{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:32Z","timestamp":1740148892698,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T00:00:00Z","timestamp":1633132800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,2]],"date-time":"2021-10-02T00:00:00Z","timestamp":1633132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s12083-021-01156-9","type":"journal-article","created":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T18:19:54Z","timestamp":1633371594000},"page":"221-245","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analytical modelling of false blocking problem in wireless ad hoc networks"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8584-1498","authenticated-orcid":false,"given":"Wai Kheong","family":"Chong","sequence":"first","affiliation":[]},{"given":"Micheal","family":"Drieberg","sequence":"additional","affiliation":[]},{"given":"Varun","family":"Jeoti","sequence":"additional","affiliation":[]},{"given":"Rizwan","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,2]]},"reference":[{"key":"1156_CR1","doi-asserted-by":"publisher","unstructured":"Funai C, Tapparello C, Heinzelman W (2017) Enabling multi-hop ad hoc networks through WiFi Direct multi-group networking. International Conference on Computing, Networking and Communications (ICNC):491\u2013497. https:\/\/doi.org\/10.1109\/ICCNC.2017.7876178","DOI":"10.1109\/ICCNC.2017.7876178"},{"key":"1156_CR2","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.adhoc.2014.10.001","volume":"25","author":"DG Reina","year":"2015","unstructured":"Reina DG, Toral SL, Johnson P, Barrero F (2015) A survey on probabilistic broadcast schemes for wireless ad hoc networks. Ad Hoc Netw 25:263\u2013292. https:\/\/doi.org\/10.1016\/j.adhoc.2014.10.001","journal-title":"Ad Hoc Netw"},{"key":"1156_CR3","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.adhoc.2016.02.013","volume":"44","author":"DNM Dang","year":"2016","unstructured":"Dang DNM, Nguyen V, Le HT, Hong CS, Choe J (2016) An efficient multi-channel MAC protocol for wireless ad hoc networks. Ad Hoc Netw 44:46\u201357. https:\/\/doi.org\/10.1016\/j.adhoc.2016.02.013","journal-title":"Ad Hoc Netw"},{"issue":"2","key":"1156_CR4","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s12083-019-00727-1","volume":"13","author":"D Son","year":"2020","unstructured":"Son D, Huh S, Lee T, Kwak J (2020) Internet of things system technologies based on quality of experience. Peer-to-Peer Networking and Applications 13(2):475\u2013488. https:\/\/doi.org\/10.1007\/s12083-019-00727-1","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"1156_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jii.2018.01.005","volume":"10","author":"S Li","year":"2018","unstructured":"Li S, Da Xu L, Zhao S (2018) 5G internet of things: a survey. J Ind Inf Integr 10:1\u20139. https:\/\/doi.org\/10.1016\/j.jii.2018.01.005","journal-title":"J Ind Inf Integr"},{"issue":"4","key":"1156_CR6","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1007\/s12083-018-0689-2","volume":"12","author":"A Thomas","year":"2019","unstructured":"Thomas A, Raja G (2019) FINDER: A D2D based critical communications framework for disaster management in 5G. Peer-to-Peer Networking and Applications 12(4):912\u2013923. https:\/\/doi.org\/10.1007\/s12083-018-0689-2","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"1156_CR7","doi-asserted-by":"publisher","unstructured":"Hayat O, Ngah R, Zahedi Y (2019) In-Band Device to Device (D2D) Communication and Device Discovery: A Survey. Wireless Personal Communications:1\u201322. https:\/\/doi.org\/10.1007\/s11277-019-06173-9","DOI":"10.1007\/s11277-019-06173-9"},{"key":"1156_CR8","unstructured":"IEEE 802.11. Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Specification (2017)"},{"issue":"5","key":"1156_CR9","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1007\/s11276-016-1230-2","volume":"23","author":"Z Wei","year":"2017","unstructured":"Wei Z, Sun Y, Ji Y (2017) Collision analysis of CSMA\/CA based MAC protocol for duty cycled WBANs. Wireless Networks 23(5):1429\u20131447. https:\/\/doi.org\/10.1007\/s11276-016-1230-2","journal-title":"Wireless Networks"},{"issue":"3","key":"1156_CR10","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.icte.2016.07.003","volume":"2","author":"N Ahmed","year":"2016","unstructured":"Ahmed N, Rahman H, Hussain MI (2016) A comparison of 802.11ah and 802.15. 4 for IoT. ICT Express 2(3):100\u2013102. https:\/\/doi.org\/10.1016\/j.icte.2016.07.003","journal-title":"ICT Express"},{"key":"1156_CR11","doi-asserted-by":"publisher","unstructured":"Sangeetha U, Babu A (2019) Performance analysis of IEEE 802.11 ah wireless local area network under the restricted access window-based mechanism. International Journal of Communication Systems 32(4). https:\/\/doi.org\/10.1002\/dac.3888","DOI":"10.1002\/dac.3888"},{"key":"1156_CR12","doi-asserted-by":"publisher","unstructured":"Ismaiel B, Abolhasan M, Smith D et al (2017) Scalable MAC protocol for D2D communication for future 5G networks. IEEE Annual Consumer Communications & Networking Conference (CCNC):542\u2013547. https:\/\/doi.org\/10.1109\/CCNC.2017.7983165","DOI":"10.1109\/CCNC.2017.7983165"},{"key":"1156_CR13","doi-asserted-by":"publisher","unstructured":"Maksymyuk T, Brych M, Klymash M et al (2017) Cooperative channels allocation in unlicensed spectrum for D2D assisted 5G cellular network. Advanced Information and Communication Technologies (AICT):197\u2013200. https:\/\/doi.org\/10.1109\/AIACT.2017.8020098","DOI":"10.1109\/AIACT.2017.8020098"},{"key":"1156_CR14","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.comnet.2014.11.002","volume":"76","author":"X Fafoutis","year":"2015","unstructured":"Fafoutis X, Di Mauro A, Vithanage MD, Dragoni N (2015) Receiver-initiated medium access control protocols for wireless sensor networks. Comput Netw 76:55\u201374. https:\/\/doi.org\/10.1016\/j.comnet.2014.11.002","journal-title":"Comput Netw"},{"key":"1156_CR15","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.comnet.2018.02.017","volume":"136","author":"J Yao","year":"2018","unstructured":"Yao J, Lou W, Yang C, Wu K (2018) Efficient interference-aware power control for wireless networks. Comput Netw 136:68\u201379. https:\/\/doi.org\/10.1016\/j.comnet.2018.02.017","journal-title":"Comput Netw"},{"issue":"2","key":"1156_CR16","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1109\/TWC.2015.2480398","volume":"15","author":"S Chakraborty","year":"2015","unstructured":"Chakraborty S, Nandi S, Chattopadhyay S (2015) Alleviating hidden and exposed nodes in high-throughput wireless mesh networks. IEEE Trans Wirel Commun 15(2):928\u2013937. https:\/\/doi.org\/10.1109\/TWC.2015.2480398","journal-title":"IEEE Trans Wirel Commun"},{"key":"1156_CR17","doi-asserted-by":"publisher","first-page":"1516","DOI":"10.1109\/WCNC.2003.1200611","volume":"3","author":"S Ray","year":"2003","unstructured":"Ray S, Carruthers J, Starobinski D (2003) RTS\/CTS-induced congestion in ad hoc wireless LANs. In Proceedings of IEEE Wireless Communications and Networking Conference 3:1516\u20131521. https:\/\/doi.org\/10.1109\/WCNC.2003.1200611","journal-title":"In Proceedings of IEEE Wireless Communications and Networking Conference"},{"issue":"2","key":"1156_CR18","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TVT.2007.891476","volume":"56","author":"S Ray","year":"2007","unstructured":"Ray S, Starobinski D (2007) On false blocking in RTS\/CTS-based multihop wireless networks. IEEE Transactions of Vehicular Technology 56(2):849\u2013862. https:\/\/doi.org\/10.1109\/TVT.2007.891476","journal-title":"IEEE Transactions of Vehicular Technology"},{"issue":"1","key":"1156_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s11235-017-0314-3","volume":"67","author":"WK Chong","year":"2018","unstructured":"Chong WK, Drieberg M, Jeoti V (2018) Mitigating false blocking problem in wireless ad hoc networks. Telecommun Syst 67(1):31\u201346. https:\/\/doi.org\/10.1007\/s11235-017-0314-3","journal-title":"Telecommun Syst"},{"key":"1156_CR20","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.jnca.2016.11.029","volume":"78","author":"MA Hossain","year":"2017","unstructured":"Hossain MA, Sarkar NI, Gutierrez J, Liu W (2017) Performance study of block ACK and reverse direction in IEEE 802.11n using a Markov chain model. Journal of Network and Computer Applications 78:170\u2013179. https:\/\/doi.org\/10.1016\/j.jnca.2016.11.029","journal-title":"Journal of Network and Computer Applications"},{"issue":"7","key":"1156_CR21","doi-asserted-by":"publisher","first-page":"1513","DOI":"10.1109\/LCOMM.2017.2677924","volume":"21","author":"K Chandra","year":"2017","unstructured":"Chandra K, Prasad RV, Niemegeers I (2017) Performance analysis of IEEE 802.11ad MAC protocol. IEEE communications letters 21(7):1513\u20131516. https:\/\/doi.org\/10.1109\/LCOMM.2017.2677924","journal-title":"IEEE communications letters"},{"issue":"1","key":"1156_CR22","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s00165-014-0300-4","volume":"27","author":"M Yazid","year":"2015","unstructured":"Yazid M, A\u00efssani D, Bouallouche-Medjkoune L, Amrouche N, Bakli K (2015) Modeling and enhancement of the IEEE 802.11 RTS\/CTS scheme in an error-prone channel. Formal Aspects of Computing 27(1):33\u201352. https:\/\/doi.org\/10.1007\/s00165-014-0300-4","journal-title":"Formal Aspects of Computing"},{"key":"1156_CR23","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.csi.2015.09.002","volume":"44","author":"CE Weng","year":"2016","unstructured":"Weng CE, Chen HC (2016) The performance evaluation of IEEE 802.11 DCF using Markov chain model for wireless LANs. Computer Standards & Interfaces 44:144\u2013149. https:\/\/doi.org\/10.1016\/j.csi.2015.09.002","journal-title":"Computer Standards & Interfaces"},{"key":"1156_CR24","doi-asserted-by":"publisher","unstructured":"Sanada K, Komuro N, Sekiya H (2015) End-to-end throughput and delay analysis for IEEE 802.11 string topology multi-hop network using Markov-chain model. Personal, Indoor, and Mobile Radio Communications (PIMRC):1697\u20131701. https:\/\/doi.org\/10.1109\/PIMRC.2015.7343572","DOI":"10.1109\/PIMRC.2015.7343572"},{"key":"1156_CR25","doi-asserted-by":"publisher","unstructured":"Karabulut MA, Shah AS, Ilhan H (2017) Performance modeling and analysis of the IEEE 802.11 DCF for VANETs. Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT):346\u2013351. https:\/\/doi.org\/10.1109\/ICUMT.2017.8255147","DOI":"10.1109\/ICUMT.2017.8255147"},{"issue":"1","key":"1156_CR26","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1504\/IJWMC.2015.071674","volume":"9","author":"R Joon","year":"2015","unstructured":"Joon R, Singh RP (2015) Modelling of IEEE 802.11 DCF in the Presence of Hidden Nodes. International Journal of Wireless and Mobile Computing 9(1):70\u201377. https:\/\/doi.org\/10.1504\/IJWMC.2015.071674","journal-title":"International Journal of Wireless and Mobile Computing"},{"issue":"1","key":"1156_CR27","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s11277-016-3252-6","volume":"89","author":"P Rathee","year":"2016","unstructured":"Rathee P, Singh R, Kumar S (2016) Performance Analysis of IEEE 802.11p in the Presence of Hidden Terminals. Wireless Personal Communications 89(1):61\u201378. https:\/\/doi.org\/10.1007\/s11277-016-3252-6","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"1156_CR28","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1109\/TMC.2015.2462832","volume":"15","author":"R Doost-Mohammady","year":"2015","unstructured":"Doost-Mohammady R, Naderi MY, Chowdhury KR (2015) Performance analysis of CSMA\/CA based medium access in full duplex wireless communications. IEEE Trans Mob Comput 15(6):1457\u20131470. https:\/\/doi.org\/10.1109\/TMC.2015.2462832","journal-title":"IEEE Trans Mob Comput"},{"issue":"4","key":"1156_CR29","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1007\/s11276-016-1383-z","volume":"24","author":"N Hajlaoui","year":"2018","unstructured":"Hajlaoui N, Jabri I, Jemaa MB (2018) An accurate two dimensional Markov chain model for IEEE 802.11 n DCF. Wireless Networks 24(4):1019\u20131031. https:\/\/doi.org\/10.1007\/s11276-016-1383-z","journal-title":"Wireless Networks"},{"issue":"6","key":"1156_CR30","doi-asserted-by":"publisher","first-page":"3455","DOI":"10.1109\/TNET.2017.2747406","volume":"25","author":"A Bhattacharya","year":"2017","unstructured":"Bhattacharya A, Kumar A (2017) Analytical Modeling of IEEE 802.11-Type CSMA\/CA Networks with Short Term Unfairness. IEEE\/ACM Transactions on Networking (TON) 25(6):3455\u20133472. https:\/\/doi.org\/10.1109\/TNET.2017.2747406","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"issue":"4","key":"1156_CR31","doi-asserted-by":"publisher","first-page":"1675","DOI":"10.1109\/TCOMM.2017.2657621","volume":"65","author":"P Garrido","year":"2017","unstructured":"Garrido P, Lucani DE, Ag\u00fcero R (2017) Markov chain model for the decoding probability of sparse network coding. IEEE Trans Commun 65(4):1675\u20131685. https:\/\/doi.org\/10.1109\/TCOMM.2017.2657621","journal-title":"IEEE Trans Commun"},{"issue":"1","key":"1156_CR32","doi-asserted-by":"publisher","first-page":"1537","DOI":"10.1007\/s11277-017-4255-7","volume":"96","author":"X Deng","year":"2017","unstructured":"Deng X, He T, He L, Gui J, Peng Q (2017) Performance analysis for IEEE 802.11s wireless mesh network in smart grid. Wireless Personal Communications 96(1):1537\u20131555. https:\/\/doi.org\/10.1007\/s11277-017-4255-7","journal-title":"Wireless Personal Communications"},{"key":"1156_CR33","unstructured":"MathWorks \u2013 MATLAB [Online]. ww2.mathworks.cn\/en\/products\/matlab.html (2020). Accessed December 2020"},{"key":"1156_CR34","unstructured":"OMNeT++ Discrete Event Simulator [Online]. omnetpp.org (2020). Accessed December 2020"},{"key":"1156_CR35","unstructured":"NS-3 Network Simulator [Online]. nsnam.org (2021). Accessed January 2021"},{"key":"1156_CR36","doi-asserted-by":"publisher","first-page":"154114","DOI":"10.1109\/ACCESS.2020.3018088","volume":"8","author":"S Manzoor","year":"2020","unstructured":"Manzoor S, Yin Y, Gao Y, Hei X, Cheng W (2020) A Systematic Study of IEEE 802.11 DCF Network Optimization From Theory to Testbed. IEEE Access 8:154114\u2013154132. https:\/\/doi.org\/10.1109\/ACCESS.2020.3018088","journal-title":"IEEE Access"},{"key":"1156_CR37","unstructured":"Rebeca Modeling Language [Online]. rebeca-lang.org (2020). Accessed December 2020"},{"issue":"6","key":"1156_CR38","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1007\/s00165-017-0429-z","volume":"29","author":"B Yousefi","year":"2017","unstructured":"Yousefi B, Ghassemi F, Khosravi R (2017) Modeling and efficient verification of wireless ad hoc networks. Form Asp Comput 29(6):1051\u20131086. https:\/\/doi.org\/10.1007\/s00165-017-0429-z","journal-title":"Form Asp Comput"},{"key":"1156_CR39","doi-asserted-by":"publisher","unstructured":"Jaghoori M, Movaghar A, Sirjani M (2006) The Model Checking Engine of Rebeca. ACM SAC (6). https:\/\/doi.org\/10.1145\/1141277.1141704","DOI":"10.1145\/1141277.1141704"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01156-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01156-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01156-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T02:14:22Z","timestamp":1642644862000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01156-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,2]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["1156"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01156-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2021,10,2]]},"assertion":[{"value":"8 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}