{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:44:33Z","timestamp":1766486673133,"version":"3.37.3"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T00:00:00Z","timestamp":1706832000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T00:00:00Z","timestamp":1706832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2024,5]]},"DOI":"10.1007\/s11276-024-03655-y","type":"journal-article","created":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T20:02:35Z","timestamp":1706904155000},"page":"2235-2255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["High priority space protection (HPP): countdown space-based MAC protocol with enhanced lockdown effect"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9175-2763","authenticated-orcid":false,"given":"Ivan","family":"Ked\u017eo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ante","family":"Kristi\u0107","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vesna","family":"Peki\u0107","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ivana","family":"Zulim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,2,2]]},"reference":[{"issue":"7","key":"3655_CR1","doi-asserted-by":"publisher","first-page":"7412","DOI":"10.1109\/TITS.2022.3153484","volume":"24","author":"AZ Abyaneh","year":"2023","unstructured":"Abyaneh, A. Z., Zorba, N., & Hamdaoui, B. (2023). Empowering next-generation IoT WLANs through blockchain and 802.11ax technologies. IEEE Transactions on Intelligent Transportation Systems, 24(7), 7412\u20137421. https:\/\/doi.org\/10.1109\/TITS.2022.3153484","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"issue":"7","key":"3655_CR2","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MCOM.001.2200806","volume":"61","author":"F Meneghello","year":"2023","unstructured":"Meneghello, F., Chen, C., Cordeiro, C., & Restuccia, F. (2023). Toward integrated sensing and communications in IEEE 802.11bf Wi-Fi networks. IEEE Communications Magazine, 61(7), 128\u2013133. https:\/\/doi.org\/10.1109\/MCOM.001.2200806","journal-title":"IEEE Communications Magazine"},{"issue":"11","key":"3655_CR3","doi-asserted-by":"publisher","first-page":"287","DOI":"10.3390\/fi13110287","volume":"13","author":"L Hota","year":"2021","unstructured":"Hota, L., Nayak, B. P., Kumar, A., Ali, G. G. M. N., & Chong, P. H. J. (2021). An analysis on contemporary MAC layer protocols in vehicular networks: State-of-the-art and future directions. Future Internet, 13(11), 287. https:\/\/doi.org\/10.3390\/fi13110287","journal-title":"Future Internet"},{"issue":"23","key":"3655_CR4","doi-asserted-by":"publisher","first-page":"3873","DOI":"10.3390\/electronics11233873","volume":"11","author":"F Amin","year":"2022","unstructured":"Amin, F., Abbasi, R., Khan, S., & Abid, M. A. (2022). An overview of medium access control and radio duty cycling protocols for internet of things. Electronics, 11(23), 3873. https:\/\/doi.org\/10.3390\/electronics11233873","journal-title":"Electronics"},{"issue":"5","key":"3655_CR5","doi-asserted-by":"publisher","first-page":"2301","DOI":"10.12928\/telkomnika.v17i5.12163","volume":"17","author":"A Djimli","year":"2019","unstructured":"Djimli, A., Merniz, S., & Harous, S. (2019). Energy-efficient MAC protocols for wireless sensor networks: A survey. TELKOMNIKA (Telecommunication Computing Electronics and Control), 17(5), 2301\u20132312.","journal-title":"TELKOMNIKA (Telecommunication Computing Electronics and Control)"},{"key":"3655_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100308","volume":"28","author":"S Johari","year":"2021","unstructured":"Johari, S., & Bala Krishna, M. (2021). TDMA based contention-free MAC protocols for vehicular ad hoc networks: A survey. Vehicular Communications, 28, 100308. https:\/\/doi.org\/10.1016\/j.vehcom.2020.100308","journal-title":"Vehicular Communications"},{"key":"3655_CR7","doi-asserted-by":"publisher","unstructured":"IEEE standard for information technology\u2014Telecommunications and information exchange between systems\u2014Local and metropolitan area networks\u2014Specific requirements\u2014Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. (2021). In IEEE Std 802.11-2020 (Revision of IEEE Std 802.11-2016), 1\u20134379. Presented at the IEEE Std 802.11-2020 (Revision of IEEE Std 802.11-2016). https:\/\/doi.org\/10.1109\/IEEESTD.2021.9363693","DOI":"10.1109\/IEEESTD.2021.9363693"},{"key":"3655_CR8","doi-asserted-by":"publisher","unstructured":"IEEE standard for information technology\u2014Telecommunications and information exchange between systems\u2014Local and metropolitan area networks\u2014Specific requirements\u2014Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. (2012). IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007), 1\u20132793. Presented at the IEEE Std 802.11-2012 (Revision of IEEE Std 802.11-2007). https:\/\/doi.org\/10.1109\/IEEESTD.2012.6178212","DOI":"10.1109\/IEEESTD.2012.6178212"},{"issue":"2","key":"3655_CR9","doi-asserted-by":"publisher","first-page":"2273","DOI":"10.1109\/JIOT.2019.2905952","volume":"6","author":"TA Al-Janabi","year":"2019","unstructured":"Al-Janabi, T. A., & Al-Raweshidy, H. S. (2019). An energy efficient hybrid MAC protocol with dynamic sleep-based scheduling for high density IoT networks. IEEE Internet of Things Journal, 6(2), 2273\u20132287. https:\/\/doi.org\/10.1109\/JIOT.2019.2905952","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"3655_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1071690.1064225","volume":"33","author":"S Choi","year":"2005","unstructured":"Choi, S., Park, K., & Kim, C. (2005). On the performance characteristics of WLANs: Revisited. ACM SIGMETRICS Performance Evaluation Review, 33(1), 97\u2013108. https:\/\/doi.org\/10.1145\/1071690.1064225","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"issue":"2","key":"3655_CR11","doi-asserted-by":"publisher","first-page":"204","DOI":"10.3390\/electronics8020204","volume":"8","author":"UA Khan","year":"2019","unstructured":"Khan, U. A., & Lee, S. S. (2019). Multi-layer problems and solutions in VANETs: A review. Electronics, 8(2), 204. https:\/\/doi.org\/10.3390\/electronics8020204","journal-title":"Electronics"},{"issue":"2","key":"3655_CR12","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1109\/JIOT.2021.3104388","volume":"9","author":"N Ahmed","year":"2022","unstructured":"Ahmed, N., De, D., Barbhuiya, F. A., & Hussain, Md. I. (2022). MAC protocols for IEEE 802.11ah-based internet of things: A survey. IEEE Internet of Things Journal, 9(2), 916\u2013938. https:\/\/doi.org\/10.1109\/JIOT.2021.3104388","journal-title":"IEEE Internet of Things Journal"},{"key":"3655_CR13","doi-asserted-by":"publisher","first-page":"100225","DOI":"10.1016\/j.jii.2021.100225","volume":"24","author":"SK Memon","year":"2021","unstructured":"Memon, S. K., Nisar, K., Hijazi, M. H. A., Chowdhry, B. S., Sodhro, A. H., Pirbhulal, S., & Rodrigues, J. J. P. C. (2021). A survey on 802.11 MAC industrial standards, architecture, security & supporting emergency traffic: Future directions. Journal of Industrial Information Integration, 24, 100225. https:\/\/doi.org\/10.1016\/j.jii.2021.100225","journal-title":"Journal of Industrial Information Integration"},{"key":"3655_CR14","doi-asserted-by":"publisher","first-page":"62880","DOI":"10.1109\/ACCESS.2021.3074812","volume":"9","author":"M Rasheed","year":"2021","unstructured":"Rasheed, M., Din, I. U., Adnan, M., Tariq, A., Malik, S., & Syed, I. (2021). ECM-MAC: An efficient collision mitigation strategy in contention based MAC protocol. IEEE Access, 9, 62880\u201362889. https:\/\/doi.org\/10.1109\/ACCESS.2021.3074812","journal-title":"IEEE Access"},{"issue":"15","key":"3655_CR15","doi-asserted-by":"publisher","first-page":"3324","DOI":"10.3390\/electronics12153324","volume":"12","author":"C-H Lin","year":"2023","unstructured":"Lin, C.-H., Cheng, M.-H., Hwang, W.-S., Shieh, C.-K., & Wei, Y.-H. (2023). A rapidly adaptive collision backoff algorithm for improving the throughput in WLANs. Electronics, 12(15), 3324. https:\/\/doi.org\/10.3390\/electronics12153324","journal-title":"Electronics"},{"issue":"3","key":"3655_CR16","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1587\/transcom.2020EBP3193","volume":"E105-B","author":"CS Nandyala","year":"2022","unstructured":"Nandyala, C. S., & Jin, S. (2022). An adjustable contention window management for dense IEEE 802.11 networks. IEICE Transactions on Communications, E105-B(3), 270\u2013274.","journal-title":"IEICE Transactions on Communications"},{"issue":"2","key":"3655_CR17","doi-asserted-by":"publisher","first-page":"S241","DOI":"10.1134\/S106422692214008X","volume":"67","author":"VA Torgunakov","year":"2022","unstructured":"Torgunakov, V. A., Loginov, V. A., Khorov, E. M., & Lyakhov, A. I. (2022). Algorithm for adaptative selection of a contention window in IEEE 802.11bd networks. Journal of Communications Technology and Electronics, 67(2), S241\u2013S247. https:\/\/doi.org\/10.1134\/S106422692214008X","journal-title":"Journal of Communications Technology and Electronics"},{"issue":"8","key":"3655_CR18","doi-asserted-by":"publisher","first-page":"e0237386","DOI":"10.1371\/journal.pone.0237386","volume":"15","author":"MA Raouf","year":"2020","unstructured":"Raouf, M. A., Hashim, F., Liew, J. T., & Alezabi, K. A. (2020). Pseudorandom sequence contention algorithm for IEEE 80211ah based internet of things network. PLOS ONE, 15(8), e0237386. https:\/\/doi.org\/10.1371\/journal.pone.0237386","journal-title":"PLOS ONE"},{"issue":"2","key":"3655_CR19","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/s11235-017-0275-6","volume":"66","author":"E Fitzgerald","year":"2017","unstructured":"Fitzgerald, E., K\u00f6rner, U., & Landfeldt, B. (2017). An analytic model for throughput optimal distributed coordination function (TO-DCF). Telecommunication Systems, 66(2), 197\u2013215. https:\/\/doi.org\/10.1007\/s11235-017-0275-6","journal-title":"Telecommunication Systems"},{"issue":"5","key":"3655_CR20","doi-asserted-by":"publisher","first-page":"2353","DOI":"10.1109\/TNET.2021.3089825","volume":"29","author":"N Cordeschi","year":"2021","unstructured":"Cordeschi, N., De Rango, F., & Tropea, M. (2021). Exploiting an optimal delay-collision tradeoff in CSMA-based high-dense wireless systems. IEEE\/ACM Transactions on Networking, 29(5), 2353\u20132366. https:\/\/doi.org\/10.1109\/TNET.2021.3089825","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"2","key":"3655_CR21","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/JCN.2019.000022","volume":"21","author":"N Shahin","year":"2019","unstructured":"Shahin, N., Ali, R., Kim, S. W., & Kim, Y.-T. (2019). Cognitive backoff mechanism for IEEE802.11ax high-efficiency WLANs. Journal of Communications and Networks, 21(2), 158\u2013167. https:\/\/doi.org\/10.1109\/JCN.2019.000022","journal-title":"Journal of Communications and Networks"},{"issue":"1","key":"3655_CR22","first-page":"21","volume":"14","author":"J Sartthong","year":"2021","unstructured":"Sartthong, J. (2021). Half binary exponential increment double decrement back-off algorithm to enhance the saturated throughput of IEEE802.11 wireless LAN. Interdisciplinary Research Review, 14(1), 21\u201328.","journal-title":"Interdisciplinary Research Review"},{"issue":"12","key":"3655_CR23","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.3390\/math10122053","volume":"10","author":"A Rehman","year":"2022","unstructured":"Rehman, A., Hussain, F. B., Tanveer, J., & Haider, A. (2022). Collision-based window-scaled back-off mechanism for dense channel resource allocation in future Wi-Fi. Mathematics, 10(12), 2053. https:\/\/doi.org\/10.3390\/math10122053","journal-title":"Mathematics"},{"key":"3655_CR24","doi-asserted-by":"publisher","unstructured":"Arun, I. B., Venkatesh, T. G., & Dappuri, B. (2014). QoS provisioning with adaptive backoff algorithm for IEEE 802.11ac under multipacket reception. In 2014 9th international symposium on communication systems, networks & digital sign (CSNDSP) (pp. 826\u2013830). https:\/\/doi.org\/10.1109\/CSNDSP.2014.6923941","DOI":"10.1109\/CSNDSP.2014.6923941"},{"issue":"4","key":"3655_CR25","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1145\/1090191.1080107","volume":"35","author":"M Heusse","year":"2005","unstructured":"Heusse, M., Rousseau, F., Guillier, R., & Duda, A. (2005). Idle sense: An optimal access method for high throughput and fairness in rate diverse wireless LANs. ACM SIGCOMM Computer Communication Review, 35(4), 121\u2013132. https:\/\/doi.org\/10.1145\/1090191.1080107","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"3655_CR26","doi-asserted-by":"publisher","unstructured":"Lu, S., Hu, S., Duan, Y., Gao, J., & Liu, F. (2022). Contention window adaptive adjustment strategy for fairness in multi-rate IEEE 802.11 network. In 2022 6th international conference on communication and information systems (ICCIS) (pp. 82\u201386). https:\/\/doi.org\/10.1109\/ICCIS56375.2022.9998168","DOI":"10.1109\/ICCIS56375.2022.9998168"},{"key":"3655_CR27","doi-asserted-by":"publisher","unstructured":"Zerguine, N., Aliouat, Z., Mostefai, M., & Harous, S. (2020). M-BEB: enhanced and fair binary exponential backoff. In 2020 14th international conference on innovations in information technology (IIT) (pp. 142\u2013147). https:\/\/doi.org\/10.1109\/IIT50501.2020.9299014","DOI":"10.1109\/IIT50501.2020.9299014"},{"issue":"13","key":"3655_CR28","doi-asserted-by":"publisher","first-page":"3002","DOI":"10.3390\/s19133002","volume":"19","author":"Y Cheng","year":"2019","unstructured":"Cheng, Y., Zhou, H., & Yang, D. (2019). CA-CWA: Channel-aware contention window adaption in IEEE 802.11ah for soft real-time industrial applications. Sensors, 19(13), 3002. https:\/\/doi.org\/10.3390\/s19133002","journal-title":"Sensors"},{"key":"3655_CR29","doi-asserted-by":"publisher","unstructured":"Kawahara, Y., & Sugiyama, T. (2019). Priority control method by using non-uniform backoff slot probability in IEEE802.11 WLAN. In 2019 international conference on information and communication technology convergence (ICTC) (pp. 38\u201340). https:\/\/doi.org\/10.1109\/ICTC46691.2019.8939741","DOI":"10.1109\/ICTC46691.2019.8939741"},{"key":"3655_CR30","doi-asserted-by":"publisher","first-page":"18402","DOI":"10.1109\/ACCESS.2021.3054015","volume":"9","author":"F Li","year":"2021","unstructured":"Li, F., Huang, G., Yang, Q., & Xie, M. (2021). Adaptive contention window MAC protocol in a global view for emerging trends networks. IEEE Access, 9, 18402\u201318423. https:\/\/doi.org\/10.1109\/ACCESS.2021.3054015","journal-title":"IEEE Access"},{"key":"3655_CR31","doi-asserted-by":"publisher","unstructured":"De Rango, F., Cordeschi, N., & Ritacco, F. (2021). Applying Q-learning approach to CSMA scheme to dynamically tune the contention probability. In 2021 IEEE 18th annual consumer communications & networking conference (CCNC) (pp. 1\u20134). https:\/\/doi.org\/10.1109\/CCNC49032.2021.9369509","DOI":"10.1109\/CCNC49032.2021.9369509"},{"issue":"9","key":"3655_CR32","doi-asserted-by":"publisher","first-page":"4145","DOI":"10.3390\/app12094145","volume":"12","author":"K Asaf","year":"2022","unstructured":"Asaf, K., Khan, B., & Kim, G.-Y. (2022). Wireless LAN performance enhancement using double deep Q-networks. Applied Sciences, 12(9), 4145. https:\/\/doi.org\/10.3390\/app12094145","journal-title":"Applied Sciences"},{"key":"3655_CR33","doi-asserted-by":"publisher","unstructured":"Imanaka, T., Ohta, M., & Taromaru, M. (2023). Channel access control instead of random backoff algorithm. In 2023 International conference on artificial intelligence in information and communication (ICAIIC) (pp. 128\u2013132). https:\/\/doi.org\/10.1109\/ICAIIC57133.2023.10067055","DOI":"10.1109\/ICAIIC57133.2023.10067055"},{"key":"3655_CR34","doi-asserted-by":"publisher","unstructured":"Chen, Y.-W., & Kao, K.-C. (2021). Study of contention window adjustment for CSMA\/CA by using machine learning. In 2021 22nd Asia-Pacific network operations and management symposium (APNOMS) (pp. 206\u2013209). https:\/\/doi.org\/10.23919\/APNOMS52696.2021.9562498","DOI":"10.23919\/APNOMS52696.2021.9562498"},{"key":"3655_CR35","doi-asserted-by":"publisher","unstructured":"Wydma\u0144ski, W., & Szott, S. (2021). Contention window optimization in IEEE 802.11ax networks with deep reinforcement learning. In 2021 IEEE wireless communications and networking conference (WCNC) (pp. 1\u20136). https:\/\/doi.org\/10.1109\/WCNC49053.2021.9417575","DOI":"10.1109\/WCNC49053.2021.9417575"},{"key":"3655_CR36","doi-asserted-by":"publisher","unstructured":"Edalat, Y., & Obraczka, K. (2019). Dynamically tuning IEEE 802.11\u2019s contention window using machine learning. In Proceedings of the 22nd international ACM conference on modeling, analysis and simulation of wireless and mobile systems (pp. 19\u201326). New York, NY, USA: Association for Computing Machinery. https:\/\/doi.org\/10.1145\/3345768.3355920","DOI":"10.1145\/3345768.3355920"},{"key":"3655_CR37","doi-asserted-by":"publisher","unstructured":"Sanada, K., Hatano, H., & Mori, K. (2023). Simple reinforcement learning based contention windows adjustment for IEEE 802.11 networks. In 2023 IEEE 20th consumer communications & networking conference (CCNC) (pp. 692\u2013693). https:\/\/doi.org\/10.1109\/CCNC51644.2023.10059960","DOI":"10.1109\/CCNC51644.2023.10059960"},{"key":"3655_CR38","doi-asserted-by":"publisher","unstructured":"Lee, C. K., & Hyong Rhee, S. (2020). Collision avoidance in IEEE 802.11 DCF using a reinforcement learning method. In 2020 International conference on information and communication technology convergence (ICTC) (pp. 898\u2013901). https:\/\/doi.org\/10.1109\/ICTC49870.2020.9289402","DOI":"10.1109\/ICTC49870.2020.9289402"},{"issue":"5","key":"3655_CR39","doi-asserted-by":"publisher","first-page":"776","DOI":"10.1016\/j.icte.2022.07.009","volume":"9","author":"C-H Ke","year":"2022","unstructured":"Ke, C.-H., & Astuti, L. (2022). Applying multi-agent deep reinforcement learning for contention window optimization to enhance wireless network performance. ICT Express, 9(5), 776. https:\/\/doi.org\/10.1016\/j.icte.2022.07.009","journal-title":"ICT Express"},{"issue":"3","key":"3655_CR40","doi-asserted-by":"publisher","first-page":"1843","DOI":"10.1109\/COMST.2022.3179242","volume":"24","author":"S Szott","year":"2022","unstructured":"Szott, S., Kosek-Szott, K., Gaw\u0142owicz, P., G\u00f3mez, J. T., Bellalta, B., Zubow, A., & Dressler, F. (2022). Wi-Fi meets ML: A survey on improving IEEE 802.11 performance with machine learning. IEEE Communications Surveys & Tutorials, 24(3), 1843\u20131893. https:\/\/doi.org\/10.1109\/COMST.2022.3179242","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"3655_CR41","unstructured":"Kedzo, I., Ozegovic, J., & Pekic, V. (2012). Constrained priority countdown freezing-a collision memory avoidance algorithm. In ICWMC 2012, the eighth international conference on wireless and mobile communications (pp. 130\u2013134)."},{"issue":"5","key":"3655_CR42","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/0140-3664(83)90084-1","volume":"6","author":"A Colvin","year":"1983","unstructured":"Colvin, A. (1983). CSMA with collision avoidance. Computer Communications, 6(5), 227\u2013235. https:\/\/doi.org\/10.1016\/0140-3664(83)90084-1","journal-title":"Computer Communications"},{"issue":"8","key":"3655_CR43","doi-asserted-by":"publisher","first-page":"1558","DOI":"10.1109\/TMC.2012.128","volume":"12","author":"L Dai","year":"2013","unstructured":"Dai, L., & Sun, X. (2013). A unified analysis of IEEE 802.11 DCF networks: Stability, throughput, and delay. IEEE Transactions on Mobile Computing, 12(8), 1558\u20131572. https:\/\/doi.org\/10.1109\/TMC.2012.128","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"3","key":"3655_CR44","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1007\/s11277-015-2477-0","volume":"83","author":"P Patel","year":"2015","unstructured":"Patel, P., & Lobiyal, D. K. (2015). A simple but effective contention aware and adaptive back-off mechanism for improving the performance of IEEE 802.11 DCF. Wireless Personal Communications, 83(3), 1801\u20131841. https:\/\/doi.org\/10.1007\/s11277-015-2477-0","journal-title":"Wireless Personal Communications"},{"key":"3655_CR45","doi-asserted-by":"publisher","unstructured":"Song, N.-O., Kwak, B.-J., & Miller, L. E. (2005). Analysis of EIED backoff algorithm for the IEEE 802.11 DCF. In VTC-2005-fall. 2005 IEEE 62nd vehicular technology conference, 2005. (vol. 4, pp. 2182\u20132186). https:\/\/doi.org\/10.1109\/VETECF.2005.1558507","DOI":"10.1109\/VETECF.2005.1558507"},{"issue":"4","key":"3655_CR46","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.3390\/su10041201","volume":"10","author":"R Ali","year":"2018","unstructured":"Ali, R., Shahin, N., Bajracharya, R., Kim, B.-S., & Kim, S. W. (2018). A self-scrutinized backoff mechanism for IEEE 802.11ax in 5G unlicensed networks. Sustainability, 10(4), 1201. https:\/\/doi.org\/10.3390\/su10041201","journal-title":"Sustainability"},{"key":"3655_CR47","doi-asserted-by":"publisher","unstructured":"Syed, I., Kim, B., Roh, B., & Oh, I. (2015). A novel contention window backoff algorithm for IEEE 802.11 wireless networks. In 2015 IEEE\/ACIS 14th international conference on computer and information science (ICIS) (pp. 71\u201375). https:\/\/doi.org\/10.1109\/ICIS.2015.7166572","DOI":"10.1109\/ICIS.2015.7166572"},{"issue":"1","key":"3655_CR48","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TNET.2013.2295242","volume":"23","author":"X Sun","year":"2015","unstructured":"Sun, X., & Dai, L. (2015). Backoff design for IEEE 802.11 DCF networks: Fundamental tradeoff and design criterion. IEEE\/ACM Transactions on Networking, 23(1), 300\u2013316. https:\/\/doi.org\/10.1109\/TNET.2013.2295242","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"3655_CR49","doi-asserted-by":"publisher","unstructured":"Barletta, L., & Borgonovo, F. (2020). Polynomial law: A better alternative to binary exponential backoff. In 2020 Mediterranean communication and computer networking conference (MedComNet) (pp. 1\u20138). https:\/\/doi.org\/10.1109\/MedComNet49392.2020.9191449","DOI":"10.1109\/MedComNet49392.2020.9191449"},{"key":"3655_CR50","doi-asserted-by":"publisher","unstructured":"Elarbaoui, I., & Refai, H. H. (2008). Enhancement of IEEE 802.11 DCF backoff algorithm under heavy traffic. In 2008 IEEE\/ACS international conference on computer systems and applications (pp. 1082\u20131087). https:\/\/doi.org\/10.1109\/AICCSA.2008.4493682","DOI":"10.1109\/AICCSA.2008.4493682"},{"key":"3655_CR51","doi-asserted-by":"publisher","unstructured":"IEEE standard for information technology\u2014Telecommunications and information exchange between systems\u2014Local and metropolitan area networks\u2014Specific requirements\u2014Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. (2007). In IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999), 1\u20131076. Presented at the IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999). https:\/\/doi.org\/10.1109\/IEEESTD.2007.373646","DOI":"10.1109\/IEEESTD.2007.373646"},{"key":"3655_CR52","first-page":"63","volume-title":"Emerging technologies in wireless LANs: Theory, desing and deployment","author":"G Bianchi","year":"2008","unstructured":"Bianchi, G., Choi, S., & Tinnirello, I. (2008). Performance study of IEEE 802.11 DCF and IEEE 802.11e EDCA. In B. Bing (Ed.), Emerging technologies in wireless LANs: Theory, desing and deployment (pp. 63\u2013127). Cambridge University Press."},{"issue":"2","key":"3655_CR53","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/LCOMM.2005.02008","volume":"9","author":"CH Foh","year":"2005","unstructured":"Foh, C. H., & Tantra, J. W. (2005). Comments on IEEE 802.11 saturation throughput analysis with freezing of backoff counters. IEEE Communications Letters, 9(2), 130\u2013132. https:\/\/doi.org\/10.1109\/LCOMM.2005.02008","journal-title":"IEEE Communications Letters"},{"issue":"10","key":"3655_CR54","doi-asserted-by":"publisher","first-page":"3256","DOI":"10.1109\/TWC.2011.072511.101227","volume":"10","author":"E Felemban","year":"2011","unstructured":"Felemban, E., & Ekici, E. (2011). Single hop IEEE 802.11 DCF analysis revisited: accurate modeling of channel access delay and throughput for saturated and unsaturated traffic cases. IEEE Transactions on Wireless Communications, 10(10), 3256\u20133266. https:\/\/doi.org\/10.1109\/TWC.2011.072511.101227","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"3655_CR55","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1109\/TVT.2009.2029118","volume":"59","author":"I Tinnirello","year":"2010","unstructured":"Tinnirello, I., Bianchi, G., & Xiao, Y. (2010). Refinements on IEEE 802.11 distributed coordination function modeling approaches. IEEE Transactions on Vehicular Technology, 59(3), 1055\u20131067. https:\/\/doi.org\/10.1109\/TVT.2009.2029118","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3655_CR56","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.comnet.2015.02.003","volume":"80","author":"G Martorell","year":"2015","unstructured":"Martorell, G., Femenias, G., & Riera-Palou, F. (2015). Non-saturated IEEE 802.11 networks. A hierarchical 3D Markov model. Computer Networks, 80, 27\u201350. https:\/\/doi.org\/10.1016\/j.comnet.2015.02.003","journal-title":"Computer Networks"},{"key":"3655_CR57","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-23795-9_4","volume-title":"Multiple access communications","author":"A Klein","year":"2011","unstructured":"Klein, A. (2011). BPS-MAC: Backoff preamble based MAC protocol with sequential contention resolution. In C. Sacchi, B. Bellalta, A. Vinel, C. Schlegel, F. Granelli, & Y. Zhang (Eds.), Multiple access communications (pp. 39\u201350). Springer. https:\/\/doi.org\/10.1007\/978-3-642-23795-9_4"},{"issue":"6","key":"3655_CR58","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/JSAC.2004.830898","volume":"22","author":"YC Tay","year":"2004","unstructured":"Tay, Y. C., Jamieson, K., & Balakrishnan, H. (2004). Collision-minimizing CSMA and its applications to wireless sensor networks. IEEE Journal on Selected Areas in Communications, 22(6), 1048\u20131057. https:\/\/doi.org\/10.1109\/JSAC.2004.830898","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"3655_CR59","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6375317","volume":"2018","author":"A Kristi\u0107","year":"2018","unstructured":"Kristi\u0107, A., O\u017eegovi\u0107, J., & Ked\u017eo, I. (2018). Design and modeling of self-adapting MAC (SaMAC) protocol with inconstant contention loss probabilities. Wireless Communications and Mobile Computing, 2018, 1\u201325. https:\/\/doi.org\/10.1155\/2018\/6375317","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"23","key":"3655_CR60","doi-asserted-by":"publisher","first-page":"7974","DOI":"10.3390\/s21237974","volume":"21","author":"W Murti","year":"2021","unstructured":"Murti, W., & Yun, J.-H. (2021). Multi-link operation with enhanced synchronous channel access in IEEE 802.11be wireless LANs: Coexistence issue and solutions. Sensors, 21(23), 7974. https:\/\/doi.org\/10.3390\/s21237974","journal-title":"Sensors"},{"issue":"9","key":"3655_CR61","doi-asserted-by":"publisher","first-page":"3501","DOI":"10.3390\/s22093501","volume":"22","author":"W Murti","year":"2022","unstructured":"Murti, W., & Yun, J.-H. (2022). Multilink operation in IEEE 802.11be wireless LANs: Backoff overflow problem and solutions. Sensors, 22(9), 3501. https:\/\/doi.org\/10.3390\/s22093501","journal-title":"Sensors"},{"key":"3655_CR62","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.jnca.2017.03.010","volume":"87","author":"IB Arun","year":"2017","unstructured":"Arun, I. B., & Venkatesh, T. G. (2017). Design and performance analysis of a MAC protocol for wireless LANs supporting multipacket reception. Journal of Network and Computer Applications, 87, 223\u2013236. https:\/\/doi.org\/10.1016\/j.jnca.2017.03.010","journal-title":"Journal of Network and Computer Applications"},{"key":"3655_CR63","doi-asserted-by":"publisher","unstructured":"Karaca, M., Zhang, Z., & Landfeldt, B. (2015). An opportunistic backoff scheme for dense IEEE 802.11 WLANs. In 2015 IEEE Globecom workshops (GC Wkshps) (pp. 1\u20136). https:\/\/doi.org\/10.1109\/GLOCOMW.2015.7413974","DOI":"10.1109\/GLOCOMW.2015.7413974"},{"key":"3655_CR64","unstructured":"Jain, R., Chiu, D.-M., & Hawe, W. (1998). A quantitative measure of fairness and discrimination for resource allocation in shared computer systems. CoRR, cs.NI\/9809099. Retrieved from https:\/\/arxiv.org\/abs\/cs\/9809099"},{"key":"3655_CR65","doi-asserted-by":"publisher","unstructured":"Duda, A. (2008). Understanding the performance of 802.11 networks. In 2008 IEEE 19th international symposium on personal, indoor and mobile radio communications (pp. 1\u20136). https:\/\/doi.org\/10.1109\/PIMRC.2008.4699942","DOI":"10.1109\/PIMRC.2008.4699942"},{"key":"3655_CR66","doi-asserted-by":"publisher","unstructured":"Berger-Sabbatel, G., Duda, A., Gaudoin, O., Heusse, M., & Rousseau, F. (2004). Fairness and its impact on delay in 802.11 networks. In IEEE global telecommunications conference, 2004. GLOBECOM\u201904. (vol. 5, pp. 2967\u20132973, vol. 5). https:\/\/doi.org\/10.1109\/GLOCOM.2004.1378897","DOI":"10.1109\/GLOCOM.2004.1378897"},{"key":"3655_CR67","doi-asserted-by":"publisher","unstructured":"Koksal, C. E., Kassab, H., & Balakrishnan, H. (2000). An analysis of short-term fairness in wireless media access protocols (poster session). In Proceedings of the 2000 ACM SIGMETRICS international conference on measurement and modeling of computer systems (pp. 118\u2013119). https:\/\/doi.org\/10.1145\/339331.339401","DOI":"10.1145\/339331.339401"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03655-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-024-03655-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-024-03655-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T18:10:44Z","timestamp":1717006244000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-024-03655-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,2]]},"references-count":67,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["3655"],"URL":"https:\/\/doi.org\/10.1007\/s11276-024-03655-y","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2024,2,2]]},"assertion":[{"value":"22 December 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflicts of interest to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}