2020
DOI: 10.1109/access.2020.3034314
|View full text |Cite
|
Sign up to set email alerts
|

MF-HER: Marine Mammal-Friendly Based High Spectral-Efficient Routing for Underwater Acoustic Sensor Networks

Abstract: In real ocean environments, artificial acoustic and natural acoustic systems are coexisted to share scarce spectrum resources. In this paper, we propose a marine mammals-friendly based high spectralefficient routing (MF-HER) protocol to improve spectrum utilization and protect marine mammal communications in underwater acoustic sensor networks (UW-ASNs), which makes full use of the interlacing frequency bands that are shared by both marine mammals and UW-ASNs. In the proposed MF-HER protocol, the detour strate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Although the above related protocols have been further optimized by reinforcement learning [23], bio-friendly strategy [24], and layering clustering technique [25] recently, none of them involve the joint optimization of node data priority, cooperative transmission and routing path selection.…”
Section: B Ai Based Routing Protocol For Uasnsmentioning
confidence: 99%
“…Although the above related protocols have been further optimized by reinforcement learning [23], bio-friendly strategy [24], and layering clustering technique [25] recently, none of them involve the joint optimization of node data priority, cooperative transmission and routing path selection.…”
Section: B Ai Based Routing Protocol For Uasnsmentioning
confidence: 99%
“…The operating frequencies of current acoustic communication modems are usually fixed according to the target applications [ 11 ]. It is possible to avoid or mitigate interferences or collisions among users using the same communication system, mainly by applying a proper medium access control (MAC) protocol according to the number of nodes, topology, operation time, or the presence of a central entity.…”
Section: Introductionmentioning
confidence: 99%