Next Article in Journal
Design Optimization of Sensitivity-Enhanced Structure for Fiber Bragg Grating Acoustic Emission Sensor Based on Additive Manufacturing
Previous Article in Journal
Predicting Axial Impairment in Parkinson’s Disease through a Single Inertial Sensor
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Efficient Metaheuristic-Based Clustering with Routing Protocol for Underwater Wireless Sensor Networks

by
Neelakandan Subramani
1,*,
Prakash Mohan
2,
Youseef Alotaibi
3,
Saleh Alghamdi
4 and
Osamah Ibrahim Khalaf
5
1
Department of Computer Science and Engineering, R.M.K Engineering College, Chennai 601206, India
2
Department of Computer Science and Engineering, Karpagam College of Engineering, Coimbatore 641032, India
3
Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia
4
Department of Information Technology, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia
5
Department of Computer Engineering, Al-Nahrain Nano Renewable Energy Research Center, Al-Nahrain University, Baghdad 10071, Iraq
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(2), 415; https://doi.org/10.3390/s22020415
Submission received: 16 November 2021 / Revised: 2 January 2022 / Accepted: 4 January 2022 / Published: 6 January 2022
(This article belongs to the Section Sensor Networks)

Abstract

:
In recent years, the underwater wireless sensor network (UWSN) has received a significant interest among research communities for several applications, such as disaster management, water quality prediction, environmental observance, underwater navigation, etc. The UWSN comprises a massive number of sensors placed in rivers and oceans for observing the underwater environment. However, the underwater sensors are restricted to energy and it is tedious to recharge/replace batteries, resulting in energy efficiency being a major challenge. Clustering and multi-hop routing protocols are considered energy-efficient solutions for UWSN. However, the cluster-based routing protocols for traditional wireless networks could not be feasible for UWSN owing to the underwater current, low bandwidth, high water pressure, propagation delay, and error probability. To resolve these issues and achieve energy efficiency in UWSN, this study focuses on designing the metaheuristics-based clustering with a routing protocol for UWSN, named MCR-UWSN. The goal of the MCR-UWSN technique is to elect an efficient set of cluster heads (CHs) and route to destination. The MCR-UWSN technique involves the designing of cultural emperor penguin optimizer-based clustering (CEPOC) techniques to construct clusters. Besides, the multi-hop routing technique, alongside the grasshopper optimization (MHR-GOA) technique, is derived using multiple input parameters. The performance of the MCR-UWSN technique was validated, and the results are inspected in terms of different measures. The experimental results highlighted an enhanced performance of the MCR-UWSN technique over the recent state-of-art techniques.

1. Introduction

Water covers the Earth in different ways, in the form of oceans, rivers, and lakes. It is important for humans and other animals to have water in their lives and for other animals to have water as well. Advances in technology have made it possible to place sensor nodes in lakes, river environments, and natural forests so that they can be used to study them. It is possible for these sensor nodes to communicate with each other because they have smart computing and smart sensors built in. Networks called underwater wireless sensor networks (UWSNs) are made up of a lot of autonomous sensors that are limited in energy and homogeneous nodes [1]. These underwater sensors were used to look for things such as pressure, temperature, water quality, and current flow in the water. They were placed in seas and rivers. Based on the types of applications, the data processing station gathers these kinds of data. A summary of how it works can be found below.
Infrastructure for underwater sensors is made up of different types of devices: an acoustic modem, a memory, and a sensor. They also have an on-board controller, a power supply, and a sensor interface circuitry. It is possible to use the underwater sensors to measure the density and temperature under the water, among other things. They could also be used to measure acidity, pH, conductivity, turbidity, hydrogen, and dissolved methane gas. [2] Figure 1 shows the network models used by UWSN. Onshore base station, underwater sensors, and sink node are all part of the UWSN (SN). The nodes were close to the SN and sent information to the sink, while another node made the clusters. Underwater sensors send information to the SN at the surface [3]. The data are then sent to a nearby base station (BS) [4]. One of the two types of transceivers that the SN nodes have is an acoustic transceiver that can communicate with the sensors. The other type is a radio transceiver that can communicate with the BSS using radio frequency. To send messages to other nodes, underwater nodes have an acoustic transceiver that is built into them. Communication in underwater environments is different from in terrestrial wireless sensor networks (TWSN) in terms of topology, channel modelling, and path loss. The UWSN is moved by current at a speed of about 1–3 m/s. There are different models for the acoustic and radio channels.
The minimum clash probability routing underwater wireless sensor networks (MCR-UWSN) is made up of many underwater acoustic sensors that are placed in underwater monitoring areas to carry out surveillance, navigation, intrusion detection, data collection, and resource exploration [4,5]. Another problem with the Ant Colony Optimization Clash probability Routing (ACOCR) UWSN is that it has a huge error rate, propagation delay, and a low bandwidth. It is very important for UWSN to come up with an energy-efficient way to send data in complicated underwater environments [6]. There are a lot of traditional ways to route in TWSN. However, in UWSN, they are almost always impossible.
Multi-hop data transmissions for UWSN in long-distance transmissions are much more efficient than single-hop data transmissions [7]. Furthermore, to help with traffic load balance and data collision, it is important to have a consistent network topology [8]. In a lot of studies, it has been shown that cluster routing algorithms are good at avoiding collisions. They balance traffic loads, and they use multi-hop mechanisms to send data between clusters [8]. There are many groups of nodes in a cluster routing algorithm, and each group has a head node (CHN) and a lot of nodes called “cluster member nodes”. As soon as clusters were made, the CHN allocates channels to send data through. The CMN sends data based on the distribution that might avoid collisions [9]. CHNs are then responsible for aggregation, which might reduce data redundancy and cut down on the number of data packets that need to be sent to the SN, which saves energy [10]. Clustering routing algorithms are better at cutting down on data transmission and managing traffic, according to a lot of research. They can also cut down on the number of packets lost, save energy, and keep the network running for a long time. The underwater sensors are restricted to energy and it is tedious to replace or recharge batteries, resulting in energy efficiency being a major challenge. Clustering and multi-hop routing protocols are considered energy-efficient solutions for UWSN. However, the cluster-based protocols for traditional wireless networks could not be feasible for UWSN owing to the underwater current, high water pressure, low bandwidth, propagation delay, and error rate. To resolve these issues and achieve energy efficiency in UWSN, this study focuses on designing the metaheuristics-based clustering with a routing protocol for UWSN, named MCR-UWSN. The goal of the MCR-UWSN technique is to select an optimal set of cluster heads (CHs) and route to destination.
The main contributions and novelty of this research are as follows.
(i) To solve the issue of clustering, multi-hop routing protocols are considered energy-efficient solutions for UWSN. However, the cluster-based routing protocols for traditional wireless networks could not be feasible for UWSN owing to the underwater current, low bandwidth, high water pressure, propagation delay, and error probability.
(ii) To resolve these issues and achieve energy efficiency in UWSN, this study focuses on designing metaheuristics-based clustering with a routing protocol for UWSN, named MCR-UWSN.
(iii) The MCR-UWSN method picks the best CHs and the shortest routes to the BS. MCR-UWSN is a technique that uses the cultural emperor penguin optimizer-based clustering (CEPOC) method to choose the best CHs and build groups.
(iv) The goal of the MCR-UWSN technique is to elect an efficient set of cluster heads (CHs) and route to destination. In addition, a multi-hop routing method that uses grasshopper optimization (MHR-GOA) is proposed in this paper.
(v) In order to show how the MCR-UWSN technique improves performance, a series of simulations are run and the results are looked at in different ways.
The rest of the paper is arranged in the following way. Section 2 explores the literature. Section 3 provides a model of the proposed system. This is how we came up with the CEPOC technique and the MHR-GOA technique. Section 4 details the experiments and shows the results. The given framework is shown to work well in this section. Section 5 finally concludes the paper.

2. Literature Review

This section provides a brief overview of UWSN’s existing cluster-based routing techniques. Nguyen et al. [11] developed a low-energy adaptive clustering hierarchy (LEACH) approach for balancing this node’s power utilization and enhancing the network’s lifespan. In regards to depth levels, the network regions are divided into layers. The data collected by the nodes are routed via multi-hop routing paths to an SN. The CHs are selected based on the node’s depth. The CH collects the information packets of each cluster member and then forwards them to the SN’s upper layer in order to send information from the nodes to the SN.
Khan et al. [12] presented a novel system for UWSN based on cooperative energy harvesting. The system employs the AF technique at the relay node to convey data and the FCR method at the end node to choose accurate signals. The presented technique chooses relay nodes from among its neighbor nodes based on the amount of energy gathered. Almost all of UWSN routing techniques based on cooperation do not include energy harvesting mechanisms at the relay nodes. EH-ARCUN incorporates piezoelectric energy harvesting at the relay node to increase the work capacity of sensor nodes in the UWSN with an energy-based cluster optimization algorithm.
Bhattacharjya et al. [13] design an energy-efficient UWSN capable of reducing energy costs and increasing efficiency in underwater settings. A UWSN framework is built in the provided cluster-based underwater wireless sensor network (CUWSNs), which takes use of the benefits of CH and multi-hop transmissions. The described CUWSN enhances a network lifespan by multi-hop broadcasts.
Zhu and Wei [14] offer the EERBLC method, a localization-free routing mechanism. EERBLC protocols are divided into three stages: cluster update and maintenance, transmission routing, and layer and uneven cluster construction. Initially, the monitoring regions under the sea were divided into levels, and nodes in comparable layers were grouped. A novel un-equal clustering strategy based on layer for UWSN is described in order to balance energy across whole networks and prevent “hotspot” concerns.
Sahana and Singh [15] provided a method for fuzzy-based CH selection that increases network longevity. Then, they created a fuzzy-based routing technique that significantly increases the packet transmission rate. In comparison to the current routing protocol, they have adequate power consumption and, hence, prolong the overall performance of the network for overcoming the problems underwater.
To protect against internal attacks, Fang et al. [16] describe an LTMS technique based on binomial distribution. Simultaneously, energy, distance, environment, and security domains are considered and presented to propose an MSCR system through dynamic dimension weight in hierarchical WSN.
Gomathi et al. [17] present a unique routing strategy known as the EE-MDCHSRP technique, which is suggested to the UWSN for successful dynamic CH choices. The dynamic CH node is defined by taking into consideration the residual energy factor, the least mobility factor, and the node density.
Sher et al. [18] describe three energy-efficient routing strategies for monitoring the field with circular and square geometries for underwater WSNs; they are sparsity-aware energy-efficient clustering based on circular depth, sparsity-aware energy-effective clustering routing protocol, and circular sparsity-aware energy-efficient clustering. Each protocol is designed to reduce the power needs of sparse areas, while density search techniques are used to locate dense regions and sparsity search algorithms are presented to find sparse network fields.
Karim et al. [19] suggested two network frameworks with numerous sinks: the VH-ANCRP technique for addressing local maximum nodes and the ANCRP approach for obtaining consistent data transmission metrics. To form clusters, the network areas are divided into smaller cubes. As a CH, all cubes are assigned using anchor nodes [20]. When a source node is freely allocated, each CH is considered to be anchored at the centroid of a cube through strings. In ANCRP, the source node is in charge of relaying sensed data to their chosen CHs.
The primary issues of this research are as follows. Recently, energy efficiency has emerged as a critical concern in wireless sensor networks. Sensor networks are powered by batteries and, as a result, die after a specific amount of time [21]. As a result, optimizing data dissipation in an energy-efficient manner becomes a more difficult task in order to increase the lifespan of sensor devices. Clustering and tree-based data aggregation for sensor networks can improve wireless sensor network lifespan. Clustering and multi-hop routing protocols are considered energy-efficient solutions for UWSN. However, the cluster-based routing protocols for traditional wireless networks could not be feasible for UWSN owing to the underwater current, low bandwidth, high water pressure, propagation delay, and error probability [22]. An energy-efficient clustering and tree-based routing protocol based on hybrid Ant colony optimization (ACO) and particle swarm optimization (PSO) is suggested (Supreet Kaur et al., 2018). To resolve these issues and achieve energy efficiency in UWSN, this study focuses on designing the metaheuristics-based clustering with a routing protocol for UWSN, named MCR-UWSN. The goal of the MCR-UWSN technique is to elect an efficient set of cluster heads (CHs) and route to destination. The MCR-UWSN technique involves the designing of cultural emperor penguin optimizer-based clustering (CEPOC) techniques to construct clusters. Besides, a multi-hop routing technique using grasshopper optimization (MHR-GOA) is derived with multiple input parameters [23].

3. The Proposed Model

This paper proposes a novel MCR-UWSN approach for UWSN energy efficiency. MCR-UWSN uses a two-stage process: CEPOC cluster creation and MHR-GOA routing. These procedures are described in depth in the following sections.

3.1. System Model

The network scenarios include N dynamic nodes that are sparsely and randomly distributed throughout a L × L × L. The data sources are the water medium’s sensed data. The data are collected using underwater sensors. Pressure, temperature, and current flow are all detected parameters. Underwater sensors are equipped with acoustic modems that allow them to communicate with another node submerged in the water [24]. The SN is located on the surface landmass and is equipped with RF and acoustic modems; the SN acoustic modem collects data from underwater sensors, while the RF modems transfer data to the BS. They assumed this network scenario was connected to the network. Due to the fact that the underwater sensors are movable due to the water current’s velocity of around 1–3 m/s, the topology changes rapidly [25]. The network’s assumption might be characterized as follows:
  • The nodes know its position and the position of SN on initial placement;
  • Nodes might become the CH, and clusters member/relay;
  • The CH is rotated among the sensors for conserving energy.
Due to the fact that the properties of acoustic waves in an underwater broadcast medium differ from those of radio waves, the power consumption of WSN cannot be utilized for UWSN. They apply the underwater acoustic channel’s power consumption strategy for the present investigation [26]. The energy used while transferring k bits of data across a distance d at a data rate R is calculated as follows.
E T x ( k , d ) = k × E e l e c + k R P t x
where E e l e c represents the power consumptions to route one bit of data and P T x means the transferred power [27].
For receiving k bit of data, the receiver radio’s power consumptions are given below
E R x ( k ) = k P r
Let P r denote a constant based on the device. For fusing k bit of data, the power consumptions are determined by
E D A ( k ) = k × E D A 0  
In which E D A 0 indicates the energy expended by fusing 1 bit of data, i.e., taken as five nJ/bit. As nodes are mobile because of the water currents, they place arbitrary motion for nodes during operational time. The present velocities are 1–3 m/s.

3.2. Design of CEPOC Technique

The CEPO’s central notion is to derive information about issue resolution from EPO’s budding behavior and to use that knowledge to guide EPO’s evolution concurrently. Assume CEPO is designed to solve situations with minimum optimization:
min   f ( x i )
where x i = ( x i 1 , x i 2 ,   , x i D ) represents the location of ith EPO in the D -dimension search region; x j min < x i j < x j   max   , ( j = 1 , 2 ,   .   .   .   ,   D ) . f (   ) denotes the objective function; and f ( x i ) signifies the objective value of the location x i . x j min and x j max represent the lower bound and upper bound of the location of emperor penguin in the j t h dimensions, respectively [28].
The belief space of EPO population in the t t h generation is determined as s t & N j t , in which s t implies situational knowledge components. N j t denotes normative knowledge that represents the value space data for all parameters in the j t h dimensions and t t h generations. N j t represents I , L , U . I j t = [ l j t ,   u j t ], whereas I j t denotes the interval of normative knowledge in j t h parameter. The lower bound l j t and upper bound u j t are initiated based on the value range of parameters provided by the problems [29]. L j t characterizes the objective value of lower bound l j j of the j t h dimension and U j t represent the objective value of upper bound u j t of the j t h dimension. The acceptance functions are employed for selecting the EPO could directly impact the present belief space. In CEPO, the acceptance functions select the individual in proportion to 20% from the present population space for updating the belief space. Figure 2 illustrates the work flow of algorithm [30].
Situational knowledge s t could be upgraded with upgrade functions:
s t + 1 = { x b e s t t + 1 if   f ( x b e s t t + 1 ) < f ( s t ) s t , e l s e ,  
where x b e s t t + 1 represents the optimum location of EPO population space in the ( t + 1 ) th generation [31].
Consider that the q t h cultural individual, an arbitrary parameter θ q in the interval of zero and one, is generated. The q t h cultural individual affect the lower bound of normative knowledge in the jth parameter if θ q < 0.5 is fulfilled. Normative knowledge N j t could be upgraded with upgrade functions:
l j t + 1 = { x q j t + 1 , i f   x q j t + 1 l j t   o r   f ( x q t + 1 ) < L j t   l j t , e l s e ,
L j t + 1 = { f ( x q t + 1 ) , i f   x q j t + 1 l j t   o r   f ( x q t + 1 ) < L j t   L j t , e l s e .
The qth cultural individual affect the upper bound of normative knowledge in j t h parameter if θ q 0.5 is fulfilled:
u j t + 1 = { x q j t + 1 , i f   x q j t + 1 u j t   o r   f ( x q t + 1 ) < U j t   u j t , e l s e ,
U j t + 1 = { f ( x q t + 1 ) , i f   x q j t + 1 u j t   o r   f ( x q t + 1 ) < U j t   U j t , e l s e .
Normative and situational knowledges could be employed for guiding EPO population development with the impact functions [32]. In CEPO, an election operator β is generated to affect the evolutional EPO population:
β = Max iteration t Max iteration
where Max iteration represents the maximal numbers of iteration. Consider that i t h EPO, an arbitrary parameter λ i in the interval of zero and one is generated [33]. The initial manner is to upgrade the location of EPO by altering the search size and direction of the variations using belief space that can be executed while fulfilled λ i β . The location of EPO in the j t h parameter will be upgraded as follows
x i j t + 1 = { x i j t + | size ( I j t ) N ( 0 , 1 ) | , i f   x i j t < s j t , x i j t | size ( I j t ) N ( 0 , 1 ) | , i f   x i j t > s j t , x i j t + η · size ( I j t ) N ( 0 , 1 ) , e l s e ,
where N ( 0 ,   1 ) represents an arbitrary value subject to the standard distribution [34]. The size ( I j t ) means the length of adaptable range of j t h dimension in belief space in t t h generation. η is fixed between the interval [0.01, 0.6].
Another approach is using a sequence of phases in EPO, i.e., the temperature profile around the huddle computing, the huddle boundary generation, the position update of emperor penguins, and the distance calculation between emperor penguins, which would be brought while fulfilled λ i > β . The certain phases could be denoted in the following equation:
T = T t Max iteration Max iteration
T = { 0 , if   R 0.5 1 , if   R < 0.5
where T denotes the temperature profile around the huddle, T indicates the time to find an optimum solution, and R signifies an arbitrary parameter in the interval of zero and one.
D ep t = S ep ( A t ) x best t B t x i t
where D ep t indicates the distance between the EPO and optimum solutions, x best t denotes the present optimum solution attain in EPO population space in the t t h generation, S ep represent the social force of the EPO which is accountable for convergence towards the best solution, A t & B t are employed for avoiding the collisions between adjacent EPO, and B t denotes an arbitrary parameter in the interval of zero and one [35] .   A t could be calculated by:
A t = ( M × ( T + P grid t ( A c c u r a c y ) ) × r a n d   ( ) ) T P grid t ( A c c u r a c y ) = | x best t x i t |
where M denotes the motion variable that holds a gap among EPOs for avoiding collisions and P grid t (Accuracy) determines the accurate variance by relating the differences between the EPOs. S ep ( A t ) in Equation (11) is calculated by:
S ep ( A t ) = ε · e t / ρ e t
where e is the base of natural logarithm. ε & ρ represent the 2 control variables for improved exploitation and exploration within the interval of [1.5, 2] and [2, 3], respectively. Finally, the location of EPO is upgraded by:
x i t + 1 = x best t A t D ep t .  
In the CEPO algorithm, a M × N grid of sensor nodes can be generated in a geographical area [36]. Each sensor in a mesh network is assigned a unique ID, and these sensors are referred to as penguins. On the basis of this penguin, a search space is formed. The distance between each node is calculated and stored in a matrix using Euclidean distance [37]. The search space is parameterized by the dimension, as well as the lower and upper limits. Each penguin’s fitness value is determined by its location in the search space. The fitness matrix is used to track each penguin’s fitness level. Due to the repetitive nature of this process, the estimated fitness value is stored in a matrix on each iteration, and such matrices supply penguins with a low fitness value. By integrating the fitness and location values of penguins, ideal scores are produced, and the penguins’ positions are updated based on these scores [38]. As a result, this converges to the optimum solution via the use of reduction factors and acquires the ideal cluster required for effective communication based on the assumed parameters [39]. Following cluster formation, the next step is CH election. As a result, the following variables are used: grid size, node density, and node broadcast range. These variables correspond to the weights assigned in FF. An FF is calculated for the purpose of selecting the optimum solution from among the candidate solutions. An FF is critical to the strategy. Selecting the optimal CH lengthens the life of clusters and may aid network energy conservation. The following approach is used to calculate fitness values.
F i t n e s s   f u n c t i o n = w 1 × a 1 + w 2 × a 2
where a 1 & a 2 describes the d e l t a d i f f e r e n c e and d i s t a n c e n e i g h b o r , respectively.
In Equation (15), d e l t a d i f f e r e n c e represents the difference, and d i s t a n c e n e i g h b o r denotes the average distance of node. d e l t a d i f f e r e n c e is employed as a condition for LB. w 1 indicates the weight assigned to d e l t a d i f f e r e n c e and w 2 means the weight assigned to d i s t a n c e n e i g h b o r . In certain cases, each cluster might contain equivalent number of nodes; however, in a real-time situation, it is not easier because of the sensor’s location variations due to water current and another impact d e l t a d i f f e r e n c e is employed to measure the difference from an ideal degree to motion of a node from its neighbor. It is computed by:
d e l t a d i f f e r e n c e = a b s ( i d e a l d e g n o d e d e g )
As a result of the current study’s findings that static CH election conditions increase the likelihood that a single variable will skew the FF and cause an incorrect CH election, the presented solution dynamically assigns weights to each parameter based on its negative impact on the FF and situations [40]. The starting values of all parameters are normalized between 0 and 10 in this approach, and the deviations of all parameters are calculated as follows:
D e v ( p ) = [ m e a n p a r a m e t e r ( p ) ]
The overall weight should be equivalent to one. Every node’s fitness value is defined in Equation (15), in which the values of parameters are employed and weight allocated to all the parameters.

3.3. Design of MHR-GOA Technique

Grasshoppers are classified as pests based on the damage they inflict on vegetation and crops. Rather than acting independently, the grasshopper organizes the world’s largest swarms. Individuals’ influence on a wind, swarm, food supply, and gravity all have an effect on swarm motion [41]. The GOA is a novel metaheuristic approach based on SI that is triggered by the greater range and abrupt movement of adult grasshoppers in a group as shown in Algorithm 1. The metaheuristic algorithm breaks the search technique into stages of exploitation and exploration.
Algorithm 1: Pseudo code of GOA
Initialize
            Start   the   swarms   X i ( i = 1 , 2 , , n ) ,
Initiate   c m a x ,   c m i n and maximal amounts of iteration;
Evaluate the fitness of every search agent;
T = optimal search agent;
while   ( l     M a x amounts of iteration)
  Upgrade c;
  for every search agent
    Regulate the distance amongst grasshopper in [1,4];
    Upgrade the location of the present search agent;
    Bring the present search agent back when it drives outside the boundary;
  end for
            Upgrade   T when it has an optimal solution;
                l = l + 1 ;
end while
return   T ;
End
The grasshopper’s greater range and abrupt movements indicate the exploration stage, whereas the grasshopper’s limited movements indicate the exploitation stage. Mirjalili et al., provides a numerical module for this behavior, which may be denoted as:
x i = S i + G + A
where x i denotes the location of i grasshopper, S i indicates the social interaction in a group, G represents the force of gravity performing on i grasshopper, and A signifies the wind direction. By extending S i , G & A in (1), the formula is given by:
x i = j = 1 , j i N s ( | x j x i | ) x j x i d i j g e ^ g + u e ^ w
where s ( r ) = f e r / l e r denotes the function which stimulates the influence of social interaction and N represents amount of grasshopper. g e ^ g indicates the extended G element, while g signifies gravitational force and e ^ g denotes unit vector directing to the center of the earth. u e ^ w represents the extended A element, u denotes the constant drift, and e ^ w indicates the unit vector directing towards the wind direction. d i j is the distance between the i t h & j t h grasshopper and is estimated as:
d i j = | x j x j |
Because grasshoppers swiftly locate their comfortable zone and exhibit poor convergence, the effects of wind and gravity are negligible in comparison to the interaction between grasshoppers [42]. This indicates that the numerical module must be modified as follows:
x i = c ( j = 1 , j i N c ub lb 2 s ( | x j x i | ) x j x i d i j ) + T ^ d
where u b & l b represents the upper and lower boundaries of the search space, respectively; T d indicates value comparative to the target (optimal solution establish until now); and c denotes the reducing coefficient which balances the process of explorations and exploitations, that is denoted by:
c = c max i t e r   c max c min Max iter
where c max denotes the maximal value (equivalent to one), c min represents the minimal value (equivalent to 0.00001), iter indicates the present iteration, and Max iter signifies the maximum number of iterations. The primary objective of MHR-GOA is to find a novel route from CHS to BS [43]. The novel paths are recognized with the help of MHR-GOA as FF metric i.e., comprised of NDE, RE, and DTBS.
Initially, each FF defines appropriate solution to the executed problem. In routing, each FF indicates the transmission path in the cluster head to the SN. The significance of FF is associated with network locations of CH which are included in the SN [44]. The supremacy of FF is related to m + 1 , in which m indicates the amount of CH contained from the system. Where F i = ( F i , 1 ( t ) ,   F i , 2 ( t ) F i , m + 1 ( t ) ) is the ith FF and the position F i , d , i 1   i m + 1 ,   d 1   d m + 1   defines next-hop for sending data to BS. It is possible to be extremely focused on discovering the ideal path from CH to SN. It may be achieved with the use of FF in a variety of sub-objectives, such as NDE, RE, and Euclidean distance, among other things [45]. In order to convey data, each subsequent hop obtains the data and transfers it to the BS server. As a result, the highest possible RE of the following hop is given first priority. Furthermore, for the main sub-objective of using RE, f 1 is enhanced as follows:
f 1 = i = 1 m E C H i
Euclidean distance may be defined as the distance between CH and the following hop, as well as the distance between CH and SN. When distances are kept to a minimum, the energy consumption rate is likewise decreased. The following purpose is to reduce the distance between CHs and SN as measured in the following manner:
f 2 = 1 i = 1 m dis ( CH i , NH ) + dis ( NH , BS )
ND denotes the list of nodes in the next hops. If hop is composed of a small number of CH members, it consumes low energy in acquiring information from the nearby node and survives for a long period of time. Following that, the next-hop with a restricted node degree is notably picked. Finally, NDE is defined based on the degrees of node f 3 ,
f 3 = 1 Σ i = 1 m I i
As demonstrated in Equation (25), the weighted sum models are then processed for all sub-objectives and turned into a single objective model. Here α 1 , α 2 & α 3 denotes the weight allocated to each sub objectives, where α i ε ( 0 , 1 ) and α 1 + α 2 + α 3 = 1 .
F i t n e s s = α 1 ( f 1 ) + α 2 ( f 2 ) + α 3 ( f 3 )

4. Performance Validation

This section investigates the performance of the proposed MCR-UWSN technique with other techniques [46]. Figure 3 shows the network lifetime results of the MCR-UWSN model, such as the number of surviving nodes (NSN).
Figure 3 depicts that the LEACH technique has attained an ineffective performance with the least NSN. At the same time, the LEACH-ANT technique has gained slightly enhanced NSN over the LEACH technique. Besides, the CUWSN, EOCA, and ACOCR techniques have resulted in a moderate performance over the other techniques. However, the proposed MCR-UWSN technique has accomplished the superior performance with the maximum NSN.
Table 1 and Figure 4 illustrate the network lifetime analysis of the MCR-UWSN technique with existing techniques. From the figure, it is apparent that the MCR-UWSN technique has offered the maximum network lifetime [47]. With respect to FND, the MCR-UWSN technique has attained a higher FND of 852 rounds, whereas the LEACH, LEACH-ANT, CUWSN, EOCA, and ACOCR techniques achieved a lower FND of 424, 560, 629, 689, and 805 rounds, respectively. Moreover, in terms of HND, the MCR-UWSN approach reached a superior HND of 1121 rounds, whereas the LEACH, LEACH-ANT, CUWSN, EOCA, and ACOCR manners had an inferior HND of 646, 813, 891, 949, and 1050 rounds, respectively. Furthermore, with respect to LND, the MCR-UWSN method has the superior LND of 1187 rounds, whereas the LEACH, LEACH-ANT, CUWSN, EOCA, and ACOCR methods have a minimal LND of 710, 906, 989, 1021, and 1187 rounds, respectively.
Figure 5 demonstrates the total energy consumption (TEC) analysis of the MCR-UWSN technique with existing techniques. The figure depicts that the LEACH technique has gained an ineffective outcome with the higher TEC over the other techniques. Likewise, the LEACH-ANT technique has attained an improved performance, whereas the CUWSN, EOCA, and ACOCR techniques have a moderate TEC [48]. However, the MCR-UWSN technique has resulted in the superior performance over the other techniques with minimal TEC.
Table 2 and Figure 6 illustrate the network lifetime analysis of the MCR-UWSN technique with respect to the number of rounds for energy exhausted (NREE). The figure shows that the LEACH approach has an ineffective performance with the minimum NREE. Simultaneously, the LEACH-ANT method has a slightly higher NREE over the LEACH algorithm. In addition, the CUWSN, EOCA, and ACOCR methods resulted in a moderate performance over the other methods. Eventually, the presented MCR-UWSN method has accomplished a higher performance with the maximal NREE.
Figure 7 depicts the network lifetime analysis of the MCR-UWSN approach with respect to the number of received packets (NRP). The figure displays that the LEACH method has achieved an ineffective performance with the minimal NRP. Likewise, the LEACH-ANT method has reached slightly increased NRP over the LEACH method. Followed by the CUWSN, EOCA and ACOCR methods have a moderate efficiency over the other algorithms [49]. Finally, the projected MCR-UWSN algorithm has accomplished the maximal performance with a higher NRP.
The major strength of the proposed systems is that the MCR-UWSN approach consists of two stages: CEPOC-based cluster building and MHR-GOA-based routing. The CEPOC approach has produced a fitness function with unique input parameters for CH selection and cluster formation. It divides the sensor network into several parts, known as clusters, and cluster heads are selected in each cluster. Then, using short-distance connections, tree-based data aggregation takes over and collects sensory information directly from cluster heads. The CEPOC optimization determines the shortest path between the sink and the cluster heads. The use of compressive sensing minimizes the size of the packets that will be broadcast in the sensor network. A weakness of the proposed system is the lack of performance in the data aggregation process and underwater object tracking techniques. To address these concerns in the future, hybrid protocols will be utilized to extend the network lifespan by conserving energy more efficiently through data aggregation and object tracking for sensor networks.

5. Conclusions

In this study, a new MCR-UWSN technique is derived to accomplish an energy-efficient performance in UWSN. The MCR-UWSN technique incorporates a two stage process, namely CEPOC-based cluster construction and MHR-GOA-based routing. The CEPOC technique has derived a fitness function involving distinct input parameters for CH selection and cluster construction. Moreover, the MHR-GOA technique is proposed to optimally derive the routes for multi-hop communication. The MCR-UWSN method has the superior LND of 1187 rounds, whereas the LEACH, LEACH-ANT, CUWSN, EOCA, and ACOCR methods have a minimal LND of 710, 906, 989, 1021, and 1187 rounds, respectively. In order to prove an enhanced performance of the MCR-UWSN technique, a series of simulation processes take place, and the results are examined under different dimensions. The simulation results guaranteed an enhanced energy-efficient performance of the MCR-UWSN technique over the existing techniques. In the future, data aggregation and underwater object tracking techniques can be designed for UWSN.

Author Contributions

Conceptualization: N.S. & P.M.; Methodology: N.S. & P.M.; Validation: N.S. & Y.A.; Formal Analysis: S.A. & N.S.; Investigation: P.M. & N.S.; Resources: N.S.; Data Curation: P.M.; Writing original draft preparation: P.M.; Writing review and editing: N.S. & Y.A.; Visualization: O.I.K.; Supervision: N.S. & Y.A.; Project Administration: N.S. & Y.A.; Funding Acquisition: S.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research is funded by Taif University, TURSP-2020/313.

Institutional Review Board Statement

Not Applicable.

Informed Consent Statement

Not Applicable.

Data Availability Statement

The study did not report any data.

Acknowledgments

We deeply acknowledge Taif University for supporting this Research through Taif University Researchers Supporting Project Number (TURSP-2020/313), Taif University, Taif, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Awan, K.M.; Shah, P.A.; Iqbal, K.; Gillani, S.; Ahmad, W.; Nam, Y. Underwater wireless sensor networks: A review of recent issues and challenges. Wirel. Commun. Mob. Comput. 2019, 2019, 6470359. [Google Scholar] [CrossRef]
  2. Jouhari, M.; Ibrahimi, K.; Tembine, H.; Ben-Othman, J. Underwater wireless sensor networks: A survey on enabling technologies, localization protocols and internet of underwater things. IEEE Access 2019, 7, 96879–96899. [Google Scholar] [CrossRef]
  3. Arjunan, S.; Pothula, S.; Ponnurangam, D. F5N-based unequal clustering protocol (F5NUCP) for wireless sensor networks. Int. J. Commun. Syst. 2018, 31, e3811. [Google Scholar] [CrossRef]
  4. Xiao, X.; Huang, H. A Clustering Routing Algorithm Based on Improved Ant Colony Optimization Algorithms for Underwater Wireless Sensor Networks. Algorithms 2020, 13, 250. [Google Scholar] [CrossRef]
  5. Rout, R.; Parida, P.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I. Skin Lesion Extraction Using Multiscale Morphological Local Variance Reconstruction Based Watershed Transform and Fast Fuzzy C-Means Clustering. Symmetry 2021, 13, 2085. [Google Scholar] [CrossRef]
  6. Zhou, Y.; Yang, H.; Hu, Y.; Kung, S. Cross-layer network lifetime maximization in underwater wireless sensor networks. IEEE Syst. J. 2020, 14, 220–231. [Google Scholar] [CrossRef]
  7. Gokul Anand, J. Trust based optimal routing in MANET’s. In Proceedings of the International Conference on Emerging Trends in Electrical and Computer Technology, Nagercoil, India, 23–24 March 2011; pp. 1150–1156. [Google Scholar] [CrossRef]
  8. Yu, W.; Chen, Y.; Wan, L.; Zhang, X.; Zhu, P.; Xu, X. An energy optimization clustering scheme for multi-hop underwater acoustic cooperative sensor networks. IEEE Access 2020, 8, 89171–89184. [Google Scholar] [CrossRef]
  9. Zhang, J.; Cai, M.; Han, G.; Qian, Y.; Shu, L. Cellular clustering-based interference-aware data transmission protocol for underwater acoustic sensor networks. IEEE Trans. Veh. Technol. 2020, 69, 3217–3230. [Google Scholar] [CrossRef]
  10. Hou, R.; He, L.; Hu, S.; Luo, J. Energy-balanced unequal layering clustering in underwater acoustic sensor networks. IEEE Access 2018, 6, 39685–39691. [Google Scholar] [CrossRef]
  11. Ramalingam, C.; Prakash, M. An efficient applications cloud interoperability framework using I-Anfis. Symmetry 2021, 13, 268. [Google Scholar] [CrossRef]
  12. Khan, A.; Khan, M.; Ahmed, S.; Abd Rahman, M.A.; Khan, M. Energy harvesting based routing protocol for underwater sensor networks. PLoS ONE 2019, 14, e0219459. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  13. Bhattacharjya, K.; Alam, S.; De, D. CUWSN: Energy efficient routing protocol selection for cluster based underwater wireless sensor network. Microsyst. Technol. 2019, 1–17. [Google Scholar] [CrossRef]
  14. Madhan, E.S.; Annamalai, R. A Novel Approach for Vehicle Type Classification and Speed Prediction Using Deep Learning. J. Comput. Theoret. Nanosci. 2020, 17, 2237–2242. [Google Scholar] [CrossRef]
  15. Sahana, S.; Singh, K. Fuzzy based energy efficient underwater routing protocol. J. Discret. Math. Sci. Cryptogr. 2019, 22, 1501–1515. [Google Scholar] [CrossRef]
  16. Fang, W.; Zhang, W.; Chen, W.; Liu, J.; Ni, Y.; Yang, Y. MSCR: Multidimensional secure clustered routing scheme in hierarchical wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2021, 2021, 1–20. [Google Scholar] [CrossRef]
  17. Gomathi, R.M.; Manickam, J.M.L.; Sivasangari, A.; Ajitha, P. Energy efficient dynamic clustering routing protocol in underwater wireless sensor networks. Int. J. Netw. Virtual Organ. 2020, 22, 415–432. [Google Scholar] [CrossRef]
  18. Sher, A.; Javaid, N.; Azam, I.; Ahmad, H.; Abdul, W.; Ghouzali, S.; Niaz, I.A.; Khan, F.A. Monitoring square and circular fields with sensors using energy-efficient cluster-based routing for underwater wireless sensor networks. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717717189. [Google Scholar] [CrossRef] [Green Version]
  19. Karim, S.; Shaikh, F.K.; Aurangzeb, K.; Chowdhry, B.S.; Alhussein, M. Anchor nodes assisted cluster-based routing protocol for reliable data transfer in underwater wireless sensor networks. IEEE Access 2021, 9, 36730–36747. [Google Scholar] [CrossRef]
  20. Zhu, F.; Wei, J. An energy efficient routing protocol based on layers and unequal clusters in underwater wireless sensor networks. J. Sens. 2018, 2018, 5835730. [Google Scholar] [CrossRef]
  21. Saravana Kumar, C. An Authentication Technique for Accessing De-Duplicated Data from Private Cloud using One Time Password. Int. J. Inf. Secur. Priv. 2017, 11, 1–10. [Google Scholar] [CrossRef]
  22. Neelakandan, S.; Paulraj, D. A gradient boosted decision tree-based sentiment classification of twitter data. Int. J. Wavelets Multiresolution Inf. Processing 2020, 18, 1–21. [Google Scholar] [CrossRef]
  23. Yang, J.; Gao, H. Cultural emperor penguin optimizer and its application for face recognition. Math. Probl. Eng. 2020, 2020, 9579538. [Google Scholar] [CrossRef]
  24. Berlin, M.A.; Tripathi, S. IoT-based traffic prediction and traffic signal control system for smart city. Soft Comput. 2021, 25, 12241–12248. [Google Scholar] [CrossRef]
  25. Khan, M.F.; Bibi, M.; Aadil, F.; Lee, J.W. Adaptive Node Clustering for Underwater Sensor Networks. Sensors 2021, 21, 4514. [Google Scholar] [CrossRef]
  26. Pretty Diana Cyril, C.; Rene Beulah, J.; Neelakandan, S.; Prakash, M.; Harshavardhan, A.; Sivabalaselvamani, D. An automated learning model for sentiment analysis and data classification of Twitter data using balanced CA-SVM. Concurrent Eng. 2021, 29, 386–395. [Google Scholar] [CrossRef]
  27. Paulraj, D. An Automated Exploring And Learning Model For Data Prediction Using Balanced CA-SVM. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 4979–4990. [Google Scholar] [CrossRef]
  28. Subbulakshmi, P.; Ramalakshmi, V. Honest Auction Based Spectrum Assignment and Exploiting Spectrum Sensing Data Falsification Attack Using Stochastic Game Theory in Wireless Cognitive Radio Network. Wirel. Pers. Commun.—Int. J. 2018, 102, 799–816. [Google Scholar] [CrossRef]
  29. Mirjalili, S.Z.; Mirjalili, S.; Saremi, S.; Faris, H.; Aljarah, I. Grasshopper optimization algorithm for multi-objective optimization problems. Appl. Intell. 2018, 48, 805–820. [Google Scholar] [CrossRef]
  30. Subahi, A.F.; Alotaibi, Y.; Khalaf, O.I.; Ajesh, F. Packet drop battling mechanism for energy aware detection in wireless networks. Comput. Mater. Contin. 2020, 66, 2077–2086. [Google Scholar] [CrossRef]
  31. Veeraiah, N.; Khalaf, O.I.; Prasad, C.V.P.R.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S.A.; Alsufyani, N. Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 2021, 9, 120996–121005. [Google Scholar] [CrossRef]
  32. Bharany, S.; Sharma, S.; Badotra, S.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol. Energies 2021, 14, 6016. [Google Scholar] [CrossRef]
  33. Palanisamy, S.; Thangaraju, B.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. A Novel Approach of Design and Analysis of a Hexagonal Fractal Antenna Array (HFAA) for Next-Generation Wireless Communication. Energies 2021, 14, 6204. [Google Scholar] [CrossRef]
  34. Alotaibi, Y.; Malik, M.N.; Khan, H.H.; Batool, A.; ul Islam, S.; Alsufyani, A.; Alghamdi, S. Suggestion Mining from Opinionated Text of Big Social Media Data. CMC-Comput. Mater. Contin. 2021, 68, 3323–3338. [Google Scholar] [CrossRef]
  35. Alotaibi, Y. A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics. CMC-Comput. Mater. Contin. 2021, 66, 1879–1895. [Google Scholar] [CrossRef]
  36. Suryanarayana, G.; Chandran, K.; Khalaf, O.I.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S.A. Accurate Magnetic Resonance Image Super-Resolution Using Deep Networks and Gaussian Filtering in the Stationary Wavelet Domain. IEEE Access 2021, 9, 71406–71417. [Google Scholar] [CrossRef]
  37. Kamalraj, R.; Ranjith Kumar, V.; Rao, C.S.; Anand, R.; Singh, H. Interpretable filter based convolutional neural network (IF-CNN) for glucose prediction and classification using PD-SS algorithm. Measurement 2021, 183, 109804. [Google Scholar] [CrossRef]
  38. Kavitha, T.; Mathai, P.P.; Karthikeyan, C.; Ashok, M.; Kohar, R.; Avanija, J.; Neelakandan, S. Deep Learning Based Capsule Neural Network Model for Breast Cancer Diagnosis Using Mammogram Images. Interdiscip. Sci. Comput. Life Sci. 2021, 1–17. [Google Scholar] [CrossRef]
  39. Reshma, G.; Al-Atroshi, C.; Nassa, V.K.; Geetha, B.; Sunitha, G.; Galety, M.G.; Neelakandan, S. Deep Learning-Based Skin Lesion Diagnosis Model Using Dermoscopic Images. Intell. Autom. Soft Comput. 2022, 31, 621–634. [Google Scholar] [CrossRef]
  40. Arun, A.; Bhukya, R.R.; Hardas, B.M.; Kumar, T.C.A.; Ashok, M. An Automated Word Embedding with Parameter Tuned Model for Web Crawling. Intell. Autom. Soft Comput. 2022, 32, 1617–1632. [Google Scholar]
  41. Li, G.; Liu, F.; Sharma, A.; Khalaf, O.I.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S. Research on the natural language recognition method based on cluster analysis using neural network. Math. Probl. Eng. 2021, 2021, 9982305. [Google Scholar] [CrossRef]
  42. Alsufyani, A.; Alotaibi, Y.; Almagrabi, A.O.; Alghamdi, S.A.; Alsufyani, N. Optimized intelligent data management framework for a cyber-physical system for computational applications. Complex Intell. Syst. 2021, 1–13. [Google Scholar] [CrossRef]
  43. Annamalai, R.; Rayen, S.J.; Arunajsmine, J. Social Media Networks Owing To Disruptions for Effective Learning. Procedia Comput. Sci. 2020, 172, 145–151. [Google Scholar] [CrossRef]
  44. Divyabharathi, S. Large scale optimization to minimize network traffic using MapReduce in big data applications. In Proceedings of the International Conference on Computation of Power, Energy Information and Communication (ICCPEIC), Melmaruvathur, India, 20–21 April 2016; pp. 193–199. [Google Scholar] [CrossRef]
  45. Jain, D.K.; Sah Tyagi, S.K.K.; Prakash, M.; Natrayan, L. Metaheuristic Optimization-based Resource Allocation Technique for Cybertwin-driven 6G on IoE Environment. IEEE Trans. Ind. Inform. 2021. [Google Scholar] [CrossRef]
  46. Asha, P.; Natrayan, L.; Geetha, B.T.; Rene Beulah, J.; Sumathy, R.; Varalakshmi, G. IoT enabled environmental toxicology for air pollution monitoring using AI techniques. Environ. Res. 2022, 205, 112574. [Google Scholar] [CrossRef] [PubMed]
  47. Venu, D.; Mayuri, A.V.R.; Murthy, G.L.N.; Arulkumar, N.; Shelke, N. An Efficient Low Complexity Compression based Optimal Homomorphic Encryption for Secure Fiber Optic Communication. Optik 2021, 168545. [Google Scholar] [CrossRef]
  48. Supreet, K.; Rajiv, M. Hybrid meta-heuristic optimization based energy efficient protocol for wireless sensor networks. Egypt. Inform. J. 2018, 19, 145–150. [Google Scholar] [CrossRef]
  49. Jha, N.; Prashar, D.; Khalaf, O.I.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S. Blockchain Based Crop Insurance: A Decentralized Insurance System for Modernization of Indian Farmers. Sustainability 2021, 13, 8921. [Google Scholar] [CrossRef]
Figure 1. Overview of cluster based UWSN.
Figure 1. Overview of cluster based UWSN.
Sensors 22 00415 g001
Figure 2. Workflow of CEPO algorithm.
Figure 2. Workflow of CEPO algorithm.
Sensors 22 00415 g002
Figure 3. NSN analysis of MCR-UWSN method with existing approaches.
Figure 3. NSN analysis of MCR-UWSN method with existing approaches.
Sensors 22 00415 g003
Figure 4. Result analysis of MCR-UWSN method with different measures.
Figure 4. Result analysis of MCR-UWSN method with different measures.
Sensors 22 00415 g004
Figure 5. TEC analysis of MCR-UWSN method under distinct rounds.
Figure 5. TEC analysis of MCR-UWSN method under distinct rounds.
Sensors 22 00415 g005
Figure 6. NREE analysis of MCR-UWSN method with existing approaches.
Figure 6. NREE analysis of MCR-UWSN method with existing approaches.
Sensors 22 00415 g006
Figure 7. NRP analysis of MCR-UWSN method with existing approaches.
Figure 7. NRP analysis of MCR-UWSN method with existing approaches.
Sensors 22 00415 g007
Table 1. Network lifetime analysis of the MCR-UWSN model with different measures.
Table 1. Network lifetime analysis of the MCR-UWSN model with different measures.
Number of Rounds
LEACHLEACH-ANTCUWSNEOCAACOCRMCR-UWSN
FND424560629689805852
HND64681389194910501121
LND710906989102111651187
Table 2. Result analysis of MCR-UWSN model in terms of the number of rounds for energy exhausted (NREE).
Table 2. Result analysis of MCR-UWSN model in terms of the number of rounds for energy exhausted (NREE).
Number of Rounds for Energy Exhausted (NREE)
Number of NodesLEACHLEACH-ANTCUWSNEOCAACOCRMCR-UWSN
3004636317187759191000
3255236917518599521045
35061979382390410001093
37567082691999111111186
400709913985102711681264
4257819461021111112011288
45082610451090115612521336
47586810991138122513061387
50092811381231126714111489
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Subramani, N.; Mohan, P.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I. An Efficient Metaheuristic-Based Clustering with Routing Protocol for Underwater Wireless Sensor Networks. Sensors 2022, 22, 415. https://doi.org/10.3390/s22020415

AMA Style

Subramani N, Mohan P, Alotaibi Y, Alghamdi S, Khalaf OI. An Efficient Metaheuristic-Based Clustering with Routing Protocol for Underwater Wireless Sensor Networks. Sensors. 2022; 22(2):415. https://doi.org/10.3390/s22020415

Chicago/Turabian Style

Subramani, Neelakandan, Prakash Mohan, Youseef Alotaibi, Saleh Alghamdi, and Osamah Ibrahim Khalaf. 2022. "An Efficient Metaheuristic-Based Clustering with Routing Protocol for Underwater Wireless Sensor Networks" Sensors 22, no. 2: 415. https://doi.org/10.3390/s22020415

APA Style

Subramani, N., Mohan, P., Alotaibi, Y., Alghamdi, S., & Khalaf, O. I. (2022). An Efficient Metaheuristic-Based Clustering with Routing Protocol for Underwater Wireless Sensor Networks. Sensors, 22(2), 415. https://doi.org/10.3390/s22020415

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop