{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T07:25:06Z","timestamp":1768029906881,"version":"3.49.0"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T00:00:00Z","timestamp":1538352000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/tii.2018.2856884","type":"journal-article","created":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T20:57:49Z","timestamp":1531947469000},"page":"4468-4480","source":"Crossref","is-referenced-by-count":78,"title":["From Best Effort to Deterministic Packet Delivery for Wireless Industrial IoT Networks"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4478-7955","authenticated-orcid":false,"given":"Remous-Aris","family":"Koutsiamanis","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0331-0579","authenticated-orcid":false,"given":"Georgios Z.","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9871-0013","authenticated-orcid":false,"given":"Xenofon","family":"Fafoutis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2044-2116","authenticated-orcid":false,"given":"Julian Martin Del","family":"Fiore","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1615-1650","authenticated-orcid":false,"given":"Pascal","family":"Thubert","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Montavont","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Leapfrog Collaboration: Toward determinism and predictability in industrial-IoT applications","author":"papadopoulos","year":"0","journal-title":"Proc IEEE Int Conf Commun"},{"key":"ref11","first-page":"65","article-title":"Link peek: A link outage\n resilient IP packet forwarding mechanism for 6LoWPAN\/RPL based low-power and lossy networks (LLNs)","author":"lohith","year":"0","journal-title":"Proc IEEE Int Conf Mobile Serv"},{"key":"ref12","article-title":"Using IEEE 802.15.4e time-slotted channel hopping (TSCH) in the internet of things (IoT): Problem\n statement","author":"watteyne","year":"2015","journal-title":"RFC 7554"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2255062"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.003"},{"key":"ref15","first-page":"301","article-title":"Guard time optimisation and adaptation for\n energy efficient multi-hop TSCH networks","author":"papadopoulos","year":"0","journal-title":"Proc IEEE World Forum Internet Things"},{"key":"ref16","first-page":"94","article-title":"Toward a packet duplication control for opportunistic routing in\n WSNs","author":"papadopoulos","year":"0","journal-title":"Proc IEEE Global Telecommun Conf"},{"key":"ref17","first-page":"3","article-title":"Scheduling high-rate unpredictable traffic in IEEE 802.15.4 TSCH networks","author":"elsts","year":"0","journal-title":"Proc Int Conf Distr Comput Sensor Syst"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.03.012"},{"key":"ref19","first-page":"312","article-title":"Accurate network-scale power profiling for sensor network simulators","author":"eriksson","year":"0","journal-title":"Proc 6th Eu Conf Wireless Sensor Netw"},{"key":"ref4","article-title":"Converging over deterministic networks for an industrial internet","author":"thubert","year":"2017"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.05.014"},{"key":"ref3","article-title":"Field\n wireless solution based on ISA100.11a to innovate instrumentation","volume":"53","author":"yamamoto","year":"2010"},{"key":"ref6","first-page":"51","article-title":"Importance of repeatable setups for\n reproducible experimental results in IoT","author":"papadopoulos","year":"0","journal-title":"Proc Perform Eval Wireless Ad Hoc Sens Ubiquitous Netw"},{"key":"ref5","year":"2016","journal-title":"IEEE Standard for Low-Rate Wireless Personal Area Networks"},{"key":"ref8","article-title":"Industrial routing requirements in\n low-power and lossy networks","author":"pister","year":"2009","journal-title":"IETF RFC 5673"},{"key":"ref7","article-title":"RPL\n applicability in industrial networks","author":"phinney","year":"2013","journal-title":"Working Draft IETF Secretariat Internet-Draft draft-ietf-roll-rpl-industrial-applicability-02"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"ref1","article-title":"Deterministic networking use cases","author":"grossman","year":"2017","journal-title":"Working Draft IETF Secretariat Internet-Draft draft-ietf-detnet-use-cases-13"},{"key":"ref9","article-title":"RPL: IPv6 routing protocol for low-power and\n lossy networks","author":"winter","year":"2012","journal-title":"IETF RFC 6550"},{"key":"ref20","year":"2010","journal-title":"Z1 Datasheet"},{"key":"ref22","first-page":"1976","article-title":"Reliable data transfer using overhearing for implicit ACK","author":"lee","year":"0","journal-title":"Proc ICCAS-SICE"},{"key":"ref21","first-page":"41","article-title":"MSPSim&#x2014;An extensible simulator for MSP430-equipped sensor\n boards","volume":"118","author":"eriksson","year":"0","journal-title":"Proc Eur Conf Wireless Sensor Netw"},{"key":"ref24","article-title":"Exploiting\n packet replication and elimination in complex tracks in 6TiSCH LLNs","author":"papadopoulos","year":"2017","journal-title":"Working Draft IETF Secretariat Internet-Draft draft-papadopoulos-6tisch-pre-reqs-00"},{"key":"ref23","first-page":"52","article-title":"Adaptive reliable routing protocol\n for wireless sensor networks","author":"maalel","year":"0","journal-title":"Proc Int Conf Wireless Mobile Commun"},{"key":"ref26","first-page":"179","article-title":"Multipath\n opportunistic RPL routing over IEEE 802.15.4","author":"pavkovi?","year":"0","journal-title":"Proc 16th ACM Int Conf Model Anal Simul Wireless Mobile Syst"},{"key":"ref25","first-page":"150","article-title":"Determinism through path diversity: Why packet replication makes sense","author":"de armas","year":"0","journal-title":"Proc Int Conf Int Netw Collaborative Syst"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/8481610\/08412519.pdf?arnumber=8412519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T08:48:49Z","timestamp":1643186929000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8412519\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":27,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tii.2018.2856884","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10]]}}}