{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:35:12Z","timestamp":1775666112910,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T00:00:00Z","timestamp":1742428800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T00:00:00Z","timestamp":1742428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"Makerere University Research and Innovations Fund","award":["MakRIF5"],"award-info":[{"award-number":["MakRIF5"]}]},{"name":"Makerere University Research and Innovations Fund","award":["MakRIF5"],"award-info":[{"award-number":["MakRIF5"]}]},{"name":"Makerere University Research and Innovations Fund","award":["MakRIF5"],"award-info":[{"award-number":["MakRIF5"]}]},{"name":"Regional Universities Forum for Capacity Building in Agriculture","award":["RU\/2020\/Carnegie\/DRG\/002"],"award-info":[{"award-number":["RU\/2020\/Carnegie\/DRG\/002"]}]},{"name":"Regional Universities Forum for Capacity Building in Agriculture","award":["RU\/2020\/Carnegie\/DRG\/002"],"award-info":[{"award-number":["RU\/2020\/Carnegie\/DRG\/002"]}]},{"name":"Regional Universities Forum for Capacity Building in Agriculture","award":["RU\/2020\/Carnegie\/DRG\/002"],"award-info":[{"award-number":["RU\/2020\/Carnegie\/DRG\/002"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00106-8","type":"journal-article","created":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T22:19:56Z","timestamp":1742595596000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Hybrid access control mechanism for massive machine type communications"],"prefix":"10.1007","volume":"5","author":[{"given":"David Martin","family":"Amitu","sequence":"first","affiliation":[]},{"given":"Roseline N.","family":"Akol","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Serugunda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,20]]},"reference":[{"key":"106_CR1","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/MWC.2016.1500284WC","volume":"24","author":"Z Dawy","year":"2016","unstructured":"Dawy Z, Saad W, Ghosh A, Andrews JG, Yaacoub E. Toward massive machine type cellular communications. IEEE Wirel Commun. 2016;24:120\u20138.","journal-title":"IEEE Wirel Commun"},{"key":"106_CR2","doi-asserted-by":"crossref","first-page":"28969","DOI":"10.1109\/ACCESS.2018.2837382","volume":"6","author":"C Bockelmann","year":"2018","unstructured":"Bockelmann C, et al. Towards massive connectivity support for scalable mMTC communications in 5g networks. IEEE Access. 2018;6:28969\u201392.","journal-title":"IEEE Access"},{"key":"106_CR3","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1109\/JSAC.2020.3019724","volume":"39","author":"X Chen","year":"2021","unstructured":"Chen X, et al. Massive access for 5g and beyond. IEEE J Selected Areas Commun. 2021;39:615\u201337.","journal-title":"IEEE J Selected Areas Commun"},{"key":"106_CR4","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MCOM.2017.1600215CM","volume":"55","author":"MS Ali","year":"2017","unstructured":"Ali MS, Hossain E, Kim DI. Lte\/lte\u2014a random access for massive machine-type communications in smart cities. IEEE Commun Mag. 2017;55:76\u201383.","journal-title":"IEEE Commun Mag"},{"key":"106_CR5","doi-asserted-by":"crossref","first-page":"2772","DOI":"10.1109\/TWC.2006.04484","volume":"5","author":"R Veronesi","year":"2006","unstructured":"Veronesi R, Tralli V, Zander J, Zorzi M. Distributed dynamic resource allocation for multicell SDMA packet access net. IEEE Trans Wirel Commun. 2006;5:2772\u201383.","journal-title":"IEEE Trans Wirel Commun"},{"key":"106_CR6","first-page":"385","volume":"13","author":"A Nascimento","year":"2008","unstructured":"Nascimento A, Rodriguez J, Mumtaz S, Gameiro A, Politis C. Dynamic resource allocation architecture for ieee802. 16e: design and performance analysis. Mobile Netw Appl. 2008;13:385\u201397.","journal-title":"Mobile Netw Appl."},{"key":"106_CR7","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1109\/JIOT.2015.2435655","volume":"2","author":"R-G Cheng","year":"2015","unstructured":"Cheng R-G, Al-Taee FM, Chen J, Wei C-H. A dynamic resource allocation scheme for group paging in lte-advanced networks. IEEE Internet Things J. 2015;2:427\u201334.","journal-title":"IEEE Internet Things J"},{"key":"106_CR8","doi-asserted-by":"crossref","first-page":"53342","DOI":"10.1109\/ACCESS.2018.2871068","volume":"6","author":"H-H Choi","year":"2018","unstructured":"Choi H-H, Shin W. Slotted aloha for wireless powered communication networks. IEEE Access. 2018;6:53342\u201355.","journal-title":"IEEE Access"},{"key":"106_CR9","doi-asserted-by":"crossref","unstructured":"Arouk O, Ksentini A. Multi-channel slotted aloha optimization for machine-type-communication. 2014. pp. 119\u201325.","DOI":"10.1145\/2641798.2641802"},{"key":"106_CR10","doi-asserted-by":"crossref","unstructured":"Zhao B, Ren G, Zhang H. Slotted aloha game for medium access control in satellite networks. 2019. pp. 518\u201322.","DOI":"10.1109\/ICCChina.2019.8855903"},{"key":"106_CR11","first-page":"383","volume":"10","author":"A Bellouch","year":"2022","unstructured":"Bellouch A, Zaaloul A, Haqiq A. Random access mechanism enhancement based on a hybrid aloha protocol using an analytical model. J ICT Stand. 2022;10:383\u2013409.","journal-title":"J ICT Stand"},{"key":"106_CR12","doi-asserted-by":"crossref","unstructured":"Choi H-H, Lee J-R. Multi-phased carrier sense multiple access with collision resolution. 2017. pp. 223\u2013232.","DOI":"10.1007\/978-3-319-60717-7_22"},{"key":"106_CR13","doi-asserted-by":"crossref","first-page":"1284","DOI":"10.1109\/LCOMM.2013.020413.122318","volume":"17","author":"H-H Choi","year":"2013","unstructured":"Choi H-H, Moon J-M, Lee I-H, Lee H. Carrier sense multiple access with collision resolution. IEEE Commun Lett. 2013;17:1284\u20137.","journal-title":"IEEE Commun Lett"},{"key":"106_CR14","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.3390\/e24111607","volume":"24","author":"Z Ali","year":"2022","unstructured":"Ali Z, et al. Edge based priority-aware dynamic resource allocation for internet of things networks. Entropy. 2022;24:1607.","journal-title":"Entropy"},{"key":"106_CR15","doi-asserted-by":"crossref","first-page":"1116","DOI":"10.1109\/JPROC.2022.3190205","volume":"110","author":"P Popovski","year":"2022","unstructured":"Popovski P, et al. A perspective on time toward wireless 6g. Proc IEEE. 2022;110:1116\u201346.","journal-title":"Proc IEEE"},{"key":"106_CR16","doi-asserted-by":"crossref","unstructured":"Lim G, Ji H, Shim B. Hybrid active user detection for massive machine-type communications in iot 2018. pp. 1049\u20131052.","DOI":"10.1109\/ICTC.2018.8539661"},{"key":"106_CR17","doi-asserted-by":"crossref","unstructured":"Spathi K, Valkanis A, BeletsIoTi G, Papadimitriou G, Nicopolitidis P. Performance evaluation of slotted aloha based iot networks under asymmetric traffic. 2020. pp. 1\u20135.","DOI":"10.1109\/CCCI49893.2020.9256406"},{"key":"106_CR18","doi-asserted-by":"crossref","first-page":"3828","DOI":"10.1109\/TIT.2010.2050920","volume":"56","author":"Y-WPP Hong","year":"2010","unstructured":"Hong Y-WPP, Lin C-K, Wang S-H. Exploiting cooperative advantages in slotted aloha random access networks. IEEE Trans Inf Theory. 2010;56:3828\u201346.","journal-title":"IEEE Trans Inf Theory"},{"key":"106_CR19","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1504\/IJES.2023.139204","volume":"16","author":"L Niu","year":"2023","unstructured":"Niu L, Wang X, Liu D, Guo B. An improved 802.15. 4 unslotted csma\/ca algorithm for reducing collision probability and delay in wireless sensor networks. Int J Embed Syst. 2023;16:276\u201387.","journal-title":"Int J Embed Syst"},{"key":"106_CR20","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1109\/TMC.2015.2462832","volume":"15","author":"R Doost-Mohammady","year":"2015","unstructured":"Doost-Mohammady R, Naderi MY, Chowdhury KR. Performance analysis of csma\/ca based medium access in full duplex wireless communications. IEEE Trans Mobile Comput. 2015;15:1457\u201370.","journal-title":"IEEE Trans Mobile Comput"},{"key":"106_CR21","doi-asserted-by":"crossref","unstructured":"Salajegheh M, Soroush H, Kalis A. Hymac: Hybrid tdma\/fdma medium access control protocol for wireless sensor networks. 2007. pp. 1\u20135.","DOI":"10.1109\/PIMRC.2007.4394374"},{"key":"106_CR22","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1109\/TVT.2013.2280124","volume":"63","author":"R Balakrishnan","year":"2013","unstructured":"Balakrishnan R, Canberk B. Traffic-aware qos provisioning and admission control in ofdma hybrid small cells. IEEE Trans Veh Technol. 2013;63:802\u201310.","journal-title":"IEEE Trans Veh Technol"},{"key":"106_CR23","doi-asserted-by":"crossref","first-page":"4682","DOI":"10.1109\/JIOT.2020.2969326","volume":"7","author":"J Qiu","year":"2020","unstructured":"Qiu J, et al. A survey on access control in the age of internet of things. IEEE Internet Things J. 2020;7:4682\u201396.","journal-title":"IEEE Internet Things J"},{"key":"106_CR24","doi-asserted-by":"crossref","unstructured":"Jiang N, Deng Y, Nallanathan A. Deep reinforcement learning for discrete and continuous massive access control optimization. 2020. pp. 1\u20137.","DOI":"10.1109\/ICC40277.2020.9149055"},{"key":"106_CR25","doi-asserted-by":"crossref","unstructured":"Han Q, Feng G, Qin S, Zhang Q. Access control for machine-type communication assisted by d2d in heterogeneous networks. 2020. pp. 1\u20136.","DOI":"10.1109\/WCNCW48565.2020.9124798"},{"key":"106_CR26","volume":"36","author":"A Hemmati","year":"2024","unstructured":"Hemmati A, Rahmani AM. Clusfc-iot: a clustering-based approach for data reduction in fog-cloud-enabled iot. Concurr Comput Pract Exp. 2024;36: e8284.","journal-title":"Concurr. Comput. Pract. Exp"},{"key":"106_CR27","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1007\/s42154-024-00284-1","volume":"7","author":"A Hemmati","year":"2024","unstructured":"Hemmati A, Zarei M. Ufc3: Uav-aided fog computing based congestion control strategy for emergency message dissemination in 5g internet of vehicles. Automot Innov. 2024;7:456\u201372.","journal-title":"Automot. Innov"},{"key":"106_CR28","doi-asserted-by":"crossref","first-page":"212","DOI":"10.3390\/info15040212","volume":"15","author":"BUI Khan","year":"2024","unstructured":"Khan BUI, et al. Blockchain-enhanced sensor-as-a-service (seaas) in iot: leveraging blockchain for efficient and secure sensing data transactions. Information. 2024;15:212.","journal-title":"Information"},{"key":"106_CR29","doi-asserted-by":"crossref","first-page":"61","DOI":"10.3390\/sym17010061","volume":"17","author":"BUI Khan","year":"2025","unstructured":"Khan BUI, Goh KW, Khan AR, Zuhairi MF, Chaimanee M. Resource management and secure data exchange for mobile sensors using ethereum blockchain. Symmetry. 2025;17:61.","journal-title":"Symmetry"},{"key":"106_CR30","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0141113","author":"A Sharmin","year":"2023","unstructured":"Sharmin A, et al. Secure iot routing through manifold criterion trust evaluation using ant colony optimization. Int J Adv Comput Sci Appl. 2023. https:\/\/doi.org\/10.14569\/IJACSA.2023.0141113.","journal-title":"Int J Adv Comput Sci Appl."},{"key":"106_CR31","doi-asserted-by":"crossref","first-page":"3982","DOI":"10.3390\/electronics11233982","volume":"11","author":"RF Olanrewaju","year":"2022","unstructured":"Olanrewaju RF, Khan BUI, Kiah MLM, Abdullah NA, Goh KW. Decentralized blockchain network for resisting side-channel attacks in mobility-based iot. Electronics. 2022;11:3982.","journal-title":"Electronics"},{"key":"106_CR32","doi-asserted-by":"crossref","first-page":"544","DOI":"10.3390\/info13110544","volume":"13","author":"BUI Khan","year":"2022","unstructured":"Khan BUI, et al. Sgm: strategic game model for resisting node misbehaviour in iot-cloud ecosystem. Information. 2022;13:544.","journal-title":"Information"},{"key":"106_CR33","doi-asserted-by":"crossref","first-page":"17725","DOI":"10.48084\/etasr.8465","volume":"14","author":"BUI Khan","year":"2024","unstructured":"Khan BUI, et al. A scalability enhancement scheme for ethereum blockchains: a graph-based decentralized approach. Eng Technol Appl Sci Res. 2024;14:17725\u201336.","journal-title":"Eng Technol Appl Sci Res"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00106-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00106-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00106-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T22:20:21Z","timestamp":1742595621000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00106-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,20]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["106"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00106-8","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,20]]},"assertion":[{"value":"28 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 March 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"30"}}