica-
tion for underwater acoustic networks,” in Proc. 1st ACM Int’l
Workshop on Underwater Networks (WUWNet), 2006, pp. 97–100.
[30] L. Freitag, M. Grund, S. Singh, J. Partan, P. Koski, and K. Ball, “The
WHOI micro-modem: An acoustic communcations and navigation
system for multiple platforms,” in Proc. MTS/IEEE Oceans, 2005.
[31] H. Yang, B. Liu, F. Ren, H. Wen, and C. Lin, “Optimization of energy
efficient transmission in underwater sensor networks,” in Proc.
IEEE Global Telecommun. Conf. (GLOBECOM), 2009, pp. 1–6.
[32] T. Rappaport, Wireless Communications: Principles and Practice.
Prentice Hall, 2002.
[33] D. Pompili, T. Melodia, and I. F. Akyildiz, “Routing algorithms for
delay-insensitive and delay-sensitive applications in underwater
sensor networks,” in Proc. 12th Annu. Int’l Conf. on Mobile Comput-
ing and Networking (MobiCom), 2006, pp. 298–309.
[34] A. Caruso et al., “The meandering current mobility model and its
impact on underwater mobile sensor networks,” in Proc. IEEE
INFOCOM, 2008.
[35] J. M. Jornet, M. Stojanovic, and M. Zorzi, “Focused beam routing
protocol for underwater acoustic networks,” in Proc. 3rd ACM Int’l
Workshop on Underwater Networks (WuWNet), 2008, pp. 75–82.
[36] T. Melodia, D. Pompili, and I. Akyildiz, “Optimal local topology
knowledge for energy efficient geographical routing in sensor
networks,” in Proc. IEEE INFOCOM, vol. 3, 2004, pp. 1705–1716.
[37] S. Lee, B. Bhattacharjee, and S. Banerjee, “Efficient geographic
routing in multihop wireless networks,” in Proc. 6th ACM Int’l
Symp. on Mobile Ad Hoc Network. & Comput. (MobiHoc), 2005, pp.
230–241.
[38] K. Zeng, W. Lou, J. Yang, and D. Brown, “On geographic collabora-
tive forwarding in wireless ad hoc and sensor networks,” in Proc.
Int’l Conf. on Wireless Algorithms, Systems and Applications (WASA),
2007, pp. 11–18.
[39] P. Xie, Z. Zhou, Z. Peng, H. Yan, T. Hu, J.-H. Cui, Z. Shi, Y. Fei, and
S. Zhou, “Aqua-sim: An ns2 based simulator for underwater sensor
networks,” in Proc. IEEE OCEANS, 2009.

You might also like