1. Introduction
Seventy percent of the world is covered by water. Therefore, for human beings, underwater environments are quite important. Moving further, underwater resources are paid attention by scientists due to the depletion of terrestrial resources. UWSNs have many uses, such as being commonly used in coastal surveillance and assurance, an expectation of sea calamity, observation of underwater contamination, military protection, road assistance, management of the aquatic oceanic climate, investigation of underwater properties, monitoring of water quality, and so on in [
1,
2,
3].
Protocols designed for Terrestrial Wireless Sensor Networks (TWSN) are unable to perform efficient data transmission in the aquatic world [
4]. As a result, there are differences between TWSNs and UWSNs from different perspectives, such as the use of acoustic connections rather than radio links. UWSNS topology is more difficult than TWSNs because underwater nodes travel with water streams unreservedly and adapt their positions constantly, it is more difficult to locate nodes in UWSNs than TWSNs, and node placement is often sparse [
5]. Moreover, UWSNs face other challenges such as low bandwidth resulting in low underwater data rate, low propagation speed resulting in high delay. Moreover, underwater acoustic waves propagate at a speed of 1500 m/s, which is 5 orders less than radio waves, and propagation occurs over multiple paths that leads to signal distortion through a fading propagation environment [
6]. Nodes underwater also face high mobility resulting in network topology instability [
7].
Sensor nodes used with acoustic transmitters and receivers are placed underwater. In water, these sensor nodes may be either mobile or static. Furthermore, data is sent to surface sink nodes by the sensor nodes, often using lower depth sensors as relay stations. Autonomous Underwater Vehicles (AUVs), on the other hand, will collect data from sensors immediately. AUV routing necessitates a great deal of planning. In [
8], a tracking method based on the cloud-like model data association algorithm is introduced to track underwater various targets. In comparison, the use of AUVs can incur additional costs. Throughout the UWSN system, routing protocols play a vital role. These protocols are responsible for producing suitable routes and data on those routes through sensor nodes to stations where significant data can be gathered. These protocols must be robust to extreme aquatic conditions to achieve maximum performance. These protocols, for instance, can successfully solve energy limitations, mobility of nodes, high SINR, high-end delays, etc. Following a detailed analysis of the latest UWSN routing schemes and some critical findings on the problem of the energy void, the decreased propagation ratio of the packet, and the overall load on sensor nodes closer to the sink are made. The closing remarks are as follows:
Most of the existing routing schemes use maximum transmission power of sensor nodes while transmitting packets to neighboring nodes or sinks. This process ends with the rapid absorption of energy by sensor nodes. In comparison, the high transmitting capacity use often produces more channel interference [
9]. Consequently, the probability of energy hole creation is also increased.
Unbalanced transmission data load distribution resulted in a rapid decline in energy nodes and created network energy gaps. Owing to the energy hole occurrence, various sensor nodes die before the rest. This energy hole problem results in consuming high energy and decreases the lifetime of the network. Extra loads on nodes closer to the sink node can be removed by the existing methods. The nearest nodes to the sink consume their resources quickly due to the heavy load, while nodes farther away consume their resources slowly. Consuming energy rapidly also decreases the Packet Delivery Ratio (PDR) [
10].
Most of the existing UWSN considers the usage of one or multiple static sinks at the water surface for data collection. The sensor nodes’ data is reached towards the nearest sinks by using various routing mechanisms. This approach poses great problems in terms of scalability when the network size is increased. Moreover, it creates a bottleneck and lowers the performance of the network. Additionally, the UWSN closer to these sinks depletes their energy very rapidly and creates energy holes that force the rest of the nodes for distant communication and result in rapid energy depletion. Hence, the overall network lifetime is reduced.
The proposed protocol addresses the above-mentioned issues by integrating three approaches, including clustering, mobile sinks use, and transmit power control. The challenges that we encountered during the design were as follows:
The first challenge is how to manage and use mobility in the networks to continuous connectivity of the nodes and AUV for improving communication efficiently.
The second challenge is hole energy creation to some extent, regarding the highly heterogeneous sensors, and the vast diversity of energy and depth of the sensors to apply clustering technique.
The third challenge is the cost of the transmission. The energy cost is still a critical apprehension in the sensor system.
The fourth challenge is how to exploit the AUVs, which are high-cost devices, with the collaborated CHs node selection, to address transmission distance challenge for achieving the stabilization of networks in sparse regions. The main contributions of the proposed scheme are three-fold:
Propose a novel adaptive power control routing protocol to efficiently use their energy and to reduce the channel interference that ultimately increases the network lifetime, reduces the interference, and avoids the energy hole creation.
Furthermore, the clustering technique is incorporated in the dense regions to reduce the duplication of transmitted packets and to balance the load of data packets that potentially lowers the interference and improves the battery usage of sensor nodes.
Finally, local deployment of mobile sinks or AUVs to retrieve packets through two CHs as a relay that successfully received data packets from the source to collaborative protocol using a predefined distance threshold to evaluate AUV position-aware mobility such that the distance between transmitting and receiving devices is calculated. If the distance is less than or equal to the distance threshold value, then the data packet is transmitted and received at the receiver, otherwise the data packet is dropped, and that distance threshold value depends on the RSSI value calculated by the receiver. The protocol is designed for one-way data transmission from mobile sinks to the static sink for enhancing the network lifetime by reducing transmission distance and by minimizing the interference. Moreover, it also helps to avoid energy holes and increases successful packet delivery.
The rest of this article is structured as follows: the relevant work done in UWSNs is checked and classified in
Section 2. The method of the schemes proposed is described in
Section 3.
Section 4 deals with the simulation setup and performance evaluation of the proposed scheme, followed by
Section 5’s conclusion.
2. Related Work
In this section, some pertinent research on routing protocols in UWSNs is presented, along with their capabilities, benefits, and disadvantages. We also grouped the routing protocols into protocols that are localization-conscious, localization-free and cluster-based.
2.1. Localization-Free Routing Protocols
The authors in [
11] show a routing protocol that proficiently handles complex networks. Moreover, local knowledge is required to allow the depth of transfer packets greedily in the direction of the sink. In this paper, the proposed protocol for each qualifying node forwards priority-based packets. Priority is determined by the depth of forwarder nodes that have never sent the same packets together before. The DBR has better network life and a high PDR. However, this greedy method forces the immutable collection of forwarder nodes by which network nodes are partitioned and services are still underused due to being expensive and consuming exorbitant energy [
12].
In [
13], a routing protocol is proposed where they used two mobile sink nodes to effectively collect the data. Moreover, a metric called “Mobile Sink Efficiency Ratio (MUR)” was presented to quantify the use of the mobile sink node during data collection. This system provided successful results for network lifespan, loss of packets, throughput, and the new MUR metric. However, a high end-to-end delay resulted from this system. The authors suggested a scheme to address the current shortcomings of the schemes in [
14] so that they concentrated on the consistency of the connection and routing path problem. Connection Efficiency Indication (LQI), Signal-to-Noise Ratio (SNR), and Packet Reception Probability (PRP), an on-site triangular metric routing combination, is used to effectively select the next forwarder, resulting in low routing costs, minimal energy consumption, and increased network life.
The authors suggested “Localization-Free Energy-Efficient Routing (LFEER)” and “Cooperative localization-Free Energy-Efficient Routing (Co-LFEER)” in [
15]. First, the residual energy, hops, and failure rate of the link bit at which the data packets were sent were taken into account when selecting a relay. In the latter, the sink receives several data replicas from which it can decide on the data quality. These schemes provided better outcomes for energy optimization and increased PDR. However, as these schemes know the exact positions of sensor nodes, they result in computational complexity and extra use of resources.
2.2. Localization-Aware Routing Protocols
In [
16], the authors included the use of mobile sensor nodes to reduce the energy hole and keep the sink in its precise position. Clusters are installed on the network for this purpose, and data processing uses mobile nodes. To achieve fuel consumption, smoother network life, and load balancing, this routing approach is intended. The cost of a high end-to-end delay will be compensated by this approach, though.
The writers have suggested a cross-layer reactive routing protocol for [
17]. Furthermore, this scheme covered the difficulties described by the standard CARP scheme when the authors did not follow the re-usability estate. Avoiding packet management guarantees longer network life and reduced energy consumption. However, owing to the constant rotating of the nodes, the consequence of this scheme is a decreased throughput and a high loss of course. In [
18], the author’s aim is to develop an efficient routing algorithm for secure transmission to each of the sinks while also solving the void hole problem. Like DBR, several mobile pontoons are spread on the surface of the water as holding a sink. It has two greedy packet-forwarding mode switches and dealing with a void in communication. However, in DBR, a subset of the upper depth nodes is specified for data-packet forwarding. When a void node is discovered, a detour path for data-packet transmission should be identified. Consequently, knowledge is guided up to lower depths. The gauge used in this way improves the routing performance under continuous node movement conditions. However, it is necessary to measure the node’s depth correctly. The PDR has been strengthened, and inefficient performance and heavy energy consumption are its drawbacks. The authors take into account the depth of the existing node, as well as the depth of the next forwarding node in the paper, [
19], to reduce the risk of empty holes and resource consumption. The issue of the void hole is not solved by switching packets over two hops, however. The authors of [
20] use a technique that adapts the pipeline radius to change the packet-forwarding area to help eliminate redundant packets. This method results in a higher packet delivery ratio, lower energy consumption, and a short end-to-end delay. There is still an issue with the void hole, though.
In [
21], authors have developed for asynchronous wireless sensor networks, and calculate the best forwarders based on an estimate of the forwarding score and estimation of residual power. This protocol resolves problems related to load balancing, loss of coverage, and accessibility.
Voltage is provided to pick up a node for the forwarder. However, since the cycling responsibility in this protocol is not as low as 140, asynchronous duty-cycling caused massive delays in waiting times for the next-hop node to wake up. Residual energy chooses a node forwarder. Nevertheless, asynchronous duty-cycling caused the next-hop node to wake up with tremendous delay waiting times as cycling is not as small as 140 in this protocol requirement and the number of forwarders will start waking up simultaneously and result in repetition of packets.
To forward data to the destination node, the authors of [
22] suggested a greedy routing scheme. To avoid duplication in GEDAR, nodes that are on lower priority suppress their packet transmission. The key function of this technique is that if a void hole occurs, it employs a depth correction scheme, i.e., it moves the node to a new depth in the case of a void node resuming a greedy forwarding. When the void hole is effectively covered, the reliability of the network that uses this device is increased. Moving nodes into new depths, on the other hand, consumes a lot of energy and increases end-to-end latency.
In [
23], the authors developed an efficient routing algorithm for safe transmission to each of the sinks as well as solving the void hole problem. The forwarding node is chosen based on the status of the data packet and the cost of the connection. Alternatively, the gauge used needs to perfectly guess the node depth. For regional all-cast routing, the data gathered in-depth may be used. It has increased PDR and the likelihood of void nodes has reduced. Increased oil usage and overhead are the drawbacks. In [
24], the author recommended a complex address scheme to assist in choosing an acceptable next-hop neighbor. The suggested approach then assigns hop addresses to each node that helps to forward information. However, this protocol raises the PDR, triggering heavy energy consumption.
2.3. Cluster-Based Routing Protocols
In [
25], the authors proposed a “cooperative energy-efficient optimal relay selection protocol” for underwater wireless sensor networks. Furthermore, a source node selects a relay node and a sink node on its own, and data is then transferred to the sink node through the relay node. It helps to remove the need for coordination between the source node, relay node, and sink nodes using this technique. Moreover, for receipt or re-transmission of the data, the sink passes the acknowledgment to the source node. The selection of forwarding nodes or relays is based on two parameters: depth and location value. Pressure sensors are used to determine depth, and location is determined by the distance between nodes and the surface. The nearest node to the sink node is chosen as a relay node based on the two values. If the destination node receives a data packet successfully, it sends an acknowledgment to the source node; if the reception is unsuccessful, it requests re-transmission. Data is sent to a relay node after it is chosen, and it relays it to the destination. Therefore, this scheme contributes fewer packet drops to this method. However, the data load on a node’s source, relay, and sink increases, which reduces the stability time of the node.
This paper also suggests the FSO and EM energy dissipation model in [
26]. To find the optimum cluster collection for Gaussian-distributed UWSNs, the authors looked at the theoretical context. The authors achieved rational results by moving the sink to three additional points, namely the tip, the corners, and the middle of the sensing region. The suggested protocol uses the least amount of energy possible. However, there is a significant end-to-end delay.
Cluster-based sleep–wake scheduling is indicated in [
27]. In this paper, the authors employ a strategy in which some of the nodes are presumed to be initiator nodes. These initiator nodes will then choose the CHs. As the head node, the CH node that is left with high energy is picked. When other nodes are sent to sleep mode, this header node is set to active mode. The propagation is then carried out into the node of the drain by the node of the selected head.
This strategy lowers energy usage, increases the life and distribution ratio of the packets. After all, the CH total life of the network influences the network’s life.
In [
28], the authors first performed theoretical analysis to obtain the expected value of nodes in the network. Next, they divided the network into irregular clusters. In this paper, they used the strategy of recovery balance consumption of energy among clusters. In this paper, they have achieved enhanced PDR, consuming less energy, and enhanced network lifetime. However, this scheme results in variation in the network. The suggested particle encoding and fitness functions proposed by the author are used to construct this technique in [
29]. The scientists looked at a variety of metrics to improve energy efficiency, including the distance between clusters, the gap between sinks, and the residual energy for cluster nodes. Using these metrics, they were able to derive the weighting function for clusters. Scientists reached high PDR values, increased lifetime, and reduced energy consumption in this article. The authors of [
30] looked at the trade-off between accuracy and energy efficiency and proposed a solution. In WSNs, the ‘adaptive FEC/FWD and FEC/ARQ’ clustering mechanisms are based on the channel state and the distance between nodes. We have worked to significantly strengthen our previous work [
31] by collaborating with the following organizations:
The author recommends a complete dfiction class of invalid handling algorithms for UWSNs in three primary classifications based on their literature review: control with power, surpass region-space, and mobility assisted-based strategies. The author recommends a complete fication class of invalid handling algorithms for UWSNs in three primary classifications based on their literature review: control with power, surpass region-space, and mobility assisted-based strategies.
The author offers an analytical framework for evaluating the performance and trade-offs of different space-processing algorithms in UWSNs. Considering the features of our model network structure and acoustic interconnections beneath the water, as well as recovery strategies.
The author carried out numerical tests to assess the overall performance of three widely used methods for designing void-processing algorithms in water sensor networks. The author investigated several network density scenarios in our numerical analysis, which is a key factor influencing the number of empty nodes. According to [
32], the geographic routing, routing strategy is hindered by unexpected and dynamic changes in the UWSN topology. Geographic routing strategy is hindered by abrupt and dynamic changes in the UWSN topology, which may result in communication void areas in the network. For example, this routing requires redone-hop neighboring information to send on to the future destination data messages, and it selects the closest neighboring node to the destination to continue forwarding data packets.
This scheme resulted in a more reliable network and more energy efficiency. However, this scheme is effective only for small networks. The proposed scheme addresses the issues pointed out in various above-mentioned UWSN routing schemes and improves network performance by balancing the load distribution, lowering the channel interference, achieving the energy efficiency, avoiding the energy holes in the network by integrating the clustering, mobile sinks use, and transmit power control mechanisms.
Two new methods have been built in [
33] to restrict energy consumption and remove the existence of a void zone in [
34]. During the first approach, mobile sink nodes or AUVs play an important role in reducing node contractual power consumption, while the second strategy entails planning and cooperation with the first. This improves the efficiency of the proposed cooperative network by transmitting packets along different routes. In the second scheme, RODP increases decrease package leakage and increases transmission delay costs with full power consumption. The first system lowers the use of electricity and keeps the deal running for a long time.
3. Proposed Methodology
A single sink network model is assumed in the proposed scheme. As illustrated in
Figure 1, it is made up of anchored nodes, relay nodes, and sink nodes. The anchored nodes are located on the seafloor and are primarily used to collect underwater data, while the relay nodes are located at a different underwater location and are responsible for transporting data to the sink and forwarding the collected packets [
29]. For the sink node, there are sound and radio modems. For acoustic communication, the former is used, while the latter enables radio communication outside the aquatic environment. The sink node, which is mostly on the water’s surface, sends data packets to the satellite, which then sends them to the control center.
3.1. Energy Consumption Model
The RSSI signal can be distorted due to fading environment, which causes the loss of information. Moreover, it reduces when the distance increases, which indicates the distance. RSSI is disrupted by fading, so it should be measured with channel impairments in mind. As a result, there is a strong need to deal with RSSI when channel impairments are present. The sink node, which is mostly located on the water’s surface, sends data packets to the satellite, which then sends them to the control center. Because the signals propagate vertically, the attenuation increases as the distance between them grows. Transmission damage, on the other hand, can be expressed as:
where TD denotes the transmission loss in decibels, and
denotes the spreading loss in decibels. Furthermore, its value varies depending on the water depth and propagation geometry; in shallow water,
is kept equal to 1 for cylindrical spreading; in deep water,
is kept equal to 2 for spherical spreading; The absorption coefficient of the medium, which varies with frequency and is measured in dB/km, is
; r is the distance between the receiver and the transmitter; The medium’s absorption coefficient is measured in dB/km for f in kHz, which can be calculated using the equation:
Its frequency is approximately 30 kHz. UWSNs have an absorption coefficient of less than 10 dB/km. The absorption coefficient for chemical absorption in seawater is computed using acoustic frequency, pressure, acidity, temperature, and salinity. The following formula is used to compute the received signal power (RSSi), also known as the received signal power or RSSI:
where
is the returned signal power at the close in–reference distance, and r is the reference distance. The energy consumption model described in [
34] can be used to calculate the minimum transmission power needed at the transmitter to meet power level
at the receiver end.
The absorption coefficient is
, the incoming power is
, the distance between the transmitter and receiver is d, and the received power is
. The energy consumption of wireless sensor networks cannot be applied to UWSNs because the acoustic wave characteristic of an underwater transmission medium varies from that of a radio wave. As a result, the energy consumption model for the underwater acoustic channel is the same as in [
34]. The amount of energy required to send m bits of data over a long distance at a data rate R is calculated as follows:
The amount of energy needed to route one bit of data is denoted by
. The receiver’s radio energy consumption for transmitting m bits of data is calculated as follows:
where
is a device-specific constant. The following formula is used to calculate the energy needed to fuse m bits of data:
The device-dependent constant is used here. The following formula is used to determine the energy needed to fuse m bits of data:
3.2. Adaptive Power Control with Adaptive Clustering Routing Model
The GRACE [
33] principle of gradient cost field establishment, which is inspired by the natural phenomenon of water flowing down a valley from top to bottom, is the foundation of our adaptive power control routing model. Data propagates in the same way, in the direction where it finds the cheapest path. The gradient for the cost field establishment scheme and the factors are described as follows:
: The energy cost of the ith node is given by
: Link Cost: The cost of a link between a transmitting node u and a receiving node v is calculated as follows:
where
denotes node u’s transmitted power and
denotes node v’s received power.
Route Cost,
: Route cost between the path- starting node N1 and the path-terminating node N2 is given by
The following are some helpful concepts for establishing a cost field: Information about the advertising sent from node ‘I’ to its neighbors.
CI S the cheapest route from node ‘I’ to sink ‘S’ This diagram depicts the only low-cost option.
CI JS The routing path from node ‘I’ to sink ‘S’, using node ‘J’. This reflects a single special path originating from node ‘I’ and ending at Sink ‘S’, out of many possible paths.
Where and are the energy and link cost weighting factors, respectively.
The cost field is defined using the APCEER protocol [
9] notion, which is illustrated in
Figure 2 where nodes J, K, and L are the Ith node’s immediate neighbors.
The cost fields and advertising information of the nodes can be defined as follows:
Herein, we opted for the concept of adaptive clustering multi-hop routing scheme [
34]. Here, the node can be CH, CM, or CR in the first, second, third round, respectively. In comparison to its neighbors, each node will choose to become a cluster head based on the selection conditions [
32]. To form a cluster, the CH will relay the “JOIN” message to its neighbors. Otherwise, the node will wait for the “JOIN” message; if it only receives one message, it will become a cluster member. When a node receives a significant number of “JOIN” messages, it selects the sender node with the greatest received power or the shortest distance.
The cluster formed between nearby nodes, we think, to conserve energy and reduce transmission time. We assume that some nodes will become the CR and forward data to the sink due to the restricted transmission range of the nodes at depths D2 and D3.
If a relay node receives the “JOIN” message from both the upper and lower depth nodes (DL and DL-1), the node decides to become a CR, which acts as a route forwarder. The nodes send a “RESPONSE” message to the CH to validate the cluster-ID. The CHs at the same level simply send them a “JOIN” message.
Node Si tests Sk’s depth if the CH Si receives a “RELAY” message from Sk, and if Sk’s depth is near the surface, node Si or Dm(Sk) Dm(Si), and node Si adds Sk as a relay node.
In a cluster scheme, the relay node may gather data from the sensor node or control the network topology. As a result of the node’s energy conservation, the nodes’ energy consumption has been reduced. Some clustering protocols, on the other hand, have only been developed and studied in two-dimensional (2D) deployments, while UWSN network scenarios necessitate three-dimensional deployments (3D).
3.3. Network Model
The network scenario consists of N dynamic nodes that are deployed in a three-dimensional scenario at random and sparsely. The data source, on the other hand, is the data sensed in the water medium and extracted by the underwater sensor nodes. The sink nodes are placed in the center of the surface in this case.
Because water currents with velocities of around 1–3 m/s move the underwater sensor nodes, the topology changes quickly.
The following is a list of the network’s assumptions:
nNodes should become the cluster head, cluster relay, or cluster member after the first deployment because they know their own location and the location of the sink node.
To save energy, the cluster head is rotated between the sensor nodes.
The depth of deployment is split into layers, with each layer identified by the node or sink’s transmission range. It can be calculated using the following formula:
where
L denotes the network deployment depth and
Tx denotes the node or sink’s transmission range. The network’s depth has been grouped into four categories:
The sink node is designated by D0.
The nodes close to the surface are denoted by D1.
D2 represents nodes that remain in the water at a depth of level 2.
Nodes near the seabed are designated as D3.
where D3 > D2 > D1 > D0
Each layer contains several clusters, each with a cluster head and a cluster member. For example, the cluster head at depth D1 is node S3, and the cluster head at depth D2 is node S9.
Nodes at the intersection of two layers will act as cluster relays, forwarding data from the deeper layer to the sink. Node S5, for example, becomes a cluster relay, forwarding data from cluster S9 to cluster S3 and then transmitting to the sink node.
The multi-hop routing route to the sink is taken by node S13, which is situated on the seabed, through clusters of S12–S9–S5–S3–S1–sink.
This paper proposes a Managed Transmission Power-based Sparsity-Aware Energy-Efficient Clustering (CTP-SEEC) routing protocol for UWSNs in a spherical and square areas that is energy efficient and uses minimal transmission power. According to the identified upper and lower threshold values, it adjusts transmission power to a suitable Transmission Power Level (TPL). A sender node, for example, uses its modified Transmission Power Level (TPL) stored in the routing table to transmit data to its neighboring node. Receiving acknowledgment with the Received Signal Strength Indicator (RSSI) value would cause the sender node to change its TPL adaptively. The condition between higher and lower threshold values is used by the sender. It contrasts the RSSI value received with the lower and upper RSSI threshold values. The sender node tunes its TPL accordingly if it crosses one of these values, converting to a suitable power level. This is often done to reduce energy consumption by overcoming time-varying acoustic channel quality. It may, however, minimize network connectivity, increase the number of hops, and increase the end-to-end delay. Each node is given the appropriate transmitting power. The suggested routing scheme employs adaptive power control, which converts to a suitable Transmission Power Level (TPL) based on specified upper and lower threshold values, which is better than previous ones by using maximum energy in different sensor scenarios, the minimum transmission power used to increase overall network lifetime, packet delivery ratio, and interference. Using an adaptive communication power control mechanism, the proposed routing protocol is used to eliminate channel interference while also reducing energy consumption in sparse areas. Furthermore, the dense regions are divided into clusters to decrease repetitive transmissions as shown in
Figure 1. By gathering data packets at a nearby header node, this will help to mitigate interference. A composite data packet is sent to the endpoint by this node. Based on the maximum residual power, Cluster Heads are chosen. CHs link to both the sink node with CH neighbors and the forward data packets, while handheld sinks are in dispersed areas to collect minimum energy consumption information, as shown in
Figure 1. Sparse and denser regions are determined through the algorithms followed by the SEEC protocol, based on the density of the nodes in each logical area, the sparse and dense areas are specified. For example [
7], assumed to be picked as a dense area, there should be N number of nodes to satisfy the limited threshold by using the following equation:
The area is dense, when N is greater or equal to the Nth and the opposite indicates a sparse area. The proposed scheme incorporates the mechanism of transmission power control strategy. Two algorithms are suggested, which is most appropriate for comparison with our proposed algorithm [
8]: (1) Sparsity Search Algorithm (SSA) to find sparse regions and (2) Density Search Algorithm (DSA) to find dense regions in the network place. In addition, the cluster head nodes automatically decided by the network and dynamically according to 3 conditions are met [
8]:
If the node’s depth is lower than the other nodes of the density region in the present round
Where Rest Power of the cluster head (PCH) is greater than the average rest power calculated for an individual node.
The node can be the cluster head if it has not been cluster head for the last 1/p rounds, the probability of a node to be a cluster head and it is calculated at the current round denoting the threshold (Th),the node generates a random number and, the compares the rand value with Th. The node can be CH If rand of the node is less than Th value, and only one CH node is specified in each density.
It consists of two phases: (i) Setup phase and (ii) Communication phase.
3.4. Setup Phase
In this paper, the sensor field is distributed into n sections, and relay nodes are arbitrarily positioned in the particular network area as shown in
Figure 1. There is one fixed sink at the surface area and mobile sinks are positioned inside the sparse region. A ping message (control packet) is advertised by sink nodes across the network. This message has all the related facts of the sink node. Receiving nodes get the ping message from the fixed Sink and update its distance, when the routing path is setup, in the form of the number of hops from the sink fixed at the surface. Moreover, the receiving node sets a suitable Transmission Power Level (TPL) with the sink based upon the Received Signal Strength Indicator (RSSI). Along these lines, each node gets its distance from the sink, sets a suitable TPL, and then broadcasts this information in its transmission range. The same procedure is followed by other nodes. If a node receives a value greater than what it already has, it disposes of the ping message otherwise, it refreshes its distance information, sets a suitable TPL, and again broadcasts the ping message to nodes in its transmission range. This procedure proceeds till each sensor node sets a suitable TPL with the selected neighbors and obtains its distance from the sink. In short, control packets in the form of ping message contains a cost field which reflects the number of hops to reach the sink. In the setup phase, such control packets are propagated throughout the network. This results in establishing a minimum or shortest route from source to sink along with TPL adjustment of each node with its selected neighboring nodes. The parameters of simulation are shown in
Table 1.
3.5. Data Communication Phase
By gathering data packets at a nearby header node, this will help to mitigate interference. A composite data packet is sent by this node to the endpoint. Based on maximum residual power, CHs are chosen. CHs connect to both the sink node or with CH neighbors and the forward data packets, while handheld sinks are in dispersed areas to gather data with minimal energy consumption. If the RSSI reaches its predefined limit stated as either low or high, the sender node tunes its TPL accordingly, i.e., if the RSSI is below the limit, it switches to the next power level; on the other hand, if the RSSI is above the high limit, the power level will degrade to a level. The RSSI limits are fixed at the start of the data communication phase and it depends on the channel condition. The process of the proposed technique is depicted in
Figure 3, where n is the number of nodes, R is the region, r is the rGR which is donated searching the number of sparsity and density regions of the network.
4. Simulation Results and Discussions
This section explains the estimation of the efficiency of the proposed method in terms of the life of the network, the stability period, the residual energy, the packets received per round and the total packets received at the sink. To verify the new system, the latest state-of-the-art schemes are extensively analyzed. The underwater routing schemes DBR [
10], EEDBR [
30], and SEEC [
9] were taken into account for this reason. We have modeled these protocols by using Matlab 2017b/Simulink software, and the simulation cycle consists of 3500 rounds with the same set of environmental parameters to provide reliable performance. In a 100 m × 100 m underwater area, the total number of 100 sensor nodes is deployed randomly. Initially, each node contains 5 joules of energy. Each sensor node can transmit in the range of 50 m. The depth threshold is set to 15 m. The proposed protocol is evaluated based on the following metrics:
The proposed scheme is evaluated considering the following standard evaluation metrics:
Network Lifetime: These metrics indicate how long the network nodes operate. This refers to the cumulative number of rounds when the network field’s nodes are both alive and working. To consider the efficacy of a system, this metric is essential as energy is the primary concern of UWSNs. In the underwater world, the aim of most mechanisms is to prolong the lifespan of the network. Basically, it depends on energy consumption.
Throughput: Throughput is called the efficient reception of the data packet at the sink. Data transmission to the sink depends on the number of nodes being involved. More active nodes contribute sufficient packets to the sink, which increases the network throughput.
Packets received per round: This review shows the ratio and the capacity of packets received at the sink in the unique round to accept the data packets. If the ratio exceeds the threshold for sending packets, the packet will be dropped. Residual Energy: Residual Energy is the difference between the initial energy and total energy consumed by each node after data packets have been transmitted and received.
4.1. Network Lifetime
After introducing the managed transmission power function in SEEC, as seen in
Figure 4, the network lifetime is enhanced. In SEEC, each sensor node was transmitting packets at a predefined transmission power which made the network die prematurely. In the controlled transmission power (CTP) strategy, transmission power is adjusted by the source node based on Euclidean distance to the destination node. These adjustments of power vary energy consumption for each time when the packet is sent. This variation in energy consumption increases the network lifetime. In
Figure 4, it can be seen that the nodes in SEEC with CTP are alive at round 3500 whereas the SEEC without CTP is dead at round 2500 as shown in
Figure 5. In DBR During the information sending, the sender incorporates its depth; the data packets accepting nodes contrast their depths with the sender node. The node with a small depth advances the packet to the sink. For each data packet, each node has a fixed holding time, so nodes with greater depths have a smaller holding time. Therefore, because only the depth of the sensor node is used for propagation, these nodes die before alternative nodes that lead to energy holes; see
Figure 5. The nodes in DBR with CTP are alive at round 3500, whereas the DBR without CTP is dead at round 2000, as seen in
Figure 4.
In EEDBR, the stability duration is better than DBR, as seen in
Figure 4; and when the network is sparse, node neighbors quickly decrease the network’s instability and the node load is also higher in EEDBR, so the number of dead nodes in
Figure 5 increases suddenly. It can be shown in
Figure 4 that the EEDBR nodes with CTP are alive at round 3500, whereas the EEDBR without CTP is dead at round 2000, as seen in
Figure 5.
4.2. Stability Period
Sensor node random deployment does not necessarily give the same number of dense and sparse regions. If the number of dense regions is maximal and the nodes interact with the same transmission power within the same dense regions, the stability duration is compromised.
On the other hand, the regulated transmission power technique is implemented, as seen in
Figure 4 and
Figure 5, as a result the stability period is increased. In addition to regulated transmission capacity, the clustering of denser regions used and the relocation of mobile sink nodes in sparse regions in the CPT-SEEC enhances the stability period relative to SEEC, EEDBR and DBR. In DBR, the greedy process forces immutable forwarder node selection when network nodes are partitioned and resources remain underused, allowing the protocol to have the lowest stability duration. It can be seen that the nodes in DBR without CTP are dead in round 2000 as shown in
Figure 5. In EEDBR, because of excessive data forwarding and rapid energy reduction, nodes start to die quickly.
4.3. Saturation Throughput
Figure 6 shows the behavior of saturation throughput growth of network during simulation rounds, and suggests that the cumulative packets collected at the sink are higher in CTP-SEEC. This is attributed to the improved lifespan of the network with the capacity policy of controlled transmission. In addition to this, CTP-SEEC’s expanded throughput also results in a high number of live nodes during the network lifespan. Packets obtained per round in the EEDBR result in high residual energy, while a high packet distribution ratio in the sparse area cannot be accomplished by choosing nodes and by considering residual energy. In DBR, only the low-depth node is considered for packet routing, which often results in packet replication, allowing DBR to reach the lowest throughput compared to other protocols. Under the SEEC protocol, the number of packets received at the sink node is less than the suggested CTP-SSEC routing protocol. The theory behind this is that the transmitting power stays steady in SEEC and the network dies early.
Figure 7 shows that the packets received per round with controlled transmission power are better than SEEC.
4.4. Residual Energy
In SEEC, the factor of transmission power in the energy consumption was constant. Regardless of the distance between two communicating nodes, almost the same amount of energy we are consuming while transmitting a packet. In CTP-SEEC, the function of energy consumption varies.
After sending the packet, the return value contributes to higher network residual capacity. Transmission power is balanced in the suggested scheme according to the distance between the source and the destination node.
The less the distance, the less the transmission power, and vice versa. Less transmission power results in less energy tax which eventually results in higher network residual energy in CTP-SEEC. DBR considers only the depth; it does not consider the residual energy, so it has the minimum residual energy. In EEDBR, a high packet distribution ratio in the sparse area cannot be accomplished by choosing nodes and by considering residual capacity. In
Figure 8, the cumulative network residual energy consumption of CPT-SEEC, SEEC, EEDBR, and DBR is observed.
4.5. Simulation Variable Environment
Our simulation environment consists of dynamic nodes deployed sparsely in a 3D environment (500 m × 500 m × 500 m). Herein, we run the simulation cycle for 1000 rounds. Moreover, to check the scalability of the proposed work, we change the number of nodes and their transmission ranges varying from 50 to 250 and 15 m to 200 m, respectively as in [
34].
The proposed protocol is evaluated based on residual energy and packets received that will be impacted on the network lifetime and throughput, respectively. In terms of residual energy metric, the
Figure 8 shows three protocols reduced the residual energy. However, the residual energy in CTP-SEEC is higher than in SEEC, or DBR, during a varied number of sensor nodes. In DBR, the increase in the number of nodes in the network shows that more data packets can be received by the forwarding node. In turn, it sends these packets to the upper level before reaching the sink. Here, DBR elects the upper-level depth to be its forwarder node, and this process results in high energy consumption due to high transmission at the forwarders node. In SEEC, the protocol performs better than the DBR in the case of a low transmission range which ensures a long network lifetime. The node that selects to be a CH based on its depth and residual energy makes all the nodes efficient to save energy in case of a varying number of nodes and transmission range. However, the cluster head broadcasts information to the three-dimensional area network, the nodes consume energy gradually. However, CTP-SEEC can be performed as a CH or CR, thus the cluster head has the information of its cluster members, which reduces the number of transmissions between nodes.
Figure 9 shows the higher energy consumption in CTP-SEEC, SEEC, and DBR, when decreasing the transmission range. In CTP-SEEC, the residual energy within a 200 m transmission range is more than a 150 m transmission range. The cluster heads collect the data of all the cluster members and then forward these to the cluster relay which belongs to another cluster.
In terms of received packets metrics, the network topology changes every 1000 rounds during the deployment, which causes an error in received packets at cluster head and cluster relay because the distance from the cluster member to the cluster head greater than the transmission range that makes fail received packets at the cluster head or cluster members leads to reduce the level of received power. Thus, the cluster should be a renewed setup, a cluster head, a cluster member, and a cluster relay must be re-elected.
Figure 10 shows lower residual energy at the node during the increased transmission range.
In
Figure 11, we can see that by changing the transmission range to 200 m, the received packets at the sink increases in CTP-SEEC protocol, which is higher than in SEEC, or DBR. It increases the received packets at the sink with increase to the transmission range and it is periodically different from the total number of received packets in CTP-SEEC.
Figure 12 shows that the received packets at the sinks in CTP-SEEC are higher than other protocols, which results in high throughput and a more reliable network.
5. Conclusions
The energy hole creation, high interference, unbalanced data load distribution, and naive node-level energy consumption approaches are considered some of the key reasons for poor UWSN performance. The integration of various compatible approaches often results in improved network performance. This paper incorporates three state-of-the-art UWSN approaches: transmit power control, mobile sink use, and clustering. The results of the assessment validate the fact that the ratio of network life, throughput, and packet distribution can be maximized by integrating the regulation of node-level transmission power, clustering in dense regions, and the use of mobile sinks in sparse network regions. The formation of energy holes is considered one of UWSN’s most important problems. The proposed scheme has addressed this problem efficiently; however, it is observed that the smart and adaptive mobility mechanism of mobile sinks has a great impact on the avoidance of energy hole creation.