{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T21:36:39Z","timestamp":1757540199030,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:00:00Z","timestamp":1648598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T00:00:00Z","timestamp":1648598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s00607-022-01074-5","type":"journal-article","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T09:04:46Z","timestamp":1648631086000},"page":"1891-1922","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Performance analysis of the unslotted IEEE 802.15.4k MAC protocols under saturated traffic and fading channel conditions"],"prefix":"10.1007","volume":"104","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5119-7080","authenticated-orcid":false,"given":"Lynda","family":"Alkama","sequence":"first","affiliation":[]},{"given":"Louiza","family":"Bouallouche-Medjkoune","sequence":"additional","affiliation":[]},{"given":"Mouloud","family":"Atmani","sequence":"additional","affiliation":[]},{"given":"Lina","family":"Bachiri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,30]]},"reference":[{"issue":"6","key":"1074_CR1","doi-asserted-by":"publisher","first-page":"7039","DOI":"10.4010\/2016.1678","volume":"6","author":"A Ishfaq","year":"2016","unstructured":"Ishfaq A, Khalil S, Saif U (2016) Military applications using wireless sensor networks: a survey. Int J Eng Sci 6(6):7039\u20137043. https:\/\/doi.org\/10.4010\/2016.1678","journal-title":"Int J Eng Sci"},{"key":"1074_CR2","doi-asserted-by":"publisher","unstructured":"Ramson SJ, Moni DJ (2017) Applications of wireless sensor networks\u2014a survey In: International conference on innovations in electrical, electronics, instrumentation and media technology (ICEEIMT), IEEE, 2017, pp 325\u2013329. https:\/\/doi.org\/10.1109\/ICIEEIMT.2017.8116858","DOI":"10.1109\/ICIEEIMT.2017.8116858"},{"key":"1074_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2019.106902","volume":"164","author":"G Rajesh","year":"2019","unstructured":"Rajesh G, Chaturvedi A (2019) Correlation analysis and statistical characterization of heterogeneous sensor data in environmental sensor networks. Comput Netw 164:1\u201331. https:\/\/doi.org\/10.1016\/j.comnet.2019.106902","journal-title":"Comput Netw"},{"key":"1074_CR4","doi-asserted-by":"publisher","unstructured":"Zubiete ED, Luque LF, Rodr\u00edguez AVM, Gonz\u00e1lez IG (2011) Review of wireless sensors networks in health applications In: 2011 Annual international conference of the IEEE engineering in medicine and biology society, IEEE, 2011, pp 1789\u20131793. https:\/\/doi.org\/10.1109\/IEMBS.2011.6090510","DOI":"10.1109\/IEMBS.2011.6090510"},{"key":"1074_CR5","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/9782605","author":"S Henna","year":"2018","unstructured":"Henna S, Sarwar MA (2018) An adaptive Backoff Mechanism for IEEE 802.15.4 Beacon-Enabled wireless body area networks. Wireless Commun Mobile Comput. https:\/\/doi.org\/10.1155\/2018\/9782605","journal-title":"Wireless Commun Mobile Comput"},{"issue":"3","key":"1074_CR6","doi-asserted-by":"publisher","first-page":"64","DOI":"10.14445\/22492593\/IJCOT-V9P301","volume":"4","author":"R Ashwini","year":"2014","unstructured":"Ashwini R (2014) Application of wireless sensor network in home automation. Int J Comput Organ Trends 4(3):64\u201371. https:\/\/doi.org\/10.14445\/22492593\/IJCOT-V9P301","journal-title":"Int J Comput Organ Trends"},{"issue":"1","key":"1074_CR7","doi-asserted-by":"publisher","first-page":"46","DOI":"10.5296\/npa.v3i1.580","volume":"3","author":"G Zhao","year":"2011","unstructured":"Zhao G (2011) Wireless sensor networks for industrial process monitoring and control: a survey. Netw Protoc Algorithms 3(1):46\u201363. https:\/\/doi.org\/10.5296\/npa.v3i1.580","journal-title":"Netw Protoc Algorithms"},{"key":"1074_CR8","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.jnca.2019.01.025","volume":"132","author":"RD Gomes","year":"2019","unstructured":"Gomes RD, Benavente-Peces C, Fonseca IE, Alencar MS (2019) Adaptive and beacon-based multi-channel protocol for industrial wireless sensor networks. J Netw Comput Appl 132:22\u201339. https:\/\/doi.org\/10.1016\/j.jnca.2019.01.025","journal-title":"J Netw Comput Appl"},{"key":"1074_CR9","doi-asserted-by":"publisher","unstructured":"IEEE 802.15.4 Standard, Part 15.4: wireless medium access control (MAC) and physical layer (PHY) specifications for low rate wireless personal area networks (LR WPANs). (2003) 1\u2013670 https:\/\/doi.org\/10.1109\/IEEESTD.2003.94389","DOI":"10.1109\/IEEESTD.2003.94389"},{"key":"1074_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-020-00844-3","author":"L Alkama","year":"2020","unstructured":"Alkama L, Bouallouche-Medjkoune L (2020) IEEE 802.15.4 historical revolution versions: a survey. Computing. https:\/\/doi.org\/10.1007\/s00607-020-00844-3","journal-title":"Computing"},{"key":"1074_CR11","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s11277-020-07584-9","volume":"155","author":"L Alkama","year":"2020","unstructured":"Alkama L, Bouallouche-Medjkoune L, Bachiri L (2020) Modeling and performance evaluation of the IEEE 802.15.4K CSMA\/CA with Priority Channel Access mechanism under fading channel. Wireless Personnal Commun 155:527\u2013556. https:\/\/doi.org\/10.1007\/s11277-020-07584-9","journal-title":"Wireless Personnal Commun"},{"key":"1074_CR12","doi-asserted-by":"publisher","unstructured":"IEEE Std 802.15.4, part 15.4: Low-rate wireless personal area networks (LR-WPANs) (2011) 1\u2013314 https:\/\/doi.org\/10.1109\/IEEESTD.2011.6012487","DOI":"10.1109\/IEEESTD.2011.6012487"},{"issue":"10","key":"1074_CR13","doi-asserted-by":"publisher","first-page":"1783","DOI":"10.1002\/dac.2435","volume":"27","author":"M Sanaullah Chowdhury","year":"2014","unstructured":"Sanaullah Chowdhury M, Ullah N, Ameen MA, Kwak KS (2014) Framed slotted aloha based MAC protocol for low energy critical infrastructure monitoring networks. Int J Commun Syst 27(10):1783\u20131797. https:\/\/doi.org\/10.1002\/dac.2435","journal-title":"Int J Commun Syst"},{"key":"1074_CR14","doi-asserted-by":"publisher","unstructured":"IEEE Std 802.15.4k, Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 5: Physical Layer Specifications for Low Energy, Critical Infrastructure Monitoring Networks (2013) 1\u2013149 https:\/\/doi.org\/10.1109\/IEEESTD.2013.6581828","DOI":"10.1109\/IEEESTD.2013.6581828"},{"issue":"3","key":"1074_CR15","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G Bianchi","year":"2000","unstructured":"Bianchi G (2000) Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J Select Areas Commun 18(3):535\u2013547. https:\/\/doi.org\/10.1109\/49.840210","journal-title":"IEEE J Select Areas Commun"},{"key":"1074_CR16","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.jnca.2013.05.013","volume":"39","author":"A Benslimane","year":"2014","unstructured":"Benslimane A, Rachedi A (2014) Rate adaptation scheme for IEEE 802.11-based manets. J Netw Comput Appl 39:126\u2013139. https:\/\/doi.org\/10.1016\/j.jnca.2013.05.013","journal-title":"J Netw Comput Appl"},{"key":"1074_CR17","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.comnet.2015.02.003","volume":"80","author":"G Martorell","year":"2015","unstructured":"Martorell G, Femenias G, Riera-Palou F (2015) Non-saturated IEEE 802.11 networks a. Hierarchical 3d Markov model. Comput Netw 80:27\u201350. https:\/\/doi.org\/10.1016\/j.comnet.2015.02.003","journal-title":"Comput Netw"},{"key":"1074_CR18","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.comnet.2019.02.021","volume":"155","author":"V Casares-Giner","year":"2019","unstructured":"Casares-Giner V, Martinez-Bauset J, Portillo C (2019) Performance evaluation of framed slotted aloha with reservation packets and succesive interference cancelation for m2m networks. Comput Netw 155:15\u201330. https:\/\/doi.org\/10.1016\/j.comnet.2019.02.021","journal-title":"Comput Netw"},{"key":"1074_CR19","doi-asserted-by":"publisher","unstructured":"Misic J, Misic VB, Shafi S (2004) Performance of IEEE 802.15.4 beacon enabled PAN with uplink transmissions in non-saturation mode-access delay for finite buffers In: First international conference on broadband networks, IEEE, 2004, pp 416\u2013425. https:\/\/doi.org\/10.1109\/BROADNETS.2004.61","DOI":"10.1109\/BROADNETS.2004.61"},{"key":"1074_CR20","doi-asserted-by":"publisher","unstructured":"Sahoo PK, Sheu J-P (2008) Modeling IEEE 802.15.4 based wireless sensor network with packet retry limits In: Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, pp 63\u201370. https:\/\/doi.org\/10.1145\/1454609.1454624","DOI":"10.1145\/1454609.1454624"},{"issue":"9","key":"1074_CR21","doi-asserted-by":"publisher","first-page":"3359","DOI":"10.1109\/TWC.2008.060057","volume":"7","author":"S Pollin","year":"2008","unstructured":"Pollin S, Ergen M, Ergen SC, Bougard B, Van der Perre L, Moerman I, Bahai A, Varaiya P, Catthoor F (2008) Performance analysis of slotted carrier sense IEEE 802.15.4 medium access layer. IEEE Trans Wireless Commun 7(9):3359\u20133371. https:\/\/doi.org\/10.1109\/TWC.2008.060057","journal-title":"IEEE Trans Wireless Commun"},{"key":"1074_CR22","doi-asserted-by":"publisher","unstructured":"Park P, Di\u00a0Marco P, Soldati P, Fischione C, Johansson KH (2009) A generalized Markov chain model for effective analysis of slotted IEEE 802.15.4 In: 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, IEEE, 2009, pp 130\u2013139. https:\/\/doi.org\/10.1109\/MOBHOC.2009.5337007","DOI":"10.1109\/MOBHOC.2009.5337007"},{"issue":"2","key":"1074_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2422966.2422970","volume":"9","author":"P Park","year":"2013","unstructured":"Park P, Fischione C, Johansson KH (2013) Modeling and stability analysis of hybrid multiple access in the IEEE 802.15.4 protocol. ACM Trans Sensor Netw (TOSN) 9(2):1\u201355. https:\/\/doi.org\/10.1145\/2422966.2422970","journal-title":"ACM Trans Sensor Netw (TOSN)"},{"issue":"4","key":"1074_CR24","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1002\/wcm.2524","volume":"16","author":"H Tavakoli","year":"2016","unstructured":"Tavakoli H, Mi\u0161i\u0107 J, Naderi M, Mi\u0161i\u0107 VB (2016) Adaptive low-energy clustering in slotted beacon-enabled IEEE 802.15.4 networks. Wireless Commun Mobile Comput 16(4):393\u2013407. https:\/\/doi.org\/10.1002\/wcm.2524","journal-title":"Wireless Commun Mobile Comput"},{"key":"1074_CR25","doi-asserted-by":"publisher","unstructured":"Lee WH, Hwang HY, Chong JW (2018) Runtime estimation of the number of active devices in IEEE 802.15.4 Slotted CSMA\/CA Networks with Deferred Transmission and No Acknowledgment Using ARMA Filters, Wireless Communications and Mobile Computing 2018 (2018) 1\u201312. https:\/\/doi.org\/10.1155\/2018\/5420876","DOI":"10.1155\/2018\/5420876"},{"issue":"11","key":"1074_CR26","doi-asserted-by":"publisher","first-page":"2576","DOI":"10.1016\/j.comnet.2011.04.017","volume":"55","author":"F Shu","year":"2011","unstructured":"Shu F, Sakurai T (2011) A new analytical model for the IEEE 802.15. 4 CSMA-ca protocol. Comput Netw 55(11):2576\u20132591. https:\/\/doi.org\/10.1016\/j.comnet.2011.04.017","journal-title":"Comput Netw"},{"issue":"6","key":"1074_CR27","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1007\/s00607-017-0583-4","volume":"100","author":"M Atmani","year":"2018","unstructured":"Atmani M, A\u00efssani D, Hadjadj-Aoul Y (2018) Towards bandwidth and energy optimization in IEEE 802.15. 4 wireless sensor networks. Computing 100(6):597\u2013620. https:\/\/doi.org\/10.1007\/s00607-017-0583-4","journal-title":"Computing"},{"key":"1074_CR28","unstructured":"Feo E, Di\u00a0Caro GA (2011) An analytical model for IEEE 802.15.4 non-beacon enabled CSMA\/CA in multihop wireless sensor networks, Istituto Dalle Molle di Studi sull\u2019Intelligenza Artificiale (IDSIA), Lugano, Switzerland, Tech. Rep 05\u201311"},{"issue":"7","key":"1074_CR29","doi-asserted-by":"publisher","first-page":"3191","DOI":"10.1109\/TVT.2012.2201221","volume":"61","author":"P Di Marco","year":"2012","unstructured":"Di Marco P, Park P, Fischione C, Johansson KH (2012) Analytical modeling of multi-hop IEEE 802.15.4 networks. IEEE Trans Veh Technol 61(7):3191\u20133208. https:\/\/doi.org\/10.1109\/TVT.2012.2201221","journal-title":"IEEE Trans Veh Technol"},{"key":"1074_CR30","doi-asserted-by":"publisher","unstructured":"El\u00a0Korbi I, Saidane LA (2016) Enhanced energy computation of unslotted IEEE 802.15.4 under unsaturated traffic conditions In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), IEEE, pp 976\u2013981. https:\/\/doi.org\/10.1109\/IWCMC.2016.7577191","DOI":"10.1109\/IWCMC.2016.7577191"},{"key":"1074_CR31","doi-asserted-by":"publisher","unstructured":"Chen Y, Wang Z-Y, Huang L (2016) Performance analysis of a non-beacon enabled IEEE 802.15.4 network with retransmission and ACK mode. arXiv:1609.01101. 1\u201348 https:\/\/doi.org\/10.1109\/LCOMM.2008.071870","DOI":"10.1109\/LCOMM.2008.071870"},{"issue":"6","key":"1074_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijcnis.2017.06.01","volume":"9","author":"I El Korbi","year":"2017","unstructured":"El Korbi I, Sa\u00efdane LA (2017) Performance evaluation of unslotted CSMA\/CA for wireless sensor networks: energy consumption analysis and cross layer routing. Int J Comput Netw Inf Secur 9(6):1\u201312. https:\/\/doi.org\/10.5815\/ijcnis.2017.06.01","journal-title":"Int J Comput Netw Inf Secur"},{"key":"1074_CR33","doi-asserted-by":"publisher","unstructured":"Tall H, Chalhoub G, Misson M (2015) Implementation of IEEE 802.15.4 unslotted CSMA\/CA protocol on contiki OS In: International conference on performance evaluation and modeling in wired and wireless networks, IJ of Engineering Research & Technology, Ed, no.\u00a04, pp 1\u20135. https:\/\/doi.org\/10.1007\/s12243-016-0522-y","DOI":"10.1007\/s12243-016-0522-y"},{"issue":"11","key":"1074_CR34","doi-asserted-by":"publisher","first-page":"2536","DOI":"10.1002\/dac.2487","volume":"27","author":"N Ullah","year":"2014","unstructured":"Ullah N, Chowdhury MS, Khan P, Kwak KS (2014) Multi-hop medium access control protocol for low energy critical infrastructure monitoring networks using wake-up radio. Int J Commun Syst 27(11):2536\u20132554. https:\/\/doi.org\/10.1002\/dac.2487","journal-title":"Int J Commun Syst"},{"issue":"3","key":"1074_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.2955","volume":"30","author":"S Okdem","year":"2017","unstructured":"Okdem S (2017) A real-time noise resilient data link layer mechanism for unslotted IEEE 802.15.4 networks. Int J Commun Syst 30(3):1\u201315. https:\/\/doi.org\/10.1002\/dac.2955","journal-title":"Int J Commun Syst"},{"issue":"5","key":"1074_CR36","doi-asserted-by":"publisher","first-page":"2281","DOI":"10.1109\/TII.2018.2802497","volume":"14","author":"MS Kiran","year":"2018","unstructured":"Kiran MS, Rajalakshmi P (2018) Performance analysis of CSMA\/CA and PCA for time critical industrial IoT applications. IEEE Trans Ind Inf 14(5):2281\u20132293. https:\/\/doi.org\/10.1109\/TII.2018.2802497","journal-title":"IEEE Trans Ind Inf"},{"issue":"5","key":"1074_CR37","doi-asserted-by":"publisher","first-page":"1343","DOI":"10.1007\/s11276-016-1226-y","volume":"23","author":"C Ouanteur","year":"2017","unstructured":"Ouanteur C, A\u00efssani D, Bouallouche-Medjkoune L, Yazid M, Castel-Taleb H (2017) Modeling and performance evaluation of the IEEE 802.15. 4e lldn mechanism designed for industrial applications in WSNS. Wireless Netw 23(5):1343\u20131358","journal-title":"Wireless Netw"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01074-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-022-01074-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-022-01074-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,16]],"date-time":"2022-07-16T16:13:03Z","timestamp":1657987983000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-022-01074-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,30]]},"references-count":37,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["1074"],"URL":"https:\/\/doi.org\/10.1007\/s00607-022-01074-5","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2022,3,30]]},"assertion":[{"value":"4 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}