Professional Documents
Culture Documents
Index Terms—Geographic routing, local minimum problem, topology control, underwater sensor networks
node has a pair of keys (public and secret keys), and a depth adjustment system, computes the trade-off network
certificate for the key pair generated by a trusted party. Also, energy cost and data latency based on the amount of data
a network wide secret key (NSK) is used to encrypt needed to be sent and the cost of surfacing; and, the sensor
information shared among the nodes. During the packet node then decides what technology should be used to send
forwarding process, the sender encrypts the packet payload the data. Once a node decides to surface, nodes that will form
with a Gateway Public Key (GPK). The packet header, at each the radio link path to the destination, are informed via
forwarder, is encrypted with NSK and signed with the node acoustic communication to surface. The authors pro- posed
public key. Upon receiving a packet, the node decrypts the and evaluated algorithms to determine the set of surface
head and checks if the packet is signed by a legitimate node. nodes. The disadvantage of this approach is that all nodes
Only packets with a proper signature are accepted. should have both acoustic and RF transmission modems.
VBVA routing protocol [16] extends the VBF routing Moreover, for the typical the application scenario of deepest
protocol [6] by including a communication void region place monitoring, the multi-modal communica- tion
recovery mode. Data packets are routed using the same approach can result in high end-to-end delay due to the time
strategy as VBF. During the void node recovery phase, VBVA required to move sensor nodes until the sea surface to
attempts to route the packet along the boundary of the transmit the gathered data.
communication void region by either shifting the In [12] and [13], the authors proposed a centralized and
forwarding vector or by means of a back-pressure method distributed geographic routing protocol with depth adjust-
when the communication void region is convex. In the vector ment based topology control as a void node recovery strat-
shifting mechanism, the void node asks its neighbors to egy for long-term underwater monitoring static network
change the current routing vector. After, the node keeps architecture. The proposed protocols organize the network
listening to the channel to check if a neighboring node topology to reduce the void and the number of disconnected
forwarding the packet is using the new routing vector. If a nodes before the beginning of the sensing phase.
node is a final node (void node), that is, even with the vector
Key differences. Herein, we point out some key dif-
shifting the packet cannot be forwarded, the back-pressure
ferences of our proposed protocol to the aforementioned
mechanism is used. In the back-pressure mechanism, the
related proposals. VBF, DBR and RPR routing protocols do
packet is routed back in the direction moving away from the
not employ any communication void region routing recov-
destinations. This is performed until the packet reaches a
ery procedure. In these protocols, the packet is discarded
node which can do vector shifting to forward the packet
when it reaches a communication void region. In this paper,
towards the destination.
we propose a novel depth-adjustment based communication
Lee et al. [8] proposed the Hydrocast routing protocol
void region routing recovery procedure. Thus, nodes located
also exploiting the pressure (depth) level information of the
into communication void region are moved for new depths
nodes to greedily route packets towards sonobuoys (sinks)
in order to resume the geo-opportunistic forwarding.
at the sea surface. Hydrocast also employs the opportunistic
routing paradigm in which the next-hop node priority is Hydrocast and VAPR explicitly discover and maintain a
given according to the trade-off between the progress of the routing path to forward packets from void nodes. This can
packet towards the surface and the link cost of reaching the be expensive in terms of energy since the high energy cost of
neighbor node. To cope with redundant transmissions, the underwater acoustic communication and the impairments of
authors proposed a greedy heuristic to determine a cluster the acoustic channel. Moreover, as packets will be routed
of next-hop forwarders without hidden terminal problems. through more hops to circumvent the communication void
When a node determines that it is in a communication void region, the acoustic channel can be overloaded, increasing
region, it performs a search for a node whose depth is lower the average end-to-end delay and reducing the packet de-
than its depth by means of controlled flooding and explicitly livery ratio due to more collisions and retransmissions. In
maintains a path to the node. our proposed protocol, we present a novel paradigm to cope
Void-aware pressure routing (VAPR) [9] uses the depth with communication void regions in mobile scenarios, tak-
information of the nodes to forward data packets towards ing advantage of the depth adjustment mechanism present
the sea surface. VAPR is a geographic and opportunistic in the current sensor nodes. Our idea is to move void nodes
routing protocol where a next-hop forwarder set to con- to new depths in order to resume the geo-opportunistic
tinue the packet forwarding is determined from the greedy routing. With this approach we have an energy cost to move
pressure strategy. In VAPR, each node is aware of the void void nodes. However, we can avoid overloading the acoustic
nodes from the sonobuoy’s reachability information channel and the unnecessary energy expenditure relative to
disseminated in the network via periodic beaconing. Each the greater number of packet retransmissions.
node uses that information to build a directional (upwards The works [12], [13], [17] proposed a node’s depth
or downwards) path towards some surface sonobuoy. The adjustment to improve data packet delivery in static un-
next-hop forwarding set is selected according to the neigh- derwater sensor networks. Differently, our node’s depth
bor forwarding direction, that is, those directions in which adjustment algorithm is devoted to the communication void
there is a match of the forwarding direction with the current region routing problem in mobile underwater sensor
forwarder (upward or downward). networks, acting in a reactive way to overcome changes in
O’Rourke et al. [17] proposed a multi-modal communi- the network topology. Moreover, we implement an op-
cation approach. In the proposed approach, a sensor node portunistic routing mechanism to mitigate the impairments
equipped with acoustic communication modem, surface of the underwater acoustic communication, which was not
level radio frequency (RF) communication modem, and a considered in those solutions.
4
from underwater sensor nodes, and the radio links are used The probability of error can be evaluated as:
to forward the data packets to a monitoring center for future ∫ ∞
processing. Like [7] and [9], we consider that if a packet pe(d) = pe (X)p d (X)dX. (5)
arrives at any sonobuoy, it can be delivered to the 0
monitoring center. This assumption is reasonable because Here, pe(X) is the probability of error for an arbitrary
acoustic communication is more hard than radio frequency modulation at a specific value of SNR X. In this paper, we use
communication since sound propagates (speed of the BPSK (Binary Phase Shift Keying) modulation that is
1.5 × 103 m/s in water) five orders of magnitudes slower widely used in the state-of-the-art acoustic modems [5], [8],
than radio (with a propagation speed of 3 × 108 m/s in air). [9], [30], [31].
We represent the network topology as an undirected In BPSK, each symbol carries a bit. In [32], the probability
graph tt(t) = (V, E(t)) at time t, where V = N is the set of of bit error over distance d is given as:
vertices corresponding to the sensor nodes and sonobuoys; . . Σ
1 Γ(d)
and, E(t) = {eij(t)} is the finite set of links between them. p e(d) = 1− . (6)
Two nodes u and v ∈ V are neighbors at time t and are 2 1 + Γ(d)
The average Signal-to-Noise Ratio (SNR) over distance d It is used together with the ID to identify the most recent
is thus given as: beacon of each sonobuoy (line 24). The depth information
where Eb and N0 are constants that represent the average non-fading additive white Gaussian noise (AWGN) channel. As in
transmission energy per bit and noise power density in a [28] and [29], we use Rayleigh fading to model small scale fading
where SNR has the following probability distribution: [34].
∞
∫ 1 X Similarly, each sensor node embeds a sequence number, its
pd (X) = e−
Γ(d) . (4) unique ID and X, Y, and Z position information. Moreover,
0 Γ(d)
the beacon message of each sensor node is augmented with
the information of its known sonobuoys from its set Si(t).
Each node includes the sequence number, ID, and the X, Y
location of the its known sonobuoys. The goal is for the
neighboring nodes to have the location information of the
6
all reachable sonobuoys. GPS cannot be used by underwater both collisions and synchronization. Moreover, after a node
sensor nodes to determine their locations given that the high broadcasts a beacon, it sets up a new timeout for the next
frequency signal is rapidly absorbed and cannot reach nodes beaconing.
even localized at several meters below the surface. Thus,
each sensor node knows its location through localization 5.2 Neighbors candidate set selection
services, such as [20]. Localization services incur additional
Whenever a sensor node has a packet to send, it should
costs in the network. However, the knowledge regarding the
determine which neighbors are qualified to be the next- hop
location of sensor nodes can eliminate the large number of
forwarder. GEDAR uses the greedy forwarding strategy to
broadcast or multicast queries that leads to unnecessary
determine the set of neighbors able to continue the
network flooding that reduces the network throughput [35].
forwarding towards respective sonobuoys. The basic idea of
In addition, the location information is required to tag the
the greedy forwarding strategy is, in each hop, to advance
collected data, track underwater nodes and targets, and to
the packet towards some surface sonobuoy.
coordinate the motion of a group of nodes [19].
The neighbor candidate set is determined as follows. Let
Algorithm 1 Periodic beaconing ni be a node that has a packet to deliver, let its set of
1: procedure BroadcastPeriodicBeacon(node) neighbors be Ni(t) and the set of known sonobuoys Si(t) at
2: m: a new beacon message with the next seq num time t. We use the packet advancement (ADV) [36] metric to
3: if beacon timeout expired then determine the neighbors able to forward the packet towards
4: m.coordinate ← location(node) 5: some destination. The packet advancement is defined as the
if node ∈ Nn then distance between the source node S and the destination node
6: for s ∈ Si(node) do D minus the distance between the neighbor X and
7: if Λ(s) = 0 then D. Thus, the neighbors candidate set in GEDAR is given as:
8: m.addSon.(seq num(s), ID(s), X(s), Y(s)) Ci = {nk ∈ Ni(t) : ∃sv ∈ Si(t) | D(ni, is∗)−D(nk, sv) > 0},
9: Λ(s) ← 1 (8)
10: end if where D(a, b) is the Euclidean distance between the nodes
11: end for a and b and, s∗i ∈ Si (t) is closest sonobuoy of ni as:
12: end if s∗ = argmin {D(n , s )}. (9)
13: Broadcast m i ∀sj ∈Si (t) i j
determine the priorities of the candidate nodes. This is nec- Algorithm 2 presents a heuristic for the next-hop for-
essary because the greater the packet advancement is, the warder set selection. First, lines 2 to 4 determine the NADV
greater the neighbor priority becomes. However, due to the of each qualified neighbor according to Equation (10). Sec-
underwater channel fading, the further the distance is from ondly, the neighbor candidate set Ci is ordered according to
the neighbor, the higher the signal attenuation becomes as the priority of the nodes as a result of the NADV (line 5).
well as the likelihood of packet loss. For each next-hop Thirdly, lines 8 to 18 determine the clusters from the neighbor
candidate node nc ∈ Ci , normalized packetiadvancement is: candidate set Ci . Each cluster Fj starts with the
NADV (n ) = ADV (n ) × p(d , m), (10) greatest priority node from Ci and is expanded1by including
all nodes in Ci which have a distance less than rc. Fourthly,
c c c 2
each cluster Fj is expanded to include those nodes in Gi (a
where ADV (nc) = D(ni , s∗ ) − D(nc, s ∗) is the nc packet copy from Ci ) that have a distance of less than the commu-
i c
advancement towards its closest sonobuoy s∗; di is the nication radius rc for all nodes already in the cluster (lines
c c
Euclidean distance between the source node ni and the 19-25). The idea is to expand each cluster while maintaining
forwarder candidate nc and, p(dci , m) is the packet delivery the restriction that each node should hear the transmissions
probability of m bits over distance dci given according with of each other node in the cluster. Finally, the cluster F with
Equation (7). the highest EPA is selected as the next-hop forwarder set.
Let Fj ⊆ Ci be a set formed by candidate forwarder After computing the forwarding set, the current for-
nodes, ordered according to their priorities (NADV) as n1 > warder node includes the address of the next-hop forwarder
n2 > . . . > n k, that must hear each other. The Expected nodes in the packet and then broadcast it. Each node that has
Packet Advance (EPA) of the set F j, which is the normalized correctly received the packet, verifies if it is a next-hop
sum of advancements made by this set [8], [38], is defined forwarder and then sets the timer to broadcast it according
by Equation (11). The objective of the greedy opportunistic to its priority. The greater the priority of the node is, the
forwarding strategy is to determine the subset F ⊆ Ci such shorter is its waiting time. The packet will be discarded by
that the (EPA) is maximized. the nodes that are not listed as the next-hop forwarder.
k l−1 In opportunistic routing, the highest priority node be-
Σ Y comes a next-hop forwarder and the rest of the lower pri-
EPA(F j ) = NADV (nl) (1 − p(dji, m)) (11) ority nodes transmit the packet only if the highest priority
l=1 j=0
node fails to do so. The lower priority nodes suppress their
transmissions after listening the data packet transmission of
Algorithm 2 Next-hop forwarder set selection the next-hop forwarder. In GEDAR, when the ith priority
1: procedure GetNextHopForwarders(source node ni ) node receives the packet, it will wait for the remaining
2: for nc ∈ Ci do
time to complete propagation of the packet plus the time
corresponding to the delay propagation between the 1th to
3: NADV (nc) ← dc × p(dci, m)
4: end for the 2th priority nodes, the delay between the 2th to the
5: Order Ci according with the NADV of the nodes 3th priority nodes, and so on until the delay between the
6: j ← 1 (i − 1)th to the ith priority node. After this time, if the ith
7: Gi ← Ci {Gi is a copy of Ci } node does not hear the transmission of the packet, it will
broadcast it. Thus, the ith waiting is:
8: while | Ci |> 0 do
11: for nu ∈ Ci do where Tp is the remaining propagation time and Tproc is the
12: if D(n1, nu ) < 1 2rc then
packet processing time. The remaining propagation time
13: Fj ← Fj ∪ {nu} represents the delay needed for the complete propagation of
14: Ci ← Ci − {nu} the packet broadcast by the sender node. This time is defined
15: end if as
16: end for (rc − D(na, nb ))
19: for Fj do 26: Calculate the EPA for each cluster Fj according to Equation
20: for nk ∈ Gi do (11)
21: if D(nk , nt ) < rc ∀nt ∈ F j then 27: return the cluster F with the highest EPA
22: Fj ← Fj ∪ {nk} 28: end procedure
23: end if
24: end for
25: end for
where na is the receiver node, nb is the sender node, and 5.4 Recovery mode
s is the speed of sound underwater. The second term
Void node recovery procedure is used when the node fails to
in Equation (12) corresponds to the time required for
forward data packets using the greedy forwarding strategy.
the node to hear the transmission of its predecessor
Instead of message-based void node recovery procedures,
priority node.
GEDAR takes advantage of the already available node
depth adjustment technology to move void nodes for new
8
c ?
(a) Example of recovery mode procedure at c (b) Nodes b and d start the recov- ery (c) Scenario after the recovery mode proce-
mode procedure after receiving a c’s void dure at nodes a, b, c, d, e. All generated data
node announcement message packet from these nodes will be discard.
depths trying to resume the greedy forwarding. We advo- for a void node recovery procedure can be briefly described
cate that depth-adjustment based topology control for void as follows. During the transmissions, each node locally
node recovery is more effective in terms of data delivery and determines if it is in a communication void region by exam-
energy consumption than message-based void node recov- ining its neighborhood. If the node is in a communication
ery procedures in UWSNs given the harsh environment and void region, that is, if it does not have any neighbor lead- ing
the expensive energy consumption of data communication. to a positive progress towards some surface sonobuoy
19: else during the depth adjustment of void nodes. For instance,
√
20: d ← (xvn − xu )2 + (yvn − yu) 2 consider the worst scenario of a “mountain-like” commu-
21: if d ≤ rc then nication void region, as depicted in Fig. 2. The picture shows
22: (xvn − xu )2 + (yvn − yu )2 + (z ∗vn − zu)2 ≤ r2 underwater sensor nodes, such as the a, b, c, d, and
40000
0.25
GEDAR
GUF
30000
0.15
DBR
10000
VAPR
0.05
GOR
150 200 250 300 350 400 450 150 200 250 300 350 400 450 150 200 250 300 350 400 450
(a) Fraction of void nodes (b) Average depth adjustment (c) Packet delivery ratio
cannot, b and d start the recovery mode procedure (see Fig. tunistic routing protocol (GOR) without recovery mode and
2b). The same procedure is performed by nodes a and e. At the two other most popular previously proposed routing
the end, none of them can continue the recovery void node protocols for UWSN: DBR (Depth-Based Routing) [7] and
procedure as they have not received any replay of a void VAPR (Void-Aware Pressure Routing) [9]. All evaluated
node announcement message. Thus, all generated packets routing protocols have been implemented using Aqua-Sim
from these nodes will be discarded as they do not have a [39]. Aqua-Sim is a high fidelity and flexible packet level
next-hop forwarder candidate, as shown Fig. 2c. underwater sensor network simulator developed on NS- 2
After the waiting time t (Line 6), the void node runs the to simulate the impairment of the underwater acoustic
procedure CalculateNewDepth (Lines 12-33). The set Ω channel.
contains the location information of the 2-hop connectivity In our simulations, the number of sensor nodes range
obtained from the void node announcement replay mes- from 150 to 450 and the number of sonobuoys is 45. They are
sage received from the non-void node neighbors. The new randomly deployed in a region the size of 1,500 m
depth of the void node is calculated from 2-hop connectivity × 1,500 m × 1,500 m. In each sensor, data packets are
neighbor set Ω. Let vn be the void node and u ∈ Ω a possible generated according to a Poisson process with the same
next-hop forwarder node. If node u is a 1-hop parameter λ = {0.01, 0.05} pkts/min to very low traffic
neighbor, the void node vn must determine a new depth such load; λ = {0.1, 0.15} pkts/min to low traffic load; and, λ
that its distance to the closest sonobuoy is larger than the = {0.2, 0.25} pkts/min to medium traffic load. We adopt
distance from node u to its closest sonobuoy (Lines 15- 18). an extended 3 D version of the Meandering Current Mo-
This is done by solving the inequality in Line 17. The bility (MCM) [34], to simulate a mobile network scenario,
new possible depth z∗vn is then added to the set of candidate considers the effect of meandering sub-surface currents (or
depths D (Line 18). If node u is a 2-hop neighbor of nv, nv jet streams) and vortices. We set the main jet speed to
determines whether there is a new depth z∗ vn such that vn 0.3 m/s. Due to the mobility, nodes would move beyond
can communicate directly with u and can forward its packet the deployment region.
through u using the greedy forwarding strategy (Lines 19- In all experiments, the nodes have a transmission range
25). In Line 20, the void node vn determines its Euclidean (rc) of 250 m and a data rate of 50 kbps. They use the CSMA
distance to u considering only the X, Y coordinate location. protocol at the MAC layer. The size of the packet is
This is because, in the worst scenario, vn will be at the same determined by the size of the data payload and by the space
depth of u. If this distance is less than the communication required to include the information of the next-hop
range rc, the void node vn determines a new candidate forwarder set. We consider that data packets have a payload
depth z∗vn relative to the node u such that vn can use u of 150 bytes. As in [8] and [9], we use a Bloom filter to
as a next-hop forwarder (Lines 21-24). This new candidate recovery mode procedure (Line 31).
depth is then added to the set D (Line 23). At the end, the
void node vn chooses a new depth from the set D such that
its displacement is minimum (Line 27), starts its vertical 6 P ERF OR M AN C E E V ALU ATION
movement (Line 28) and changes its condition of void node In this section, we evaluate the performance of our pro- posed
(Line 29). If vn can not determine a new depth, it restarts the protocol against the simple geographic and oppor-
reduce the space required by the forwarding set in the
data packet. Thus, a filter size of 19 bytes can be used
to represent 15 items with a false positive rate smaller
than 1 percent [8], [9]. The energy consumption at
each sensor node is a combination of the
communication and depth adjustment energy
consumption. The values of the energy consumption
were Pt = 2 W, Pr = 0.1 W, Pi = 10 mW and Em =
1500 mJ/m for the respective sensor operations of
transmission, reception, idle and depth adjustment per
meter. In our simulation, each run lasted 1 hour. The
above mentioned parameters are similar to those ones
explored in [7], [8], [9], [17], [40]. The results correspond
with an average
10
BR GO
10
DBR
Redundant packets
20
APR GEDAR
Transmissions
GOR
8
15
GEDAR
6
10
4
5
2
150 200 250 300 350 400 450 150 200 250 300 350 400 450
(a) Average number of redundant packet (b) Number of transmissions for delivery
6
DB
3.0
VAPR
5
DBR GOR GO
2.5
VAPR GEDAR
Latency
4
GEDAR
2.0
3
1.5
2
1.0
1
0.5
150 200 250 300 350 400 450 150 200 250 300 350 400 450
(c) Average end-to-end delay (d) Energy consumption per message per node
0.8 20
0.7
0.6 15
Packet delivery ratio
0.5
Redundant packets
10
0.4
0.3 5
0.8 20
0.7
0.6 15
0.5 10
0.4
0.3 5
150 250 350 450 150 250 350 450 150 250 350 450 150 250 350 450
3.5
30 3.0
2.5
20 2.0
1.5
Transmissions
10
Latency (s)
1.0
0.5
3.5
30 3.0
2.5
20 2.0
1.5
10 1.0
0.5
150 250 350 450 150 250 350 450 150 250 350 450 150 250 350 450
surface that are within the communication range of more than one
communication void regions instead of being discarded as sonobuoy.
in DBR and GOR. Fig. 4b shows the results concerning the average number
Fig. 4a shows the results concerning the average number
of redundant copies by received packet. As shown in Fig. 4a,
the number of redundant copies increases in DBR and VAPR
when the network density increases. In DBR, this happens
due to both multipath packet delivery and failures in the
suppression of data transmission. For some low priority
nodes, the transmission is not suppressed given that the DBR
next-hop set selection heuristic does not guarantee that the
selected nodes will hear the transmission of each other. The
increment in redundant packets in VAPR occurs because low
priority nodes cannot hear the transmission of high priority
ones as we have more interferences. The redundant data
packet copies in GEDAR and GOR result from the broadcast
nature of the transmission of some nodes closest to the
of packet transmissions needed to deliver a data
packet, including the recovery process. This plot
suggests that the average number of packet
transmissions needed to deliver a packet is closely
related to the redundant packets shown in Fig. 4a. As
the overall trend, when the network density increases,
more transmissions are necessary for delivery. This
increment is significant in DBR and VAPR. In GEDAR
and GOR this cost is amortized given the better
performance of packet delivery ratio, as corroborated
by Fig. 3c.
Fig. 4c shows the results concerning the average
end-to- end delay. As expected, the average delay
experienced by a packet in GEDAR, VAPR and GOR is
higher than in DBR. The cause of this is that these
protocols use opportunistic routing paradigm to
improve the data delivery. Besides the time needed to
move void nodes to new depths in GEDAR, its end-to-
end delay is lower than VAPR. This is due to the fact
that during the depth adjustment, the generated data
packets are discarded. DBR presented the lowest delay
which corresponds to the time needed to receive,
process
12
30
with the network traffic load increment, more packets are
20
lost along the routing path and less redundant copies are then
10
generated (please refer to Fig. 5a). Quite a trend can be
observed for VAPR. The Fig. 5b shows that the redundant
40 copies of delivered packets are low for GOR and GEDAR.
30 This happens thanks to the proposed low priority node
20 transmission suppression algorithm.
10 Fig. 5d shows the average end-to-end latency. As a
general trend, the latency increases when the network traffic
150 250 350 450 150 250 350 450 load increases. This is expected given that the increment in
Number of nodes the traffic load results in more transmissions competing to
access the shared medium. This leads to nodes staying in
Fig. 6. Energy consumption per message per node the back-off collision avoidance mechanism of the CSMA
protocol before attempting to sense the carrier again. VAPR,
GOR and GEDAR have high delay when compared to DBR
and send the data packets until they reach any sonobuoy. mainly in high traffic scenarios because of the opportunistic
VAPR has the worst performance mainly due to the incre- forwarding.
ment in the number of transmissions. Fig. 6 shows the average energy consumption per re-
Fig. 4d shows the results concerning the energy con- ceived packet per node. For low density and traffic load,
sumption per received packet per node. Notice that GEDAR GEDAR has a high energy cost incurred by received packets
has a high energy consumption for low density scenarios. per node. However, when the traffic load increases, the en-
This cost is relative to the depth adjustment of the void ergy cost per packet significantly decreases. This is because
nodes. As we can see in Fig. 3b, the average displacement per the initial energy consumption needed to move void nodes
node is high in low density scenarios. However, as the is diluted along the network lifetime. The energy cost per
network density increases, the energy consumption de- received packet per node for DBR, GOR and VAPR is almost
creases; it becomes approximately the same as that in DBR constant.
and VAPR. This happens because the average displacement Figs. 7a and 7b show the show the percentage of the net-
per node decreases, as shown in Fig. 3b; and, the high packet work energy consumption relative to the acoustic commu-
delivery ratio (Fig. 3c) amortizes the energy cost relative to nication and physical actuation (nodes’ depth adjustment),
node movement. for a low and medium network traffic load, respectively. As
depicted in the plot, the nodes depth adjustment is respon-
sible for most of the energy expenditure of the network. For
6.3 Traffic load-related results
low density network scenario, the depth adjustment task is
In this section, the routing protocols are evaluated when the responsible by more than 80% of the network en- ergy
network traffic load is varied. The motivation for this analy- consumption. This is because the high energy cost required
sis is that GOR, VAPR and GEDAR use beacon messages as by the depth adjustment technology to vertically move the
an important part of the next-hop forwarding selection that node, as the designed in [17]. Moreover, the impact of the
can be affected by collisions when the traffic load is high. nodes movement operation on the network energy
Furthermore, the multipath packet delivery of DBR can consumption is high on scenarios of high traffic load (please
degrade the network performance when we have diverse refer to Fig. 7b). The increment of the network traffic load
network traffic loads. increases the energy consumption’s percentage of the node
Fig. 5a shows the packet delivery ratio for different traffic movement task because the highly dynamic network
load. As shown in the plot, the packet delivery ratio topology and the reactive nature of the communication void
decreases when the network traffic load increases. For high region recovery algorithm proposed in this paper. Thus, as
traffic loads, more transmissions will compete for access to more nodes have packet to be sent, more decisions of depth
the shared acoustic medium and more transmissions will adjustment will take place.
suffer from collisions, reducing the packet delivery ratio. For Discussion: From the simulation results, the proposed
instance, the packet delivery ratio in DBR is reduced to 38% GEDAR routing protocol with the depth adjustment based
when we compare its performance in high density scenarios communication void region recovery procedure showed
when the traffic load goes from the minimum to the great potential to improve the routing task in the harsh un-
maximum. The decrement of packet delivery ratio in GOR, derwater acoustic communication environment. This strat-
VAPR and GEDAR is less than in DBR because they use egy appears more useful, in terms of the energy consump-
opportunistic routing to mitigate the effects of the tion, on moderate to high network density scenarios, despite
underwater acoustic channel more expressively experienced this approach improves the network performance even in
during high traffic load. harsh low density scenarios when compared against ex-
13
100
100
Energy cost per task (%)
80
60
60
40
40
20
20
0
0
150 200 250 300 350 400 450 150 200 250 300 350 400 450
(a) Packet generation rate of 0.01 pkts/min (b) Packet generation rate of 0.15 pkts/min
isting related solutions. This is because the energy cost to NSERC DIVA Network Research Program, and ORF/MRI
vertically move the nodes on the current technology that was Program. The authors also wish to thank CNPq and CAPES.
considered in this work. However, as the buoyancy based
nodes depth adjustment technology advances in re- ducing
the energy cost to vertically move the nodes, the main REFERENCES
drawback of our proposed methodology which is the energy [1] I. F. Akyildiz, D. Pompili, and T. Melodia, “Underwater acoustic
cost of nodes movement, will be overcome. sensor networks: research challenges,” Ad Hoc Networks, vol. 3, no.
3, pp. 257–279, 2005.
7 C ONCLUSION [2] I. Vasilescu et al., “Data collection, storage, and retrieval with an
underwater sensor network,” in Proc. 3rd ACM Int’l Conf. on
In this paper, we proposed and evaluated the GEDAR rout- Embedded Networked Sensor Systems (SenSys), 2005, pp. 154–165.
ing protocol to improve the data routing in underwater sen- [3] J. Partan, J. Kurose, and B. N. Levine, “A survey of practical issues
in underwater networks,” in Proc. 1st ACM Int’l Workshop on
sor networks. GEDAR is a simple and scalable geographic Underwater Networks (WUWNet), 2006, pp. 17–24.
routing protocol that uses the position information of the [4] J. Heidemann, M. Stojanovic, and M. Zorzi, “Underwater sensor
nodes and takes advantage of the broadcast communication networks: applications, advances and challenges,” Philosophical
medium to greedily and opportunistically forward data Transactions of the Royal Society A: Mathematical, Physical and En-
gineering Sciences, vol. 370, no. 1958, pp. 158–175, 2012.
packets towards the sea surface sonobuoys. Furthermore, [5] M. Stojanovic and J. Preisig, “Underwater acoustic communication
GEDAR provides a novel depth adjustment based topology channels: Propagation models and statistical characterization,”
control mechanism used to move void nodes to new depths IEEE Commun. Mag., vol. 47, no. 1, pp. 84–89, 2009.
[6] P. Xie, J. hong Cui, and L. Lao, “VBF: vector-based forwarding
to overcome the communication void regions. Our simula- protocol for underwater sensor networks,” in Proc. 5th Int’l IFIP-
tion results showed that geographic routing protocols based TC6 NETWORKING, 2006, pp. 1216–1221.
on the position location of the nodes are more efficient than [7] H. Yan, Z. J. Shi, and J.-H. Cui, “DBR: depth-based routing for
pressure routing protocols. Moreover, opportunistic routing underwater sensor networks,” in Proc. 7th Int’l IFIP-TC6 NET-
WORKING, 2008, pp. 72–86.
proved crucial for the performance of the network besides [8] U. Lee et al., “Pressure routing for underwater sensor networks,”
the number of transmissions required to deliver the packet. in Proc. IEEE INFOCOM, 2010, pp. 1–9.
The use of node depth adjustment to cope with commu- [9] Y. Noh, U. Lee, P. Wang, B. S. C. Choi, and M. Gerla, “VAPR: void-
aware pressure routing for underwater sensor networks,” IEEE
nication void regions improved significantly the network
Trans. on Mobile Comput., vol. 12, no. 5, pp. 895–908, 2013.
performance. GEDAR efficiently reduces the percentage of [10] D. Chen and P. Varshney, “A survey of void handling techniques
nodes in communication void regions to 58% for medium for geographic routing in wireless networks,” IEEE Commun.
density scenarios as compared with GUF and reduces these Surveys and Tuts., pp. 50–67, 2007.
[11] F. Kuhn, R. Wattenhofer, and A. Zollinger, “Worst-case optimal and
nodes to approximately 44% as compared with GOR. Conse- average-case efficient geometric ad-hoc routing,” in Proc. 4th ACM
quently, GEDAR improves the network performance when Int’l Symp. on Mobile Ad Hoc Network. & Comput. (MobiHoc), 2003,
compared with existing underwater routing protocols for pp. 267–278.
different scenarios of network density and traffic load. [12] R. W. L. Coutinho, L. F. M. Vieira, and A. A. F. Loureiro, “DCR:
depth-controlled routing protocol for underwater sensor
As future work, we plan to apply this topology control of networks,” in Proc. IEEE Symp. on Comput. and Commun. (ISCC),
depth adjustment principles to the design of opportunistic 2013, pp. 453–458.
routing protocols for UWSNs, considering different QoS re- [13] R. W. Coutinho, L. F. Vieira, and A. A. Loureiro, “Movement
quirements for data delivery, the cost for reaches a neighbor assisted-topology control2 and geographic routing protocol for
underwater sensor networks,” in Proc. 6th ACM Int’l Conf. on
node, and the lifetime of the network. Modeling, Analysis & Simulation of Wireless and Mobile Systems
(MSWiM), 2013, pp. 189–196.
ACKNOWLEDGMENTS [14] R. W. L. Coutinho, A. Boukerche, L. F. M. Vieira, and A. A. Loureiro,
“GEDAR: geographic and opportunistic routing pro- tocol with
This work was partially supported by the Canada Research depth adjustment for mobile underwater sensor net- works,” in
Chairs program, NSERC Strategic Project Program and Proc. IEEE Int’l Conf. on Commun. (ICC), 2014.
14
[15] Z. S. M. Zuba, M. Fagan and J. Cui, “A resilient pressure routing [40] Y. Ren, W. K. G. Seah, and P. D. Teal, “Performance of pressure
scheme for underwater acoustic networks,” in Proc. 57th IEEE routing in drifting 3d underwater sensor networks for deep water
Global Telecommun. Conf. (GLOBECOM), 2014, pp. 637–642. monitoring,” in Proc. 7th ACM Int’l Conf. on Underwater Networks
[16] P. Xie et al., “Void avoidance in three-dimensional mobile un- and Systems (WUWNet), 2012, pp. 28:1–28:8.
derwater sensor networks,” in Wireless Algorithms, Systems, and
Applications. Springer, 2009, vol. 5682, pp. 305–314.
[17] M. O’Rourke, E. Basha, and C. Detweiler, “Multi-modal communi-
cations in underwater sensor networks using depth adjustment,”
in Proc. 7th ACM Int’l Conference on Underwater Networks and
Systems (WUWNet), 2012, pp. 31:1–31:5.
[18] M. Erol, F. Vieira, and M. Gerla, “AUV-Aided localization for
underwater sensor networks,” in Proc. Int’l Conf. on Wireless Al-
gorithms, Systems and Applications (WASA), 2007, pp. 44–54.
[19] M. Erol-Kantarci, H. Mouftah, and S. Oktug, “A survey of architec-
tures and localization techniques for underwater acoustic sensor
networks,” IEEE Commun. Surveys Tuts., vol. 13, no. 3, pp. 487–502,
2011.
[20] Z. Yu, C. Xiao, and G. Zhou, “Multi-objectivization-based localiza-
tion of underwater sensors using magnetometers,” IEEE Sensors J.,
vol. 14, no. 4, pp. 1099–1106, 2014.
[21] J. Jaffe and C. Schurgers, “Sensor networks of freely drifting au-
tonomous underwater explorers,” in Proc. 1st ACM Int’l Workshop
on Underwater Networks (WUWNet), 2006, pp. 93–96.
[22] Z. Zhou et al., “Scalable localization with mobility prediction for
underwater sensor networks,” IEEE Trans. on Mobile Comput., vol.
10, no. 3, pp. 335–348, 2011.
[23] E. Cayirci et al., “Wireless sensor networks for underwater survel-
liance systems,” Ad Hoc Networks, vol. 4, no. 4, pp. 431–446, 2006.
[24] M. Erol, L. F. M. Vieira, and M. Gerla, “Localization with dive’n’rise
(DNR) beacons for underwater acoustic sensor net- works,” in Proc.
2nd Workshop on Underwater Networks (WuWNet), 2007, pp. 97–100.
[25] L. F. M. Vieira, “Performance and trade-offs of opportunistic
routing in underwater networks,” in Proc. IEEE Wireless Communi-
cations and Networking Conference (WCNC), 2012, pp. 2911–2915.
[26] L. M. Brekhovskikh and Y. Lysanov, Fundamentals of Ocean Acous-
tics. Springer, 2003.
[27] M. Stojanovic, “On the relationship between capacity and distance
in an underwater acoustic commun. channel,” in Proc. 1st ACM
Int’l Workshop on Underwater Networks (WUWNet), 2006, pp. 41–47.
[28] M. Stojanovic, “Recent advances in high-speed underwater acous-
tic communications,” IEEE J. Oceanic Eng., pp. 125–136, 1996.
[29] C. Carbonelli and U. Mitra, “Cooperative multihop communica-
tion for underwater acoustic networks,” in Proc. 1st ACM Int’l
Workshop on Underwater Networks (WUWNet), 2006, pp. 97–100.
[30] L. Freitag, M. Grund, S. Singh, J. Partan, P. Koski, and K. Ball, “The
WHOI micro-modem: An acoustic communcations and navigation
system for multiple platforms,” in Proc. MTS/IEEE Oceans, 2005.
[31] H. Yang, B. Liu, F. Ren, H. Wen, and C. Lin, “Optimization of energy
efficient transmission in underwater sensor networks,” in Proc.
IEEE Global Telecommun. Conf. (GLOBECOM), 2009, pp. 1–6.
[32] T. Rappaport, Wireless Communications: Principles and Practice.
Prentice Hall, 2002.
[33] D. Pompili, T. Melodia, and I. F. Akyildiz, “Routing algorithms for
delay-insensitive and delay-sensitive applications in underwater
sensor networks,” in Proc. 12th Annu. Int’l Conf. on Mobile Comput-
ing and Networking (MobiCom), 2006, pp. 298–309.
[34] A. Caruso et al., “The meandering current mobility model and its
impact on underwater mobile sensor networks,” in Proc. IEEE
INFOCOM, 2008.
[35] J. M. Jornet, M. Stojanovic, and M. Zorzi, “Focused beam routing
protocol for underwater acoustic networks,” in Proc. 3rd ACM Int’l
Workshop on Underwater Networks (WuWNet), 2008, pp. 75–82.
[36] T. Melodia, D. Pompili, and I. Akyildiz, “Optimal local topology
knowledge for energy efficient geographical routing in sensor
networks,” in Proc. IEEE INFOCOM, vol. 3, 2004, pp. 1705–1716.
[37] S. Lee, B. Bhattacharjee, and S. Banerjee, “Efficient geographic
routing in multihop wireless networks,” in Proc. 6th ACM Int’l
Symp. on Mobile Ad Hoc Network. & Comput. (MobiHoc), 2005, pp.
230–241.
[38] K. Zeng, W. Lou, J. Yang, and D. Brown, “On geographic collabora-
tive forwarding in wireless ad hoc and sensor networks,” in Proc.
Int’l Conf. on Wireless Algorithms, Systems and Applications (WASA),
2007, pp. 11–18.
[39] P. Xie, Z. Zhou, Z. Peng, H. Yan, T. Hu, J.-H. Cui, Z. Shi, Y. Fei, and
S. Zhou, “Aqua-sim: An ns2 based simulator for underwater sensor
networks,” in Proc. IEEE OCEANS, 2009.