{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T22:34:33Z","timestamp":1761863673761},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,2,13]],"date-time":"2017-02-13T00:00:00Z","timestamp":1486944000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-017-3992-y","type":"journal-article","created":{"date-parts":[[2017,2,13]],"date-time":"2017-02-13T07:29:04Z","timestamp":1486970944000},"page":"3233-3251","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Protocol for Controlling Congestion in Wireless Sensor Networks"],"prefix":"10.1007","volume":"95","author":[{"given":"Hossein Dabbagh","family":"Nikokheslat","sequence":"first","affiliation":[]},{"given":"Ali","family":"Ghaffari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,13]]},"reference":[{"key":"3992_CR1","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","volume":"52","author":"J Yick","year":"2008","unstructured":"Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52, 2292\u20132330.","journal-title":"Computer Networks"},{"issue":"4","key":"3992_CR2","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1016\/S1665-6423(14)70097-5","volume":"12","author":"Ali Ghaffari","year":"2014","unstructured":"Ghaffari, Ali. (2014). An energy efficient routing protocol for wireless sensor networks using A-star algorithm. Journal of Applied Research and Technology, 12(4), 815\u2013822.","journal-title":"Journal of Applied Research and Technology"},{"key":"3992_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.is.2016.03.001","volume":"59","author":"Z Mottaghinia","year":"2016","unstructured":"Mottaghinia, Z., & Ghaffari, A. (2016). A unicast tree-based data gathering protocol for delay tolerant mobile sensor networks. Information Systems & Telecommunication, 59, 1\u201312.","journal-title":"Information Systems & Telecommunication"},{"key":"3992_CR4","unstructured":"Ghaffari, A. (2006). Vulnerability and security of mobile ad hoc networks. In Proceedings of the 6th WSEAS international conference on simulation, modelling and optimization (pp. 22\u201324), Lisbon, Portugal."},{"key":"3992_CR5","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1016\/j.comcom.2011.09.014","volume":"35","author":"S Brahma","year":"2012","unstructured":"Brahma, S., Chatterjee, M., Kwiat, K., & Varshney, P. K. (2012). Traffic management in wireless sensor networks: Decoupling congestion control and fairness. Computer Communications, 35, 670\u2013681.","journal-title":"Computer Communications"},{"key":"3992_CR6","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.jnca.2015.03.002","volume":"52","author":"A Ghaffari","year":"2015","unstructured":"Ghaffari, A. (2015). Congestion control mechanisms in wireless sensor networks: A survey. Journal of Network and Computer Applications, 52, 101\u2013115.","journal-title":"Journal of Network and Computer Applications"},{"key":"3992_CR7","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1007\/978-3-642-31513-8_70","volume-title":"Advances in computing and information technology","author":"A Das","year":"2012","unstructured":"Das, A., & Chaki, R. (2012). MERCC: Multiple events routing with congestion control for WSN. In N. Meghanathan, D. Nagamalai, & N. Chaki (Eds.), Advances in computing and information technology (Vol. 176, pp. 691\u2013698). Berlin: Springer."},{"key":"3992_CR8","doi-asserted-by":"crossref","first-page":"1879","DOI":"10.1007\/s11277-012-0914-x","volume":"71","author":"J-H Lee","year":"2013","unstructured":"Lee, J.-H. (2013). A traffic-aware energy efficient scheme for WSN employing an adaptable wakeup period. Wireless Personal Communications, 71, 1879\u20131914.","journal-title":"Wireless Personal Communications"},{"key":"3992_CR9","doi-asserted-by":"crossref","unstructured":"Motdhare, S., & Dethe, C. G. (2014). Congestion avoidance and lifetime maximization in wireless sensor networks using a mobile sink. In: R. Maringanti, M. Tiwari, and A. Arora (Eds.), Proceedings of ninth international conference on wireless communication and sensor networks (pp. 37\u201349), vol. 299, India: Springer.","DOI":"10.1007\/978-81-322-1823-4_4"},{"key":"3992_CR10","doi-asserted-by":"crossref","unstructured":"On, J., Sung, Y., & Lee, J. (2012). A state oriented buffer control mechanism for the priority-based congestion control algorithm in WSNs. In F. L. Gaol and Q. V. Nguyen (Eds.), Proceedings of the 2011 2nd international congress on computer applications and computational science (pp. 181\u2013190), vol. 145, Berlin: Springer.","DOI":"10.1007\/978-3-642-28308-6_25"},{"key":"3992_CR11","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1007\/978-3-642-22543-7_25","volume-title":"Trends in network and communications","author":"S Suryawansh","year":"2011","unstructured":"Suryawansh, S., & Hiray, S. R. (2011). Congestion control protocol for traffic control in multimedia applications using WSN. In D. Wyld, M. Wozniak, N. Chaki, N. Meghanathan, & D. Nagamalai (Eds.), Trends in network and communications (Vol. 197, pp. 242\u2013251). Berlin: Springer."},{"issue":"4","key":"3992_CR12","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.comcom.2004.12.028","volume":"29","author":"A Mahapatra","year":"2005","unstructured":"Mahapatra, A., Anand, K., & Agrawal, D. P. (2005). QoS and energy aware routing for real-time traffic in wireless sensor networks. Computer Communications Journal, 29(4), 437\u2013445.","journal-title":"Computer Communications Journal"},{"key":"3992_CR13","doi-asserted-by":"crossref","unstructured":"Wan, C., Eisenman, S. B., & Campbell, A. T. (2003). CODA: Congestion detection and avoidance in sensor networks. In First ACM conference on Embedded Networked Sensor Systems, 2003.","DOI":"10.1145\/958491.958523"},{"key":"3992_CR14","doi-asserted-by":"crossref","unstructured":"Hull, B., Jamieson, K., & Balakrishnan, H. (2004). Mitigating congestion in wireless sensor networks. In Sensys.","DOI":"10.1145\/1031495.1031512"},{"key":"3992_CR15","unstructured":"Zgr, Y. S., Sankarasubramaniam, Y., Akan, O\u00a8..B., Akyildiz, I. F. (2003). ESRT: Event-to-sink reliable transport in wireless sensor networks. In: Proceedings of 4th ACM international symposium on Mobile ad hoc networking and computing, MobiHoc (pp. 177\u2013188)."},{"key":"3992_CR16","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1016\/j.adhoc.2012.03.015","volume":"10","author":"O Banimelhem","year":"2012","unstructured":"Banimelhem, O., & Khasawneh, S. (2012). GMCAR: Grid-based multipath with congestion avoidance routing protocol in wireless sensor networks. Ad Hoc Networks, 10, 1346\u20131361.","journal-title":"Ad Hoc Networks"},{"key":"3992_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S1005-8885(10)60038-6","volume":"18","author":"Q-M Lin","year":"2011","unstructured":"Lin, Q.-M., Wang, R.-C., Guo, J., & Sun, L.-J. (2011). Novel congestion control approach in wireless multimedia sensor networks. The Journal of China Universities of Posts and Telecommunications, 18, 1\u20138.","journal-title":"The Journal of China Universities of Posts and Telecommunications"},{"key":"3992_CR18","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1007\/s11036-015-0658-4","volume":"20","author":"Z Yan","year":"2015","unstructured":"Yan, Z., Vasilakos, A., & Yang, L. (2015). Editorial: Recent advances on the next generation of mobile networks and services. Mobile Networks and Applications, 20, 781\u2013782.","journal-title":"Mobile Networks and Applications"},{"key":"3992_CR19","doi-asserted-by":"crossref","unstructured":"Kim, S., Fonseca, R., Dutta, P., Tavakoli, A., Culler, D., Levis, P., et al. (2007). Flush: A reliable bulk transport protocol for multihop wireless networks. In Proceedings of the 5th international conference on Embedded networked sensor systems, SenSys (pp. 351\u2013365).","DOI":"10.1145\/1322263.1322296"},{"key":"3992_CR20","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1007\/s11036-015-0583-6","volume":"20","author":"A Afzal","year":"2015","unstructured":"Afzal, A., Zaidi, S., Shakir, M., Imran, M., Ghogho, M., Vasilakos, A., et al. (2015). The cognitive internet of things: A unified perspective. Mobile Networks and Applications, 20, 72\u201385.","journal-title":"Mobile Networks and Applications"},{"key":"3992_CR21","unstructured":"Li, X., Li, D., Wan, J., Vasilakos, A., Lai, C. \u2013F., & Wang, S. (2015). A review of industrial wireless networks in the context of Industry 4.0. Wireless Networks, 1\u201319."},{"key":"3992_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2015.02.001","volume":"52","author":"AV Vasilakos","year":"2015","unstructured":"Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1\u201310.","journal-title":"Journal of Network and Computer Applications"},{"key":"3992_CR23","doi-asserted-by":"crossref","first-page":"2249","DOI":"10.1016\/j.ins.2009.12.001","volume":"180","author":"N Xiong","year":"2010","unstructured":"Xiong, N., Vasilakos, A. V., Yang, L. T., Wang, C.-X., Kannan, R., & Chang, C.-C. (2010). A novel self-tuning feedback controller for active queue management supporting TCP flows. Information Sciences, 180, 2249\u20132263.","journal-title":"Information Sciences"},{"key":"3992_CR24","doi-asserted-by":"crossref","unstructured":"Visweswaraiya, U. S., & Gurumurthy K. S. (2013). A novel, dynamic data dissemination [D3] technique for congestion avoidance\/control in high speed wireless multimedia sensor networks. In Computational Intelligence, Modelling and Simulation (CIMSim), 2013 Fifth International Conference on, 2013 (pp. 351\u2013356).","DOI":"10.1109\/CIMSim.2013.63"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-3992-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-3992-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-3992-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T09:44:03Z","timestamp":1501494243000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-3992-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,13]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["3992"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-3992-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,13]]}}}