Home > Research > Publications & Outputs > Towards Void Hole Alleviation by Exploiting the...

Links

Text available via DOI:

View graph of relations

Towards Void Hole Alleviation by Exploiting the Energy Efficient Path and by Providing the Interference-Free Proactive Routing Protocols in IoT Enabled Underwater WSNs

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published
  • Muhammad Awais
  • Nadeem Javaid
  • Amjad Rehman
  • Umar Qasim
  • Musaed Alhussein
  • Khursheed Aurangzeb
Close
Article number1313
<mark>Journal publication date</mark>15/03/2019
<mark>Journal</mark>Sensors
Issue number6
Volume19
Number of pages30
Publication StatusPublished
<mark>Original language</mark>English

Abstract

Nowadays, the Internet of Things enabled Underwater Wireless Sensor Network (IoT-UWSN) is suffering from serious performance restrictions, i.e., high End to End (E2E) delay, low energy efficiency, low data reliability, etc. The necessity of efficient, reliable, collision and interference-free communication has become a challenging task for the researchers. However, the minimum Energy Consumption (EC) and low E2E delay increase the performance of the IoT-UWSN. Therefore, in the current work, two proactive routing protocols are presented, namely: Bellman–Ford Shortest Path-based Routing (BF-SPR-Three) and Energy-efficient Path-based Void hole and Interference-free Routing (EP-VIR-Three). Then we formalized the aforementioned problems to accomplish the reliable data transmission in Underwater Wireless Sensor Network (UWSN). The main objectives of this paper include minimum EC, interference-free transmission, void hole avoidance and high Packet Delivery Ratio (PDR). Furthermore, the algorithms for the proposed routing protocols are presented. Feasible regions using linear programming are also computed for optimal EC and to enhance the network lifespan. Comparative analysis is also performed with state-of-the-art proactive routing protocols. In the end, extensive simulations have been performed to authenticate the performance of the proposed routing protocols. Results and discussion disclose that the proposed routing protocols outperformed the counterparts significantly.