Abstract
Keywords
Introduction
Underwater wireless sensor networks (UWSNs) are a robust application of the wireless sensor networks (WSNs) that are mainly used for examining the oceanic environment. UWSNs have many applications, for example, pollution examining, mines exploration, 1 and coastline protection, as shown in Figure 1. 2

Applications of underwater wireless sensor networks.
The acoustic sensors collect the data and use a routing scheme to relay it toward the sink. The basic architecture of a UWSN consists of acoustic wireless sensors with one or more sinks that are deployed on the sea surface or underwater, as shown in Figure 2. Unlike sink nodes, the sensor nodes suffer from the limitation of energy along with other constraints. 3 The role of the sink on a sea surface is to collect information and forward it through radio links to the fusion centers for further processing. Sinks are equipped with sound and radio modems along with GPS modules. The communication means used for UWSNs are entirely different from the terrestrial WSNs. Radio frequencies cannot be used for signaling as they are significantly attenuated in water. However, these frequencies can still be utilized for the link between surface-deployed sinks and offshore station(s) as they offer attractive features like low bit error rate, reliability, and significant bandwidth. Using optical signals for communication in UWSNs is also not feasible due to the reason that it needs an accurate line of sight among the nodes. However, because of the dynamicity of the underwater channel, the nodes are hardly placed at the line of sight all the time, frequently altering the optical link. Therefore, using acoustic signals instead is the most feasible and widely adopted method in UWSNs. The effect of the channel is less severe on these signals as compared to the electromagnetic and optical waves. Despite the feasibility of the acoustic signal in the underwater environment, it faces intrinsic challenges that include low propagation speed (1500 m/s), multi-path fading, and high bit error rate varying at different depths.

Network architecture.
Several routing schemes have been designed for UWSNs, for example, vector-based 4 and depth-based. 5 However, various associated issues with such schemes have been pointed out by subsequent research. One of the main issues in vector-based routing schemes is the redundant transmissions of packets. For resolving this issue, the holding time mechanism is proposed in the adaptive hop-by-hop vector-based forwarding (AHH-VBF) 6 scheme that considers various parameters to estimate the packet’s holding time. In addition, the potential forwarding node is selected by considering the distances from sink, virtual vector, and source node. Such distance calculation in this scheme helps to reduce the end-to-end delay (E2ED); however, the duplicate packets are not reduced which results in high energy consumption.
Contributions
In this article, we address the issue of duplicate packet transmission in AHH-VBF by proposing a new protocol called adaptive hop-by-hop cone vector-based forwarding (AHHC-VBF), where we divide the hemispheric forwarding region into smaller portions. These smaller portions are called conic forwarding regions and only the nodes inside these regions are able to forward a particular packet. Due to the smaller forwarding region, a lower number of duplicate packets are transmitted due to which the total energy consumption is lower. In particular, the following are the main contributions of our work:
We have performed an in-depth investigation of the limitations of AHH-VBF protocol;
We have proposed a new protocol, AHHC-VBF, to increase the transmission reliability in sparse sensor regions in UWSNs by selecting the optimized route for packet transmission via constructing a cone type directional structure;
Our proposed scheme increases energy efficiency by selecting the appropriate height/opening of the cone to adjust the optimal transmission power of a node;
We introduce a new parameter “desirableness factor” in the previous scheme (AHH-VBF) to assign priorities to conic potential forwarding nodes (CPFNs);
Our proposed protocol addresses the void hole and traffic congestion problem by adjusting the base angle of the cone based on the neighbor’s information;
Our proposed protocol reduces the duplicate packets as well as energy consumption with the help of holding time calculation which makes the node having the least number of forwarders forward the packet;
We have performed an extensive evaluation of our proposed scheme to measure the performance of the network in terms of packet delivery ratio (PDR), ETX, energy consumption, E2ED, and accumulated propagation distance (APD).
The remaining article is organized into the following sections. The related work is described in section “Related work.” Section “Channel model” describes the channel model and preliminaries (basic terminologies used in the article). Section “Proposed approach (AHHC-VBF protocol)” describes our proposed approach of AHHC-VBF including the method of finding CPFNs, holding time calculations, desirableness factor, and various types of packets. Section “Experimental setup” describes the experimental setup for our simulations. The results and discussions are provided in section “Results and discussions,” where a detailed performance comparison of our proposed AHHC-VBF protocol with the AHH-VBF is performed. Finally, section “Conclusion and future work” concludes our work and gives future recommendations.
Related work
The existing protocols proposed for UWSNs are described in this section. Several routing strategies are proposed including vector-based,4,7,8 depth-based,5,9–11 cluster based,12,13 and AUV-based,14–16 as summarized in Table 1.
Existing routing protocols for UWSNs.
UWSN: underwater wireless sensor network; FBR: focused beam routing; DFR: directional flooding-based routing; VBF: vector-based forwarding; HH-VBF: hop-by-hop VBF; AHH-VBF: adaptive HH-VBF; EBVBF: energy-balanced VBF; ESEVBF: energy-scaled and expanded VBF; DBR: depth-based routing; WDFAD-DBR: weighting depth and forwarding area division DBR; GEDAR: GEographic and opportunistic routing with Depth Adjustment-based topology control for communication Recovery; AURP: AUV-aided underwater routing protocol; QELAR: Q-learning-based energy-efficient and lifetime-aware routing; EBERR: energy balanced efficient and reliable routing; E2ED: end-to-end delay; PDR: packet delivery ratio; RTS: request to send; CTS: clear to send.
Networking in UWSNs is the facilitation of technology for various applications inside water. There exist many applications of UWSNs, for example, oceanographic data gathering, pollution monitoring, strategic surveillance applications, disaster management and control, ocean exposure, and offshore surveying. We have classified the previous work into the following segments: the research challenges, a brief survey of the UWSNs routing protocols, energy-efficient routing protocols, depth-based routing protocols, and location-based routing protocols. Akyildiz et al. 17 describe various research challenges in UWSNs including several central aspects of underwater acoustic communication, that is:
Different architectures of UWSNs for two- and three-dimensional scenarios;
Cross-layer method and channel characteristics;
Network topology and valuable cost of devices for UWSNs;
Comparison of terrestrial sensor networks and UWSNs.
With the expansion of the research in UWSNs, researchers also recognize the more prominent issues in this field, for example, large propagation delay, repeated loss of connectivity during communication, control on energy sources causing the damage of the whole network, and low communication bandwidth.
Jornet et al. 18 presented a protocol for increasing the network’s lifetime and reducing the consumption of energy. The protocol is named as focused beam routing (FBR) protocol, and it uses a continuous power level instead of the variable for constraining the flooding. This protocol utilizes the location information to forward packets, that is, the location of sensor nodes and the destinations. The duplicate packets and flooding are reduced; however, more duplicate packets result in increasing the E2ED.
Another protocol, called directional flooding-based routing (DFR), for reducing energy consumption is proposed by Hwang and Kim. 19 This protocol is based on the approach of bounding the flooding region with the base angle several nodes, that is, source and destination nodes as well as the node which forwarded the packet previously. The base angle is determined by the node’s density and the link. However, the current angle is based on the source and destination. When a packet is broadcasted by the source node, it is received only by the nodes lying in the range of the base angle while rejected by the ones lying outside the range. This protocol results in lower energy consumption; however, a higher power level is used. Also, finding the potential forwarding nodes is difficult in a sparse network and may result in voice hole.
Dhongdi et al. 20 discuss energy efficiency, sources of energy, constraint, and the routing protocol in detail. They describe several harvesters that produce energy from various sources via different harvesting devices to convert electrical and mechanical energy into energy for powering the sensors. In addition, the different routing paths used by the sensors for carrying their data to the destination result in higher energy consumption. The protocols using the most prominent paths are the ones with compromised energy. Rani et al. 21 reviewed different types of routing protocols and classified them in accordance to their routing strategy and characteristics. The classification is based on the technique on which the UWSN routing protocol is established. These classifications are as follows: algorithm based, and cross- and non-cross-layer policy based. The authors discuss several types of algorithms including the ones that are more prominent and attractive in UWSN routing. On one hand, in cross-layer routing protocol, one layer can depend on another for receiving information. On the other hand, in a non-cross-layer protocol, each layer is independent and operated on their specific function provided by the lower layer. Therefore, in a non-cross-layer protocol, each lower layer is interfaced with the upper layer; however, the function of each layer is different.
UWSNs use acoustic signals because of the higher attenuation of radio signals. 9 This results in high E2ED and imbalanced consumption of energy during the communication of sensors and sink nodes. In particular, the imbalances in the energy of the nodes near to the sink nodes are weak because of load sharing between sensors and sink nodes. In this regard, Cheng and Li 22 have approached these imbalances of energy and long delay times in networks using two different methods. The first method uses the autonomous underwater vehicle (AUV), while the second one utilizes the multi-hop transmission. In the previous research, it is pointed out that the AUV is used to collect a higher amount of data from the traveling path to minimize the routing time. In addition, the multi-hop transmission is discussed in several routing protocols which depend on the architecture of the network. First, they classify the data level based on its importance and then collect the data using AUV. Importance levels of data are based on the difference of nodes measured from the collected data, that is, when the node is more distant from each other, the difference is large compared to the other nodes.
An adaptive energy-efficient as well as lifetime-aware routing scheme has been proposed by Hu and Fei. 23 This protocol uses machine-learning approach of reinforcement learning, called Q-learning-based energy-efficient and lifetime-aware routing (QELAR), for increasing network’s lifetime by even distribution of the node’s residual energy. According to the authors, no extra devices or downlink communication/location information are needed for this protocol and therefore it can be effectively used for mobile UWSNs. Wadud et al. 24 proposed a protocol named energy-scaled and expanded vector-based forwarding (ESEVBF) for reducing the energy consumption and duplicate packets. Their approach is based on expanding the holding time difference on the basis of several factors such as residual energy and the pipeline’s width. The authors claim to achieve a longer network lifetime with their approach because fewer number of nodes expire in the given time interval. However, the packet delivery rate (PDR) is not improved because of the suppression of more nodes due to the forwarding scheme. For this reason, they proposed another protocol to stretch the holding time difference 25 that is basically a more enhanced version of ESEVBF protocol. 24 In this protocol, the technique of holding time calculation is extended from the first to the second hop forwarder to determine the best path. The authors also claim a reduction of void holes’ occurrences due to this strategy. However, due to the more control packets in this protocol, overhead is increased. Similarly, for increasing the network’s lifetime, Abbas et al. 26 proposed another protocol called energy-balanced vector-based forwarding (EBVBF). This protocol aims to balance the energy of nodes and get rid of network’s zones for avoiding the potential disturbances in communication in nodes and their sinks. For energy balancing, another protocol called “Energy Balanced Efficient and Reliable Routing (EBERR)” has been proposed by Wadud et al. 2 In this protocol, the expected next hop is considered for finding the potential forwarders. In addition, two embedded sinks are deployed that increase the packet delivery. Overall, this protocol achieves a longer network lifetime; however, the corresponding E2ED is also increased because of avoiding a complete greedy approach. In addition, the cost is a bit increased due to the communication of the embedded sinks via high-speed fiber medium.
Coutinho et al. 27 proposed GEDAR (GEographic and opportunistic routing with Depth Adjustment-based topology control for communication Recovery) routing protocol in which different phenomena are discussed. They describe the depth adjustment of a node in case of a void hole occurrence and use a winch-based apparatus or bouncy-based apparatus to recover from the void hole. If there is no void hole created in the communication, the GEDAR uses the greedy forwarding strategy. In a WSN, two types of holes can occur. The first type is the one which occurs because forwarder nodes are not available. The second type is the energy hole that results because of the lack of balanced data traffic. The performance of the network is adversely affected when void hole is created. Wadud et al. 28 proposed a protocol that focuses on alleviating the hole for prolonging the network lifetime. Their approach aims at balancing energy dissipation by dividing the number of transmissions evenly in various network areas. They focus on the forwarding nodes and the transmission region for communication. They divided the whole communication region into small areas, that is, small cubes. In addition, the choice of the next-hop forwarding node is also made based on the nodes present in the cube nodes. The vector-based forwarding (VBF) 7 and hop-by-hop vector-based forwarding (HH-VBF) 8 routing protocols are proposed in the literature. The VBF protocol guides the network through a vector virtually drawn from a source node to a sink node, that is, the destination node. The VBF protocol is efficient in dense sensor networks, while the HH-VBF protocol in sparse sensor networks. In both protocols, a pipeline is made according to the node distribution of the network and the sensor node advances their packets based on the pipeline. In VBF, the forwarding area and the direction of the pipeline of a source node remain constant for the entire communication, while in HH-VBF it changes at each hop, as a result, the PDR is improved.
Yu et al. 6 presented a novel approach, called AHH-VBF, for enhancing the performance of HH-VBF. The AHH-VBF differs from HH-VBF in the following areas: first, in AHH-VBF, the direction and radius of the pipeline are changed at each hop according to the network structure in sparse and dense networks. This further restricts the next-hop forwarding region of the current forwarder node. In contrast, the HH-VBF merely focus on changing the pipeline’s direction. Second, in AHH-VBF, the transmission power is changed adaptively at each hop based on the distribution of the node saving transmission energy. However, the transmission power of the source node remains constant in HH-VBF. Third, the AHH-VBF changes its holding time phenomena of the packet at each node, while in HH-VBF, several distances are considered for calculating the holding time, for example, source node and last-hop forwarder, virtual vector and forwarder. AHH-VBF searches for the node that is closer to the destination node and assigns it a high priority which is eventually selected as the forwarder.
For avoiding void hols in UWSNs, a protocol based on proactive strategy is proposed in Khan et al. 29 This protocol considers the type of network (e.g. dense, sparse network) and adjusts the communication methodology accordingly. For dense or partially dense areas in the network, a vertical inter-transmission technique is used, while clusters are formed for the sparse regions. Another protocol named energy-efficient multi-level clustering protocol for underwater wireless sensor networks 30 is proposed where the residual energy is used for making the clusters or logical levels. The same level is assigned to nodes which have similar energy and the cluster heads of higher energy are used for communication. The authors claim higher longer network lifetime with this approach. In this article, we propose a new protocol called AHHC-VBF, which is based on AHH-VBF. We articulate that the network has the following properties:
Every node is aware of its own position x, y, z and the position of the sink node (destination node).
In UWSNs, the nodes are always in transit due to water currents. However, we consider the random-walk mobility model in which each node moves inside the specified regions slightly in the vertical directory but can move randomly in a horizontal direction.
We consider that the sink node is grander node; it receives a lot of data at once and also handles it without interference.
Each source node follows a cone type geometry-shape for selection of forwarder, such that the packet redundancy is minimized and the ETX of the network is improved.
The existing routing protocols for UWSNs are summarized in Table 1.
Channel model
The underwater acoustic channel is often considered a difficult medium of communication due to its limited transmission bandwidth and poor quality of communication. Designing a reliable communication strategy is often challenging because of the highly frequency-selective and time-varying nature of the channel. There are various parameters that affect the nature of acoustic channel such as salinity, temperature, and water depth. Figure 3 31 shows the relation between acoustic speed and water depth using thermoclines. Mathematically, the speed of acoustic signal can be represented using equation (1) 32
where

Schematic diagram of sound speed profile in (a) winter, with a mixed layer to a depth of 200 m, and (b) summer, when solar heating creates a seasonal thermocline (depth axes not to scale).
The acoustic channel is attenuated in underwater sensor networks over a distance
where

Effect of propagation distance traveled on acoustic signal.
Equation (3) is suitable for high frequencies, while for lower frequencies, equation (4) may be used
The underwater noise can be expressed by the formula given in equation (5) 32
where
The signal-to-noise ratio (SNR) for frequency
where
In addition to the above parameters, acoustic modems are also an integral part of the acoustic channel and have an impact on communication. They are categorized as commercial acoustic modems and research acoustic modems. Table 2 35 presents the properties of some of the commercial acoustic modems designed for UWSNs.
Properties of commercial acoustic modems for UWSNs.
UWSN: underwater wireless sensor network.
Preliminaries
In this section, we define the key terms used in the article.
Definition 1
Contestant nodes
The
where
Definition 2
Eligible neighbor nodes
Definition 3
Region toward destination (RTD): the region of the transmission range where all the nodes are closer to the destination than the current one is called RTD. Let
Proposed approach (AHHC-VBF protocol)
This section describes our proposed protocol called AHHC-VBF based on AHH-VBF. In AHHC-VBF, the transmission region (forwarding region of the source node) is adjusted to achieve the following goals:
Save energy of the entire network efficiently for the prolonged existence of the whole network;
Decrease the E2ED of the packet, that is, increasing the throughput of the network;
Guarantee reliability in communication.
High mobility and non-uniform distribution of the sensor nodes occur in UWSNs due to water currents; in some regions, the network becomes dense (density of the node is high) while in others it becomes sparse (density of the node is low). Therefore, we propose AHHC-VBF, in which we adaptively monitor the next-hop forwarding region by constructing a cone (three-dimensional geometric shape) forwarding structure so that we adaptively adjust the height and radius (opening) of the cone according to the node distribution. According to the definition, the opening (upper region of the cone), as shown in Figure 5, is defined on the basis of the base angle

The proposed model.
We start from the small base angle
Let us consider the example shown in Figure 5; there are transmission regions R1 (node S region) and R2 (node F region), a current source node S, and a sink node G which is the desired destination node. TR is the transmission range of the source node and also the height of the cone. The packet needs to be transmitted from the source node (S) to the destination node (G). During the analysis of the network topology, we found the status of the network. In region R1, we have a dense region in the RTD of the existing source node and therefore we have to set up a small base angle for a cone, that is, the small opening of a cone to achieve a small number of CPFNs inside the cone which are eligible for next forwarding.
The nodes that are in the range of the forwarding node are known as the contestant nodes. Therefore, the nodes, for example, “A, B, C, D, E, F, I, H” existing in region R1 are the contesting nodes to collect the packet sent by a source node S. When a received packet at the source node S is forwarded, all the contestant nodes (i.e. “A, B, C, D, E, F, I, H”) inside region R1 collect the packet and send it to the next forwarder. However, nodes I and H are the suppressed nodes (i.e. the depth is greater than S) and they simply drop the received packet. In addition, nodes E and D present in the RTD of the source node are the ENNs (not the CPFNs) and they also discard the packet after calculating their respective positions. The nodes that are present inside the CPFNs are the appropriately selected nodes for the next forwarding of the received packet from the current source node S. The node F is the best forwarder as it first sends the packet due to its shorter holding time as compared to the other CPFNs A, B, and C present inside the cone. When the holding time of the CPFNs A, B, and C expires, it will also transmit the packets. However, before transmitting, they will observe that the packets have been forwarded by node F (the best forwarder node); therefore, the CPFNs A, B, and C will also discard the packets. In region R2, there is a sparse region of the network, that is, a smaller number of ENNs are present in this region. We started according to equation (12) from a small base angle of the cone and gradually increased the setup of the base angle according to the node distribution in the RTD of the source nodes. Therefore, the cone opens up, that is, there is more probability of the CPFNs being present inside the cone, which also minimizes the creation of void hole for further forwarding of the packets. For the sparse region, the smaller size of the base angle may create a void hole. However, when we gradually increase the size of the base angle of the cone, the opening of the cone is increased and there are chances of the CPFNs of the source node. Also, as we increase the size, that is, the base angle of the cone, then the upper region, which is the opening region of the cone, is spread more than the lower region. Therefore, the probability of finding the best CPFN nodes is increased. In R2 nodes, K and N are the ENNs nearer to the source node but they are not CPFNs, therefore it is not the candidate’s nodes for forwarding the packet. In this way, the redundancy of the packet is also minimized. Node M is the best next-hop forwarder CPFN, and it will forward the packets received from node F. In addition, we have the transmission ranges for UWSNs which depend on the transmission power. The transmission ranges also increase with the increase in transmission power. Unlike terrestrial sensor networks, energy constraint is important in UWSNs. Therefore, to reduce the overall energy consumption in AHHC-VBF, the node’s distribution should be considered to adaptively adjust the transmission/forwarding power hop-by-hop. Algorithm 1 and Figure 6 describe the details of the forwarding technique used in AHHC-VBF. In addition, the proposed scheme uses the technique presented in Algorithm 2 in case of a void hole. The packet type and IDs are given in Table 3.

Overall working of AHHC-VBF.
Packet type and IDs.
Finding CPFNs in AHHC-VBF
This section describes the method of finding whether a node is inside the cone of a source node or not. We discuss this search process of CPFNs. The candidate nodes (the ones lying inside the cone of node S) either transmit the packet to the destination node (sink) if it is located within the range or to the next-hop forwarding nodes. When the nodes are present inside the cone, we also consider the priority of CPFNs using equation (13). The search process of CPFNs is as follows: first, the distances of the ENN from the source node and the nodes from the virtual vector are calculated, that is, the horizontal length (distance) from the virtual vector of the source node for each ENNs present in the RTD of the source node. Let us consider an example where we have an ENN A as shown in Figure 7 having coordinate

Method of finding CPFNs.
Using equation (11), we find the distance of all ENNs node present in the RTD of the node S. Similarly, we can find the distance of each node from the virtual vector
Similarly, we can find the angles
Holding time calculation for AHHC-VBF
Holding time is calculated to overcome packet redundancy and enhance the network’s performance. During this calculation, every next-hop forwarding node (that exists in the source node’s range) forwards the packet only after waiting for a specified amount of time, to avoid forwarding by the other close by nodes to the destination. If every node inside a cone or within the RTD of a source node forwards the packet, there will be a lot of redundancy at the receiver end and numerous duplicate packets will be created in the network. Due to the duplicate packets, the following complex situation may occur. First, as the bandwidth of the acoustic communication is much lower than the terrestrial communication, the collision probability is increased at the receiver end. Second, the lifetime of the network will be reduced because of the additional consumption of energy while transmitting or receiving the packet. Therefore, to reduce the cost caused by the duplicate packets, the holding time concept is proposed in UWSNs. As shown in Figure 8, the formula for a node to hold the packet
where
and
where S is the forwarding node of the last hop and G is the sink node at the water’s surface. TR is the transmission range of the last-hop forwarding node. To reduce the power consumption, the node’s distribution in the network is used to adaptively adjust the TR.

Holding time calculation.
Desirableness factor
Desirableness factor represents the “suitability” of forwarding a packet by a node. Let us consider the example in Figure 8, the virtual vector
From the definition of the desirableness factor, it is proven that the range of
Prioritizing forwarder.
We give priority to the next forwarder based on the value of the desirableness factor. Their priorities are given in the following condition:
Best forwarder > Good forwarder > Normal forwarder > Worst forwarder
Those CPFNs will transmit the packet in the next-hop forwarding nodes which are more distant from the source node and have a minimum distance from the virtual vector. The node is known as optimal node and its position is also good, that is, the node is suitable for forwarding for which the desirableness factor value is smallest, that is,
Packet type, neighbor table, and packet queue
In our proposed scheme, each node has to advance or collect the three types of packets, that is, NR, ACK, and DATA. NR represented by NR (refer to Table 11) is used to find the competent neighbor nodes. The NR packet format is a string of (typeID, SID, Depth, X-axis, Y-axis, Z-axis). The typeID field is used to recognize the packet type. The typeID field value for NR packet is “1.” The SID and Depth contain the address and depth of the current source node (forwarder node), respectively. X-axis, Y-axis, and Z-axis denote the position of a node in terms of x, y, and z coordinates, with respect to the source node. The ACK packet is the reply of the nodes, receiving the NR packet. The string of the ACK packet is (typeID, SID, Depth, Angle-info, Ax, Ay, Az). The value of typeID field for the ACK packet is “2” or “3” depending on the region of the node as shown in Table 3. If a particular node is inside the cone, then the typeID is “2” and “3” if it is outside the cone. SID contains the address of the source node and Depth contains the depth of nodes sending ACK. Angle-info denotes the angle information of the neighbor node constructing with the virtual vector of the source node. Ax, Ay, and Az denote the x, y, and z coordinates, respectively, of the node sending ACK packets. The DATA packet contains the desired information for which the whole protocol is designed, that is, the information intended to be sent to the destination (sink node). The header of the DATA packet is a string of (typeID, SID, PID, DID, X-axis, Y-axis, Z-axis,
In some scenarios, when more than one node generates the same packet, a duplicate packet is encountered at the receiver’s end resulting in extra energy consumption. Also, when the node collects the information of the neighbor node, it sends NR every time resulting in increased E2ED as well as higher energy consumption. Therefore, to avoid this, the packet queue and neighbor table are established at each node. The neighbor table is a string of (NEIGHID, DISTANCE, DEPTH, NEIGHX, NEIGHY, NEIGHZ, TIMESTAMP), where NEIGHID denotes the neighbor node address, DISTANCE denotes the separation of two neighbor nodes, and DEPTH is the neighbor nodes depth. NEIGHX, NEIGHY, and NEIGHZ denote the x, y, and z coordinate of the contestant node, respectively. TIMESTAMP shows the time after which we update the neighbor entry. The packet queue (established to avoid duplicate packet) format is shown as tuple (SID, PACKID, FLAG), where SID is the source node address and PACKID is the PID of the packet. FLAG is a one-bit Boolean number which will be either true or false, the flag value of “1”(true) means the corresponding packet has been forwarded.
Experimental setup
We performed an extensive simulation to evaluate the performance of AHHC-VBF. We have used the Pure Aloha MAC protocol as it has also been used in AHH-VBF. In addition, all experiments of our work have been performed using MATLAB as a simulator tool. The overall experimental setup of our proposed scheme is summarized in Table 5. We deploy 100–500 nodes in the region of 10 km × 10 km 10 km (length × width × height) for simulation purpose, the average volume covered by each node varies from 10 to 2 km3 and a total of nine sinks are deployed which are fixed at the water surface. Data header size is 11 bytes, while the size of payload (data) is 72 bytes and the data rate is 16 kbps. The size of both NR and ACK packet is 50 bits. The experiments are run over 100 times in each round, while in each round trip, a random network topology is generated. To confirm the reliability of communication, one packet should be generated approximately in 5 s. The initial energy of a node is 100 J. The transmission and receiving power are 50 W and 158 mW, respectively, for a packet. Also, due to water currents, the sensor nodes move randomly. To restrict the sensor nodes’ movement from getting outside the node deploying region, the Random Walk 2D mobility model is used. The nodes change their direction of movement every 2 s at the speed of 1–3 m/s. The Random Walk 2D mobility model enables movement of sensor nodes in horizontal direction, that is, in a two-dimensional X-Y plane (common mobility in the underwater wireless environment). However, this may not be the case in reality as there is usually some slight movement of nodes in vertical direction also.
Parameters setting.
Metrics
The proposed system is evaluated using the following metrics: PDR, ETX, E2ED, and APD.
PDR can be defined as “the ratio of the number of packets that successfully reach a destination node to the number of packets sent by source node.”
Mathematically, PDR can be expressed as shown in equation (14)
ETX is defined as “the sum of average energy consumption of each node when a packet reaches to the sink node successfully.” It contains several types of energies such as ETX (transmission energy for a packet), ERX (receiving energy for a packet), IDLE (energy for the idle state of a node), and the energy for CTRL (energy for sending control packet).
Mathematically, ETX can be expressed as shown in equation (15)
where
E2ED is stated as “the total time taken by a packet to get it delivered from the source node to the destination node.” It contains several types of delays such as transmission delay, propagation delay, holding time, and processing delay. In addition, the packets may be received by more than one sink node as we have multiple-sink (nine sinks) network, therefore in such cases, the shortest E2ED will be considered.
Average APD is the average distance that a packet covers during passing through many hops and reaching successfully from source to sink node. Also, because of the multiple sinks (nine), the shortest APD is considered as the final APD. The APD can be calculated using the formula given in equation (16)
where
Results and discussions
We compare the AHHC-VBF against AHH-VBF in terms of the metrics defined, that is, APD, ETX, E2ED, energy consumption, and PDR. Each comparison is discussed in the following subsections.
PDR comparison
The PDR increases with the increase in the number of nodes in both protocols AHHC-VBF and AHH-VBF. The reason is that due to the increase in nodes, the creation of holes is decreased resulting in increased PDR as shown in Figure 9. Routing protocols have two kinds of associated holes’ occurrences. One hole occurs when there is no potential forwarding node in the range of a source node which is called coverage hole and the other one is called energy hole which is due to lack of energy with the current source node, that is, the source node not having sufficient threshold energy (50 mW). When the number of nodes reaches 500, the effective neighbor nodes achieve their maximum number. However, the collision rate of packets is increased, that is, the success rate of the packets is decreased with the increased node density. When the probability of a successfully forwarded packet is higher, there is a higher average number of neighbors per node. In AHH-VBF, PDR also increased with the increase in nodes but it is lower than AHHC-VBF. The main reasons are as follows: when we limit the forwarding region to the cone, a smaller number of nodes forward the packet and there is a high probability that no or negligible amount of collisions take place at the receiver side. In contrast, AHH-VBF uses a large forwarding region (pipeline) due to which a relatively higher number of nodes forward the packet, therefore the collision probability is higher at the receiver resulting in a higher number of lost packets. Also, AHHC-VBF tries to maximize the reliability by adaptively adjusting the height and opening of the cone if a node does not find CPFNs. Increased reliability means a lower packet loss and improved PDR.

PDR versus node number.
E2ED comparison
The comparison of the E2ED between AHH-VBF and AHHC-VBF is shown in Figure 10(a). The E2ED is reduced with increasing nodes for both AHH-VBF and AHHC-VBF. This is because, within the given range of the pipeline and the cone, the number of qualified forwarding nodes increases. Furthermore, the E2ED reduces for both, with increasing transmission range as the number of hops covered by a packet to reach the sink decreases. The E2ED of AHHC-VBF is lower than AHH-VBF because the opening (base angle) and height of the cone are adaptively adjusted according to the distribution of the nodes. In addition, we select the node which is closer to the destination node and virtual vector of the source node to forward the packet. Figure 10(b) shows the performance of AHHC-VBF in comparison with AHH-VBF on different node densities with varying transmission range. We observe that for a given node density, the percentage improvement decreases with the increasing transmission range because both AHHC-VBF and AHH-VBF can easily find the best forwarders nearer to the sink.

(a) E2ED versus node number; (b) E2ED (s) versus network size (nodes) and transmission ranges (m).
Furthermore, for a given transmission range, the percentage improvement decreases with the increasing number of nodes in the network as shown in Table 6 because for a larger number of nodes, both protocols are equally probable to find optimal forwarder. Furthermore, for a given transmission range, the percentage improvement decreases with the increasing number of nodes in the network because for larger number of nodes, both protocols are equally probable to find optimal forwarder.
Comparison of AHHC-VBF and AHH-VBF on varying node density
AHHC-VBF: adaptive hop-by-hop cone vector-based forwarding; AHH-VBF: adaptive hop-by-hop vector-based forwarding; PDR: packet delivery ratio; E2ED: end-to-end delay.
ETX comparison
ETX is defined as the total average energy consumption of each node when a packet is reached to the sink node successfully. The comparison of ETX between AHH-VBF and AHHC-VBF is shown in Figure 11. The ETX is reduced with an increasing number of nodes. This is because, with the increasing node density, the number of successful packets increases reducing the ETX. The energy of a node is wasted in different scenarios, such as when the next-hop forwarding node is not found in some region due to the void hole (sparse region) and when duplicate packets are transmitted due to poor design of holding time. ETX of AHHC-VBF is lesser than the average ETX of AHH-VBF because of the following factors: first, we adjust the height and spreading region of the cone up to a very immense amount that the creation of the duplicate packets is controlled effectively in this region. Second, energy is efficiently consumed by adaptively changing the source power of transmission, according to the distance from the farthest forwarding node (CPFN).

ETX versus network size (nodes).
Third, the size of the REQUEST and ACK packets is very small as compared to the sizes used in AHH-VBF, therefore the energy required for a REQUEST and ACK is much less, while the information is received by more than one neighbor node via one neighbor request. In addition, the energy consumption of the AHHC-VBF is very small in the range of 340–500 nodes, that is, it almost reached to idle energy as compared to AHH-VBF. This is because, we only consider the CPFNs present in the RTD of the source node, that is, we consider those CPFNs that are more nearer to the sink node (located in the range of the source node) and virtual vectors of the source node.
APD comparison
The APD is defined as the total average distance accumulated by a packet when it passes through many hops and reaches successfully from the source node to a sink node. The APD comparison between AHH-VBF and AHHC-VBF is shown in Figure 12. The APD of AHHC-VBF is less than the AHH-VBF for all densities of the network. This is due to the fact that AHHC-VBF considers the number of hops to sink, in addition to the other parameters in calculating the value for alpha. It further searches for a CPFN having the shortest link toward the sink resulting in a smaller number of hops covered by the packet from source to sink, and therefore eventually decreasing the APD. However, in AHH-VBF, the number of hops is not considered when calculating the value of alpha for a forwarding node. This results in a higher probability for the packet to reach the sink after passing through a relatively large number of hops and therefore resulting in a higher value of APD. This is because, when there is a sparse region of the network, more opening of the cone is required to decrease the transmission failure of the packet and as a result, the APD is increased. As we adjust the base angle of the cone at each node (at each hop), the opening region of the cone is restricted with the increasing nodes resulting in a more directional communication and decreased APD.

APD versus network size (nodes).
Analysis on various node densities and transmission ranges
We further performed simulations on different transmission ranges to verify the validity of AHHC-VBF. For a given number of nodes in a network, the increase in transmission range results in more area covered by a node. In other words, more number of nodes will come in the transmission range of the particular node. The node will have a high probability to find CPFNs nearer to the sink resulting in decreased E2ED as shown in Figure 13(a).

(a) Average E2ED (s) vs network size (nodes); (b) average E2ED (s) vs transmission range (m).
The E2ED of AHHC-VBF is less than AHH-VBF for a given node density and transmission range. This happens because in AHHC-VBF, if a node does not have CPFNs, it quickly increases the opening of the cone. However, in AHH-VBF, in case of non-availability of CPFNs for a node, the transmission range is increased which requires high computation time. We also observed that the percentage improvement in E2ED decreases from low to high network density as well as from small to large transmission range, as shown in Table 7. This is because, for dense network scenarios, both are equally probable to find best forwarders. For large transmission ranges, both have a large number of nodes residing in their range that increases the probability of finding a forwarder node near the sink. Figure 13(a) and (b) shows that the E2ED is high for low network density and low transmission range because for a sparse network scenario, the node mostly fails to find the forwarder in the direction of the sink and the packet reaches the node through a long path. Similarly, the E2ED is high for small transmission range because the packet passes through a large number of hops to reach the sink node. Figure 14(a) and (b) shows the change in the number of forwarded copies of data packets with varying node densities and transmission ranges. For sparse network scenarios and small transmission ranges, fewer data packets are forwarded. The reason for this is that most of the packets cannot reach the next-hop forwarder. As the network becomes denser, the source node can easily find next forwarder, therefore the forwarded copies of data increase.
Percentage improvement in average E2ED.
E2ED: end-to-end delay.

(a) Total forwarded copies of data versus network size (nodes); (b) total forwarded copies of data versus transmission range (m).
For large transmission range in a sparse network scenario, the total number of forwarded copies of data is large as compared to a small transmission range. This is because, for a large transmission range, the probability is high that a node will have CPFNs.
We observe that with increasing transmission range and node density, the total forwarded copies of data reduce. This happens because, in case of large transmission range and high network density, the probability of packet collision is high, resulting in a large number of packet loss. We also observe that the total forwarding copies of AHH-VBF are larger than those of AHHC-VBF for a given transmission range and node density because the forwarding area in AHHC-VBF is smaller than that of the AHH-VBF due to which lesser number of nodes are selected for forwarding as compared to AHH-VBF. In addition, we analyzed that percentage improvement increases with the number of nodes. Furthermore, average percentage improvement decreases with the increasing transmission range, as shown in Table 8.
Percentage improvement in total forwarded copies of data.
We further analyzed AHHC-VBF for the total energy consumption of the network. Network energy consumption occurs due to many factors, for example, packet transmission and receiving, processing and control packets transmission and receiving. Among all these factors, packet transmission majorly contributes to the total energy consumption of the network. Figure 15(a) and (b) shows the total network energy consumption of the network with varying transmission ranges and node densities. These figures show that AHHC-VBF consumes lower energy compared to AHH-VBF due to the lower number forwarded packets in the former. The total energy consumption is very low in sparse network scenarios due to the following reasons: first, for a sparse network scenario, most of the data packets fail to go upstream; second, only few duplicate packets are transmitted; and third, due to low network density, fewer nodes receive the data packet. In contrast, for a dense network, the total energy consumption is high as compared to that of a sparse network. In addition, we analyzed that percentage energy consumption increases with number of nodes in the network and decreases with transmission range as shown in Table 9. There are a number of reasons for this: first, due to a large number of successful packets, high energy is consumed; second, a large number of nodes receive the data packets; and third, the higher number of duplicate packets’ transmission also results in higher energy consumption.

(a) Total energy consumption versus network size (nodes); (b) total energy consumption versus transmission range (m).
Percentage improvement in energy consumption.
Conclusion and future work
A routing protocol called adoptive hop-by-hop cone vector-based forwarding (AHHC-VBF) for underwater acoustic sensor networks (UWSNs) is proposed in this article. It enhances the performance of the state-of-the-art counterpart routing protocol, that is, AHH-VBF. In particular, our proposed protocol aims to reduce ETX and total energy consumption, improve PDR, and reduce E2ED. Extensive simulations have been performed to verify the validity of the proposed protocol. Our results demonstrate that AHHC-VBF improves PDR by 11.87% and ETX by 19.18%. Overall, the total energy consumption reduces by 9.16% and E2ED by 4.23% against the state-of-the-art counterpart as shwn in Table 10. However, some performance trade-offs have been observed due to the setting of the cone angle on the basis of the neighboring nodes’ information. In future, the performance of AHHC-VBF can be improved by reducing duplicate packets and balancing energy among the neighbors when the cone angle is increased.
Overall improvements.
E2ED: end-to-end delay.
The acronyms used in the article are defined in Table 11.
Acronyms.
