• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Adaptive Power Control Aware Depth Routing in Underwater Sensor Networks

    2021-12-10 11:57:46GhufranAhmedSaifulIslamIhsanAliIsraAdilHayderAbdelmuttlibIbrahimAbdallaAhmedMuhammadTalhaSultanAlshamraniandAgAsriAgIbrahim
    Computers Materials&Continua 2021年10期

    Ghufran Ahmed,Saiful Islam,Ihsan Ali,Isra Adil Hayder,Abdelmuttlib Ibrahim Abdalla Ahmed,Muhammad Talha,Sultan S.Alshamrani and Ag Asri Ag Ibrahim

    1Department of Computer Science,FAST National University of Computer and Emerging Sciences(NUCES),Karachi,Pakistan

    2Dr.A.Q.Khan Institute of Computer Sciences and Information Technology,Kahuta,Pakistan

    3Faculty of Computer Science and Information Technology,University of Malaya,Kuala Lumpur,50603,Malaysia

    4Department of Computer Science,COMSATS University Islamabad,Islamabad,Pakistan

    5Deanship of Scientific Research,King Saud University,Riyadh,Saudi Arabia

    6Department of Information Technology,College of Computer and Information Technology,Taif University,Taif,21944,Saudi Arabia

    7Faculty of Computing and Informatics,Universiti Malaysia Sabah,Kota Kinabalu,Sabah,Malaysia

    Abstract:Underwater acoustic sensor network(UASN)refers to a procedure that promotes a broad spectrum of aquatic applications.UASNs can be practically applied in seismic checking,ocean mine identification,resource exploration,pollution checking,and disaster avoidance.UASN confronts many difficulties and issues,such as low bandwidth,node movements,propagation delay,3D arrangement,energy limitation,and high-cost production and arrangement costs caused by antagonistic underwater situations.Underwater wireless sensor networks(UWSNs)are considered a major issue being encountered in energy management because of the limited battery power of their nodes.Moreover,the harsh underwater environment requires vendors to design and deploy energy-hungry devices to fulfil the communication requirements and maintain an acceptable quality of service.Moreover,increased transmission power levels result in higher channel interference,thereby increasing packet loss.Considering the facts mentioned above,this research presents a controlled transmission power-based sparsity-aware energy-efficient clustering in UWSNs.The contributions of this technique is threefold.First,it uses the adaptive power control mechanism to utilize the sensor nodes’battery and reduce channel interference effectively.Second,thresholds are defined to ensure successful communication.Third,clustering can be implemented in dense areas to decrease the repetitive transmission that ultimately affects the energy consumption of nodes and interference significantly.Additionally,mobile sinks are deployed to gather information locally to achieve the previously mentioned benefits.The suggested protocol is meticulously examined through extensive simulations and is validated through comparison with other advanced UWSN strategies.Findings show that the suggested protocol outperforms other procedures in terms of network lifetime and packet delivery ratio.

    Keywords:UWSNs;UASNs;QoS

    1 Introduction

    In addition to this study’s motivations,this section provides a brief overview and introduction to underwater wireless sensor networks(UWSNs)highlights the contributions of this study,and describes the structure of the paper.

    1.1 Overview

    Water can be found almost everywhere in the world.It covers approximately 70% of the earth.Underwater environments are incredibly essential for human existence.Research focuses on underwater elements because of the decrease in terrestrial methods.UWSNs remain as researchers’interests because of their capability to screen underwater environments.UWSNs are broadly utilized in coastline observation and assurance,sea calamity anticipation,observing of underwater contamination,military protection,route assistance,checking of marine oceanic environment,and underwater asset investigation[1].The use of protocols intended for terrestrial wireless sensor networks(TWSNs)in the underwater environment is ineffective[2].TWSNs and UWSNs are different in numerous ways.For example,in underwater,acoustic links are more utilized than radio links.The UWSN topology is more challenging than TWSN topology because underwater nodes move unreservedly with water streams.The former is also more dynamic than the latter,thereby causing their positions to change most of the time.The localization of nodes in UWSNs is more complicated than that in TWSNs.The positioning of nodes in UWSNs is sparse,and charging them after they are positioned is difficult[1,3].

    Moreover,UWSNs face other challenges,such as low bandwidths,that result in low data rates.The available underwater bandwidth is 40 kbps.The low propagation speed results in high delay.Underwater propagation speed is almost 1500 m/s or essentially 5 times less than the radio waves[2,4].Underwater nodes face high mobility that results in network topology instability.Energy constraints caused by difficulty in replacing the batteries are noted.The bit error rate is also high.After a thorough investigation of existing UWSN routing schemes,some major observations regarding the energy hole problem,decreased packet delivery ratio(PDR),and maximum load upon any sensor node near the sink are noted.The concluding remarks are summarized as follows:

    (a)Most existing routing schemes employ sensor nodes’peak transmission power while transmitting packets to neighboring nodes or sinks.This mechanism results in the rapid energy consumption of sensor nodes.Moreover,high transmission power utilization creates more channel interferences[5,6].Consequently,the probability of energy hole creation is also increased.

    (b)The unbalanced load distribution of forwarding data results in the rapid reduction of node energy and creates energy holes in the network.Owing to the occurrence of energy hole,various sensor nodes die prior to their rest.This energy hole problem results in increased energy consumption and decreased network lifetime[5].

    (c)The existing schemes cannot avoid additional load on nodes near the sink node.Thus,any node near the sink expends its energy faster than those positioned away from the sink node.Consuming energy rapidly also decreases the PDR[5,7].

    (d)A majority of the existing UWSN considers the use of one or multiple static sinks on the water’s surface.These sinks acquire data from sensor nodes using different routing mechanisms.This approach poses great problems in scalability when the network size is increased.Moreover,it creates a bottleneck and lowers the performance of the network.Additionally,the nodes closer to these sinks deplete their energy very rapidly and create energy holes that force the rest of the nodes into distant communication and results in rapid energy depletion.Thus,the overall network lifetime is reduced.

    Most of the techniques do not apply the mechanism of adaptive transmission power control.Furthermore,they work well in most situations.However,in extreme underwater environment where a lot of disturbances,fading and noises,unwanted failures,interferences,and collisions occur,the use of maximum transmission power slows down the performance of the network.Thus,a routing scheme that utilizes minimum transmission power must be proposed to improve the lifetime,PDR,and interference of the network.The routing protocol that is being proposed in this work minimizes channel interference and reduces energy consumption in sparse areas using an adaptive communication power control mechanism.Furthermore,in dense regions,clustering is implemented to decrease repetitive transmissions.By contrast,mobile sinks(MSs)are used to gather information for minimum energy consumption.

    1.2 Motivations

    Underwater wireless sensor networks(UWSN)elicit considerable attention in academic,research,and industrial fields.Reduction of energy depletion of sensor nodes improves the network life of UWSNs,which in turn decreases the overall network cost[4,6],because several applications,such as coastline observation and assurance,sea calamity anticipation,observation of underwater contamination,military protection,and route assistance,and checking the marine oceanic environment and underwater asset investigation,are applied in this domain[1,4].The probability of creating void holes is significantly reduced,whereas transmission reliability and end-to-end delay are improved effectively[4,8].The success of all UWSN applications depends on the efficiency of the routing protocols that influence the entire services of UWSNs.Existing protocols,such as sparsity-aware energy-efficient cluster(SEEC),CSEEC,and CDSEEC,are energy-efficient routing protocols.However,some major observations regarding the energy hole problem,decreased PDR,and maximum load on sensor nodes closer to the sink in the aforementioned protocols were noted.

    ?First,an unbalanced load for forwarding data results in the rapid reduction of node energy,known as the energy hole.Owing to the occurrence of energy hole,various sensor nodes die prior to their rest.This energy hole problem increased energy consumption and decreased network lifetime[5].

    ?Second,these existing schemes cannot avoid additional load on nodes closer to the sink node.Nodes closer to the sink devour their energy rapidly than nodes positioned away from the sink node because of the large load.Therefore,consuming energy rapidly also decreases the PDR[5,7].

    ?Third,these schemes use maximum transmission power to reduce network performance[5,6].

    1.3 Contributions

    This research presents a controlled transmission power-based SEEC(CTPSEEC)protocol in UWSNs.The contributions of the proposed protocol is threefold.It uses the adaptive power control mechanism to utilize sensor nodes’battery and reduce channel interference efficiently.Moreover,thresholds are defined to ensure a successful communication.

    Furthermore,clustering is implemented in dense regions to decrease the repetitive transmissions that affect nodes and interference’s energy consumption ultimately.Additionally,MSs are deployed to gather information locally to achieve the previously mentioned benefits.

    Most techniques do not use the mechanism of adaptive transmission power control.Furthermore,they work well in ultimate situations.However,in an extreme underwater environment,where a lot of disturbance,fading and noises,unwanted failures,interference,and collision occur,the use of maximum transmission power slows down the performance of the network.Therefore,a type of routing scheme that utilizes minimum transmission power must be proposed to improve the network lifetime,PDR,and interference.This routing protocol is being proposed to minimize channel interference and reduce energy consumption in sparse areas using an adaptive communication power control mechanism.

    Furthermore,in dense regions,clustering is implemented to decrease repetitive transmissions.By contrast,MSs are used to gather minimum energy consumption information.The advantages of our proposed protocol can be summarized as follows:

    ?Channel interference that ultimately increases the network lifetime reduces the interference and avoids the energy hole creation.

    ?The clustering technique is incorporated in dense regions to reduce the duplication of transmitted packets and balance the load of data packets that potentially reduces the interference and improves the battery usage of sensor nodes.

    ?Deployment of MSs to collect the packets for enhancing the network lifetime locally by reducing transmission distance and minimizing the interference.Moreover,it helps avoid energy holes and increases successful packet delivery.

    1.4 Article Organization

    The rest of this paper is organized as follows:

    Section 2 presents the background and classification of the routing protocol of UWSNs.Section 3 discusses the state-of-the-art work related to this article’s focus area.Section 4 presents the proposed solution.

    Section 5 explains the simulation setup.Section 6 presents the performance evaluation of the proposed scheme in terms of network lifetime,stability period,residual energy,packets received per round,and total packets received at the sink.The proposed protocol is evaluated on the basis of the following metrics:network lifetime and packets received per round residual energy.To verify the proposed scheme,rigorous comparison with current state-of-the-art schemes is conducted with depth-based routing protocol(DBR),energy-efficient DBR(EEDBR),and SEEC underwater routing schemes by using simulation parameters,as shown in Tab.1.The proposed scheme is also evaluated.Section 7 concludes the paper and provides future directions to work in this domain.

    2 Background

    In this section,some of the concepts aside from the existing routing approaches in UWSNs are discussed briefly.These concepts are grouped according to their characteristics and functions;the authors classified and discussed the routing protocols as non-localization,localization-aware,and clustering-based protocols(Fig.1)as follows:

    Table 1:Simulation parameters used for CTP-SEEC performance evaluation

    Figure 1:Taxonomy of routing protocols in UWSN

    2.1 Localization-Free Routing Strategies

    This class contains strategies that do not need prior geographical knowledge of the network.The strategies implement processes without requiring the position information of other nodes.Prior geographical knowledge of the network in such strategies is not needed.Such strategies are mostly targeted toward flooding events.These strategies are viewed as having a fast packet delivery rate and minimum E2E delay.

    In DBR[9],previous network knowledge is not required.The protocol selects the sensor node with the lowest depth to be assigned to the router and the packet.The protocol functions by comparing the transmitter node’s depth with that of the receiving node.If the transmitter depth exceeds that of the receiver,then the data will be forwarded.Otherwise,then the node will not be selected.Likewise,in EE-DBR,the depth information and remaining energy are assigned to the node during data communication.DBR,as a routing protocol,controls dynamic networks proficiently.It also needs node depth data to pass packets toward the sink.Every confirmed node sends the packet based on transmitter nodes depth and includes what was previously unsent in the same packet.The network lifetime is improved in DBR and results in high PDR.However,the network becomes partitioned,and useful resources are not utilized[10].

    Authors in[11]proposed “Localization-Free Energy-Efficient Routing(LFEER)” first and“Localization-Free Energy-Efficient Cooperative Routing(CO-LFEER)” second.The former is used to select a node based on its remaining energy,hops,and link bit error rate,on which data packets are being transmitted.For the latter,some replicas of data are received by the sink to determine the data’s quality.These schemes provide better outcomes concerning energy and increased PDR.However,the exact positions of sensor nodes in these schemes are unknown,thereby resulting in computational complexity and additional use of resources.Considering the restrictions in UWSN,energy-efficient schemes are more preferred.Underwater sensors are used for various application frameworks,and a different approach is taken when suggesting a contemporary routing schema[12].

    2.2 Localization-Aware Routing Strategies

    This class of routing strategies commonly require the geographical updates of all nodes and sink positions.These strategies are supposed to be energy effective.However,most of the energy is wasted during the collection of geographical updates.The registrations are frequently modified because the nodes’location may shift due to water flow.In localization-aware routing protocols,a node requests information from every node in the network and the sink.This framework requires former network data to function.In[13],the researchers suggested the use of mobile sensor nodes to reduce the issue of energy holes and keep the sink fixed.To fulfil this objective,clusters are formed in the network,and data gathering is carried out using mobile nodes.This strategy ensures energy proficiency,improved network lifetime,and load maximization.However,this scheme has to compensate by having high end-to-end delay.Likewise,authors in[14]proposed a dispersed cross-layer reactive routing protocol.This technique addresses most of the CARP scheme’s known issues,where the researchers ignored the re-usability propriety,thereby enhancing network lifetime and reduces how much energy is expended by eliminating the need for control packets.This strategy leads to lesser throughput and higher path loss because of the nodes’continuous movement.Then,in[15],the authors aim to create an effective routing algorithm that can broadcast to any of the sink nodes while solving the energy hole problem consistently.However,this protocol is limited because its performance is relatively ineffective,and it increases overhead and energy consumption.In the article,although the authors consider the depth of the present node and the forwarding node to reduce the possibility of void holes and energy expenditure,sending packets via two hops does not eliminate the problem yet.

    Similarly,in[4],the authors used a scheme that worked by changing the pipeline’s radius and forearming the forwarding area,thereby reducing the occurrence of replicated packets.This instance leads to enhanced PDR,reduced energy expenditure,and low end-to-end latency.However,the void hole issue still exists.Additionally,in[16],the authors designed non-synchronous duty-cycled wireless sensor networks.To estimate the best forwarding core calculation and consider residual energy,the protocol considers load balancing,coverage loss,and connectivity to select the forwarding node.However,asynchronous duty cycling results in delays.Hence,we need to wait for the next-hop node to wake up because the duty cycling in this protocol is higher than what is necessary.In[2],the authors proposed a routing scheme that forwarded data toward the destination node.To avoid duplication in GEDAR,the nodes on lower priority suppress their packet transmission.The important feature of this protocol is that it uses a depth adjustment scheme when a void hole occurs(i.e.,when a void node exists,it is transferred to a different depth so that forwarding can resume).The use of this scheme enhanced the performance of the network because it avoids the void hole successfully.However,moving nodes toward new depth results in unnecessary energy expenditure and higher end-to-end latency.

    Furthermore,in[17],the researchers proposed a strategy that used dynamic addressing.This study supports the selection of a suitable hop node.This approach assigns hop addresses to each node that helps in forwarding data.Although this protocol increases the PDR,it also results in high-energy consumption.

    2.3 Cluster-Based Routing Protocols

    A clustered-based routing protocol on node mobility is established to indicate a cluster’s structure.This technique improves the cluster head(CH)nodes and cluster-element nodes.CH nodes gather information from clustered element nodes and pass it to the sink nodes.The presented study defines each cluster-based routing protocol based on node mobility,as described below.In[17],assembly projects are proposed to reduce data loading on the basin.Their aggregation schemes are based on data collection that are distributed on the basis of the network’s local distribution.The CHs are nominated on the basis of the high residual energy between neighboring nodes.After electing the head of the block,all node members within the head node’s contact range begin data transmission,subsequently,it is assembled into a composite package.After the assembly,the vehicle data packet is transmitted to the destination over the header node.In hierarchical routing,aggregation,energy consumption,and passing load at the base station are minimized.However,the local group’s result shows a time problem,that is,nodes perform with increased end-to-end latency.As a result,the use of cluster routing in time-sensitive applications is inadequate for UWSNs.Additionally,authors in[7]proposed sparsity-aware energy-efficient clustering(SEEC)strategy for UWSNs.SEEC specifically searches for sparse areas in the network.Mostly,underwater network regions become sparse because of the water current and the high cost of manufacture,design,and deployment of sensors for broadcasting.They split the network area into equal sub-areas and find sparse and dense network sites using the dense and sparse algorithms,respectively[18].

    SEEC makes the network efficient by moving the sink in scattered areas and clustering in dense regions.SEEC also ensures network stabilization with the best clustering in densely populated areas,where each logically dense site represent a fixed set.SEEC reduces network power consumption by distributing load via static clustering in dense network areas uniformly.In this way,it achieves a better network lifetime.However,it does not assure better control in sparse regions.By having improved equal load distribution,all of the sensor nodes of UWSNs can achieve extreme stability and network lifetime.

    Fig.2 shows the splitting of network site into left and rightareas.Here,the terms of selecting the CH in SEEC routing protocol is presented as follows[1]

    The node with low depth and high energy level is chosen as CH.The authors proposed a “cooperative energy-efficient optimal relay selection protocol” for wireless underwater sensor networks in[19].Moreover,a source node selects a relay node and a sink node by itself and then sends data to the sink node through the relay node.

    Figure 2:Network site partition scenario[7]

    This method eliminates the necessity of synchronization among the source,relay,and sink nodes.Furthermore,the sink transfers the acknowledgement to the source node to receive or retransmit the data.Hence,this scheme adds in a fewer amount of packet drops.However,the data load on the source,relay,and sink node may increase or reduce the nodes’stability period.The authors in[20]also proposed an energy dissipation model of FSO and EM to scan the analytical framework and obtained the optimal range of clusters for Gaussian-distributed UWSNs.Logical results are calculated by relocating the sink to three positions:center,corners,and middle point of the sensing area.Thus,a minimum energy expenditure is observed.However,it also causes higher end-to-end latency.To conserve energy,cluster-based sleep–wake scheduling is proposed.

    For instance,in[21],the researchers used a method whereby some of the nodes are assigned the role of initiator nodes and are tasked with selecting the CH.The CH node that contains the highest remaining power level is chosen as the CH.The head node is activated while the other nodes are switched to sleep mode.The head node is selected,and then transmission is continued toward the sink node.This technique reduces energy consumption and increases the lifetime and PDR.In[21],the authors first perform a theoretical analysis to obtain the network’s expected value.Next,they divide the network into irregular clusters.They employ the strategy of recovery balance consumption of energy among clusters.This study achieved enhanced PDR,reduced energy consumption,and extended network lifetime.However,this scheme results in network variation.The author proposes particle encoding and fitness function[22]to develop this algorithm.The authors focus on different parameters,such as the distance among the clusters,the distance among sink nodes,and the remaining nodes’energy inside the clusters to enhance energy efficiency.Finally,high PDR and increased lifetime and energy efficiency are achieved.“Adaptive FFC/FWD and FEC/ARQ”structures for clustering in WSNs are proposed[23]to test the pay-off among consistency and energy effectiveness.This scheme focuses on the channel’s condition and the distance among the nodes.This scheme results in a more reliable and more energy-efficient network.However,this scheme is only effective for small networks.It addresses the issues pointed out in various aforementioned UWSN routing schemes and improves network performance by balancing the load distribution,lowering the channel interference,achieving energy efficiency,and avoiding the network’s energy holes by integrating the clustering,utilizing MSs,and transmitting power control mechanisms.Different routing protocols have been accurately reviewed in terms of node mobility,data forwarding,route discovery,route maintenance,and performance issues.In addition,the focus is placed on the execution of reviewed routing protocols via a well-organized approach.We have studied a number of cluster-based routing protocols for energy-efficient WSN.The guidance provided in this section would be beneficial for the researchers to work in this field.

    3 Related Works

    This study focused on efficient energy expenditure by using sensor nodes at sparse areas with the free location of high mobility sensor nodes underwater.After reviewing several routing protocols and classifying them as location-free and location-aware protocols,DBR,EEDBR,and SEEC are proposed to reduce the energy consumed by the sensor nodes during data transmission.We compare the implementation among these energy-efficient location-free routing protocols in UWSN.We found that DBR and EEDBR work quite well in dense areas in the network.However,they do not work well in sparse areas.

    In DBR[9],transmitter sensor nodes are selected on the basis of depth metric by multi hopping using a greedy approach,which fails in sparse networks.As long as it has no specific strategy for efficient route election(just depth criteria),the same path is chosen every time to transmit information to the sink by a source node.In this way,the nodes in the selected routing path will die,thereby leading to void region creation,which reduces network life.Similarly,in EEDBR[24],the remaining energy is used to select the forwarder node as a second metric.Hence,sensor nodes with lower depth and higher remaining energy expend their energy faster than those away from the sink,thereby increasing the problem caused by using the previous protocol.Offbalance results in energy hole creation due to excessive traffic load.This phenomenon causes increased energy expenditure and reduced network lifetime.The SEEC[7]routing protocol facilitates sparse networks by using two MSs in the middle of a sparse area to reduce the occurrence of energy holes.In addition,it uses the static clustering strategy in dense networks to solve the problem of repetitive transmissions.Therefore,two algorithms,namely,density search algorithm(DSA)(Algorithm 1)and sparsity search algorithm(SSA)(Algorithm 2),have been implemented to identify the sparse and dense areas of the network,respectively.The zone with a low amount of sensor nodes is called a sparse area,whereas the one with a high number of nodes is called a dense area.In dense regions,SEEC protocol applies a clustering mechanism.First,it nominates just a single node as the CH in each dense area at every round based on some conditions.The CH election scenario is illustrated in Fig.5.The node with a lower depth and higher energy level is chosen to be the CH.Afterwards,the cluster is created.CH is elected to collect data from the neighboring nodes.It enables the MS to receive the collected data packets from the CH directly instead of collecting data individually from every node in the network.This approach translates into less energy-consuming nodes.However,it does not work well in sparse networks.

    In[25],the authors presented a detailed review of the routing protocol for UWSNs.The authors classified the routing protocol for UWSNs based on energy,data,and location.Moreover,the performance of different routing protocols is analyzed.

    The authors in[26]proposed an energy-efficient cluster-based routing protocol for UWSNs,which used data fusion and a genetic algorithm.This routing protocol aims to reduce energy consumption by eliminating data redundancy and improving data transmission efficiency.

    In[27],the author presents a detailed survey of the architecture and technologies used for localization in UWSNs and underwater acoustic sensor networks(UASNs).Different localization techniques are discussed and classified as centralized and distributed.Further challenges in UWSN localizations and communication are discussed.

    The lack of uniform load distribution among sensor nodes causes high interference,thereby resulting in lower network performance concerning rapid energy consumption in sensor nodes.Moreover,sensor nodes use the maximum transmission power level during data transmission.Consequently,the probability of energy hole creation is also increased,thereby resulting in a decline in network lifetime.Considering the consequences of existing protocols,we have proposed controlled transmission power-based SEEC(CTP-SEEC)to enable UWSNs to overcome the challenges identified during simulations.Our objective is to enhance the overall network time by decreasing the rate at which energy is depleted,increasing the PDR,reducing the interference,and achieving a stable network in sparse regions.The proposed routing protocol is applied to minimize channel interference efficiently.It also utilizes the sensor nodes’energy efficiently by reducing the amount of energy expended in sparse networks.

    Moreover,it utilizes the adaptive power control technique,which is similar to the performance of SEEC in terms of dividing the network field into 10 equal-sized sub-areas,finding and specifying sparse and dense areas using network algorithms,and using two MS spreads in sparse areas.However,its distinctiveness from other routing protocols is used in incorporating the transmission power control technique.CTPSEEC function includes two stages:setup-stage and communication data stage.

    During the setup-stage,cost fields are built up in each node’s routing table to determine the fastest route from the source to the sink.When the setup stage is accomplished,communication data are transmitted to the sink using the minimum cost route.A sender node transmits information to its adjacent node using the stored and adjusted TPL.The sender node will adjust its TPL adaptively upon receiving acknowledgement with RSSI value.The sender uses the condition of the upper and lower threshold values.It compares the receiving RSSI value with its RSSI lower and upper threshold values.If it crosses any of these values,then the sender node tunes its TPL accordingly(i.e.,it converts to a suitable power level).

    4 Proposed Solution

    In the proposed scheme,the network is composed of three types of sensor nodes,namely,anchored,relay,and sink nodes.Anchored nodes are responsible for data collection from the bottom of the water fixed in a certain location.By contrast,the relay nodes are placed at a different underwater positions that forward the received packets toward the sink[5].The sink node has sound and radio modems[8].The sound modems are used for acoustic communication,whereas the radio modem facilitates radio communication outside the aquatic environment.The sink node is positioned at the water’s surface,which directs the data packets to the satellite,which in turn communicates the information to the control center.As stated earlier,the network is divided into 10 equal-sized regions that are denoted as A1 to A10(Fig.3).Thus,the nodes are randomly deployed,which involved sparse and dense deployment.In densely deployed regions,a cluster head node is used as a gateway to collect data from other nodes in the region.These collected data are then forwarded to the static sink through other CHs located at other densely deployed regions.

    Figure 3:System model

    4.1 Region Distribution

    We divide the site into 10 sub-areas of equal size to specify the dense and sparse areas.AE and AW refer to the right and left side areas,respectively.The start point coordinates considered a measure point for area creation.Start point coordinates are referred to as S(X0;Y0).

    S(X0,Y0)=(0,0).

    The following equations split the network site into five left side areas:

    The following equations split the network site into five right side areas:

    where B is the X-axis point of an area.Double B is used for the right side areas of AE,and B is used for AW’s left side areas.B’s value is estimated from a total breadth of the network site.

    Eq.(14)calculates the value of B.

    where L is calculated from the length of the network site.L is the Y-axis point of an area.The values of AW1and AE1are L.Double L for AW2and AE2,multiple of 3 for AW3and AE3,multiple of 4 for AW4and AE4and multiple of 5 for AW5and AE5.

    From Eqs.(16)and(17),we built a relation to find point L for AWnand AEnas:

    where N is the number of areas located either left or right.The coordinates for an Nthnumber of the top left area AWnand top right region AEncan be calculated as:

    4.2 Searching Sparse and Dense Area Algorithms

    Sparse and dense regions are determined through Algorithms 1 and 2,as mentioned by the SEEC protocol,respectively[7].In both algorithms,node N coordinates searched it and then searched for other nodes in the surrounding.Considering that the network is divided into S small sections if n is part of this particular small section,then this region is sparse.Otherwise,it will be dense.The whole mechanism of finding sparse and dense areas is shown in Fig.4.

    Figure 4:CTP-SEEC implementation flowchart

    4.3 Clustering and CH Selection in Dense Area

    When sparse and dense areas are sought,the following stage is a grouping of nodes in dense areas.We utilized a grouping strategy for areas with the highest density to expend energy productivity and system lifespan.In SEEC,the nodes in a dense area cooperatively selects a node to be the CH and then transmit information to the elected CH.The head performs information conglomeration and transmits the compacted information to any of the closest sinks.The choice of the CH is determined by the bottom and remaining energy.CH selection:The process of determining CH in SEEC is not the same as those in different protocols.In SEEC,a node with low bottom and remaining high power is selected as a CH.The choice model of selecting a node as a CH in a particular area depends on the accompanying conditions:

    where Abis the profundity of nodes of an area,most importantly.For the choice of CH,Condition(21)is checked.On the off chance that the bottom of the node is higher than the alternate nodes of that area,the node at that point cannot be a CH in the current round,and if the bottom of the node is lower than the alternate nodes of that particular area at that point,then Condition(22)is checked,where PCHis the excess power of a CH,and Pmis the mean leftover power of an individual node.The node is chosen as a CH if the its remaining power is more prominent than the normal remaining power determined for an individual node.In Condition(23),C is the chance of a node to be a CH.C is determined toward the beginning of each tour,and t speaks to the current round.The node is chosen as the bunch head when it has not been CH for the last 1 = c tours.The node produces an irregular number rand,which contrasts the rand esteem and Th(i).The node is considered an ordinary node if the rand of a node is more noteworthy than the threshold.When the rand of the node is not as much as Th threshold,the node at that point is finally a CH node.In SEEC[7],only a single node is chosen as a CH in each thick area per tour.We show a case of sensor node choice as a CH.In Fig.5A,two nodes,namely,N1 and N2,have different energy levels at similar depths.The node with high remaining energy is chosen as a CH(i.e.,N2),whereas in Fig.5B,the node N1 is chosen as a CH.Both nodes have the same energy level,yet they have various depths.Along these lines,the low depth node is chosen as a CH.

    Figure 5:CH selection[7]

    4.4 Setup Stage

    In this phase of network arrangement,its field is distributed into n sections,and relay nodes are arbitrarily positioned in the network area(Fig.3).Considering that a single static sink and architecture are used,one fixed sink exists at the surface area.By contrast,MSs are positioned inside the sparse region.The static sink node advertises a ping message(control packet)across the dense regions of the network.A ping message with a cost value and zero is originated from the static sink node.Receiving CH nodes adjacent to the sink receive the ping message and update its distance from the sink in the form of the number of hops from the sink fixed at the surface.

    Moreover,each receiving node sets a suitable transmission power level(TPL)with the sink based on the received signal strength indicator(RSSI).The cost values in the number of hops are forwarded after a delay1 to other CH in the adjustment dense regions.The receiving CH nodes store the cost value and set a suitable TPL based on RSSI.Each node determines its distance from the sink along these lines,sets a suitable TPL,and then broadcasts this information in its transmission range.Other nodes follow the same procedure.If a node receives a value greater than its current one,then it disposes the ping message;otherwise,it refreshes its distance information,sets a suitable TPL,and broadcasts the ping message again to nodes in its transmission range.This procedure continues until each sensor node sets a suitable TPL with the selected neighbors and obtains its distance from the sink.In brief,the control packet in the form of a ping message contains a cost field,which reflects the number of hops to reach the sink.In the setup phase,such control packets are propagated throughout the network.This approach establishes a minimum or shortest route from source to sink and achieves the TPL adjustment of each node with its selected neighboring nodes.

    4.5 Sink Mobility in Sparse Area

    Sparse regions refer to the areas with the least number of nodes.Sparse regions are sought,and two portable sinks are located in these regions for information gathering in SEEC.The sinks are versatile.For instance,moving sink 1(MS1)varies its situation every round from highest in sparsity to lowest meagre sparsity aside from the district of MS2.However,MS2 stays in the area with the highest sparsity until every sensor node in the region passes.All sensor nodes are kicked by MS2.At that point,it converts its situation into the area with the highest sparsity among the remaining sparse areas.

    Meanwhile,MS1 varies its location as required.The MSs should be placed around the center of the region so that most of the nodes connect with it.Sparsity is the most reasonable way to deal with gathering information from the greatest sensor nodes of the system,to accomplish something great using the least energy of the whole system.Likewise,awareness of the sparsity approach is useful in discovering the dense areas of the system field,where the sensor hubs structure groups.Instead,the sensor hubs transmit information to the sinks through multi bouncing,and nodes transmit information to their district’s particular CH.In this manner,only the CH sends information to the sink.Due to these instances,SEEC is considered an energy effective protocol.

    After splitting the site of the network into subareas logically(Fig.3)for identification,the network site is established to limit the sink’s movement in the sparse area only.Moreover,dense and sparse areas are estimated to begin data transmission in the network.Therefore,two algorithms are suggested:

    Algorithm 1:Algorithm for searching nodes densityimages/BZ_1284_436_479_717_554.pngimages/BZ_1284_227_742_664_780.pngimages/BZ_1284_248_837_480_893.pngimages/BZ_1284_598_813_739_850.pngimages/BZ_1284_429_873_710_948.pngimages/BZ_1284_265_907_547_963.pngimages/BZ_1284_360_953_500_991.pngimages/BZ_1284_217_977_498_1034.pngimages/BZ_1284_247_1017_458_1073.png

    Algorithm 1 or DSA is used to find dense regions in the network.Algorithm 2 or SSA is used to find sparse regions.These algorithms search for the number of sensor nodes in each zone.The zones are sorted in ascending array based on the number of nodes.Based on the nodes’density in each logical area,the sparse and dense areas are specified.For example,[5]is assumed to be selected as a dense area.Thus,the Nth number of nodes should be available to satisfy the limited threshold by using the following equation.The area is dense when N is greater or equal to the Nth,and the opposite indicates a sparse area.The sparse and dense search approaches are used in Fig.3 to estimate the network’s sparse and dense areas,respectively.Afterwards,the two MSs are deployed in the network’s sparse area;MS1 is placed at a maximum sparse area,and MS2 at a minimum sparse area(Fig.3).

    Both of them move from maximum sparse to the minimum sparse area and change their regions after each round from most sparse to the least sparse region and the opposite correct.In this way,more areas are covered with a void energy hole creation.As a result,more PDR would be achieved.In a dense area,the clustering approach is used.CH is selected using the procedure discussed earlier.A CH node refers to a node with high remaining energy and low depth(Fig.5).

    4.6 Communication Stage

    4.6.1 Sparse Area

    The MS nodes move in the sparse regions with very few nodes.The first MS moves within such regions while the second MS remains in such a region until all the nodes die.

    4.6.2 Dense Area

    When cost fields are built up through the network in the setup phase,a node that wants to direct information to the sink uses the minimum cost path.The node directs the information bundle to its minimum cost adjoining node while its adjusted TPL is stored in the routing table.After the reception of data packets,the sender node(source or relay)acknowledges the receiving node and the RSSI value.Suppose the RSSI crosses its predefined limit specified as either low or high.In that case,the sender node tunes its TPL accordingly,that is,it switches to the next power level if RSSI is below the limit.By contrast,if the RSSI is above the high limit,the power level declines to a level.The RSSI limits are fixed at the beginning of the data communication phase,depending on the channel condition.The proposed technique is depicted in Fig.3,where n is the number of nodes,and R is the region.

    Algorithm 2:Algorithm for searching nodes sparsityimages/BZ_1285_472_966_628_1000.pngimages/BZ_1285_263_1050_521_1101.pngimages/BZ_1285_640_1029_796_1062.pngimages/BZ_1285_282_1113_596_1163.pngimages/BZ_1285_228_1175_541_1226.pngimages/BZ_1285_263_1211_497_1261.png

    5 Simulation Setup

    This section presents a simulation setup and parameter to evaluate the performance of our proposed protocol(CTPSEEC)in terms of network lifetime,stability period,residual energy,packets received per round,and total packets received at the sink.The simulation period consists of 3500 rounds to obtain accurate results using the same environmental parameters.The total number of 100 sensor nodes is deployed randomly in 100 m × 100 m underwater.Initially,each node contains 5 joules of energy.Each sensor node can transmit in the range of 50 m.The depth threshold is set to 15 m.The proposed protocol is evaluated on the basis of the following metrics:

    5.1 Network Lifetime

    This metric shows how much time the network nodes function.It refers to the total number of rounds when all network field nodes are alive and functional.This metric is important when considering the effectiveness of a scheme because energy is the primary concern in UWSNs.The ultimate purpose of most of the underwater environment mechanisms is to extend the network lifetime,which is dependent on energy consumption.

    5.2 Packets Received per Round

    This analysis demonstrates the ratio of packets received at the sink in the particular round and their capability to accept the data packets.If the sending packets’ratio exceeds the threshold,then the packet will be dropped.

    5.3 Residual Energy

    This metric refers to the variance concerning each node’s initial energy and total energy after the transmission and reception of data packets.

    6 Simulation Results and Discussion

    This section presents the performance evaluation of the proposed scheme in terms of network lifetime,stability period,residual energy,packets received per round,and total packets received at the sink.To verify the proposed scheme,rigorous comparison with current state-of-the-art schemes is conducted.For this purpose,we have considered the DBR[9],EEDBR[24],and SEEC[7]underwater routing schemes.

    6.1 Network Lifetime

    The network lifetime is improved after implementing the controlled transmission strategy in SEEC(Fig.6).In SEEC,each sensor node transmitted packets at a predefined transmission power,thereby causing the network to die early.In the controlled transmission power(CTP)strategy,the source node based on Euclidean distance to the destination node adjusts transmission power.These power adjustments have varying energy consumption every time the packet is sent.This variation in energy consumption boosts the network’s lifetime.

    Fig.6 shows that the nodes in SEEC with CTP are alive at round 3500,whereas the SEEC without CTP is dead at round 2500(Fig.7).During the information sending in DBR,the sender incorporates its depth,and the data packets that accept nodes contrast their depths with the sender node.The node with a small depth advances packet to the sink.Every node possesses a specific holding time for every data packet.Thus,nodes with smaller depths have shorter holding time.Considering that only the sensor node’s depth is utilized for sending,these nodes die prior to alternate nodes,thereby resulting in energy holes.Fig.6 shows that the nodes in DBR with CTP are alive at round 3500,whereas those without CTP are dead at round 2000(Fig.7).In EEDBR,the stability period is better than that in DBR(Fig.6).Neighbors of the nodes rapidly reduce,thereby causing network instability,and the load on nodes is higher in EEDBR when the network is sparse.Hence,the number of dead nodes increases abruptly(Fig.7).

    Fig.6 shows that the nodes in EEDBR with CTP are alive at round 3500,whereas the EEDBR without CTP is dead at round 2000(Fig.7).

    Figure 6:Alive nodes

    6.2 Stability Period

    The random deployment of sensor nodes does not always provide the same number of dense and sparse regions.Suppose the number of dense regions is maximum.The nodes within the same dense regions communicate with the same transmission power.In that case,the stability period is compromised.

    Figure 7:Dead nodes

    Furthermore,a controlled transmission power strategy can be adapted,and then the stability period is improved(Fig.7).In the CTP-SEEC,clustering used in dense areas and MS nodes in sparse areas increase the stability period better than SEEC,DBR,and EEDBR.In DBR,the greedy mechanism forces the rigid election of transmitter node based on which the nodes are assigned.

    Thus,resources continue to be underutilized,thereby causing the lowest stability period for the protocol.The nodes in DBR without CTP are dead at round 2000(Fig.7).In EEDBR,nodes begin to die quickly because of excessive data forwarding and rapid energy reduction.

    6.3 Packets Received per Round

    Fig.8 reveals that the total packets collected in CTP-SEEC at the sink are high.This phenomenon is due to the increase in network lifetime that resulted from the use of the controlled transmission power strategy.In addition,a high number of alive nodes throughout the network lifetime improved PDR for CTPSEEC.Packets received per round in EEDBR result in high residual energy,whereas only selecting nodes by considering residual energy cannot achieve a high PDR in the sparse region.In DBR,only the lower depth of the nodes are considered for transmitting the packets,thereby resulting in the duplication of packets that causes the lowest DBR among all the other protocols.In the SEEC protocol,the number of packets collected at the sink node is lesser than the suggested CTP-SSEC routing protocol.The reason behind this is that,in SEEC,the transmission power remains constant,and the network dies early.

    6.4 Residual Energy

    In SEEC,the factor of transmission power in the equation was constant.Regardless of the distance between two communicating nodes,almost the same amount of energy was consumed while transmitting a packet.In CTP-SEEC,the function varies its return value after sending the packet,thereby resulting in tremendous residual energy.In the proposed scheme,transmission power is adjusted on the basis of the range from the source to the destination node.The lesser the distance,the lesser the transmission power and vice versa.Less transmission power results in less energy tax,thereby resulting in higher network residual energy in CTP-SEEC.DBR only considers depth and fails to consider the residual energy.Thus,it has the minimum residual energy.

    Figure 8:Packets received per round

    In EEDBR,selecting nodes by only considering residual energy cannot achieve a high PDR in the sparse region.The total remaining energy depletion of CTP-SEEC,SEEC,EEDBR,and DBR is illustrated in Fig.9.

    Figure 9:Residual energy

    7 Conclusion and Future Work

    This article investigated the existing methods of different energy-efficient location-free routing protocols of UWSN.Existing studies do not address multiple issues,including the failure to adjust sensor nodes’transmission power during data transmission.Moreover,existing strategies utilize one or more static sinks at the water’s surface using different routing mechanisms during data transmission from source to sink.This phenomenon creates a scalability issue when the network size increases(e.g.,bottleneck creation)and reduces network performance.These problems result in rapid energy depletion with a low PDR.Thus,the overall network lifetime is reduced.Therefore,we proposed a new protocol with a balanced energy-saving technique and developed an energy-efficient strategy to lengthen the overall network lifetime.Simulation analysis is applied to analyze the recommended strategies’ execution by contrasting it with DBR,EEDBR,and SEEC routing protocols.In addition to revealing that our proposed protocol outperforms the best existing state-of-the-art,such as DBR,EEDBR,and SEEC routing protocols,in terms of network lifetime and PDR,the simulation results proved the effectiveness of our proposed protocol.In the future,we will explore the monitoring of the sparsity networks by avoiding the energy hole creation problem.The proposed scheme has addressed this problem to some extent.However,the smart and adaptive mobility mechanism of MSs can also influence the avoidance of energy hole creation significantly.Although not required,MSs with CTP result in end-to-end delays.Thus,the delay in each round is still observed.The proposed scheme should be modified to address these problems in future work.

    Funding Statement:The authors are grateful to the Deanship of Scientific Research and King Saud University for funding this research.The author are also grateful to Taif University Researchers Supporting Project number(TURSP-2020/215),Taif University,Taif,Saudi Arabia.This research work was also partially supported by the Faculty of Computer Science and Information Technology,University of Malaya under Postgraduate Research Grant(PG035-2016A).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    无人区码免费观看不卡| 久久婷婷成人综合色麻豆| www日本黄色视频网| 国产午夜精品久久久久久| 啪啪无遮挡十八禁网站| 狂野欧美白嫩少妇大欣赏| 精品第一国产精品| 亚洲国产高清在线一区二区三| 美女免费视频网站| 搡老妇女老女人老熟妇| e午夜精品久久久久久久| 啦啦啦韩国在线观看视频| 又黄又爽又免费观看的视频| 精华霜和精华液先用哪个| 欧美性猛交黑人性爽| 亚洲五月婷婷丁香| 久久久国产成人精品二区| 日日爽夜夜爽网站| 12—13女人毛片做爰片一| 亚洲,欧美精品.| 99久久无色码亚洲精品果冻| 国产精品久久电影中文字幕| 不卡av一区二区三区| 国产爱豆传媒在线观看 | 50天的宝宝边吃奶边哭怎么回事| 日本黄大片高清| 99久久精品热视频| 一边摸一边抽搐一进一小说| 午夜成年电影在线免费观看| 国产黄片美女视频| 日韩欧美一区二区三区在线观看| 免费人成视频x8x8入口观看| 成熟少妇高潮喷水视频| 91在线观看av| 人妻丰满熟妇av一区二区三区| 老司机在亚洲福利影院| 国产真人三级小视频在线观看| 久久久久久大精品| 精品无人区乱码1区二区| 欧美一级a爱片免费观看看 | 欧美日韩福利视频一区二区| 免费观看精品视频网站| 日韩免费av在线播放| 中文字幕人妻丝袜一区二区| 黄色片一级片一级黄色片| 亚洲欧美日韩高清在线视频| 老司机靠b影院| 国产成年人精品一区二区| 99riav亚洲国产免费| 久久伊人香网站| 白带黄色成豆腐渣| 宅男免费午夜| 精品欧美国产一区二区三| 中文字幕最新亚洲高清| 久久久久久免费高清国产稀缺| 黄色女人牲交| 桃红色精品国产亚洲av| 久久热在线av| 12—13女人毛片做爰片一| 久久精品影院6| 亚洲成av人片免费观看| 精品国内亚洲2022精品成人| 男人舔女人的私密视频| 国内毛片毛片毛片毛片毛片| 国产成人欧美在线观看| 国产精品99久久99久久久不卡| 亚洲aⅴ乱码一区二区在线播放 | 波多野结衣高清作品| 免费看十八禁软件| 日韩欧美在线二视频| 欧美激情久久久久久爽电影| 久久这里只有精品中国| 日韩大码丰满熟妇| 国产99久久九九免费精品| 黄色 视频免费看| 亚洲av成人av| 欧美人与性动交α欧美精品济南到| 男女那种视频在线观看| 悠悠久久av| 哪里可以看免费的av片| 亚洲欧美激情综合另类| 曰老女人黄片| 日韩 欧美 亚洲 中文字幕| 老汉色av国产亚洲站长工具| 国产一区二区在线av高清观看| 狂野欧美白嫩少妇大欣赏| 美女免费视频网站| 亚洲一区二区三区不卡视频| 精品第一国产精品| 国产精华一区二区三区| 88av欧美| 国产99白浆流出| 国内精品久久久久精免费| 国产片内射在线| 黄色丝袜av网址大全| 男女那种视频在线观看| 国产伦在线观看视频一区| 我的老师免费观看完整版| 久久精品国产亚洲av香蕉五月| 亚洲五月天丁香| 国产精品亚洲美女久久久| 亚洲人成网站在线播放欧美日韩| 精品人妻1区二区| 久久久久久久久久黄片| 51午夜福利影视在线观看| 亚洲性夜色夜夜综合| 亚洲性夜色夜夜综合| 亚洲精品一区av在线观看| 在线永久观看黄色视频| or卡值多少钱| 一个人免费在线观看电影 | 精品人妻1区二区| av欧美777| 免费在线观看完整版高清| 亚洲精品美女久久av网站| 丝袜美腿诱惑在线| 一个人观看的视频www高清免费观看 | 亚洲国产精品合色在线| 成人av一区二区三区在线看| 香蕉av资源在线| 日韩大码丰满熟妇| 男男h啪啪无遮挡| 亚洲美女黄片视频| 丝袜人妻中文字幕| 亚洲天堂国产精品一区在线| 欧美绝顶高潮抽搐喷水| 麻豆成人av在线观看| 757午夜福利合集在线观看| 精品久久久久久成人av| 男女视频在线观看网站免费 | 午夜两性在线视频| 久久人妻av系列| 免费在线观看黄色视频的| 亚洲人成伊人成综合网2020| av在线天堂中文字幕| 国产黄a三级三级三级人| 国产成人精品久久二区二区91| 我要搜黄色片| 亚洲欧美日韩高清专用| 成年女人毛片免费观看观看9| 又爽又黄无遮挡网站| 国产精品永久免费网站| 亚洲成a人片在线一区二区| videosex国产| 波多野结衣高清无吗| 日本熟妇午夜| 欧美日韩国产亚洲二区| 成人精品一区二区免费| 在线十欧美十亚洲十日本专区| av福利片在线观看| 美女大奶头视频| av国产免费在线观看| 亚洲18禁久久av| 叶爱在线成人免费视频播放| 亚洲九九香蕉| 中国美女看黄片| 波多野结衣高清作品| 亚洲精品国产精品久久久不卡| 黄片大片在线免费观看| 国产精品永久免费网站| 一卡2卡三卡四卡精品乱码亚洲| 桃色一区二区三区在线观看| 三级毛片av免费| 给我免费播放毛片高清在线观看| 狠狠狠狠99中文字幕| 麻豆国产97在线/欧美 | 亚洲国产看品久久| 亚洲精品国产精品久久久不卡| 久久香蕉激情| 久久人妻av系列| 身体一侧抽搐| 免费高清视频大片| 变态另类丝袜制服| 久久精品影院6| 国产主播在线观看一区二区| 亚洲美女视频黄频| 午夜a级毛片| 国产av一区二区精品久久| 久久天堂一区二区三区四区| 在线免费观看的www视频| 亚洲av成人av| 久久香蕉国产精品| or卡值多少钱| 一个人免费在线观看电影 | 一个人免费在线观看的高清视频| 久久中文字幕人妻熟女| 搡老妇女老女人老熟妇| 丝袜美腿诱惑在线| 免费人成视频x8x8入口观看| 俺也久久电影网| 日韩有码中文字幕| 久久久久久亚洲精品国产蜜桃av| 亚洲欧美激情综合另类| 91麻豆av在线| 久久午夜综合久久蜜桃| 精品国产乱子伦一区二区三区| 亚洲精品av麻豆狂野| 91九色精品人成在线观看| 国产精品一区二区三区四区免费观看 | 可以免费在线观看a视频的电影网站| 最近在线观看免费完整版| 欧美国产日韩亚洲一区| 国产熟女xx| 日韩精品青青久久久久久| 久久香蕉国产精品| 日日干狠狠操夜夜爽| 最近在线观看免费完整版| 中出人妻视频一区二区| 成人一区二区视频在线观看| 国语自产精品视频在线第100页| 人人妻,人人澡人人爽秒播| 亚洲精品国产精品久久久不卡| 亚洲精华国产精华精| 亚洲第一欧美日韩一区二区三区| 香蕉久久夜色| 伊人久久大香线蕉亚洲五| 国产欧美日韩精品亚洲av| 亚洲五月婷婷丁香| svipshipincom国产片| 女同久久另类99精品国产91| a级毛片a级免费在线| 欧美中文综合在线视频| 99国产极品粉嫩在线观看| 国模一区二区三区四区视频 | 全区人妻精品视频| 男女之事视频高清在线观看| 久久久久久久久中文| 他把我摸到了高潮在线观看| 欧美一级毛片孕妇| 国产精品影院久久| 午夜福利视频1000在线观看| 欧美性长视频在线观看| 日本精品一区二区三区蜜桃| 国产在线观看jvid| 免费在线观看黄色视频的| 777久久人妻少妇嫩草av网站| 久久久久久大精品| 国产99久久九九免费精品| avwww免费| 可以在线观看的亚洲视频| 亚洲午夜精品一区,二区,三区| 长腿黑丝高跟| 九色国产91popny在线| 丁香欧美五月| 国产日本99.免费观看| 久久精品91蜜桃| 少妇裸体淫交视频免费看高清 | 午夜a级毛片| 三级毛片av免费| 在线观看免费视频日本深夜| 亚洲av熟女| 天堂av国产一区二区熟女人妻 | 狂野欧美激情性xxxx| 久久久久久免费高清国产稀缺| 亚洲欧美一区二区三区黑人| 欧美乱码精品一区二区三区| 免费高清视频大片| 久久热在线av| 99久久精品热视频| 欧美极品一区二区三区四区| 亚洲全国av大片| 99riav亚洲国产免费| 熟妇人妻久久中文字幕3abv| 久久久久久大精品| 国产av麻豆久久久久久久| 欧美黑人精品巨大| 色av中文字幕| 午夜影院日韩av| av福利片在线| 老汉色∧v一级毛片| 亚洲aⅴ乱码一区二区在线播放 | 黄片大片在线免费观看| 亚洲欧美精品综合一区二区三区| 大型av网站在线播放| 看黄色毛片网站| 日韩欧美三级三区| 亚洲avbb在线观看| 美女免费视频网站| 首页视频小说图片口味搜索| 日韩精品青青久久久久久| 两性夫妻黄色片| 精品福利观看| 国产成人精品无人区| netflix在线观看网站| 亚洲av成人av| 国内精品久久久久精免费| 黄色女人牲交| 久久伊人香网站| 亚洲国产精品sss在线观看| 国产精品美女特级片免费视频播放器 | 亚洲电影在线观看av| 国产黄色小视频在线观看| 一区二区三区国产精品乱码| 国产欧美日韩精品亚洲av| 正在播放国产对白刺激| 男女做爰动态图高潮gif福利片| 性欧美人与动物交配| 伊人久久大香线蕉亚洲五| 在线观看免费日韩欧美大片| 亚洲熟女毛片儿| cao死你这个sao货| 日韩国内少妇激情av| 中文字幕熟女人妻在线| 免费一级毛片在线播放高清视频| 国产午夜精品久久久久久| 欧美久久黑人一区二区| 免费电影在线观看免费观看| 在线播放国产精品三级| 久久精品国产亚洲av香蕉五月| 欧美中文日本在线观看视频| 人人妻,人人澡人人爽秒播| 欧美日韩一级在线毛片| 午夜视频精品福利| 好男人在线观看高清免费视频| 一本综合久久免费| av中文乱码字幕在线| 熟妇人妻久久中文字幕3abv| 1024香蕉在线观看| 成年人黄色毛片网站| 91九色精品人成在线观看| 村上凉子中文字幕在线| 国产一区二区三区在线臀色熟女| 国产97色在线日韩免费| 欧美精品啪啪一区二区三区| 亚洲美女视频黄频| 一进一出抽搐动态| 欧美日韩精品网址| 欧美黄色片欧美黄色片| 成人国语在线视频| 无遮挡黄片免费观看| 无人区码免费观看不卡| 好男人电影高清在线观看| 久久午夜亚洲精品久久| 悠悠久久av| tocl精华| 亚洲成人久久性| 亚洲国产精品久久男人天堂| 高清毛片免费观看视频网站| 午夜成年电影在线免费观看| 国产一区二区三区视频了| 丰满人妻一区二区三区视频av | 国产1区2区3区精品| 免费电影在线观看免费观看| 两个人看的免费小视频| 欧美黑人欧美精品刺激| 九色国产91popny在线| 色综合亚洲欧美另类图片| 精品久久久久久成人av| 国产av一区二区精品久久| 欧美中文综合在线视频| 香蕉av资源在线| 精品欧美一区二区三区在线| 精品国产超薄肉色丝袜足j| 一进一出好大好爽视频| 日本成人三级电影网站| 少妇被粗大的猛进出69影院| 制服诱惑二区| 无限看片的www在线观看| 国产精品一及| 中文字幕精品亚洲无线码一区| 久热爱精品视频在线9| 黄频高清免费视频| 久久午夜综合久久蜜桃| 久久国产乱子伦精品免费另类| 午夜免费激情av| 两性午夜刺激爽爽歪歪视频在线观看 | 欧美午夜高清在线| 两人在一起打扑克的视频| 国语自产精品视频在线第100页| 99国产综合亚洲精品| 国产探花在线观看一区二区| 一区福利在线观看| 好男人在线观看高清免费视频| 国产精品野战在线观看| 午夜影院日韩av| 又大又爽又粗| 亚洲专区字幕在线| 波多野结衣高清作品| 首页视频小说图片口味搜索| 亚洲精品在线美女| 黄频高清免费视频| 久久热在线av| 精华霜和精华液先用哪个| 成年人黄色毛片网站| 亚洲国产精品合色在线| 琪琪午夜伦伦电影理论片6080| 在线播放国产精品三级| 国产亚洲精品第一综合不卡| 日韩大码丰满熟妇| 无限看片的www在线观看| 国内少妇人妻偷人精品xxx网站 | 午夜精品一区二区三区免费看| 中文字幕人妻丝袜一区二区| 看片在线看免费视频| 九九热线精品视视频播放| 国产成人精品久久二区二区免费| 俄罗斯特黄特色一大片| 又黄又爽又免费观看的视频| 精品久久久久久久末码| 亚洲熟女毛片儿| 欧美乱妇无乱码| 成人av一区二区三区在线看| 免费在线观看成人毛片| 国产精品久久久av美女十八| 免费看日本二区| 一级a爱片免费观看的视频| 精品久久蜜臀av无| 久久精品国产亚洲av香蕉五月| 正在播放国产对白刺激| 国产av不卡久久| 天堂av国产一区二区熟女人妻 | 亚洲欧美日韩高清在线视频| 国产午夜精品久久久久久| 亚洲中文日韩欧美视频| 男女之事视频高清在线观看| 国产精品1区2区在线观看.| 在线观看午夜福利视频| 每晚都被弄得嗷嗷叫到高潮| 99久久国产精品久久久| 美女大奶头视频| 老司机福利观看| 美女午夜性视频免费| 欧美国产日韩亚洲一区| www.999成人在线观看| 精品国内亚洲2022精品成人| 精品久久久久久久毛片微露脸| 好看av亚洲va欧美ⅴa在| 成人午夜高清在线视频| 精品不卡国产一区二区三区| 亚洲色图 男人天堂 中文字幕| 国产爱豆传媒在线观看 | 国产蜜桃级精品一区二区三区| 观看免费一级毛片| 麻豆国产97在线/欧美 | 亚洲中文av在线| 国产成人精品久久二区二区免费| 亚洲精品中文字幕一二三四区| 国产精品99久久99久久久不卡| 男插女下体视频免费在线播放| 黄色 视频免费看| 精品无人区乱码1区二区| 国产成人系列免费观看| 高清在线国产一区| 国产午夜精品久久久久久| 国产亚洲精品av在线| 亚洲av熟女| 久久香蕉精品热| 精品熟女少妇八av免费久了| 精品久久久久久,| 亚洲avbb在线观看| 天堂动漫精品| 女人爽到高潮嗷嗷叫在线视频| 国产成人精品无人区| 熟女电影av网| 99久久国产精品久久久| 丰满人妻熟妇乱又伦精品不卡| 国产精品久久久av美女十八| 午夜久久久久精精品| 亚洲熟妇熟女久久| 国产伦在线观看视频一区| 久久亚洲真实| 日本黄大片高清| 精品无人区乱码1区二区| 搡老岳熟女国产| 亚洲欧洲精品一区二区精品久久久| 国产高清视频在线观看网站| 91在线观看av| a级毛片在线看网站| 国产99白浆流出| x7x7x7水蜜桃| 亚洲美女视频黄频| 窝窝影院91人妻| 欧美日韩乱码在线| 一级黄色大片毛片| 别揉我奶头~嗯~啊~动态视频| 久久久久亚洲av毛片大全| 婷婷丁香在线五月| 男女床上黄色一级片免费看| 久久久久免费精品人妻一区二区| 最近最新免费中文字幕在线| 午夜视频精品福利| 亚洲欧美精品综合久久99| 在线永久观看黄色视频| 看片在线看免费视频| 亚洲欧美一区二区三区黑人| 精品国产超薄肉色丝袜足j| 非洲黑人性xxxx精品又粗又长| 午夜福利欧美成人| 夜夜躁狠狠躁天天躁| 极品教师在线免费播放| 久久国产精品影院| 美女 人体艺术 gogo| 搡老岳熟女国产| xxx96com| 久久人妻福利社区极品人妻图片| 精品不卡国产一区二区三区| 非洲黑人性xxxx精品又粗又长| 国产不卡一卡二| 午夜精品一区二区三区免费看| 久久中文字幕人妻熟女| 午夜两性在线视频| av片东京热男人的天堂| 国产欧美日韩一区二区三| 国产激情偷乱视频一区二区| 精品免费久久久久久久清纯| 国产一级毛片七仙女欲春2| 久久久久性生活片| 亚洲激情在线av| 在线国产一区二区在线| 日本 欧美在线| 少妇粗大呻吟视频| 免费看日本二区| 88av欧美| 免费在线观看视频国产中文字幕亚洲| 99riav亚洲国产免费| 老熟妇仑乱视频hdxx| 成年女人毛片免费观看观看9| 免费在线观看完整版高清| 中文资源天堂在线| 欧美成人免费av一区二区三区| 少妇人妻一区二区三区视频| 1024手机看黄色片| 欧美国产日韩亚洲一区| 婷婷亚洲欧美| 亚洲国产精品成人综合色| 亚洲中文字幕日韩| 在线观看日韩欧美| www.自偷自拍.com| 女人被狂操c到高潮| 婷婷六月久久综合丁香| 国产在线精品亚洲第一网站| 国产精品一区二区三区四区久久| 国产aⅴ精品一区二区三区波| 黄色女人牲交| 亚洲天堂国产精品一区在线| 亚洲av美国av| 99热这里只有是精品50| 国产私拍福利视频在线观看| 精品日产1卡2卡| 巨乳人妻的诱惑在线观看| 国产精品久久电影中文字幕| 天天躁狠狠躁夜夜躁狠狠躁| 国内精品久久久久久久电影| 亚洲乱码一区二区免费版| 99久久综合精品五月天人人| 丰满的人妻完整版| 国产精品一区二区免费欧美| 色综合站精品国产| 一区二区三区国产精品乱码| 亚洲无线在线观看| 女人爽到高潮嗷嗷叫在线视频| 亚洲精品中文字幕一二三四区| 色哟哟哟哟哟哟| 成熟少妇高潮喷水视频| 国产一区二区激情短视频| 777久久人妻少妇嫩草av网站| 美女 人体艺术 gogo| 他把我摸到了高潮在线观看| 香蕉久久夜色| 制服诱惑二区| avwww免费| 久久久久久久久中文| 在线观看午夜福利视频| 村上凉子中文字幕在线| 人妻丰满熟妇av一区二区三区| 成人午夜高清在线视频| 好男人电影高清在线观看| 伦理电影免费视频| 亚洲性夜色夜夜综合| 亚洲精品在线美女| 成熟少妇高潮喷水视频| 欧美日韩中文字幕国产精品一区二区三区| 欧美日韩精品网址| 老司机午夜十八禁免费视频| 美女黄网站色视频| 无限看片的www在线观看| 久久久国产成人免费| 亚洲美女视频黄频| 久久久久免费精品人妻一区二区| 午夜精品在线福利| 欧美在线黄色| 中文字幕高清在线视频| 黄片大片在线免费观看| 国产一区在线观看成人免费| 亚洲精品av麻豆狂野| 一级片免费观看大全| 日本五十路高清| 久久久精品大字幕| 久久亚洲真实| 亚洲乱码一区二区免费版| 免费观看精品视频网站| 一个人观看的视频www高清免费观看 | 婷婷丁香在线五月| 亚洲av日韩精品久久久久久密| 欧美成人午夜精品| 欧美一级毛片孕妇| 九九热线精品视视频播放| 国产亚洲av高清不卡| 亚洲第一欧美日韩一区二区三区| 国产三级黄色录像| 全区人妻精品视频| 欧美极品一区二区三区四区| 亚洲av电影在线进入| 日本黄大片高清| 国产久久久一区二区三区| 亚洲第一电影网av| 九九热线精品视视频播放| 在线观看www视频免费| 精品久久久久久成人av| 99国产综合亚洲精品| 12—13女人毛片做爰片一| 黄色丝袜av网址大全| 日本a在线网址| 成人国产一区最新在线观看| 欧美大码av|