{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T03:22:22Z","timestamp":1775704942580,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T00:00:00Z","timestamp":1611878400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T00:00:00Z","timestamp":1611878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s00607-020-00898-3","type":"journal-article","created":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T10:21:37Z","timestamp":1611915697000},"page":"1183-1208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A hierarchical formal method for performance evaluation of WSNs protocol"],"prefix":"10.1007","volume":"103","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8239-0302","authenticated-orcid":false,"given":"Siham","family":"Zroug","sequence":"first","affiliation":[]},{"given":"Laid","family":"Kahloul","sequence":"additional","affiliation":[]},{"given":"Saber","family":"Benharzallah","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6060-8200","authenticated-orcid":false,"given":"Karim","family":"Djouani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,29]]},"reference":[{"key":"898_CR1","doi-asserted-by":"crossref","unstructured":"Khanafer M, Guennoun M, Mouftah HT (2013) A survey of beacon-enabled IEEE 802.15. 4 MAC protocols in wireless sensor networks. IEEE Commun Surv Tutor 16(2):856\u2013876","DOI":"10.1109\/SURV.2013.112613.00094"},{"key":"898_CR2","unstructured":"Hmidi Z, Kahloul L, Benharzallah S (2016) Statistical model checking of CSMA\/CA in WSNs. In: VECoS, Tunisia, pp 27\u201342"},{"issue":"9","key":"898_CR3","doi-asserted-by":"publisher","first-page":"257157","DOI":"10.1155\/2015\/257157","volume":"11","author":"Z Chen","year":"2015","unstructured":"Chen Z, Peng Y, Yue W (2015) Modeling and analyzing CSMA\/CA protocol for energy-harvesting wireless sensor networks. Int J Distrib Sens Netw 11(9):257157","journal-title":"Int J Distrib Sens Netw"},{"issue":"2","key":"898_CR4","first-page":"129","volume":"17","author":"H Zohra","year":"2020","unstructured":"Zohra H, Kahloul L, Benharzallah S (2020) Using priced timed automata for the specification and verification of CSMA\/CA in WSNs. Int J Inf Commun Technol 17(2):129\u2013145","journal-title":"Int J Inf Commun Technol"},{"key":"898_CR5","doi-asserted-by":"crossref","unstructured":"Houimli M, Kahloul L, Benaoun S (2017) Formal specification, verification and evaluation of the MQTT protocol in the Internet of Things. In: 2017 International conference on mathematics and information technology (ICMIT), IEEE, Adrar, Algiers, December 4\u20135, pp 214\u2013221","DOI":"10.1109\/MATHIT.2017.8259720"},{"key":"898_CR6","doi-asserted-by":"crossref","unstructured":"Houimli M, Kahloul L (2017) Modeling and performance evaluation of protocols in mobile wireless sensor networks. International conference on broadband and wireless computing, communication and applications, Springer, Cham, November 8\u201310. Palau Macaya, Barcelona, Spain, pp 328\u2013339","DOI":"10.1007\/978-3-319-69811-3_30"},{"issue":"1","key":"898_CR7","doi-asserted-by":"publisher","first-page":"27356","DOI":"10.1109\/ACCESS.2018.2833213","volume":"6","author":"ME Cambronero","year":"2018","unstructured":"Cambronero ME, Maci H, Valero V, Orozco-Barbosa L (2018) Modeling and analysis of the 1-wire communication protocol using timed colored petri nets. IEEE Access 6(1):27356\u201327372","journal-title":"IEEE Access"},{"key":"898_CR8","doi-asserted-by":"crossref","unstructured":"Atmani M, Assani D, Hadjadj-Aoul Y (2018) Towards bandwidth and energy optimization in IEEE 802.15. 4 wireless sensor networks. Computing 100(6):597\u2013620201","DOI":"10.1007\/s00607-017-0583-4"},{"key":"898_CR9","unstructured":"CPN Tools. http:\/\/www.cpntools.org. Accessed May (2020)"},{"key":"898_CR10","doi-asserted-by":"crossref","unstructured":"German R, Heindl A (1999) Performance evaluation of IEEE 802.11 wireless LANs with stochastic Petri nets. In: Proceedings 8th international workshop on petri nets and performance models (Cat. No. PR00331), IEEE, pp 44\u201353","DOI":"10.1016\/S0166-5316(00)00053-5"},{"key":"898_CR11","doi-asserted-by":"crossref","unstructured":"Heindl A, German R (2001) Performance modeling of IEEE 802.11 wireless LANs with stochastic Petri nets. Perform Eval 44(1\u20134):139\u2013164","DOI":"10.1016\/S0166-5316(00)00053-5"},{"key":"898_CR12","unstructured":"Neto JM, da Rocha Neto JS, Gorgnio K, Perkusich A (2017) Modeling CSMA-CA protocol with coloured petri nets for wireless sensor networks applications. In: 17 International conference on software telecommunications and computer networks (SofCOM)"},{"key":"898_CR13","doi-asserted-by":"crossref","unstructured":"Masri A, Bourdeaud\u2019Huy T, Toguyeni A (2009) Performance analysis of IEEE 802.11 b wireless networks with object oriented Petri nets. Electron Notes Theor Comput Sci 242(2):73\u201385","DOI":"10.1016\/j.entcs.2009.06.024"},{"key":"898_CR14","doi-asserted-by":"crossref","unstructured":"Shuaib AH, Mahmoodi T, Aghvami AH (2009) A timed Petri Net model for the IEEE 802.15. 4 CSMA-CA process. In: 2009 IEEE 20th international symposium on personal, indoor and mobile radio communications, IEEE, pp 1204\u20131210","DOI":"10.1109\/PIMRC.2009.5450095"},{"key":"898_CR15","doi-asserted-by":"crossref","unstructured":"Hammal Y, Ben-Othman J, Mokdad L, Abdelli A (2014) Formal modeling and verification of an enhanced variant of the IEEE 802.11 CSMA\/CA protocol. J Commun Netw 16(4):385\u2013396","DOI":"10.1109\/JCN.2014.000068"},{"key":"898_CR16","doi-asserted-by":"crossref","unstructured":"Hu X, Jiao L (2017) Efficient modeling and performance analysis for IEEE 802.15. 4 with coloured Petri nets. In: 2017 IEEE\/ACM 25th international symposium on quality of service (IWQoS), IEEE, June 14\u201316 Cantabria Spain, pp 1\u20136","DOI":"10.1109\/IWQoS.2017.7969128"},{"key":"898_CR17","first-page":"351","volume-title":"Petri nets and their application an introduction","author":"T Murata","year":"1984","unstructured":"Murata T (1984) Petri nets and their application an introduction. Management and office information systems. Springer, Boston, MA, pp 351\u2013368"},{"key":"898_CR18","doi-asserted-by":"crossref","unstructured":"Jensen K (1993) An introduction to the theoretical aspects of coloured petri nets. Workshop\/school\/symposium of the REX project (research and education in concurrent systems). Springer, Berlin, Heidelberg, pp 230\u2013272","DOI":"10.1007\/3-540-58043-3_21"},{"issue":"2","key":"898_CR19","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10207-019-00448-9","volume":"19","author":"HB Attia","year":"2020","unstructured":"Attia HB, Kahloul L, Benhazrallah S, Bourekkache S (2020) Using hierarchical timed coloured petri nets in the formal study of TRBAC security policies. Int J Inf Secur 19(2):163\u2013187","journal-title":"Int J Inf Secur"},{"key":"898_CR20","unstructured":"Uppaal. http:\/\/www.uppaal.org. Accessed October 2019"},{"key":"898_CR21","doi-asserted-by":"crossref","unstructured":"Kanovich M, Ito T (1997) Temporal linear logic specifications for concurrent processes. In: Proceedings of twelfth annual IEEE symposium on logic in computer science, IEEE, pp 48\u201357","DOI":"10.1109\/LICS.1997.614928"},{"key":"898_CR22","unstructured":"Bergstra JS, Bardenet R, Bengio Y, Kgl B (2011) Algorithms for hyper-parameter optimization. In: Advances in neural information processing systems, pp 2546\u20132554"},{"issue":"6088","key":"898_CR23","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1038\/323533a0","volume":"323","author":"DE Rumelhart","year":"1986","unstructured":"Rumelhart DE, Hinton GE, Williams RJ (1986) Learning representations by back-propagating errors. Nature 323(6088):533\u2013536","journal-title":"Nature"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00898-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-020-00898-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-020-00898-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T06:33:05Z","timestamp":1622183585000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-020-00898-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,29]]},"references-count":23,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["898"],"URL":"https:\/\/doi.org\/10.1007\/s00607-020-00898-3","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,29]]},"assertion":[{"value":"28 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}