An Overview of Under Water Sensor Networks Routing Protocols


  • A. Kathirvel Professor, Computer Science and Engineering, Kalasalingam University, Anand Nagar, Krishnankoil, India



Under Water Sensor Networks, Routing Protocols, Sensors and Networks


Recently, sensor networks have emerged as a very powerful technique for many applications, including monitoring, measurement, surveillance and control. The  idea of applying sensor networks into underwater environments (i.e., forming underwater sensor networks) has received increasing interests. Even though underwater sensor networks (UWSNs) share some common properties with ground sensor networks, such as the large number of  nodes and limited energy, UWSNs are significantly different from the conventional ground sensor technology. First, radio communications do not work well under the water. They must be replaced by acoustic communications, which have very different travel time and characteristics. In particular, acoustic channels feature large propagation latency, low bandwidth capacity and high error rate. Second, while most ground sensors are static, underwater sensor nodes may move with water currents and other underwater activities. Due to the very different environment properties and also the unique nature of the aquatic applications, the protocols developed for ground sensor networks are not directly applicable to underwater sensor networks. Simple underwater monitoring systems have been introduced in the past. However, they are small-scale and rely on point-to-point, single channel techniques such as remote telemetry or sequential local sensing. In UWSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited.  Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this  paper,  we  give  a  survey  of  routing  protocols  for  UWSN and compare their strengths and limitations.


F. Akyildiz, D. Pompili, and T. Melodia, “State-of-the-art in protocol research for underwater acoustic sensor networks,” in Proceedings of the 1st ACM International Workshop on Underwater Networks, pp. 7–16, September 2006.

J.Heidemann,W.Ye,J.Wills,A.Syed,andY.Li,“Research challenges and applications for underwater sensor networking,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC ’06),vol.1–4,pp.228–235,April 2006.

T. Clausen and P. Jacquet, “Optimized Link State Routing Protocol (OLSR),” IETF RFC 3626, 2003.

C. E. Perkins and P. Bhagwat, “Highly dynamic destination sequenced distance-vector routing (dsdv) for mobile computers,” in SIGCOMM, 1994.

C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in IEEE Workshop on Mobile Computing Sys. and Apps. ,1997.

D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Computing , pp. 153–181, 1996.

V. D. Park and J. P. Macker, “Anycast routing for mobile services,”in Conf. Info. Sci. and Sys , 1999.

Intanagonwiwat C, Govindan R, Estrin D. Directed diffusion: a scalable and robust communication paradigm for sensor networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM’00), Aug 6-11, 2000, Boston, MA, USA. New York, NY, USA: ACM, 2000: 56-67

Xie P, Cui J H, Lao L. VBF: vector-based forwarding protocol for underwater sensor networks. Proceedings of the 5th International IFIP-TC6 Conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems (NETWORKING’06), May 15-19, 2006, Coimbra, Portugal. Berlin, Germany: Springer-Verlag, 2006: 1216- 1221.

Yan H, Shi Z.J, Cui J H. DBR: depth-based routing for underwater sensor networks. Proceedings of the 7th International IFIP-TC6




How to Cite

Kathirvel, A. (2014). An Overview of Under Water Sensor Networks Routing Protocols. Asian Journal of Computer Science and Technology, 3(2), 4–8.