Next Article in Journal
Cascade Brillouin Lasing in a Tellurite-Glass Microsphere Resonator with Whispering Gallery Modes
Previous Article in Journal
Method for Film Thickness Mapping with an Astigmatic Optical Profilometer
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Chaotic Search-and-Rescue-Optimization-Based Multi-Hop Data Transmission Protocol for Underwater Wireless Sensor Networks

by
Durairaj Anuradha
1,*,
Neelakandan Subramani
2,
Osamah Ibrahim Khalaf
3,
Youseef Alotaibi
4,
Saleh Alghamdi
5 and
Manjula Rajagopal
6
1
Department of Computer Science and Business Systems, Panimalar Engineering College, Chennai 600123, India
2
Department of Computer Science and Engineering, R.M.K Engineering College, Chennai 600123, India
3
Al-Nahrain Nano Renewable Energy Research Center, Al-Nahrain University, Baghdad 64074, Iraq
4
Department of Computer Science, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia
5
Department of Information Technology, College of Computers and Information Technology, Taif University, Taif 21944, Saudi Arabia
6
Department of Computer Science and Engineering, School of Computing, SRM Institute of Science and Technology, Kattankulathur, Chennai 603203, India
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(8), 2867; https://doi.org/10.3390/s22082867
Submission received: 25 February 2022 / Revised: 3 April 2022 / Accepted: 5 April 2022 / Published: 8 April 2022
(This article belongs to the Section Sensor Networks)

Abstract

:
Underwater wireless sensor networks (UWSNs) have applications in several fields, such as disaster management, underwater navigation, and environment monitoring. Since the nodes in UWSNs are restricted to inbuilt batteries, the effective utilization of available energy becomes essential. Clustering and routing approaches can be employed as energy-efficient solutions for UWSNs. However, the cluster-based routing techniques developed for conventional wireless networks cannot be employed for a UWSN because of the low bandwidth, spread stay, underwater current, and error probability. To resolve these issues, this article introduces a novel chaotic search-and-rescue-optimization-based multi-hop data transmission (CSRO-MHDT) protocol for UWSNs. When using the CSRO-MHDT technique, cluster headers (CHs) are selected and clusters are prearranged, rendering a range of features, including remaining energy, intracluster distance, and intercluster detachment. Additionally, the chaotic search and rescue optimization (CSRO) algorithm is discussed, which is created by incorporating chaotic notions into the classic search and rescue optimization (SRO) algorithm. In addition, the CSRO-MHDT approach calculates a fitness function that takes residual energy, distance, and node degree into account, among other factors. A distinctive aspect of the paper is demonstrated by the development of the CSRO algorithm for route optimization, which was developed in-house. To validate the success of the CSRO-MHDT method, a sequence of tests were carried out, and the results showed the CSRO-MHDT method to have a packet delivery ratio (PDR) of 88%, whereas the energy-efficient clustering routing protocol (EECRP), the fuzzy C-means and moth–flame optimization (FCMMFO), the fuzzy scheme and particle swarm optimization (FBCPSO), the energy-efficient grid routing based on 3D cubes (EGRC), and the low-energy adaptive clustering hierarchy based on expected residual energy (LEACH-ERE) methods have reached lesser PDRs of 83%, 81%, 78%, 77%, and 75%, respectively, for 1000 rounds. The CSRO-MHDT technique resulted in higher values of number of packets received (NPR) under all rounds. For instance, with 50 rounds, the CSRO-MHDT technique attained a higher NPR of 3792%.

1. Introduction

An underwater wireless sensor network (UWSN) consists of several underwater wireless sensors distributed within the marine environment that assist wide-ranging applications, including navigation, surveillance, disaster prevention, data acquisition, and resource exploration [1,2,3]. All the sensors of a UWSN are armed with an acoustic modem since they employ acoustic signals to interact with one another [4,5,6]. This node is able to form a network without any architecture. The sensors are responsible for monitoring the underwater environments, namely the temperature, and transmit the gathered information to a sink node (SN) via a single hop or many hops [7,8,9]. The SN, placed on the aquatic surface, is capable of receiving the information from underwater sensors via acoustic signal and transmitting the collected information to terrestrial network devices via radio signal [10,11,12]. In underwater environments, the radio signal attenuates quickly and faces the absorption problem. Therefore, they are unsuitable for longer-distance underwater communication.
The complete upsurge is adapted at the time of submerged communication since it is lesser affected by scattering, absorption loss, and attenuation [13,14]. The acoustic signal propagates slowly causing higher propagation delay. Furthermore, there is another drawback of the underwater acoustic network, namely the high error rate, and the low bandwidth. Hence, it uses lot of energy to effectively transfer information packs in a UWSN and keeps the better presentation of a UWSN. Moreover, the sensors have constrained energy, and it is not easier to redistribute or recharge them [15,16,17]. Thus, the network lifetime and energy consumption are primary concerns in a UWSN.
The routing protocol for a UWSN deals with the path selection to transmit data packets to the surface destination in an effective and efficient manner [18,19]. In recent times, engineers, researchers, and scientists have employed the routing protocol to examine the underwater medium for various applications. The proposal of the routing protocol for UWSNs is of great significance. This protocol identifies a path from the bottom to the top of the water surface for ensuring system efficiency, based on the desired parameter [20,21]. Especially, the problems related to the underwater medium and at the time of packet forwarding are taken into account by this protocol for achieving the optimum efficiency of the network based on the intended purpose. For example, this protocol deals with the shadow zones, high propagation delay, constrained battery power, movement of the sensors with water current, reliable transmission of data packet at the time of unfavorable channel condition, severe noise, and interference [22].
The transmission of information through the multi-hop method was proved in [23] to be efficient in energy preservation in longer-distance transmission than the single-hop method. Therefore, it was necessary to discover the optimum multi-hop paths for achieving improved transmission efficacy, reduced packet loss ratio (PLR), and minimized energy consumption at the time of data transmission [24,25].
This article develops an effective chaotic search-and-rescue-optimization-based multi-hop data transmission (CSRO-MHDT) protocol for UWSNs to optimize energy efficiency and lifetime. At the initial stage, the CSRO-MHDT protocol involves the design of a weighted clustering approach (WCA) for the effectual selection of cluster heads (CHs) and cluster construction. In addition, the CSRO algorithm is presented by integrating the chaotic concepts into the traditional search and rescue optimization (SRO) algorithm. Moreover, the CSRO-MHDT technique has a suitability purpose, connecting remaining energy, reserves, and node degrees. For assessing the better outcomes of the CSRO-MHDT technique, a wide-ranging experimental analysis was carried out and the results were assessed under several aspects.
The following is the outline for the remainder of the paper. Refer to Section 2 for additional information on relevant works. Then, Section 3 delves into the specifics of the suggested paradigm. Then, Section 4 examines the performance of the suggested model, and Section 5 concludes the research.

2. Related Works

According to Durrani and colleagues [26], an adoptive, clustered-node routing method for a smart ocean underwater sensor network has been presented (SOSNET). The described approach makes use of a moth–flame optimizer (MFO) to calculate the near-optimal number of clusters that are required for routing to be effective. Moth migration toward the light is taken into consideration while using the MFO, a biologically inspired optimization technique.
NR et al. [27] introduced the lion optimized cognitive acoustic network (LOCAN) for reducing packet delay and packet loss at the time of transmitting packets in a UWASN; these are caused by water column variation, including the Doppler effect and geometric spreading (GS). Doppler effects form because of sensor node movement and sea surface variations, including temperature and salinity.
The authors in [28] developed a protocol-inspired method called the beckoning penguin swarm optimization protocol (BPSOP), which was inspired by the natural features of penguins. The foraging features of penguins are employed for finding the optimal route in a UWSN.
The authors in [29] designed an energy-effectual and void-region-avoidance routing method. The idea of the GWO approach is utilized for selecting an optimal forwarder node. The presented method expands the lifetime of the network by balancing the network energy and preventing the void region.
In [30], a new approach, called improved energy-balanced routing (IEBR), was developed for UWSNs. The presented method consists of two phases: data broadcast and routing establishment. To begin, a precise method for determining the transmission distance is developed in order to locate the neighbor at the optimal distance and to determine the submerged net connections [31,32,33]. Additionally, IEBR selects relays based on neighbor depth, minimizes hops in a connection-based depth threshold, and eliminates the data communication loop issue [34,35].
Rajeswari et al. [36] developed a cooperative ray optimization approach (CoROA), which assists in minimizing the packet loss and delay, which rise because of the geometric spreading and Doppler environments in underwater acoustic networks. The presented method is recognized for its effective performance in distinct environments, including spatial and temporal variations, where the throughput, battery life, and network lifetime are improved.
To improve the overall efficiency of a system, Fei et al. [37] suggested a hybrid clustering technique based on FCM and MFO with the goal of boosting system efficiency (FCMMFO) [38,39]. In order to achieve this, the researchers first used FCM to generate energy-efficient clusters, and then applied an optimization approach known as MFO to select the ideal CH for each cluster [40,41].
Yuhan Su et al. investigated the impacts of transmission-obliging broadcast and radio channel circumstances on submerged acoustic communication, and we calculated the best transmit power setting factor. No prior knowledge of the IoUT model was required to implement the proposed technique. The suggested technique can increase IoUT transmission performance according to the findings of the simulation. Compared with Q-learning, the DQN-based approach upsurges the joint information by 3% and decreases the outage likelihood by 40%. We plan to examine cooperative communications in IoUT in greater detail in the future. To increase cooperative communication in relay-assisted IoUT systems, novel reinforcement learning algorithms with low computational and communication overheads need to be developed.
Zhigang Jin et al. proposed a mobbing-avoidance routing protocol for UASNs based on strengthening knowledge. Through exploration, the RCAR protocol finds the best route to minimize congestion and save energy. The RCAR protocol extends reinforcement learning’s reward function with congestion and energy. To speed up the meeting process and to ensure the best routing decision, we used a simulated steering tube with changeable radius based on neighboring average residual energy.
Yougan Chen et al. offered the PB-ACR protocol for multi-hop UASNs, which includes node payload balancing as well as DCC. The energy consumption of each system node can be lowered by grouping packets based on the importance of the data included in them. While maintaining an appropriate balance between node payload and cooperative gain, the proposed PB-ACR protocol has the potential to improve system life and throughput when compared with the existing ACAR protocol.
In a study by Jianying Zhu et al., the proposed algorithm’s advantages diminish with the node count. This technique is also well-matched with the noncooperative ACOA-AFSA fusion algorithm, and it has a reasonable level of difficulty in time-variant marine surroundings. Therefore, the suggested ACOA-AFSA fusion DCC technique is more ideal for medium-sized networks, where it can boost data transmission reliability, while extending the life of a system. In future study, we will simplify the suggested algorithm’s hardware implementation to make it appropriate for other underwater acoustic networking applications. Table 1 shows the current state of wireless sensor networks (WSNs) using clustering and multi-hop routing.

3. The Proposed Model

In this study, a novel CSRO-MHDT method was developed for the optimal choice of routes for data transmission in a UWSN. Clustering is a well-known energy-saving strategy in sensor networks. The least-cost-clustering steering procedure (MCCP) is one of the clustering-based routing protocols (UWSNs). This parameter is composed of three important values: the total energy consumed by member nodes during data transfer to the CH, the total energy residual on the bunch head node and its associate bulges, and the distance between the cluster head node and the originating base station. The major intention of the CSRO-MHDT technique is to the reduce energy dissipation and enhance the lifetime of a UWSN. Primarily, the CSRO-MHDT technique involves WCA for the effectual choice of CHs. In addition, the CSRO-MHDT technique derives a fitness function and can effectually select the set of routes in a UWSN. Figure 1 presents the general procedure of the CSRO-MHDT method.

3.1. System Model

The system contains N dynamic bulges, which are sparse and arbitrarily dispersed during an L × L × L process. The data source is water-medium-sensed data. The data were gathered utilizing an underwater sensor. The current flow, pressure, and temperature are the identified parameters. The underwater sensor was prepared with an acoustic modem, which enables them to communicate with other nodes in the aquatic environment [42,43,44,45]. An SN is equipped with both a radio frequency (RF) and an acoustic modem for communication with the base station (BS) on the surface landmass; the SN’s acoustic modem receives data from underwater sensors, while the RF modem communicates with the base station (BS) by transmitting data through the base station. Despite the fact that it has a short transmission distance, the BS is capable of traversing a sensing field and collecting data from sensor nodes on the field. Each sensor node’s power consumption is lowered, since fewer relays are required to transmit the sensor’s message to the BS. It can be considered that the network condition is related to the networks. The topology varies rapidly due to the fact that underwater sensors are transferable, depending on water current velocities of around 1–3 m/s [46,47,48,49,50]. The network condition can be considered as follows:
  • The bulges identify their place and the place of the SN in a primary situation.
  • The node can develop the C H and the CM/relay.
  • The CH rotates amongst the sensors to conserve energy.
Acoustic waves in an underwater broadcast medium have distinct characteristics from radio waves; hence, a WSN cannot be employed for underwater broadcasting networks. For the present study, we used the power consumption strategy of an underwater acoustic channel [51,52,53,54,55,56]. The energy required to transport k bits of information across a reserve, d, at an information amount, R, is computed as follows:
E T x ( k , d ) = k × E e l e c + k R P t x
where E e l e c implies the power utilization for routing 1 bit of information and P T x stands for the transmitted power.
In order to received k bits of information, the receiver radio power utilization is provided under the following:
E R x ( k ) = k P r
Assume that P r refers the constants dependent upon the devices. In order to fuse k bits of data, the power utilization is formulated as:
E D A ( k ) = k × E D A 0
where E D A 0 refers the energy used for fusing 1 bit of data, for instance, in use, as 5 nJ/bit. Fusing data is a frequent and successful method for removing data redundancy, shrinking data size, and lowering energy consumption. The data fusion is implemented in this research using an upgraded back propagation neural network (BPNN). Sensor nodes in UWSNs may collect information with great dismissal. When superfluous information is directed to the SN, wasteful energy ingesting occurs, resulting in the node’s premature death and the network’s lifespan being shortened. In comparison, if the CHNs integrate the data and send it to the SN, then significant energy savings may be realized [57,58]. While the node is mobile, caused by the water current, it can be located according to the random motion of the node under the functioning time. The current velocity is 1–3 m s .

3.2. Process Involved in a WCA

The weight clustering technique defines the CH and utilized cluster infrastructure utilizing three measures: node degree ( N D i ) , ( R E S i ) , and distance ( D I S i ) . For all the nodes, the weight, P i , was computed as:
P i = w 1 R E S i + w 2 D I S i + w 3 N D i
However, w 1 , w 2 , and w 3 signify the coefficient of model state, as follows:
w 1 + w 2 + w 3 = 1
The S N ( x ) for transmitting k bits of data to the receiver at distance, d , is calculated as follows:
R E S = E ( E T ( k , d ) + E R ( k ) )
where E and E T demonstrate the present energy level of the SN and the energy spent on data distributing, respectively.
E T ( k , d ) = k E e + K E a d 2
where E e stands for the electron energy, E a implies the energy has been utilized in implication, and E R ( k ) defines the energy transmitted on the received data.
E R ( k ) = k E e
In addition, the mean value of the distance between neighboring nodes, which exist as single-hop neighbors, can be calculated as follows:
D I S = j = 1 N B i d i s t ( i , n b j ) N B i
Although d i s t ( i , n b j ) describes distance of the SN from the neighboring jth SN, eventually, the NDEG implies the quantity of neighboring nodes, which have a transmitting radius, as follows:
N D E G = | N ( x ) |
At this point, N ( x ) = { n y d i s t ( x , y ) < t r a n s r a n g e } x y , and d i s t ( x , y ) defines the distance between two nodes, n x and n y , and t r a n s r a n g e stands for the transmission range of the nodes.

3.3. Design of the CSRO Algorithm

The position of the lost human is the primary motivation of the search and rescue optimization method for optimization problems, and the significance of the clue originating in this position defines the cost of the solution. Now, the best method discloses a good position with additional hints [59]. When leaving certain clues, people seek the best option across the search method. However, the search position for the individual is kept in a situation matrix (matrix X ), with the equivalent size of the memory matrix, and the left clue can be saved in a memory matrix (matrix M ) . n × d shows the problem parameter and n determines the individual quantity in the group.
C = [ X M ] = [ X 1 , 1 X 1 , d X n , l X n , d M 1 , 1 M 1 , d M n , l M n , d ]
From the above equation, assuming there are random clues amongst the obtained clues, the search direction can be attained by the following:
s d i = ( X j C k ) ,   Where   k i
where C k denotes a random value among 1 and 2 N , X i , and C k defines the position of the i th human and the k th clue, respectively. s d i indicates the search direction of the clues. It is noticed that C k equals X j ,   k i . For avoiding repetitive position searches, the parameter of X i will not be modified by moving in the indicated direction [60,61,62,63,64]. The SAR approach uses a binomial crossover operator for applying to the limitations. Moreover, when the clue has greater significance compared with the current clue, a region was searched for the s p i direction. Otherwise, a search for the location of the existing position in the s p i is continuous. Therefore, the novel position of the j th variable is expressed by the ith human, as follows:
X i , j = { | C k , j + r 1 × ( X i , j C k , j )   i f   f ( C k ) > f ( X i ) | X i , j + r 2 × ( X i , j C k , j )   i f   r 2 < s p i   o r   j = j r , j 1 , , d | X i   o t h e r w i s e
where c k , j denotes the position of variable j and the clue k .   j r ,   r 1 , and r 2 represent three uniform random numbers within [ 1 ,   d ] ,   [ 1 , 1 ] , and [ 0 , 1 ] , respectively. The second stage is about the individual. Here, an exploitation term has been performed regarding the human’s current location [65,66,67,68]. This stage employs the distinct clues connection concept from the social stage. The position, upgraded by the human, i , can be attained as follows:
X i = X j + r 3 × ( C k C m )
where r 3 denotes a uniformly distributed number between 0 and 1, C m   and C k define two arbitrary numbers between 1 and 2 N , respectively, and i k m . They could testify that they are in the solution space afterward, solving the solution from the preceding stages. This phase is named the boundary. In such cases, the following formula is utilized when the solution is placed outside the border:
X i j = { ( X i j + X j   max   ) 2   i f   X i j > X j   max   ( X i , j + X j   min   ) 2   i f   X i j < X j   min    
where j = 1 , 2 , , d ,   X j min , and X j max represent the minimal and maximal thresholds for the parameter j , respectively. According to this stage, the lost human candidate is searched for on the basis of the previously elucidated technique. When the sum of the cost function in a given scenario, X i ( f ( X i ) ) , is superior to the existing one, ( f ( X i ) ) , then the preceding location (X) would be saved in an accidental position in the memory matrix (M), and would be described as novel situation. If not, then the situation would be left, and the memory would not be upgraded.
M n = { X j   i f   f ( X i ) > f ( X i ) M n   o t h e r w i s e  
X i = { X i   i f   f ( X i ) > f ( X i ) X i   o t h e r w i s e  
where n determines a random integer among 1 and N , and M n defines the location of clue number, n , in the memory matrix.
Time is critical in locating lost individuals due to threat of injury, and any delay that occurs at the time of searching could lead to death [69,70,71,72]. Hence, when a person does not discover a notable clue during their search, it leaves the next person with the existing position.
u s n i = { u s n i + 1   i f   f ( X i ) < f ( X i ) 0   o t h e r w i s e  
where u s n determines the unproductive searching number. When u s n is superior to M U for a person, it moves towards the other location in the space solution. Figure 2 portrays the flow chart of SRO method.
Search and rescue optimization (SRO), when searching for people, typically takes place in two distinct phases: social and individual. Collection followers search for clues founded in their location, and focus on areas that are more likely to yield clues in the social phase. There is no regard for where or how many clues have been found by others during the individual search phase. In general, clues fall into two categories, as follows:
  • Remember to save a clue: A member of the exploration group is present and searching the surrounding area.
  • Forgotten clue: Members of the group discovered the clue, but no one is in the location to solve it. To put it another way, the person who discovered the hint has abandoned it in search of further potentially relevant information. Members of the group, on the other hand, have access to the information about that clue.
To increase exploration competence and ensure that the ideal answer is reached, the chaotic approach is combined with the krill head algorithm (KHA). Because Chebyshev maps are the most utilized chaotic behavioral maps, chaotic sequences are likely to be created efficiently and fast. Furthermore, longer sequences are not necessary.
Therefore, the existing solution has been switched to an accidental resolution in the solution space, according to Equation (7) for a possible solution, when u s n > M U   ( M u l t i U s e r ) . In addition, for an unfeasible solution, u s n is superior to M U , the memory matrix solution using the minimum number of limitation violations is selected, and the current solution is switched through the solution, so that the current solution substitutes the memory matrix.
X i j = X j   min   + r 4 × ( X j   max   X j   min   )   j = 1 , 2 ,   d
where r 4 shows a frequently distributed random number within the range of 0–1. Under instruction to recover the worldwide optimization capability of an SRO algorithm, the chaotic concept is integrated into it. The chaotic state is an unstable state, which is extremely sensitive to initial conditions, which can be utilized for avoiding the local optimum problem and improving the quality of the solution. It is applied for achieving improved exploration and exploitation in every searching region, thereby enhancing the outcome in determining optimum global solutions [46,47,48]. The chaotic map was used in this study to indicate human searches around their current location in the individual phase, and the concept of linking different hints is used in the communal stage for exploration. In contrast to the social stage, the separation stage changed every dimension of X i j . Time is an important factor in the search-and-rescue procedure, because missing individuals may be hurt, and search-and-rescue parties arriving late may result in death. As a result, these processes should be designed in such a way that a huge amount of data is examined in as short a period of time as possible. As a result, if a human did not find the best hints after running a specific search count in their location, they would leave and go to a different site.
x i k + 1 = x i k + C n a p × ( x B H x i k ) ,   i = 1 , 2 , , N
where x i k and x i k + 1 denote positions at iterations k and k + 1 and C m a p represents a chaotic map. In this work, ten chaotic maps were used to determine the random values involved in the SRO algorithm.

3.4. Application of CSRO Algorithm for Data Transmission

The main function of the CSRO algorithm is maximizing the lifespan of networks and minimizing energy utilization of all sensor nodes. Assume that h 1 is the most objective function, such that C H is selected as the next hop, C H , with a superior RE, to route the data; such that, for maximizing the network lifespan, for instance, h 1 is maximization. Assume that h 2 is another main function that has a minimal distance among the C H s to the next hop C H , and the next hop C H , to the base station ( B S ) . This procedure occurs under the instruction to decrease the energy utilization of the network as required for minimizing h 2 . Assume that h 3 is the third main function; thus, C H s is selected as the next hop among the C H s with a lesser node degree. In order to improve the lifespan of the network, h 3 must be minimized. Assume that b i j is a Boolean variable, determined as follows:
b i j = { 1 i f   n e x t h o p ( C H i ) = C H j ,   i , j 1 i ,   j m   0 O t h e r w i s e
Minimize   F = 1 h 1 × β 1 + h 2 × β 2 + h 3 × β 3
which is subject to the following:
d i s ( C H i , C H j ) d m a x C H j ( C + B S )
j = 1 m b i j = 1   a n d   1 j
The constraint in (23) means that the next hop node of C H i will be in the range of C H i , and that the next hop node is C H j . β 1 ,     β 2 , β 3 indicate the anchor nodes with the target distance. The constraint in (25) declares that the next hop node of C H i is unique, for instance, C H j , and the constraint makes sure that there could not be 0 or 100% weight on either of the objectives.

4. Performance Validation

This section analyzes the CSRO-MHDT method in comparison with recent methods of effective data transmission processes in a UWSN. The consequences are reviewed under variable rounds of execution. Table 2 and Figure 3 demonstrate an examination of the comparative number of alive nodes (NAN) of the CSRO-MHDT technique under varying rounds. The results indicated that the CSRO-MHDT technique has increased values of NAN under all rounds. For instance, with 440 rounds, the CSRO-MHDT technique has obtained a higher NAN of 300, whereas the energy-efficient clustering routing protocol (EECRP), the fuzzy C-means and moth–flame optimization (FCMMFO), the fuzzy scheme and particle swarm optimization (FBCPSO), the energy-efficient grid routing based on 3D cubes (EGRC), and the low-energy adaptive clustering hierarchy based on expected residual energy (LEACH-ERE) models have attained lower NAN results of 296, 290, 299, 298, and 287 nodes, respectively. In addition, with 600 rounds, the CSRO-MHDT technique has an increased NAN result of 279, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE models have lower NAN results of 264, 253, 240, 243, and 238 nodes, respectively. Moreover, with 920 rounds, the CSRO-MHDT technique accomplished a higher NAN result of 68, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE models demonstrated lower NAN results of 20, 0, 0, 0, and 0 nodes, respectively.
First node dies (FND), half node dies (HND), and last node dies (LND) are examples of the comparative network area evaluation of the CSRO-MHDT technique, as shown in Table 3 and Figure 4, respectively (LND). The results indicated that the CSRO-MHDT technique has resulted in lengthened lifetime over the existing methods. With respect to FND, the CSRO-MHDT method reached FND at 476 rounds, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE models attained FND at earlier rounds of 440, 403, 361, 323, and 280, respectively. In addition, in terms of HND, the CSRO-MHDT system reached HND at 838 rounds, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE techniques reached HND at earlier rounds of 754, 749, 730, 753, and 722, respectively. Finally, with respect to LND, the CSRO-MHDT approach reached LND at 998 rounds, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE techniques reached LND at earlier rounds of 940, 921, 903, 874, and 840, respectively.
Next, a brief TEC investigation of the CSRO-MHDT method in comparison with existing approaches is provided in Table 4 and Figure 5. The results indicated that the CSRO-MHDT technique had the lowest TEC under all rounds compared with existing methods. For example, with 50 rounds, the CSRO-MHDT method obtained lower TEC of 2.22%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE models achieved higher TEC of 2.46%, 2.71%, 5.39%, 5.15%, and 7.59%, respectively. With 500 rounds, the CSRO-MHDT system had the lowest TEC of 34.16%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE models achieved higher TEC of 39.29%, 39.29%, 56.84%, 46.60%, and 65.87%, respectively. Finally, with 1000 rounds, the CSRO-MHDT technique had the lowest TEC of 99%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE methodologies attained higher TEC of 99.55%, 99.52%, 99.61%, 100%, and 100%, respectively.
A detailed PLR analysis of the CSRO-MHDT approach in comparison with recent methods is offered in Table 5 and Figure 6. The outcomes showed that the CSRO-MHDT technique had the lowest PLR under all rounds compared with existing approaches. For instance, with 50 rounds, the CSRO-MHDT algorithm had decreased PLR of 1%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE systems obtained higher PLR of 1%, 1%, 1%, 1%, and 1%, respectively. Next, with 500 rounds, the CSRO-MHDT technique had a low PLR of 2%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE models had higher PLR results of 5%, 7%, 8%, 9%, and 10%, respectively. Finally, with 1000 rounds, the CSRO-MHDT technique had a low PLR of 12%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE models had increased PLR of 17%, 19%, 22%, 23%, and 25%, respectively.
Table 6 and Figure 7 illustrate the number of packets received (NPR) by the CSRO-MHDT system under varying rounds, in comparison with existing approaches. The results showed that the CSRO-MHDT technique had higher values of NPR under all rounds. For instance, with 50 rounds, the CSRO-MHDT technique attained higher NPR of 3792%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE approaches had lower NPR results of 3400%, 2549%, 2876%, 2026%, and 1554%, respectively. With 500 rounds, the CSRO-MHDT method had higher NPR of 17,924%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE models had lower NPR results of 17,401%, 16,027%, 14,784%, 12,167%, and 11,837%, respectively. Furthermore, with 1000 rounds, the CSRO-MHDT system accomplished a higher NPR result of 23,098%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE algorithms demonstrated lower NPR results of 21,457%, 19,887%, 18,775%, 14,849%, and 14,427%, respectively.
Table 7 and Figure 8 depict the PDR analysis of the CSRO-MHDT algorithm under varying rounds in comparison with existing approaches. The outcomes revealed that the CSRO-MHDT technique resulted in increased values of PDR under all rounds. For instance, with 150 rounds, the CSRO-MHDT technique attained superior PDR of 99%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE models reached lower PDR results of 99%, 99%, 98%, 97%, and 97%, respectively. Moreover, with 500 rounds, the CSRO-MHDT approach had an increased PDR of 98%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE models obtained lower PDR results of 95%, 93%, 92%, 91%, and 90%, respectively. Finally, with 1000 rounds, the CSRO-MHDT technique accomplished a higher PDR of 88%, whereas the EECRP, FCMMFO, FBCPSO, EGRC, and LEACH-ERE techniques exhibited reduced PDR of 83%, 81%, 78%, 77%, and 75%, respectively.
By examining the above results and discussion, it can be confirmed that the CSRO-MHDT technique can accomplish effective data transmission in a UWSN.

5. Conclusions

In this study, a novel CSRO-MHDT method was developed for the optimal choice of routes for data transmission in a UWSN. The primary intention of the CSRO-MHDT technique is to reduce energy dissipation and enhance the lifetime of the UWSN. Primarily, the CSRO-MHDT technique involves WCA for effective choice of CHs. In addition, the CSRO-MHDT technique derived a fitness function and effectively selected a set of routes in a UWSN. For assessing the outcomes of the CSRO-MHDT technique, a wide-ranging experimental examination was carried out and the results were assessed under several aspects. The extensive comparative analysis highlighted the superior performance of the CSRO-MHDT technique over recent state-of-the-art approaches. Therefore, the CSRO-MHDT method can be used in application for optimal data transmission in UWSNs. In the future, delay-aware data aggregation schemes can be designed to improve the efficiency of UWSNs.

Author Contributions

Conceptualization, N.S. and D.A.; organization, N.S. and D.A.; validation, N.S. and Y.A.; formal analysis, M.R. and N.S.; investigation, D.A. and N.S.; resources, N.S. and M.R.; data curation, D.A., S.A. and M.R.; writing—original draft preparation, D.A.; writing—review and editing, N.S. and Y.A.; visualization, O.I.K. and S.A.; supervision, N.S. and Y.A.; project administration, N.S. and Y.A.; funding acquisition, Y.A. All authors have read and agreed to the published version of the manuscript.

Funding

This Research is funded by Umm Al-Qura University, 22UQU4281768DSR03.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code: (22UQU4281768DSR03).

Conflicts of Interest

The Authors declare no conflict of interest.

References

  1. Awan, K.M.; Shah, P.A.; Iqbal, K.; Gillani, S.; Ahmad, W.; Nam, Y. Underwater wireless sensor networks: A review of recent issues and challenges. Wirel. Commun. Mob. Comput. 2019, 2019, 6470359. [Google Scholar] [CrossRef]
  2. Khalaf, O.I.; Abdulsahib, G.M. Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks. Peer-Peer Netw. Appl. 2021, 14, 2858–2873. [Google Scholar] [CrossRef]
  3. Srilakshmi, U.; Alghamdi, S.; Ankalu, V.V.; Veeraiah, N.; Alotaibi, Y. A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access 2022, 10, 14260–14269. [Google Scholar] [CrossRef]
  4. Choudhary, M.; Goyal, N. A rendezvous point-based data gathering in underwater wireless sensor networks for monitoring applications. Int. J. Commun. Syst. 2022, 14, e5078. [Google Scholar] [CrossRef]
  5. Alotaibi, Y.; Subahi, A.F. New goal-oriented requirements extraction framework for e-health services: A case study of diagnostic testing during the COVID-19 outbreak. Bus. Process Manag. J. 2021, 38, 1–19. [Google Scholar] [CrossRef]
  6. Rajendran, S.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S. MapReduce-based big data classification model using feature subset selection and hyperparameter tuned deep belief network. Sci. Rep. 2021, 11, 24138. [Google Scholar] [CrossRef]
  7. Xiao, X.; Huang, H.; Wang, W. Underwater wireless sensor networks: An energy-efficient clustering routing protocol based on data fusion and genetic algorithms. Appl. Sci. 2021, 11, 312. [Google Scholar] [CrossRef]
  8. Palanisamy, S.; Thangaraju, B.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S. Design and Synthesis of Multi-Mode Bandpass Filter for Wireless Applications. Electronics 2021, 10, 2853. [Google Scholar] [CrossRef]
  9. Rout, R.; Parida, P.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I. Skin Lesion Extraction Using Multiscale Morphological Local Variance Reconstruction Based Watershed Transform and Fast Fuzzy C-Means Clustering. Symmetry 2021, 13, 2085. [Google Scholar] [CrossRef]
  10. Jouhari, M.; Ibrahimi, K.; Tembine, H.; Ben-Othman, J. Underwater wireless sensor networks: A survey on enabling technologies, localization protocols, and internet of underwater things. IEEE Access 2019, 7, 96879–96899. [Google Scholar] [CrossRef]
  11. Palanisamy, S.; Thangaraju, B.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. A Novel Approach of Design and Analysis of a Hexagonal Fractal Antenna Array (HFAA) for Next-Generation Wireless Communication. Energies 2021, 14, 6204. [Google Scholar] [CrossRef]
  12. Bharany, S.; Sharma, S.; Badotra, S.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Alassery, F. Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol. Energies 2021, 14, 6016. [Google Scholar] [CrossRef]
  13. Zhang, J.; Cai, M.; Han, G.; Qian, Y.; Shu, L. Cellular clustering-based interference-aware data transmission protocol for underwater acoustic sensor networks. IEEE Trans. Veh. Technol. 2020, 69, 3217–3230. [Google Scholar] [CrossRef]
  14. Alsufyani, A.; Alotaibi, Y.; Almagrabi, A.O.; Alghamdi, S.A.; Alsufyani, N. Optimized intelligent data management framework for a cyber-physical system for computational applications. Complex Intell. Syst. 2021, 192, 1–13. [Google Scholar] [CrossRef]
  15. Yu, W.; Chen, Y.; Wan, L.; Zhang, X.; Zhu, P.; Xu, X. An energy optimization clustering scheme for multi-hop underwater acoustic cooperative sensor networks. IEEE Access 2020, 8, 89171–89184. [Google Scholar] [CrossRef]
  16. Khalaf, O.I.; Ghaida, M.A. Energy Efficient Routing and Reliable Data Transmission Protocol in WSN. Int. J. Adv. Soft Comput. Its Appl. 2020, 12, 45–53. [Google Scholar]
  17. Subahi, A.F.; Alotaibi, Y.; Khalaf, O.I.; Ajesh, F. Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks. CMC-Computers. Mater. Contin. 2020, 66, 2077–2086. [Google Scholar]
  18. Zhou, Y.; Yang, H.; Hu, Y.; Kung, S. Cross-layer network lifetime maximization in underwater wireless sensor networks. IEEE Syst. J. 2020, 14, 220–231. [Google Scholar] [CrossRef]
  19. Paulraj, D. An Automated Exploring and Learning Model for Data Prediction Using Balanced CA-SVM. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 4979–4990. [Google Scholar]
  20. Wang, Z.; Han, G.; Qin, H.; Zhang, S.; Sui, Y. An energy-aware and void-avoidable routing protocol for underwater sensor networks. IEEE Access 2018, 6, 7792–7801. [Google Scholar] [CrossRef]
  21. Chithambaramani, R.; Prakash, M. An Efficient Applications Cloud Interoperability Framework UsingI-Anfis. Symmetry 2021, 13, 268. [Google Scholar]
  22. Khan, H.; Hassan, S.A.; Jung, H. On underwater wireless sensor networks routing protocols: A review. IEEE Sens. J. 2020, 20, 10371–10386. [Google Scholar] [CrossRef]
  23. Yahya, A.; Islam, S.U.; Zahid, M.; Ahmed, G.; Raza, M.; Pervaiz, H.; Yang, F. Cooperative routing for energy efficient underwater wireless sensor networks. IEEE Access 2019, 7, 141888–141899. [Google Scholar] [CrossRef]
  24. Mohan, P.; Subramani, N.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I.; Ulaganathan, S. Improved Metaheuristics-Based Clustering with Multihop Routing Protocol for Underwater Wireless Sensor Networks. Sensors 2022, 22, 1618. [Google Scholar] [CrossRef] [PubMed]
  25. Srilakshmi, U.; Veeraiah, N.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I.; Subbayamma, B.V. An Improved Hybrid Secure Multipath Routing Protocol for MANET. IEEE Access 2021, 9, 163043–163053. [Google Scholar] [CrossRef]
  26. Durrani, M.Y.; Tariq, R.; Aadil, F.; Maqsood, M.; Nam, Y.; Muhammad, K. Adaptive node clustering technique for smart ocean under water sensor network (SOSNET). Sensors 2019, 19, 1145. [Google Scholar] [CrossRef] [Green Version]
  27. Rajeswari, A.; Duraipandian, N.; Shanker, N.; Samuel, B.E. Improving packet delivery performance in water column variations through LOCAN in underwater acoustic sensor network. J. Sens. 2020, 2020, 7960654. [Google Scholar] [CrossRef]
  28. Khalaf, O.I.; Abdulsahib, G.M.; Sabbar, B.M. Optimization of Wireless Sensor Network Coverage using the Bee Algorithm. J. Inf. Sci. Eng. 2020, 36, 377–386. [Google Scholar]
  29. Gola, K.K.; Gupta, B. Underwater acoustic sensor networks: An energy efficient and void avoidance routing based on grey wolf optimization algorithm. Arab. J. Sci. Eng. 2021, 46, 3939–3954. [Google Scholar] [CrossRef]
  30. Feng, P.; Qin, D.; Ji, P.; Zhao, M.; Guo, R.; Berhane, T.M. Improved energy-balanced algorithm for underwater wireless sensor network based on depth threshold and energy level partition. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 228. [Google Scholar] [CrossRef] [Green Version]
  31. Suryanarayana, G.; Chandran, K.; Khalaf, O.I.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S.A. Accurate Magnetic Resonance Image Super-Resolution Using Deep Networks and Gaussian Filtering in the Stationary Wavelet Domain. IEEE Access 2021, 9, 71406–71417. [Google Scholar] [CrossRef]
  32. Sindu, V.; Prakash, M. Comparative Analysis Among Decision Tree vs. Naive Bayes for Prediction of Weather Prognostication. Smart Intell. Comput. Commun. Technol. 2021, 38, 94–100. [Google Scholar]
  33. Li, G.; Liu, F.; Sharma, A.; Khalaf, O.I.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S. Research on the natural language recognition method based on cluster analysis using neural network. Math. Probl. Eng. 2021, 2021, 9982305. [Google Scholar] [CrossRef]
  34. Neelakandan, S.; Berlin, S.; Brindha Devi, V.; Indu, B.; Arulkumar, N. IoT Based Traffic Prediction and Traffic Signal Control System for Smart City. Soft Comput. 2021, 25, 12241–12248. [Google Scholar] [CrossRef]
  35. Jha, N.; Prashar, D.; Khalaf, O.I.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S. Blockchain Based Crop Insurance: A Decentralized Insurance System for Modernization of Indian Farmers. Sustainability 2021, 13, 8921. [Google Scholar] [CrossRef]
  36. Abdulsahib, G.M.; Khalaf, O.I. Accurate and effective data collection with minimum energy path selection in wireless sensor networks using mobile sinks. J. Inf. Technol. Manag. 2021, 13, 139–153. [Google Scholar]
  37. Fei, W.; Hexiang, B.; Deyu, L.; Jianjun, W. Energy-efficient clustering algorithm in underwater sensor networks based on fuzzy C means and Moth-flame optimization method. IEEE Access 2020, 8, 97474–97484. [Google Scholar] [CrossRef]
  38. Alotaibi, Y. A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics. CMC-Comput. Mater. Contin. 2021, 66, 1879–1895. [Google Scholar] [CrossRef]
  39. Kamalraj, R.; Neelakandan, S.; Ranjithkumar, M.; Chandra Sekhar, R.; Rohit Anand, R.; Harinder, S. Interpretable Filter Based Convolutional Neural Network (IF-CNN) For Glucose Prediction and Classification Using PD-SS Algorithm. Measurement 2021, 183, 109804. [Google Scholar] [CrossRef]
  40. Alotaibi, Y. A New Secured E-Government Efficiency Model for Sustainable Services Provision. J. Inf. Secur. Cybercrimes Res. 2020, 3, 75–96. [Google Scholar] [CrossRef]
  41. Khan, H.H.; Malik, M.N.; Zafar, R.; Goni, F.A.; Chofreh, A.G.; Klemeš, J.J.; Alotaibi, Y. Challenges for sustainable smart city development: A conceptual framework. Sustain. Dev. 2020, 28, 1507–1518. [Google Scholar] [CrossRef]
  42. Subramani, N.; Mohan, P.; Alotaibi, Y.; Alghamdi, S.; Khalaf, O.I. An Efficient Metaheuristic-Based Clustering with Routing Protocol for Underwater Wireless Sensor Networks. Sensors 2022, 22, 415. [Google Scholar] [CrossRef] [PubMed]
  43. Khan, M.F.; Bibi, M.; Aadil, F.; Lee, J.W. Adaptive Node Clustering for Underwater Sensor Networks. Sensors 2021, 21, 4514. [Google Scholar] [CrossRef] [PubMed]
  44. Houssein, E.H.; Saber, E.; Ali, A.A.; Wazery, Y.M. Centroid mutation-based Search and Rescue optimization algorithm for feature selection and classification. Expert Syst. Appl. 2022, 191, 116235. [Google Scholar] [CrossRef]
  45. Satpathy, S.; Debbarma, S.; Sengupta Aditya, S.C.; Bhattacaryya Bidyut, K.D. Design a FPGA, fuzzy based, insolent method for prediction of multi-diseases in rural area. J. Intell. Fuzzy Syst. 2019, 37, 7039–7046. [Google Scholar] [CrossRef]
  46. Li, M.; Xu, G.; Lai, Q.; Chen, J. A chaotic strategy-based quadratic Opposition-Based Learning adaptive variable-speed whale optimization algorithm. Math. Comput. Simul. 2022, 193, 71–99. [Google Scholar] [CrossRef]
  47. Veeraiah, N.; Khalaf, O.I.; Prasad, C.V.P.R.; Alotaibi, Y.; Alsufyani, A.; Alghamdi, S.A.; Alsufyani, N. Trust aware secure energy efficient hybrid protocol for manet. IEEE Access 2021, 9, 120996–121005. [Google Scholar] [CrossRef]
  48. Pretty Diana Cyril, C.; Rene Beulah, J.; Harshavardhan, A.; Sivabalaselvamani, D. An automated learning model for sentiment analysis and data classification of Twitter data using balanced CA-SVM. Concurr. Eng. Res. Appl. 2021, 29, 386–395. [Google Scholar] [CrossRef]
  49. Reshma, G.; Al-Atroshi, C.; Nassa, V.K.; Geetha, B. Deep Learning-Based Skin Lesion Diagnosis Model Using Dermoscopic Images. Intell. Autom. Soft Comput. 2022, 31, 621–634. [Google Scholar] [CrossRef]
  50. Arun, A.; Bhukya, R.R.; Hardas, B.M.; Anil Kumar, C.T.; Ashok, M. An Automated Word Embedding with Parameter Tuned Model for Web Crawling. Intell. Autom. Soft Comput. 2022, 32, 1617–1632. [Google Scholar]
  51. Asha, P.; Natrayan, L.; Geetha, B.T.; Beulah, J.R.; Sumathy, R.; Varalakshmi, G. IoT enabled environmental toxicology for air pollution monitoring using AI techniques. Environ. Res. 2022, 205, 112574. [Google Scholar] [CrossRef] [PubMed]
  52. Paulraj, D. A gradient boosted decision tree-based sentiment classification of twitter data. Int. J. Wavelets. Multiresolut. Inf. Processing 2020, 18, 205027. [Google Scholar] [CrossRef]
  53. Annamalai, R.; Rayen, S.J.; Arunajsmine, J. Social Media Networks Owing to Disruptions for Effective Learning. Procedia Comput. Sci. 2020, 172, 145–151. [Google Scholar] [CrossRef]
  54. Anand, J.G. Trust based optimal routing. In Proceedings of the MANET’s 2011 International Conference on Emerging Trends in Electrical and Computer Technology, Nagercoil, India, 23–24 March 2011; pp. 1150–1156. [Google Scholar] [CrossRef]
  55. Divyabharathi, S. Large scale optimization to minimize network traffic using MapReduce in big data applications. In Proceedings of the 2016 International Conference on Computation of Power, Energy Information and Commuincation, Melmaruvathur, India, 20–21 April 2016; pp. 193–199. [Google Scholar] [CrossRef]
  56. Beulah, J.R.; Prathiba, L.; Murthy, G.L.N.; Fantin Irudaya Raj, E.; Arulkumar, N. Blockchain with deep learning-enabled secure healthcare data transmission and diagnostic model. Int. J. Modeling Simul. Sci. Computing. 2021, 15, 1–14. [Google Scholar] [CrossRef]
  57. Venu, D.; Mayuri, A.V.R.; Murthy, G.L.N.; Arulkumar, N.; Shelke, N. An efficient low complexity compression based optimal homomorphic encryption for secure fiber optic communication. Optik 2022, 252, 168545. [Google Scholar] [CrossRef]
  58. Jain, D.K.; Tyagi, S.K.K.S.; Prakash, M.; Natrayan, L. Metaheuristic Optimization-based Resource Allocation Technique for Cybertwin-driven 6G on IoE Environment. IEEE Trans. Ind. Inform. 2021. [Google Scholar] [CrossRef]
  59. Alotaibi, Y.; Malik, M.N.; Khan, H.H.; Batool, A.; ul Islam, S.; Alsufyani, A.; Alghamdi, S. Suggestion Mining from Opinionated Text of Big Social Media Data. CMC-Comput. Mater. Contin. 2021, 68, 3323–3338. [Google Scholar] [CrossRef]
  60. Alotaibi, Y. Automated Business Process Modelling for Analyzing Sustainable System Requirements Engineering. In Proceedings of the 2020 6th International Conference on Information Management, London, UK, 27–29 March 2020; pp. 157–161. [Google Scholar]
  61. Kavitha, T.; Mathai, P.P.; Karthikeyan, C.; Ashok, M.; Kohar, R.; Avanija, J.; Neelakandan, S. Deep Learning Based Capsule Neural Network Model for Breast Cancer Diagnosis Using Mammogram Images. Interdiscip. Sci. Comput. Life Sci. 2021, 14, 113–129. [Google Scholar] [CrossRef]
  62. Sunitha, G.; Geetha, K.; Neelakandan, S.; Pundir, A.K.; Hemalatha, S.; Kumar, V. Intelligent deep learning based ethnicity recognition and classification using facial images. Image Vis. Comput. 2022, 121, 104404. [Google Scholar] [CrossRef]
  63. Su, Y.; Wang, M.L. Optimal cooperative relaying and power control for IoUT networks with reinforcement learning. IEEE Internet Things J. 2021, 8, 791–801. [Google Scholar] [CrossRef]
  64. Jin, Z. RCAR: A reinforcement-learning-based routing protocol for congestion-avoided underwater acoustic sensor networks. IEEE Sens. J. 2019, 19, 10881–10891. [Google Scholar] [CrossRef]
  65. Harinder Singh, D.; Ramya, R. Saravanakumar, Nayani Sateesh, Rohit Anand, Swarnjit Singh Artificial intelligence based quality of transmission predictive model for cognitive optical networks. Optik 2022, 257, 168789. [Google Scholar] [CrossRef]
  66. Chen, Y.; Tang, Y. PB-ACR: Node Payload Balanced Ant Colony Optimal Cooperative Routing for Multi-Hop Under water Acoustic Sensor Networks. IEEE Access 2021, 9, 57165–57178. [Google Scholar] [CrossRef]
  67. Chen, Y.; Zhu, J.; Wan, L.; Huang, S.; Zhang, X.; Xu, X. ACOA-AFSA Fusion Dynamic Coded Cooperation Routing for Different Scale Multi- Hop Underwater Acoustic Sensor Networks. IEEE Access 2020, 8, 186773–186788. [Google Scholar] [CrossRef]
  68. Bhargava, S.; Mohan, K.; Robert, N.R.; Upadhye, S. Optimal Stacked Sparse Autoencoder Based Traffic Flow Prediction in Intelligent Transportation Systems. Innov. Vis. Appl. Stud. Syst. Decis. Control. 2022, 412, 111–127. [Google Scholar] [CrossRef]
  69. Jayapradha, J.; Prakash, M.; Alotaibi, Y.; Khalaf, O.I.; Alghamdi, S. Heap Bucketization Anonymity-An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes. IEEE Access 2022, 10, 28773–28791. [Google Scholar] [CrossRef]
  70. Rawat, S.S.; Alghamdi, S.; Kumar, G.; Alotaibi, Y.; Khalaf, O.I.; Verma, L.P. Infrared Small Target Detection Based on Partial Sum Minimization and Total Variation. Mathematics 2022, 10, 671. [Google Scholar] [CrossRef]
  71. Hemavathi; Akhila, S.R.; Alotaibi, Y.; Khalaf, O.I.; Alghamdi, S. Authentication and Resource Allocation Strategies during Handoff for 5G IoVs Using Deep Learning. Energies 2022, 15, 2006. [Google Scholar] [CrossRef]
  72. Alotaibi, Y. A New Meta-Heuristics Data Clustering Algorithm Based on Tabu Search and Adaptive Search Memory. Symmetry 2022, 14, 623. [Google Scholar] [CrossRef]
Figure 1. Overall process of the CSRO-MHDT technique.
Figure 1. Overall process of the CSRO-MHDT technique.
Sensors 22 02867 g001
Figure 2. Flowchart of SRO.
Figure 2. Flowchart of SRO.
Sensors 22 02867 g002
Figure 3. NAN analysis of the CSRO-MHDT technique in comparison with existing approaches.
Figure 3. NAN analysis of the CSRO-MHDT technique in comparison with existing approaches.
Sensors 22 02867 g003
Figure 4. Network lifetime analysis of the CSRO-MHDT technique in comparison with existing approaches.
Figure 4. Network lifetime analysis of the CSRO-MHDT technique in comparison with existing approaches.
Sensors 22 02867 g004
Figure 5. TEC analysis of the CSRO-MHDT method in comparison with current tactics.
Figure 5. TEC analysis of the CSRO-MHDT method in comparison with current tactics.
Sensors 22 02867 g005
Figure 6. PLR analysis of the CSRO-MHDT technique in comparison with existing approaches.
Figure 6. PLR analysis of the CSRO-MHDT technique in comparison with existing approaches.
Sensors 22 02867 g006
Figure 7. NPR analysis of the CSRO-MHDT technique in comparison with existing approaches.
Figure 7. NPR analysis of the CSRO-MHDT technique in comparison with existing approaches.
Sensors 22 02867 g007
Figure 8. PDR analysis of the CSRO-MHDT technique in comparison with existing approaches.
Figure 8. PDR analysis of the CSRO-MHDT technique in comparison with existing approaches.
Sensors 22 02867 g008
Table 1. Summary of existing approaches.
Table 1. Summary of existing approaches.
Reference No.Published YearApproachAdvantagesDisadvantages
[26]2019Adaptive node clusteringThroughput and reliability are high in clustering processNetwork life time
[27]2020LOCAN methodologyEnergy consumptionPacket loss
[28]2020Bee algorithmReliable transmissionNot suitable for deep UWSNs
[29]2021Grey wolf optimization algorithmReducing packet loss and traffic systemsSensor failure
[30]2019Threshold and energy level partitionReducing delay and high throughputMaximizing energy
Resources
[36]2021Path selection strategyHigh throughputTime delay
[37]2020Fuzzy C means and moth–flame optimization methodReducing energy
consumption
Time delay
Packet loss
Proposed Approach2022Chaotic search and rescue optimizationReliable transmission, Reducing time delay and high throughputPacket loss in high level nodes
Table 2. NAN study of the CSRO-MHDT technique in comparison with existing methods analyzed under different rounds.
Table 2. NAN study of the CSRO-MHDT technique in comparison with existing methods analyzed under different rounds.
No. of Alive Nodes
No. of RoundsCSRO-MHDTEECRPFCMMFOFBCPSOEGRCLEACH-ERE
0300300300300300300
40300300300300300300
80300300300300300300
120300300300300300300
160300300300300300300
200300300300300300300
240300300300300300300
280300300300300300299
320300300300300299297
360300300300297298295
400300300298298297290
440300296290299298287
480296294287290290285
520294288279284281271
560287276268262264254
600279264253240243238
640269234230202228218
680253217211188187179
720226183172169160152
76021414213213014050
80018311312189953
840139729456200
88011628371200
92068200000
9602800000
1000000000
Table 3. Network lifetime analysis of the CSRO-MHDT technique in comparison with existing approaches.
Table 3. Network lifetime analysis of the CSRO-MHDT technique in comparison with existing approaches.
No. of Rounds
CSRO-MHDTEECRPFCMMFOFBCPSOEGRCLEACH-ERE
FND476440403361323280
HND838754749730753722
LND998940921903874840
Table 4. TEC analysis of the CSRO-MHDT technique in comparison with existing approaches with different rounds.
Table 4. TEC analysis of the CSRO-MHDT technique in comparison with existing approaches with different rounds.
Total Energy Consumption (%)
No. of RoundsCSRO-MHDTEECRPFBCPSOFCMMFOEGRCLEACH-ERE
00.510.760.761.491.492.71
251.491.001.252.223.445.88
502.222.462.715.395.157.59
753.203.684.426.616.3712.22
1004.434.665.888.328.0714.66
1254.426.127.1011.499.7815.88
1507.147.349.2912.2211.4919.29
1758.279.5410.5113.9313.6822.46
2009.9711.0012.9516.6117.8324.90
22510.4112.9514.9019.0519.2928.56
25012.3915.1416.8521.7320.2731.73
27514.3417.1018.8023.4422.4635.38
30016.8018.5621.9725.8724.9039.53
32517.0219.7822.2229.0429.2941.24
35020.4822.4623.9233.1929.2947.82
37523.1424.4125.6337.3333.9250.99
40025.6126.3627.0940.5035.1458.31
42528.8029.2929.5346.6040.7557.57
45030.0231.4831.7350.2644.1660.99
47531.9735.3834.4152.4545.3863.43
50034.1639.2939.2956.8446.6065.87
52535.6339.5340.9961.9650.2670.74
55037.0945.3845.1464.6555.3873.18
57540.5047.0949.0469.5257.0977.81
60041.7250.5052.4575.3862.4580.74
62545.6354.4057.8279.7665.8787.57
65050.9958.5560.5084.6470.2590.25
67552.9461.2363.6788.5478.7993.42
70058.0665.6269.2891.7181.7295.37
72560.2670.5073.6795.6187.5798.05
75067.0875.6276.8495.6188.5499.52
77570.5078.5582.9398.6193.66100.00
80073.4285.3787.5798.6196.59100.00
82576.8488.3091.4798.6198.05100.00
85081.2393.4294.1598.6198.78100.00
87586.8496.8397.8199.61100.00100.00
90089.2797.5799.2799.61100.00100.00
92592.6999.0399.3499.61100.00100.00
95095.8698.7899.4399.61100.00100.00
97598.0599.5299.4599.61100.00100.00
100099.0099.5599.5299.61100.00100.00
Table 5. PLR analysis of the CSRO-MHDT technique in comparison with existing approaches.
Table 5. PLR analysis of the CSRO-MHDT technique in comparison with existing approaches.
Packet Loss Ratio (%)
No. of RoundsCSRO-MHDTEECRPFBCPSOFCMMFOEGRCLEACH-ERE
0000000
50111111
100111112
150111233
200112343
250123344
300123455
350234566
400235677
450246789
5002578910
55036891011
600479101112
6505810111214
7006811111415
7507912141516
80071013151817
85081215171919
90091316172021
950101518212223
1000121719222325
Table 6. NPR analysis of the CSRO-MHDT technique in comparison with existing approaches.
Table 6. NPR analysis of the CSRO-MHDT technique in comparison with existing approaches.
No. of Packets Received (%)
No. of RoundsCSRO-MHDTEECRPFBCPSOFCMMFOEGRCLEACH-ERE
0000000
50379234002549287620261554
100739157554970673633343054
15010,07385037587856849704751
20011,25110,3359550941967366521
25013,27911,97010,85810,13877187310
30014,52213,21312,36311,18588308336
35015,50314,45714,06412,16710,0089679
40016,74615,17614,71813,41011,05410,595
45017,07416,87715,50313,93311,70911,442
50017,92417,40116,02714,78412,16711,837
55018,70918,12017,20415,04513,14812,789
60019,88718,77517,53215,70013,73713,521
65020,41020,01818,05516,48514,39114,034
70021,52320,41018,31717,20414,65314,276
75021,85020,86819,10217,59715,11114,642
80022,04620,99919,75618,18614,98014,623
85022,56921,19520,21418,51314,84914,445
90022,76621,45720,21418,57814,84914,570
95023,02721,45720,08318,77514,78414,358
100023,09321,45719,88718,77514,84914,427
Table 7. PDR analysis of the CSRO-MHDT technique in comparison with existing approaches.
Table 7. PDR analysis of the CSRO-MHDT technique in comparison with existing approaches.
Packet Delivery Ratio (%)
No. of RoundsCSRO-MHDTEECRPFBCPSOFCMMFOEGRCLEACH-ERE
0100100100100100100
50999999999999
100999999999998
150999999989797
200999998979697
250999897979696
300999897969595
350989796959494
400989795949393
450989694939291
500989593929190
550979492919089
600969391908988
650959290898886
700949289898685
750939188868584
800939087858283
850928885838181
900918784838079
950908582797877
1000888381787775
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Anuradha, D.; Subramani, N.; Khalaf, O.I.; Alotaibi, Y.; Alghamdi, S.; Rajagopal, M. Chaotic Search-and-Rescue-Optimization-Based Multi-Hop Data Transmission Protocol for Underwater Wireless Sensor Networks. Sensors 2022, 22, 2867. https://doi.org/10.3390/s22082867

AMA Style

Anuradha D, Subramani N, Khalaf OI, Alotaibi Y, Alghamdi S, Rajagopal M. Chaotic Search-and-Rescue-Optimization-Based Multi-Hop Data Transmission Protocol for Underwater Wireless Sensor Networks. Sensors. 2022; 22(8):2867. https://doi.org/10.3390/s22082867

Chicago/Turabian Style

Anuradha, Durairaj, Neelakandan Subramani, Osamah Ibrahim Khalaf, Youseef Alotaibi, Saleh Alghamdi, and Manjula Rajagopal. 2022. "Chaotic Search-and-Rescue-Optimization-Based Multi-Hop Data Transmission Protocol for Underwater Wireless Sensor Networks" Sensors 22, no. 8: 2867. https://doi.org/10.3390/s22082867

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop