{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:25:44Z","timestamp":1757543144799,"version":"3.37.3"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11276-019-02177-2","type":"journal-article","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T15:05:45Z","timestamp":1572620745000},"page":"699-721","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Design and evaluation of an LQI-based beaconless routing protocol for a heterogeneous MSN"],"prefix":"10.1007","volume":"26","author":[{"given":"Muhammad Taufiq","family":"Nuruzzaman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0987-6837","authenticated-orcid":false,"given":"Huei-Wen","family":"Ferng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,1]]},"reference":[{"issue":"7","key":"2177_CR1","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.3390\/s17071587","volume":"17","author":"U Burgos","year":"2017","unstructured":"Burgos, U., Amozarrain, U., G\u00f3mez-Calzado, C., & Lafuente, A. (2017). Routing in mobile wireless sensor networks: A leader-based approach. Sensors, 17(7), 1587. \nhttps:\/\/doi.org\/10.3390\/s17071587\n\n.","journal-title":"Sensors"},{"issue":"10","key":"2177_CR2","doi-asserted-by":"publisher","first-page":"1341","DOI":"10.1002\/dac.2315","volume":"26","author":"L Shi","year":"2013","unstructured":"Shi, L., Zhang, B., Mouftah, H. T., & Ma, J. (2013). DDRP: An efficient data-driven routing protocol for wireless sensor networks with mobile sinks. International Journal of Communication Systems, 26(10), 1341\u20131355. \nhttps:\/\/doi.org\/10.1002\/dac.2315\n\n.","journal-title":"International Journal of Communication Systems"},{"issue":"4","key":"2177_CR3","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1109\/TMC.2017.2742948","volume":"17","author":"Xiaoqing Hu","year":"2018","unstructured":"Hu, X., Bao, M., Zhang, X.P., Wen, S., Li, X., & Hu, Y.H., Quantized kalman filter tracking in directional sensor networks. IEEE Transactions on Mobile Computing (in press). \nhttps:\/\/doi.org\/10.1109\/TMC.2017.2742948\n\n.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"2177_CR4","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1109\/TCYB.2016.2519939","volume":"47","author":"H Mahboubi","year":"2017","unstructured":"Mahboubi, H., Masoudimansour, W., Aghdam, A. G., & Sayrafian-Pour, K. (2017). An energy-efficient target-tracking strategy for mobile sensor networks. IEEE Transactions on Cybernetics, 47(2), 511\u2013523. \nhttps:\/\/doi.org\/10.1109\/TCYB.2016.2519939\n\n.","journal-title":"IEEE Transactions on Cybernetics"},{"issue":"12","key":"2177_CR5","doi-asserted-by":"publisher","first-page":"2534","DOI":"10.1109\/LCOMM.2016.2612652","volume":"20","author":"JP Dominguez-Morales","year":"2016","unstructured":"Dominguez-Morales, J. P., Rios-Navarro, A., Dominguez-Morales, M., Tapiador-Morales, R., Gutierrez-Galan, D., Cascado-Caballero, D., et al. (2016). Wireless sensor network for wildlife tracking and behavior classification of animals in Donana. IEEE Communications Letters, 20(12), 2534\u20132537. \nhttps:\/\/doi.org\/10.1109\/LCOMM.2016.2612652\n\n.","journal-title":"IEEE Communications Letters"},{"issue":"9","key":"2177_CR6","doi-asserted-by":"publisher","first-page":"2436","DOI":"10.1109\/TMC.2016.2636832","volume":"16","author":"HP Gupta","year":"2017","unstructured":"Gupta, H. P., Venkatesh, T., Rao, S. V., Dutta, T., & Iyer, R. R. (2017). Analysis of coverage under border effects in three-dimensional mobile sensor networks. IEEE Transactions on Mobile Computing, 16(9), 2436\u20132449. \nhttps:\/\/doi.org\/10.1109\/TMC.2016.2636832\n\n.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"10","key":"2177_CR7","doi-asserted-by":"publisher","first-page":"3958","DOI":"10.1109\/JSEN.2016.2537840","volume":"16","author":"DV Le","year":"2016","unstructured":"Le, D. V., Oh, H., & Yoon, S. (2016). Environment learning-based coverage maximization with connectivity constraints in mobile sensor networks. IEEE Sensors Journal, 16(10), 3958\u20133971. \nhttps:\/\/doi.org\/10.1109\/JSEN.2016.2537840\n\n.","journal-title":"IEEE Sensors Journal"},{"issue":"2","key":"2177_CR8","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1109\/SURV.2013.100113.00293","volume":"16","author":"C Tunca","year":"2014","unstructured":"Tunca, C., Isik, S., Donmez, M., & Ersoy, C. (2014). Distributed mobile sink routing for wireless sensor networks: A survey. IEEE Communications Surveys Tutorials, 16(2), 877\u2013897. \nhttps:\/\/doi.org\/10.1109\/SURV.2013.100113.00293\n\n.","journal-title":"IEEE Communications Surveys Tutorials"},{"issue":"7","key":"2177_CR9","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1109\/MCOM.2014.6852097","volume":"52","author":"S Yu","year":"2014","unstructured":"Yu, S., Zhang, B., Li, C., & Mouftah, H. (2014). Routing protocols for wireless sensor networks with mobile sinks: A survey. IEEE Communications Magazine, 52(7), 150\u2013157. \nhttps:\/\/doi.org\/10.1109\/MCOM.2014.6852097\n\n.","journal-title":"IEEE Communications Magazine"},{"issue":"9","key":"2177_CR10","doi-asserted-by":"publisher","first-page":"1308","DOI":"10.1109\/TMC.2010.76","volume":"9","author":"Y Yun","year":"2010","unstructured":"Yun, Y., & Xia, Y. (2010). Maximizing the lifetime of wireless sensor networks with mobile sink in delay-tolerant applications. IEEE Transactions on Mobile Computing, 9(9), 1308\u20131318. \nhttps:\/\/doi.org\/10.1109\/TMC.2010.76\n\n.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"10","key":"2177_CR11","doi-asserted-by":"publisher","first-page":"1920","DOI":"10.1109\/TMC.2012.152","volume":"12","author":"Y Yun","year":"2013","unstructured":"Yun, Y., Xia, Y., Behdani, B., & Smith, J. C. (2013). Distributed algorithm for lifetime maximization in a delay-tolerant wireless sensor network with a mobile sink. IEEE Transactions on Mobile Computing, 12(10), 1920\u20131930. \nhttps:\/\/doi.org\/10.1109\/TMC.2012.152\n\n.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"10","key":"2177_CR12","doi-asserted-by":"publisher","first-page":"3305","DOI":"10.1109\/TITS.2017.2778939","volume":"19","author":"D Jiang","year":"2018","unstructured":"Jiang, D., Huo, L., Lv, Z., Song, H., & Qin, W. (2018). A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Transactions on Intelligent Transportation Systems, 19(10), 3305\u20133319. \nhttps:\/\/doi.org\/10.1109\/TITS.2017.2778939\n\n.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"2177_CR13","unstructured":"Moteiv Corporation: TMote Sky: Ultra low power ieee 802.15.4 compliant wireless sensor module (2006). \nhttp:\/\/www.snm.ethz.ch\/Projects\/TmoteSky\n\n."},{"key":"2177_CR14","unstructured":"Texas Instruments: CC2538 Powerful Wireless Microcontroller System-On-Chip for 2.4-GHz IEEE 802.15.4,6LoWPAN, and ZigBee$$\\textregistered $$ Applications (2015). \nhttp:\/\/www.ti.com\/lit\/ds\/symlink\/cc2538.pdf\n\n."},{"key":"2177_CR15","unstructured":"Texas Instruments: CC2640 SimpleLink$$^{{tm}}$$ Bluetooth$$\\textregistered $$ Wireless MCU (2016). \nhttp:\/\/www.ti.com\/lit\/ds\/symlink\/cc2640.pdf\n\n."},{"issue":"6","key":"2177_CR16","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1109\/JIOT.2016.2613111","volume":"3","author":"D Jiang","year":"2016","unstructured":"Jiang, D., Zhang, P., Lv, Z., & Song, H. (2016). Energy-efficient multi-constraint routing algorithm with load balancing for smart city applications. IEEE Internet of Things Journal, 3(6), 1437\u20131447. \nhttps:\/\/doi.org\/10.1109\/JIOT.2016.2613111\n\n.","journal-title":"IEEE Internet of Things Journal"},{"key":"2177_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2014.09.007","volume":"47","author":"A Moussaoui","year":"2015","unstructured":"Moussaoui, A., & Boukeream, A. (2015). A survey of routing protocols based on link-stability in mobile ad hoc networks. Journal of Network and Computer Applications, 47, 1\u201310. \nhttps:\/\/doi.org\/10.1016\/j.jnca.2014.09.007\n\n.","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"2177_CR18","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1007\/s11036-018-1089-9","volume":"24","author":"M Noura","year":"2019","unstructured":"Noura, M., Atiquzzaman, M., & Gaedke, M. (2019). Interoperability in Internet of Things: Taxonomies and open challenges. Mobile Networks and Applications, 24(3), 796\u2013809. \nhttps:\/\/doi.org\/10.1007\/s11036-018-1089-9\n\n.","journal-title":"Mobile Networks and Applications"},{"key":"2177_CR19","doi-asserted-by":"publisher","unstructured":"Nguyen, L. T., Defago, X., Beuran, R., & Shinoda, Y. (2008) An energy efficient routing scheme for mobile wireless sensor networks. In Proceedings of the IEEE international symposium on wireless communication systems (pp. 568\u2013572). \nhttps:\/\/doi.org\/10.1109\/ISWCS.2008.4726120\n\n.","DOI":"10.1109\/ISWCS.2008.4726120"},{"key":"2177_CR20","doi-asserted-by":"publisher","unstructured":"Kumar, G. S., Vinu, P. M. V., & Jacob, K. P. (2008). Mobility metric based LEACH-Mobile protocol. In Proceedings of the international conference on advanced computing and communications (pp. 248\u2013253). \nhttps:\/\/doi.org\/10.1109\/ADCOM.2008.4760456\n\n.","DOI":"10.1109\/ADCOM.2008.4760456"},{"key":"2177_CR21","unstructured":"Carroll, A., & Heiser, G. (2010) An analysis of power consumption in a smartphone. In Proceedings of the USENIX conference on USENIX annual technical conference (pp. 21\u201321)."},{"key":"2177_CR22","unstructured":"PackStatus: GPS tracking and sensoring devices (2019). \nhttps:\/\/www.packstatus.com\/gps-tracking-sensoring-devices\/\n\n."},{"issue":"1","key":"2177_CR23","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MCOM.2014.6710069","volume":"52","author":"M Conti","year":"2014","unstructured":"Conti, M., & Giordano, S. (2014). Mobile ad hoc networking: Milestones, challenges, and new research directions. IEEE Communications Magazine, 52(1), 85\u201396. \nhttps:\/\/doi.org\/10.1109\/MCOM.2014.6710069\n\n.","journal-title":"IEEE Communications Magazine"},{"key":"2177_CR24","doi-asserted-by":"publisher","unstructured":"Alexander, R., Brandt, A., Vasseur, J., Hui, J., Pister, K., Thubert, P., Levis, P., Struik, R., Kelsey, R., & Winter, T. (2012). RPL: IPv6 routing protocol for low-power and lossy networks. RFC 6550. \nhttps:\/\/doi.org\/10.17487\/RFC6550\n\n. \nhttps:\/\/rfc-editor.org\/rfc\/rfc6550.txt\n\n.","DOI":"10.17487\/RFC6550"},{"key":"2177_CR25","doi-asserted-by":"publisher","unstructured":"Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017) Performance evaluation of RPL protocol under mobile sybil attacks. In Proceedings of the IEEE international conference on trust, security and privacy in computing and communications (pp. 1049\u20131055). \nhttps:\/\/doi.org\/10.1109\/Trustcom\/BigDataSE\/ICESS.2017.351\n\n.","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.351"},{"key":"2177_CR26","doi-asserted-by":"publisher","unstructured":"Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015). Performance evaluation of the RPL protocol in fixed and mobile sink low-power and lossy-networks. In Proceedings of the IEEE international conference on ubiquitous computing and communications (pp. 1600\u20131605). \nhttps:\/\/doi.org\/10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.241\n\n.","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.241"},{"issue":"1","key":"2177_CR27","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s11235-013-9766-2","volume":"57","author":"GS Sara","year":"2014","unstructured":"Sara, G. S., & Sridharan, D. (2014). Routing in mobile wireless sensor network: A survey. Telecommunication Systems, 57(1), 51\u201379. \nhttps:\/\/doi.org\/10.1007\/s11235-013-9766-2\n\n.","journal-title":"Telecommunication Systems"},{"key":"2177_CR28","doi-asserted-by":"publisher","unstructured":"Nuruzzaman, M. T., & Ferng, H. W. (2016) A low energy consumption routing protocol for mobile sensor networks with a path-constrained mobile sink. In Proceedings of the IEEE international conference on communications (ICC) (pp. 1\u20136). \nhttps:\/\/doi.org\/10.1109\/ICC.2016.7511316\n\n.","DOI":"10.1109\/ICC.2016.7511316"},{"key":"2177_CR29","doi-asserted-by":"publisher","unstructured":"Borsani, L., Guglielmi, S., Redondi, A., & Cesana, M. (2011) Tree-based routing protocol for mobile wireless sensor networks. In Proceedings of the international conference on wireless on-demand network systems and services (pp. 164\u2013170). \nhttps:\/\/doi.org\/10.1109\/WONS.2011.5720188\n\n.","DOI":"10.1109\/WONS.2011.5720188"},{"issue":"3","key":"2177_CR30","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TMC.2016.2563435","volume":"16","author":"TY Lin","year":"2017","unstructured":"Lin, T. Y., Santoso, H. A., Wu, K. R., & Wang, G. L. (2017). Enhanced deployment algorithms for heterogeneous directional mobile sensors in a bounded monitoring area. IEEE Transactions on Mobile Computing, 16(3), 744\u2013758. \nhttps:\/\/doi.org\/10.1109\/TMC.2016.2563435\n\n.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"3","key":"2177_CR31","doi-asserted-by":"publisher","first-page":"2235","DOI":"10.1007\/s11277-014-1635-0","volume":"77","author":"S Cakici","year":"2014","unstructured":"Cakici, S., Erturk, I., Atmaca, S., & Karahan, A. (2014). A novel cross-layer routing protocol for increasing packet transfer reliability in mobile sensor networks. Wireless Personal Communications, 77(3), 2235\u20132254. \nhttps:\/\/doi.org\/10.1007\/s11277-014-1635-0\n\n.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"2177_CR32","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1016\/j.comnet.2007.10.004","volume":"52","author":"TJ Chang","year":"2008","unstructured":"Chang, T. J., Wang, K., & Hsieh, Y. L. (2008). A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks. Computer Networks, 52(3), 531\u2013541. \nhttps:\/\/doi.org\/10.1016\/j.comnet.2007.10.004\n\n.","journal-title":"Computer Networks"},{"key":"2177_CR33","doi-asserted-by":"publisher","unstructured":"Choi, L., Jung, J., Cho, B., & Choi, H. (2008). M-Geocast: Robust and energy-efficient geometric routing for mobile sensor networks. In Proceedings of the IFIP international workshop on software technologies for embedded and ubiquitous systems (pp. 304\u2013316). \nhttps:\/\/doi.org\/10.1109\/MOBHOC.2007.4428612\n\n.","DOI":"10.1109\/MOBHOC.2007.4428612"},{"key":"2177_CR34","doi-asserted-by":"publisher","unstructured":"Huo, G., & Wang, X. (2008) An opportunistic routing for mobile wireless sensor networks based on RSSI. In Proceedings of the international conference on wireless communications, networking and mobile computing (pp. 1\u20134). \nhttps:\/\/doi.org\/10.1109\/WiCom.2008.955\n\n.","DOI":"10.1109\/WiCom.2008.955"},{"key":"2177_CR35","doi-asserted-by":"publisher","unstructured":"Karp, B., & Kung, H.T. (2000) GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the international conference on mobile computing and networking (MobiCom), MobiCom \u201900 (pp. 243\u2013254). ACM, New York, NY, USA. \nhttps:\/\/doi.org\/10.1145\/345910.345953\n\n.","DOI":"10.1145\/345910.345953"},{"issue":"5","key":"2177_CR36","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/TMC.2013.133","volume":"13","author":"Y Komai","year":"2014","unstructured":"Komai, Y., Sasaki, Y., Hara, T., & Nishio, S. (2014). KNN query processing methods in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 13(5), 1090\u20131103. \nhttps:\/\/doi.org\/10.1109\/TMC.2013.133\n\n.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"12","key":"2177_CR37","doi-asserted-by":"publisher","first-page":"2440","DOI":"10.1109\/TC.2012.148","volume":"62","author":"S Ruhrup","year":"2013","unstructured":"Ruhrup, S., & Stojmenovic, I. (2013). Optimizing communication overhead while reducing path length in beaconless georouting with guaranteed delivery for wireless sensor networks. IEEE Transactions on Computers, 62(12), 2440\u20132453. \nhttps:\/\/doi.org\/10.1109\/TC.2012.148\n\n.","journal-title":"IEEE Transactions on Computers"},{"key":"2177_CR38","doi-asserted-by":"publisher","unstructured":"Keally, M., Zhou, G., & Xing, G. (2009) Sidewinder: A predictive data forwarding protocol for mobile wireless sensor networks. In Proceedings of the IEEE conference on sensor, mesh and ad hoc communications and networks (pp. 1\u20139). \nhttps:\/\/doi.org\/10.1109\/SAHCN.2009.5168972\n\n.","DOI":"10.1109\/SAHCN.2009.5168972"},{"issue":"4","key":"2177_CR39","doi-asserted-by":"publisher","first-page":"295","DOI":"10.3233\/MIS-130164","volume":"9","author":"K Goto","year":"2013","unstructured":"Goto, K., Sasaki, Y., Hara, T., & Nishio, S. (2013). Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks. Mobile Information Systems, 9(4), 295\u2013314. \nhttps:\/\/doi.org\/10.3233\/MIS-130164\n\n.","journal-title":"Mobile Information Systems"},{"issue":"7","key":"2177_CR40","doi-asserted-by":"publisher","first-page":"979086","DOI":"10.1155\/2014\/979086","volume":"10","author":"Saifullah Khalid","year":"2014","unstructured":"Khalid, S., Masood, A., Hussain, F. B., Abbas, H., & Ghafoor, A. (2014) Load balanced routing for lifetime maximization in mobile wireless sensor networks. International Journal of Distributed Sensor Networks. \nhttps:\/\/doi.org\/10.1155\/2014\/979086\n\n.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"12","key":"2177_CR41","doi-asserted-by":"publisher","first-page":"5278","DOI":"10.1109\/T-WC.2008.060680","volume":"7","author":"X Huang","year":"2008","unstructured":"Huang, X., Zhai, H., & Fang, Y. (2008). Robust cooperative routing protocol in mobile wireless sensor networks. IEEE Transactions on Wireless Communications, 7(12), 5278\u20135285. \nhttps:\/\/doi.org\/10.1109\/T-WC.2008.060680\n\n.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2177_CR42","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.pmcj.2015.04.005","volume":"21","author":"T Hayes","year":"2015","unstructured":"Hayes, T., & Ali, F. (2015). Proactive highly ambulatory sensor routing (PHASeR) protocol for mobile wireless sensor networks. Pervasive and Mobile Computing, 21, 47\u201361. \nhttps:\/\/doi.org\/10.1016\/j.pmcj.2015.04.005\n\n.","journal-title":"Pervasive and Mobile Computing"},{"key":"2177_CR43","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.adhoc.2016.07.013","volume":"50","author":"T Hayes","year":"2016","unstructured":"Hayes, T., & Ali, F. (2016). Robust ad-hoc sensor routing (RASeR) protocol for mobile wireless sensor networks. Ad Hoc Networks, 50, 128\u2013144. \nhttps:\/\/doi.org\/10.1016\/j.adhoc.2016.07.013\n\n.","journal-title":"Ad Hoc Networks"},{"key":"2177_CR44","doi-asserted-by":"publisher","unstructured":"Raju, M., Oliveira, T., & Agrawal, D. P. (2012) A practical distance estimator through distributed RSSI\/LQI processing: An experimental study. In Proceedings of the IEEE international conference on communications (ICC) (pp. 6575\u20136579). \nhttps:\/\/doi.org\/10.1109\/ICC.2012.6364794\n\n.","DOI":"10.1109\/ICC.2012.6364794"},{"key":"2177_CR45","doi-asserted-by":"publisher","first-page":"1159","DOI":"10.1007\/978-3-319-00536-2_132","volume-title":"The Proceedings of the Second International Conference on Communications, Signal Processing, and Systems","author":"Yu Xiang","year":"2013","unstructured":"Xiang, Y., Li, J., & Wang, W. (2013) Research on distance measurement based on LQI. In Procedings of the international conference on communications, signal processing, and systems (pp. 1159\u20131171). \nhttps:\/\/doi.org\/10.1007\/978-3-319-00536-2_132\n\n."},{"issue":"1","key":"2177_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2617662","volume":"47","author":"YC Wang","year":"2014","unstructured":"Wang, Y. C. (2014). Mobile sensor networks. ACM Computing Surveys, 47(1), 1\u201336. \nhttps:\/\/doi.org\/10.1145\/2617662\n\n.","journal-title":"ACM Computing Surveys"},{"key":"2177_CR47","unstructured":"IEEE: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs) (2006). \nhttps:\/\/standards.ieee.org\/standard\/802_15_4-2006.html\n\n."},{"issue":"5","key":"2177_CR48","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1109\/TMC.2009.159","volume":"9","author":"P De","year":"2010","unstructured":"De, P., Liu, Y., & Das, S. K. (2010). Energy-efficient reprogramming of a swarm of mobile sensors. IEEE Transactions on Mobile Computing, 9(5), 703\u2013718. \nhttps:\/\/doi.org\/10.1109\/TMC.2009.159\n\n.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2177_CR49","unstructured":"Alliance, Z. (2012). Zigbee specification. \nhttp:\/\/www.zigbee.org\/wp-content\/uploads\/2014\/11\/docs-05-3474-20-0csg-zigbee-specification.pdf\n\n."},{"issue":"1","key":"2177_CR50","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.adhoc.2009.04.014","volume":"8","author":"T Braun","year":"2010","unstructured":"Braun, T., Heissenb\u00fcttel, M., & Roth, T. (2010). Performance of the beacon-less routing protocol in realistic scenarios. Ad Hoc Networks, 8(1), 96\u2013107. \nhttps:\/\/doi.org\/10.1016\/j.adhoc.2009.04.014\n\n.","journal-title":"Ad Hoc Networks"},{"key":"2177_CR51","doi-asserted-by":"publisher","unstructured":"Noureddine, H., Ni, Q., & Al-Raweshidy, H. (2010) SS-CBF: Sender-based suppression algorithm for contention-based forwarding in mobile ad-hoc networks. In Proceedings of the IEEE international symposium on personal, indoor and mobile radio communications (PIMRC) (pp. 1810\u20131813). \nhttps:\/\/doi.org\/10.1109\/PIMRC.2010.5671638\n\n.","DOI":"10.1109\/PIMRC.2010.5671638"},{"issue":"2","key":"2177_CR52","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/54.914626","volume":"18","author":"A Sinha","year":"2001","unstructured":"Sinha, A., & Chandrakasan, A. (2001). Dynamic power management in wireless sensor networks. IEEE Design Test of Computers, 18(2), 62\u201374. \nhttps:\/\/doi.org\/10.1109\/54.914626\n\n.","journal-title":"IEEE Design Test of Computers"},{"issue":"6","key":"2177_CR53","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MWC.2007.4407226","volume":"14","author":"A Fallahi","year":"2007","unstructured":"Fallahi, A., & Hossain, E. (2007). Qos provisioning in wireless video sensor networks: a dynamic power management framework. IEEE Wireless Communications, 14(6), 40\u201349. \nhttps:\/\/doi.org\/10.1109\/MWC.2007.4407226\n\n.","journal-title":"IEEE Wireless Communications"},{"issue":"5","key":"2177_CR54","doi-asserted-by":"publisher","first-page":"1518","DOI":"10.1109\/JSEN.2011.2174149","volume":"12","author":"W Dargie","year":"2012","unstructured":"Dargie, W. (2012). Dynamic power management in wireless sensor networks: State-of-the-art. IEEE Sensors Journal, 12(5), 1518\u20131528. \nhttps:\/\/doi.org\/10.1109\/JSEN.2011.2174149\n\n.","journal-title":"IEEE Sensors Journal"},{"issue":"15","key":"2177_CR55","doi-asserted-by":"publisher","first-page":"3625","DOI":"10.1016\/j.comcom.2008.06.019","volume":"31","author":"PS Sausen","year":"2008","unstructured":"Sausen, P. S., de Brito Sousa, J. R., Spohn, M. A., Perkusich, A., & Lima, A. M. N. (2008). Dynamic power management with scheduled switching modes. Computer Communications, 31(15), 3625\u20133637. \nhttps:\/\/doi.org\/10.1016\/j.comcom.2008.06.019\n\n.","journal-title":"Computer Communications"},{"issue":"9","key":"2177_CR56","doi-asserted-by":"publisher","first-page":"3104","DOI":"10.1109\/TIM.2009.2016882","volume":"58","author":"F Salvadori","year":"2009","unstructured":"Salvadori, F., de Campos, M., Sausen, P. S., de Camargo, R. F., Gehrke, C., Rech, C., et al. (2009). Monitoring in industrial systems using wireless sensor network with dynamic power management. IEEE Transactions on Instrumentation and Measurement, 58(9), 3104\u20133111. \nhttps:\/\/doi.org\/10.1109\/TIM.2009.2016882\n\n.","journal-title":"IEEE Transactions on Instrumentation and Measurement"},{"issue":"2","key":"2177_CR57","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/TETC.2014.2316518","volume":"2","author":"RC Hsu","year":"2014","unstructured":"Hsu, R. C., Liu, C., & Wang, H. (2014). A reinforcement learning-based tod provisioning dynamic power management for sustainable operation of energy harvesting wireless sensor node. IEEE Transactions on Emerging Topics in Computing, 2(2), 181\u2013191. \nhttps:\/\/doi.org\/10.1109\/TETC.2014.2316518\n\n.","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"2177_CR58","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.compeleceng.2017.06.010","volume":"65","author":"X Chen","year":"2018","unstructured":"Chen, X., Ma, M., & Liu, A. (2018). Dynamic power management and adaptive packet size selection for iot in e-healthcare. Computers and Electrical Engineering, 65, 357\u2013375. \nhttps:\/\/doi.org\/10.1016\/j.compeleceng.2017.06.010\n\n.","journal-title":"Computers and Electrical Engineering"},{"issue":"2","key":"2177_CR59","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1109\/LCOMM.2011.120211.111501","volume":"16","author":"H Yoo","year":"2012","unstructured":"Yoo, H., Shim, M., & Kim, D. (2012). Dynamic duty-cycle scheduling schemes for energy-harvesting wireless sensor networks. IEEE Communications Letters, 16(2), 202\u2013204. \nhttps:\/\/doi.org\/10.1109\/LCOMM.2011.120211.111501\n\n.","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"2177_CR60","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/TII.2015.2508745","volume":"12","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Li, Z., & Tang, S. (2016). Value of information aware opportunistic duty cycling in solar harvesting sensor networks. IEEE Transactions on Industrial Informatics, 12(1), 348\u2013360. \nhttps:\/\/doi.org\/10.1109\/TII.2015.2508745\n\n.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"2177_CR61","doi-asserted-by":"publisher","first-page":"101966","DOI":"10.1016\/j.adhoc.2019.101966","volume":"94","author":"H Sharma","year":"2019","unstructured":"Sharma, H., Haque, A., & Jaffery, Z. A. (2019). Maximization of wireless sensor network lifetime using solar energy harvesting for smart agriculture monitoring. Ad Hoc Networks, 94, 101966. \nhttps:\/\/doi.org\/10.1016\/j.adhoc.2019.101966\n\n.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"2177_CR62","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1007\/s11276-014-0827-6","volume":"21","author":"SH Lee","year":"2015","unstructured":"Lee, S. H., & Choi, L. (2015). Speed-mac: speedy and energy efficient data delivery mac protocol for real-time sensor network applications. Wireless Networks, 21(3), 883\u2013898. \nhttps:\/\/doi.org\/10.1007\/s11276-014-0827-6\n\n.","journal-title":"Wireless Networks"},{"issue":"3","key":"2177_CR63","doi-asserted-by":"publisher","first-page":"863","DOI":"10.1007\/s11277-016-3581-5","volume":"92","author":"AK Subramanian","year":"2017","unstructured":"Subramanian, A. K., & Paramasivam, I. (2017). Prin: A priority-based energy efficient mac protocol for wireless sensor networks varying the sample inter-arrival time. Wireless Personal Communications, 92(3), 863\u2013881. \nhttps:\/\/doi.org\/10.1007\/s11277-016-3581-5\n\n.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"2177_CR64","doi-asserted-by":"publisher","first-page":"1223","DOI":"10.1007\/s12652-017-0557-6","volume":"9","author":"I Ryoo","year":"2018","unstructured":"Ryoo, I., Sun, K., Lee, J., & Kim, S. (2018). A 3-dimensional group management mac scheme for mobile iot devices in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 9(4), 1223\u20131234. \nhttps:\/\/doi.org\/10.1007\/s12652-017-0557-6\n\n.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"4","key":"2177_CR65","doi-asserted-by":"publisher","first-page":"2533","DOI":"10.1007\/s11235-011-9571-8","volume":"52","author":"YS Wong","year":"2013","unstructured":"Wong, Y. S., Chen, Y. S., Deng, D. J., & Huang, D. C. (2013). Nonpreemptive priority scheme for the s-mac protocol in multimedia mobile sensor networks. Telecommunication Systems, 52(4), 2533\u20132540. \nhttps:\/\/doi.org\/10.1007\/s11235-011-9571-8\n\n.","journal-title":"Telecommunication Systems"},{"issue":"2","key":"2177_CR66","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/LSENS.2018.2828339","volume":"2","author":"X Yang","year":"2018","unstructured":"Yang, X., Wang, L., Su, J., & Gong, Y. (2018). Hybrid mac protocol design for mobile wireless sensors networks. IEEE Sensors Letters, 2(2), 1\u20134. \nhttps:\/\/doi.org\/10.1109\/LSENS.2018.2828339\n\n.","journal-title":"IEEE Sensors Letters"},{"issue":"4","key":"2177_CR67","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s11277-009-9848-3","volume":"56","author":"FR Armaghani","year":"2011","unstructured":"Armaghani, F. R., Jamuar, S. S., Khatun, S., & Rasid, M. F. A. (2011). Performance analysis of tcp with delayed acknowledgments in multi-hop ad-hoc networks. Wireless Personal Communications, 56(4), 791\u2013811. \nhttps:\/\/doi.org\/10.1007\/s11277-009-9848-3\n\n.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"2177_CR68","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s11277-012-0575-9","volume":"69","author":"AM Al-Jubari","year":"2013","unstructured":"Al-Jubari, A. M., Othman, M., Mohd Ali, B., & Abdul Hamid, N. A. W. (2013). An adaptive delayed acknowledgment strategy to improve tcp performance in multi-hop wireless networks. Wireless Personal Communications, 69(1), 307\u2013333. \nhttps:\/\/doi.org\/10.1007\/s11277-012-0575-9\n\n.","journal-title":"Wireless Personal Communications"},{"key":"2177_CR69","unstructured":"NSNAM: ns-3 (2016). \nhttps:\/\/www.nsnam.org\/ns-3-25\/\n\n."},{"issue":"5","key":"2177_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0194302","volume":"13","author":"D Jiang","year":"2018","unstructured":"Jiang, D., Huo, L., & Li, Y. (2018). Fine-granularity inference and estimations to network traffic for SDN. Plos One, 13(5), 1\u201323. \nhttps:\/\/doi.org\/10.1371\/journal.pone.0194302\n\n.","journal-title":"Plos One"},{"issue":"5","key":"2177_CR71","doi-asserted-by":"publisher","first-page":"3046","DOI":"10.1109\/ACCESS.2016.2573264","volume":"4","author":"D Jiang","year":"2016","unstructured":"Jiang, D., Nie, L., Lv, Z., & Song, H. (2016). Spatio-temporal kronecker compressive sensing for traffic matrix recovery. IEEE Access, 4(5), 3046\u20133053. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2016.2573264\n\n.","journal-title":"IEEE Access"},{"key":"2177_CR72","doi-asserted-by":"publisher","unstructured":"Jiang, D., Wang, W., Shi, L., & Song, H.: A compressive sensing-based approach to end-to-end network traffic reconstruction. IEEE Transactions on Network Science and Engineering (in press). \nhttps:\/\/doi.org\/10.1109\/TNSE.2018.2877597\n\n.","DOI":"10.1109\/TNSE.2018.2877597"},{"issue":"15","key":"2177_CR73","doi-asserted-by":"publisher","first-page":"3533","DOI":"10.1016\/j.comnet.2011.06.027","volume":"55","author":"D Jiang","year":"2011","unstructured":"Jiang, D., Xu, Z., Chen, Z., Han, Y., & Xu, H. (2011). Joint time-frequency sparse estimation of large-scale network traffic. Computer Networks, 55(15), 3533\u20133547. \nhttps:\/\/doi.org\/10.1016\/j.comnet.2011.06.027\n\n.","journal-title":"Computer Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-02177-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-019-02177-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-019-02177-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T00:41:17Z","timestamp":1604104877000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-019-02177-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,1]]},"references-count":73,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["2177"],"URL":"https:\/\/doi.org\/10.1007\/s11276-019-02177-2","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2019,11,1]]},"assertion":[{"value":"1 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}