Next Article in Journal
Parallelly Running and Privacy-Preserving k-Nearest Neighbor Classification in Outsourced Cloud Computing Environments
Next Article in Special Issue
End-to-End Underwater Acoustic Communication Based on Autoencoder with Dense Convolution
Previous Article in Journal
A 1.25 MHz, 108 dB Chopped Sampling-Mixer-Based Impedance Spectroscopy SoC in 0.18-μm CMOS
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Trust-Based Beacon Node Localization Algorithm for Underwater Networks by Exploiting Nature Inspired Meta-Heuristic Strategies

1
Department of Computer Science, COMSATS University Islamabad, Lahore Campus, Lahore 54000, Pakistan
2
Department of Computer Science, University of Sahiwal, Sahiwal 57000, Pakistan
3
Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Sahiwal 57000, Pakistan
4
Electrical Engineering Department, College of Engineering, Najran University, Najran 61441, Saudi Arabia
5
Faculty of Electrical Engineering, Cracow University of Technology, Warszawska 24 Str., 31-155 Cracow, Poland
*
Authors to whom correspondence should be addressed.
Electronics 2022, 11(24), 4131; https://doi.org/10.3390/electronics11244131
Submission received: 30 October 2022 / Revised: 4 December 2022 / Accepted: 7 December 2022 / Published: 11 December 2022
(This article belongs to the Special Issue Advanced Underwater Acoustic Systems for UASNs)

Abstract

:
Conventional underwater technologies were not able to provide authentication and proper visualization of unexplored ocean areas to accommodate a wide range of applications. The aforesaid technologies face several challenges including decentralization, beacon node localization (for identification of nodes), authentication of Internet of Underwater Things (IoUTs) objects and unreliable beacon node communication between purpose oriented IoT-enabled networks. Recently, new technologies such as blockchain (BC) and the IoUTs have been used to reduce the issues but there are still some research gaps; for example, unreliable beacon messages for node acquisition have significant impacts on node identification and localization and many constrained node resources, etc. Further, the uncertainty of acoustic communication and the environment itself become problems when designing a trust-based framework for the IoUTs. In this research, a trust-based hybrid BC-enabled beacon node localization (THBNL) framework is proposed to employ a secure strategy for beacon node localization (BNL) to mine the underwater localized nodes via the hybrid blockchain enabled beacon node localization (HB2NL) algorithm. This framework helps to merge two disciplines; it is hybrid because it follows the nature and bio inspired meta heuristics algorithms for scheduling the beacon nodes. The performance of the proposed approach is also evaluated for different factors such as node losses, packet delivery ratios, residual and energy consumption and waiting time analysis, etc. These findings show that the work done so far has been successful in achieving the required goals while remaining within the system parameters.

1. Introduction

IoT-enabled wireless communication devices and related technologies have significantly contributed to the advancement of human life. There is an exponentially increasing number of smart sensors probing every aspect of the individual’s life, work and entertainment. The advent of increasingly miscellaneous wireless applications triggers an outpouring in underwater data traffic [1]. Further, as part of the Internet of Things (IoTs) [2], Underwater Acoustic Sensor Networks (UASNs), which are typically self-organized heterogeneous wireless networks coping with IoT, namely, the Internet of Underwater Things (IoUTs), have emerged as a hotspot for research projects utilizing diverse sensors in the marine exploration and aquatic environment monitoring application domains. Basically, as a subcategory of the IoTs, a term first used in 1985 [3] and the IoUTs, first discussed in 2012, [4] are defined as “the network of smart interconnected underwater objects” while the meaning of IoT “the infrastructure of the information society”. Essentially, the IoUTs includes underwater sensors, autonomous underwater/surface vehicles, base/master stations, buoys and ships, and has become an important part of the evolution of smart oceans in smart cities. This is not limited to the several attempts and references in [5,6] to emphasize the importance of IoUTs, as most underwater areas remain unexplored (only 5% of underwater volume has been explored). To the best understanding of underwater, Figure 1 presents the scenario of the underwater environment. In any underwater scenario taken from [2], the process of localization is important. Basically, localization is a key activity that detects a target’s location underwater for different reasons such as data classification, tracking nodes underwater, and coordinating the movement of node groups. This is because the sensor data is meaningful only when sensing nodes are localized [7]. In underwater communication scenarios, the nodes that have ther ‘location information’ called ‘beacon or anchor node’ that generate “beacon message” to broadcast to other nodes for communication. The beacon node is a communication gateway capable of building an underwater network and pursuing the localization process [8,9]. The process of localization enables underwater communication, sensing and control of the whole network’s topology. All existing techniques based on base station localization, but some or few research papers discussed the idea of localization through ‘beacon node’. There is dire need to understand the difference between base station and ‘Beacon Node Localization (BNL)’, which is quite interesting. This BNL has enough potential to expand the horizons of research. The beacon node is responsible for the formation of underwater networks lis same as the base station. Several important decisions are based on BNL; for example, computation complexity, distance of neighboring node, network strength, receiving signal strength, angle of arrival and its difference, time difference of arrival and reliability analysis, etc. [10].
Most importantly, the beacon node is fully responsible for localization based on the previously mentioned parameters. Effective strategies and reliable shield embedded beacon nodes ensure localized sensor nodes at various places with minimum margin of cost and maximum location-oriented indication of neighboring node list (that need to be localized). The efficient localized nodes and its reliability challenges are another crucial issue in underwater scenarios. Most of the localized nodes cannot be considered secured after localization due to unreliability factors, data handling, estimation errors, blindly selected localized nodes, unexpected changes in underwater environment, dynamic uncontrolled network topology, node behavior regarding joining/leaving the network boundaries, etc. [11]. Recently, BC-based distributed, decentralized, peer-to-peer networks have evolved to enable the safe and cost-effective storage of underwater IoT data without depending on any intermediate trusted authority, while maintaining anonymity [12]. BC can support decentralization for capturing IoUTs communication processes as well as secure processing and exchanges data with other organizations. Decentralized access control and distributed trust are required for almost all IoUTs applications. Indeed, even with the bulk of the research found on BC-based localization in WSNs, the same development of BC in the undersea sector has yet to begin. Present underwater communication emphasizes the adoption of BC localization algorithm that can calculate and secure the unknown node’s location, authentic accuracy and improve its efficiency, particularly when the environment is unmanned and hostile. In this research, a trust-based hybrid beacon node localization (THBNL) communication framework is proposed for underwater problems regarding BNL. Further, this framework consists of a hybrid blockchain enabled beacon node localization (HB2NL) algorithm which provides smooth communication towards the destination through verified beacon nodes (VBN). VBN are those nodes that can be localized through blockchain and have the capacity to localized other nodes.

Contributions

The following are the potential contributions of the proposed framework:
THBNL is a BC enabled framework that considers the acquisition of BNL features (e.g., localization accuracy, node losses and Packet Delivery Ratio (PDR)) and determines the verified and trusted beacon nodes. THBNL relaxes the parameter assumptions; thus, it can emulate realistic situations in UASN for safe localization through HB2NL algorithm.
THBNL focuses on the heterogeneity of the verified localized beacon nodes that challenges the algorithm design of HB2NL. It achieves the localization accuracy in beacon node level identification for different acoustic environments (e.g., deep and shallow water). Moreover, the THBNL framework is extremely flexible and can easily be extended by supporting more selection features for better efficiency (where needed).
The effectiveness of the HB2NL algorithm is validated via different load measurements (e.g., base load, interruptible load, uninterruptable load and on average load) of acoustic communication data traffic. Finally, we compare the accuracy of HB2NL algorithm with localization accuracy, node losses, PDR, survival nodes, residual energy and number of delivered/received packets.
Scheduling and scalability are addressed for selecting verified beacon nodes (VBN) by meta-heuristic bio/nature inspired techniques by Levy Firefly Algorithm (LFA) and Birds Foraging Algorithm (BFA), respectively. Moreover, for the purpose of scheduling, we introduce the notion of ‘beacon node coordination’. This aids the scheduler in selecting the verified beacon nodes (which are localized) and neighboring nodes without any localization interruptions.
To achieve the system objectives and incorporate the cost reduction mechanism (CRM), we will schedule BNL as a ‘knapsack problem’ with a knapsack capacity (small items with largest values), which is solved using ‘dynamic programming’ [13]. This helps the CRM to draw inferences regarding newly encountered nodes and schedule them correctly.
The beacon node mechanism inside HB2NL selects a group of validator nodes as VBN using the (*TOPSIS (Technique for Order of Preference by Similarity to Ideal Solution) to rank BC nodes. TOPSIS, a multi-criteria decision analysis method, estimates the shortest geometric distance from the ideal best value and the longest geometric distance from the ideal worst value) TOPSIS/multi-criteria analysis method. Through this criterion, the beacon node with the greatest trust value is chosen as a validator node for the localization process of a block in BC and responsible for smooth data forwarding.
The remaining sections of the paper deal with related work, problem description and proposed framework in Section 2, Section 3 and Section 4, while meta-heuristics analysis and simulation results are discussed in Section 5, Section 6 and Section 7. Section 8 deals with the conclusion.

2. Related Work

The use of BC and other issues of underwater networking have mostly been investigated separately. Crossovers between these two fields have only recently become apparent. Numerous important studies provide an in-depth examination of the undersea networks and BC research scene. We categorized these works into (i) pure overviews of BC in all possible disciplines; (ii) reviews of surveys of underwater networks techniques in updated modern lines; (iii) reviews of antique and recent localization techniques; (iv) works have enabling BC driven underwater networks at the intersection between the underwater wireless network and BC. We summarize underwater localization techniques in Table 1 and its associated state-of-the-art algorithms in Table 2, while the below section lists the most representative publications in each class. A growing number of survey papers that represent advancement in Terrestrial Wireless Sensor Network (TWSNs) enable to monitor, detect and track various environmental phenomena and events. These kinds of functionalities of TWSN extend the research to underwater applications to give rise to a network of underwater acoustic sensors nodes (UASN) [14,15,16]. The authors present the use of medium access control (MAC) protocol due to its potentially large impact on overall network performance in [13]. Unlike TWSN, this survey highlights the current state-of-the-art of MAC protocol because minimum delay and maximum throughput are major concerns of underwater networks [14]. The authors found different applications for offshore exploration and ocean monitoring. Different kinds of routing techniques are covered in this survey [15]. The authors highlight the characteristics of UWSNs for its dynamic structure, narrow bandwidth, high latency and rapid energy consumption. These open issues motivates the idea of design such routing protocol in this domain and propose a route decision maker strategy framework [16]. The authors discussed the security criteria, different malicious attacks, accurate communication channel and ground-based counterparts that require the deployment of efficient and reliable security mechanisms [17]. The authors also classified underwater deployment methods into the following categories depending on the sensor node’s mobility: (i) static deployment; (ii) self-adjustment; (iii) movement aided. The mobility of nodes and their various practical parameters such as computing complexity, energy consumption, and deployment objectives are thoroughly examined [14,15,16,17]. The authors put forward the role of recent technologies in underwater networks. The next generation UWSN are coped with different technology which make flexible, robust and adaptive programmable support resource sharing features and are easy to manage and resolve [18]. For this, software defined n etworks (SDN) is easily merged with cognitive acoustics, software-defined radio, network function virilization, the software’s network resources and internet of underwater things (IoUTs) [19]. More recently, the authors claimed that no more than 5% of the volume of the oceans has been observed by humans. Therefore, there is still dire need for networking solutions towards efficient reliable underwater data collection. As a result, an overview of undersea development in a wide variety of areas and its possible applicability to network traffic control systems [20]. Additionally, their analysis identifies some unresolved research concerns that merit further investigation. There are different kinds of localization algorithms of UWSN are classified in three categories such as: stationary, mobile and hybrid localization algorithms [21]. Domingo et al. introduce techniques, applications and guidelines for applying to review the UWSNs surveys. Their study simply classifies the underwater domain in three categories: energy-based, data-based and geographic information-based protocols. Meanwhile, the advantages and disadvantages of different routing issues are analyzed in detail with future directions that will enable the researcher to conduct future study more effectively [22,23]. The currently available list of various routing protocols and its taxonomy, comparison and discussion are presented in [24]. The design applications are discussed in [25], different modes of underwater communications in [26], a comprehensive list of localization optimization algorithms in [27]. Moreover the BC oriented scheme for sybil attack of UWSN, bio-inspired algorithms in [28] and a dynamic trust-based evolution of hidden Markov models cooperate, and opportunistic routing protocols and there design guideline are listed in [26,27,28].
The above findings are the indicators of the necessity to devise novel mechanisms of trust and reputation assessment gives the idea of blockchain-enabled UASNs. The next section formally defines the specific problem of localization and its solution:
  • There is no technique at present which is a hybrid, jointly considering BC and the IoUTs as a BC-enabled Internet of Underwater Things (BIoUTs) for the trusted BNL problem with meta-heuristic techniques;
  • There is no such job found that provides trust and reputation assessment in wireless underwater networks for secure BNL using BC;
  • Better relationship management (in terms of data exchange) among node participants requires the absence of third parties. There is none of any idea has been found which enables BC at beacon level, i.e., the beacon nodes-oriented communication of the BNL problem;
  • To ensure privacy and security of data transferred across hierarchical sensor beacon nodes without incurring excessive computing costs and requiring centralized control;
  • There is no such work that facilitates the entire cycle of routing communication process of underwater among participants for trust and reputation assessment in solving the BNL problem by BC;
  • There is no approach in the literature that applies BC at the beacon level to the BNL problem to assure localization while dealing with its dynamic, multi-level and heterogeneous character.
It has been noted during the literature analysis, the proposed localization techniques are lacking the concept of inducing BC at this level such that it accounts for communication overhead, localization accuracy and preservation cost. Most of the localization methods and algorithms which were described earlier, such as [14,15,16,17] and [19,20,21], which are implement localization at sink levels; however, [10,12,13,17,19,20,23,27,28] produce high localization accuracy while [8,9,14,15,18,22,24] have noticeable communication transparency. Furthermore, [12,15,23] ignore the high energy consumption ratio. In case of error estimation, [2,4,6,7,8,10,11,13,14,15,16,17,20,21,22,23,25] did not investigate their impact. However, [10,11,12,14,15,16,19,21,22,27] are good for maintaining energy and prolong the network lifetime. Moreover, [2,3,4,5,6,10,12,13,14,15,16,17,19,22,23] are proven to be delay-oriented techniques. It is interesting to note that none the localization techniques/algorithms were previously tested with BC. Therefore, our proposed THBNL framework in this research reduces the cost, delay and energy, and improves the localization accuracy while maintaining the communication overhead and network lifetime. The proposed framework will solve the BNL problem without using any extra resources while establishing coordination among verified beacon nodes to minimize CRM constraints.

3. Problem Description

The issues of the insecure and non-trusted underwater environment [2] discourage localization of nodes, data sharing and forwarding for underwater communication. Previous techniques used central authorities to determined node positions. The central authorities (e.g., base and master station) [14,15,16] are not capable of ensuring cross-validation of node positions and their selection due to the absence of an authentication mechanism. Moreover, several collateral problems occur when an unknown object is detected as a known object (such as location information privacy and reporting). The whole communication is exposed and disturb with bogus routing, as well as data gathering communication situations. Conventional underwater methodologies were not able to provide authentication and proper visualization of unexplored ocean areas in order to accommodate a wide range of underwater applications. For independent secure communication in terms of centralized authority, the use of BC underwater has been revolutionized in terms of localization, as well as end-to-end. The beacon nodes are used for localization with its trust value which is subsequently shared with adjacent nodes via BC technology to successfully perform the localization process.
The solutions of waiting time (with different base loads), number of received packets and PDR are discussed in Section 7. Its preliminary results are also discussed.
The solution of the identification of the surviving nodes and its impact is discussed in Section 7.
The solutions of the number of rounds for energy exhausted, energy consumption for received packets and residual energy are discussed in Section 7.
The simulation of the number of alive and dead nodes are also discussed in Section 7 respectively.

4. The Proposed Framework

Bio-inspired meta-heuristic techniques are used for its simplicity, adaptability and ergodicity [29,30]. To begin, most of these algorithms are rather straightforward to implement in comparison to those in other programming languages. Second, they are adaptable in the sense that they may be used to address a wide variety of issues. Finally, some of the strategies can deal with ergodicity due to their capacity to readily escape local minima [30]. For this reason, these approaches should be used rather than meta-heuristics based on assumptions such as proportionality. On the other hand, meta-heuristic processes make few or no assumptions. The author in [31] described the argumentation of local and global search. Local search is more important to the BFA than global search is to genetic algorithms (GA) [32]. Both methods are lauded for their superiority; nevertheless, they are not without faults. In GA, there are problems with convergence which necessitate several iterations and a vast search space.
THBNL is a concept that utilizes both the Levy Firefly Algorithm (LFA) and the Birds Foraging Algorithm (BFA) to get around these limitations. However, the proposed approach is based on a private BC enabled localization scheme with a following extended range free algorithm which is quite different from the existing approaches of UWSNs. Further, in our research, the extended range free BC enabled algorithm copes with meta-hermitic nature, and the bio-inspired technique is employed for the secluding and scalability of the verified beacon node localization (VBNL). By contrast, all currently used localization strategies are tested without the usage of BC. In fact, current underwater solutions, such as decentralized key management for security concerns, have leveraged the BC model to address underwater difficulties. The main objective of this proposed framework is to solve the problem of BNL with minimum CRM. Which helps to make decisions about VBNL enabled with BC.
In our scenario, targeted objective beacon nodes are based on fitness function constraints which are given in Equation (5a). Our second main objective: a reliable communication-oriented hybrid framework that considers the localized environment which is handled in real-time scheduling. The proposed system for efficient scheduling of BC based beacon nodes minimizes the UIDn and Un. The first layer of the model shows the overall scenario. The data of beacon nodes and their associated terminology is processed empirically in the second layer. In the third layer, the prescription study about the selection of ‘Verified Beacon Nodes’ is processed. The results obtained from third layer are again sent to second layer where Bnegh makes decisions depending on the outcome of completing the whole reference. The second and fourth layer jointly consider the separation of relative ‘Verified Beacon Nodes’ and the optimization of validators to achieve useful results that help to improve the operational planning of selected ‘Verified Beacon Nodes’. Moreover, the separation and minimization of UIDn are formulated in Equation (1):
Q 1 = min ( U I D n B U I D n )
where U I D n B is the total un-identified beacon nodes that are calculated using Equation (2):
E c o s t t o t a l = B = 1 B ^ B R e l U n × Ɣ × U I D n B
where E c o s t t o t a l represents the aggregated total cost of the network during the process of selecting of reliable beacon nodes (BRel) which are separate out and ‘Un’ represents the aggregated value of total unknown nodes inside the network. Meanwhile, Ɣ = 1, 0 for selected and unselecting of B ^ (verified trusted beacon nodes) from ‘B’ beacon nodes. The objective function of B u n i t n e g h has a reciprocal function with E cos t negh ; this relationship is mathematically represented as follows in Equation (3) as described in [32]:
B u n i t n e g h 1 E c o s t n e g h
where B u n i t n e g h is calculated as:
B u n i t n e g h = { 1 , i f   B n T r u s t o n 0 , i f B n T r u s t   o f f .
Trust values of beacon nodes are ‘on’ when the union of reliable beacon and neighboring nodes is considered. Mathematically: BRel U B n e g h R e l × ( L i s t B + L i s t B n e g h )   L i s t B B R e l which means only a selected list of beacon nodes were formulated with it and L i s t B n e g h   B n e g h r e l , respectively. Specifically, only those nodes that are in the list of L i s t B are not proceeded by mutation relation and further the constraints of Q1 as defined as the fitness function ‘Ff’ represented in Equation (5). This feature aids in the discovery of the best explanation from ‘Ff’: choose the fitness criteria via list F p o p B to avoid the unnecessary selection and saturation of beacon nodes:
F f = min ( F p o p B ) .
Meanwhile, F p o p B is calculated using Equation (5a) which is taken from [33,34].
F p o p B = { B n e g h l e g B C b e a c n e g h B l 1   i f     I ^ N = 0   B l 2 E ( B n e g h l e g ) < B l 3   i f     I ^ N = 1
B l 1 = S u m   ( B C b e a c   × B C b e a c n e g h ) s t d   ( E ( B C b e a c n e g h ) )
  B l 2 = s t d .   E ( B C b e a c n e g h ) + η × min ( E ( B C b e a c n e g h ) )
B l 3 =   mean   ( E ( BC beac negh )  
L o c B = L o c B n e g h ( B l 1 ) min ( L i s t L o c B int ) ( B l 2 ) max L o c B n e g h ( B l 3 ) min ( L i s t L o c B int ) ( B l 2 )
The value of ‘η’ is determined by keeping the cost of BC enabled neighboring nodes minimal with the help of by-products of the BC beacon node and its neighboring nodes. The under observed scenario of taking η = 2 and L o c B is considered as per set ∀ l ε { 2 , 3 , 4 , } .
The variable of “η” is initialized by “2”. This is because of the first beacon node must be selected and considered as the beacon node to start the process therefore η = 2 for the localized blockchain and the limited criteria B l 1 , B l 2 and B l 3 , respectively. The limitation of the total beacon limit ( B l 1 ) and its related standard deviation (std deviation) ( B l 2 ) , with its mean value of ( B l 3 ) , can be calculated using (5b), (5c) and (5d), respectively. Therefore, the distribution of localization can be done using Equation (5e), where L o c B (localization of beacon nodes) is calculated from Equation (2).

4.1. Verified Beacon Nodes Selection

Our second objective is the selection of the verified beacon node. The L o c B is already calculated from Equation (5e) and F p o p B is represented in Equation (5a). It can be mathematical defined as:
Q 2 = min ( B H o n e s t F f L o c U n U I D n B ) .
The beacon selection in optimized by following objective Q2 will be used as a constraint for Q1 where:
E   ( B H o n e s t F f ) = B = 1 B H o n e s t ( E ( B C c o s t n e g h ) )
where E ( B C c o s t n e g h ) is calculated using Equation (8):
E ( B C c o s t n e g h ) = B = 1 B H ( B C M i n × B C M i n D a t a ) × Ɣ .

4.2. Cost Reduction of BH

Ensuring verified selection is one of our goals that will be achieved through Bv with the help of other constraints which is automatically accomplished by Equation (1). Formally
Q 3   =   Min   ( C o s t   ( B v ) )
C B H = Max ( B v F f ) 2 ( a v g ( L o c B v   ) 2 )
where ( B v F f ) 2 = { B v 1 F f ,   B v 2 F f ,   B v 3 F f , } represents the verified beacon node with its fitness function using Equation (7).

4.3. User Comfort Maximization

In a localization process, the major concern is to achieve maximum output with minimum cost as far as ensuring the B v using Equation (9). We concentrate on optimizing user comfort, which may be described statistically in Equation (11). Now, the BC enables nodes have a large neighboring set with minimum cost. As per Equation (3), the inversely proportional relation exists that clearly requests the addition/removal of the number of nodes according to the requirements of experiment. Only by validator collaboration nodes can comfort and the number of nodes against user interruptions be attained. In a real-time scenario, it can be represented as taken from [35]:
Q 4 = M a x ( c o m f o r t   B C min + B v )
That Q4 is a constraint that is involved with Q1Q3, respectively, is describe further as:
C o m f o r t   B C min = { 1 ,   i f   I ^ 0 ,   o t h e r w i s e
Consequently, it is an inverse relation against selection of a greater number of BCmin and ‘Verified Beacon Nodes’ mathematically:
C o m f o r t 1 B = 1 B ^ ( B H × B C Min )
where B is a beacon node and B ^ is a trusted beacon node.
B H = | ( B + B u n i t n e g h ) × ( B ^ + B ^ u n i t n e g h ) |

4.4. Model Transformation

This section summarizes all constraints with multiple objective methods from Equations (1), (6), (9) and (11), respectively. However, qualitative items (such as user comfort) are neglected during the transformation analysis. It has highly significant during scheduling and re-selecting of B v on demand. Further, to make it simpler, two objective constraints Q1 and Q3 are considered:
λ × ( Q 1 ) + ( Q 2 ) + ( 1 λ ) × Q 3   .
Equation (15) is derived from Equations (5a) and (12), where the highest priority is given to objective constraints that separate out the identified unlocalized and localized nodes (Q1 from Equation (1)), ‘VBN’ selection (Q2 from Equation (6)) and cost reduction of ‘VBN’ (Q3 from Equation (9)), which is accomplished using the linear Equation (5a) where λ = 1 to achieve objective Q4.

5. Meta Heuristic Strategies for Node Scheduling

In practice, the intermediate nodes connect the beacon node to the sonobuoys, allowing nodes to be dispatched to meet communication and localization needs. It is worth mentioning that the beacon nodes are only the source which makes the network topology of underwater networks.. The role of beacon nodes localization is just to ensure the correct and reliable indication of the position of the various nodes that will take important roles in communication scenarios (usually with a routing path).

5.1. Nature-Inspired Meta-Heuristic Mechanism for BNL Node Scheduling

The LFA [36] is nature-inspired stochastic swarm intelligence, meta-heuristics, and population-based multi-agent algorithm. Swarm intelligence [31] is a technology inspired by nature that is mostly used to address production and scheduling challenges. It is called ‘swarm intelligence’ because it depicts the self-organization behavior of diverse flocks of birds, bees, insects and other animals such as fish. Many species such as birds and insects were kept in a restricted space where their natural and social behavior for solving problems and overcoming obstacles was observed and incorporated as algorithms [26].
The self-organized behavior of fireflies is the motivation behind the firefly algorithm. All the flies in the LFA are attracted to one other, and their attraction is proportional to their brightness; as the distance between the fireflies grows, the brightness decreases. The fitness of each firefly in the swarm improves because of their brightness behaviors and interactions with other brighter firefly swarms, allowing ‘Levy flights’ to refine their search method and schedule the next firefly in a row. Based on the above facts, the LFA can help in the scheduling of BNL (in the same way which schedules the flies according to their brightness) and striking a better balance between exploration and exploitation of the search space. This aids in the selection of system constraints and their convergence without harming the stability and accuracy of the possible solutions, as compared to other stochastic behaviors. As previously established, the basic goal function of generating cost is represented by a quadratic function. As a result, BNL costs may be more efficiently planned by using the LFA to tackle the BNL problem in the underwater environment for IoUTs. The proposed conceptual combined model for the BNL problem is shown in Figure 2.

5.2. Bio-Inspired Optimal Mechanism for VBNL

Passino [24] presented a meta-heuristic optimization approach. Its functioning architecture is built on weak foraging methods. The algorithm’s statistical behavior of bacteria foraging is basically towards an optimal solution that encourages us to use the BFA for Bv scheduling optimization J i   [ j , k , l ] . The step of the BFA to address the problem is discussed in this part. In reality, the BFA begins with a randomly generated population as ‘Np’ (usually 100 times from its original value), in which every object is treated like a bacterium. It begins by calculating each bacterium’s fitness, K i . Finally, regarding F f from the updated F p o p B , the desired result is achived. In addition, the best solution ‘ θ ’ to search the space for optimization issues is generated using an evolutionary meta-heuristic method. The BFA is built around the fitness and random selection ‘i’ of bacterium as its basic structural component. The BFA is a global metaheuristic method inspired by the genetic processes of live beings and based on evolutionary programming to solve the problem described in the preceding section. In comparison to mathematical methods, the BFA uses fewer processing resources, fewer limitations, and uses fewer parameters to solve optimization issues taken from [34] and described in Equations (16) and (17), respectively.
J i   [ j , k , l ] = B = 1 B ^ ( 100 × ( θ ( i , b + 1 ) ( θ ( i , b ) 2 ) 2 ) + ( θ ( i , b ) 1 ) 2 )  
where θ i is calculated using Equation (17):
θ i   [ j , k , l ] = θ i   [ j 1 , k , l ] + C Δ i Δ i τ Δ i .
The selection of a trusted and ‘Verified Beacon’ node that is further unable to localize their neighboring nodes is solved through the ‘Knapsack Problem’. To solve the knapsack problem, dynamic programming is adapted [12]. The basic function of dynamic programming is to divide the whole problem into sub problems and maintain its record in a table with the following Equation (18). In our works, small items having the largest value (as one selected B v has a set of verified neighboring nodes) are calculate using Equation (19) and maintain the table B [ i ^ , j ^ ] . That strategy will reduce the cost of selected B v saved in table VBN [ i ^ , j ^ ] . Finally, the optimized solution is selected using Equation (20) as used in [37].
K S D e 1 , 2 = [ B [ i 1 , j ] ] ,   v a l u e   ( i 1 ) + B ( i 1 , i j L i s t B ( i 1 )    
T   [   i , j ] = { max ( K S D e ) , i f   B N T r u s t O N min ( K S D e ) , i f   B N T r u s t O F F
H B   [ i , j ] = { 1 ,   i f T [ i , j ] = K S D e 0 , i f   o t h e r w i s e
The complete conceptual architecture of model BNL system is described in Algorithm 1. It is assumed that, in the BNL problem, the beacon nodes usually contact with most neighboring nodes to become part of the communication scenario from the localization purposes [38,39,40]. The combined system model and working of HB2NL is presented in Figure 3 and data forwarding process is presented in Algorithm 2.
Algorithm 1:VBN Selection and Scheduling in BNL
Electronics 11 04131 i001
Algorithm 2:HB2NL Forward (pkt)
Electronics 11 04131 i001

6. Description of Algorithms

This section describes the line by line working of Algorithms 1 and 2. The first algorithm is used for selection and scheduling of the beacon nodes as VBN with reference to the evaluation of fitness criteria from populations of beacon nodes (NB). Meanwhile, after evaluation with several domination/elimination rounds (Nd), another loop is used for calculating the population response ‘Nr’ for VBN. This process is continued until the firefly catching rounds (Nc) are successfully performed. The fireflies considered as underwater nodes that are used for simulation purposes. The several stochastic rounds ‘Ns’ applied as meta-heuristics techniques usually follow these rounds by the home of swarm intelligence mechanisms. The plunging of the beacon nodes starts with rounds for continuously updating the fitness of the population of beacon node FB PoP. To calculate the cost for C R M using update θ i   [ j , k , l ] according to the current position of B v and, if needed, re-calculate F P o P B using Equation (5) (line 6–12). All other neighboring nodes are aggregated, and beacon nodes are plunged in that direction. In the final step, we calculate maximization using Equation (11) and update the C R M function from line 20, and call the optimal BFA and LFA for beacon node maximum scheduling, as shown in lines (23–28). These nodes have scheduled output and are prepared for transactions with blockchain. In such instances, only the best nodes that can optimize and send data to the destination are rescheduled.
The HB2NL algorithm is especially used for the data packets forwarding process with several conditions and checks for localization of nodes. The data packets forwarding process only ends when the nodes are localized. In the same way, the localized nodes must be scheduled before data forwarding; therefore, the scheduling process is first undertaken as described in detail in Algorithm 1 and then the process of communication for underwater nodes in undertaken, as described in Algorithm 2. First of all, the RREQ pkt forwarding probability mechanism is used with Casual Flag values of either 0 and 1 for VBN and the totaling of beacon nodes. If any malware-vulnerable beacon node ID is received, it is directly discarded form lines 1–3. It is because these localized nodes can neither be scheduled nor localization oriented. Location is estimated from neighboring beacon nodes as counted from lines 4–9 and its trust ratio for blockchain enabled beacon nodes is estimated from lines 10–12. The blockchain minors’ nodes are estimated using ‘Knapsack Theory’ by (small items with large weights) from Equations (19)–(20) in lines 14–16, respectively. After that, the plunging process of beacon nodes starts and all nodes are localized accordingly following the optimal mechanism of the LFA and the BFA, as shown in lines 20–30. In a special case, if the data packet is from the destination zone, its localized value is calculated accordingly (lines 30–33); otherwise, we broadcast the data packet through (lines 34–36). All the notations that are used in algorithms are listed in the Table 2.

7. Simulation Environment

The sensor and relay nodes are deployed uniformly with dimensions of 2000 m × 2000 m × 2000 m as shown in Figure 4. The connectivity of any ad hoc network is highly dependent on the mobility model it follows. As per the previous study mentioned in [41,42,43], the random way mobility model is widely used to simulate the performance of any mobile ad hoc network such as [44,45,46], fixing the source and sink nodes at the bottom and surface of the water, respectively, with coordinates (80, 90,100) and (10, 20, 30). To calculate the value of energy consumption, we use the ‘Tx’ Power ‘Rx’ Power and 0.007 W, respectively. Each node initially has an energy of 1000 joules which is enough for medium and large-scale networks. The source node will send the data with 58 bytes per two seconds. This mobility model is selected with randomly selected speed and destination from a uniform distribution (f-max speed). After successfully reaching the destination, every node selects the new destination and speed. To build the high mobility scenario, the pause time is set to 0. Phgh = 1.0 and Plow = 0.3, which all are experiment values. Table 3 summarizes the simulation parameters’ value.

8. Simulation Results

The suggested scheme’s performance is validated in this section using simulation data and the results are discussed thereafter. To validate the preliminary results, we take the following parameters: localization accuracy, node losses, end-to-end delay, energy tax and beacon-based broadcasting error. Our preliminary results concern the evolving of a bunch of 300 nodes until it reaches 550 according to the simulation scenario environment. Inside the evaluation: the number of rounds for energy exhausted, number of received packets, surviving nodes, packet delivery ratio, number of successfully received packets with increased the quality of nodes, energy consumption, residual energy, alive/surviving and dead nodes during broadcasting and localization scenario when localization accuracy is set against different base loads. For smooth simulation purposes and understanding the behavior under study technique, these parameters are grouped into two categories.
In Figure 5, the x-axis shows the number of nodes that as used in the experiment while the y-axis shows energy exhausted rounds. Figure 5 represents the energy exhausted during the mining of BC nodes to get VBN against LFA and the BFA output. These VBN nodes are also called verified beacon nodes (VBN). Further, the data forwarding is smooth as the number of nodes is increased. Moreover, the relationship between BNL and VBNL selection that used further beacon-based broadcasting is interlinked. This pattern with increasing number of nodes from 500 to 520 can be observed in Figure 5 and it reached 540 with increasing trend. Our findings show that the increasing trends of the number of nodes do not sufficiently impact the energy exhausted. Figure 6 represents the behavior of number of received packets vs. number of rounds that are being recorded. The x-axis shows that the total number of received packets for VBNL is maximum. It also recorded the pattern when the rounds are increased and the packets recounts also rapidly increased; therefore, a directly proportional relation exists between these two variations. The impacts of alive nodes and dead nodes are shown in Figure 7 and Figure 8, respectively. Similarly, the PDR is represented in Figure 9. From Figure 10, it can be observed that one third of the total number of nodes (almost 270) has survived during simulation, for example, if 1200 rounds are applied, only 400 nodes survived rest of the simulation. The energy consumption and residual energy have been analyzed in Figure 11 and Figure 12, respectively. The energy is measured in joules (j) for beacon broadcasting and data forwarding processes with respect to 900, 1000 and 1100 rounds as depicted in Figure 13. In order to evaluate the performance of the system, we take different network loads and record the waiting time values when a BC functioning are onboard. It is interesting to know that, regarding the different loads the node losses and localization accuracy is not much disturbed while E2E delay has a slight impact on the overall performance of the proposed scheme. In Figure 13, the waiting time was recorded as 5 and 5.5 h while the additional waiting time of 1 h to its previous value for localization accuracy, E2E delay, and node loses are observed.

9. Conclusions

The purpose of this study is to provide a comprehensive view and provide authentication of nodes on state-of-the-art BC learning practices in underwater areas. The major problem that was addressed is localization problems including decentralization, and beacon node localization for the identification of nodes, as well as the authentication of Internet of Underwater Things (IoUTs) objects and unreliable beacon nodes. According to our study, the overall value of energy expended for 400 nodes is 1400 rounds, while the value for 550 nodes is not much more, calculated as 1450 rounds. Similarly, the suggested technique may accomplish the 25,000 and 28,000 packets received for 600 and 1200 cycles, respectively. The dead nodes/alive nodes ratios are also satisfactory for 200 nodes that have reached the value of 900 rounds respectively. The ratio of PDR is achieved at about 0.9% for 800 rounds and it remained the same for the surviving nodes for beacon-based broadcasting. The value of residual energy is the same for all parameters at 2800 J. The waiting time analyses for base load, interruptible load and uninterruptable loads are 3.5 h, 5 h and 2 h, respectively, for measuring the localization error, but the average value is 3 h for all evaluated terms in different base loads, which is satisfactory performance for the large-scale networks. The proposed hybrid algorithm and regulating method for accessible energy sources would enable customers to reduce localization errors by reducing costs and minimizing reliance on surrounding nodes. For future work, we intend to experiment on the IoUTs inside the seabed against different parameters.

Author Contributions

Conceptualization, writing, methodology and the design of the simulation were provided by U.D., M.H.C. and T.A. The overall review and guidelines were provided by M.H.C. and T.A. Project administration and reviews of the original draft were provided by A.S., M.I. and G.N. Writing, review and editing was conducted by U.D., T.A., A.S. and M.H.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Faculty of Electrical and Computer Engineering, Cracow University of Technology and the Ministry of Science and Higher Education, Republic of Poland (grant no. E-1/2022).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors also extend their appreciation to the foreign collaboration and acknowledge the Deanship of Scientific Research, Najran University, Kingdom of Saudi Arabia towards this foreign collaboration.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Faugstadmo, J.E.; Pettersen, M.; Hovem, J.M.; Lie, A.; Reinen, T.A. Underwater wireless sensor network. In Proceedings of the 2010 Fourth International Conference on Sensor Technologies and Applications, Venice, Italy, 18–25 July 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 422–427. [Google Scholar]
  2. Qiu, T.; Zhao, Z.; Zhang, T.; Chen, C.; Chen, C.P. Underwater Internet of Things in smart ocean: System architecture and open issues. IEEE Trans. Ind. Inform. 2019, 16, 4297–4307. [Google Scholar] [CrossRef]
  3. Sharma, C. Correcting the IoT History. Available online: http://www.chetansharma.com/correcting-the-iot-history/ (accessed on 21 October 2021).
  4. Domingo, M.C. An overview of the internet of underwater things. J. Netw. Comput. Appl. 2012, 35, 1879–1890. [Google Scholar] [CrossRef]
  5. Xu, M.; Liu, L. Sender-receiver role-based energy-aware scheduling for Internet of Underwater Things. IEEE Trans. Emerg. Top. Comput. 2016, 7, 324–336. [Google Scholar] [CrossRef]
  6. Berlian, M.H.; Sahputra, T.E.R.; Ardi, B.J.W.; Dzatmika, L.W.; Besari, A.R.A.; Sudibyo, R.W.; Sukaridhoto, S. Design and implementation of smart environment monitoring and analytics in real-time system framework based on internet of underwater things and big data. In Proceedings of the 2016 International Electronics Symposium (IES), Denpasar, Indonesia, 29–30 September 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 403–408. [Google Scholar]
  7. Tan, H.P.; Diamant, R.; Seah, W.K.; Waldmeyer, M. A survey of techniques and challenges in underwater localization. Ocean. Eng. 2011, 38, 1663–1676. [Google Scholar] [CrossRef] [Green Version]
  8. Diamant, R.; Lampe, L. Underwater localization with time-synchronization and propagation speed uncertainties. IEEE Trans. Mob. Comput. 2012, 12, 1257–1269. [Google Scholar] [CrossRef]
  9. Hawkins, A.D.; Popper, A.N. Assessing the impacts of underwater sounds on fishes and other forms of marine life. Acoust. Today 2014, 10, 30–41. [Google Scholar]
  10. Su, X.; Ullah, I.; Liu, X.; Choi, D. A review of underwater localization techniques, algorithms, and challenges. J. Sens. 2020, 2020, 6403161. [Google Scholar] [CrossRef] [Green Version]
  11. Tuna, G.; Gungor, V.C. A survey on deployment techniques, localization algorithms, and research challenges for underwater acoustic sensor networks. Int. J. Commun. Syst. 2017, 30, e3350. [Google Scholar] [CrossRef]
  12. Islam, T.; Park, S.H. A comprehensive survey of the recently proposed localization protocols for underwater sensor networks. IEEE Access 2020, 8, 179224–179243. [Google Scholar] [CrossRef]
  13. Yaga, D.; Mell, P.; Roby, N.; Scarfone, K. BC technology overview. arXiv 2019, arXiv:1906.11078. [Google Scholar]
  14. Ahram, T.; Sargolzaei, A.; Sargolzaei, S.; Daniels, J.; Amaba, B. BC technology innovations. In Proceedings of the 2017 IEEE Technology & Engineering Management Conference (TEMSCON), Santa Clara, CA, USA, 8–10 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 137–141. [Google Scholar]
  15. Niculescu, D.; Nath, B. Ad hoc positioning system (APS). In Proceedings of the GLOBECOM’01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270), San Antonio, TX, USA, 25–29 November 2001; IEEE: Piscataway, NJ, USA, 2001; Volume 5, pp. 2926–2931. [Google Scholar]
  16. Gkikopouli, A.; Nikolakopoulos, G.; Manesis, S. A survey on underwater wireless sensor networks and applications. In Proceedings of the 2012 20th Mediterranean Conference on Control & Automation (MED), Barcelona, Spain, 3–6 July 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 1147–1154.
  17. Chen, K.; Ma, M.; Cheng, E.; Yuan, F.; Su, W. A survey on MAC protocols for underwater wireless sensor networks. IEEE Commun. Surv. Tutor. 2014, 16, 1433–1447. [Google Scholar] [CrossRef]
  18. Felemban, E.; Shaikh, F.K.; Qureshi, U.M.; Sheikh, A.A.; Qaisar, S.B. Underwater sensor network applications: A comprehensive survey. Int. J. Distrib. Sens. Netw. 2015, 11, 896832. [Google Scholar] [CrossRef]
  19. Pompili, D.; Akyildiz, I.F. Overview of networking protocols for underwater wireless communications. IEEE Commun. Mag. 2009, 47, 97–102. [Google Scholar] [CrossRef]
  20. Ayaz, M.; Baig, I.; Abdullah, A.; Faye, I. A survey on routing techniques in underwater wireless sensor networks. J. Netw. Comput. Appl. 2011, 34, 1908–1927. [Google Scholar] [CrossRef]
  21. Han, G.; Jiang, J.; Bao, N.; Wan, L.; Guizani, M. Routing protocols for underwater wireless sensor networks. IEEE Commun. Mag. 2015, 53, 72–78. [Google Scholar] [CrossRef]
  22. Domingo, M.C. Securing underwater wireless communication networks. IEEE Wirel. Commun. 2011, 18, 22–28. [Google Scholar] [CrossRef]
  23. Han, G.; Jiang, J.; Shu, L.; Xu, Y.; Wang, F. Localization algorithms of underwater wireless sensor networks: A survey. Sensors 2012, 12, 2026–2061. [Google Scholar] [CrossRef] [Green Version]
  24. Luo, J.; Chen, Y.; Wu, M.; Yang, Y. A Survey of Routing Protocols for Underwater Wireless Sensor Networks. IEEE Commun. Surv. Tutor. 2021, 23, 137–160. [Google Scholar] [CrossRef]
  25. Khisa, S.; Moh, S. Survey on Recent Advancements in Energy-Efficient Routing Protocols for Underwater Wireless Sensor Networks. IEEE Access 2021, 9, 55045–55062. [Google Scholar] [CrossRef]
  26. Bhaskarwar, R.V.; Pete, D.J. Cross-Layer Design Approaches in Underwater Wireless Sensor Networks: A Survey. SN Comput. Sci. 2021, 2, 362. [Google Scholar] [CrossRef]
  27. Ali, T.; Yasin, S.; Draz, U.; Ayaz, M. Towards formal modeling of subnet based hotspot algorithm in wireless sensor networks. Wirel. Pers. Commun. 2019, 107, 1573–1606. [Google Scholar] [CrossRef]
  28. Saini, P.; Singh, R.P.; Sinha, A. Survey of Radio Propagation Models for Acoustic Applications in Underwater Wireless Sensor Network. Int. J. Sens. Wirel. Commun. Control 2021, 11, 42–53. [Google Scholar] [CrossRef]
  29. Chang, D.; Johnson-Roberson, M.; Sun, J. An Active Perception Framework for Autonomous Underwater Vehicle Navigation Under Sensor Constraints. IEEE Trans. Control Syst. Technol. 2022, 30, 2301–2316. [Google Scholar] [CrossRef]
  30. Zehra, S.S.; Qureshi, R.; Dev, K.; Shahid, S.; Bhatti, N.A. Comparative Analysis of Bio-Inspired Algorithms for Underwater Wireless Sensor Networks. Wirel. Pers. Commun. 2021, 116, 1311–1323. [Google Scholar] [CrossRef]
  31. Yang, X.S. Nature-Inspired Metaheuristic Algorithms; Luniver press: Bristol, UK, 2010. [Google Scholar]
  32. Yang, X.S.; Cui, Z.; Xiao, R.; Gandomi, A.H.; Karamanoglu, M. (Eds.) Swarm Intelligence and Bio-Inspired Computation: Theory and Applications; Newnes: London, UK, 2013. [Google Scholar]
  33. Draz, U.; Ali, A.; Bilal, M.; Ali, T.; Iftikhar, M.A.; Jolfaei, A.; Suh, D.Y. Energy efficient proactive routing scheme for enabling reliable communication in underwater internet of things. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2934–2945. [Google Scholar] [CrossRef]
  34. Draz, U.; Yasin, S.; Irfan, M.; Ali, T.; Ali, A.; Glowacz, A.; Brumercik, F.; Glowacz, W. TANVEER: Tri-Angular Nearest Vector-Based Energy Efficient Routing for IoT-Enabled Acoustic Sensor and Actor Networks (I-ASANs). Sensors 2021, 21, 3578. [Google Scholar] [CrossRef]
  35. Draz, U.; Yasin, S.; Ali, T.; Ali, A.; Bin Faheem, Z.; Zhang, N.; Jamal, M.H.; Suh, D.-Y. ROBINA: Rotational Orbit-Based Inter-Node Adjustment for Acoustic Routing Path in the Internet of Underwater Things (IoUTs). Sensors 2021, 21, 5968. [Google Scholar] [CrossRef]
  36. Draz, U.; Ali, T.; Ahmad Zafar, N.; Saeed Alwadie, A.; Irfan, M.; Yasin, S.; Ali, A.; Khan Khattak, M.A. Energy efficient watchman based flooding algorithm for IoT-enabled underwater wireless sensor and actor networks. ETRI J. 2021, 43, 414–426. [Google Scholar] [CrossRef]
  37. Draz, U.; Ali, T.; Yasin, S.; Bukhari, S.; Khan, M.S.; Hamdi, M.; Rahman, S.; Jung, L.T.; Ali, A. An Optimal Scheme for UWSAN of Hotspots Issue Based on Energy-Efficient Novel Watchman Nodes. Wirel. Pers. Commun. 2021, 121, 69–94. [Google Scholar] [CrossRef]
  38. Draz, U.; Ali, T.; Yasin, S.; Hussain, A.; Bukhari, S.; Nawaz, A.; Ali, A.; Khan, M.S.; Jung, L.T. A Novel Layer By Layer Energy Efficient Watchman Algorithm for Wireless Sensor and Actor Networks. Sci. Technol. 2021, 24, 284–298. [Google Scholar]
  39. Draz, U.; Ali, T.; Yasin, S. Cloud Based Watchman Inlets for Flood Recovery System Using Wireless Sensor and Actor Networks. In Proceedings of the 2018 IEEE 21st International Multi-Topic Conference (INMIC), Karachi, Pakistan, 1–2 November 2018; pp. 1–6. [Google Scholar]
  40. Yasin, S.; Ali, T.; Draz, U.; Shaf, A.; Ayaz, M. A parametric performance evaluation of batteries in wireless sensor networks. In Recent Trends and Advances in Wireless and IoT-enabled Networks; Springer: Cham, Switzerland, 2019; pp. 187–196. [Google Scholar] [CrossRef]
  41. Sun, L.; Qin, H.; Przystupa, K.; Majka, M.; Kochan, O. Individualized Short-Term Electric Load Forecasting Using Data-Driven Meta-Heuristic Method Based on LSTM Network. Sensors 2022, 22, 7900. [Google Scholar] [CrossRef] [PubMed]
  42. Su, J.; Beshley, M.; Przystupa, K.; Kochan, O.; Rusyn, B.; Stanisławski, R.; Yaremko, O.; Majka, M.; Beshley, H.; Demydov, I.; et al. 5G multi-tier radio access network planning based on voronoi diagram. Measurement 2022, 192, 110814. [Google Scholar] [CrossRef]
  43. Draz, U.; Ali, T.; Yasin, S.; Waqas, U. Towards formal modeling of hotspot issue by watch-man nodes in wireless sensor and actor network. In Proceedings of the 2018 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, 17–19 December 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 321–326. [Google Scholar]
  44. Qaisar, Z.; Irfan, M.; Ali, T.; Ahmad, A.; Ali, G.; Glowacz, A.; Glowacz, W.; Caesarendra, W.; Mashraqi, A.; Draz, U.; et al. Effective beamforming technique amid optimal value for wireless communication. Electronics 2020, 9, 1869. [Google Scholar] [CrossRef]
  45. Ali, T.; Razwan, A.R.; Baig, I.; Irfan, M.; Draz, U. Efficient Shadow Encoding Scheme Towards Power Spectrum Density in Digital Network Communication. Wirel. Pers. Commun. 2021, 119, 3179–3206. [Google Scholar] [CrossRef]
  46. Ali, G.; Ali, T.; Hassan, I.U.; Shaf, A.; Irfan, M.; Nowakowski, G.; Kielkowicz, K.; Glowacz, A.; Alqhtani, S.M. A Novel Routing Protocol Based on Elliptical Shaped Movement of Autonomous Underwater Vehicles in Data Gathering Process for Underwater Wireless Sensor Network. Sensors 2022, 22, 5269. [Google Scholar] [CrossRef]
Figure 1. Underwater acoustic sensor network: a scenario [2].
Figure 1. Underwater acoustic sensor network: a scenario [2].
Electronics 11 04131 g001
Figure 2. Combine System Model for BNL in UASNs.
Figure 2. Combine System Model for BNL in UASNs.
Electronics 11 04131 g002
Figure 3. Layout and working flow of HB2NL algorithm.
Figure 3. Layout and working flow of HB2NL algorithm.
Electronics 11 04131 g003
Figure 4. Nodes Deployment in dimension of 2000*2000*2000.
Figure 4. Nodes Deployment in dimension of 2000*2000*2000.
Electronics 11 04131 g004
Figure 5. Evaluation of Energy Exhausted.
Figure 5. Evaluation of Energy Exhausted.
Electronics 11 04131 g005
Figure 6. Number of received packets.
Figure 6. Number of received packets.
Electronics 11 04131 g006
Figure 7. Analysis of alive nodes.
Figure 7. Analysis of alive nodes.
Electronics 11 04131 g007
Figure 8. Analysis of dead nodes.
Figure 8. Analysis of dead nodes.
Electronics 11 04131 g008
Figure 9. Analysis of PDR.
Figure 9. Analysis of PDR.
Electronics 11 04131 g009
Figure 10. Analysis of surviving nodes.
Figure 10. Analysis of surviving nodes.
Electronics 11 04131 g010
Figure 11. Energy consumption.
Figure 11. Energy consumption.
Electronics 11 04131 g011
Figure 12. Residual energy.
Figure 12. Residual energy.
Electronics 11 04131 g012
Figure 13. Analysis of waiting time.
Figure 13. Analysis of waiting time.
Electronics 11 04131 g013
Table 1. Summary of existing articles, transaction and magazine papers, and books related to WSN and UASNs with their addressed scope of followings where IoT stands for Internet of Things (IoTs), BC stands for BC, Hybrid stand fpr combination of two fields for same problem of interest, NL stands for node localization and RP stand for routing path. The symbol ‘🗸’ indicates the publication in the scope of the domain and ‘✘’ indicates a publication that does not directly cover the area but from which readers may retrieve some related insights. Publications related to both BC and IoT enabled UASNs are shaded along with Our Scope which is marked with *.
Table 1. Summary of existing articles, transaction and magazine papers, and books related to WSN and UASNs with their addressed scope of followings where IoT stands for Internet of Things (IoTs), BC stands for BC, Hybrid stand fpr combination of two fields for same problem of interest, NL stands for node localization and RP stand for routing path. The symbol ‘🗸’ indicates the publication in the scope of the domain and ‘✘’ indicates a publication that does not directly cover the area but from which readers may retrieve some related insights. Publications related to both BC and IoT enabled UASNs are shaded along with Our Scope which is marked with *.
Ref.One Sentence SummeryScope
WSNUASN
IoTBCHybridNLRPIoUTsBCHybridNLRP
[14]A review of TDoA based self-localization🗸🗸🗸🗸🗸
[15]A localization Tracking in WSNs🗸🗸🗸🗸🗸
[16]A detailed approach of topological localization🗸🗸🗸🗸🗸
[16]A grey Wolf Optimization based localization🗸🗸🗸🗸🗸
[17]A New kernelized approach to WSN localization🗸🗸🗸🗸🗸
[18]A comprehensive overview of localization algorithm🗸🗸🗸🗸🗸
[19]An overview of self-learning localization🗸🗸🗸🗸🗸
[20]A lightweight localization scheme for localization🗸🗸🗸🗸🗸
[21]An introduction of secure localization scheme based on trust assessment for WSNs🗸🗸🗸🗸🗸🗸🗸
[22]A survey of Localization Optimization in WSNs Using Meta-Heuristics🗸🗸🗸🗸🗸🗸
[23]A Hybrid localization for underwater 🗸🗸🗸🗸🗸🗸🗸🗸🗸
[24]A survey of localization algorithm in underwater🗸🗸🗸🗸🗸🗸🗸
[25]A Source localization in inhomogeneous underwater🗸🗸🗸🗸🗸🗸
[26]Game theory based hybrid localization🗸🗸🗸🗸🗸🗸🗸🗸
[27]An overview of Anchor node-based range free cooperative IoT-underwater localization🗸🗸🗸🗸🗸🗸
*Our ScopeAn introduction of BC enabled localization for IoUTs🗸🗸🗸🗸🗸🗸🗸🗸🗸🗸
Table 2. Nomenclature of algorithm symbols and equations notations.
Table 2. Nomenclature of algorithm symbols and equations notations.
SymbolsDescription
N B Populations of Beacon nodes
N d Domination/elimination rounds
N r Population response
N c Firefly catching rounds
F P o p B Fitness of population of Beacon node
ϕ i Bacterium vector direction (randomly)
θ i Bacterium’s Platest position
K S D e Knapsack Dynamic equation
L o c B   Localization of B
L o c B v Localization of VBN
L o c B n e g h Localization of Beacon inside neighboring nodes
E c o s t n e g h Cost of neighboring Beacon nodes
B n T r u s t O N Beacon’s Node trust value is ON
B C M i n D a t e Blockchain Miners against data transection
F P o p B Fitness of population of Beacon node
F f Fitness function
P o p Population set
S t d Standard deviation
θ i Bacteria’s latest position
N B Populations of Beacon nodes
N d Domination/elimination rounds
N r Population response
N c Firefly catching rounds
N s Stochastic rounds
K S D e Knapsack Dynamic equation
Table 3. Simulation Parameters and their Values.
Table 3. Simulation Parameters and their Values.
Simulation ParameterValue
Network SimulatorNS-3 (v3.35)
Topology Size2000 m × 2000 m × 2000 m
Initial Energy100 J
Acoustic Network Speed1500 m/s
Number of Nodes700 (including Sinks)
Transmission range200 m
Data packet size50 B
Beacon message size54 B
Bandwidth2Mbps
Traffic TypeCBR
Packet Size512 bytes
Previous Hash16 bytes
Block Header/Block Size80/8 bytes
Link Type of QueueQueue Drop Trail
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Draz, U.; Chaudary, M.H.; Ali, T.; Sohail, A.; Irfan, M.; Nowakowski, G. Trust-Based Beacon Node Localization Algorithm for Underwater Networks by Exploiting Nature Inspired Meta-Heuristic Strategies. Electronics 2022, 11, 4131. https://doi.org/10.3390/electronics11244131

AMA Style

Draz U, Chaudary MH, Ali T, Sohail A, Irfan M, Nowakowski G. Trust-Based Beacon Node Localization Algorithm for Underwater Networks by Exploiting Nature Inspired Meta-Heuristic Strategies. Electronics. 2022; 11(24):4131. https://doi.org/10.3390/electronics11244131

Chicago/Turabian Style

Draz, Umar, Muhammad Hasanain Chaudary, Tariq Ali, Abid Sohail, Muhammad Irfan, and Grzegorz Nowakowski. 2022. "Trust-Based Beacon Node Localization Algorithm for Underwater Networks by Exploiting Nature Inspired Meta-Heuristic Strategies" Electronics 11, no. 24: 4131. https://doi.org/10.3390/electronics11244131

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop