A reliable routing protocol against hotspots and burst for UASN-based fog systems

In Underwater Acoustic Sensor Network (UASN) based fog systems, the monitored messages are transmitted from the sensors deployed under the water to the surface sinks, which act as the fog nodes, for further processing. To ensure the reliability of the data transmission process, effective routing algorithms are necessary to reduce the packet loss rate as well as the transmission delay caused by potential traffic burst and hotspots. For this reason, a reliable routing protocol against hotspots and burst (RRAHB) is proposed in this paper. The fuzzy decision algorithm (FDA) for nodes path selecting is designed firstly. When the node chooses the next hop, the candidate nodes are evaluated by FDA. It eliminates the subjectivity of expert scoring and ensure fairness and effectiveness of the evaluated scores. But, FDA cannot solve the problems of hotspots and the load unbalance effectively, which are two important factors that cause data packets loss. Based on FDA, the random selection and hotspots avoidance mechanism are presented. The probability of the hotspots can be reduced by the random selection, and the hotspots effect is eliminated by the hotspots avoidance mechanism. In addition, in order to guarantee the network load balance, a priority-based traffic scheduling mechanism (PTSM) is proposed. It solves the traffic surge problem caused by emergency events and reduces the possibility of packets loss. The simulation results verify the effectiveness of RRAHB in the network with dynamic topology. Compared with the traditional routing algorithm, it has great advantages in improving network reliability and enhancing network performance.

[1]  Mojtaba Alizadeh,et al.  Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization , 2014, Int. J. Distributed Sens. Networks.

[2]  Thai-Ngoc Luong,et al.  VRA-AODV: Routing Protocol Detects Blackhole and Grayhole Attacks in Mobile Ad hoc Network , 2018, J. Comput..

[3]  Irini Reljin,et al.  A Neural Networks-Based Hybrid Routing Protocol for Wireless Mesh Networks , 2012, Sensors.

[4]  Xiao Lin,et al.  A New Routing Protocol Based on OLSR Designed for UANET Maritime Search and Rescue , 2017, IOV.

[5]  Mustapha Chérif-Eddine Yagoub,et al.  Two-tier particle swarm optimization protocol for clustering and routing in wireless sensor network , 2015, J. Netw. Comput. Appl..

[6]  Chenn-Jung Huang,et al.  A power-efficient routing protocol for underwater wireless sensor networks , 2011, Appl. Soft Comput..

[7]  Farzad Kiani,et al.  Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[8]  Ilsun You,et al.  New order preserving encryption model for outsourced databases in cloud environments , 2016, J. Netw. Comput. Appl..

[9]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..

[10]  Rosilah Hassan,et al.  Performance Evaluation of AODV, DSDV, and DSR Routing Protocols in MANET Using NS-2 Simulator , 2017 .

[11]  Peng Xie,et al.  VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks , 2006, Networking.

[12]  Jun-Hong Cui,et al.  Improving the Robustness of Location-Based Routing for Underwater Sensor Networks , 2007, OCEANS 2007 - Europe.

[13]  Suresh Subramaniam,et al.  Deadline-Aware Task Scheduling in a Tiered IoT Infrastructure , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[14]  Jian Shen,et al.  Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things , 2018, IEEE Internet of Things Journal.

[15]  José-Luis Marzo,et al.  Community‐based traffic preservation in telecommunication networks , 2015, Int. J. Commun. Syst..

[16]  Witawas Srisa-an,et al.  SigPID: significant permission identification for android malware detection , 2016, 2016 11th International Conference on Malicious and Unwanted Software (MALWARE).

[17]  Andrew T. Campbell,et al.  A hotspot mitigation protocol for ad hoc networks , 2003, Ad Hoc Networks.

[18]  Nirvana Meratnia,et al.  Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers , 2014, Sensors.

[19]  José-Fernán Martínez,et al.  A Survey on Underwater Acoustic Sensor Network Routing Protocols , 2016, Sensors.

[20]  Bara'a Ali Attea,et al.  A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks , 2012, Appl. Soft Comput..

[21]  Ming He,et al.  A mechanism of topology optimization for underwater acoustic sensor networks based on autonomous underwater vehicles , 2017, Int. J. Distributed Sens. Networks.

[22]  Zeshui Xu,et al.  Distance and similarity measures for hesitant fuzzy linguistic term sets and their application in multi-criteria decision making , 2014, Inf. Sci..

[23]  M. Sathish,et al.  An Energy-Efficient and Reliable Depth-Based Routing Protocol for Underwater Wireless Sensor Network (ER-DBR) , 2018 .

[24]  Jin Li,et al.  Verifiable searchable encryption with aggregate keys for data sharing system , 2018, Future Gener. Comput. Syst..

[25]  Qiong Cheng,et al.  A Cloud Aided Privacy-Preserving Profile Matching Scheme in Mobile Social Networks , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[26]  Nadeem Javaid,et al.  An Energy Scaled and Expanded Vector-Based Forwarding Scheme for Industrial Underwater Acoustic Sensor Networks with Sink Mobility , 2017, Sensors.

[27]  Jun-Hong Cui,et al.  DBR: Depth-Based Routing for Underwater Sensor Networks , 2008, Networking.

[28]  Seyed Mohammad Ghoreyshi,et al.  Void-Handling Techniques for Routing Protocols in Underwater Sensor Networks: Survey and Challenges , 2017, IEEE Communications Surveys & Tutorials.

[29]  Xianglin Wei,et al.  Jammer Localization in Multi-Hop Wireless Network: A Comprehensive Survey , 2017, IEEE Communications Surveys & Tutorials.

[30]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[31]  Mahesh K. Marina,et al.  Ad hoc on-demand multipath distance vector routing , 2006, Wirel. Commun. Mob. Comput..

[32]  Nianmin Yao,et al.  WDFAD-DBR: Weighting depth and forwarding area division DBR routing protocol for UASNs , 2016, Ad Hoc Networks.

[33]  Mohamed Ould-Khaoua,et al.  Performance comparison of end‐to‐end and on‐the‐spot traffic‐aware techniques , 2013, Int. J. Commun. Syst..

[34]  Yi Yang,et al.  Semantic Pooling for Complex Event Analysis in Untrimmed Videos , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.