{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:52:57Z","timestamp":1774367577119,"version":"3.50.1"},"reference-count":159,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:00:00Z","timestamp":1642204800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:00:00Z","timestamp":1642204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,15]],"date-time":"2022-01-15T00:00:00Z","timestamp":1642204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"\u201cQoS Provisioning in Internet of Things (loT)\u201d (Ref No. 13"},{"name":"MeitY (CC & BT), Government of India"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,1,15]]},"DOI":"10.1109\/jiot.2021.3104388","type":"journal-article","created":{"date-parts":[[2021,8,12]],"date-time":"2021-08-12T20:21:56Z","timestamp":1628799716000},"page":"916-938","source":"Crossref","is-referenced-by-count":48,"title":["MAC Protocols for IEEE 802.11ah-Based Internet of Things: A Survey"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2597-6483","authenticated-orcid":false,"given":"Nurzaman","family":"Ahmed","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9688-9806","authenticated-orcid":false,"given":"Debashis","family":"De","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8247-9171","authenticated-orcid":false,"given":"Ferdous Ahmed","family":"Barbhuiya","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4514-9402","authenticated-orcid":false,"given":"Md. Iftekhar","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2010.5674788"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7452"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741144"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.08.008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s16111960"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2019.04.007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.03.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2012.02.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20898-0_32"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622034"},{"key":"ref11","volume-title":"EAR-IT","year":"2021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1175\/BAMS-D-13-00193.1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845269"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2016.07.003"},{"key":"ref16","volume-title":"IEEE Approved Draft Standard for Information Technology-Telecommunications and Information Exchange Between Systems-Local and Metropolitan Area Networks-Specific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 2: Sub 1 GHz License Exempt Operation","year":"2016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.250629"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2702589"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.110113.00249"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2394438"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1201\/9781420072112"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.10.007"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5394032"},{"key":"ref24","volume-title":"LoRa Alliance","year":"2021"},{"key":"ref25","volume-title":"SIGFOX\u2014The Global Communications Service Provider","year":"2021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600510CM"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2652320"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2843325"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11596042_106"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.130"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2008.4586058"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2012.6185525"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.111412.00158"},{"key":"ref34","volume-title":"IEEE P802.11 Sub 1 GHz Study Group\u2014IEEE 802","year":"2021"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2429311"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s18020325"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2013.6554572"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.08.015"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7263359"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/fi11010016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939760"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364903"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.7000982"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.13052\/jicts2245-800X.115"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2013.6649432"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2013.6673381"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103036"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477839"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2779844"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2879579"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2015.7436363"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.3390\/info10110348"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2014.2301773"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2916579"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2417684"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.05.006"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600410CM"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2791522"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2915371.2915372"},{"key":"ref60","first-page":"1","article-title":"The study of the centralized control method to hasten link set-up in IEEE 802.11ah networks","volume-title":"Proc. 21st Eur. Wireless Conf.","author":"Bankov"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/RED.2016.7779319"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2981087"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899x\/644\/1\/012008"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883680"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E96.B.2976"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2897127"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2018.8449756"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/12597"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1164717.1164762"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2007.4392340"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.264"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2332047"},{"key":"ref73","first-page":"1","article-title":"CAS-based channel access protocol for IEEE 802.11ah WLANs","volume-title":"Proc. 20th Eur. Wireless Conf.","author":"Bel"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2323311"},{"key":"ref75","first-page":"1","article-title":"Performance analysis of IoT-enabling IEEE 802.11ah technology and its RAW mechanism with non-cross slot boundary holding schemes","volume-title":"Proc. IEEE Int. Symp. World Wireless Mobile Multimedia Netw. (WoWMoM)","author":"Hazmi"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2496418"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-018-0647-2"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2904689"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940251"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47729-9_17"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2014.6983265"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-3947-3"},{"key":"ref83","article-title":"Delay and energy aware raw formation scheme to support delay sensitive M2M traffic in IEEE 802.11ah networks","author":"Charania","year":"2017"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3390\/s17071559"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3143337.3149819"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996899"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2018.8449738"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2840692"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46301-8_15"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2017.8261199"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2018.8556133"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2014.6881241"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-007-9329-5"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/VTCF.2006.486"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5547926"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655274"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2015.7414004"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2017.7915550"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2017.2727056"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292304"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2019.1800163"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2019.0176"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.002"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255067"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.01.005"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.3390\/s19112614"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2005.1558102"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1070"},{"key":"ref109","first-page":"1","article-title":"Techniques of detection of the hidden node in wireless ad hoc network","volume-title":"Proc. World Congr. Eng.","author":"Mostefa"},{"issue":"2","key":"ref110","first-page":"15","article-title":"A hidden node aware network allocation vector management system for multi-hop wireless ad hoc networks","volume":"1","author":"Najimi","year":"2011","journal-title":"Int. J. Commun. Inf. Technol."},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2009.5282490"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.05.011"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925778"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1790-4"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.09.006"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3157737.3157748"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICIST.2016.7483405"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2017.8171080"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2017EBP3462"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2954822"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2006.1665126"},{"key":"ref122","first-page":"1","article-title":"Passive and active hidden terminal detection in 802.11-based ad hoc networks","volume-title":"Proc. IEEE Conf. Comput. Commun.","author":"Li"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.092712.100868"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.6029\/smartcr.2012.02.001"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1197122"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2015.7289297"},{"key":"ref127","first-page":"1","article-title":"A distributed channel access mechanism for ieee 802.11ah","volume-title":"Proc. IEEE World Forum Internet Things (WF-IoT)","author":"Ahmed"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249402"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2018.8524417"},{"key":"ref130","volume-title":"IPv6 Over 802.11ah","author":"Carpio","year":"2015"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403521"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom.2016.7901545"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8762034"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1002\/9780470686218"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2014.7024865"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20181701016"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.04.006"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8376972"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3923"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.17762\/ijcnis.v10i1.3023"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejc.2006.07.007"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1002\/j.1460-2075.1988.tb03056.x"},{"key":"ref143","first-page":"13","article-title":"The (s, t) Jacobsthal and (s, t) Jacobsthal\u2013Lucas matrix sequences","volume":"108","author":"Uslu","year":"2013","journal-title":"Ars Combinatoria"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.836019"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.17762\/ijcnis.v10i1.3212"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/S1874-1029(09)60062-8"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/313237.313248"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1233531"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.171"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916177"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500356WC"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402161"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2016.2586398"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2018.8403746"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101633"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644182"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2797187"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9672206\/09512279.pdf?arnumber=9512279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:03:27Z","timestamp":1705014207000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9512279\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,15]]},"references-count":159,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2021.3104388","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,15]]}}}