A Comprehensive Survey on the Performance Analysis of Underwater Wireless Sensor Networks (UWSN) Routing Protocols
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 5
Abstract
The probe of innovative technologies is a furious issue of the day for the improvement of underwater wireless sensor network devices. The undersea is a remarkable and mystical region which is still unexplored and inaccessible on earth. Interest has been increasing in monitoring the medium of underwater for oceanographic data collection, surveillance application, offshore exploration, disaster prevention, commer-cial, scientific investigation, attack avoidance, and other military purposes. In underwater milieus, the sensor networks face a dangerous situation due to intrinsic water nature. However, significant challenges in this concern are high power consumption of acoustic modem, high propagation latency in data transmission, and dynamic topology of nodes due to wave movements. Routing protocols working in UWSN has low stability period due to increased data flooding which causes nodes to expire quickly due to unnecessary data forwarding and high energy consumption. The quick energy consumption of nodes originates large coverage holes in the core network. To keep sensor nodes functional in an underwater network, dedicated protocols are needed for routing that maintain the path connectivity. The path connectivity consumes more energy, high route updated cost with a high end to end delay for the retransmission of packets. So, in this paper, we are providing a comprehensive survey of different routing protocols employed in UWSN. The UWSN routing protocols are studied and evaluated related to the network environment and quality measures such as the end to end delay, dynamic network topology, energy consumption and packet delivery ratio. The merits and demerits of each routing protocol are also highlighted.
Authors and Affiliations
Tariq Mahmood, Fatheem Akhtar, Sher Daudpota, Khalil ur Rehman, Saqib Ali, Fawaz Mahiuob Mokbal
Analysis of Security Requirements Engineering: Towards a Comprehensive Approach
Software’s security depends greatly on how a system was designed, so it’s very important to capture security requirements at the requirements engineering phase. Previous research proposes different approaches, but each i...
NFC Technology for Contactless Payment Echosystems
Since the earliest ages, the human being has not ceased to develop its system of exchange of goods. The first system introduced is barter, it has evolved over time into currency by taking various forms (shells, teeth, fe...
Effective Strategies for ROI and Image Matching
The paper presents an exceptional four matching strategies: systematic, random, gradient and simulated annealing using diferent metrics. We consider two kinds of image matching algorithms. The first one oriented on the w...
Video Watermarking System for Copyright Protection based on Moving Parts and Silence Deletion
In recent years, video watermarking has emerged as a powerful technique for ensuring copyright protection. However, ensuring the lowest level of distortion, high transparency and transparency control, integrity of the wa...
Variability of Acoustic Features of Hypernasality and it’s Assessment
Hypernasality (HP) is observed across voiced phonemes uttered by Cleft-Palate (CP) speakers with defective velopharyngeal (VP) opening. HP assessment using signal processing technique is challenging due to the variabilit...