Next Article in Journal
IMU Networks for Trajectory Reconstruction in Logistics Applications
Previous Article in Journal
FireFace: Leveraging Internal Function Features for Configuration of Functions on Serverless Edge Platforms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Intelligent Bio-Inspired Autonomous Surveillance System Using Underwater Sensor Networks

1
Department of Computer Science & Engineering, ABES Engineering College, Ghaziabad 201009, India
2
Department of Computer Science & Engineering, Galgotias College of Engineering and Technology, Greater Noida 201310, India
3
Department of Computer Science and Engineering, Mahamaya Polytechnic of Information Technology (Govt.), Hathras 204102, India
4
Department of Computer Science and Information Engineering, National Chin-Yi University, No.57, Sec. 2, Zhongshan Rd., Taiping Dist., Taichung 411030, Taiwan
5
Department of Software Convergence, Andong National University, Andong 36729, Republic of Korea
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(18), 7839; https://doi.org/10.3390/s23187839
Submission received: 20 June 2023 / Revised: 24 August 2023 / Accepted: 8 September 2023 / Published: 12 September 2023
(This article belongs to the Section Communications)

Abstract

:
Energy efficiency is important for underwater sensor networks. Designing such networks is challenging due to underwater environmental traits that hinder network lifespan extension. Unlike terrestrial protocols, underwater settings require novel protocols due to slower signal propagation. To enhance energy efficiency in underwater sensor networks, ongoing research concentrates on developing innovative solutions. Thus, in this paper, an intelligent bio-inspired autonomous surveillance system using underwater sensor networks is proposed as an efficient method for data communication. The tunicate swarm algorithm is used for the election of the cluster heads by considering different parameters such as energy, distance, and density. Each layer has several clusters, each of which is led by a cluster head that continuously rotates in response to the fitness values of the SNs using the tunicate swarm algorithm. The performance of the proposed protocol is compared with existing methods such as EE-LHCR, EE-DBR, and DBR, and results show the network’s lifespan is improved by the proposed work. Due to the effective fitness parameters during cluster head elections, our suggested protocol may more effectively achieve energy balance, resulting in a longer network lifespan.

1. Introduction

In the arrangement of seas, rivers, oceans, and canals, water accounts for about 75% of the earth’s surface area. There are likely several undiscovered, valuable resources buried under the ocean’s surface. Exploratory endeavors have traditionally relied heavily on technology for their success. Previously, it was difficult to conduct underwater excursions utilizing sensors at all depths; however, recent technological breakthroughs have made it feasible. As a result, underwater sensor networks are being used as a kind of technology to facilitate underwater research. The underwater wireless sensor network (UWSN) combines wireless technology with a tremendously tiny micromechanical sensor to conduct intelligent sensing, intelligent processing, and intelligent communication [1]. The UWSN is a geographically dispersed network of autonomous SNs that monitors water-related variables such as temperature, pressure, and quality. The uncovered data may be used for a variety of applications that can be used to the advantage of individuals. Whether mobile or stationary, SNs are wirelessly linked to one another through communication modules [2] to convey a range of interesting events. The majority of underwater communication is handled through a network of nodes that communicate data to buoyant gateway nodes, which subsequently transport the data to the most convenient remote station [3]. At UWSN, acoustic transceivers are used for communication the majority of the time. Despite their narrow bandwidth and low frequency, acoustic waves possess quite long wavelengths. Therefore, information may be sent over kilometers using sonic waves, which have a vast range.
UWSNs are used for a variety of purposes, including the preservation of coasts, the monitoring of underwater pollution, the promotion of water-based activities, and the prevention of water-related catastrophes. Other responsibilities include monitoring the maritime environment for scientific research and economic utilization. UWSN is a prospective solution that can meet the requirements of ever-demanding applications. On the other hand, working with UWSN applications may be both enjoyable and difficult. This is because it is impossible to forecast the characteristics of the aquatic environment, which makes the design and implementation of such networks very complex.
UWSNs, also known as underwater sensor networks, are comprised of a variable number of nodes and various pieces of equipment that are dispersed over an underwater region of interest. The so-called deployed nodes and vehicles collaborate to perform various monitoring activities in this area [4]. SNs that are submerged in bodies of water enable several applications to function well. The collection of data from water and the sea, the extraction of oil from distant places, early warning systems to prevent the development of natural disasters, navigational assistance, and military surveillance are a few of these applications. Variation distinguishes the aquatic environment [4,5,6,7,8]. Changes in chemical composition, current strength, temperature, pressure, and a range of other variables are possible continuously. Self-coordination is essential for a node to function individualistically with existing SNs by exchanging data on several elements, such as depth, the spatial procedure of nodes that may vary with water currents, and packet forwarding with the base station.
This may be accomplished by using a node’s capabilities for self-communication. To effectively monitor and communicate in a dynamic environment such as this, the SNs comprising an underwater network must be adaptable, self-organizing, and autonomous. As radio signals, the transmission medium of typical ground-based sensor networks, are quickly absorbed by water, underwater wireless sensor networks (UWSNs) rely largely on auditory communication channels. Due to the circumstances underwater, acoustic modems are subjected to greater stress, which increases the amount of energy required for data transmission. Consequently, it is challenging and essential to discover methods for preserving power efficiency in the design of UWSNs. [9,10]. Low frequency, a longer wavelength, and a narrower bandwidth are typical characteristics of the acoustic waves created by UWSNs. Due to their characteristics, acoustic channels are favored for long-distance communication. The UWSN node that is geographically closest to an underwater event is the one that gathers data and transmits it across an auditory channel to the node that is closest to it. This process is continued until the information conveyed over a network of nodes reaches the surface-based sinks. To survive, a network of underwater sensors must adapt and reorganize due to the increasing forces present in the underwater environment [11,12,13]. Self-optimization is crucial for UWSNs to decrease power drainage and, as a result, increase the network’s lifetime [14,15]. Among other things, this is because of problems with power consumption, propagation delays, and synchronization. This would allow UWSNs to provide services in time-sensitive application situations. This paper contributes to the existing body of information on UWSNs by proposing a strategy for UWSNs that is both energy-efficient and extends the network’s lifetime. The proposed protocol is designed to maintain symmetrical energy drainage across all nodes in a cluster, thereby extending the lifetime of the network using the tunicate swarm algorithm (TSA) [16]. This work adds to the existing body of knowledge on routing protocol difficulties associated with energy efficiency in UWSNs. This was accomplished by combining the layering of nodes and the rotation of cluster heads using different fitness parameters. The major contributions of this paper are summarized as follows:
  • To propose an intelligent bio-inspired Tunicate Swarm Algorithm (TSA) based autonomous surveillance system using underwater sensor networks as an efficient method for data communication.
  • TSA is utilized to identify the optimal number of cluster heads based on the novel fitness function to enhance the network’s lifetime.
  • The fitness function takes into account critical parameters such as inter-cluster distance, residual energy of nodes, and node density, aiding in the identification of the most suitable cluster head.
  • To show the effectiveness of the proposed approach, the simulation results are compared with state-of-the-art techniques.
The remaining sections of the essay are structured as follows: In Section 2, the overall structure of UWSNs is dissected and investigated. In Section 3, the system model for UWSN is presented. The proposed methodology is given in Section 4. In Section 5, we go into further depth regarding the opportunities and obstacles in terms of simulation results that UWSN faces. Section 6 summary and conclusions bring the paper to a close.

2. Related Works

Determining a network’s routing configuration is one of the most important setup processes, and UWSN researchers have been hard at work developing various cutting-edge routing protocols over the last few years. These protocols have introduced novel techniques and concepts to a wide variety of subdomains that are now garnering considerable interest in networking literature. The vector used by vector-based forwarding (VBF) is crucial for easing the flow of information from the initial node to the sink node, which is upwards in the direction of the sink floating on the surface of the water. The use of this specific protocol results in a significant reduction in network traffic. Get on and off the bus [17]. Vector-based forwarding, also known as hop-by-hop (HH)-VBF, offers a change to the VBF protocol. As a contrast to the previously stated virtual buffer function, the virtual pipe or vector is defined before each hop. By allowing the intermediate node to pick the vector’s direction, the HH-VBF protocol ensures that forwarding may be delayed until a delivery route is established, even if there is only one accessible node within the communication range. To perform this, the intermediate node decides in which direction the vector will point. While transmitting data from one SN to another, the approach known as “depth-based routing” (DBR) [18] considers the relative depths of the SNs. Since a SN in UWSN delivers data packets downward to the sink node, a SN in DBR will not send a data packet to another SN until that node is at a shallower depth, indicating that it is closer to the surface so that a SN in a UWSN network’s DBR may relay data packets to the sink node. When a particular SN is often asked to provide data upstream because it is the node closest to the event of interest, DBR encounters a variety of issues, such as vacuum zones that hinder transmissions or unbalanced energy use. This might result in an imbalance in the node’s energy consumption. Using the previously described DBR protocol, data packets are sent via a feeding mode of transmission. This kind of transmission might result in channel occupancy and redundant data; however, the DBMR [19] protocol, which distributes data packets via a multi-hop protocol, eliminates these issues. Q-learning-based energy-efficient and lifetime-aware routing protocol (QELAR) [20] uses Q-learning, a member of the family of machine learning algorithms, to [21] extend the network’s lifetime. Q-learning seeks to reduce the load asymmetry by taking the remaining energy into account and reducing the total number of transmissions across the network. The PER [22] article employs both a node selector and a fuzzy logic framework. This critical selection applies the forward tree pruning approach to choosing which SN will transmit the data packets. In the E-PULRP [23,24] system, the nodes are placed in spherical shells that are concentric to one another. In the center of these concentric shells is a sink node, and each shell has a different energy level than the others. In the communication phase, the distance between each prospective relay node and the source is considered. The energy-efficient depth-based routing (EEDBR) [25,26] is a variant of the DBR that maintains high packing-to-delivery ratios. To perform this, the forwarding zones without a position advantage are shrunk in size. H2-DAB is a technique that is both lightweight and energy-efficient [27,28]. This protocol solves the problem of mobility, which is crucial given that the nodes under the water may move owing to currents. Each SN has a unique node ID and hop ID. The Hop ID represents the number of hops a data packet must traverse from the SN to the sink node. Since it is straightforward to obtain both the node ID and the hop ID, it is possible to dynamically update addresses even if nodes are moving. The rate at which this protocol’s addresses are updated is a characteristic that causes some concern. The VAPR [29] protocol analyses the number of node hops and the depth information when selecting where to proceed next. Even though UWSN makes it easy to obtain depth data, this method may make it difficult to obtain exact location data. During the improved beaconing phase, the beacon information, which may include the hop count, depth details, and the direction in which data are sent, is imprinted into each SN. During the second phase, SNs transmit data packets in the direction in which the data will be carried on the next hop. The construction of an ideal depth function that facilitates frequent depth threshold alterations is one manner through which AMCTD [30] extends the lifespan of the network. This is accomplished by discovering solutions to challenges such as load distribution and excessive energy use. Vacant nodes are pushed deeper in GEDAR [31,32] using depth adjustment techniques, and data packets are routed using a greedy opportunistic strategy. In the DRP [33] protocol, the transmission collision probability is taken into account while selecting the optimal route. In addition to a high transmission rate, the DRP-selected route has high residual energy. The lifetime of a network is computed by factoring in the percentage of its nodes that are active at any given moment and using that figure as input for the calculation. This fraction implicitly incorporates information about the remaining energy of network nodes when picking candidates that might serve as forwarding nodes. By considering the dependability of the connections, the network aims to extend its lifespan. The 2013 invention of improved energy-balanced routing (IE-BR) solves the issue of insufficient global energy use in UWSNs. The first stage of the two-step protocol is establishing the routing, while the second step is transmitting the data. Throughout the routing process, underwater links between sensors are constructed using a mathematical model that selects neighbors that are at optimal distances and depths. Once the routing configuration is complete, the second process, which involves data transfer while maintaining an energy balance inside the network, begins. This is carried out by dynamically rotating the links formed in the first step based on the differences in energy levels (EL) between close nodes. In the cluster-based routing protocol known as EE-MDC-HSRP [34], the mobility factor, node density, and residual energy are employed to select the cluster heads. In EVAGR [35], an empty area is managed by a weight function to pick a set of forwarding nodes, and data transmission occurs in the chosen set of nodes. The weight function takes into consideration aspects such as energy usage and the number of candidate nodes. The potential nodes are chosen based on the packet transmission directed towards the sonobuoys. Datta et al., discussed a cluster head rotation-based routing protocol for UWSNs [21]. However, this method does not efficiently utilize the energy.

3. System Model

In the proposed underwater sensor networks, the varying numbers of nodes deployed in the underwater sensor network are classified using a three-level heterogeneity model. The nodes are categorized according to their remaining energy. The model proposed in this study is based on the following assumptions:
  • The network consists of two types of nodes: underwater sensor (UWS) nodes, which are stationary and categorized into cluster heads and cluster member’s nodes due to the clustering approach, and a Sink Node located at the periphery of the surveillance area.
  • The heterogeneous network is considered in the form of heterogeneous nodes’ energy.
  • A single Sink Node is present within the network, and there are sufficient energy is available.
  • The position of the Sink Node is assumed to be known and fixed throughout the surveillance period.
  • Underwater sensor nodes possess limited energy and do not have their own energy supply.
  • Regular underwater nodes share identical baseline energy levels and unique identification numbers.
  • Node positions will be determined using a localization method.
  • The communication range between UWS nodes is assumed to be fixed, and nodes can only communicate with each other if they are within this range.
  • The network topology is assumed to be relatively static during the surveillance period, with minimal node mobility or changes in connectivity.
  • Interference from external sources or neighboring networks is assumed to be negligible, allowing for efficient communication within the network.
These assumptions collectively form the basis for the modeling and simulation of the proposed intelligent bio-inspired Tunicate Swarm Algorithm (TSA) based autonomous surveillance system using underwater sensor networks. There are a total of n nodes, and three distinct forms of energy are present: form-1 ( f 1 ), form-2 ( f 2 ), and form-3 ( f 3 ). The work has n nodes in total. The nodes with energy values of form-1 are low-energy SNs, while the nodes with energy values of form-3 are high-energy nodes. Due to their energy forms falling between those of form-1 and form-2, nodes with energy levels of form-2 satisfy the inequality form-1 < form-2 < form-3. The networks include more instances of nodes with low energy forms ( f 1 ) than nodes with intermediate energy forms ( f 2 ) and nodes with high energy forms ( f 3 ). In contrast, the inequality form-3 < form-2 < form-1 is met since nodes with the highest energy have the fewest occurrences. The whole energy usage of the network [12] is considered as
S u m f = î × n o o f n o d e s × f 1 + î 2 × n o o f n o d e s × f 2 + ( 1 î î 2 ) × n o o f n o d e s × f 3
where î is represented as the model parameter and number of form-1, form-2 and form-3 nodes are î × n o o f n o d e s , î 2 × n o o f n o d e s and ( n n ( î × n o o f n o d e s + î 2 × n o o f n o d e s ) ) with the f 1 , f 2 and f 3 energy, respectively.
By using î = 0 in (1), only one category of nodes is generated with defined energy S u m f = n o o f n o d e s × f 3 in 1-level heterogeneity. These nodes have the highest energy in the networks with the minimum number of nodes, and that can be modified as follows:
î = f 3 f 1 β × f u n ( f 2 , f 3 )
Equation (1), gives two solutions by the 1 î î 2 = 0 , i.e., ( 5 1 ) / 2 and ( 5 + 1 ) / 2 . The expression ( 5 1 ) / 2 gives values between (0, 1) and define 2-levels of heterogeneity.
The upper bond is indicated as î u p p e r _ b   w i t h   v a l u e   ( 5 1 ) / 2 and consider the lower bound as î l o w e r _ b where î satisfy the inequality î l o w e r _ b < î < î u p p e r _ b in the case of 3-level heterogeneity and consider the function value f u n as ( f 3 f 2 ) . Thus, calculate î l o w e r _ b as below:
î l o w e r _ b < f 3 f 1 β × ( f 3 f 2 ) < ( 5 1 ) / 2
Using relation î l o w e r _ b < α 2 + α 1 β α 2 and consider f 2 = α 1 + f 1 and f 3 = α 2 + f 2 gives the below
α 2 α 1 < 1 β × î l o w e r _ b 1 = α 2 α 1 1 1 β × î l o w e r _ b
If α 2 α 1 = 0 in (4) we obtained the below relation:
1 β × î l o w e r _ b < 0 = 1 β < î l o w e r _ b
By putting the value in (3) which gives as below:
( f 3 f 1 ) β × 5 1 2 × ( f 3 f 2 )
β × 5 1 × f 2 2 × f 1 β × 5 1 2 × f 3
However, the energies of three types of nodes are fixed as f 1 , f 2 = f 1 × ( 1 + ω ) and f 3 = f 1 × ( 1 + µ ) , respectively, where constants are ω = 0.06 and µ = 0.11 .
The energy consumption model is considered for the consumption of energy for the deployed underwater sensor networks, as discussed in [36]. Let the consumption of energy during the reception of data be denoted as p o w r c v d , delay in sending m bit data are represented by T m . The total energy required for transmitting m bit data over d distance is given as follows:
E T m , d = T m × p o w r c v d × a ( f )
where a ( f ) is the absorption coefficient.
The total energy required for receiving m bits of data over d distances is given as follows:
E R m , d = m × p o w p r o c
where p o w p r o c indicates the energy consumption in one-bit processing of acoustic SNs.
The total energy required for aggregating m bit data are given as follows:
E a g g m = m × p o w i n t e g t a t e
where p o w i n t e g r a t e indicating the energy consumption in the one-bit aggregation of acoustic SNs.

4. Proposed Methodology

The operating stages of the proposed method are divided into two phases, namely network setup and data transmission. These two unique stages of network operation are separated and investigated individually. We began by discussing the time required to construct the network. At this step of the method, the nodes are randomly organized, and the sink is positioned precisely in the center of the rectangular network. There are three different energy levels for nodes, which leads to the conclusion that the nodes themselves are heterogeneous.

4.1. Duration of Network Installation

We began by discussing the time required to construct the network. At this step of the method, the nodes are randomly organized, and the sink is positioned precisely in the center of the rectangular network. There are three different energy levels for nodes, which leads to the conclusion that the nodes themselves are heterogeneous. Once the network is operational, the nodes will begin to link with one another, and the CH selection process will commence. Before selecting the CH, we calculate the fitness function’s value, which will be utilized by the tunicate swarm algorithm (TSA) to determine each node’s fitness. This allows the TSA algorithm to choose the nodes with the highest probability of becoming CH. To serve as CH, the physically fittest node is chosen; this decision is based on fitness, which is based on establishing the fitness criteria. There are different parameters that are used to define the fitness function from the clustering point of view.

4.1.1. The Ability of a Node to Create Energy

The availability of energy in a node is the most significant factor in determining whether or not it will be selected as a CH. Therefore, a node’s energy availability is controlled by its initial fitness value, also known as F i t P 1 . This is essential because the energy of a node decreases with each round. The previously described Equation (11) is utilized to compute the available energy of the ith node. The desire for a node to be CH grows as its F i t P 1 value increases.
F i t P 1 = i = 1 n E c u r r e n t

4.1.2. Node Energy

Due to the fact that the nodes’ energy levels span from form 1 to form 3, respectively, the initial vitality is high. Therefore, whenever possible, it is preferable to have CH selection from high energy nodes such as form 3. This is conducted to maintain CH for the longest amount of time feasible. Using Equation (12), the energy level of the ith node may be calculated. The desire for a node to be CH grows as its F i t P 2 value increases.
F i t P 2 = i = 1 n E i

4.1.3. The Percentage of the Distance between Each Node and the Sink

Frequently, the quantity of energy required to interact with a distant node increases. Therefore, a CH should be chosen from among the nodes that are located closest to the component, also known as the sink, that is responsible for data collection. It is good to save energy. Thus, the distance between the candidate node and the sink is considered by the third fitness parameter, denoted as F i t P 3 . The calculation of the distance to the sink is shown by Equation (13).
F i t P 3 = 1 / i = 1 n D i s t a n c e S N S i n k

4.1.4. The Distance between Neighboring CHs

This aspect becomes crucial after the first round. In the initial configuration, this option had a value of 0. Once the first CH has been chosen, however, the selection of the next CH is based on the distance between the candidate node and the already-selected CH. It contributes to the maintenance of the inter-cluster distance, which in turn is responsible for the network’s energy balance. The letter F i t P 4 represents the distance between the candidate node and the CH node, which is determined by the fourth fitness parameter. Equation (14) provides the calculation for the Euclidean distance between the node and the CH.
F i t P 4 = 1 / i = 1 n D i s t a n c e S N C H

4.1.5. Node Density

Since CH collects data from each node in a cluster, the number of nodes around the candidate node must be as high as possible. As a consequence, the distance between the selected CH and the other cluster nodes will be decrease. F i t P 5 , the fifth fitness statistic, considers the effective average distance between each node and the other nodes. The procedure will proceed with the energy of the chosen CH intact. Note that, to be included as a required component of the fitness function, all of the aforementioned fitness characteristics have been harmonized over the ranges [0–1]. The following Equation (15) is used to compute a node’s average distance from the other nodes in the cluster.
F i t P 5 = 1 / ( 1 / C n ) × ( i = 1 C n r e s t = 1 C n D i s t a n c e i r e s t ( i ) ) )
Currently, the primary objective is to obtain the greatest F i t in order to obtain the highest selection of CH. Equation (16) illustrates the integration of all variables associated with fitness.
F i t = F i t P 1 × µ + F i t P 2 × µ + F i t P 3 × µ + F i t P 4 × µ + F i t P 5 × µ
µ 1 + µ 2 + µ 3 + µ 4 + µ 5   =   1
The Equation (17) represents the total of all weight variables that are considered while choosing CH. The weight provided to each of these weight components is determined by the specific purpose for which the underwater sensor network was designed.

4.2. Tunicate Swarm Based Optimized Cluster Head Selection Phase

The Tunicate Swarm Algorithm (TSA) stands as an innovative bio-derived metaheuristic technique. The algorithm’s blueprint draws inspiration from the tunicate swarm’s actions of jet propulsion and intelligent collective foraging. Initial emphasis lies on preventing clashes among exploration entities in the propulsion process. Subsequently, movement aligns with the optimal neighboring direction, culminating in convergence towards the premier search agent. The following steps are used to find the optimized CHs in the proposed network.

4.2.1. Evade Clashes Amid Exploration Entities (SAs) Vector

In order to ascertain the fresh position of the search agent and prevent clashes amidst SAs, Vector A is computed employing the subsequent Equation (18).
A C = G V / S F
where G V symbolizes the force of gravity, which can be calculated as presented by Kaur et al. [16], The computation of social forces S F among the SAs is carried out using the subsequent Equation (19).
S F = [ M i n s + r 3 × ( M a x s M i n s ) ]
where M i n s and M a x s denote the initial and subsequent velocities of social interaction, respectively.

4.2.2. Proceed in the Direction of the Optimal Neighboring Search Agent

Subsequent to conflict avoidance, the ensuing equation is employed to mathematically articulate this phenomenon.
D s t = P o s F S r a n d 1 × P o s T ( x )
D s t is the distance vector between the position of food source ( P F S ) and position of tunicate SA ( P T ) . x is the current iteration, r 4 is a random number in the range from 0   t o   1 and | | is used for absolute value.
D s t stands for the distance vector spanning between the location of the food source ( P o s F S ) and the position of the tunicate search agent ( P o s T ). The variable x signifies the current iteration, r a n d 1 denotes a random value within the range of 0 to 1.

4.2.3. Approach towards the Optimal Search Agent

To express this phenomenon mathematically, the following equation shows the optimal solution as the updated position ( P T x ) of tunicate SAs towards the food source.
To mathematically represent this phenomenon, the following equation demonstrates the optimal solution as the revised position P o s T x of tunicate search agents moving towards the food source.
P o s T x = P o s F S + A × D    i f   r 4 0.5
P o s T x = P o s F S A × D    i f   r 4 0.5

4.2.4. Swarm Dynamics Behavior

The tunicate demonstrates collective behavior, a concept characterized by the synchronization of other search agents’ positions with those of the superior search agent. The mathematical expression of the tunicate’s collective behavior is depicted as follows:
P o s T x + 1 = [ { P o s T x + P o s T x + 1 } ] / ( 2 + r 3 ) ]
Algorithm 1 shows the Tunicate Swarm based optimized cluster head selection process as follows:
Algorithm 1: Tunicate Swarm-Based Optimized Cluster Head Selection Algorithm
Input: Initial quantity of individuals SNs in the population of T i i = 1 , 2 , , n
Output: Optimal selction of CHs base on fitness of SA ( O F i t S A )
  //Initiate the Tunicate Swarm Algorithm process
1. Set the initial values of parameters A C , G V , S F and M a x _ I
2. Set Cur_I 0 , M i n s 1   a n d   M a x s 4
3. While ( Cur_I = Max_I ) Do
4.    For each k 1   t o   2 Do
5.        O F i t S A ← Assess the fitness of every search agent by employing Equation (16)
6.       Calculate A C , S F and D s t using Equations (18)–(20) respectivelly
7.      if r a n d 1 0.5 then
8.        The new location P o s T x is calculated using Equation (21)
9.      else
10.        The new location P o s T x is calculated using Equation (22)
11.     end if
12.     end for
13.   The current location of SNs are updated using Equation (23)
14.   Update the values of A C , G V , a n d   S F
15.   Cur_I I = Cur_I + 1
16.  end while
17. return O F i t S A as the CH
End TSA procedure

4.3. The Data Transfer Phase

During this phase, data are transferred from the cluster nodes to the CH. The data are then sent from the CH to the sink, where it is finally transmitted online to the user. It should be emphasized that single-hop communication is utilized throughout the entire procedure. As a result, the network no longer has issues with hot spots.
The complete working process of the proposed intelligent bio-inspired autonomous surveillance system using underwater sensor networks is defined as follows in Algorithm 2:
Algorithm 2: Complete Working Process of the Proposed Method
Input :   n o o f n o d e s = 100   t o   800 , r o u n d m a x = m a x i m u m   r o u n d s , m o n i t o r i n g   a r e a = 1000   m × 1000   m × 1000   m
Output :   n o d e a l i v e ,   n o d e d e a d , n o d e C H , and throughput
1.Sensors are placed in the underwater area i.e., 1000   m × 1000   m × 1000   m in the form of heterogeneous networks
2. Set   n o d e C H = 0 ,   E i = 0 , and E r e s i d u a l
3. for   p   = 1   to   r o u n d m a x do
4.    Set   n o d e a l i v e = n o o f n o d e s a n d   n o d e d e a d = 0
5. for   j = 1   to   n o o f n o d e s do
6.   if   E r e s i d u a l j > 0 then
7.  Execute the election procedure of cluster heads as defined in Algorithm 1
8. n o d e C H = n o d e C H + 1
9.  Enforce a steady phase for transmission and collection of the sensed data from the underwater area
10.else
11.  Update the energy dissipation E r e s i d u a l j of the node based on the utilization as defined by the energy model
12.if E r e s i d u a l ( j ) = = 0 then
13.   n o d e d e a d = n o d e d e a d + 1
14.if n o d e d e a d = = n o o f n o d e s then
15.  all available SNs are dead
16.  break
17.Else
18.   n o d e a l i v e = n o d e a l i v e n o d e d e a d
19.end if
20.end for
21.end for
22.return j
The proposed methodology encompasses two distinct phases: network setup and data transmission. This study commences with the examination of the time required for network establishment, characterized by the random arrangement of nodes and the precise positioning of the sink at the network’s center. Within this configuration, nodes exhibit three varying energy levels, resulting in a heterogeneous node population.
In the network setup phase, the critical factors affecting cluster head selection are evaluated through a fitness function. This function includes parameters such as the node’s energy availability, energy levels, distance to the sink, distance between neighboring CHs, and node density. These factors collectively contribute to a fitness value that drives CH selection. Subsequently, the Tunicate Swarm Algorithm is introduced to optimize the cluster head selection process. TSA draws inspiration from the tunicate swarm’s behaviors and employs collective foraging and propulsion tactics to enhance the selection process.
Moving into the data transfer phase, data are relayed from cluster nodes to CHs and then to the sink for ultimate delivery to users. Notably, single-hop communication is employed throughout, mitigating issues related to hotspots and promoting efficient data transmission.
The complete working process of the proposed intelligent bio-inspired autonomous surveillance system utilizing underwater sensor networks is summarized through a comprehensive algorithm. This algorithm outlines the steps required for network deployment, cluster head selection, energy management, and data transfer.
In summary, the proposed methodology encompasses network setup, data transmission, and a sophisticated Tunicate Swarm Algorithm to optimize cluster head selection. Through a well-defined algorithm, this study establishes a systematic framework for the implementation and assessment of the intelligent bio-inspired autonomous surveillance system within underwater sensor networks.

5. Simulation Results

This section assesses the performance of the proposed protocol by comparing it to that of three prominent UWSN protocols: DBR [18], EE-DBR [25,26], and EE-LHCR [37]. The performance is evaluated assuming a three-dimensional environment with dimensions of 1000   m × 1000   m × 1000   m and a total of 100 nodes distributed over 200-m-high virtual layers. Aqua-Sim, a network simulator that is an NS2.30 adaptation of an underwater simulator, is used for all programming. The simulation parameters are given as transmission range, data packet size, initial energy, power consumption for transmission mode, and power consumption for receive mode: 250 m, 50 bytes, 10,000 μj, 2.0 μj, and 0.5 μj, respectively. The performance of the proposed protocol is evaluated using the four metrics listed below: It is referred to as the network’s energy consumption when a network of SNs transfers data packets from source to sink. The delivery ratio is derived by comparing the total number of packets transmitted by the source node to the total number of packets received by the sink node. End-to-end latency is the time a packet takes to travel from its source node to its destination node. The duration between the death of the first node in a network and the death of the last node in that network is referred to as the “network lifetime.” Theoretically, a network may continue to function even after the death of its last node. Table 1 shows the parameter values for the simulation.

5.1. Utilizing Energy That Is Present

The overall quantity of energy used is the sum of the energies necessary for data packet transmission and reception, as well as the energies required to send out inquiry broadcasts, which are used to identify who will be the next to transmit data packets. Figure 1 compares the average energy consumption of the proposed protocol to that of the DBR [18], EE-DBR [25,26], and EE-LHCR [37], which may be found. The proposed protocol requires less energy to transport packets since it selects the forwarding relay set for each transmission based on the fitness value of the cluster heads. This value is determined after every communication. Compared to other protocols, the proposed protocol has a greater packet delivery ratio due to the dependence of the holding time on the Euclidean distance between cluster heads. This is the case since it is not used by various protocols.

5.2. The Proportion of Successfully Delivered Packages

Figure 2 illustrates the different packet delivery ratios for proposed and existing EE-LCHR [37], DBR [18], and EE-DBR [25,26] methods. The packet delivery ratio of the proposed method converges to that of DBR [18], EE-DBR [25,26], and EE-LCHR [37], exhibiting a minor improvement over these other ratios as a result of an increase in the number of available nodes caused by an increase in network lifespan. When there are fewer nodes in the network, the proposed method of routing has a greater packet delivery ratio compared to conventional routing protocols. The proposed method packet delivery rate is equivalent to the DBR [18], EE-DBR [25,26], and EE-LHCR [37] rates.

5.3. Beginning to End Delay

Figure 3 demonstrates that the hat proposed method has the lowest end-to-end latency in comparison to DBR [18], EE-DBR [25,26], and EE-LHCR [37] in terms of the time between the production of a packet at the source node and its arrival at the sink node. Since the number of nodes in a network rises, the time it takes from beginning to end reduces, as more nodes mean more nodes that are qualified for packet transmission are available. The efficacy of the proposed method is superior due to the fact that it minimizes the incidence of collisions between source and sink nodes during packet transmission.

5.4. Duration of the Network’s Existence

Network lifespan is the time from the network’s formation until it becomes inoperable due to the loss of one or more nodes due to mechanical failure or depletion of energy. As indicated in the preceding Section 3, the proposed protocol defines the network lifetime as the sum of all probable maximum path lifetime values inside a network. The maximum PLV for a certain route is the minimum period necessary to elapse before a cluster failure along that route makes that path inoperable. The proposed method has a greater theoretical network lifetime value than DBR [18], EE-DBR [25,26], and EE-LHCR [37], according to the simulation findings. In selecting the cluster head that will be responsible for delivering the data packet upwards in the proposed method, the amount of remaining energy indicated by the fitness value is considered.
The rotation of the cluster head increases the lifetime of the network cluster because it avoids uneven energy distribution. When the lifespan of a cluster along a certain route is increased, the route in question is used for a longer amount of time after the augmentation. The network’s longevity, which is the total of the lifetimes of each of these other routes, shows a significant increase. As seen in Figure 4, the energy considerations included in the proposed protocol are a significant contributor to the network lifetime enhancement exhibited in the proposed method against DBR [18], EE-DBR [25,26], and EE-LCHR [37].
The proposed study introduces a novel energy-efficient routing protocol and compares its performance against existing methods. The proposed protocol demonstrates reduced energy consumption for data transmission thanks to the smart selection of relay sets based on cluster head fitness values. This approach yields a higher packet delivery ratio, outperforming other protocols due to its unique utilization of Euclidean distance. Moreover, the proposed protocol minimizes end-to-end delays through efficient collision management. It extends network lifespan by considering residual energy for cluster head selection, resulting in improved longevity compared to benchmark methods. In conclusion, the proposed protocol offers enhanced energy efficiency, packet delivery, latency, and network lifespan, highlighting its potential for advancing wireless network routing.

6. Conclusions

The proposed protocol is a routing-based technique developed for use with UWSNs in this work. The purpose of this effort was to achieve an ideal level of energy dissipation that extends the lifespan of the network. Using the proposed protocol, heterogeneous SNs are deployed in the monitoring area. Then, clusters are formed, and their heads rotate regularly depending on a function whose value is dictated by the quantity of residual energy in each node. During the last phase, data are sent depending on the proximity of a cluster head to a sink node within the communication range. Once the proposed protocol was implemented in Aqua-sim, an NS-2.3-based underwater simulator, simulations of the proposed protocol were conducted utilizing that simulator. The results of the 50 simulations indicate that the proposed protocol outperforms the DBR [18], EEDBR [25,26], and EE-LHCR [37] protocols on a variety of criteria. These findings were obtained using simulations. It has been shown that the proposed protocol outperforms DBR [18], EEDBR [25,26], and EE-LHCR [37] in terms of average end-to-end latency, packet delivery ratio, average network lifespan, and average energy consumption. The reason for this improvement is finding the different fitness parameters that reduce energy consumption. Future initiatives to lower the energy consumption of underwater sensor networks may involve the development of machine learning algorithms to recognize the cluster heads and the rotation of their nodes.

Author Contributions

Conceptualization, S.K., Y.V.S. and C.-C.L.; Methodology, S.K., Y.V.S., P.S.Y., V.S., C.-C.L. and K.-H.J.; Validation, V.S.; Formal analysis, P.S.Y. and C.-C.L.; Investigation, C.-C.L.; Writing—original draft, Y.V.S.; Writing—review & editing, S.K., P.S.Y. and C.-C.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by funding from NSTC, Taiwan, grants no. 111-2410-H-167-005-MY2.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No data has been used in this study. Moreover, all the information will be available on request to Yash Veer Singh.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Akyildiz, I.F.; Pompili, D.; Melodia, T. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 2005, 3, 257–279. [Google Scholar] [CrossRef]
  2. Iyer, S.; Rao, D.V. Genetic algorithm based optimization technique for underwater sensor network positioning and deployment. In Proceedings of the IEEE Underwater Technology (UT 5), Chennai, India, 23–25 February 2015; pp. 1–6. [Google Scholar] [CrossRef]
  3. Felemban, E. Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology. Int. J. Commun. Netw. Syst. Sci. 2013, 6, 251–259. [Google Scholar] [CrossRef]
  4. Tuna, G.; Gungor, V.C. A survey on deployment techniques, localization algorithms, and research challenges for underwater acoustic sensor networks. Int. J. Commun. Syst. 2017, 30, e3350. [Google Scholar] [CrossRef]
  5. Cui, J.-H.; Kong, J.; Gerla, M.; Zhou, S. The challenges of building scalable mobile underwater wireless sensor networks for aquatic applications. IEEE Netw. 2006, 20, 12–18. [Google Scholar] [CrossRef]
  6. Freitag, L.; Grund, M.; Singh, S.; Partan, J.; Koski, P.; Ball, K. The WHOI micro-modem: An acoustic communications and Navigation system for multiple platforms. In Proceedings of the OCEANS 2005 MTS/IEEE, Washington, DC, USA, 17–23 September 2005; Volume 2, pp. 1086–1092. [Google Scholar] [CrossRef]
  7. Pompili, D.; Akyildiz, I.F. Overview of networking protocols for underwater wireless communications. IEEE Commun. Mag. 2009, 47, 97–102. [Google Scholar] [CrossRef]
  8. Pompili, D.; Melodia, T.; Akyildiz, I.F. A CDMA-based Medium Access Control for Under Water Acoustic Sensor Networks. IEEE Trans. Wirel. Commun. 2009, 8, 1899–1909. [Google Scholar] [CrossRef]
  9. Heidemann, J.; Ye, W.; Wills, J.; Syed, A.; Li, Y. Research challenges and applications for underwater sensor networking. In Proceedings of the IEEE Wireless Communications and Networking Conference, 2006, Las Vegas, NV, USA, 3–6 April 2006; Volume 1, pp. 228–235. [Google Scholar] [CrossRef]
  10. Partan, J.; Kurose, J.; Levine, B.N. A survey of practical issues in underwater networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2007, 11, 23–33. [Google Scholar] [CrossRef]
  11. Singh, S. An energy aware clustering and data gathering technique based on nature inspired optimization in WSNs. Peer-Peer Netw. Appl. 2020, 13, 1357–1374. [Google Scholar] [CrossRef]
  12. Ramteke, R.; Singh, S.; Malik, A. Optimized routing technique for IoT enabled software-defined heterogeneous WSNs using genetic mutation based PSO. Comput. Stand. Interfaces 2021, 79, 103548. [Google Scholar] [CrossRef]
  13. Singh, S.; Nandan, A.S.; Malik, A.; Kumar, R.; Awasthi, L.K.; Kumar, N. A GA-Based Sustainable and Secure Green Data Communication Method Using IoT-Enabled WSN in Healthcare. IEEE Internet Things J. 2022, 9, 7481–7490. [Google Scholar] [CrossRef]
  14. Nandan, A.S.; Singh, S.; Kumar, R.; Kumar, N. An Optimized Genetic Algorithm for Cluster Head Election Based on Movable Sinks and Adjustable Sensing Ranges in IoT-Based HWSNs. IEEE Internet Things J. 2022, 9, 5027–5039. [Google Scholar] [CrossRef]
  15. Singh, S.; Malik, A.; Kumar, R.; Singh, P.K. A proficient data gathering technique for unmanned aerial vehicle-enabled heterogeneous wireless sensor networks. Int. J. Commun. Syst. 2021, 34, e4956. [Google Scholar] [CrossRef]
  16. Kaur, S.; Awasthi, L.K.; Sangal, A.; Dhiman, G. Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization. Eng. Appl. Artif. Intell. 2020, 90, 103541. [Google Scholar] [CrossRef]
  17. Nicolaou, N.; See, A.; Xie, P.; Cui, J.-H.; Maggiorini, D. Improving the Robustness of Location-Based Routing for Underwater Sensor Networks. In Proceedings of the Oceans 2007-Europe, Aberdeen, UK, 18–21 June 2007; pp. 1–6. [Google Scholar] [CrossRef]
  18. Yan, H.; Shi, Z.J.; Cui, J.-H. DBR: Depth-based routing for underwater sensor networks. In Proceedings of the International Conference on Research in Networking, 2008, Singapore, 5–9 May 2008; Volume 4982, pp. 72–86. [Google Scholar] [CrossRef]
  19. Guangzhong, L.; Zhibin, L. Depth-based multi-hop routing protocol for underwater sensor network. In Proceedings of the 2010 The 2nd International Conference on Industrial Mechatronics and Automation, 2010, Wuhan, China, 30–31 May 2010; Volume 2, pp. 268–270. [Google Scholar] [CrossRef]
  20. Hu, T.; Fei, Y. QELAR: A Machine-Learning-Based Adaptive Routing Protocol for Energy-Efficient and Lifetime-Extended Underwater Sensor Networks. IEEE Trans. Mob. Comput. 2010, 9, 796–809. [Google Scholar] [CrossRef]
  21. Datta, A.; Dasgupta, M. Underwater Wireless Sensor Networks: A Comprehensive Survey of Routing Protocols. In Proceedings of the 2018 Conference on Information and Communication Technology (CICT), IIITDM, Jabalpur, India, 26–28 October 2018; pp. 1–6. [Google Scholar] [CrossRef]
  22. Huang, C.-J.; Wang, Y.-W.; Liao, H.-H.; Lin, C.-F.; Hu, K.-W.; Chang, T.-Y. A power-efficient routing protocol for underwater wireless sensor networks. Appl. Soft Comput. 2011, 11, 2348–2355. [Google Scholar] [CrossRef]
  23. Gopi, S.; Kannan, G.; Desai, U.B.; Merchant, S.N. Energy Optimized Path Unaware Layered Routing Protocol for Underwater Sensor Networks. In Proceedings of the IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, New Orleans, LA, USA, 30 November–4 December 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 1–6. [Google Scholar] [CrossRef]
  24. Gopi, S.; Govindan, K.; Chander, D.; Desai, U.B.; Merchant, S.N. E-PULRP: Energy Optimized Path Unaware Layered Routing Protocol for Underwater Sensor Networks. IEEE Trans. Wirel. Commun. 2010, 9, 3391–3401. [Google Scholar] [CrossRef]
  25. Wahid, A.; Kim, D. An Energy Efficient Localization-Free Routing Protocol for Underwater Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2012, 8, 307246. [Google Scholar] [CrossRef]
  26. Wahid, A.; Lee, S.; Jeong, H.-J.; Kim, D. EEDBR: Energy-Efficient Depth-Based Routing Protocol for Underwater Wireless Sensor Networks. Adv. Comput. Sci. Inf. Technol. 2011, 195, 223–234. [Google Scholar] [CrossRef]
  27. Ayaz, M.; Abdullah, A. Hop-by-Hop Dynamic Addressing Based (H2-DAB) Routing Protocol for Underwater Wireless Sensor Networks. In Proceedings of the 2009 International Conference on Information and Multimedia Technology, Jeju Island, Korea, 16–18 December 2009; IEEE: Piscataway, NJ, USA, 2009; pp. 436–441. [Google Scholar] [CrossRef]
  28. Ayaz, M.; Abdullah, A.; Faye, I.; Batira, Y. An efficient Dynamic Addressing based routing protocol for Underwater Wireless Sensor Networks. Comput. Commun. 2012, 35, 475–486. [Google Scholar] [CrossRef]
  29. Noh, Y.; Lee, U.; Wang, P.; Choi, B.S.C.; Gerla, M. VAPR: Void-Aware Pressure Routing for Underwater Sensor Networks. IEEE Trans. Mob. Comput. 2013, 12, 895–908. [Google Scholar] [CrossRef]
  30. Jafri, M.; Ahmed, S.; Javaid, N.; Ahmad, Z.; Qureshi, R. AMCTD: Adaptive Mobility of Courier Nodes in Threshold-Optimized DBR Protocol for Underwater Wireless Sensor Networks. In Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, Compiegne, France, 28–30 October 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 93–99. [Google Scholar] [CrossRef]
  31. Coutinho, R.W.L.; Boukerche, A.; Vieira, L.F.M.; Loureiro, A.A.F. GEDAR: Geographic and opportunistic routing protocol with Depth Adjustment for mobile underwater sensor networks. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 251–256. [Google Scholar] [CrossRef]
  32. Coutinho, R.W.L.; Boukerche, A.; Vieira, L.F.M.; Loureiro, A.A.F. Geographic and Opportunistic Routing for Underwater Sensor Networks. IEEE Trans. Comput. 2016, 65, 548–561. [Google Scholar] [CrossRef]
  33. Chao, C.-M.; Jiang, C.-H.; Li, W.-C. DRP: An energy-efficient routing protocol for underwater sensor networks. Int. J. Commun. Syst. 2017, 30, e3303. [Google Scholar] [CrossRef]
  34. Gomathi, R.M.; Manickam, J.M.L.; Sivasangari, A.; Ajitha, P. Energy efficient dynamic clustering routing protocol in underwater wireless sensor networks. Int. J. Netw. Virtual Organ. 2020, 22, 415. [Google Scholar] [CrossRef]
  35. Alasarpanahi, H.; Ayatollahitafti, V.; Gandomi, A. Energy-efficient void avoidance geographic routing protocol for underwater sensor networks. Int. J. Commun. Syst. 2020, 33, e4218. [Google Scholar] [CrossRef]
  36. Sozer, E.M.; Stojanovic, M.; Proakis, J.G. Underwater acoustic networks. IEEE J. Ocean. Eng. 2000, 25, 72–83. [Google Scholar] [CrossRef]
  37. Datta, A.; Dasgupta, M. Energy Efficient Layered Cluster Head Rotation Based Routing Protocol for Underwater Wireless Sensor Networks. Wirel. Pers. Commun. 2022, 125, 2497–2514. [Google Scholar] [CrossRef]
Figure 1. Total energy consumptions vs. number of nodes.
Figure 1. Total energy consumptions vs. number of nodes.
Sensors 23 07839 g001
Figure 2. Packet delivery ratio vs. number of nodes.
Figure 2. Packet delivery ratio vs. number of nodes.
Sensors 23 07839 g002
Figure 3. End-to-end delay vs. number of nodes.
Figure 3. End-to-end delay vs. number of nodes.
Sensors 23 07839 g003
Figure 4. Network lifespan vs. number of nodes.
Figure 4. Network lifespan vs. number of nodes.
Sensors 23 07839 g004
Table 1. Simulation parameters.
Table 1. Simulation parameters.
Simulation ParametersValues
Network area 1000   m × 1000   m × 1000   m
Number of nodes 100
Transmission range 250   m
data packet size 50   b y t e s
Node density/Energy heterogeneity (3 forms)10% form-3 (2 j ), 20% form-2 (1.5 j ), 70% form-1 (1 j )
power consumption for transmission mode 2.0   μ j
power consumption for receive mode 0.5   μ j
Maximum Iteration40
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Khan, S.; Singh, Y.V.; Yadav, P.S.; Sharma, V.; Lin, C.-C.; Jung, K.-H. An Intelligent Bio-Inspired Autonomous Surveillance System Using Underwater Sensor Networks. Sensors 2023, 23, 7839. https://doi.org/10.3390/s23187839

AMA Style

Khan S, Singh YV, Yadav PS, Sharma V, Lin C-C, Jung K-H. An Intelligent Bio-Inspired Autonomous Surveillance System Using Underwater Sensor Networks. Sensors. 2023; 23(18):7839. https://doi.org/10.3390/s23187839

Chicago/Turabian Style

Khan, Shadab, Yash Veer Singh, Prasant Singh Yadav, Vishnu Sharma, Chia-Chen Lin, and Ki-Hyun Jung. 2023. "An Intelligent Bio-Inspired Autonomous Surveillance System Using Underwater Sensor Networks" Sensors 23, no. 18: 7839. https://doi.org/10.3390/s23187839

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop