@ARTICLE{ iet:/content/journals/10.1049/iet-wss.2013.0118, author = {Hsin-Hung Cho}, affiliation = {Department of Computer Science and Information Engineering, National Central University, Taoyuan, Taiwan}, author = {Chi-Yuan Chen}, affiliation = {Department of Computer Science and Information Engineering, National I-Lan University, I-Lan, Taiwan}, author = {Timothy K. Shih}, affiliation = {Department of Computer Science and Information Engineering, National Central University, Taoyuan, Taiwan}, author = {Han-Chieh Chao}, affiliation = {Department of Electrical Engineering, National Dong Hwa University, Hualien, Taiwan}, affiliation = {Department of Computer Science and Information Engineering, National I-Lan University, I-Lan, Taiwan}, keywords = {UWSN scheme;underwater delay wireless sensor network routing;scheduled contact scheme;opportunistic contact scheme;underwater disruption tolerant wireless sensor network routing;DTN routing protocols;predicted contact scheme;}, ISSN = {2043-6386}, language = {English}, abstract = {Underwater wireless sensor networks (UWSNs) have recently received a significant amount of attention. Since they have delay/disruption-tolerant networks (DTNs) characteristics, the design of any UWSN scheme must take DTN influences into account, especially in routing protocols. Many researchers have proposed various DTN routing techniques for different types of DTN routing schemes in UWSNs. The authors survey state-of-the-art DTN routing protocols, and use the definition of DTN to classify these proposals into scheduled contact, opportunistic contact and predicted contact. Furthermore, the authors analyse the detailed information in order to draw up a comparison table and also expect to inspire more research into this topic in the future.}, title = {Survey on underwater delay/disruption tolerant wireless sensor network routing}, journal = {IET Wireless Sensor Systems}, issue = {3}, volume = {4}, year = {2014}, month = {September}, pages = {112-121(9)}, publisher ={Institution of Engineering and Technology}, copyright = {This is an open access article published by the IET under the Creative Commons Attribution-NonCommercial License <br/>(<a href="http://creativecommons.org/licenses/by-nc/3.0/" target="_blank">http://creativecommons.org/licenses/by-nc/3.0/</a>)}, url = {https://digital-library.theiet.org/;jsessionid=35fs2vnix4g7o.x-iet-live-01content/journals/10.1049/iet-wss.2013.0118} }