379 research outputs found

    The Meandering Current Mobility Model and its impact on Underwater Mobile Sensor Networks

    Get PDF
    Underwater mobile acoustic sensor networks are promising tools for the exploration of the oceans. These networks require new robust solutions for fundamental issues such as: localization service for data tagging and networking protocols for communication. All these tasks are closely related with connectivity, coverage and deployment of the network. A realistic mobility model that can capture the physical movement of the sensor nodes with ocean currents gives better understanding on the above problems. In this paper, we propose a novel physically-inspired mobility model which is representative of underwater environments. We study how the model affects a range-based localization protocol, and its impact on the coverage and connectivity of the network under different deployment scenarios

    A stateless opportunistic routing protocol for underwater sensor networks

    Get PDF
    Routing packets in Underwater Sensor Networks (UWSNs) face different challenges, the most notable of which is perhaps how to deal with void communication areas. While this issue is not addressed in some underwater routing protocols, there exist some partially state-full protocols which can guarantee the delivery of packets using excessive communication overhead. However, there is no fully stateless underwater routing protocol, to the best of our knowledge, which can detect and bypass trapped nodes. A trapped node is a node which only leads packets to arrive finally at a void node. In this paper, we propose a Stateless Opportunistic Routing Protocol (SORP), in which the void and trapped nodes are locally detected in the different area of network topology to be excluded during the routing phase using a passive participation approach. SORP also uses a novel scheme to employ an adaptive forwarding area which can be resized and replaced according to the local density and placement of the candidate forwarding nodes to enhance the energy efficiency and reliability. We also make a theoretical analysis on the routing performance in case of considering the shadow zone and variable propagation delays. The results of our extensive simulation study indicate that SORP outperforms other protocols regarding the routing performance metrics

    Localization Algorithms of Underwater Wireless Sensor Networks: A Survey

    Get PDF
    In Underwater Wireless Sensor Networks (UWSNs), localization is one of most important technologies since it plays a critical role in many applications. Motivated by widespread adoption of localization, in this paper, we present a comprehensive survey of localization algorithms. First, we classify localization algorithms into three categories based on sensor nodesā€™ mobility: stationary localization algorithms, mobile localization algorithms and hybrid localization algorithms. Moreover, we compare the localization algorithms in detail and analyze future research directions of localization algorithms in UWSNs

    EFFICIENT CAMERA SELECTION FOR MAXIMIZED TARGET COVERAGE IN UNDERWATER ACOUSTIC SENSOR NETWORKS

    Get PDF
    In Underwater Acoustic Sensor Networks (UWASNs), cameras have recently been deployed for enhanced monitoring. However, their use has faced several obstacles. Since video capturing and processing consume significant amounts of camera battery power, they are kept in sleep mode and activated only when ultrasonic sensors detect a target. The present study proposes a camera relocation structure in UWASNs to maximize the coverage of detected targets with the least possible vertical camera movement. This approach determines the coverage of each acoustic sensor in advance by getting the most applicable cameras in terms of orientation and frustum of camera in 3-D that are covered by such sensors. Whenever a target is exposed, this information is then used and shared with other sensors that detected the same target. Compared to a flooding-based approach, experiment results indicate that this proposed solution can quickly capture the detected targets with the least camera movement

    A key distribution scheme for mobile underwater wireless sensor networks

    Get PDF
    Wireless Sensor Networks consist of small battery-limited devices called sensor nodes. They are used for collecting data from surrounding environment and relay them via wireless communication. One of the recent application areas is underwater sensing. Communication in Underwater Wireless Sensor Networks (UWSN) is different from airborne communication. Radio frequencies cannot be used for UWSN. Instead acoustic waves, which cause extra challenges, are used in UWSN. When UWSNs are deployed in hostile environment, nodes can be captured by an adversary. In order to secure UWSNs, firstly key distribution problem must be addressed. Moreover, UWSNs are inherently mobile since the nodes may be drifted in the sea. In this thesis, we propose a key distribution model which is applied for two group mobility models, namely (i) nomadic mobility model and (ii) meandering current mobility model. Our nomadic mobility based key distribution scheme works in three dimensions. However, this scheme is suitable only for small coastal areas. On the other hand, our meandering mobility based key distribution model is a two dimensional one and spans several kilometers in the open sea. In both schemes, a hierarchical structure is used. Secure and resilient group communication is handled via well-known Blom's key distribution scheme. We analyzed the performance of the proposed schemes using simulations. Our results show that secure connectivity of both schemes is generally high. Of course, mobility causes some temporary decreases in the connectivity, but our schemes help to heal the connectivity performance in time. Moreover, our schemes show good resiliency performance such that capture of some nodes by an adversary only causes very small amount of links between uncaptured nodes to be compromised

    A survey on network simulators in three-dimensional wireless ad hoc and sensor networks

    Get PDF
    Ā© 2016 The Author(s). As steady research in wireless ad hoc and sensor networks is going on, performance evaluation through relevant network simulator becomes indispensable procedure to demonstrate superiority to comparative schemes and suitability in most literatures. Thus, it is very important to establish credibility of simulation results by investigating merits and limitations of each simulator prior to selection. Based on this motivation, in this article, we present a comprehensive survey on current network simulators for new emerging research area, three-dimensional wireless ad hoc and sensor networks which is represented by airborne ad hoc networks and underwater sensor networks by reviewing major existing simulators as well as presenting their main features in several aspects. In addition, we address the outstanding mobility models which are main components in simulation study for self-organizing ad hoc networks. Finally, open research issues and research challenges are discussed and presented

    An energy efficient interference-aware routing protocol for underwater WSNs

    Get PDF
    Interference-aware routing protocol design for underwater wireless sensor networks (UWSNs) is one of the key strategies in reducing packet loss in the highly hostile underwater environment. The reduced interference causes efficient utilization of the limited battery power of the sensor nodes that, in consequence, prolongs the entire network lifetime. In this paper, we propose an energy-efficient interference-aware routing (EEIAR) protocol for UWSNs. A sender node selects the best relay node in its neighborhood with the lowest depth and the least number of neighbors. Combination of the two routing metrics ensures that data packets are forwarded along the least interference paths to reach the final destination. The proposed work is unique in that it does not require the full dimensional localization information of sensor nodes and the network total depth is segmented to identify source, relay and neighbor nodes. Simulation results reveal better performance of the scheme than the counterparts DBR and EEDBR techniques in terms of energy efficiency, packet delivery ratio and end-to-end delay
    • ā€¦
    corecore