{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T23:45:15Z","timestamp":1773445515162,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T00:00:00Z","timestamp":1680220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,31]],"date-time":"2023-03-31T00:00:00Z","timestamp":1680220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1007\/s10776-023-00594-x","type":"journal-article","created":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T11:41:54Z","timestamp":1680608514000},"page":"190-197","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Monitoring Passive Wireless Devices"],"prefix":"10.1007","volume":"30","author":[{"given":"Naor","family":"Zohar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,31]]},"reference":[{"key":"594_CR1","doi-asserted-by":"crossref","unstructured":"R. Ratasuk, B. Vejlgaard, N. Mangalvedhe, A. Ghosh, \u201cNB-IoT system for M2M communication\u201d, in IEEE WCNC, pp. 1\u20135, 2016.","DOI":"10.1109\/WCNC.2016.7564708"},{"key":"594_CR2","unstructured":"https:\/\/www.i-scoop.eu\/internet-of-things-guide\/lpwan."},{"key":"594_CR3","unstructured":"https:\/\/www.sigfox.com\/en."},{"key":"594_CR4","unstructured":"https:\/\/www.fitbit.com"},{"key":"594_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.3390\/s16010053","volume":"16","author":"T Zou","year":"2016","unstructured":"T. Zou, S. Lin, Q. Feng, and Y. Chen, Energy-efficient control with harvesting predictions for solar-powered wireless sensor networks, Sensors, Vol. 16, p. 53,  2016.","journal-title":"Sensors"},{"key":"594_CR6","first-page":"1","volume":"99","author":"M Dong","year":"2016","unstructured":"M. Dong, K. Ota, A. Liu, and M. Guo, Joint optimization of lifetime and transport delay under reliability constraint wireless sensors networks, IEEE Transactions on Parallel and Distributed Systems, Vol. 99, pp. 1\u201311, 2016.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"594_CR7","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1109\/TMC.2010.193","volume":"10","author":"S Gao","year":"2011","unstructured":"S. Gao, H. Zhang, and S.K. Das, Efficient data collection in wireless sensor networks with path-constrained mobile sinks, IEEE Transactions on Mobile Computing,  Vol. 10, pp. 592\u2013608, 2011.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"594_CR8","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s10846-015-0175-5","volume":"78","author":"DT Ho","year":"2015","unstructured":"D.T. Ho, E.I. Grtli, P.B. Sujit, T.A. Johansen, and J.B.D. Sousa, Optimization of wireless sensor network and UAV data acquisition, Journal of Intelligent and Robotic Systems, Vol. 78, pp. 159\u2013179, 2015.","journal-title":"Journal of Intelligent and Robotic Systems"},{"issue":"1","key":"594_CR9","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1109\/JSEN.2014.2347137","volume":"15","author":"AW Khan","year":"2015","unstructured":"A.W. Khan, A.H. Abdullah, M.A. Razzaque, and J.I.  Bangash, VGDRA: a virtual grid-based dynamic routes adjustment scheme for mobile sink-based wireless sensor networks, IEEE Sensors Journal,, Vol. 15, No. 1, pp. 526\u2013534, 2015.","journal-title":"IEEE Sensors Journal"},{"key":"594_CR10","doi-asserted-by":"crossref","unstructured":"T. Kimura, and M. Ogura, Distributed collaborative 3D-deployment of UAV base stations for on-demand coverage, in Proceedings of IEEE INFOCOM, 2020.","DOI":"10.1109\/INFOCOM41043.2020.9155283"},{"key":"594_CR11","doi-asserted-by":"crossref","unstructured":"S. Salarian, K.W. Chin, and F. Naghdy, An energy-efficient mobile-sink path selection strategy for wireless sensor networks, IEEE Transactions on Vehicular Technology, Vol. 63, No. 5, pp. 2407\u20132419, 2014.","DOI":"10.1109\/TVT.2013.2291811"},{"issue":"14","key":"594_CR12","doi-asserted-by":"publisher","first-page":"5785","DOI":"10.1109\/JSEN.2016.2568260","volume":"16","author":"S Say","year":"2016","unstructured":"S. Say, H. Inata, J. Liu, and S. Shimamoto, Priority-based data gathering framework in UAV-assisted wireless sensor networks, IEEE Sensors Journal, Vol. 16, No. 14, pp. 5785\u20135794, 2016.","journal-title":"IEEE Sensors Journal"},{"key":"594_CR13","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/TMC.2011.66","volume":"11","author":"G Xing","year":"2012","unstructured":"G. Xing, M. Li, and T. Wang, et al., Efficient rendezvous algorithms for mobility-enabled wireless sensor networks, IEEE Transactions on Mobile Computing, Vol. 11, pp. 47\u201360, 2012.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"594_CR14","doi-asserted-by":"crossref","unstructured":"L.L. Zheng, Q.L. Tang, and X. Li, An energy-balanced path plan strategy for mobile sensor networks, Applied Mechanics and Materials, pp. 65\u201369, 2015.","DOI":"10.4028\/www.scientific.net\/AMM.738-739.65"},{"key":"594_CR15","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.comcom.2017.07.010","volume":"111","author":"H Huang","year":"2017","unstructured":"H. Huang, and A.V.  Savkin, Viable path planning for data collection robots in a sensing field with obstacles, Computer Communication, Vol. 111, pp. 84\u201396","journal-title":"Computer Communication"},{"key":"594_CR16","unstructured":"Z. Naor, Efficient data gathering from passive wireless sensor networks, in Proceeding of Wireless Telecommunication Symposium (WTS) Conference, 2021."},{"key":"594_CR17","doi-asserted-by":"crossref","unstructured":"J. Zhang, Z. Wang, Z. Yang, and Q. Zhang, Proximity Based IoT device authentication, in  IEEE\/ACM INFOCOM, 2017.","DOI":"10.1109\/INFOCOM.2017.8057145"},{"key":"594_CR18","doi-asserted-by":"crossref","unstructured":"D. Trihinas, G. Pallis, and M.D. Dikaiakos, ADMIN: adaptive monitoring dissemination for the Internet of Things, in IEEE\/ACM INFOCOM, 2017.","DOI":"10.1109\/INFOCOM.2017.8057144"},{"key":"594_CR19","volume-title":"Dynamic Probabilistic Systems, Vol. 1 (Markov Models)","author":"RA Howard","year":"1971","unstructured":"R.A. Howard, Dynamic Probabilistic Systems,  Vol. 1 (Markov Models). Wiley, New York, 1971."},{"key":"594_CR20","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/0890-5401(89)90067-9","volume":"82","author":"A Sinclair","year":"1989","unstructured":"A. Sinclair, and M. Jerrum, Approximation counting, uniform generation and rapidly mixing Markov chains, Information and Computation, Vol. 82, pp. 93\u2013133, 1989.","journal-title":"Information and Computation"},{"key":"594_CR21","volume-title":"Non-negative Matrices and Markov Chains","author":"E Seneta","year":"2006","unstructured":"E. Seneta, Non-negative Matrices and Markov Chains, 2nd ed. Springer, New York, 2006.","edition":"2"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-023-00594-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10776-023-00594-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-023-00594-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T09:10:43Z","timestamp":1684487443000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10776-023-00594-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,31]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["594"],"URL":"https:\/\/doi.org\/10.1007\/s10776-023-00594-x","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"value":"1068-9605","type":"print"},{"value":"1572-8129","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,31]]},"assertion":[{"value":"2 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 January 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}