Abstract
Low data delivery efficiency and high energy consumption are the inherent problems in Underwater Wireless Sensor Networks (UWSNs) characterized by the acoustic channels. Existing energy-efficient routing algorithms have been shown to reduce energy consumption of UWSNs to some extent, but still neglect the correlation existing in the local data of sensor nodes. In this paper, we present a Multi-population Firefly Algorithm (MFA) for correlated data routing in UWSNs. We design three kinds of fireflies and their coordination rules in order to improve the adaptability of building, selecting, and optimization of routing path considering the data correlation and their sampling rate in various sensor nodes. Different groups of fireflies conduct their optimization in the evolution in order to improve the convergence speed and solution precision of the algorithm. Moreover, after the data packets are merged during the process of routing path finding, MFA can also eliminate redundant information before they are sent to the sink node, which in turn saves energy and bandwidth. Simulation results have shown that MFA achieves better performance than existing protocols in metrics of packet delivery ratio, energy consumption, and network throughput.
1. Introduction
Underwater Wireless Sensor Networks (UWSNs) have a lot of potential application areas such as oceanographic data collection, disaster prevention, pollution monitoring, offshore exploration, and military surveillance [1–3]. UWSN is a new area of wireless sensor network in underwater environments which has challenges to be overcome such as long propagation delay, severely limited bandwidth, and time-varying multipath propagation [4–6]. All the above distinct features of UWSNs give birth to new challenging areas for every level of the network protocol suite. UWSNs consist of a variable number of sensors and vehicles that are deployed to perform collaborative monitoring tasks over a given area. To achieve this objective, sensors and vehicles self-organize in an autonomous network in order to adapt to the characteristics of the underwater environment. Many problems arise with UWSNs that need to be solved in order to enable underwater monitoring in the new environment. Among them, providing efficient routing is very challenging due to the unique characteristics of UWSNs [7, 8]. UWSNs must rely on underwater acoustic communications because high-frequency radio signals used in traditional ground-based sensor networks can be rapidly absorbed by water. Compared with terrestrial wireless sensor networks, the channel of UWSNs has the following characteristics: (1) high bit error ratio caused by noise, multi-path loss and Doppler propagation; (2) high energy consumption; (3) limited bandwidth; (4) long and unstable delivery delay [9, 10]. Therefore, many research results in land-based sensor networks as well as traditional ad hoc networks cannot be applied to UWSNs directly, which requires new routing protocol to be designed for the new features of the UWSNs in order to ensure that the performance of UWSNs can meet the actual underwater environmental needs.
Low data delivery efficiency and high energy consumption are the inherent problems in UWSNs characterized by the acoustic channels. Acoustic channel imposes higher energy consumption as well as lower bandwidth than radio signal. Therefore, improving packet delivery ratio and energy efficiency for UWSNs becomes even more critical than in traditional sensor networks.
According to their architectures, the routing protocols of UWSNs can be divided into three categories: location-based routing, flat routing, and hierarchical routing [11]. Location-based routing has good scalability, but it requires a positioning system or positioning algorithm to help the nodes to calculate the location information. Flat routing protocols have better robustness, but the excessive overhead for maintaining routing information restricts their application to small-scale underwater acoustic circumstances. Hierarchical routing also has good scalability, but the cluster maintenance overhead and the failure of key nodes will affect the routing efficiency. Consequently, these routing protocols cannot fully meet performance requirements described above.
Firefly algorithm is the development of simulated evolutionary computation in the recent years [12]. It is simple, but appropriate to parallel processing with strong robustness, which extends its application to a number of fields such as solving economic dispatch and cryptography problems [13–15]. As the characteristic of firefly intelligence is similar to that of UWSN's self-organized property, this paper presents a Multi-population Firefly Algorithm (MFA) for correlated data routing in UWSNs. In MFA, three kinds of fireflies coordinate to improve the adaptability of building, selecting, and optimization of routing path considering the data correlation and their sampling rate in various sensor nodes. As a result, MFA minimizes the total data transmission volume and optimizes the routing path concurrently. Furthermore, in order to increase the energy efficiency in resource constraint underwater environment, MFA balances the energy consumption during the process of routing in case some sensor nodes exhaust their energy too early.
The remainder of the paper is organized as follows. Section 2 gives a brief overview of related work. Section 3 presents the network model, while Section 4 introduces the technical details of our routing protocol. Performance evaluation is described in Section 5. Finally, we conclude the paper in Section 6.
2. Related Work
Tan et al. [16] proposed a new protocol based on hop-by-hop hybrid; implicit/explicit acknowledgment scheme is proposed for a multihop UWSN. In the protocol, data packets forwarded by downstream nodes can work as implicit ACKs for previous transmitted data packets, (where ACK is an abbreviation that refers to the Acknowledgement to the receipt of data packet). Pompili et al. [17] introduced two distributed routing algorithms for delay-insensitive and delay-sensitive applications, respectively, with the objective of minimizing the energy consumption taking the varying condition of the underwater channel and the different application requirements into account. Vector-Based Forwarding (VBF) [18] is a geographic approach, which allows the nodes to weigh the benefit to forward packets and reduce energy consumption by discarding low benefit packets. Therefore, over a multi-hop path, only the nodes that are located within a pipe of given width between the source and the destination are considered for relaying. However, in the areas of low density of nodes VBF may not find the path close to the routing vector. Similarly, Jornet et al. [19] proposed Focused-Beam Routing (FBR) protocol that is suitable for networks containing both static and mobile nodes. The objective of FBR is to determine which nodes are candidates for relaying. Candidate nodes are those that lie within a cone of angle ±
Depth-Based Routing (DBR) [21] can handle network dynamics efficiently without the assistance of a localization service. DBR forwards data packets greedily towards the water surface (i.e., the plane of data sinks). In DBR, a data packet has a field that records the depth information of its recent forwarder and is updated at every hop. But DBR has only greedy forwarding mode, which alone is not able to achieve high delivery ratios in sparse areas. A similar idea can be found in [22], a hydraulic pressure-based anycast routing protocol that exploits the measured pressure levels to route data to surface buoys where relays are chosen based on a weighted average of advancement towards the sources and probability of packet delivery, and an efficient underwater dead end recovery method is added to handle the absence of a relay node at lower depth than the current packet holder. Yang and Ssu [23] designed an energy-efficient routing protocol called EUROP, where they tried to reduce large amount of energy consumption by reducing broadcast hello messages. The sensor nodes use RREQ and RREP packets to communicate with each other, and the next hop can be determined by the rule of from deep to shallow and so on. In EUROP, installing the depth sensor and electronic module is not a simple decision because cost per node will increase and the additional devices will burden the critical node energy, hence decreasing the life of the sensor node.
In order to remove the constraints imposed by special hardware (e.g., every node should be equipped with depth or pressure sensor, which not only increases the cost of the network but also becomes a burden for extra energy consumption), Ayaz and Abdullah [24] proposed a Hop-by Hop-Dynamic Addressing Based (H2-DAB) routing protocol to provide scalable and time efficient routing for UWSN. The H2-DAB routing protocol does not require any dimensional location information or any extra specialized hardware compared with many other routing protocols in the same area. Dynamic addresses are used for sensor nodes in order to solve the problem of water currents, so that sensor nodes will get new addresses according to their new positions at different depth intervals. However, the problem of multi-hop routing still exists as it is based on multi-hop architecture, where nodes near the sinks drain more energy because they are used more frequently. Domingo [25] presented a distributed energy-aware routing protocol called DUCS (Distributed Underwater Clustering Scheme) where the whole network is divided into clusters using a distributed algorithm. Sensor nodes are organized into local clusters where one node is selected as a cluster head for each. After receiving the data packets from all the cluster members, cluster head performs signal processing function like aggregation on the received data and transmits them towards the sink using multi-hop routing through other cluster heads. DUCS achieves a relatively high packet delivery ratio and reduces the network overhead. But frequent division of sectors can be a burden on the network as the setup phase is repeated many times. Moreover, during the network operation phase, a cluster head can only transmit its collected data towards another cluster head, which restricts its flexibility and availability. For example, when water currents move two cluster head nodes away, they cannot communicate directly even if a few noncluster head nodes are available between them.
Packet redundancy and multiple paths can be exploited in order to increase the reliability of UWSNs. Ayaz et al. [26] provided a two-hop acknowledgment reliability model in order to insure the reliable data deliveries to the surface sinks, where two copies of the same data packet are maintained in the network without extra burden on the available resources. A relay node that has data packets to forward will not reply the acknowledgment until it cannot find the next hop towards the destination. But if a node is unable to find the next hop due to any failure, or even if it is lost, then packets in the buffer are not considered lost. All the nodes that send the data packets towards this node will wait for a certain amount of time before trying again for the next hop. Xu et al. [27] proposed a Multiple-path Forward Error Correction (M-FEC) approach that integrated multiple-path communications and Hamming Coding to eliminate retransmission and enhance reliability in underwater sensor networks. Moreover, a Markov model and a dynamical decision and feedback scheme were developed to decrease the number of the paths in order to save energy and ensure the desirable packet error rate. However, M-FEC may cause much long delay because of additional process of encoding and decoding the data packets, and it does not tackle the issues of node and link failures.
3. Network Model
The routing algorithm to be presented in this paper is built on a Peer-to-peer- (P2P-) based UWSN platform that consists of acoustic sensor nodes, relay nodes, sink nodes, and P2P nodes as shown in Figure 1.

The architecture of a P2P-based UWSN platform.
Acoustic sensor nodes are deployed in the monitoring region, which are responsible for data collection, processing, and communications. Each acoustic sensor node has two data communication interfaces. One is acoustic communication interface, through which the acoustic transducer can communicate with acoustic sensor nodes and others; the other interface can be used to connect relay nodes through CAN (Controller Area Network) bus or UART (Universal Asynchronous Receiver/Transmitter). When acoustic sensors are transmitting data, they deliver nodes' states and data to relay nodes at the same time. The adoption of relay nodes makes the underwater nodes free from the bondage of cables, facilitating the deployment and control of underwater acoustic sensors and improving the structural integrity and robustness of UWSN. It can also expand the scope of monitoring. Relay nodes send information to sink nodes through wireless communication. At last, sink nodes communicate with P2P nodes through the serial ports and collect data to P2P nodes from various acoustic sensor nodes. After data stream arrives at P2P nodes, it will be put into the appropriate queue scheduler, where it can be processed by multithread operation processor. After that, the results will be sent to the router, which will decide the direction of the data: passing to archive or processing for output. Load balance strategies are used for preventing the platform from overloading. If the system performance is rather low, it notifies the load balancer, which will take measures to reduce the load on the system until it reaches the normal. The arriving data stream is dynamic. So even if the average load of a node is not high, a node is still likely encountering a temporary peak loads in the busy period, which extends its waiting time for data processing. Therefore, in order to minimize the data processing time, appropriate load balancing strategy is needed to avoid overloading.
We consider that UWSNs are composed of a large number of nodes uniformly scattered in monitoring fields and represented by
Definition 1.
The function
Two nodes
Considering two sensor nodes at minimum hop distance h, there exist two values
Sensing devices generally have widely different theoretical and physical characteristics. Thus, numerous models of varying complexity can be constructed based on application needs and device features. However, for most kinds of sensors, the sensing ability diminishes as distance increases.
Definition 2.
Given a source sensor node
4. Routing Protocol
4.1. Data Correlation and Energy Consumption Model
Data aggregation is important in energy constraint UWSNs where spatial and temporal correlations as well as redundant data can be detected to reduce the number of packets exchanged in the network. In this paper, spatial correlation means that multiple sensor nodes in a nearby region record the same or similar data about a single event; whereas temporal correlation means that the change pattern of the data in current sensor node is equal or similar to the data observed at previous times, and the degree of correlation between consecutive observations may vary according to the temporal variation characteristics of the phenomenon.
Given two sensor node sets A and B, where
Definition 3.
Given a data sequence
Definition 4.
Given two data sequences
Given a sensor node
The correlated data packets can be merged in order to decrease communication traffic, which in turn cuts down the overall energy consumption of the network. Suppose
Let
Let
Acoustic signal has different transmission modes in shallow water (where the depth of the water is less than 100 meters) and deep water (where the depth of the water is more than 100 meters). In shallow water, the transmission of the acoustic signal is limited to a cylindrical area from the bottom to the surface. The energy consumption for transmission in the shallow water is calculated as
In deep water, the transmission of the acoustic signal is mainly with spherical diffusion. The energy consumption is caused by spherical diffusion and water absorption, which can be calculated as
4.2. Routing Algorithm
Routing in UWSNs has its own particularity. Firstly, computation, storage, and communication capabilities of the sensor nodes are relatively weak, and therefore cannot be achieved on a complex routing algorithm. Secondly, UWSNs have data-centric architectures, which are different from those choosing the path according to nodes addresses in the traditional networks. Firefly algorithm uses the points of the search space to simulate firefly individuals in nature and transfers the process of search and optimization into the process of firefly individuals attraction and move. It simulates solving problems in the objective function metrics into the pros and cons of the individual location. It continues to change the decision-making domain size based on the number of neighbor nodes with a strong global search ability and convergence.
Firefly algorithm has two essential factors: fluorescence intensity and attractiveness. Fluorescence intensity reflects the pros and cons of the firefly location and determines its direction of movement, while the degree of attractiveness determines the distance that a firefly has moved. Fluorescence intensity and attractiveness are constantly updated in order to achieve the objective of optimization. From the mathematical point of the view, the optimization mechanism of the firefly is described as follows.
Definition 5.
Fluorescence intensity of a firefly is defined as
As firefly attractiveness is proportional to the fluorescence intensity seen by adjacent fireflies, we can now define the attractiveness of a firefly as follows.
Definition 6.
Attractiveness of a firefly is defined as
The distance between any two fireflies i and j at
In order to realize the multi-population firefly-based routing protocol, we define three kinds of fireflies: searching firefly, listening firefly, and updating firefly.
Definition 7.
Searching firefly (
The task of
Definition 8.
Listening firefly (
The searching firefly decides its moving direction according to the fluorescence intensity of the listening fireflies in its neighbor nodes. Suppose node
When the searching firefly
When two searching fireflies created by the same source node meet at the same node, then the searching firefly with smaller TTL value stops moving and transfers its mobile data stack to the listening firefly at this node. The searching firefly with bigger TTL value continues to search until it reaches a sink node or runs out its lifetime.
Definition 9.
Updating firefly (
When the searching firefly reaches a sink node, an updating firefly is created to update the fluorescence intensity of the nodes along the routing path. The initial fluorescence intensity of the updating firefly is
Algorithm 1 describes our Multi-population Firefly Algorithm for correlated data routing in detail.
and the related parameters for the firefly algorithm; (2) Node (4) Creates a updating firefly (5) (6) (7) Updates according to formula (17); (8) (9) (10) (11) (12)
(14) (15) Node (16) Node (17) mes·path·add( (18) (19) Moves (20) Calculates the displacement value according to formula (13); (21) Updates the listening firefly according to formula (15); (22) (23) Calculates SC· (24) (25) Calculates DC· (26) (27) (28) (29) (30) (31) (32) (33) (34) mes·path·add( (35) Sends the data packet (36) (37) (38) (39)
(41) (42) (43)
In order to prevent flooding, all packets at the relay nodes should have limited lifetime, which are controlled by TTL (Time-To-Live) information. At first, the routing path mes.path is set to empty after initialization and the node
When traditional firefly algorithm runs at its late stage, individual firefly may hover near the peak or even oscillate. In addition, when the search space is too larger or distributes with uneven density, some fireflies' neighbor set becomes empty set, which results in slow convergence and easily falls into local optimum. In our multi-population firefly-based routing algorithm, after defining three kinds of firefly groups, different groups of fireflies access the information not only from their own group, but also from other fireflies groups to conduct their own optimization in the evolution. In this way, three groups of fireflies coevolve in order to improve the convergence speed and solution precision of the algorithm.
Collision occurs when two or more nodes send data at the same time over the same transmission channel. Medium Access Control (MAC) protocols have been developed to assist each node to decide when and how to access the channel, which allows the sensor nodes to transmit data packets on the basis of a predefined schedule that will not cause the packet collision. If underlying MAC protocols are not available or out of service, MFA can adopt a round-robin scheduling method in order to avoid collision. The whole process is divided into two phases: round determination phase and timeslot allocation phase. During the routing process, each node calculates its round number based on the hops in current routing path and each round is scheduled sequentially. As a result, a downstream node usually gets bigger round number than an upstream node does. After that, each node will assign timeslots in pairs with its neighbors for packet transmission. The length of each round is determined by the number of timeslots that are necessary to avoid conflicts. Due to nonuniform deployment, some nodes may experience high traffic loads and cause more collisions than other nodes. Therefore, the number of timeslots varies from one round to another and is proportional to the fluorescence intensity of the listening fireflies in the neighbors. In this way, the initial setting of timeslot values may not be suitable for every node in the network. It achieves better collision avoidance as MFA approaches optimization in the evolution.
MFA requires location awareness of neighbors, but no topology information needs to be exchanged among neighboring nodes. It is a localized and distributed routing algorithm.
4.3. Theoretical Analysis
Suppose all n sensor nodes are evenly deployed in a monitoring region with size
The complexity of different routing protocols.
In the best case, MFA achieves the best routing performance among three routing protocols. This happens when searching flies find a shortest path from the source node to the sink. In the worst case, DUCS needs more routing hops than others because cluster head nodes may not always reachable and have to be selected again from normal nodes. MFA consumes the most memory space because each searching fly needs to store the collected sensor nodes' information into its mobile data stack along the routing path. But
5. Performance Evaluation
5.1. Simulation Settings
We use Aqua-Sim [34] as simulation framework to evaluate our approach. The data packets are also generated by the simulator. Aqua-Sim is an
Simulation parameters and their default values are listed in Table 2. We assume that the sink nodes are stationary and the sensor nodes follow the random-walk mobility pattern. Each sensor node randomly selects a direction and moves to the new position with a random speed between the minimal speed and maximal speed, which are 1 m/s and 5 m/s, respectively.
Simulation parameters and their default values.
We use the following metrics to evaluate the performance of routing protocols:
Packet delivery ratio is defined as the ratio of the number of distinct packets received successfully at the sinks to the total number of packets generated at the source node; although a packet may reach the sinks several times, these redundant packets are considered as only one distinct packet. Energy consumption takes into account the total energy consumed in packet delivery, including transmitting, receiving, and idling energy consumption of all nodes in the network. Network throughput equals the total data bits received at the sinks divided by the simulation time.
We compared the performance of Multi-population Firefly Algorithm (MFA) with that of Vector-Based Forwarding (VBF) protocol and Distributed Underwater Clustering Scheme (DUCS). As MFA and DUCS exploit data aggregation to eliminate redundancy in order to enhance their routing performance, we conducted a couple of simulations to reveal their quantitative relationships and the correlation coefficients are set from 0.0 to 1.0 with a fixed interval of 0.1. In order to evaluate other metrics, the correlation coefficients are set to a medium value that equals to 0.5 in MFA and DUCS.
5.2. Simulation Results
In the first set of simulations, we compared the packet delivery ratio with the number of nodes in different routing protocols. The TTL value for each protocol is set to 6. As shown in Figure 2, the packet delivery ratio of three routing protocols is proportional to the number of nodes. MFA performs better than other routing protocols in the same circumstances. When the number of nodes does not exceed 400, the packet delivery ratio of DUCS is higher than that of VBF, but the result reverses as the number of nodes is more than 400 because DUCS needs more operations for the maintenance of clusters. Specifically, MFA improves 17.3% of the packet delivery ratio than that of DUCS and 19.6% of the packet delivery ratio than that of VBF on average.

Packet delivery ratio versus number of nodes.
Figure 3 illustrates the comparison of the packet delivery ratio with the TTL value in different routing protocols. The number of nodes is set to 400 for each protocol. The packet delivery ratio of three routing protocols is proportional to the TTL value. MFA achieves higher packet delivery ratio than that of DUCS and VBF when their TTL values are the same. When the TTL value does not exceed 5, the packet delivery ratio of VBF is higher than that of DUCS, but the result reverses as the TTL value reaches 6 and above because with the increase of the TTL value, VBF takes more cost in order to find the path close to the routing vector. Overall, MFA improves 11.8% of the packet delivery ratio than that of DUCS and 13.6% of the packet delivery ratio than that of VBF on average.

Packet delivery ratio versus TTL value.
Figure 4 shows the comparison of the packet delivery ratio with the correlation coefficient in different routing protocols. The TTL value is set to 6 and the number of nodes is set to 400 for each protocol. MFA performs better than other routing protocols in the same circumstances. The packet delivery ratio of MFA and DUCS is proportional to the correlation coefficient, while the packet delivery ratio of VBF is fixed to 57% as VBF does not exploit data aggregation during the routing process. When the correlation coefficient does not exceed 0.3, the packet delivery ratio of DUCS is lower than that of VBF. When the correlation coefficient is not less than 0.4, the packet delivery ratio of DUCS is higher than that of VBF, which means the using of data aggregation technique is effective for improving the performance of DUCS. On average, MFA improves 14.1% of the packet delivery ratio than that of DUCS and 14.8% of the packet delivery ratio than that of VBF.

Packet delivery ratio versus correlation coefficient.
In the second set of simulations, we compared the energy consumption with the number of nodes in different routing protocols. As shown in Figure 5, the energy consumption of three routing protocols is proportional to the number of nodes. MFA performs better than other routing protocols in the same circumstances. Moreover, the curve of MFA has more gentle slope compared with that of DUCS and VBF. Specifically, when the number of nodes increases from 100 to 600, the energy consumption growth rate of MFA is 37.5%, while the energy consumption growth rates of DUCS and VBF obtain 52.5% and 58.2%, respectively. Overall, MFA decreases 25.7% of the energy consumption than that of DUCS and 38.8% of the energy consumption than that of VBF on average.

Energy consumption versus number of nodes.
Figure 6 illustrates the comparison of the energy consumption with the TTL value in different routing protocols. The number of nodes is set to 400 for each protocol. The energy consumption of three routing protocols is proportional to the TTL value. MFA consumes less energy than that of DUCS and VBF when their TTL values are the same. Moreover, the curve slope of MFA is gentler than that of DUCS and VBF. For example, when the TTL value is 3, MFA consumes 84.6% of the energy more than that of DUCS and 77.9% of the energy more than that of VBF; when the TTL value reaches 10, MFA consumes 67.2% of the energy more than that of DUCS and 53.1% of the energy more than that of VBF. On average, MFA decreases 28.1% of the energy consumption less than that of DUCS and 34.4% of the energy consumption less than that of VBF.

Energy consumption versus TTL value.
Figure 7 shows the comparison of the energy consumption with the correlation coefficient in different routing protocols. The TTL value is set to 6 and the number of nodes is set to 400 for each protocol. MFA performs better than DUCS and VBF in the same circumstances. The energy consumption of MFA and DUCS is inversely proportional to the correlation coefficient, while the energy consumption of VBF is fixed to 1.49 × 104 mJ as VBF does not exploit data aggregation during the routing process. With the aid of data aggregation, DUCS eliminates redundant information before they are sent to the sink nodes, which makes it save 18.9% of the energy compared with that of VBF. With the increase of correlation coefficient, the curve of MFA indicates sharper decline than that of DUCS, which means MFA is more effective than DUCS in cutting down the energy consumption. Overall, MFA decreases 25.4% of the energy consumption less than that of DUCS and 39.5% of the energy consumption less than that of VBF on average.

Energy consumption versus correlation coefficient.
In the third set of simulations, we compared the network throughput with the average data rate in different routing protocols. The TTL value is set to 6 and the number of nodes is set to 400 for each protocol. As shown in Figure 8, the network throughput of three routing protocols is proportional to the average data rate. The front parts of the curves indicate rapid increases in network throughput while the rear parts of the curves show very slow growth rates after average data rate is above some value. The reason is that each node is responsible for sending its own traffic towards the sink nodes as well as forwarding all traffic from its upstream nodes towards the sink nodes. But both upstream nodes and downstream nodes have the same packet generating rates, and downstream nodes cannot receive packets from several of its upstream nodes simultaneously. MFA performs better than other routing protocols in the same circumstances. When the average data rate does not exceed 800 bits/s, the network throughput of VBF is higher than that of DUCS, but the result reverses as the average data rate is above 1 k bits/s, which means that DUCS can obtain more benefit than VBF when the average data rate is relatively high. On average, MFA improves 13.5% of the network throughput more than that of DUCS and 15.2% of the network throughput more than that of VBF.

Network throughput versus average data rate.
Figure 9 illustrates the comparison of the network throughput with the number of nodes in different routing protocols. The TTL value is set to 6 for each protocol. The network throughput of three routing protocols is proportional to the number of nodes. MFA achieves higher network throughput than that of DUCS and VBF when the number of nodes are the same. When the number of nodes is below 400, the network throughput of DUCS is higher than that of VBF, but the result reverses as the number of nodes reaches 500 and above because in the high density network, VBF contains more candidate sensor nodes that are close to the routing vector for the packet delivery. Overall, MFA improves 21.6% of the network throughput more than that of DUCS and 25.6% of the network throughput more than that of VBF on average.

Network throughput versus number of nodes.
Figure 10 depicts the comparison of the network throughput with the TTL value in different routing protocols. The number of nodes is set to 400 for each protocol. The network throughput of three routing protocols is proportional to the TTL value. MFA achieves higher network throughput than that of DUCS and VBF when their TTL values are the same. When the TTL value does not exceed 5, the packet delivery ratio of VBF is higher than that of DUCS, but the result reverses as the TTL value reaches 6 and above, which means the network throughput of VBF is restrained as the TTL value becomes relatively high. Specifically, MFA improves 16.7% of the network throughput than that of DUCS and 16.3% of the network throughput than that of VBF on average.

Network throughput versus TTL value.
5.3. Discussion
Compared to algorithms such as VBF and DUCS, the firefly inspired algorithm MFA represents a radically different approach. In VBF, only the sensor nodes located in a predefined routing pipe are eligible for packet forwarding, and those which are not close to the routing pipe do not forward the packets no matter whether they are suitable for building a shorter routing path or not. Therefore, the packet delivery ratio in VBF mainly depends on the node density and it cannot benefit from the deployment of multiple sink nodes if they are not close to each other. DUCS organizes the sensor nodes into clusters and one sensor node is selected as a single cluster head for each cluster. Each cluster head is responsible for processing data aggregation received from cluster member nodes and relaying packets to other cluster heads until a sink node is reached, which restricts its flexibility and availability when adjacent cluster heads cannot communicate directly for uncertain reasons. In MFA, three kinds of fireflies cooperate to find an optimized routing path. The searching firefly is in charge of finding a reachable path from the source node to the sink node with a predefined TTL value. The listening firefly is used to guide the movement of the searching firefly according to its fluorescence intensity. If a data packet cannot arrive at a sink node within TTL hops, the lost fluorescence would not be replenished. Otherwise, the sink node generates an updating firefly and transfers some fluorescence to the listening firefly at each node along the routing path. As a result, the successful routing path is strengthened while the unsuccessful routing path becomes more unattractive, which brings a higher packet delivery ratio in MFA compared with VBF and DUCS regardless of node density. The inherent adaptive nature of such algorithm is one of the main attractions of biologically inspired approaches.
MFA also consumes less energy compared with VBF and DUCS. The reason is that MFA merges the data packets according to their correlation coefficient before they are sent to the sink node, which in turn eliminates redundant information and saves nodes' residual energy. VBF does not exploit data aggregation during the process of routing. DUCS adopts aggregation techniques for extracting nonredundant data in clusterheads, but in order to avoid fast draining the batteries of specific sensor nodes, frequent division of clusters is needed, which can be a burden on the network as the setup phase is repeated many times. Therefore, MFA is more effective than DUCS in cutting down the energy consumption.
MFA achieves higher network throughput than that of DUCS and VBF. The reason lies in two aspects. First, the higher packet delivery ratio in MFA ensures more effective data packets arrive at the sink nodes, while unsuccessful data packet delivery does not contribute to the network throughput. Second, with the convergence of the algorithm, many overlapping edges in different routing paths emerge in MFA. Thus, some searching fireflies may have higher probability of choosing shorter paths to the sink nodes.
6. Conclusion
In order to improve the routing efficiency of UWSNs, this paper proposed a Multi-population Firefly Algorithm (MFA) for correlated data routing. We have designed three kinds of fireflies and their coordination rules in order to improve the adaptability of building, selecting, and optimization of routing path considering the data correlation and their sampling rate in various sensor nodes. Different groups of fireflies access to information not only from their own groups, but also from other firefly groups to conduct their optimization in the evolution. Moreover, in consideration of spatial and temporal correlations, MFA merges the correlated data packets during the process of routing, which in turn eliminates redundant information before they are sent to the sink nodes for saving energy and bandwidth. We have demonstrated through simulations that MFA achieves better performance than existing protocols in metrics of packet delivery ratio, energy consumption, and network throughput.
Footnotes
Acknowledgments
This work was sponsored by the National Natural Science Foundation of China (61202370), the Shanghai Pujiang Program from Science and Technology Commission of Shanghai Municipality (11PJ1404300), the Open Program of Shanghai Key Laboratory of Intelligent Information Processing (IIPL-2011-008), and the Science and Technology Program of Shanghai Maritime University (20110049).
