Professional Documents
Culture Documents
I NTRODUCTION
1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TPDS.2013.2295793, IEEE Transactions on Parallel and Distributed Systems
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2013
BACKGROUND
1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TPDS.2013.2295793, IEEE Transactions on Parallel and Distributed Systems
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2013
P ROBLEM F ORMULATION
Suppose that a set of sinks are deployed on a horizontal plane of water, and plenty of anchored sensors
are evenly deployed in an underwater convex space
D IR3 , the volume of which is L W H. The
topology of UASNs can be represented as a graph
G(V, E), the types of sensor nodes and sinks are
different, so they are abstracted into two sets: the set
of anchored nodes is V = {V1 , V2 , , VN } 2 , the set
of surface
sinks is S
= {S1 , , SM }. The set of links
is E (V S) (V S). In this study, cluster-heads
2. The subscript number of the node is the opposite of its depth
(i. e., V1 is the deepest node).
1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TPDS.2013.2295793, IEEE Transactions on Parallel and Distributed Systems
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2013
where
E(k) = RS(k) + P0 (RC(k))
= RS(k) + P0 RC(k) 10RC(k)(f )/10
(7)
The communication consumption is calculated according to the characteristics of the underwater acoustic communication, where and are predefined
parameters, P0 is the minimum received power level
to guarantee the required quality of reception [34],
and (RC(k)) is the signal attenuation [35]. The enFig. 2. Probabilistic Sensing/Communication
ergy spreading factor and absorption coefficient are
denoted by ( [1, 2]) and (f ), respectively.
D4. P ropagation delay f unction. The propagation
D1. Coverage f unction. The coverage probability delay function is computed as
function is defined as
T (i, S)
(8)
delay(G) = Vi V
coverage(G) = min{max{PS (i, j)|Vi V}|Vj V} (1)
N
where PS (i, j) denotes the probability of Vi covering where T (i, S) = min { (k,k )Patm (i,S) TD (k, k )|
Vj . Formula (1) indicates every node gains the max- Patm (i, S) Pat(i)}, and TD (k, k ) [36] is given as
imum probability (called covering probability) that
d(k, k )
LS
TD (k, k ) =
+
(9)
it is sensed by neighboring nodes, and the miniB
Ruw
mum covering probability of all nodes is assigned to
coverage(G). For probabilistic sensing [30], PS (i, j) is where LS is the size of each data packet, B is the
channel capacity (in bits per second), and Ruw is the
calculated as
{
propagation speed of underwater sound.
0,
if d(i, j) > RS(i)
PS (i, j) =
exp( x
d(i,j)
2 )dx/ 2, else
(10lg RS(i) )/
3.3 Problem Objectives
(2)
where is the path loss exponent, and is the fading In summary, (1,)-Coverage, (1,)-Connectivity, reduction of propagation delay and energy consumption
parameter.
D2. Connectivity f unction. The connectivity proba- are the primary objectives of UASNs. The topology
control objectives of UASNs can be formally presented
bility function is defined as
as follows:
connectivty(G) = min {PR (i, S)| Vi V}
(3)
O1. coverage(G) .
O2. connectivity(G) .
connectivty(G) is computed as the lowest path prob O3. min consumption(G).
ability from any node to sinks. PR (i, S) indicates the
O4. min delay(G).
maximal probability of one path from Vi to any sink.
PR (i, S) is expressed as
4 A LGORITHM
PR (i, S) = max{
PC (k, k )|
In UASNs the upper nodes should bear heavier data(k,k )Patm (i,S)
relaying mission, the scale-free characteristic will be
Patm (i, S) Pat(i)}
(4) used to generate a special scale-free structure where
where PC (k, k ) represents the probability of link upper nodes are more easily converted into cluster(k, k ) appearing. According to [31], [32], rayleigh fad- heads. Firstly, complex network theory is applied
ing is appropriate for describing underwater acoustic to the edges constructed model (ECM), which can
obtain an initial scale-free topology. Then a distributed
channels, thus PC (k, k ) is written as
algorithm that extracts a double clustering structure
{
consumption(G) =
E(k)
(6) on the assumption that all nodes use the maximum
communication radius, and the existence of edges is
Vk V
1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TPDS.2013.2295793, IEEE Transactions on Parallel and Distributed Systems
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2013
iH
Pij = C1 d(i, j) PC (i, j) PS (i, j)
3
|D|/N N
(10)
where , , (0, 1), and C1 are constants. |D|
denotes the volume of deployment space. Formula
(10) suggests that with higher coverage probability
and connectivity probability, the shorter edges which
are closer to water surface, are more prone to appear.
Theorem 1 (in Appendix A) confirms that the initial
topology is a scale-free network. Other properties of
this model are analyzed and given in Theorems 2-4 (in
Appendix A). ECM is regarded as the preparation of
TCSCN. At the worst case the calculation complexity
of ECM obviously is O(N 2 ), which is bearable for any
ordinary sensor node. The statistic characteristics of
ECM are given and analyzed in Appendix B.
4.2
TCSCN
(13)
(15)
(16)
(17)
Formula (17) shows RC(i) is determined as the minimum radius by which Vi can communicate to fi with
a probability not less than . Finally, Vi broadcasts to
1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TPDS.2013.2295793, IEEE Transactions on Parallel and Distributed Systems
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2013
inform its neighboring nodes of the update of communication range, in addition, PR (i, S) = PC (i, fi )
PR (fi , S) should be recorded, and RS(i) should be set
to 0. If there are mutual cluster-heads serving for the
different adjusting nodes at the same round, then the
radius of the mutual cluster-heads will be set as the
largest of all determinations. The adjusting nodes at
next round are noticed by one of the current adjusting
nodes through one or more hops.
Step5. Repeat Steps 3 and 4 until all nodes have
determined their roles and radius.
Step6. Any node Vi senses with RS(i) and communicates with RC(i). Ordinary nodes turn off the radio
when the UASN enters the SLEEP state.
Particularly, in order to avoid the extra interactive
messages and the excessive execution time, once one
node becomes a Cov-Head or Con-Head, it is not
allowed to change the role until exhaustion of the
UASN. The flowchart and example of TCSCN implementation are depicted in Appendix C. Nodes closer
to sinks potentially take more data relay tasks [37].
For the sake of traffic balance, ECM suggests that
the deeper nodes obtain a larger node degree, thus
implying that upper nodes are more easily converted
into cluster-heads by TCSCN, then Theorem 5 can be
obtained (in Appendix A). Besides, altered TCSCN is
also suitable for UASNs with node mobility, and more
details are given in Appendix D.
5
5.1
A NALYSIS
The Quantity of Cov-Heads and Con-Heads
2
satisfies 10lg ds exp( x
)dx/
2
=
. Assume that
2
RS
ds 3 KPCH (K)
) }
RS
(18)
N 1
N 1 K
K+1 K
}.
as N K=1 {PCH (K) N 11
(K+1)K
5.2
(19)
LS
d(k, k )
T (i, S) = hop
+
B
Ruw
d(k,k )N
N
LS
hop
hop
+ hop
B
R
uwN
2
N RC ln
LS
hop
hop
+ hop
(20)
B
Ruw
where hop denotes the number of hops on the path.
The maximum hop is approximately computed as
RC N ln 2
|D|/N }
delay(G)
{
+
B
{ 3 |D|/N }N
|D|/N
} (21)
Ruw
where dc = N
is no more
3 |D|
N
. According to Theorem 3, AP L
ln 2
than L+W2 +H ,
1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TPDS.2013.2295793, IEEE Transactions on Parallel and Distributed Systems
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2013
of hops is
L+W
+H .
3 |D|
2
N
U (r)
{1 {PCVH (K) N RS
U (r)
TA
+PCNH (K) N P0 (RC ) +
TS + TA
{1 PCVH (K) PCNH (K)} N P0 (RC )}
3
|D|/N
L+W +H
LS
+2
{
+
}}/U (r)
B
Ruw
2 3 |D|
N
1
is
there is limN
3 |D|/N
LS
+H
2 L+W
{
+
}
B
Ruw
3 |D|
2
N
= 0, and
N
3 |D|
10 10
|D|
N )
(f )
ln 2
U (r)
{PCVH (K) RS + PCNH (K) P0 (RC )
U (r)
TA
+
{1 PCVH (K) PCNH (K)} P0 (RC )}
TS + TA
/{PCVH (K) ds }
5.4
Complexity
4N RC3
3|D|
4N RC3
3|D|
to
messages broadcasting at the worst case.
Therefore, the total messages at the worst case can be
calculated as
4N RC3
3|D|
4N RC3 2
3|D| }
3
PCVH (K) N +
4N RC3
3|D|
S IMULATION E VALUATION
one has
When
PCNH (K) N
O(N )
TABLE 1
Simulation Parameters
Parameter
N
M
|D|
RE
RC
RS
LS
B
Ruw
P0
(f )
TS
TA
Value
3000
220
40m 100m 50m
0.3
0.85
5000J
30m
15m
50B
10kbps
1500m/s
1
0.5
1
0.015
2
0.07
1.5
0.01dB/km
0.2
0.5
0.5
1.0
150s
100s
1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TPDS.2013.2295793, IEEE Transactions on Parallel and Distributed Systems
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2013
0.96
Gamma=0.7
Gamma=0.6
0.94
4.60
of node /J
Gamma=0.5
Gamma=0.4
Gamma=0.3
0.92
4.55
consum ption
average energy
0.90
4.50
/m
s
iu
um
co
28
mm
un
in
ra
im
30
ic at
32
ion
m ax
6000
10
34
ra di
us
5000
4000
26
3000
24
8
36
38
/m
2000
22
20
1000
24
22
20
18
16
14
12
4.40
im
0.84
4.45
40
0.86
0.88
Coverage Probability
0.55
0.50
0.40
1300
Beta=0.4
Beta=0.5
0.20
Beta=0.6
0.15
Beta=0.7
1250
1200
1150
0.10
24
22
20
18
16
14
12
10
ion
ra di
ra
iu
ic at
in
20 22
24 26
m ax
28 30
im
um
32 34
co
mm
un
6000
36
us
/m
38
40
5000
im
4000
3000
2000
1000
/m
1100
0.05
0.25
Beta=0.3
0.30
0.35
e /s
UASN lifetim
Connectivity Probability
0.45
1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TPDS.2013.2295793, IEEE Transactions on Parallel and Distributed Systems
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2013
1600
600
1400
UASN Lifetime /s
400
300
200
1200
1000
800
FiYG
PCMP
600
GA
AWSF
100
400
0.9
h
re
200
1000
2000
3000
6000
il
a
old
g
ra
0.5
sh
0.4
0.6
y th
re
5000
0.4
ilit
4000
0.5
ab
prob
ro
0.3
ity
ctiv
it
0.6
0.2
ne
C on
0.1
th
0.7
TCSCN
0.8
ld
Propagation
Delay /ms
500
680
660
FiYG
640
GA
PCMP
AWSF
TCSCN
620
600
580
560
540
1000
2000
3000
4000
5000
6000
This simulation compares UASN lifetime and propagation delay of TCSCN, AWSF, GA, FiYG and PCMP. Figs. 9 and 10 indicate that UASN lifetime and
propagation delay of TCSCN are considerably better
than those of other algorithms, by a wide margin.
There are two reasons: (a) AWSF, GA, FiYG and
PCMP do not exert effort to fulfill (1,)-Coverage and
(1,)-Connectivity, which implies that the topology
may be unable to generate, particularly when node
deployment is not dense enough. (b) The upper nodes
undertake more data-forwarding in 3D UASN; thus,
a topology generated by directly applying complex
network theory is not applicable. The plots of AWSF
and GA illustrate this conclusion. Moreover, although
channel collisions are prone to appear, coverage and
connectivity can be met by nodes with a relatively
minor radii when the nodes deployed more densely,
C ONCLUSIONS
This study explores the problem of energy conservation and delay reduction while maintaining both
(1,)-Coverage and (1,)-Connectivity in UASNs. A
scale-free model based on complex network theory
is used to construct a topology, and TCSCN is developed accordingly. Simulation results demonstrate
that TCSCN can effectively configure the UASN to
achieve (1,)-Coverage and (1,)-Connectivity while
optimizing energy consumption and propagation delay, as predicted by mathematical analysis. The results
also indicate that scale-free model can be applied in
UASN topology, especially in 3D hierarchical topology. Future research should focus on investigating
a self-adaptive solution to address the demand of
specific applications (e. g., transmission success rate
becomes an important issue in tactical surveillance).
In addition, in order to extend the lifetime, the tradeoff between cluster-heads vulnerability and algorithm
cost from cluster-heads rotation will be discussed and
analyzed mathematically as well.
1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TPDS.2013.2295793, IEEE Transactions on Parallel and Distributed Systems
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2013
ACKNOWLEDGMENTS
R EFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
I. Akyildiz, D. Pompili, and T. Melodia, Underwater Acoustic Sensor Networks: Research Challenges, Elsevier Ad hoc
Networks, vol. 3, no. 3, pp. 257279, 2005.
I. Jawhar, N. Mohamed, and D.P. Agrawal, Linear Wireless
Sensor Networks: Classification and Applications, Elsevier
Journal of Network and Computer Applications, vol. 34, no. 5, pp.
16711682, 2011.
I. Saleh, J.H. Cui, and R. Ammar, Surface-level Gateway
Deployment for Underwater Sensor Networks, Proc. Military
Communications Conference 2007, pp. 17, Orlando, USA, 2007.
G. Zhou, T. He, S. Krishnamurthy, et al., Models and
Solutions for Radio Irregularity in Wireless Senosr Networks,
ACM Transactions on Sensor Networks, vol. 2, no. 2, 2006.
P.M. Shankar, Introduction to Wireless System, John Wiely
and Sons Press, 2001
I. Dietrich, and F. Fressler, On the Lifetime of Wireless Sensor
Networks, ACM Transactions on Sensor Networks, vol. 5, no.
1, pp. 139, 2009.
S. Boccaletti, V. Latora, V. Moreno, et al., Complex Networks
: Structure and Dynamics, Elsevier Physics Reports, vol. 424,
no. 4-5, pp. 175308, 2006.
S.H. Strogatz, Exploring Complex Networks, Nature, vol.
410, pp. 268276, 2001.
I.F. Akyildiz, D. Pompili, and T. Melodia, State-of-the-Art in
Protocol Research for Underwater Acoustic Sensor Networks,
ACM Proc. the 1st ACM International Workshop on Underwater
Networks , pp. 716, New York, USA, 2006.
N. Li, J.C. Hou, and L. Sha, Design and Analysis of an MSTbased Topology Control Algorithm, Proc. INFORCOM 2003,
pp. 17021712, Sanfrancisco, CA, 2003.
D.Y. Li, X.H. Jia, and H.W. Du, QoS Topology Control
for Nonhomogenous Ad Hoc Wireless Networks, Springer
EURASIP Journal on Wireless Communications and Networking,
Article ID: 82417, pp. 110, 2006.
A. Cuzzocrea, D. Katsaros, Y. Manolopoulos, et al., EBC:
a Topology Control Algorithm for Achieving High QoS in
Sensor Networks, Proc. The Sixth Springer International ICST
Conference on Heterogeneous Networking for Quality, Reliability,
Security and Robustness, pp. 613626, Canary Islands, Spain,
2009.
A. Forghani, A.M. Rahmani, and A. Khademzadeh, QCTC:
QoS-based Clustering Topology Control Algorithm for Wireless Sensor Networks, Proc. IEEE International Conference
on Advanced Computer Theory and Engineering, pp. 966970,
Phuket, 2008.
Y. Wang, F. Li, and T. A, Energy-efficient Topology Control
for Three-dimensional Sensor Networks, Inderscience International Journal of Sensor Networks, vol. 4, no. 1, pp. 6878, 2008.
L. Liu, A QoS-Based Topology Control Algorithm for
Underwater Wireless Sensor Networks, Hindawi International
Journal of Sensor Networks, Article ID: 642053, 2010.
F. Ye, G. Zhong, S. Lu, and L. Zhang, PEAS: A Robust
Energy Conserving Protocol for Long-lived Sensor Networks,
Proc. The 23rd International Conference on Distributed Computing
Systems, Rhode Island, 2003.
R. Iyengar, K. Kar and S. Banerjee, Low-coordination
Topologies for Redundancy in Sensor Networks, Proc. ACM
MobiHoc 2005, pp. 332342, Urbana-Champaign, USA, 2005.
X. Bai, S. Kumar, and D. Xuan, Deploying Wireless Sensors to
Achieve both Coverage and Connectivity, Proc. ACM MobiHoc
2006, pp. 131142, Florence, Italy, 2006.
10
[19] X. Bai, Z. Yun, D. Xuan, T.H. Lai, and W. Jia, Deploying Fourconnectivity and Full-coverage Wireless Sensor Networks,
Proc. IEEE INFOCOM 2008, pp. 906914, Phoenix, USA, 2008.
[20] C. Zhang, X. Bai, J. Teng, et al.,
Constructing LowConnectivity and Full-Coverage Three Dimensional Sensor
Networks, IEEE Journal on Selected Areas in Communications,
vol. 28, no. 7, pp. 984993, 2010.
[21] M. Hefeeda, and H. Ahmadi, Network Connectivity under
Probabilistic Communication Models in Wireless Sensor Networks, Proc. IEEE International Conference on Mobile Ad Hoc
and Sensor Systems 2007, pp. 19, PISA, Italy, 2007.
[22] Q. Gao, and H. Zou, Improving Probabilistic Coverage and
Connectivity in Wireless Sensor Networks: Cooperation and
Mobility, Proc. International Conference on Wireless Communications and Signal Processing (WCSP) 2010, pp. 16, Suzhou,
China, 2010.
[23] G. Xing, X. Wang, Y. Zhang, and C. Lu, Integrated Coverage
and Connectivity Configuration for Energy Conservation in
Sensor Networks, ACM Transactions on Sensor Networks, vol.
1, no. 1, pp. 132, 2005.
[24] L. Liu, R. Wang, and F. Xiao, Topology Control Algorithm
for Underwater Wireless Sensor Networks using GPS-free
Mobile Sensor Nodes, Elsevier Journal of Network and Computer
Applications, vol. 35, no. 6, pp. 19531963, 2012.
[25] L. Wang, J. Dang, Y. Jin, and H. Jin, Scale-free Topology for
Large-Scale Wireless Sensor Networks, Proc. The third IEEE
and IFIP International Conference in central Asia on Internet ICI,
pp. 15, Tashkent, Uzbekistan, 2007.
[26] A.S. Ruela, R.S. Cabral, A.L.L. Aquino, and F.G. Guimaraes,
Evolutionary Design of Wireless Sensor Networks based on
Complex Networks, Proc. Fifth International Conference on
Intelligent Sensors, Sensor Networks and Information Processing
(ISSNIP09), Melbourne, Australia, 2009.
[27] A.S. Ruela, R.S. Cabral, A.L.L. Aquino, and F.G. Guimaraes,
Memetic and Evolutionary Design of Wireless Sensor Networks Based on Complex Network Characteristics, IGI
International Journal of Natural Computing Research, vol. 1, no.
2, pp. 3353, 2010.
[28] M. Piraveenan, M. Prokopenko, P. Wang, and A. Zeman,
Decentralized Multi-agent Clustering in Scale-free Sensor
Networks, Springer Studies in Computational Intelligence, vol.
115, pp. 485515, 2008.
[29] G. Zheng, S. Liu, and X. Qi, Scale-free Topology Evolution for
Wireless Sensor Networks with Reconstruction Mechanism,
Journal of Computers and Electrical Engineering, vol. 38, no. 3,
pp. 643651, 2012.
[30] X. Fei, A. Boukerche, and R.B. Araujo, Irregular Sensing Range Detection Model for Coverage Based Protocols in
Wireless Sensor Networks, Proc. Global Telecommunications
Conference 2009, Hawaii, USA, 2009.
[31] G. Zhou, and T. Shim, Simulation Analysis of High Speed
Underwater Acoustic Communication Based on a Statistical
Channel Model, Proc. Congress on Image and Signal Processing
2008, pp. 512517, Sanya, China, 2008.
[32] J. Dong, Q. Chen, and Z. Niu, Random Graph Theory
based Connectivity Analysis in Wireless Sensor Networks with
Rayleigh Fading Channels, Proc. the Asia-Pacific Conference on
Communications (APCC 07), pp. 123126, Bangkok, Thailand,
2007.
[33] Z. Zhou, S.R. Das, and H. Gupta, Variable radii connected
sensor cover in sensor networks, ACM Transactions on Sensor
Networks , vol. 5, no. 1, article no. 8, 2009.
[34] E. Sozer, M. Stojanovic, and J. Proakis, Underwater Acoustic
Networks, IEEE Journal of Oceanic Engineering, vol. 25, no. 1,
pp. 7283, 2000.
[35] L. Berkhovskikh, and Y. Lysanov, Fundamentals of Ocean
Acoustics (Third Edition), Springer-Verlag, 2003.
[36] S. Ibrahim, J.H. Cui, R. Ammar, Surface-level Gateway
Deployment for Underwater Sensor Networks, Proc. IEEE
Military Communications Conference 2007, pp. 17, Sanfrancisco,
CA, 2007.
[37] L. Liu, A Deployment Algorithm for Underwater Sensor
Networks in Ocean Environment, World Scientific Journal of
Circuits, Systems, and Computers, vol. 20, no. 6, pp. 10511066,
2011.
1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TPDS.2013.2295793, IEEE Transactions on Parallel and Distributed Systems
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. , NO. , 2013
1045-9219 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
11