{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T04:06:15Z","timestamp":1750910775894,"version":"3.41.0"},"reference-count":148,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100003130","name":"Fonds Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["G084117","G0A2617N","G025615"],"award-info":[{"award-number":["G084117","G0A2617N","G025615"]}],"id":[{"id":"10.13039\/501100003130","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2748178","type":"journal-article","created":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T18:23:08Z","timestamp":1504290188000},"page":"19536-19561","source":"Crossref","is-referenced-by-count":19,"title":["Review and Classification of Multichannel MAC Protocols for Low-Power and Lossy Networks"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0565-9026","authenticated-orcid":false,"given":"Carlos M.","family":"Garcia Algora","sequence":"first","affiliation":[]},{"given":"Vitalio","family":"Alfonso Reguera","sequence":"additional","affiliation":[]},{"given":"Nikos","family":"Deligiannis","sequence":"additional","affiliation":[]},{"given":"Kris","family":"Steenhaut","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-27139-2_7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2016.7460875"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.04.004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.03.012"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.040412.00105"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1509968"},{"journal-title":"The CC2420 Radio Interface","year":"2006","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2008.15"},{"key":"ref34","first-page":"1","article-title":"Zigbee technology: Wireless control that simply works","volume":"2","author":"kinney","year":"2003","journal-title":"Proc Commun Design Conf"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.05.020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632658"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10776-011-0156-y"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27247-4_6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.02.013"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2619702"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041311.00099"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9400-5"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2014.6813995"},{"key":"ref26","article-title":"Medium access control in wireless sensor networks","volume":"2","author":"langendoen","year":"2007","journal-title":"Medium Access Control in Wireless Networks"},{"journal-title":"Computer Networks","year":"2013","author":"tanenbaum","key":"ref100"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2440374"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MSSC.2010.936667"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2101311"},{"journal-title":"An Architecture for IPv6 over the TSCH mode of IEEE 802 15 4e","year":"2017","author":"thubert","key":"ref146"},{"journal-title":"6TiSCH Operation Sublayer (6top)","year":"2015","author":"wang","key":"ref147"},{"journal-title":"Minimal 6TiSCH Configuration","year":"2017","author":"vilajosana","key":"ref148"},{"journal-title":"RPL IPv6 Routing Protocol for Low-Power and Lossy Networks Internet Requests for Comments","year":"2012","author":"winter","key":"ref59"},{"journal-title":"User Datagram Protocol Internet Requests for Comments","year":"1980","author":"postel","key":"ref58"},{"journal-title":"Transmission Control Protocol Internet Request For Comments","year":"1981","author":"postel","key":"ref57"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7540"},{"journal-title":"Hypertext Transfer Protocol (HTTP\/1 1) Message Syntax and Routing Internet Requests for Comments","year":"2014","author":"fielding","key":"ref55"},{"journal-title":"The Constrained Application Protocol (CoAP) Internet Requests for Comments","year":"2014","author":"shelby","key":"ref54"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/9780470515181"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2009.2022536"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.743"},{"journal-title":"Forecast analysis Internet of Things&#x2014;Endpoints worldwide 2016 update","year":"2013","author":"middleton","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-013-1021-9"},{"journal-title":"Embracing the Internet of Everything to Capture Your Share of $14 4 Trillion","year":"2013","author":"bradley","key":"ref6"},{"key":"ref5","volume":"180","author":"manyika","year":"2013","journal-title":"Disruptive Technologies Advances That Will Transform Life Business and the Global Economy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICT.2016.7500418"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.060710.00094"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644057"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2065210"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460443"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2004.18"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031497"},{"journal-title":"VigilNet","year":"2017","author":"stankovic","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031522"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.26"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524539"},{"journal-title":"Approximation Algorithms","year":"2013","author":"vazirani","key":"ref126"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/2737095.2737108"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2455036"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2107502.2107533"},{"key":"ref72","doi-asserted-by":"crossref","DOI":"10.70220\/br7pbml4","article-title":"Radio spectrum measurements of individual microwave ovens (volume 1)","author":"gawthrop","year":"1994"},{"key":"ref129","first-page":"1","article-title":"Low-overhead time synchronization for schedule-based multi-channel wireless sensor networks","author":"phung","year":"2013","journal-title":"Proc 15th IEEE Workshop Local and Metropolitan Area Networks (LANMAN)"},{"key":"ref71","first-page":"212","article-title":"Exposure assessment of microwave ovens and impact on total exposure in WLANs","volume":"168","author":"plets","year":"2016","journal-title":"Radiat Protection Dosimetry"},{"key":"ref128","first-page":"206","article-title":"Maintaining constructive interference using well-synchronized sensor nodes","author":"k\u00f6nig","year":"2016","journal-title":"Proc Int Conf Distrib Comput Sensor Syst (DCOSS)"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1177\/1550147716662787"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132929"},{"key":"ref130","first-page":"61","article-title":"Time synchronization in WSN: A survey","volume":"2","author":"singh","year":"2013","journal-title":"Int J Enhanced Research in Science Technology & Engineering"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-52727-7_3"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2010.5682325"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2006.288495"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.01.002"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ECS.2014.6892784"},{"journal-title":"The Case for Cross Disciplinary Research on Time Aware Applications Computers and Communication Systems (TAACCS)","year":"2013","author":"weiss","key":"ref131"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2989293.2989296"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04623-4_12"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.10.004"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ITSIM.2010.5561571"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2322971"},{"key":"ref138","first-page":"641","article-title":"Cross-level sensor network simulation with COOJA","author":"\u00f6sterlind","year":"2006","journal-title":"Proc IEEE Conf Local Comput Netw"},{"key":"ref137","first-page":"249","article-title":"Wireless sensor network simulators: A survey and comparisons","volume":"2","author":"sundani","year":"2011","journal-title":"Int J Comput Netw"},{"journal-title":"Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks Internet Requests for Comments","year":"2012","author":"vasseur","key":"ref60"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/1322263.1322318"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600397CM"},{"journal-title":"Objective Function Zero for the Routing Protocol for Low-Power and Lossy Networks (RPL) Internet Requests for Comments","year":"2012","author":"thubert","key":"ref61"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1278972.1278992"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/PADS.1998.685281"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2015754"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2011.6012487"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012114.00058"},{"journal-title":"6TiSCH 6Top Scheduling Function Zero (SF0)","year":"2017","author":"dujovne","key":"ref142"},{"journal-title":"LoRa Alliance Official Website","year":"2017","key":"ref67"},{"journal-title":"6top Protocol (6P)","year":"2017","author":"wang","key":"ref143"},{"journal-title":"DU's official website","year":"2017","key":"ref68"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809714"},{"journal-title":"From Machine-to-Machine to the Internet of Things Introduction to A New Age of Intelligence","year":"2014","author":"holler","key":"ref2"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.011"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/SCVT.2016.7797668"},{"key":"ref1","first-page":"1","article-title":"Internet of Things: An early reality of the future Internet","author":"botterman","year":"2009","journal-title":"Proc Workshop Rep Eur Commission Inf Soc Media"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.4108\/icst.crowncom.2014.255369"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.05.003"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TELSKS.2007.4375929"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2473852"},{"journal-title":"Graph Coloring Problems","year":"2011","author":"lidick\u00fd","key":"ref107"},{"key":"ref93","first-page":"7","article-title":"OMA: A multi-channel MAC protocol with opportunistic media access in wireless sensor networks","author":"li","year":"2010","journal-title":"Proc 6th IEEE Int Conf Mobile Ad-Hoc Sensor Netw"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03417-6_47"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1869985"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.11.008"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2509861"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.22"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461935"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2007.4394374"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2012.6407742"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-5505-8_7"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632657"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.10.002"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17994-5_14"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2307868"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.587"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.10.005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2012.6178212"},{"year":"2014","key":"ref11","article-title":"Specification of the Bluetooth system version 4.2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2007.4460126"},{"journal-title":"Routing Requirements for Urban Low-Power and Lossy Networks Internet Requests for Comments","year":"2009","author":"dohler","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4539481"},{"key":"ref15","first-page":"232","article-title":"A new multi-channel MAC protocol with on-demand channel assignment for multi-hop mobile ad hoc networks","author":"wu","year":"2000","journal-title":"Proc IEEE Int Symp Parallel Archit Algorithms Netw (I-SPAN)"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023742"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2000.904804"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00224-3_3"},{"key":"ref117","first-page":"205","article-title":"A lightweight medium access protocol (LMAC) for wireless sensor networks: Reducing preamble transmissions and transceiver state switches","author":"van hoesel","year":"2004","journal-title":"Proc 1st Int Workshop Netw Sens Syst (INSS)"},{"key":"ref17","first-page":"419","article-title":"A multi-channel MAC protocol with power control for multi-hop mobile ad hoc networks","author":"tseng","year":"2001","journal-title":"Proc 21st IEEE Int Conf Distrib Comput Syst Workshops"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2840808"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778434"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11917-0_6"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07329-3_3"},{"key":"ref19","first-page":"203","article-title":"Dynamic open spectrum sharing MAC protocol for wireless ad hoc networks","author":"ma","year":"2005","journal-title":"Proc 1st IEEE Int Symp New Frontiers Dyn Spectr Access Netw (DySPAN)"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.43"},{"key":"ref114","volume":"2","author":"west","year":"2001","journal-title":"Introduction to Graph Theory"},{"key":"ref113","first-page":"701","article-title":"Performance evaluation of the IEEE 802.15.4 MAC for low-rate low-power wireless networks","author":"lu","year":"2004","journal-title":"Proc IEEE Int Conf Perform Comput Commun"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2012.6185525"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.175"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2008.0239"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/2737095.2742557"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583485"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236363"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100506"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2369003"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.27"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.10.019"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.250"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2011.36"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/08024074.pdf?arnumber=8024074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:27:22Z","timestamp":1750858042000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8024074\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":148,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2748178","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2017]]}}}