{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T04:14:15Z","timestamp":1750997655952,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685045"},{"type":"electronic","value":"9783319685052"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68505-2_36","type":"book-chapter","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T01:08:03Z","timestamp":1509325683000},"page":"422-429","source":"Crossref","is-referenced-by-count":0,"title":["Energy Efficient MAC Protocol for Wireless Sensor Networks: A Survey"],"prefix":"10.1007","author":[{"given":"Zichun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Meng","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Tiantian","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Shen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"issue":"17","key":"36_CR1","first-page":"18","volume":"130","author":"J Kaur","year":"2015","unstructured":"Kaur, J., Sahni, V.: Survey on hierarchical cluster routing protocols of WSN. Int. J. Comput. Appl. 130(17), 18\u201322 (2015)","journal-title":"Int. J. Comput. Appl."},{"issue":"10","key":"36_CR2","first-page":"17","volume":"11","author":"S Pant","year":"2010","unstructured":"Pant, S., Naveen, C., Prashant, K.: Effective cache based policies in wireless sensor networks: a survey. Int. J. Comput. Appl. 11(10), 17\u201321 (2010)","journal-title":"Int. J. Comput. Appl."},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Wei, Y., Heidemann, J., Estrin, D.: An Energy-efficient MAC protocol for wireless sensor networks. In: IEEE Global Telecommunications Conference, pp. 1567\u20131576. IEEE (2012)","DOI":"10.1109\/INFCOM.2002.1019408"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Tijs, V., Langendoen, K.: An Adaptive energy-efficient MAC protocol for wireless sensor networks. International Conference on Embedded Networked Sensor Systems, pp. 171\u2013180. ACM (2003)","DOI":"10.1145\/958491.958512"},{"issue":"1","key":"36_CR5","first-page":"95","volume":"5","author":"A Rai","year":"2016","unstructured":"Rai, A., Deswal, S., Singh, P.: MAC protocols in wireless sensor network: a survey. Int. J. New Innovations Eng. Technol. 5(1), 95\u2013101 (2016)","journal-title":"Int. J. New Innovations Eng. Technol."},{"issue":"6","key":"36_CR6","doi-asserted-by":"crossref","first-page":"118","DOI":"10.4236\/jcc.2015.36012","volume":"3","author":"A Ridha","year":"2015","unstructured":"Ridha, A.: Energy consumption and fault tolerance in the MAC protocols for WSN. J. Comput. Commun. 3(6), 118\u2013130 (2015)","journal-title":"J. Comput. Commun."},{"issue":"9","key":"36_CR7","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2015","unstructured":"Fu, Z.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distrib. Syst. 27(9), 2546\u20132559 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Ritesh, K., Rai, K.: A survey on MAC protocols in WSN. Int. J. Eng. Trends Technol. 10\u201311 (2014)","DOI":"10.14445\/22315381\/IJETT-V10P306"},{"issue":"4","key":"36_CR9","first-page":"393","volume":"38","author":"I Akyildiz","year":"2002","unstructured":"Akyildiz, I.: Wireless sensor networks: a survey. Comput. Netw. Int. J. Comput. Telecommun. Netw. 38(4), 393\u2013422 (2002)","journal-title":"Comput. Netw. Int. J. Comput. Telecommun. Netw."},{"issue":"5","key":"36_CR10","first-page":"51","volume":"43","author":"J Pottie","year":"1999","unstructured":"Pottie, J., Kaiser, J.: Wireless integrated network sensors. Wireless Integr. Netw. Sens. Next Gener. 43(5), 51\u201358 (1999)","journal-title":"Wireless Integr. Netw. Sens. Next Gener."},{"issue":"3","key":"36_CR11","first-page":"827","volume":"4","author":"R Yadav","year":"2009","unstructured":"Yadav, R., Varma, S., Malaviya, N.: A survey of MAC protocols for wireless sensor networks. UbiCC J. 4(3), 827\u2013833 (2009)","journal-title":"UbiCC J."},{"key":"36_CR12","unstructured":"Nukhet, S.: An energy efficient MAC protocol for cluster based event driven WSN applications. In: International Conference on Software, Telecommunications and Computer Networks IEEE Xplore, pp. 76\u201381 (2010)"},{"issue":"9","key":"36_CR13","first-page":"203","volume":"3","author":"U Patil","year":"2013","unstructured":"Patil, U., Modi, S., Suma, J.: A survey: MAC layer protocol for wireless sensor networks. Int. J. Emerg.Technol. Adv. Eng. 3(9), 203\u2013211 (2013)","journal-title":"Int. J. Emerg.Technol. Adv. Eng."},{"issue":"4","key":"36_CR14","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"B Heinzelman","year":"2000","unstructured":"Heinzelman, B., Chandrakasan, P., Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wireless Commun. 1(4), 660\u2013670 (2000)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"10","key":"36_CR15","first-page":"18","volume":"18","author":"L Heinzelman","year":"2000","unstructured":"Heinzelman, L.: Energy-efficient communication protocol for wireless microsensor networks. Adhoc & Sensor Wireless Netw. 18(10), 18\u201327 (2000)","journal-title":"Adhoc & Sensor Wireless Netw."},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Fu, Z.: Enabling semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Serv. Comput. p. 99 (2016)","DOI":"10.1109\/TSC.2016.2622697"},{"issue":"1","key":"36_CR17","first-page":"51","volume":"3","author":"R Kaur","year":"2013","unstructured":"Kaur, R., Sharma, D., Kaur, N.: Comparative analysis of leach and its descendant protocols in wireless sensor network. Int. J. P2P Netw. Trends Technol. 3(1), 51\u201355 (2013)","journal-title":"Int. J. P2P Netw. Trends Technol."},{"issue":"1","key":"36_CR18","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s11276-006-6151-z","volume":"12","author":"V Rajendran","year":"2006","unstructured":"Rajendran, V., Obraczka, K., Garcia-Luna-Aceves, J.: Energy-efficient, collision-free medium access control for wireless sensor networks. Wireless Netw. 12(1), 63\u201378 (2006)","journal-title":"Wireless Netw."},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Bao, L., Garcia-Luna-Aceves, J.: A new approach to channel access scheduling for Ad Hoc networks. In: International Conference on Mobile Computing and NETWORKING, pp. 210\u2013221. ACM (2001)","DOI":"10.21236\/ADA461671"},{"key":"36_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-27820-7_4","volume-title":"Algorithmic Aspects of Wireless Sensor Networks","author":"A El-Hoiydi","year":"2004","unstructured":"El-Hoiydi, A., Decotignie, J.-D.: WiseMAC: an ultra low power MAC protocol for multi-hop wireless sensor networks. In: Nikoletseas, S.E., Rolim, J.D.P. (eds.) ALGOSENSORS 2004. LNCS, vol. 3121, pp. 18\u201331. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-27820-7_4"},{"key":"36_CR21","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/ACCESS.2016.2515096","volume":"4","author":"N Alvi","year":"2016","unstructured":"Alvi, N.: BEST-MAC: bitmap-assisted efficient and scalable TDMA-based WSN MAC protocol for smart cities. IEEE Access 4, 312\u2013322 (2016)","journal-title":"IEEE Access"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Tijs, V., Langendoen, K.: An Adaptive energy-efficient MAC protocol for wireless sensor networks. In: International Conference on Embedded Networked Sensor Systems, pp. 171\u2013180. ACM (2003)","DOI":"10.1145\/958491.958512"},{"issue":"3","key":"36_CR23","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1109\/TNET.2004.828953","volume":"12","author":"W Ye","year":"2004","unstructured":"Ye, W., Heidemann, J., Estrin, D.: Medium access control with coordinated adaptive sleeping for wireless sensor networks. IEEE\/ACM Trans. Netw. 12(3), 493\u2013506 (2004)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"7","key":"36_CR24","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/CC.2016.7559071","volume":"13","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Sun, X., Wang, B.: Efficient algorithm for K-barrier coverage based on integer linear programming. China Commun. 13(7), 16\u201323 (2016)","journal-title":"China Commun."},{"key":"36_CR25","unstructured":"Ye, W., Heidemann, J., Estrin, D.: An energy-efficient MAC protocol for wireless sensor networks. In: IEEE Global Telecommunications Conference, pp. 1567\u20131576. IEEE (2012)"},{"issue":"1","key":"36_CR26","first-page":"285","volume":"2012","author":"K Joseph","year":"2012","unstructured":"Joseph, K., Calle, M.: MAC protocols used by wireless sensor networks and a general method of performance evaluation. Int. J. Distrib. Sensor Netw. 2012(1), 285\u2013288 (2012)","journal-title":"Int. J. Distrib. Sensor Netw."},{"issue":"3","key":"36_CR27","doi-asserted-by":"crossref","first-page":"401","DOI":"10.3390\/s16030401","volume":"16","author":"B Sabin","year":"2016","unstructured":"Sabin, B., Sangman, M.: A priority-based adaptive MAC protocol for wireless body area networks. Sensors 16(3), 401 (2016)","journal-title":"Sensors"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68505-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:52:51Z","timestamp":1750967571000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68505-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685045","9783319685052"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68505-2_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}