{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:48:21Z","timestamp":1762004901327},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T00:00:00Z","timestamp":1495065600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11235-017-0314-3","type":"journal-article","created":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T18:14:14Z","timestamp":1495131254000},"page":"31-46","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Mitigating false blocking problem in wireless ad hoc networks"],"prefix":"10.1007","volume":"67","author":[{"given":"Wai Kheong","family":"Chong","sequence":"first","affiliation":[]},{"given":"Micheal","family":"Drieberg","sequence":"additional","affiliation":[]},{"given":"Varun","family":"Jeoti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,18]]},"reference":[{"key":"314_CR1","volume-title":"Wireless ATM and ad-hoc networks: Protocols and architectures","author":"C Toh","year":"2012","unstructured":"Toh, C. (2012). Wireless ATM and ad-hoc networks: Protocols and architectures. Berlin: Springer Science & Business Media."},{"issue":"2","key":"314_CR2","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s11235-015-0024-7","volume":"60","author":"A Lee","year":"2015","unstructured":"Lee, A., & Ra, I. (2015). Network resource efficient routing in mobile ad hoc wireless networks. Telecommunication Systems, 60(2), 215\u2013223. doi:\n                        10.1007\/s11235-015-0024-7\n                        \n                    .","journal-title":"Telecommunication Systems"},{"issue":"1","key":"314_CR3","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11235-013-9758-2","volume":"55","author":"RE Rezagah","year":"2014","unstructured":"Rezagah, R. E., & Mohammadi, A. (2014). Analyzing the capacity of wireless ad hoc networks. Telecommunication Systems, 55(1), 159\u2013167. doi:\n                        10.1007\/s11235-013-9758-2\n                        \n                    .","journal-title":"Telecommunication Systems"},{"key":"314_CR4","unstructured":"IEEE 802.11. (2012). Wireless LAN media access control (MAC) and physical layer (PHY) specification."},{"issue":"12","key":"314_CR5","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1109\/TCOM.1975.1092767","volume":"23","author":"F Tobagi","year":"1975","unstructured":"Tobagi, F., & Kleinrock, L. (1975). Packet switching in radio channels: Part II\u2014The hidden terminal problem in carrier sense multiple-access and the busy-tone solution. IEEE Transaction on Communications, 23(12), 1417\u20131433.","journal-title":"IEEE Transaction on Communications"},{"issue":"1\u20132","key":"314_CR6","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s11235-009-9220-7","volume":"44","author":"B Lauwens","year":"2010","unstructured":"Lauwens, B., Scheers, B., & Van de Capelle, A. (2010). Performance analysis of unslotted CSMA\/CA in wireless networks. Telecommunication Systems, 44(1\u20132), 109\u2013123. doi:\n                        10.1007\/s11235-009-9220-7\n                        \n                    .","journal-title":"Telecommunication Systems"},{"issue":"4","key":"314_CR7","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1145\/190314.190334","volume":"24","author":"V Bharghavan","year":"1994","unstructured":"Bharghavan, V., Demers, A., Shenker, S., et al. (1994). MACAW: A media access protocol for wireless LAN\u2019s. Proceedings of ACM SIGCOMM, 24(4), 212\u2013225. doi:\n                        10.1145\/190314.190334\n                        \n                    .","journal-title":"Proceedings of ACM SIGCOMM"},{"issue":"2","key":"314_CR8","doi-asserted-by":"publisher","first-page":"95","DOI":"10.6029\/smarter.2012.02.001","volume":"2","author":"L Boroumand","year":"2012","unstructured":"Boroumand, L., Khokhar, R., Bakhtiar, L., et al. (2012). A review of techniques to resolve the hidden node problem in wireless networks. Proceedings of SmartCR, 2(2), 95\u2013110. doi:\n                        10.6029\/smarter.2012.02.001\n                        \n                    .","journal-title":"Proceedings of SmartCR"},{"issue":"8","key":"314_CR9","doi-asserted-by":"publisher","first-page":"2139","DOI":"10.1007\/s11276-010-248-0","volume":"16","author":"C Huang","year":"2010","unstructured":"Huang, C., Lea, C. T., & Wong, A. K. S. (2010). Rate matching: A new approach to hidden terminal problem in ad hoc networks. Wireless Networks, 16(8), 2139\u20132150. doi:\n                        10.1007\/s11276-010-248-0\n                        \n                    .","journal-title":"Wireless Networks"},{"key":"314_CR10","doi-asserted-by":"publisher","first-page":"4202","DOI":"10.1109\/TWC.2012.092712.120628","volume":"11","author":"W Lu","year":"2012","unstructured":"Lu, W., Kaishun, W., & Hamdi, M. (2012). Combating hidden and exposed terminal problems in wireless networks. IEEE Transactions on Wireless Communications, 11, 4202\u20134213. doi:\n                        10.1109\/TWC.2012.092712.120628\n                        \n                    .","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"11","key":"314_CR11","doi-asserted-by":"publisher","first-page":"3841","DOI":"10.1109\/TWC.2012.092712.100868","volume":"11","author":"K Nishide","year":"2012","unstructured":"Nishide, K., Kubo, H., Shinkuma, R., et al. (2012). Detecting hidden and exposed terminal problems in densely deployed wireless networks. IEEE Transactions on Wireless Communications, 11(11), 3841\u20133849. doi:\n                        10.1109\/TWC.2012.092712.100868\n                        \n                    .","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"314_CR12","doi-asserted-by":"publisher","first-page":"1516","DOI":"10.1109\/WCNC.2003.1200611","volume":"3","author":"S Ray","year":"2003","unstructured":"Ray, S., Carruthers, J., & Starobinski, D. (2003). RTS\/CTS-induced congestion in ad hoc wireless LANs. Proceedings of IEEE Wireless Communications and Networking Conference, 3, 1516\u20131521. doi:\n                        10.1109\/WCNC.2003.1200611\n                        \n                    .","journal-title":"Proceedings of IEEE Wireless Communications and Networking Conference"},{"issue":"2","key":"314_CR13","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TVT.2007.891476","volume":"56","author":"S Ray","year":"2007","unstructured":"Ray, S., & Starobinski, D. (2007). On false blocking in RTS\/CTS-based multihop wireless networks. IEEE Transactions of Vehicular Technology, 56(2), 849\u2013862. doi:\n                        10.1109\/TVT.2007.891476\n                        \n                    .","journal-title":"IEEE Transactions of Vehicular Technology"},{"key":"314_CR14","doi-asserted-by":"crossref","unstructured":"Lihong, D., Yan\u2019an, J. (2007). A novel MAC protocol for hidden receiver problem in ad hoc networks. In Proceedings of International Conference on Automation and Logistics, pp. 2345\u20132348.","DOI":"10.1109\/ICAL.2007.4338969"},{"key":"314_CR15","doi-asserted-by":"publisher","unstructured":"Lo, C., Kuo, C., Huang, Y., et al. (2008). A study on hidden receiver problem in mobile ad hoc networks. In Proceedings of Fourth International Conference on Wireless and Mobile Communications, pp. 49\u201354. doi:\n                        10.1109\/ICWMC.2008.43\n                        \n                    .","DOI":"10.1109\/ICWMC.2008.43"},{"key":"314_CR16","doi-asserted-by":"publisher","unstructured":"Singh, B., Tepe, K., Khalid, M. (2014). Control mechanism to solve false blocking problem at MAC layer in wireless sensor networks. In Proceedings of VLSI Design and 2014 13th International Conference on Embedded Systems, pp. 288\u2013293. doi:\n                        10.1109\/VLSID.2014.56\n                        \n                    .","DOI":"10.1109\/VLSID.2014.56"},{"issue":"2","key":"314_CR17","doi-asserted-by":"publisher","first-page":"107","DOI":"10.5626\/JCSE.2014.8.2.107","volume":"8","author":"A Matoba","year":"2014","unstructured":"Matoba, A., Hanada, M., Kanemisu, H., et al. (2014). Asymmetric RTS\/CTS for exposed node reduction in IEEE 802.11 ad hoc networks. Journal of Computing Science and Engineering (JCSE), 8(2), 107\u2013118. doi:\n                        10.5626\/JCSE.2014.8.2.107\n                        \n                    .","journal-title":"Journal of Computing Science and Engineering (JCSE)"},{"issue":"2","key":"314_CR18","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/s11036-011-0338-y","volume":"17","author":"J Alonso-Zarate","year":"2012","unstructured":"Alonso-Zarate, J., Alonso, L., Kormentzas, G., et al. (2012). Throughput analysis of a cooperative ARQ scheme in the presence of hidden and exposed terminals. Mobile Networks and Applications, 17(2), 258\u2013266. doi:\n                        10.1007\/s11036-011-0338-y\n                        \n                    .","journal-title":"Mobile Networks and Applications"},{"key":"314_CR19","doi-asserted-by":"publisher","unstructured":"Chong, K., Drieberg, M., Jeoti, V. (2012). Mitigating false blocking problem in wireless sensor networks. In Proceedings of International Conference on Intelligent and Advanced Systems (ICIAS2012), pp. 1\u20135. doi:\n                        10.1109\/ICIAS.2012.6306197\n                        \n                    .","DOI":"10.1109\/ICIAS.2012.6306197"},{"issue":"5","key":"314_CR20","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1109\/TMC.2005.66","volume":"4","author":"S Ray","year":"2005","unstructured":"Ray, S., Carruthers, J., & Starobinski, D. (2005). Evaluation of the masked node problem in ad-hoc wireless LANs. Proceedings of IEEE Transaction Mobile Computing, 4(5), 430\u2013442.","journal-title":"Proceedings of IEEE Transaction Mobile Computing"},{"key":"314_CR21","doi-asserted-by":"publisher","unstructured":"Chong, K., Drieberg, M., Jeoti, V. (2014). A dynamic blocking notification (BN) scheme with strategic nodes for wireless ad hoc networks. In Proceedings of IEEE 79th Vehicular Technology Conference (VTC2014-Spring), pp. 1\u20135. doi:\n                        10.1109\/VTCSpring.2014.7022774\n                        \n                    .","DOI":"10.1109\/VTCSpring.2014.7022774"},{"key":"314_CR22","unstructured":"https:\/\/omnetpp.org\n                        \n                    . Accessed Jan 2017."},{"issue":"1","key":"314_CR23","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s11277-014-1846-4","volume":"79","author":"F Larroca","year":"2014","unstructured":"Larroca, F., & Rodr\u00edguez, F. (2014). An overview of WLAN performance, some important case-scenarios and their associated models. Wireless Personal Communications, 79(1), 131\u2013184. doi:\n                        10.1007\/s11277-014-1846-4\n                        \n                    .","journal-title":"Wireless Personal Communications"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-017-0314-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-017-0314-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-017-0314-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,8]],"date-time":"2018-01-08T17:27:08Z","timestamp":1515432428000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-017-0314-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,18]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["314"],"URL":"https:\/\/doi.org\/10.1007\/s11235-017-0314-3","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,18]]}}}