A Novel Centrality Metric for Topology Control in Underwater Sensor Networks

Author(s):  
Rodolfo W.L. Coutinho ◽  
Azzedine Boukerche ◽  
Luiz F.M. Vieira ◽  
Antonio Loureiro
2019 ◽  
Vol 68 (2) ◽  
pp. 1487-1500 ◽  
Author(s):  
Yali Yuan ◽  
Chencheng Liang ◽  
Megumi Kaneko ◽  
Xu Chen ◽  
Dieter Hogrefe

Sensors ◽  
2019 ◽  
Vol 19 (1) ◽  
pp. 156 ◽  
Author(s):  
Wenbo Zhang ◽  
Jing Wang ◽  
Guangjie Han ◽  
Xinyue Zhang ◽  
Yongxin Feng

3D topology control in underwater sensor networks is of great significance to ensuring reliable and efficient operation of the network. In this paper, by analyzing the characteristics of an underwater sensor network, we take the cube as the basic unit to perform 3D partition of the monitoring area, define the 3D partition unit and basic cluster structure of the underwater sensor network, and arrange rotating temporary control nodes in the cluster. Then, a cluster sleep-wake scheduling algorithm is proposed that compares the remaining node energy. It selects the node with the largest remaining energy as the working node, and the remaining nodes complete the transition of dormancy and waiting states as long as they reach the preset dormancy time. The node state settings of this phase are completed by the temporary control node. Temporary control nodes selecting and sleep-wake scheduling are used in the algorithm through 3D topology control, which reduces energy consumption and guarantees maximum sensing coverage of the entire network and the connection rate of active nodes. Simulation results further verify the effectiveness of the proposed algorithm.


Author(s):  
Meiyan Zhang ◽  
Wenyu Cai

Background: Effective 3D-localization in mobile underwater sensor networks is still an active research topic. Due to the sparse characteristic of underwater sensor networks, AUVs (Autonomous Underwater Vehicles) with precise positioning abilities will benefit cooperative localization. It has important significance to study accurate localization methods. Methods: In this paper, a cooperative and distributed 3D-localization algorithm for sparse underwater sensor networks is proposed. The proposed algorithm combines with the advantages of both recursive location estimation of reference nodes and the outstanding self-positioning ability of mobile AUV. Moreover, our design utilizes MMSE (Minimum Mean Squared Error) based recursive location estimation method in 2D horizontal plane projected from 3D region and then revises positions of un-localized sensor nodes through multiple measurements of Time of Arrival (ToA) with mobile AUVs. Results: Simulation results verify that the proposed cooperative 3D-localization scheme can improve performance in terms of localization coverage ratio, average localization error and localization confidence level. Conclusion: The research can improve localization accuracy and coverage ratio for whole underwater sensor networks.


2016 ◽  
Vol 1 (2) ◽  
pp. 1-7
Author(s):  
Karamjeet Kaur ◽  
Gianetan Singh Sekhon

Underwater sensor networks are envisioned to enable a broad category of underwater applications such as pollution tracking, offshore exploration, and oil spilling. Such applications require precise location information as otherwise the sensed data might be meaningless. On the other hand, security critical issue as underwater sensor networks are typically deployed in harsh environments. Localization is one of the latest research subjects in UWSNs since many useful applying UWSNs, e.g., event detecting. Now day’s large number of localization methods arrived for UWSNs. However, few of them take place stability or security criteria. In purposed work taking up localization in underwater such that various wireless sensor nodes get localize to each other. RSS based localization technique used remove malicious nodes from the communication intermediate node list based on RSS threshold value. Purposed algorithm improves more throughput and less end to end delay without degrading energy dissipation at each node. The simulation is conducted in MATLAB and it suggests optimal result as comparison of end to end delay with and without malicious node.


Sign in / Sign up

Export Citation Format

Share Document