{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:13:08Z","timestamp":1774631588854,"version":"3.50.1"},"publisher-location":"Cham","reference-count":86,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030222765","type":"print"},{"value":"9783030222772","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_27","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"683-713","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":73,"title":["Requirements, Protocols, and Security Challenges in Wireless Sensor Networks: An Industrial Perspective"],"prefix":"10.1007","author":[{"given":"Bharat","family":"Bhushan","sequence":"first","affiliation":[]},{"given":"G.","family":"Sahoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/CIMCA.2005.1631480","volume-title":"International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC\u201906)","author":"KS Low","year":"2005","unstructured":"Low, K. S., Win, W. N. N., & Meng, E. (2005). Wireless sensor networks for industrial environments. In  International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC\u201906) (Vol. 2, pp. 271\u2013276). \nhttps:\/\/doi.org\/10.1109\/CIMCA.2005.1631480\n\n."},{"issue":"4","key":"27_CR2","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/s1389-1286(01)00302-4","volume":"38","author":"I Akyildiz","year":"2002","unstructured":"Akyildiz, I., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393\u2013422. \nhttps:\/\/doi.org\/10.1016\/s1389-1286(01)00302-4\n\n.","journal-title":"Computer Networks"},{"issue":"1","key":"27_CR3","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/tim.2013.2276487","volume":"63","author":"J Gutierrez","year":"2014","unstructured":"Gutierrez, J., Villa-Medina, J. F., Nieto-Garibay, A., & Porta-Gandara, M. A. (2014). Automated irrigation system using a wireless sensor network and GPRS module. IEEE Transactions on Instrumentation and Measurement, 63(1), 166\u2013176. \nhttps:\/\/doi.org\/10.1109\/tim.2013.2276487\n\n.","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"1118","DOI":"10.1109\/TII.2013.2290432","volume":"10","author":"N Jan","year":"2014","unstructured":"Jan, N., Ondrej, K., & Radislav, S. (2014). A distributed fault detection system based on IWSN for machine condition monitoring. IEEE Transactions on Industrial Informatics, 10, 1118\u20131123. \nhttps:\/\/doi.org\/10.1109\/TII.2013.2290432\n\n.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/8058624","volume":"2018","author":"I Zafar","year":"2018","unstructured":"Zafar, I., Heung-No, L., & Saeid, N. (2018). Highly reliable decision-making using reliability factor feedback for factory condition monitoring via WSNs. Wireless Communications and Mobile Computing, 2018, 1\u20139. \nhttps:\/\/doi.org\/10.1155\/2018\/8058624\n\n.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"27_CR6","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K. E., Kim, B., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964\u2013975. \nhttps:\/\/doi.org\/10.1016\/j.future.2016.11.031\n\n.","journal-title":"Future Generation Computer Systems"},{"key":"27_CR7","doi-asserted-by":"publisher","DOI":"10.1145\/1795194.1795211","volume-title":"Proceedings of the 1st ACM\/IEEE International Conference on Cyber-Physical Systems \u2013 ICCPS 10","author":"G Hackmann","year":"2010","unstructured":"Hackmann, G., Guo, W., Yan, G., Lu, C., & Dyke, S. (2010). Cyber-physical codesign of distributed structural health monitoring with wireless sensor networks. In  Proceedings of the 1st ACM\/IEEE International Conference on Cyber-Physical Systems \u2013 ICCPS 10. \nhttps:\/\/doi.org\/10.1145\/1795194.1795211\n\n."},{"issue":"5","key":"27_CR8","doi-asserted-by":"publisher","first-page":"2723","DOI":"10.1109\/twc.2017.2658601","volume":"16","author":"A Boubrima","year":"2017","unstructured":"Boubrima, A., Bechkit, W., & Rivano, H. (2017). Optimal WSN deployment models for air pollution monitoring. IEEE Transactions on Wireless Communications, 16(5), 2723\u20132735. \nhttps:\/\/doi.org\/10.1109\/twc.2017.2658601\n\n.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"21","key":"27_CR9","doi-asserted-by":"publisher","first-page":"22803","DOI":"10.1007\/s11042-017-4590-4","volume":"76","author":"C Stergiou","year":"2017","unstructured":"Stergiou, C., & Psannis, K. (2017). Efficient and secure BIG data delivery in Cloud Computing. Multimedia Tools and Applications, 76(21), 22803\u201322822. \nhttps:\/\/doi.org\/10.1007\/s11042-017-4590-4\n\n.","journal-title":"Multimedia Tools and Applications"},{"issue":"8","key":"27_CR10","doi-asserted-by":"publisher","first-page":"2411","DOI":"10.1109\/tc.2015.2490060","volume":"65","author":"C Wang","year":"2016","unstructured":"Wang, C., Li, J., Ye, F., & Yang, Y. (2016). A mobile data gathering framework for wireless rechargeable sensor networks with vehicle movement costs and capacity constraints. IEEE Transactions on Computers, 65(8), 2411\u20132427. \nhttps:\/\/doi.org\/10.1109\/tc.2015.2490060\n\n.","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"27_CR11","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1109\/TII.2016.2528228","volume":"12","author":"KF Tsang","year":"2016","unstructured":"Tsang, K. F., Gidlund, M., & \u00c5kerberg, J. (2016). Guest editorial industrial wireless networks: Applications, challenges, and future directions. IEEE Transactions on Industrial Informatics, 12(2), 755\u2013757.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"6","key":"27_CR12","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1109\/tii.2016.2592481","volume":"12","author":"JW Guck","year":"2016","unstructured":"Guck, J. W., Reisslein, M., & Kellerer, W. (2016). Function split between delay-constrained routing and resource allocation for centrally managed QoS in industrial networks. IEEE Transactions on Industrial Informatics, 12(6), 2050\u20132061. \nhttps:\/\/doi.org\/10.1109\/tii.2016.2592481\n\n.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"27_CR13","doi-asserted-by":"publisher","DOI":"10.1145\/1098918.1098926","volume-title":"Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems \u2013 SenSys 05","author":"L Krishnamurthy","year":"2005","unstructured":"Krishnamurthy, L., Adler, R., Buonadonna, P., Chhabra, J., Flanigan, M., Kushalnagar, N., et al. (2005). Design and deployment of industrial sensor networks. In  Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems \u2013 SenSys 05. \nhttps:\/\/doi.org\/10.1145\/1098918.1098926\n\n."},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.jnca.2015.03.004","volume":"53","author":"S Tanwar","year":"2015","unstructured":"Tanwar, S., Kumar, N., & Rodrigues, J. J. (2015). A systematic review on heterogeneous routing protocols for wireless sensor network. Journal of Network and Computer Applications, 53, 39\u201356. \nhttps:\/\/doi.org\/10.1016\/j.jnca.2015.03.004\n\n.","journal-title":"Journal of Network and Computer Applications"},{"key":"27_CR15","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1109\/ICEEOT.2016.7755660","volume-title":"International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)","author":"K Begum","year":"2016","unstructured":"Begum, K., & Dixit, S. (2016, March). Industrial WSN using IoT: A survey. In  International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (pp. 499\u2013504). Piscataway: IEEE."},{"key":"27_CR16","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-030-01689-0_11","volume-title":"International Symposium on Cyberspace Safety and Security","author":"BB Gupta","year":"2018","unstructured":"Gupta, B. B., & Quamara, M. (2018, October). A dynamic security policies generation model for access control in smart card based applications. In  International Symposium on Cyberspace Safety and Security (pp. 132\u2013143). Cham: Springer."},{"issue":"1","key":"27_CR17","first-page":"27","volume":"5","author":"S Christos","year":"2018","unstructured":"Christos, S., Kostas, P., Andreas, P., Yutaka, I., & Byung-Gyu, K. (2018). Algorithms for efficient digital media transmission over IoT and cloud networking. The Journal of Multimedia Information System, 5(1), 27\u201334.","journal-title":"The Journal of Multimedia Information System"},{"key":"27_CR18","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2017.09.082","volume":"82","author":"A Plageras","year":"2017","unstructured":"Plageras, A., Psannis, K., Stergiou, C., Wang, H., & Gupta, B. B. (2017). Efficient IoT-based sensor BIG data collection-processing and analysis in smart buildings. Future Generation Computer Systems, 82, 349\u2013357. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.09.082\n\n.","journal-title":"Future Generation Computer Systems"},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/lcomm.2016.2639484","volume":"21","author":"X Lin","year":"2016","unstructured":"Lin, X., Huang, L., Guo, C., Zhang, P., Huang, M., & Zhang, J. (2016). Energy-efficient resource allocation in TDMS based wireless powered communication networks. IEEE Communications Letters, 21, 1. \nhttps:\/\/doi.org\/10.1109\/lcomm.2016.2639484\n\n.","journal-title":"IEEE Communications Letters"},{"issue":"2","key":"27_CR20","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1109\/LWC.2017.2650224","volume":"6","author":"TM Hoang","year":"2017","unstructured":"Hoang, T. M., Duong, Q., Vo, N.-S., & Kundu, C. (2017). Physical layer security in cooperative energy harvesting networks with a friendly jammer. IEEE Wireless Communications Letters, 6(2), 174\u2013177. \nhttps:\/\/doi.org\/10.1109\/LWC.2017.2650224\n\n.","journal-title":"IEEE Wireless Communications Letters"},{"key":"27_CR21","first-page":"851","volume":"8","author":"S Hitesh","year":"2017","unstructured":"Hitesh, S., Ravinder, K., Boncho, B., & Peter, P. (2017). Cloud attenuation issues in satellite communications at millimeter frequency bands-state of art. International Journal of Scientific and Engineering Research, 8, 851\u2013857.","journal-title":"International Journal of Scientific and Engineering Research"},{"issue":"9","key":"27_CR22","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/jproc.2016.2558521","volume":"104","author":"Y Zou","year":"2016","unstructured":"Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A survey on wireless security: Technical challenges, recent advances, and future trends. Proceedings of the IEEE, 104(9), 1727\u20131765. \nhttps:\/\/doi.org\/10.1109\/jproc.2016.2558521\n\n.","journal-title":"Proceedings of the IEEE"},{"issue":"2","key":"27_CR23","doi-asserted-by":"publisher","first-page":"2037","DOI":"10.1007\/s11277-017-4962-0","volume":"98","author":"B Bhushan","year":"2017","unstructured":"Bhushan, B., & Sahoo, G. (2017). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037\u20132077. \nhttps:\/\/doi.org\/10.1007\/s11277-017-4962-0\n\n.","journal-title":"Wireless Personal Communications"},{"key":"27_CR24","volume-title":"Wireless sensor networks: An information processing approach","author":"F Zhao","year":"2004","unstructured":"Zhao, F., & Guibas, L. (2004). Wireless sensor networks: An information processing approach. Amsterdam: Elsevier."},{"key":"27_CR25","first-page":"3","volume":"22","author":"T Kevan","year":"2005","unstructured":"Kevan, T. (2005). Upgrading a steel mill \u2013 Wirelessly. Wireless Sensors, 22, 3\u20136.","journal-title":"Wireless Sensors"},{"key":"27_CR26","volume-title":"Wireless sensors magazine","author":"T Kevan","year":"2006","unstructured":"Kevan, T. (2006). Shipboard machine monitoring for predictive maintenance. In  Wireless sensors magazine."},{"key":"27_CR27","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1115\/IMECE2004-59884","volume-title":"Distributed monitoring of steady-state system performance using wireless sensor networks","author":"V Sundararajan","year":"2004","unstructured":"Sundararajan, V., Andrew, R., William, W., & Paul, W. (2004). Distributed monitoring of steady-state system performance using wireless sensor networks (p. 15). California: American Society of Mechanical Engineers, Manufacturing Engineering Division, MED. \nhttps:\/\/doi.org\/10.1115\/IMECE2004-59884\n\n."},{"key":"27_CR28","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/ICSENS.2005.1597900","volume-title":"Sensores","author":"H Ramamurthy","year":"2005","unstructured":"Ramamurthy, H., Prabhu, B. S., Gadh, R., & Madni, A. (2005). Smart sensor platform for industrial monitoring and control. In  Sensores (p. 4). Irvine: IEEE. \nhttps:\/\/doi.org\/10.1109\/ICSENS.2005.1597900\n\n."},{"key":"27_CR29","doi-asserted-by":"publisher","first-page":"2083","DOI":"10.19026\/rjaset.7.502","volume":"7","author":"R Muhammad","year":"2014","unstructured":"Muhammad, R., Jaharah, G., Mohd, N., & Haron, C. (2014). A review of sensor system and application in milling process for tool condition monitoring. Research Journal of Applied Sciences, Engineering and Technology, 7, 2083\u20132097. \nhttps:\/\/doi.org\/10.19026\/rjaset.7.502\n\n.","journal-title":"Research Journal of Applied Sciences, Engineering and Technology"},{"key":"27_CR30","doi-asserted-by":"publisher","DOI":"10.1109\/etfa.2010.5641347","volume-title":"2010 IEEE 15th Conference on Emerging Technologies and Factory Automation (ETFA 2010)","author":"K Kunert","year":"2010","unstructured":"Kunert, K., Jonsson, M., & Uhlemann, E. (2010). Exploiting time and frequency diversity in IEEE 802.15.4 industrial networks for enhanced reliability and throughput. In  2010 IEEE 15th Conference on Emerging Technologies and Factory Automation (ETFA 2010). \nhttps:\/\/doi.org\/10.1109\/etfa.2010.5641347\n\n."},{"key":"27_CR31","doi-asserted-by":"publisher","DOI":"10.1109\/etfa.2010.5641118","volume-title":"2010 IEEE 15th Conference on Emerging Technologies and Factory Automation (ETFA 2010)","author":"M Mi\u015bkowicz","year":"2010","unstructured":"Mi\u015bkowicz, M., & Ko\u015bcielnik, D. (2010). Modeling end-to-end reliability in best-effort networked embedded systems. In  2010 IEEE 15th Conference on Emerging Technologies and Factory Automation (ETFA 2010). \nhttps:\/\/doi.org\/10.1109\/etfa.2010.5641118\n\n."},{"issue":"6","key":"27_CR32","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1109\/tmc.2010.223","volume":"10","author":"P Park","year":"2011","unstructured":"Park, P., Fischione, C., Bonivento, A., Johansson, K. H., & Sangiovanni-Vincent, A. (2011). Breath: An adaptive protocol for industrial control applications using wireless sensor networks. IEEE Transactions on Mobile Computing, 10(6), 821\u2013838. \nhttps:\/\/doi.org\/10.1109\/ tmc.2010.223\n\n.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"27_CR33","doi-asserted-by":"publisher","first-page":"123","DOI":"10.3390\/jsan1020123","volume":"1","author":"P Zand","year":"2012","unstructured":"Zand, P., Chatterjea, S., Das, K., & Havinga, P. (2012). Wireless industrial monitoring and control networks: The journey so far and the road ahead. Journal of Sensor and Actuator Networks, 1, 123\u2013152. \nhttps:\/\/doi.org\/10.3390\/jsan1020123\n\n.","journal-title":"Journal of Sensor and Actuator Networks"},{"key":"27_CR34","first-page":"1187","volume-title":"Proceedings of SICE Annual Conference 2010","author":"L Zheng","year":"2010","unstructured":"Zheng, L. (2010). Industrial wireless sensor networks and standardizations: The trend of wireless sensor networks for process automation. In  Proceedings of SICE Annual Conference 2010 (pp. 1187\u20131190). Piscataway: IEEE."},{"key":"27_CR35","doi-asserted-by":"publisher","DOI":"10.1109\/rawcon.2004.1389058","volume-title":"Proceedings of 2004 IEEE Radio and Wireless Conference (IEEE Cat. No.04TH8746)","author":"I Akyildiz","year":"2004","unstructured":"Akyildiz, I., & Kasimoglu, I. (2004). A protocol suite for wireless sensor and actor networks. In  Proceedings of 2004 IEEE Radio and Wireless Conference (IEEE Cat. No.04TH8746). \nhttps:\/\/doi.org\/10.1109\/rawcon.2004.1389058\n\n."},{"issue":"7","key":"27_CR36","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/2.869369","volume":"33","author":"J Rabaey","year":"2000","unstructured":"Rabaey, J., Ammer, M., Silva, J. D., Patel, D., & Roundy, S. (2000). PicoRadio supports ad hoc ultra-low power wireless networking. Computer, 33(7), 42\u201348. \nhttps:\/\/doi.org\/10.1109\/2.869369\n\n.","journal-title":"Computer"},{"issue":"6","key":"27_CR37","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1109\/jproc.2005.849717","volume":"93","author":"A Willig","year":"2005","unstructured":"Willig, A., Matheus, K., & Wolisz, A. (2005). Wireless technology in industrial networks. Proceedings of the IEEE, 93(6), 1130\u20131151. \nhttps:\/\/doi.org\/10.1109\/jproc.2005.849717\n\n.","journal-title":"Proceedings of the IEEE"},{"key":"27_CR38","first-page":"227","volume-title":"Proceedings of the International Conference on Wireless Networks, ICWN\u201904","author":"C Dazhi","year":"2004","unstructured":"Dazhi, C., & Varshney, P. K. (2004). QoS support in wireless sensor networks: A survey. In  Proceedings of the International Conference on Wireless Networks, ICWN\u201904 (Vol. 1, pp. 227\u2013233)."},{"issue":"10","key":"27_CR39","doi-asserted-by":"publisher","first-page":"4258","DOI":"10.1109\/tie.2009.2015754","volume":"56","author":"V Gungor","year":"2009","unstructured":"Gungor, V., & Hancke, G. (2009). Industrial wireless sensor networks: Challenges, design principles, and technical approaches. IEEE Transactions on Industrial Electronics, 56(10), 4258\u20134265. \nhttps:\/\/doi.org\/10.1109\/tie.2009.2015754\n\n.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"27_CR40","volume-title":"Proceedings of the 9th International Workshop on Real-Time Networks RTN","author":"SO Ramon","year":"2010","unstructured":"Ramon, S. O., & Gerhard, F. (2010). Timeliness in wireless sensor networks: Common misconceptions. In  Proceedings of the 9th International Workshop on Real-Time Networks RTN."},{"key":"27_CR41","doi-asserted-by":"publisher","DOI":"10.1109\/itsim.2010.5561571","volume-title":"2010 International Symposium on Information Technology","author":"M Imran","year":"2010","unstructured":"Imran, M., Said, A. M., & Hasbullah, H. (2010). A survey of simulators, emulators and testbeds for wireless sensor networks. In  2010 International Symposium on Information Technology. \nhttps:\/\/doi.org\/10.1109\/itsim.2010.5561571\n\n."},{"key":"27_CR42","doi-asserted-by":"publisher","DOI":"10.1109\/camad.2009.5161468","volume-title":"2009 IEEE 14th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks","author":"G Halkes","year":"2009","unstructured":"Halkes, G., & Langendoen, K. (2009). Experimental evaluation of simulation abstractions for wireless sensor network MAC protocols. In  2009 IEEE 14th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks. \nhttps:\/\/doi.org\/10.1109\/camad.2009.5161468\n\n."},{"issue":"8","key":"27_CR43","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1109\/tii.2018.2825225","volume":"14","author":"H Li","year":"2018","unstructured":"Li, H., & Savkin, A. V. (2018). Wireless sensor network based navigation of micro flying robots in the industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3524\u20133533. \nhttps:\/\/doi.org\/10.1109\/tii.2018.2825225\n\n.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"27_CR44","doi-asserted-by":"publisher","DOI":"10.1109\/cspc.2017.8305855h","volume-title":"2017 International Conference on Signal Processing and Communication (ICSPC)","author":"P Sinha","year":"2017","unstructured":"Sinha, P., Jha, V. K., Rai, A. K., & Bhushan, B. (2017). Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. In  2017 International Conference on Signal Processing and Communication (ICSPC). \nhttps:\/\/doi.org\/10.1109\/cspc.2017.8305855h\n\n."},{"key":"27_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46810-5","volume-title":"Wireless power transfer algorithms, technologies and applications in ad hoc communication networks","author":"S Nikoletseas","year":"2016","unstructured":"Nikoletseas, S., Yang, Y., & Apostolos, G. (2016). Wireless power transfer algorithms, technologies and applications in ad hoc communication networks. Cham: Springer. \nhttps:\/\/doi.org\/10.1007\/978-3-319-46810-5\n\n."},{"key":"27_CR46","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1109\/ISITIA.2017.8124103","volume-title":"2017 International Seminar on Intelligent Technology and Its Applications (ISITIA)","author":"F Nurul","year":"2017","unstructured":"Nurul, F., Samsul, H., Eko, P., Udin, A. R., Choirur, R., & Unggul Pamenang, M. (2017). A prototype of monitoring precision agriculture system based on WSN. In  2017 International Seminar on Intelligent Technology and Its Applications (ISITIA) (pp. 323\u2013328). Piscataway: IEEE. \nhttps:\/\/doi.org\/10.1109\/ISITIA.2017.8124103\n\n."},{"key":"27_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2017.2758822","volume":"1","author":"A Nelofar","year":"2017","unstructured":"Nelofar, A., Kewen, X., Ahmad, A., & Saleem, U. (2017). Adaptive TCP-ICCW congestion control mechanism for QoS in renewable wireless sensor networks. IEEE Sensors Letters, 1, 1. \nhttps:\/\/doi.org\/10.1109\/LSENS.2017.2758822\n\n.","journal-title":"IEEE Sensors Letters"},{"key":"27_CR48","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.isatra.2010.10.006","volume":"50","author":"R Bayindir","year":"2010","unstructured":"Bayindir, R., & Yucel, C. (2010). A water pumping control system with a Programmable Logic Controller (PLC) and industrial wireless modules for industrial plants\u2014An experimental setup. ISA Transactions, 50, 321\u2013328. \nhttps:\/\/doi.org\/10.1016\/j.isatra.2010.10.006\n\n.","journal-title":"ISA Transactions"},{"issue":"11","key":"27_CR49","doi-asserted-by":"publisher","first-page":"4724","DOI":"10.1109\/tii.2018.2852491","volume":"14","author":"E Sisinni","year":"2018","unstructured":"Sisinni, E., Saifullah, A., Han, S., Jennehag, U., & Gidlund, M. (2018). Industrial internet of things: Challenges, opportunities, and directions. IEEE Transactions on Industrial Informatics, 14(11), 4724\u20134734. \nhttps:\/\/doi.org\/10.1109\/tii.2018.2852491\n\n.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"27_CR50","unstructured":"Alliance, Z. (2008). Zigbee specification (document 053474r17). Luettu. 21."},{"key":"27_CR51","volume-title":"Internal working draft","author":"I. W. W. Group","year":"2008","unstructured":"I. W. W. Group. (2008, May). Draft standard ISA100. 11a. In  Internal working draft. North Carolina: International Society of Automation."},{"key":"27_CR52","volume-title":"IASTED International Symposium on Distributed Sensor Networks, DSN 2008","author":"P Kristofer","year":"2008","unstructured":"Kristofer, P., & Lance, D. (2008). TSMP: Time synchronized mesh protocol. In  IASTED International Symposium on Distributed Sensor Networks, DSN 2008."},{"key":"27_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/SECON.2010.5508206","volume-title":"2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)","author":"T O\u2019Donovan","year":"2010","unstructured":"O\u2019Donovan, T., Brown, J., Roedig, U., Sreenan, C., Adam, D., Klein, A., S\u00e1 Silva, J., Vassiliou, V., & Wolf, L. (2010). GINSENG: Performance control in wireless sensor networks. In  2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) (pp. 1\u20133). \nhttps:\/\/doi.org\/10.1109\/SECON.2010.5508206\n\n."},{"key":"27_CR54","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-642-13651-1_16","volume-title":"International Conference on Distributed Computing in Sensor Systems","author":"S Petcharat","year":"2010","unstructured":"Petcharat, S., James, B., & Utz, R. (2010). Time-critical data delivery in wireless sensor networks. In  International Conference on Distributed Computing in Sensor Systems (pp. 216\u2013229). Berlin: Springer. \nhttps:\/\/doi.org\/10.1007\/978-3-642-13651-1_16\n\n."},{"key":"27_CR55","doi-asserted-by":"publisher","DOI":"10.1109\/INSS.2012.6240572","volume-title":"Ninth International Conference on Networked Sensing Systems (INSS)","author":"F B\u00fcsching","year":"2012","unstructured":"B\u00fcsching, F., P\u00f6ttner, W.-B., Br\u00f6kelmann, D., von Zengen, G., Hartung, R., Hinz, K., & Wolf, L. (2012). A demonstrator of the GINSENG-approach to performance and closed loop control in WSNs. In  Ninth International Conference on Networked Sensing Systems (INSS). \nhttps:\/\/doi.org\/10.1109\/INSS.2012.6240572\n\n."},{"key":"27_CR56","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MIE.2011.943023","volume":"5","author":"P Stig","year":"2011","unstructured":"Stig, P., & Simon, C. (2011). WirelessHART versus ISA100.11a: The format war hits the factory floor. IEEE Industrial Electronics Magazine, 5, 23\u201334. \nhttps:\/\/doi.org\/10.1109\/MIE.2011.943023\n\n.","journal-title":"IEEE Industrial Electronics Magazine"},{"issue":"1","key":"27_CR57","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/jas.2017.7510751","volume":"5","author":"Y Duan","year":"2018","unstructured":"Duan, Y., Li, W., Fu, X., Luo, Y., & Yang, L. (2018). A methodology for reliability of WSN based on software defined network in adaptive industrial environment. IEEE\/CAA Journal of Automatica Sinica, 5(1), 74\u201382. \nhttps:\/\/doi.org\/10.1109\/jas.2017.7510751\n\n.","journal-title":"IEEE\/CAA Journal of Automatica Sinica"},{"key":"27_CR58","doi-asserted-by":"publisher","DOI":"10.1109\/.2005.1467219","volume-title":"Proceedings of the 2005 IEEE International Symposium On, Mediterranean Conference on Control and Automation Intelligent Control, 2005","author":"J Taylor","year":"2005","unstructured":"Taylor, J., & Sayda, A. (2005). An intelligent architecture for integrated control and asset management for industrial processes. In  Proceedings of the 2005 IEEE International Symposium On, Mediterranean Conference on Control and Automation Intelligent Control, 2005. \nhttps:\/\/doi.org\/10.1109\/.2005.1467219\n\n."},{"key":"27_CR59","doi-asserted-by":"publisher","first-page":"43","DOI":"10.5296\/npa.v3i1.580","volume":"3","author":"G Zhao","year":"2011","unstructured":"Zhao, G. (2011). Wireless sensor networks for industrial process monitoring and control: A survey. Network Protocols and Algorithms, 3, 43\u201363. \nhttps:\/\/doi.org\/10.5296\/npa.v3i1.580\n\n.","journal-title":"Network Protocols and Algorithms"},{"key":"27_CR60","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-662-57277-1_10","volume-title":"Computational Intelligence in Sensor Networks Studies in Computational Intelligence","author":"B Bhushan","year":"2018","unstructured":"Bhushan, B., & Sahoo, G. (2018). Routing protocols in wireless sensor networks. In  Computational Intelligence in Sensor Networks Studies in Computational Intelligence (pp. 215\u2013248). Berlin: Springer. \nhttps:\/\/doi.org\/10.1007\/978-3-662-57277-1_10\n\n."},{"issue":"1","key":"27_CR61","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/tcns.2016.2612828","volume":"5","author":"J Thai","year":"2018","unstructured":"Thai, J., Yuan, C., & Bayen, A. M. (2018). Resiliency of mobility-as-a-service systems to denial-of-service attacks. IEEE Transactions on Control of Network Systems, 5(1), 370\u2013382. \nhttps:\/\/doi.org\/10.1109\/tcns.2016.2612828\n\n.","journal-title":"IEEE Transactions on Control of Network Systems"},{"key":"27_CR62","first-page":"83","volume":"121","author":"R Kumar","year":"2016","unstructured":"Kumar, R., Chandra, P., & Hanmandlu, M. (2016). A robust fingerprint matching system using orientation features. Journal of Information Processing Systems, 121, 83\u201399.","journal-title":"Journal of Information Processing Systems"},{"issue":"6","key":"27_CR63","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.1109\/jiot.2017.2749883","volume":"4","author":"I Tomic","year":"2017","unstructured":"Tomic, I., & Mccann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4(6), 1910\u20131923. \nhttps:\/\/doi.org\/10.1109\/jiot.2017.2749883\n\n.","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"27_CR64","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1504\/IJCVR.2014.065569","volume":"4","author":"R Kumar","year":"2014","unstructured":"Kumar, R., Hanmandlu, M., & Chandra, P. (2014). An empirical evaluation of rotation invariance of LDP feature for fingerprint matching using neural networks. International Journal of Computational Vision and Robotics, 4(4), 330\u2013348.","journal-title":"International Journal of Computational Vision and Robotics"},{"key":"27_CR65","doi-asserted-by":"publisher","first-page":"5313","DOI":"10.1109\/access.2017.2691003","volume":"5","author":"J Zhu","year":"2017","unstructured":"Zhu, J., Zou, Y., & Zheng, B. (2017). Physical-layer security and reliability challenges for industrial wireless sensor networks. IEEE Access, 5, 5313\u20135320. \nhttps:\/\/doi.org\/10.1109\/access.2017.2691003\n\n.","journal-title":"IEEE Access"},{"issue":"1","key":"27_CR66","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/jsyst.2016.2535730","volume":"12","author":"C Pu","year":"2018","unstructured":"Pu, C., & Lim, S. (2018). A light-weight countermeasure to forwarding misbehavior in wireless sensor networks: Design, analysis, and evaluation. IEEE Systems Journal, 12(1), 834\u2013842. \nhttps:\/\/doi.org\/10.1109\/jsyst.2016.2535730\n\n.","journal-title":"IEEE Systems Journal"},{"issue":"3","key":"27_CR67","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/tnet.2018.2818073","volume":"26","author":"G Wang","year":"2018","unstructured":"Wang, G., Wang, B., Wang, T., Nika, A., Zheng, H., & Zhao, B. Y. (2018). Ghost riders: Sybil attacks on crowdsourced mobile mapping services. IEEE\/ACM Transactions on Networking, 26(3), 1123\u20131136. \nhttps:\/\/doi.org\/10.1109\/tnet.2018.2818073\n\n.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"27_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2017.2776303","volume":"1","author":"S Ripudaman","year":"2017","unstructured":"Ripudaman, S., Brijesh, R., & Sanjay, B. (2017). A low delay cross-layer MAC protocol for k-covered event driven wireless sensor networks. IEEE Sensors Letters, 1, 1\u20134. \nhttps:\/\/doi.org\/10.1109\/LSENS.2017.2776303\n\n.","journal-title":"IEEE Sensors Letters"},{"key":"27_CR69","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/COMST.2016.2612644","volume":"19","author":"ZD Fatima","year":"2016","unstructured":"Fatima, Z. D., & Djamel, D. (2016). MAC protocols with wake-up radio for wireless sensor networks: A review. IEEE Communications Surveys and Tutorials, 19, 587\u2013618. \nhttps:\/\/doi.org\/10.1109\/ COMST.2016.2612644\n\n.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"27_CR70","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/CC.2015.7084398","volume":"12","author":"J Liu","year":"2015","unstructured":"Liu, J., Li, M., Yuan, B., & Liu, W. (2015). A novel energy efficient MAC protocol for wireless body area network. Communications China, 12, 11\u201320. \nhttps:\/\/doi.org\/10. 1109\/CC.2015.7084398\n\n.","journal-title":"Communications China"},{"issue":"9","key":"27_CR71","doi-asserted-by":"publisher","first-page":"2936","DOI":"10.1109\/JSEN.2017.2669526","volume":"17","author":"L Chi-Han","year":"2017","unstructured":"Chi-Han, L., Ching-Ju, L. K., & Chen, W.-T. (2017). Channel-aware polling-based MAC protocol for body area networks: Design and analysis. IEEE Sensors Journal, 17(9), 2936\u20132948. \nhttps:\/\/doi.org\/10.1109\/JSEN.2017.2669526\n\n.","journal-title":"IEEE Sensors Journal"},{"issue":"2","key":"27_CR72","doi-asserted-by":"publisher","first-page":"876","DOI":"10.1109\/tase.2015.2408372","volume":"13","author":"P Solic","year":"2016","unstructured":"Solic, P., Radic, J., & Rozic, N. (2016). Early frame break policy for ALOHA-based RFID systems. IEEE Transactions on Automation Science and Engineering, 13(2), 876\u2013881. \nhttps:\/\/doi.org\/10.1109\/tase.2015.2408372\n\n.","journal-title":"IEEE Transactions on Automation Science and Engineering"},{"issue":"3","key":"27_CR73","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1109\/tnet.2007.900704","volume":"16","author":"I Rhee","year":"2008","unstructured":"Rhee, I., Warrier, A., Aia, M., Min, J., & Sichitiu, M. (2008). Z-MAC: A hybrid MAC for wireless sensor networks. IEEE\/ACM Transactions on Networking, 16(3), 511\u2013524. \nhttps:\/\/doi.org\/10.1109\/tnet.2007.900704\n\n.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"27_CR74","doi-asserted-by":"publisher","DOI":"10.1109\/iwcmc.2017.7986450","volume-title":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)","author":"A Hannachi","year":"2017","unstructured":"Hannachi, A., & Bachir, A. (2017). Distributed cell scheduling for multichannel IoT MAC protocols. In  2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). \nhttps:\/\/doi.org\/10.1109\/iwcmc.2017.7986450\n\n."},{"issue":"5","key":"27_CR75","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/lcomm.2016.2536672","volume":"20","author":"V Nguyen","year":"2016","unstructured":"Nguyen, V., Oo, T. Z., Chuan, P., & Hong, C. S. (2016). An efficient time slot acquisition on the hybrid TDMA\/CSMA multichannel MAC in VANETs. IEEE Communications Letters, 20(5), 970\u2013973. \nhttps:\/\/doi.org\/10.1109\/lcomm.2016.2536672\n\n.","journal-title":"IEEE Communications Letters"},{"issue":"6","key":"27_CR76","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/lwc.2016.2615616","volume":"5","author":"H Chingoska","year":"2016","unstructured":"Chingoska, H., Hadzi-Velkov, Z., Nikoloska, I., & Zlatanov, N. (2016). Resource allocation in wireless powered communication networks with non-orthogonal multiple access. IEEE Wireless Communications Letters, 5(6), 684\u2013687. \nhttps:\/\/doi.org\/10.1109\/lwc.2016.2615616\n\n.","journal-title":"IEEE Wireless Communications Letters"},{"issue":"2","key":"27_CR77","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1109\/twc.2016.2633471","volume":"16","author":"J Kim","year":"2017","unstructured":"Kim, J., Lee, H., Song, C., Oh, T., & Lee, I. (2017). Sum throughput maximization for multi-user MIMO cognitive wireless powered communication networks. IEEE Transactions on Wireless Communications, 16(2), 913\u2013923. \nhttps:\/\/doi.org\/10.1109\/twc.2016.2633471\n\n.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"1","key":"27_CR78","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/map.2016.2630035","volume":"59","author":"S Kurt","year":"2017","unstructured":"Kurt, S., & Tavli, B. (2017). Path-loss modeling for wireless sensor networks: A review of models and comparative evaluations. IEEE Antennas and Propagation Magazine, 59(1), 18\u201337. \nhttps:\/\/doi.org\/10.1109\/map.2016.2630035\n\n.","journal-title":"IEEE Antennas and Propagation Magazine"},{"key":"27_CR79","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-44790-2_10","volume-title":"Intelligent techniques in signal processing for multimedia security","author":"R Kumar","year":"2017","unstructured":"Kumar, R. (2017). Hand image biometric based personal authentication system. In  Intelligent techniques in signal processing for multimedia security (pp. 201\u2013226). Cham: Springer."},{"key":"27_CR80","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/ICDCSW.2004.1284094","volume-title":"Proceedings of 24th International Conference on Distributed Computing Systems Workshops, 2004","author":"S Kulkarni","year":"2004","unstructured":"Kulkarni, S. (2004). TDMA service for sensor networks. In  Proceedings of 24th International Conference on Distributed Computing Systems Workshops, 2004 (pp. 604\u2013609). \nhttps:\/\/doi.org\/10.1109\/ICDCSW.2004.1284094\n\n."},{"issue":"6","key":"27_CR81","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/lsens.2017.2776303","volume":"1","author":"R Singh","year":"2017","unstructured":"Singh, R., Rai, B. K., & Bose, S. K. (2017). A low delay cross-layer MAC protocol for k-covered event driven wireless sensor networks. IEEE Sensors Letters, 1(6), 1\u20134. \nhttps:\/\/doi.org\/10.1109\/lsens.2017.2776303\n\n.","journal-title":"IEEE Sensors Letters"},{"issue":"2","key":"27_CR82","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1109\/jsen.2017.2771397","volume":"18","author":"S Siddiqui","year":"2018","unstructured":"Siddiqui, S., Ghani, S., & Khan, A. A. (2018). ADP-MAC: An adaptive and dynamic polling-based MAC protocol for wireless sensor networks. IEEE Sensors Journal, 18(2), 860\u2013874. \nhttps:\/\/doi.org\/10.1109\/jsen.2017.2771397\n\n.","journal-title":"IEEE Sensors Journal"},{"key":"27_CR83","doi-asserted-by":"publisher","first-page":"76228","DOI":"10.1109\/access.2018.2883391","volume":"6","author":"A Kumar","year":"2018","unstructured":"Kumar, A., Zhao, M., Wong, K., Guan, Y. L., & Chong, P. H. (2018). A comprehensive study of IoT and WSN MAC protocols: Research issues, challenges and opportunities. IEEE Access, 6, 76228\u201376262. \nhttps:\/\/doi.org\/10.1109\/access.2018.2883391\n\n.","journal-title":"IEEE Access"},{"issue":"5","key":"27_CR84","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1049\/iet-wss.2016.0092","volume":"7","author":"Y Hu","year":"2017","unstructured":"Hu, Y., Gao, A., Xu, T., & Li, L. (2017). Cascade self-tuning control architecture for QoS-aware MAC in WSN. IET Wireless Sensor Systems, 7(5), 146\u2013154. \nhttps:\/\/doi.org\/10.1049\/ iet-wss.2016.0092\n\n.","journal-title":"IET Wireless Sensor Systems"},{"issue":"7","key":"27_CR85","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1109\/tmc.2006.100","volume":"5","author":"S Ergen","year":"2006","unstructured":"Ergen, S., & Varaiya, P. (2006). PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks. IEEE Transactions on Mobile Computing, 5(7), 920\u2013930. \nhttps:\/\/doi.org\/10.1109\/tmc.2006.100\n\n.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"27_CR86","doi-asserted-by":"publisher","DOI":"10.1109\/sensorcomm.2010.45","volume-title":"2010 Fourth International Conference on Sensor Technologies and Applications","author":"L Sitanayah","year":"2010","unstructured":"Sitanayah, L., Sreenan, C. J., & Brown, K. N. (2010). ER-MAC: A hybrid MAC protocol for emergency response wireless sensor networks. In  2010 Fourth International Conference on Sensor Technologies and Applications. \nhttps:\/\/doi.org\/10.1109\/sensorcomm.2010.45\n\n."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:07:04Z","timestamp":1577794024000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":86,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_27","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}