Introduction

Wireless underwater mobile sensor networking (Patil et al. 2019) is that the enhancing technology for these applications that accommodates a variable variety of sensors and vehicles that area unit deployed to achieve cooperative observation (Pompili et al. 2006). To attain this aim for sensors that are deployed randomly with the ocean-atmosphere to utilize the submerged systems administration might be a fairly obscure space however submerged interchanges are tested with high constriction anyway zone unit disappeared with dispersing (Hirai et al. 2012). Besides, the transmission of optical flags needs high exactness in educates the slim optical gadget shafts. Accordingly, interfaces in submerged systems zone unit upheld acoustic remote interchanges (Ali 2014). The typical technique for sea section perception is to forward the submerge sensors that store data all through the perception mission (Ayaz et al. 2012). Non-wired method of information transmission via the Ocean is one amongst the sanctioning technological aspects in the futuristic levels of Ocean- observatories and Detector Networks (Harold Robinson et al. 2019a). Various uses of Underwater Wireless Sensor Networks vary from Refining Industries to cultivation, and embody instrument observance, Pollutant & Pollution Control Management, Weather Data Processing, and prediction of natural calamities Earthquakes & Tsunamis, Deploy and Hunt missions, and examining the deep-aquatic environments etc. (Ruoyu et al. 2013).

Underwater Mobile sensor networks with acoustic transmissions are having unique challenges like the utilization of huge transmission power, huge propagation delay and mobility of the nodes (Chen et al. 2010). The delay-aware opportunistic communication scheduling algorithm is commonly constructed for underwater mobile sensor networks (Yoon et al. 2012). It utilized the local data to improve concurrent communication with minimized collisions (Chen and Lin 2013). The improved procedure that allows the outstanding packets in the sender side that facilitating multiple communication sessions has been used for increases the entire throughput (Carlson et al. 2007). Every node knows the adjacent node’s propagation delay data and their transmission schedule to improve the packet transmissions along with the proposed methodology (Harold Robinson et al. 2019b). This method mainly focuses on achieving enhanced channel utilization by reusing the temporal and spatial data (Salva-Garau and Stojanovic 2003). The performance evaluation shows that the proposed algorithm generates the fairness in medium access whenever the node mobility is alive (Harold Robinson et al. 2019c). Hence, the proposed method also accumulates the transmission energy by reducing the collisions with increased throughput (Mainwaring et al. 2002).

The proposed algorithm has organized to implement for IoUTs (Rani et al. 2017) to provide energy-efficient routing (Ayaz et al. 2011). In this methodology, AUV gathers the data from the clusters in the networks for creating the cluster head formation (Harold Robinson and Golden Julie 2019). For data collection, the cluster is formed for real-time data communication to analyze the status of the residual energy (Huang et al. 2014); AUV selects the cluster head from the group of nodes (Akyildiz et al. 2005). The shortest routing path is used for collecting data through the AUV with the utilization of energy (Kredo II and Mohapatra 2007). Hence, the reduction of energy consumption has been achieved through the proposed algorithm for producing the optimized path with energy efficiency through AUV transmission (Wang et al. 2016). The sensor nodes are placed in the underwater environment through the mobility-based beacon architecture for identifying the localization and the position of the nodes in the network (Guo et al. 2019). Whenever the coverage related problems occurred in the network, the weak k-barrier coverage framework is utilized (Shen et al. 2019). The protocol stack is used to provide the energy efficient data transmission in the network (Goyal et al. 2019). The cluster head related routing illustrates the reduced amount of average communication cost in the network (Bhattacharjya et al. 2019).

The Major challenges prevailing in the transmission media and routing are done with the radio and optical signals under the terrestrial wireless sensor networks. The transmission parameters use the high frequency radio signals to initiate the transmission (Alsalih et al. 2008). While communicating through the low frequencies and for long transmission, the power utilised and energy usage is higher (Vimal et al. 2020a). This is the preliminary challenge that has a high impact of looking for routing algorithms and protocols, and also the protocols which are applied to IoT cannot be applied directly to the IoUT (Pasupathi et al. 2020). So in order to analyse the findings the proposed method is paved with the hybrid model and clustering algorithm to analyse the IoUT transmission and routing process (Vimal et al. 2016). The Hybrid model is proposed in a way to support the table-driven and On-Demand Routing with multicast tree formation using the IoUT (Vimal et al. 2020b). The challenges that mostly prefer in the IoUT is the Delay that has about 1500 ms. The reliability is another challenge and it should be low and unstable. In terms of energy, it is hard to replace or recharge (Annamalai et al. 2019). The bandwidth is assumed to be between 10 and 100 kbps (Qiu et al. 2020). The proposed hybrid model will analyse all these facts in terms of bandwidth utilisation, cluster formation, Multilevel routing to monitor the performance evaluation with minimal energy utilization.

The main contribution of the paper is

  • The proposed hybrid algorithm is utilized to minimize the energy utilization for the sensor nodes which are battery oriented.

  • The fixed time period is maintained to perform the cluster based transmission technique to forward the data to the cluster head within the specified time slot.

  • The performance evaluation is conducted to produce the result of minimized energy utilization for the cluster head and the other sensor nodes.

    The paper is organised as follows, Section 1 highlights the Introduction section, Section 2 presents the Related works, Section 3 explains the proposed methodology with the experimental study and implementation, Section 4 proposes the performance valuation and finally, Section 5 concludes the paper with future works.

Related works

In Cascading Multi-hop Reservation and Transmission (CMRT) (Lee and Cho 2014), most of the adjacent nodes start their handshaking process between the source and destination. Due to this relaying, cascade and makes the data to be delivered down to the destination. Apart from the above, CMRT also improves the channel utilization in a very efficient manner through the process of adopting a packet generation in which multiple data packets are aggregated jointly by handshaking. It subsequently minimizes the time required for exchanging the control packet and thus it enhances the throughput. In CMRT, intermediate node processes its moves within several dissimilar states such as WaitResp, Idle, DelayData, WaitData, DataRx and DataSilence. WaitRespis mainly enhances the state of making the node to wait for the proper response from the receiver to the control packet. DelayData mainly helps the hidden nodes in avoiding the possible collisions by making the sender delay the data transmission. WaitData is the state in which it makes the receiver to wait for time to get the reliable data from the sender. In DataRx state the receiver receives the data packets from the sender.

In order to avoid collisions between the neighbour nodes, silence node helps in making the channel reservation to remain silent when there is a cause for neighbour node to overheard the swapping the control packets (Pinjari et al. 2018). The remaining state which was not included in the above comes under the idle state. The Segmented Data Reliable Transport (SDRT) (Xie et al. 2010) has been developed to attain the dependable data relocate in underwater sensor circumstances. It mainly adopts high efficient random forward error correction codes, erasure codes, in order to move the determined packets hop by hop or block by block (Dey et al. 2018). It gradually reduces the total amount of communicated packets thereby improving the energy and also shortening the services. Basically, it is a hybrid approach of both Forward Error Correcting (FEC) (Xie and Cui 2007) and Automatic Repeat Request (ARQ) (Tomasi et al. 2015). The packets are mainly communicated to the destination from the source that apart from the data packets, an intermediate node will be encoding each data block using the process of random forward error correction codes and also it pumps the encoded data packets into the channels (Chen et al. 2001). As soon as the receiver gets the encoded packet, immediately decoding process will be done to extract the original data blocks (Rosalie et al. 2018). The Multi-hop related energy proficient MAC protocol (Zenia et al. 2016) is mainly preferred for overcoming the packet collisions happened and also the proposed protocol efficiently produces the multi-hop networking by splitting the 1-hop disputation resolution methodology (Roy and Sarma 2018). In this approach, the first phase illustrates the elimination of local nodes from the contention by the way in the final phase the undesirable possessions of hidden nodes are diminished (Yu and Fei 2016). Hence, this methodology of providing 2-hop contention resolution technique mainly improves the quality of service.

The data communication entails that packet is efficiently received by the determined receiver (Chen et al. 2018). After that, data communication has been visualized by the three parts of the logical time frame. In limited link reservation, the period slots play a major role in determining the contention round. For efficient usage of the process, short-duration tones are highly preferred for resolving the contention that happened among the nodes (Li et al. 2019). In order to consume the energy loss, two types of receivers such as data receiver and low power wake up tone receiver are used (Dey et al. 2020). The extra features will enhance the process by ensuring the nodes in the hidden links by rescheduling the receiving data packets towards the destination (Harold Robinson et al. 2019d). Geographic routing protocols are very familiar with limited required signalling and scalability (Jiang et al. 2016). A global positioning system is highly used for global systems for correctly plotting the position of several sensor nodes in which some among them are not working properly in an underwater environment (Jain et al. 2019). Apart from these routing protocols, certain sensors, UAVs (Liu et al. 2019), UUVs (Xu et al. 2019), etc., are used to recognize the exact position irrespective of other approaches. In vector-based forwarding routing (Chengzhi et al. 2020), a little portion of the nodes in routing is involved such that it does not need any state data on the sensors (Harold Robinson et al. 2019e). In a distributed geographical routing, the nodes work in either greedy mode or recovery mode for efficient delay insensitive applications (Cai et al. 2013a). The recovery mode is activated in the case of a node failure to forward a message to the next feasible neighbour node (Cai et al. 2013b). The threshold-based Energy efficient modeling has been framed to provide enhanced energy consumption (Feng et al. 2019). The security has been increased and providing the quality of service with the data aggregation technique (Goyal et al. 2020). The transmission has been established using the overlay network model in the network (Pavitra and Janani 2019). The grid related routing technique has been implemented to ensure the reduced amount of hop count for providing the active transmission (Al-Salti et al. 2019). The target tracking technique has been established with noise-based multiplicative function (Luo et al. 2019) and the Energy efficiency is improved using the computational technique (Luo and Han 2019). Gonzalez-Crespo R et.al., proposed that the Ant colony optimization and K-Means Clustering algorithms has been used to search the shortest route analysis from source to destination. This ACO algorithm is applied to measure the Quality of Source (QoS) constraints in IoUT environment (Kumar et al. 2020). The IoT network atmosphere increases the response time with the time aware scheduling model for IoUT (Núñez-Valdez et al. 2020). Table 1 outlines the most important UW sensor types deployment in terms of localization approach and their limitations.

Table 1 Comparison of UW, UAV and Moving sensors with Performance measures

The common drawbacks for the energy efficient cluster based routing mechanism are the increased energy consumption, maximum end-to-end delay and several issues for cluster head selection procedure. Sometimes, the connection within the Internet and the devices through the autonomous underwater vehicles are weak. So, the deployment of the sensor nodes is an important factor for constructing the Internet of Underwater Things in real-time (Vedachalam et al. 2019). The minimized end-to-end delay while transmitting the AUV travelled distance with the highest amount of cluster head is the challenging task for routing in the Internet of Underwater Things (Shinde and Olesen 2018; Schaller and Mueller 2009).

Proposed methodology

The proposed architecture for constructing the Internet of Underwater Things is encompassed of a sink based surface floating on the sea that broadcasts the monitoring station through the link which contains the AUV of underwater wireless communication channel. Figure 1 demonstrates the Architecture of proposed hybrid optimization routine maintenance. The proposed Hybrid is done for making the transmission without end to end delay, good transmission coverage and with low bandwidth without no network issues. The proposed Hybrid Optimization routing maintenance has been constructed with two phases. Phase I contains A-ANTD (AUV-Assisted Network Transmit Devising) and Phase II contains TARD (Transmit Assisted Route Devising). Phase I computes the AUV timestamp for selecting the cluster head, Phase II calculates the Reply time to produce the signal to ratio. The 2 Phases have constructed the Hybrid optimization routing maintenance. Table 2 illustrates the symbols used in this proposed methodology for producing the computation and the abbreviation denotes the methodologies are used in the related methods. It is also used to define the variables to be used in the computation.

Fig. 1
figure 1

Architecture of proposed hybrid optimzation routing maintenance

Table 2 symbols & Acronyms used in this proposed methodology

Network formation

The AUV provides the path to communicate the deep-sea sensors through the sink surface with the ability of energy and data processing. The sensor nodes are deployed in the random model to the surface station with the location data for every sensor nodes. The location data using region-based is segregated into different kind of sectors for utilizing the proposed methodology (Paul and Rho 2016).

Figure 2 demonstrates the architecture for Internet of Underwater Things that the Base station is responsible for providing the routing functionality. The base station is connected with the surface station which is interconnected with the cluster head and the sensor nodes. The cluster is formed and the cluster head is selected based on the communication range of the specific sensor nodes.

Fig. 2
figure 2

Architecture of Internet of Underwater Things

Phase I: A-ANTD (AUV-assisted network transmit devising)

A-ANTD goes for structure vitality effective information dispatch course among AUV and sensor nodules. In An ANTD, AUV is accountable for communicating HPs and gathers information from sensor nodules while transitory an area (Vimal et al. 2018). At the point when sensor nodules get HP, it ensures whether the HP ought to be sent or not. On the off chance that the HP might be sent, the sensor nodules refresh the transmittable table into the delivering cushion. At the point when the delivering period is prepared, the sensor nodules could invigorate and advance these HP. In the meantime, several sensor nodules that get HP from AUV, forward ARP to AUV to request GN capability, and they may gather information after AUV disappears in the event that they are picked as GN. In light of the transmittable table, a dynamic multi-jump information dispatch course can be worked among AUV and sensor nodules (Rho 2015). A Hello Packet is broadcasted to initiate and frame a Network Structure or Scheme. This event triggers when the length of the AUV touches X meters. The obtained HP’s are dispatched by the sensor nodules to construct data dispatch routes to the AUV. The HP withholds totally four fields namely: AUV Time Stamp, Nodule ID, The Layer ID and Hello Packet Sign. HP’s broadcasted time variables are contained in the AUV’s Timestamp. The sensor which has dispatched the HP has its own physical address which id the Nodule ID (Vimal et al. 2017). To perform extrication of packet type is established using the Hello Packet Sign. Here, in this data dispatch route, the Layer ID is a labeling of the obtained nodule. Initially, when the AUV broadcasts the HP, the value of the Layer ID is one, whose value gets incremented by one each time by the sensor nodule when it determines to push forward the HP until it reached the threshold n. n value should not be too large in order to prevent the pre-mature energy deprivation of first-hop nodules which may contain way too many no. of child nodules. A settable threshold n and the communication range of the nodule are utilized to set the value of X (Paul et al. 2015).

This system consists of multiple AUV’s which roam around in non-static paths to gather data & information and send it to the Ground control or the Base Station. This event triggers when the length of the AUV touches X meters. The route is constructed in such a way that it can collect data at a very high rate. Initially when the AUV broadcasts the HP, the value of the Layer ID is one, whose value gets incremented by one each time by the sensor nodule when it determines to push forward the HP until it reached the threshold n. n value should not be too large in order to prevent the pre-mature energy deprivation of first-hop nodules which may contain way too many no. of child nodules. They receive hello packets and are capable of forwarding them to other nodules (Ayyanar et al. 2019). It also senses the nearest AUV and GN’s.

Routing scheme is established during packet switch which can hold network constructs & schemas to keep the route devising intact and make sure the nodes are connected. Based on the received data, ON decides whether to choose GN or the AUV. GN at times can enact as an ON when AUV dispatches a Hello Packet & it directly broadcasts data that is stored to the AUV. A DRP is dispatched by the nodule to search & spot out the AUV’s even before the information gets initialized and sent. AUVs and GNs that get the DRP, forward DRPRs to the dispatch nodule. At the point when the dispatch nodule gets the DRPRs, it picks the principal feed-backing AUV as next jump or picks the primary feed-backing GN as adjacent bounce when there is no input from AUV. AUV picks some specialist nodules among the initial-bounce nodules as GNs. They in-turn gather information once the AUV changes position. Sensor nodules, those of which attain a Hello Packet along with a Layer ID of one, dispatches an ATP to AUV to request GN capability. It comprises of 5 fields: ATP Signature, Nodular ID, Nodule Placement & Distance, No. of Neighbors, and Unconsumed Energy. Every sensor nodule keeps in count the total number of neighbors it has. ATP signature is utilized in such a way that it separates and the packet standard within the system. The physical location of the nodules is called as the Nodule ID. The distance of separation between the primary jump nodule and the AUV is called as the Nodule Distance. Number of Neighbors is the quantity count of all sensor nodules’ neighbors both in transmittable table and in Neighbor Nodules Catalogues. The remaining levels of energy of the Sensor nodule are called as the Lingering or Residual Energy. AUV’s picked the GNs relying upon the ATP & ascertains for every first-bounce nodule, a weight GN. Table 3 demonstrates the transmit Information Sustained by the Sensor Nodule.

Table 3 Transmit Information Sustained by the Sensor Nodule

The centroid point is generated for the cluster in each sector that the cluster nodes are connected with the sensor nodes in the transmission range through the AUV. The centroid point is computed in Eq. (1).

$$ {Centroid}^{cl}\left(\alpha, \beta, \gamma \right)=\left\{\begin{array}{c}\alpha =\frac{\sum \limits_{n=1}^NP{o}_n^{cl}\left(\alpha \right)}{N}\\ {}\beta =\frac{\sum \limits_{n=1}^NP{o}_n^{cl}\left(\beta \right)}{N}\\ {}\gamma =\frac{\sum \limits_{n=1}^NP{o}_n^{cl}\left(\gamma \right)}{N}\end{array}\right. $$
(1)

The entire region is traversed by sector; the AUV is capable of delivering the status report to the cluster head in IoUTs. For providing the active transmission in underwater, the establishment of channel is essential task for underwater environment. The frequency is computed using Eq. (2)

$$ Si{g}_{At}\left( dist,f{r}_k\right)= dis{t}^ea{\left(f{r}_k\right)}^{dist} $$
(2)

The noise variation is computed using frequency and it is computed in Eq. (3)

$$ 10\log \chi \left(f{r}_k\right)={\chi}_1-\rho \log \left(f{r}_{\begin{array}{c}k\\ {}\ \end{array}}\right)+10\log \Delta f{r}_k $$
(3)

The timer for delay is computed using Eq. (4)

$$ de{l}_t=\left({\Delta }_{del}-{\delta}_{del}\right)\ x\ \left(\frac{DP}{\Delta _{del}}\right) $$
(4)
figure a

Phase II: TARD (transmit assisted route devising)

At the point when the relocation extent of AUV achieves V meters, AUV communicates HPs and shifts gradually amid a Random period. Amid this period, AUV communicates HPs at in excess of three unique locations, and after that AUV may find the main bounce nodules effectively. Along these lines, the geology area of first-bounce nodules could be assessed. AUV picks a gathering of GNs from the initial bounce nodules amid and saves the area of the GNs. The AUV strategy is an active way relying upon some several key focuses and transmit data that may ensure that AUV gathers information within an information serious way. What’s more, AUV can change the estimation of V to maintain a strategic distance from transmitting hot division issue in each circle. It fundamentally demonstrates the impact of transmitting data on AUV’s way of arranging. In every cycle, AUV must cross several key focuses to guarantee that the way can cover mission territory. The key focuses control the AUV’s way all in all. The game plan of key focuses has an imperative effect on system inclusion. The course of the AUV will be one-sided by the area subtleties of the GN’s from the past information accumulation arrangement that was recorded by the AUV. Then again, when there is totally nil information gathering amid the past accumulation cycles, first-jump nodules and key qualities that were at first set by the base station or the ground control is utilized to delineate the course of the AUV.

On dispatch HPs, sensor nodules manufacture an information dispatch course to AUV contingent upon the arrival of the Hello Packets and transcripts some upcoming-bounce nodules in a transmit table. At the point, while the sensor nodule gets an HP, it will ensure the data of HP and decide if the forwarding nodule ought to be included into transmit table that gives the transmit table that keeps up the data of the following jump. After the sensor nodule records the sending nodule, it progresses the HP. The sensor nodule invigorates its transmitting table and conveys the HP to its neighbors if the forwarding nodule can be recorded. The HP’s dispatch system will maintain until the restored Layer ID generates the edge n. something different, the sensor nodule basically incorporate the forwarding nodule into a Neighbor Nodule List lacking dispatch the HP.

A sensor nodule stores different next-jump nodules in transmit table. At the point when the recorded nodule is accessible, the sensor nodule, which isn’t the AUV’s main transmit or bounce-off, it juts sends its information throughput for the freshest updated upcoming-jump in the transmit table straightforwardly. Just the primary bounce nodules are required to send a DRP before the information is sent. The dispatch component may possibly initiate a decrease in the vitality utilization that stays away from the Demand/Feedback system. The configuration of Data Packets is basic. It comprises of totally five various data values for control aspects: Data Packet Signature, ID of the afterward-Hop, Origin Nodule ID, Packet Sequence No. and the Geo Co-ordinates, as appeared in Fig. 3. ID of the afterward-hop contains the next bounce’s physical co-ordinates.

Fig. 3
figure 3

Average communication cost

Packet Esq-No is an interesting succession no. doled out by the origin nodule to the bundle. Alongside the Origin Nodule ID and Packet Sequence No. both values are utilized to separate parcels in recipient. The co-ordinates are the topography directions of the forwarding nodule. In the event that there is just a single passage in transmit table, the dispatch nodule sends information parcel to this recorded nodule legitimately. In the event that there are more than one passage in its transmit table and it’s anything but a GN, the dispatch nodule will pick next jump with the most up to date AUV Time Stamp. In the event that there is no section in its transmit table and this circumstance has to keep going for many information gathering cycles and has to spot a outlined neighbor and then send the information to it.

For providing the acoustic communication through the AUV, the channel attenuation has been maintained within the distance to identify the noises with different kind of regions and it is computed using Eq. (5)

$$ No\left(f{r}_k\right)=N{o}_{tu}\left(f{r}_k\right)+N{o}_{sh}\left(f{r}_k\right)+N{o}_{wa}\left(f{r}_k\right)+N{o}_{te}\left(f{r}_k\right) $$
(5)

The signal-to ratio with the distance and the frequency signal is computed in Eq. (6)

$$ SNR\ \left( dist,f{r}_k\right)=\frac{TP\left({f}_k\right)}{Si{g}_{At}\left( dist,f{r}_k\right)\ No\left(f{r}_k\right)} $$
(6)

During the transmission, the data packet is received to the destination without error; the SNR has the threshold value for communication. The probability of bit error is computed using Eq. (7).

$$ Pro{b}_{bit}(dist)=\frac{1}{2}\left(1-\sqrt{\frac{SN{R}_{average}\left( dist,f{r}_k\right)}{1+ SN{R}_{\mathrm{a} verage}\left( dist,f{r}_k\right)}}\right) $$
(7)

The probability of delivering the data packet within the distance is calculated in Eq. (8)

$$ Prob={\left(1- Pro{b}_{bit}(dist)\right)}^n $$
(8)

In the main information gathering cycle, GN is absent and the impact of the GN’s is not considered by the AUV. A component vector is setup by the AUV towards every first-jump nodules and of the following key point. In-case of different information gathering cycle, there are gatherings of those GN’s, the one’s whose topography data’s were recorded by AUV’s whilst the previous information gathering cycles were under process. AUV computes a loaded position for every gathering cycle of GNs, and revises past key focuses with a unit loaded focus. The No. is the neighbour’s amount of every GN and n-aggregate is the whole of No. is the aggregate sum of all the GNs. Also, subsequent to the irregular time, a unit vector is assigned by the AUV towards every first-jump nodule and the upcoming key points, and afterwards ascertains the push frontwards course pursue. The AUV also gathers information along another way which demonstrates the impact of GNs.

figure b

Performance evaluation

The performance analysis has been simulated using the MATLAB software. The high configuration system is used to implement the process with the proposed system has been constructed with the energy utilization system for communication and also the reception. The acoustic signals in the IoUTs have some restrictions like the restricted bandwidth and the high amount of energy consumption. The proposed method has been constructed to eliminate the limitations of the existing techniques. The performance metrics for proving the efficiency of the proposed technique are Average communication cost, Energy consumption, AUV travelled distance, number of cluster heads and End-to-end delay. Table 4 demonstrates the simulation parameters which are used to implement the proposed methodology for comparison.

Table 4 Simulation parameters

The proposed Hybrid optimization routing management has been compared with the relevant works of LSHL (Han et al. 2014), DLCA (Tsai et al. 2017), and CMDG (Ghoreyshi et al. 2018). The LSHL algorithm is used to work with three sensor nodes such as surface buoys, anchor nodes, and ordinary nodes. The algorithm proposes a localization approach to identify the transmission process in unknown node and anchor node.The Euclidean distance is measured between the nodes and high concentration has been given on the unknown node to estimate the node-node delivery and the energy utilisation. The Diffusion Logarithm Correntropy algorithm (DLCA) is considered by assuming each node in the network. The algorithm works on with relatively error free network by taking the steeper steps in the non stationary environments using the AUV travelling distance. Cluster Based Mobile Data Gathering Scheme(CMDG) has been used to analyse the tradeoff between the data gathering using the latency and the energy saving. CMDG is one of the AUV transmission pattern to deal the underwater sensor. CMDG is compared with the proposed approach in terms to analyse the localization approach for the energy saving, Data gathering and the packet delivery ratio. The DLCA, LSHL and CMDG are compared for analysing the AUV travelling distance and the maximum energy utilisation in IoUT environment. Localization coverage is the ratio of the localizable ordinary nodes with the ordinary nodes. The error is obtained and measured with the proposed approach and with DLCA, LSHL and CMDG to analyse the estimated postion and average position. The algorithms are compared to identify the maximum energy consumed with the network using the localizable ordinary nodes. The Table 5 proposes the pros and cons of the proposed model with other models.

Table 5 Comparison of pros and Cons of various localization models

The performance metrics are used for implementing the proposed methodology is Average communication cost, AUV travelled distance, number of cluster heads, Average End-to-end delay and the Energy utilization. The Average communication cost for the node is computed from the forward packet reception and the backward packet reception and the average value is calculated from the total amount of communication cost in the network. The average communication cost is computed in Eq. (9).

$$ com{m}_{cost}=\frac{1}{R{e}_{fp}\ x\ R{e}_{bp}} $$
(9)

Figure 3 demonstrates the node mobility effect for the performance of the localization. The proposed methodology formats the data packet corrections for identifying the locations and minimizes the average communication cost compared with the related techniques.

Figure 4 demonstrates the AUV travelled distance for gathering data in IoUTs. It is also suggested that the distance is increased whenever the total amount of nodes are in increased order. So, the proposed technique is coordinated well to the relevant techniques.

Fig. 4
figure 4

AUV travelled distance

The cluster head can be covered within the communication range, whenever the total amount of nodes are increased, the cluster heads are also increased with respect to the AUV travelled distance so that the speed of transmission is guaranteed. The experimental result shows that the proposed technique has the increased amount of cluster heads compared with the relevant methods in Fig. 5.

Fig. 5
figure 5

number of cluster heads

The average end-to-end delay is directly related with the AUV travelled distance using the cluster heads for providing optimized routing in Internet of Underwater Things. The minimum amount of end-to-end delay has ensured that the optimized routing within the sensor nodes. The End-to-End delay has measured from the total amount of sensor nodes in the network that the difference between the arrival time for the data packets and the delivered packet time. The average value for each transmission is taken as the Average end-to-end delay. It is computed in Eq. (10).

$$ End- to- End\ delay=\frac{\sum \left({T}_{arr}-{T}_{send}\right)}{\sum SN} $$
(10)

Figure 6 illustrates that the proposed technique has the lowest end-to-end delay compared with the related techniques. The end-to-end delay calculation is very simple. The calculation is based on average delay time of packet created from sensor node to successful delivery of packets to sink. These packets were delivered with low end-to end delay. Because of AUV travel through shortest path with data collection from CHs, these data packets were held with shortest time also.

Fig. 6
figure 6

Average End-to-end delay

The Energy consumption is computed as the total amount of Energy consumed for every transmission as the amount of transmitted bits and the Energy consumed for every receiving data packets. The Energy consumption for the forwarding data packets in the network is computed using Eq. (11).

$$ E{y}_{trans}\left({n}_b, dist\right)=E{y}_{for}\left({n}_b\right)+E{y}_{rec}\left({n}_b, dist\right) $$
(11)

The forwarder nodes are capable of gathering information and transmitting it through the sink to be shared within the sensor nodes. The selection of nodes procedure is completed according to the residual energy of the sensor nodes. If the total amount of residual energy is minimum than the average energy and it is computed in Eq. (12)

$$ E{y}_{avg}=\frac{\sum \limits_{i=1}^{n_b}\left(E{y}_{init}-E{y}_{rec}\right)}{n_b} $$
(12)

Figure 7 demonstrates the energy utilized per node in every techniques. It is proved that the energy utilization of the proposed technique is measureably minimum that of communications is minimized with lower values. It is also noticed that the energy consumption is very less because of the cluster heads. The highest amount of clusters will minimize the distance within the sensors and cluster heads. Hence, the proposed method is saving the energy consumption.

Fig. 7
figure 7

Energy consumption

Figure 8 demonstrates a comparison with the end-to-end delay of the proposed method and the related methods. The proposed technique has the minimum value than other techniques according to the smallest forwarding distance within the nodes in the complex conditions. The load balancing is another factor that other methods have highest amount of delay. Another reason is that the forwarding packets having the minimum hops and the complex channel conditions to increase the packet loss, hence the packets have to be retransmitted for more delay. So, the packets delivered into the sink with a minimum delay in the proposed technique maintain the communication impairments of the underwater channel. The end-to-end delay calculation is based on average delay time of packet created from sensor node to successful delivery of packets to sink. These packets were delivered with low end-to end delay. Because of AUV travel through shortest path with data collection from CHs, these data packets were held with shortest time also. In the hybrid optimization routing management, a vicinity of sensing element nodules cut the Demand/Feedback structure and uphold data directly, which may scale back consumption of energy of the network. Since the AUV has a fluctuating route and the GN’s allocation takes place in random manner, the energy utilization of the network may be equitable. This sequentially biases the forward route of the AUV. An increased performance result has been projected by the simulation outcomes for the delay and energy utilization.

Fig. 8
figure 8

End-to-end delay with network lifetime

Conclusion

In this paper, the hybrid optimization routing management for Internet of Underwater Things is proposed and successfully implemented. The energy consumption is the basic parameter for this proposed technique. The efficient routing has been established using the autonomous underwater vehicles through the connectivity of the sensor nodes to the devices with the Internet. The cluster head is elected for provided the efficient routing. The proposed technique has been implemented with 2 phases of AUV-Assisted Network Transmit Devising and Transmit Assisted Route Devising. The Gateway Nodules are utilized to gather the information related to the autonomous underwater vehicles. AUV timestamp has the ability to transmit the information by the sensor nodule using the centroid point and the transmission range. The limitations and the challenges of the proposed technique are the longest multipath delay, complex environment, lowest bandwidth; sever noise, and the restricted battery life of the underwater sensor nodes. The acoustic waves restrict the frequency range while performing the underwater transmission with the temperature in the water. The simulation results proved that the proposed technique has the improved performance. The limitations and the challenges of the proposed technique are the longest multipath delay, complex environment, lowest bandwidth, sever noise, and the restricted battery life of the underwater sensor nodes. The acoustic waves restricts the frequency range while performing the underwater transmission with the temperature in the water. Increasing the lifespan of the network and handling new spots, sector drawbacks is set to be the strategy in the future.