Abstract
In Underwater Acoustic Sensor Network (UASN) based fog systems, the monitored messages are transmitted from the sensors deployed under the water to the surface sinks, which act as the fog nodes, for further processing. To ensure the reliability of the data transmission process, effective routing algorithms are necessary to reduce the packet loss rate as well as the transmission delay caused by potential traffic burst and hotspots. For this reason, a reliable routing protocol against hotspots and burst (RRAHB) is proposed in this paper. The fuzzy decision algorithm (FDA) for nodes path selecting is designed firstly. When the node chooses the next hop, the candidate nodes are evaluated by FDA. It eliminates the subjectivity of expert scoring and ensure fairness and effectiveness of the evaluated scores. But, FDA cannot solve the problems of hotspots and the load unbalance effectively, which are two important factors that cause data packets loss. Based on FDA, the random selection and hotspots avoidance mechanism are presented. The probability of the hotspots can be reduced by the random selection, and the hotspots effect is eliminated by the hotspots avoidance mechanism. In addition, in order to guarantee the network load balance, a priority-based traffic scheduling mechanism (PTSM) is proposed. It solves the traffic surge problem caused by emergency events and reduces the possibility of packets loss. The simulation results verify the effectiveness of RRAHB in the network with dynamic topology. Compared with the traditional routing algorithm, it has great advantages in improving network reliability and enhancing network performance.














Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Al-khatib AA, Hassan R (2017) Performance evaluation of AODV, DSDV, and DSR routing protocols in MANET using NS-2 simulator. In: International conference of reliable information and communication technology. Springer, Cham, pp 276–284. https://doi.org/10.1007/978-3-319-59427-9_30
Al-Qassas RS, Ould-Khaoua M (2013) Performance comparison of end-to-end and on-the-spot traffic-aware techniques. Int J Commun Syst 26(1):13–33. https://doi.org/10.1002/dac.1327
Amiri E, Keshavarz H, Alizadeh M, Zamani M, Khodadadi T (2014) Energy efficient routing in wireless sensor networks based on fuzzy ant colony optimization. Int J Distrib Sens Netw 10(7):768936. https://doi.org/10.1155/2014/768936
Attea BA, Khalil EA (2012) A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks. Appl Soft Comput J 12(7):1950–1957. https://doi.org/10.1016/j.asoc.2011.04.007
Chang XJ, Yu YL, Yang Y, Xing EP (2017) Semantic pooling for complex event analysis in untrimmed videos. IEEE Trans Pattern Anal Mach Intell 39(8):1617–1632. https://doi.org/10.1109/TPAMI.2016.2608901
Cheng Q, Gao CZ (2017) A cloud aided privacy-preserving profile matching scheme in mobile social networks. In: IEEE international conference on computational science and engineering. IEEE, Piscataway, pp 195–198. https://doi.org/10.1109/CSE-EUC.2017.219
Climent S, Sanchez A, Capella JV, Meratnia N, Serrano JJ (2014) Underwater acoustic wireless sensor networks: advances and future trends in physical, MAC and routing layers. Sensors 14(1):795–833. https://doi.org/10.3390/s140100795
Elhabyan RS, Yagoub MC (2015) Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network. J Netw Comput Appl 52:116–128. https://doi.org/10.1016/j.jnca.2015.02.004
Fan JH, Wei XL, Wang TX, Lan T, Subramaniam S (2017) Deadline-aware task scheduling in a tiered IoT infrastructure. GLOBECOM 2017–2017, IEEE global communications conference. IEEE, Piscataway, pp 1–7. https://doi.org/10.1109/GLOCOM.2017.8255037
Ghoreyshi SM, Shahrabi A, Boutaleb T (2017) Void-handling techniques for routing protocols in underwater sensor networks: survey and challenges. IEEE Commun Surv Tutor 19(2):800–827. https://doi.org/10.1109/COMST.2017.2657881
He M, Liu FX, Miao Z, Zhou H, Chen QL (2017) A mechanism of topology optimization for underwater acoustic sensor networks based on autonomous underwater vehicles. Int J Distrib Sens Netw 13(1):1550147716686979. https://doi.org/10.1177/1550147716686979
Huang CJ, Wang YW, Liao HH, Lin CF, Hu KW, Chang TY (2011) A power-efficient routing protocol for underwater wireless sensor networks. Appl Soft Comput 11(2):2348–2355. https://doi.org/10.1016/j.asoc.2010.08.014
Kiani F, Amiri E, Zamani M, Khodadadi T, Manaf AA (2015) Efficient intelligent energy routing protocol in wireless sensor networks. Int J Distrib Sens Netw 11(3):618072. https://doi.org/10.1155/2015/618072
Kojic N, Reljin I, Reljin B (2012) A neural networks-based hybrid routing protocol for wireless mesh networks. Sensors 12(6):7548–7575. https://doi.org/10.3390/s120607548
Lee SB, Cho J, Campbell AT (2003) A hotspot mitigation protocol for ad hoc networks. Ad Hoc Netw 1(1):87–106. https://doi.org/10.1016/S1570-8705(03)00014-3
Li N, Martinez JF, Meneses Chaus JM, Eckert M (2016) A survey on underwater acoustic sensor network routing protocols. Sensors 16(3):414. https://doi.org/10.3390/s16030414
Liao H, Xu Z, Zeng XJ (2014) Distance and similarity measures for hesitant fuzzy linguistic term sets and their application in multi-criteria decision making. Inf Sci 271(3):125–142. https://doi.org/10.1016/j.ins.2014.02.125
Liu Z, Chen X, Yang J, Jia C, You I (2016) New order preserving encryption model for outsourced databases in cloud environments. J Netw Comput Appl 59:198–207. https://doi.org/10.1016/j.jnca.2014.07.001
Liu ZL, Li T, Li P, Jia C, Li J (2018) Verifiable searchable encryption with aggregate keys for data sharing system. Future Gener Comput Syst 78:778–788. https://doi.org/10.1016/j.future.2017.02.024
Marina MK, Das SR (2006) Ad hoc on-demand multipath distance vector routing. Wirel Commun Mob Comput 6(7):969–988. https://doi.org/10.1002/wcm.432
Nicolaou N, See A, Xie P, Cui JH, Maggiorini D (2007) Improving the robustness of location-based routing for underwater sensor networks. IEEE Oceans 2007-Europe, Piscataway, pp 1–6. https://doi.org/10.1109/OCEANSE.2007.4302470
Pari SN, Sathish M, Arumugam K (2018) An energy-efficient and reliable depth-based routing protocol for underwater wireless sensor network (ER-DBR). In: Advances in power systems and energy management. Springer, Singapore, pp 451–463. https://doi.org/10.1007/978-981-10-4394-9_45
Perkins CE, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput Commun Rev 24(4):234–244. https://doi.org/10.1145/190809.190336
Shen J, Zhou T, Wei F, Sun X, Xiang Y (2017) Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things. IEEE Internet Things J 14(8):1–11. https://doi.org/10.1109/JIOT.2017.2775248
Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123. https://doi.org/10.1016/j.jnca.2018.01.003
Sun L, Li Z, Yan Q, Srisaan W, Pan Y (2017) SigPID: significant permission identification for android malware detection. In: International conference on malicious and unwanted software. IEEE, Piscataway, pp 1–8. https://doi.org/10.1109/MALWARE.2016.7888730
Torres-Padrosa V, Manzano M, Calle E, Marzo JL (2015) Community-based traffic preservation in telecommunication networks. Int J Commun Syst 28(4):762–778. https://doi.org/10.1002/dac.2702
Vo TT, Luong TN (2018) VRA-AODV: routing protocol detects Blackhole and Grayhole attacks in mobile ad hoc network. J Comput 13(2):222–236. https://doi.org/10.17706/jcp.13.2.222-235
Wadud Z, Hussain S, Javaid N, Bouk SH, Alrajeh N, Alabed MS, Guizani N (2017) An energy scaled and expanded vector-based forwarding scheme for industrial underwater acoustic sensor networks with sink mobility. Sensors 17(10):2251. https://doi.org/10.3390/s17102251
Wei XL, Wang QP, Wang TX, Fan JH (2017) Jammer localization in multi-hop wireless network: a comprehensive survey. IEEE Commun Surv Tutor 19(2):765–799. https://doi.org/10.1109/COMST.2016.2631146
Wu Y, Xu L, Lin X, Fang J (2017) A new routing protocol based on OLSR designed for UANET maritime search and rescue. In: International conference on internet of vehicles. Springer, Cham, pp 79–91. https://doi.org/10.1007/978-3-319-72329-7_8
Xie P, Cui JH, Lao L (2006) VBF: vector-based forwarding protocol for underwater sensor networks. In: International conference on research in networking, Berlin, pp 1216–1221. https://doi.org/10.1007/11753810_111
Yan H, Shi ZJ, Cui JH (2008) DBR: depth-based routing for underwater sensor networks. In: International conference on research in networking, Springer, Berlin, pp 72–86. https://doi.org/10.1007/978-3-540-79549-0_7
Yu H, Yao N, Wang T, Li G, Gao Z, Tan G (2016) WDFAD-DBR: weighting depth and forwarding area division DBR routing protocol for UASNs. Ad Hoc Netw 37:256–282. https://doi.org/10.1016/j.adhoc.2015.08.023
Acknowledgements
This work was supported by the National Natural Science Foundation of China under Grant No. 61402521, Natural Science Foundation of Jiangsu Province under Grant No. BK20150721, BK20161469, BK20140068; China Postdoctoral Science Foundation under Grant No. 2015M582786, 2016T91017; Engineering Research Center of Jiangsu Province under Grant No. BM2014391. Primary Research and Development Plan of Jiangsu Province under Grant BE2015728, BE2016904, BE2017616. National Key Research and Development Program 2016YFC0800606, 2016YFC0800310.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Qiuli, C., Wei, X., Fei, D. et al. A reliable routing protocol against hotspots and burst for UASN-based fog systems. J Ambient Intell Human Comput 10, 3109–3121 (2019). https://doi.org/10.1007/s12652-018-0810-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-0810-7