1. Introduction
The ocean covers more than 70% of Earth’s surface and provides valuable services to both humans and the environment, which makes the ocean monitoring crucial. Therefore, advanced technologies are required to monitor the assets effectively. In this respect, remote sensing offers an excellent opportunity to explore various oceanographic parameters through the utilization of archived, consistent, and multi-temporal datasets, all in a cost-effective manner [
1,
2]. However, traditional ocean remote sensing technologies are limited by several factors, such as weather, the limited coverage of sensing devices, and unreliable data transmission. In recent years, the underwater internet of things (UIoT), which can obtain real-time oceanic data and transmit it to the shore for further analysis and processing, is regarded as a new paradigm of ocean remote sensing.
Figure 1 illustrates the basic schematic of the UIoT, encompassing various modules for underwater sensing and transmission (underwater sensor nodes and surface nodes); underwater computing and transmission (autonomous underwater vehicles (AUVs)); and surface computing and transmission (surface base station (BS), surface ships, and surface nodes), as well as coastal control (seashore BS and seashore control center) [
3,
4,
5].
As the critical infrastructure in the UIoT, the underwater acoustic sensor network (UASN) collects data from remote areas of the ocean in real time, enabling the acquisition of rich and accurate ocean data [
6]. By deploying numerous sensor nodes under water, the UASN plays a crucial role in improving remote sensing capability, understanding the complex dynamics of the ocean, and assessing the impact on the environment.
Deploying the UASN poses challenges due to the demanding environmental conditions and substantial deployment costs. First, the sound signal propagates much more slowly in the water, at approximately 1500 m/s, leading to noticeable latency in signal propagation. Second, some factors, such as water absorption, scattering, and underwater noise interference, limit the data transmission rate of the underwater acoustic signal. Third, the complexity and uncertainty of the underwater environment further increase the difficulty of underwater acoustic communication. Hence, underwater sensor nodes consume much more energy than their terrestrial counterparts when transmitting data of the same size [
7]. In order to optimize energy utilization and enhance data transmission efficiency in the UASN, the design of an appropriate routing protocol is of paramount importance. This routing protocol should possess the flexibility to adapt to the dynamic underwater environment.
Over the past decade, many routing protocols specifically tailored for the UASN have been proposed [
8,
9,
10]. Traditional routing protocols, which are typically based on a fixed routing table or static network topology, are not suitable for the UASN due to the dynamic nature of the underwater environment and the limitations of underwater acoustic signal transmission. The use of traditional routing protocols in the UASN can result in significant propagation latency, data transmission rate limitations, and increased energy consumption by underwater sensor nodes. These limitations bring about the routing void, long packet delay, and data packet loss, which can significantly degrade the network performance. Typically, two categories of conventional routing protocols exist in the UASN, namely the location-aware routing protocol and the depth-aware routing protocol.
For the location-aware routing protocol, it is assumed that the sensor nodes have the knowledge of the location information with the assistance of the node positioning technology. In the vector-based forwarding (VBF) protocol proposed in [
11], data packets are forwarded in a virtual pipeline with a pre-defined radius. The virtual pipeline is specified by the routing vector from the location of the source node to the destination. For the dense network, the VBF protocol effectively manages the network flooding area size to mitigate potential issues. However, in spare networks, the VBF protocol exhibits poor performance and fails to address routing voids. Hence, an enhanced VBF protocol, named hop-by-hop vector-based forwarding (HH-VBF), was proposed in [
12]. The HH-VBF protocol employs the notion of a virtual routing pipe. This involves the utilization of an individual virtual pipeline for each forwarding node, and at each intermediate node, a directional choice is made based on its current location. Therefore, despite the limited number of neighboring nodes, the HH-VBF protocol can still find a data delivery path as long as a sensor node is available in the forwarding path within the communication range. However, the hop-by-hop nature introduces much more signaling overhead for the HH-VBF protocol. In [
13], a geographic routing protocol and two topology control algorithms were introduced; they employed the greedy forwarding protocol as a foundation. When a data packet reaches a void node, the node has the capability to vertically adjust its position to establish connections with the non-void nodes and restore data forwarding. Nevertheless, the process of adjusting the sensor node’s location consumes a substantial amount of energy. In [
14], an adaptive location-based routing protocol (ALRP) was proposed. The ALRP introduces several key mechanisms to improve forwarding efficiency. First, it establishes a forwarding area to restrict the range of candidate forwarders. Second, it dynamically calculates the forwarding probability to minimize unnecessary redundancy in forwarding. Third, it adaptively determines the forwarding order based on the forwarding delay. To provide a decent performance, these algorithms need accurate 3 dimensional (3D) location information on the sensor nodes; this is difficult to obtain in the UASN [
15].
For the depth-aware routing protocol, the routing decision is based solely on the depth information obtained from the sensor node’s barometer. The depth-based routing (DBR) protocol, introduced in [
16], represents the initial routing approach that utilizes the sensor node’s depth for data forwarding in the UASN. Additionally, a holding time mechanism is implemented to facilitate the coordination of the forwarding candidates during transmission. However, in a sparse network, the greedy hop-by-hop forwarding may frequently encounter a communication void region, where the sensor node cannot find a next-hop node to deliver the data packet. The energy-efficient depth-based routing (EE-DBR) protocol, where both the residual energy and the depth of the sensor nodes are considered when selecting the next-hop node, was proposed in [
17]. However, when the sensor nodes were deployed sparsely, the problem of the routing void was not resolved effectively. In [
18], the distance vector-based opportunistic routing (DVOR) protocol was proposed. The DVOR protocol seeks the shortest routing path according to the hop count of the sensor nodes towards the destination. Additionally, a holding time mechanism was developed to regulate the scheduling of data packet forwarding. However, the DVOR protocol introduces an overhead in the UASN due to its reliance on periodic beacons for the dynamic establishment of routing paths. In [
19], the adaptive power-controlled depth-based routing protocol (APCDBRP) was proposed to prolong the network lifetime. The protocol comprises two phases: route establishment and data transmission. Moreover, APCDBRP proposes a data protection and route reconstruction mechanism to address issues such as network topology changes. However, the power control and data protection mechanisms in APCDBRP introduce a certain level of end-to-end delay. In [
20], a multi-layer cluster-based energy-efficient routing scheme was proposed. The proposed scheme encompasses three distinct stages. In the initial stage, the network is divided into multiple layers. Subsequently, in the second stage, the sensor nodes are organized into clusters within each layer. Finally, in the third phase, the data are efficiently forwarded towards the sink. To tackle the challenge of hotspots, a dynamic clustering approach is presented. This scheme can effectively balance network energy consumption and reduce end-to-end delay. A novel neighbor-based energy-efficient routing protocol was proposed in [
21]. The protocol implementation comprises the deployment of random clusters and the relocation of nodes underwater. Notably, each node demonstrates the ability to detect, identify, and forward routing paths to the nearest neighboring node. These operations are facilitated through the processes of route discovery and route maintenance. To enhance efficiency, the protocol employs a flooding mechanism, which effectively discovers the closest node by leveraging this approach. The depth-based routing methods use the greedy algorithm to forward data packets, where sensor nodes passively receive data packets. Although some methods have been used to limit the redundancy, the area around the forwarding nodes is still subject to flooding, resulting in energy waste. Additionally, due to the acoustic communication between the underwater sensor nodes, the transmission rate is limited, and excessive packet transmissions in the network easily lead to the failure of important packet forwarding.
With the development of artificial intelligence (AI), increasingly complex AI technologies are being used to design routing protocols [
22]. Intelligent routing protocols have been proposed to address the challenges faced by traditional routing protocols in the UASN. These protocols can dynamically adapt to changes in the network environment, select the optimal path based on the real-time monitoring of network status and node changes, and optimize the energy consumption to reduce the routing void, minimize the packet delivery delay, and prolong the network life. In addition, intelligent routing protocols enhance the network security by selecting a more secure path.
In [
23], a fusion algorithm of ant colony optimization algorithm (ACOA) and artificial fish swarm algorithm (AFSA) was proposed for the routing protocol in the UASN. An adaptive mechanism is used to combine the advantages of ACOA and AFSA. The method first uses the AFSA to calculate a set of globally optimal paths. To address the problem of insufficient precision in the optimal path calculation of the AFSA, a parallel ACOA is then employed to select the optimal path. However, the method is not suitable for resource-limited underwater nodes due to the high computational complexity. In [
24], a Q-learning-based localization-free anypath routing (QLFR) protocol was proposed, where the calculation of the Q-value involves the simultaneous consideration of both the residual energy and the depth of the sensor nodes. Furthermore, a new holding time mechanism was developed for data packet forwarding, taking into consideration the priority of forwarding candidate nodes. Nevertheless, the intricate mechanism and substantial computational demand involved pose challenges for implementation in the underwater environment. In [
25], a reinforcement learning-based opportunistic routing (RLOR) protocol was proposed by combining the advantages of opportunistic routing algorithms and reinforcement learning algorithms. In addition, the RLOR protocol incorporates a recovery mechanism that effectively enables data packets to bypass void areas and seamlessly continue their forwarding process, resulting in an improved packet delivery ratio (PDR), particularly in sparse networks. However, the RLOR protocol uses a specific value combination which cannot be dynamically adjusted to accommodate changes in the environment. In [
26], the deep Q-network (DQN)-based energy and latency-aware routing (DQELR) protocol was proposed. The DQELR protocol uses DQN to train agents since the Q-learning-based methods are not suitable for environments with a large state space. Each data packet is defined as an agent, and the depth and residual energy are considered when designing the reward function. The DQELR protocol can extend the network lifetime, as well as satisfy the energy consumption and latency constraints. However, the additional cost resulting from the Q-learning-related information exchange is not addressed.
The routing methods mentioned above offer partial improvements in data transmission efficiency and energy consumption reduction. However, the challenges related to the high packet loss rate and prolonged end-to-end delay have not been addressed effectively. Furthermore, these methods lack the ability to adjust in real time and to recover the forwarding process when the data packets become trapped in routing voids. To address these issues, an adaptive support vector machine (SVM)-based routing (ASVMR) protocol is proposed for the UASN. In the proposed ASVMR protocol, the SVM is utilized to train the model for the selection of the relay node, where four factors are selected as features for the model. A reasonable routing pipe radius is chosen based on the PDR to minimize latency and extend the network lifetime. Moreover, a waiting time mechanism is designed for the opportunity routing to improve the PDR. To deal with the transmission failure of the routing void, each sensor node can activate the recovery mechanism to bypass the void region and continue forwarding data packets. To the best of our knowledge, this study is the first attempt to employ the SVM model for the design of a routing protocol in the UASN. The main contributions of the paper can be summarized as follows.
Unlike the traditional routing protocols which select the relay node with a single parameter, the proposed ASVMR protocol employs a selection process to identify a group of forwarding candidates from neighboring nodes based on four factors, guaranteeing the optimal routing choice and enhancing the performance significantly.
The waiting time mechanism for opportunity routing is enhanced by incorporating the distance between sensor nodes, resulting in a reduction in both end-to-end delay and data packet loss.
A scheme for adaptive routing pipe radius is proposed to reduce unnecessary transmissions while also maintaining a high PDR.
The remainder of the paper is organized as follows.
Section 2 contains the preliminaries, including the acoustic propagation model, the network model, and the SVM model.
Section 3 presents the proposed ASVMR protocol in detail, and
Section 4 elaborates on the design of corresponding routing protocol. In
Section 5, the simulation results and discussions are given. Finally,
Section 6 concludes the paper.
3. Proposed ASVMR Protocol
In this section, the proposed ASVMR protocol is presented in detail. The framework of the SVM adapted for routing is introduced first. Then, a detailed description of the proposed ASVMR protocol, including the determination of the next hop, the dynamic timer, the adaptive pipe radius scheme, and the recovery mechanism, is presented.
3.1. The Framework of SVM
To minimize latency and extend the overall lifespan of the network, four factors, namely the ratio of the depth difference and the maximum communication range, the ratio of the depth difference and the distance of the sensor nodes, the residual energy function, and the neighboring node function, are selected as features for training the SVM model for routing. These factors collectively form a four-dimensional sample, represented by .
Suppose that node
sends a data packet to node
,
and
represent the positions of nodes
and
, respectively. The ratio of the depth difference and the maximum communication range
can be defined as
The ratio of the depth difference and the distance between nodes
and
can be defined as
The residual energy function at node
can be defined as
where
and
denote the initial and residual energy of node
, respectively.
The neighboring node function at node
can be defined as
where
denotes the number of neighboring nodes connected to node
, and
is the maximum number of neighboring nodes among all the sensor nodes in the network.
Therefore, the sample can be expressed as .
Here, we employed a portion of the publicly available ASUNA dataset [
30], which consists of 11,000 sample groups, including 6561 positive and 4439 negative samples. The partial training samples are listed in
Table 1.
Here, the value of
and
is set within
, and the value of
is set within
. The value of
is determined according to the result provided by ASUNA and manual judgment. For example, in the first sample of
Table 1 the node has no neighboring nodes with
, and thus, the label
is set to −1. We randomly selected 2500 samples for the training of the model, normalized them, and employed 5-fold cross-validation with an RBF kernel function. The remaining 8500 test samples were utilized to evaluate the trained SVM model. The test results showed that out of 8499 samples, the predicted values of the labels
, calculated by the SVM model, matched the true values. Therefore, the test accuracy achieved 99.988%.
3.2. The Determination of Next Hop
In our selection process for the candidate forwarding set from the neighboring nodes, we take into account both the node depth and the pipe radius of the routing vector, ensuring a comprehensive consideration of these factors. The set of sensor nodes in the UASN is defined as , where is the number of sensor nodes.
First, the sensor nodes in the routing vector and the above node
are grouped into the candidate forwarding set of node
. The illustration of the candidate forwarding set selection is depicted in
Figure 3, where
represents the set of neighboring nodes of node
at time
and
represents the candidate forwarding set selected for node
at time
. The shaded rectangle is the routing pipe.
Second, node
acquires the state values of the sensor nodes in the candidate forwarding set and incorporates these values into the SVM model to obtain the one-hop decision value
at time
in (13). In order to reflect the influence of future states on the current state, the decision value at time
is defined as
where
denotes the discount factor.
To reduce the computational complexity, we only compute the value for raised to the first power, and the node with the maximum value of is chosen as the next hop. It is worth noticing that the four factors of a node are constantly changing due to the continuous movement underwater and the energy depletion. Therefore, varies with time , and the latest feature space information is utilized for each calculation of .
3.3. A Dynamic Timer
The preceding section primarily focuses on selecting the most suitable next-hop node. However, in underwater environments, communication via single-path transmission is unreliable. To enhance the PDR, this model adopts an opportunistic routing approach. Furthermore, a dynamic timer is employed to correlate the waiting time with the distance between the current node and the optimal next-hop node, ensuring that the data packets can be transmitted to the previously selected optimal next-hop node.
Opportunistic routing involves a node initially forwarding data packets to a group of potential nodes, each of which retains a copy of the data packets [
31]. Subsequently, each potential node can set its own timer to determine how long it will keep the copy. When the timer expires, the respective node becomes the designated relay node, and the other potential nodes can observe this behavior and discard their copies. This mechanism improves the reliability of data transmission, reduces unnecessary redundancy, and helps conserve energy. Nevertheless, the inclusion of timers introduces additional latency into the end-to-end communication.
To further decrease the end-to-end delay, an adaptive timer setting based on node distance is addressed in this paper. Specifically, closer nodes have shorter waiting times, allowing them to forward data packets more swiftly and reducing the end-to-end delay.
Figure 4 depicts a scenario where node
has a set of neighboring nodes and where node
has the maximum decision value. In this case, node
selects node
as the next-hop node and transmits the data packet to it, along with the ID and position of node
. Upon receiving the packet, node
immediately forwards it, while the other nodes store a copy and calculate their distance from node
. If this distance is less than the maximum communication range
, the node sets a timer. If a forwarding packet from node
is not received before the timer expires, it forwards the stored replica in the hope of reaching node
. The variable
represents the routing pipe radius, and the size of the candidate forwarding set can be dynamically adjusted based on the routing pipe radius. The maximum value of
is
.
Assuming that node
is within the maximum communication range of both node
and node
, the waiting time of node
can be constructed as
where
,
, and
represent the distance between node
and node
; node
and node
; and node
and node
, respectively;
is the sound speed in water; function
generates a random real number within range
. In (19), the first term reflects the waiting time required for node
to receive the data packet from node
and then from node
. The second term represents a random waiting time set to avoid the occurrence of collisions between nodes with the same waiting time.
3.4. Adaptive Pipe Radius Scheme
In practice, it is typical to select a sufficiently large routing pipe radius to increase the number of candidates forwarding nodes and improve the PDR. However, a larger radius also enables more sensor nodes with comparable waiting times to forward the same data packet, leading to redundant transmissions and energy waste. To enhance energy efficiency, it is necessary to impose additional restrictions on the data packet transmissions during the routing process.
However, if the data packet transmissions are suppressed excessively, it will result in a reduction in the PDR. The PDR is a measure of transmission reliability. In a sparse network, where it is essential to increase the PDR, the pipeline imposes fewer restrictions on the participating sensor nodes. Conversely, in a dense network, to minimize unnecessary energy consumption, the pipeline imposes limitations on the sensor nodes involved in routing. Therefore, to enhance the energy efficiency and maintain high transmission reliability, we propose an adaptive pipe radius scheme.
First, the routing pipe radius is initialized as the maximum value . To balance transmission reliability and energy consumption, a PDR threshold is utilized, which can be tailored to suit the specific requirements of the practical application scenario in the UASN.
Second, the source attaches the number of generated data packets to the transmitted data packet during the data packet transmission phase. After the data packet is received, the sink node determines the PDR by dividing the quantity of data packets successfully delivered by the overall count of generated data packets.
If the PDR exceeds the threshold, the routing pipe radius will be reduced during the subsequent transmission to improve energy efficiency. If the PDR falls below the threshold, the sink node initiates a broadcast message to expand the routing pipe radius, and the source will attach the new routing pipe radius to the transmitted data packet. This will result in an increase in the pipe radius of eligible forwarders during the next transmission round, which will improve the delivery ratio.
The proposed adaptive pipe radius scheme is illustrated in Algorithm 1.
Algorithm 1: Adaptive Pipe Radius Scheme |
is the communication range of nodes. is the cumulative count of data packets generated. denotes the number of data packets that have been successfully received. is the current PDR. is the predefined threshold of PDR. |
1: | Initialize the routing pipe radius to |
2: | while the packet transmission phase is ongoing do |
3: | Commence a fresh iteration of data packet transmission |
4: | Attach to the transmitted data packet at the source |
5: | Calculate the PDR at the sink node using |
6: | if then |
7: | Decrease the routing pipe radius during the next transmission round |
8: | else |
9: | Increase the routing pipe radius during the next transmission round |
10: | end if |
11: | end while |
3.5. Recovery Mechanism
In situations where a node is unable to find neighboring nodes located closer to the sink node, a void node emerges [
32]. During data transmission, selecting a void node as the next hop will result in the data packet loss, which depletes energy and diminishes the data transmission efficiency. To address this issue, the proposed routing method avoids selecting void nodes to proactively trigger the recovery mode when encountering a routing void.
First, the number of neighboring nodes is taken as a dimension in the feature space for training. The likelihood of selecting a node as the next hop increases if it has a higher number of neighboring nodes. However, the approach does not completely eliminate the occurrence of routing voids, and there is still a possibility that certain void nodes may be selected. Thus, a recovery mode is incorporated that enables void nodes to locate a suitable next hop for forwarding the data downward, bypassing the void area effectively.
In the recovery mode, the candidate forwarding set for node
is composed of the nodes below and inside its pipeline, denoted as
, as illustrated in
Figure 5. Then, the next hop is determined by the value of
. Upon successfully transmitting the data packet to a non-void node, the void node concludes the recovery mode and resumes its role in routing data packets towards the water surface. During this operational state, the node maintains a record of the previous hop node’s ID to avoid any occurrence of routing loops.
4. The Design of Routing Protocol
In this section, an elaborate outline of the devised routing protocol design is presented, including the packet structure, the exchange of node status knowledge, and the forwarding of data packets.
4.1. The Packet Structure
Figure 6 illustrates the packet structure used in the network; it comprises a header composed of the packet identification, the routing information, and the node status information.
The packet identification fields include:
- (1)
Source ID, identifying the source node.
- (2)
Packet sequence number, providing a unique identifier for the packet.
These fields are node-specific and utilized to differentiate data packets during data forwarding, remaining constant throughout the packet’s lifetime.
Routing information is used to determine the routing pipe radius, select the next hop, and assist the forwarding candidates in the transmitted data packets. The routing information comprises the following fields:
- (1)
Sender ID, identifying the current node.
- (2)
Receiver ID, identifying the optimal next hop.
- (3)
Position of receiver, providing the 3D coordinates of the optimal next hop.
- (4)
Routing pipe radius, specifying the routing pipe radius.
The routing pipe radius size controls the number of forwarding candidates, as discussed previously. The sink node determines the size through the calculation of the PDR.
Each node must embed its status information into the following fields before sending a data packet.
- (1)
Depth, providing the depth information of the current node.
- (2)
Position, providing the 3D coordinates of the current node.
- (3)
Residual energy, providing the remaining energy of the current node.
- (4)
Neighboring nodes number, indicating the number of neighboring nodes of the current node.
- (5)
Largest decision value, providing the largest decision value among the neighboring nodes of the current node.
Upon the reception of a data packet, every node extracts the relevant fields from the packet header and refreshes its neighboring information with the most up-to-date routing details. This process aids the nodes in making informed routing decisions that optimize their routing paths.
Apart from the packet header, there is an optional data field that can be included. This field carries the message intended for transmission to the destination. If the data field is not present, the packet serves the sole purpose of exchanging routing information, as further detailed in the subsequent subsection.
4.2. Node Status Knowledge Exchange
To optimize the routing decision-making process, it is necessary for all sensor nodes to possess their neighboring nodes’ status information to calculate the decision values using an SVM model. The proposed routing protocol utilizes two approaches for exchanging node status information.
Simultaneous Exchange with Data Packet Transmission: In this paper, the sender’s status information is appended to the data packet header prior to its transmission. Consequently, a node can obtain its neighboring nodes’ status information from the incoming data packets.
Use of Hello Packets Containing Node Status Knowledge: Each node in the UASN periodically broadcasts a Hello packet, used solely for exchanging status knowledge. These broadcasts complement the approach whereby node status knowledge is exchanged. As each node can obtain the status knowledge of the neighboring node(s) from data packet transmissions, special control packets do not need to be used. Therefore, the broadcast period of the Hello packet can be configured with an adequate duration to eliminate the overhead.
4.3. Data Packet Forwarding
This part discusses the procedure of data packet forwarding in the proposed ASVMR protocol, as summarized in Algorithm 2.
Algorithm 2: Data Packet Forwarding |
represents the data packet. represents the node that is presently receiving the data packet. is the receiver in the header of . is the decision value of node . is the candidate forwarding set of . is the distance between node and node . is the communication range of . is the waiting time to hold the data packet at node . |
1: | On hearing |
2: | Get the information from the header of |
3: | if has forwarded then |
4: | Drop |
5: | else if then |
6: | Calculate for |
7: | Choose the maximum |
8: | Update the header of |
9: | Send immediately |
10: | else |
11: | Calculate |
12: | if then |
13: | Drop |
14: | else |
15: | Calculate |
16: | if overhears during then |
17: | Drop |
18: | else |
19: | Revise the header with updated information |
20: | Send when epires |
21: | end if |
22: | end if |
23: | end if |
Before initiating the transmission of a data packet, the sender conducts a preliminary examination for any routing voids. If present, it enters a recovery mode and forms a candidate forwarding set by selecting neighboring nodes that simultaneously possess two characteristics, namely nodes below the sender and nodes in the routing pipe. Alternatively, if routing holes are absent, a candidate forwarding set is formed by the neighboring nodes that simultaneously possess two characteristics, namely nodes above the sender and nodes in the routing pipe.
Next, the sender calculates decision values for each potential forwarding set based on the obtained status information. The node with the maximum decision value is chosen as the next hop, and the remaining nodes in the candidate forwarding set assist in routing the data packet towards the most favorable next hop. The routing pipe radius controls the number of nodes in the candidate forwarding set. Before transmitting the data packet, the node modifies the packet header by incorporating its own status information and the details of the next hop.
Upon reception of a data packet, a node retrieves the sender’s status information from the packet header and updates the relevant neighboring information, regardless of its role as a qualified forwarder.
Then, the node verifies whether it has previously forwarded the same data packet. If it has, the node directly discards the data packet; otherwise, it checks whether it is the receiver. If the node is the receiver, it forwards the packet following the above procedure. If the node is not the receiver, it calculates its distance from the receiver. If the distance exceeds the communication range, the node discards the data packet. Otherwise, the node initiates a waiting time. While waiting, if a node intercepts the same data packet, it refrains from forwarding it since another node has already taken the responsibility of transmission. If not, the node proceeds with the transmission of the data packet once the waiting time period has expired.
Furthermore, the proposed method employs an online and interactive training process. As previously stated, in every round of packet transmission, the sender calculates decision values for each candidate forwarding set using the acquired status knowledge before sending a data packet.