A Load-Based Hybrid MAC Protocol For Underwater Wireless Sensor Networks
A Load-Based Hybrid MAC Protocol For Underwater Wireless Sensor Networks
Received May 31, 2019, accepted June 8, 2019, date of publication July 1, 2019, date of current version August 14, 2019.
Digital Object Identifier 10.1109/ACCESS.2019.2926158
ABSTRACT In underwater wireless sensor networks (UWSNs), media access control (MAC) is important
because it may have a significant impact on network performance; however, the complex and changeable
underwater communication environment is a great challenge for the MAC protocol. In flowing water,
the network nodes are constantly moving, and the number of competitors in the network also varies. The
existing hybrid MAC protocol neither can adapt to the dynamic network load nor can switch the access
control protocols with changing network loads, which may result in poor network performance. In order
to solve the above problems, this paper proposes a load-based time slot allocation (LBTSA) protocol.
The LBTSA selects the slot allocation scheme, from a set of possible schemes, according to the instantaneous
network load. Then, based on the relative priority of the nodes and the optimal number of backoff stages,
the host node selects the optimal access control protocol. This not only adapts well to changing network
loads but also maximizes network throughput. By assuming that the number of competitors obeys a universal
Poisson distribution, the LBSTA protocol and the HCR (a hybrid MAC protocol using channel reservation)
protocol are compared. As the results show, the throughput of the LBTSA is higher than that of the HCR
protocol, and the end-to-end delay of the LBTSA is lower than that of the HCR protocol.
INDEX TERMS MAC protocol, network load, time slot allocation, underwater wireless sensor networks.
104542 This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see http://creativecommons.org/licenses/by/4.0/ VOLUME 7, 2019
Z. Zhang et al.: Load-Based Hybrid MAC Protocol for UWSNs
data (temperature, humidity, image) can be collected by In addition, to save some energy during the listening mode,
deploying a large number of nodes that can sense environ- the node also estimates channel quality by transmitting a
mental data at locations of interest [9]. It then becomes nec- beacon to adjust its competition window. Although the power
essary to transmit the collected sensing data to the target node consumption of p-BORE is small, the network throughput of
safely and reliably. p-BORE is still low. For data collection in UWSNs, the data-
The objective of a MAC protocol is to allow multiple collection-oriented MAC (DCO-MAC) protocol has been
users to fairly and efficiently share a common medium, and proposed in [19]. In DCO-MAC, the network is divided into
is achieved if and only if communication signal reception two subnets according to the traffic load. The contention-
is adequate [2]. Reliable data transfer techniques or pro- based MAC protocol is used in subnets with lighter traffic
tocols attempt to guarantee that the destination node can loads, while the contention-free MAC protocol is used in
successfully receive what the sending node has sent to it, subnets with heavier traffic loads. Although the DCO-MAC
which is the basis of many underwater applications related to protocol is characterized by low end-to-end packet delay
tactical surveillance, coastline defense, off-shore production, and small energy overheads, interference between different
ecological monitoring and scientific exploration as well as subnets and subnet nodes may affect data transmission, which
disaster prevention, etc. [10]. Over the past few decades, in turn reduces throughput.
a variety of MAC protocols have been proposed for ter- Existing network protocols cannot adapt well to dynam-
restrial wireless sensor networks. Because long propaga- ically changing underwater network environments, where
tion delays, high energy consumption and dynamic network underwater network nodes are constantly moving, and ulti-
topologies are characteristic of UWSNs, the existing proto- mately causing instability to the network topology [20].
cols used in terrestrial sensor networks cannot be directly Therefore, the number of competitors, that is, the number
applied to underwater communication. Moreover, due to the of nodes that need to send data often changes, which leads
peculiar features of underwater acoustic channels, such as to a continuously changing network load. Existing protocols
slow signal propagation speeds (about 1.5 km/s in seawa- neither can adapt to varying network loads, nor can they
ter), very small channel capacity, low channel quality and switch the access mode at any time according to load changes.
highly varying channel quality dynamics, MAC protocol Therefore, this paper proposes a load-based slot allocation
design for underwater acoustic networks faces many novel (LBTSA) MAC protocol, which combines the merits of time
challenges [11]–[13]. division multiple access (TDMA) and carrier sense multi-
As stated, the propagation delay in underwater acoustic ple access with collision avoidance (CSMA/CA), and can
communication environments is high and the communication dynamically adapt to network load changes. Considering that
distance may be long, so the sender cannot accurately judge time slot allocation is an important factor affecting system
the dynamic network load; meanwhile, due to the relatively performance, a load-based time slot allocation scheme is used
low bandwidth and high bit error rate, the transmitted packet in this paper to improve channel utilization.
length in the UWSNs is intentionally limited. Therefore, The rest is organized as follows. In the second section,
the key point to solve in these situations is how the receiver the network model and frame structure are presented; in the
allocates time slots according to dynamic load in order to third section, the design method of a hybrid MAC protocol
reduce network conflicts and improve throughput. based on load slot allocation for underwater wireless sensor
The performances of contention-based and contention-free networks is given; the fourth section introduces the underwa-
MAC protocols are poor when the traffic load in the network ter acoustic channel propagation loss model and the setting
changes dynamically. In order to obtain good performance of simulation parameters used in the simulation; the fifth
in these cases, several hybrid MAC protocols suitable for section discusses the simulation results; and the sixth section
UWSNs have been proposed. In [14], a hybrid MAC protocol summarizes the full text.
Preamble-MAC (P-MAC) is introduced, which consists of a
contention-free protocol and a slot multiple access collision II. NETWORK MODEL AND FRAME STRUCTURE
avoidance (MACA) protocol. Although P-MAC overcomes The network of interest can be considered a star cen-
the shortcoming of low accuracy of time synchroniza- tralized network consisting of N + 1 nodes (i.e., a host
tion, it cannot dynamically capture real-time changes node and N slave nodes), where the N slave nodes
in the network environment. In some efforts [15]–[17], are randomly distributed. The network model is shown
a distributed code division multiple access (CDMA)-based in in Fig. 1.
energy-efficient protocol with ALOHA is given. The pro- The slave node mainly collects monitoring data (such as
tocol uses ALOHA to send signaling and CDMA to send temperature, salinity and depth), images. A slave node may be
data packets. When the network load is heavy, the ALOHA fixed or moving. The host node collects data from slave nodes
protocol generates a large number of collisions, resulting in and stores them. All packets must be sent at the beginning of
unsuccessfully transmitted signals and reduced throughput. the slot, the slot duration is the packet transmission time plus
In [18], a MAC protocol based on the prioritized beacon the maximum propagation delay. Further, the link is treated as
repetition and competition window selection (p-BORE) has one-way and is established between the host node and other
been presented to solve the beacon transmission failure issue. slave nodes.
Algorithm 1 LBTSA Pseudocode TDMA to transmit data packets, the slave nodes with low
1: the slave nodes listen channel priority use CSMA/CA.
2: while the channel is busy do Under CSMA/CA, if a channel is idle and remains dis-
3: backoff; tributed inter-frame spacing (DIFS) time, the slave node
4: end while sends data immediately; otherwise, when the slave node starts
5: send RTS; listening for the channel state "busy" indicator from the host
6: the host node counts the number of RTS; node, the slave node continues to listen until the channel is
7: if the number of RTS > the threshold (N ) then idle at which point it holds the DIFS time for backoff in
8: the host node brosdcasts into continuous allocation of order to avoid conflicts with other slave nodes. If the channel
time slots, CSMA/CA; is busy, the value of the network allocation vector (NAV)
9: while NAV = 0 do backoff timer is frozen, and the current value is recorded.
10: the slave nodes listen channel; The channel then becomes idle, and after the DIFS time,
11: while the channel time 6 DIFS do the NAV backoff timer continues to be started from the last
12: backoff; record. Until the value of the timer reaches 0, another frame
13: end while begins to be sent. If there is no collision and the packet is not
14: transmit; successfully transmitted, the slave node waits for SIFS (short
15: while a collision happens do inter-frame space) and then attempts to resend. If a collision
16: send collision signal, collision number +1; occurs, the number of backoff stages is increased until it is
17: if N = mopt then equal to the optimal number of backoff stages, and the access
18: the host node broadcasts access mode switches mode switches to TDMA.
into TDMA;
19: else B. DETERMINATION OF THE SWITCHING KEY VALUE
20: the slave nodes backoff then transmit; OF PROTOCOL
21: end if As the number of competitors is increasing, the probability of
22: if transmission is completed then collision increases. The throughput of the CSMA/CA proto-
23: send successfully; col decreases with the increase of the number of competitors.
24: else In contrast, the throughput of the TDMA protocol increases
25: the slave nodes wait for SIFS time then retrans- with the number of competitors. Therefore, as the number
mit; of competitors is increasing, when the throughput of the
26: end if CSMA/CA protocol is equal to that of the TDMA protocol,
27: end while the number of competitors N is the switching key value of the
28: end while protocol.
29: else The network throughput refers to the ratio of all received
30: the host node brosdcasts into uniform allocation of packet bytes to the transmission time during the simulation,
tiom slots; as shown in (1):
31: if the priority of the node is high then
32: the host node broadcasts into TDMA; received packet bytes
Throughput = (1)
33: else transmission time
34: the host node broadcasts into CSMA/CA; We define N as the key protocol switching value. The
35: end if expected throughput of CSMA/CA is calculated and com-
36: end if pared with the throughput of TDMA. When they are equal,
the number of competitors is set as the switching key value N
of the protocol, as shown in Fig. 3.
Where the throughput of CSMA/CA is equal to that of
of RTS received, and then determines the size of the network TDMA, i.e., where the two curves intersect, the intersection
load. According to that network load, the time slot allocation point indicates the key protocol switching value, N . As can
scheme is determined. When the number of competitors is be seen from Fig. 3, the abscissa of the intersection of TDMA
greater than N and the time slots are continuously distributed, and CSMA/CA is N ,When the number of competitors is less
CSMA/CA is used first. When a collision happens, the total than N , the throughput of CSMA/CA is significantly higher
number of experienced backoff stages is increased by one. than that of TDMA; on the other hand, when the number of
If the number of experienced backoff stages of a slave node competitors is greater than N , the throughput of TDMA is
is equal to the maximum allowed number of backoff stages significantly higher. Therefore, this paper judges the network
and the number of slave nodes is greater than 1, the host load according to the switching key value of the protocol, and
node broadcasts access mode switches to TDMA. When the then switches the access mode.
number of competitors is less than N and the time slots are According to [22], with an increase in network load,
uniformly distributed, the slave nodes with high priority use the number of delayed packets in TDMA is more than that
hand, the host node only sends control messages and receives
data packets, which will not lead to a large amount of energy
consumption.
Ps Ptr L
τ =
Ps Ptr Ts + Ptr (1 − Ps ) Tc + (1 − Ptr ) Tid
NLq(1 − q)N −1
= (6)
Nq(1 − q)N −1 · Ts + 1 − (1 − q)N − Nq(1 − q)N −1 · Tc + (1 − p)N · Tid
FIGURE 6. Relationship between the number of competitors, throughput FIGURE 8. Relationship between the number of competitors, total
and the number of backoff stages. throughput and time.
The crucial part of the protocol is how to fuse TDMA and [10] S. Jiang, ‘‘On reliable data transfer in underwater acoustic networks:
CSMA/CA, that is, how to determine the switching threshold A survey from networking perspective,’’ IEEE Commun. Surveys Tuts.,
vol. 20, no. 2, pp. 1036–1055, 2nd Quart., 2018.
as a function of the number of competitors. The point at which [11] J. Jiang, G. Han, L. Shu, S. Chan, and K. Wang, ‘‘A trust model based on
the throughputs of the CSMA/CA and TDMA protocols cloud theory in underwater acoustic sensor networks,’’ IEEE Trans. Ind.
are equal is used as the indication that it is time to switch Informat., vol. 13, no. 1, pp. 342–350, Feb. 2017.
[12] I. F. Akyildiz, D. Pompili, and T. Melodia, ‘‘Challenges for efficient
the access mode. The proposed protocol determines the key communication in underwater acoustic sensor networks,’’ ACM SIGBED
switching value, N , through the pre-calculated throughput. Rev., vol. 1, no. 2, pp. 3–8, Jul. 2004.
Since CSMA/CA results in collisions, as a function between [13] J. Partan, J. Kurose, and B. N. Levine, ‘‘A survey of practical issues in
underwater networks,’’ ACM SIGMOBILE Mobile Comput. Commun. Rev.,
the throughput and the number of backoff stages, the opti- Los Angeles, CA, USA, vol. 11, no. 4, pp. 23–33, Oct. 2006.
mal number of backoff stages, mopt , is found to maximize [14] D. Pompili and I. F. Akyildiz, ‘‘Overview of networking protocols for
the throughput. Considering that time slot allocation is an underwater wireless communications,’’ IEEE Commun. Mag., vol. 47,
no. 1, pp. 97–102, Jan. 2009.
important factor affecting system performance, a load-based [15] J.-I. Namgung, S.-Y. Shin, N.-Y. Yun, and S.-H. Park, ‘‘Adaptive GTS
time slot allocation scheme is adopted to improve throughput. allocation scheme based on IEEE 802.15.4 for underwater acoustic sen-
From the simulation results under OMNET++, it can be sor networks,’’ in Proc. IEEE/IFIP 8th Int. Conf. Embedded Ubiquitous
Comput., Hong Kong, China, Dec. 2010, pp. 297–301.
seen that not only is the total throughput of LBTSA higher [16] D. Pompili, T. Melodia, and I. F. Akyildiz, ‘‘A CDMA-based medium
than that of TDMA and CSMA/CA, but the throughput of access control for underwater acoustic sensor networks,’’ IEEE Trans.
LBTSA is also higher than that of H-MAC and HCR under the Wireless Commun., vol. 8, no. 4, pp. 1899–1909, Apr. 2009.
[17] D. Pompili, T. Melodia, and I. F. Akyildiz, ‘‘A distributed CDMA medium
condition of dynamically changing number of competitors. access control for underwater acoustic sensor networks,’’ IEEE Trans.
Moreover, the end-to-end delay increment of LBTSA is much Wireless Commun., vol. 8, no. 4, pp. 1899–1909, Jan. 2007.
smaller than the two protocols, so it has good adaptability to [18] E. Moon, S. Lee, M. A. Yaqub, and D. Kim, ‘‘p-BORE: Prioritized beacon
repetition and contention window selection based MAC protocol in under-
the dynamic network load. The simulation results show that water wireless sensor networks,’’ in Proc. ICUFN, Jul. 2017, pp. 269–271.
LBTSA is a promising MAC protocol, based on contention [19] M. Deng, H. Chen, and L. Xie, ‘‘DCO-MAC: A hybrid MAC protocol for
and contention-free fusion, and its performance is better than data collection in underwater acoustic sensor networks,’’ Sensors, vol. 18,
no. 7, p. 2300, Jul. 2018.
existing single and hybrid MAC protocols. In large UWSNs, [20] G. Han, S. Shen, H. Song, T. Yang, and W. Zhang, ‘‘A stratification-based
although TDMA can transmit more data packets, the greater data collection scheme in underwater acoustic sensor networks,’’ IEEE
number of collisions and experienced backoff times under Trans. Veh. Technol., vol. 67, no. 11, pp. 10671–10682, Nov. 2018.
[21] Z. Li, Z. Guo, F. Hong, and L. Hong, ‘‘E2 DTS: An energy efficiency
CSMA/CA will occupy more time slots. A fixed number of distributed time synchronization algorithm for underwater acoustic mobile
time slots per frame leads to the reduction of TDMA time sensor networks,’’ Ad Hoc Netw., vol. 11, no. 4, pp. 1372–1380, Jun. 2013.
slots and negatively affects network performance. By using [22] R. K. Wang, M. Jing, and L. F. Kang, ‘‘Simulation analysis of
TDMA/CSMA hybrid protocol based on MATLAB,’’ Fire Command Con-
the LBTSA protocol, we can achieve higher throughput and trol, vol. 42, no. 2, pp. 163–167, 2017.
lower end-to-end delay, so the proposed LBSTA is suitable [23] X. L. Yu, ‘‘Research on MAC layer protocol in underwater acoustic
for small underwater wireless sensor networks with high load. communication network,’’ M.S. thesis, Harbin Eng. Univ., Harbin, China,
2009.
[24] G. Bianchi, ‘‘Performance analysis of the IEEE 802.11 distributed coordi-
REFERENCES nation function,’’ IEEE J. Sel. Areas Commun., vol. 18, no. 3, pp. 535–547,
[1] M. C. Domingo, ‘‘An overview of the Internet of underwater things,’’ Mar. 2000.
J. Netw. Comput. Appl., vol. 35, no. 6, pp. 1879–1890, Nov. 2012. [25] J. Q. Cui, J. F. Yang, and J. Xu, ‘‘CSMA/CA performance analysis in hybrid
[2] S. Jiang, ‘‘State-of-the-art medium access control (MAC) protocols for CSMA/CA and TDMA networks,’’ Comput. Eng. Appl., vol. 3, no. 20,
underwater acoustic networks: A survey based on a MAC reference pp. 83–88, 2017.
model,’’ IEEE Commun. Surveys Tuts., vol. 20, no. 1, pp. 96–131, [26] Y. K. Chen, ‘‘Time delay analysis and media access protocol design of
1st Quart., 2018. under-water acoustic communication network,’’ Ph.D. dissertation, South
[3] L. Liu, S. Zhou, and J.-H. Cui, ‘‘Prospects and problems of wireless com- China Univ. Technol., Guangzhou, China, 2018.
munication for underwater sensor networks,’’ Wireless Commun. Mobile [27] L. Hong, F. Hong, Z. Guo, and Y. Guo, ‘‘HCR: A hybrid MAC protocol
Comput., Underwater Sensor Netw., Archit. Protocols, vol. 8, no. 8, for underwater sensor networks using channel reservation,’’ Int. J. Comput.
pp. 977–994, 2008. Appl., vol. 33, no. 2, pp. 154–159, Jul. 2011.
[4] E. P. Wigner, ‘‘Theory of traveling-wave optical laser,’’ Phys. Rev., [28] K. B. Kredo and P. Mohapatra, ‘‘A hybrid medium access control protocol
vol. 134, pp. A635–A646, Dec. 1965. for underwater wireless networks,’’ in Proc. WUWNET, New York, NY,
[5] H. Luo, K. Wu, R. Ruby, Y. Liang, Z. Guo, and L. M. Ni, ‘‘Software- USA, Sep. 2007, pp. 33–40.
defined architectures and technologies for underwater wireless sensor
networks: A survey,’’ IEEE Commun. Surveys Tuts., vol. 20, no. 4,
pp. 2855–2888, 4th Quart., 2018.
[6] D. N. Sandeep and V. Kumar, ‘‘Review on clustering, coverage and
connectivity in underwater wireless sensor networks: A communication
techniques perspective,’’ IEEE Access, vol. 5, pp. 11176–11199, 2017.
[7] J. Heidemann, M. Stojanovic, and M. Zorzi, ‘‘Underwater sensor networks: ZIWEI ZHANG received the B.S. degree from
Applications, advances and challenges,’’ Philos. Trans. Roy. Soc. London the Qingdao Institute of Technology, Qingdao,
A, Math. Phys. Sci., vol. 370, no. 1958, pp. 158–175, Jan. 2012. China, in 2012. She is currently pursuing the
[8] G. Han, X. Long, C. Zhu, M. Guizani, and W. Zhang, ‘‘A high-availability M.S. degree with the Department of Information
data collection scheme based on multi-AUVs for underwater sensor net- Science and Technology, Qingdao University of
works,’’ IEEE Trans. Mobile Comput., to be published. Science and Technology, Qingdao. Her research
[9] G. Han, X. Long, C. Zhu, M. Guizani, Y. Bi, and W. Zhang, ‘‘An AUV interests include underwater wireless sensor net-
location prediction-based data collection scheme for underwater wire- works, acoustic communication, and underwater
less sensor networks,’’ IEEE Trans. Veh. Technol., vol. 68, no. 6, acoustic sensor networks.
pp. 6037–6049, Jun. 2019.
WEI SHI was born in Shandong, China, in 1986. JINGJING WANG (M’15) received the B.S.
He received the B.S. degree from Ludong Uni- degree in industrial automation from Shandong
versity, Yantai, China, in 2009, and the master’s University, Jinan, China, in 1997, the M.Sc. degree
degree in signal and information processing and in control theory and control engineering from the
the Ph.D. degree in computer application technol- Qingdao University of Science and Technology,
ogy from the Ocean University of China, Qingdao, Qingdao, China, in 2002, and the Ph.D. degree in
China, in 2011 and 2014, respectively. Since 2014, computer application technology from the Ocean
he has been a Lecturer with the School of Informa- University of China, Qingdao, in 2012. From
tion Science and Technology, Qingdao University 2014 to 2015, she was a Visiting Professor with
of Science and Technology. His research interests The University of British Columbia. She is cur-
include 5G, UWB, 60-GHz wireless communication, and underwater wire- rently a Professor with the School of Information Science and Technol-
less sensor networks. ogy, Qingdao University of Science and Technology. Her research interests
include underwater wireless sensor networks, acoustic communications,
QIUNA NIU received the B.S. degree from the ultra-wideband radio systems, and MIMO wireless communications. She
Changchun University of Science and Technology, serves as the Vice Chair for the ACM Qingdao Chapter.
Changchun, China, in 1997, and the M.S. degree
from Shandong University, Jinan, China, in 2004.
From 2017 to 2018, she was a Visiting Scholar
with the University of Arkansas. She is currently
an Associate Professor with the School of Informa-
tion Science and Technology, Qingdao University
of Science and Technology. Her current research
interests include channel encoding technology in
wireless communication, indoor wireless localization, and target tracking. HANJIANG LUO (M’09) received the Ph.D.
degree from the Department of Computer Science,
YING GUO received the B.S. and M.S. degrees Ocean University of China. He was a Visiting
from the Qingdao University of Science and Tech- Scholar with HKUST, in 2014. He is currently
nology, Qingdao, in 2004 and 2007, respectively, an Associate Professor with the School of Com-
and the Ph.D. degree from the Department of Com- puter Science and Engineering, Shandong Univer-
puter Science and Technology, Ocean University sity of Science and Technology. He has published
of China, Qingdao, in 2010. From 2018 to 2019, research papers in some prestigious journals and
she was a Visiting Professor with Arizona State conferences, such as ACM Computing Surveys, the
University. She is currently an Associate Profes- IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, the
sor with the Qingdao University of Science and IEEE TPDS, IEEE TVT, and the IEEE ICDCS. His research interests include
Technology. Her research interests include wire- wireless sensor networks, underwater wireless sensor networks, the Internet
less sensor networks, underwater acoustic networks, and the Internet of of Things, data science, and artificial intelligence.
Things.