{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:47Z","timestamp":1761402047096,"version":"3.41.0"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,11,16]],"date-time":"2019-11-16T00:00:00Z","timestamp":1573862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"crossref","award":["CNS-1553273 (CAREER), CNS-1816213, and CNS-1704469"],"award-info":[{"award-number":["CNS-1553273 (CAREER), CNS-1816213, and CNS-1704469"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Cyber-Phys. Syst."],"published-print":{"date-parts":[[2020,4,30]]},"abstract":"<jats:p>\n            Low-power wireless communication has been widely used in cyber-physical systems that require time-critical data delivery. Achieving this goal is challenging because of link burstiness and interference. Based on significant empirical evidence of 21 days and over 3.6 M packet transmissions per link, we propose both routing and scheduling algorithms that produce latency bounds of the real-time periodic streams and accounts for both link bursts and interference. The solution is achieved through the definition of a new metric\n            <jats:italic>B<\/jats:italic>\n            <jats:sub>max<\/jats:sub>\n            that characterizes links by their maximum burst length, and by choosing a novel least-burst-route that minimizes the sum of worst-case burst lengths over all links in the route. With extensive data-driven analysis, we show that our algorithms outperform existing solutions by achieving accurate latency bound with much less energy consumption. In addition, a testbed evaluation consisting of 48 nodes spread across a floor of a building shows that we obtain 100% reliable packet delivery within derived latency bounds. We also demonstrate how performance deteriorates and discuss its implications for wireless networks with insufficient high-quality links.\n          <\/jats:p>","DOI":"10.1145\/3354917","type":"journal-article","created":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T13:01:53Z","timestamp":1574082113000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Reliable Communication and Latency Bound Generation in Wireless Cyber-Physical Systems"],"prefix":"10.1145","volume":"4","author":[{"given":"Sirajum","family":"Munir","sequence":"first","affiliation":[{"name":"Bosch Research and Technology Center"}]},{"given":"Hao-Tsung","family":"Yang","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]},{"given":"Shan","family":"Lin","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]},{"given":"S. M. Shahriar","family":"Nirjon","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill"}]},{"given":"Chen","family":"Lin","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University"}]},{"given":"Enamul","family":"Hoque","sequence":"additional","affiliation":[{"name":"University of Virginia"}]},{"given":"John A.","family":"Stankovic","sequence":"additional","affiliation":[{"name":"University of Virginia"}]},{"given":"Kamin","family":"Whitehouse","sequence":"additional","affiliation":[{"name":"University of Virginia"}]}],"member":"320","published-online":{"date-parts":[[2019,11,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2811587.2811622"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568514"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/258128.258201"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.195"},{"volume-title":"Proceedings of the European Conference on Wireless Sensor Networks. Springer, 195--210","author":"Brown James","key":"e_1_2_1_5_1"},{"key":"e_1_2_1_6_1","unstructured":"E. G. Coffman Jr. M. R. Garey and D. S. Johnson. 1997. Approximation algorithms for bin packing: A survey. In Approximation Algorithms for NP-hard Problems. PWS Publishing Boston MA.  E. G. Coffman Jr. M. R. Garey and D. S. Johnson. 1997. Approximation algorithms for bin packing: A survey. In Approximation Algorithms for NP-hard Problems. PWS Publishing Boston MA."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939000"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2382335"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060304"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSGSC.2017.8038587"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2012.15"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.30"},{"volume-title":"Proceedings of the 14th IEEE International Conference on Sensing, Communication, and Networking (SECON\u201917)","year":"2017","author":"Hao-Tsung Yang","key":"e_1_2_1_13_1"},{"volume-title":"Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS\u201903)","author":"He Tian","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2183878"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809704"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1973.5009159"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2008.25"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120708"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1133-7"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2009.19"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056961"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2497161"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.12.016"},{"key":"e_1_2_1_26_1","first-page":"628","article-title":"Strangers in the night\u2014Smart process sensors in our current automation landscape","volume":"1","author":"Maiwald Michael","year":"2017","journal-title":"Multidisc. Dig. Pub. Inst. Proc."},{"key":"e_1_2_1_27_1","article-title":"Analysis of LEACH protocol in wireless sensor networks","volume":"3","author":"Malik Meena","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2016.06.005"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791248"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/s150509703"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494528"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxt074"},{"volume-title":"Proceedings of the ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom\u201908)","year":"2008","author":"Rusak Tal","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2008.15"},{"volume-title":"Proceedings of the Global Conference on Communication Technologies (GCCT\u201915)","author":"Sony Chinchu T.","key":"e_1_2_1_35_1"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460416"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Rodrigo Teles Hermeto Antoine Gallais and Fabrice Theoleyre. 2017. Scheduling for IEEE802. 15.4-TSCH and slow channel hopping MAC in low power industrial wireless networks. Comput. Commun. 114 C (2017) 84--105.  Rodrigo Teles Hermeto Antoine Gallais and Fabrice Theoleyre. 2017. Scheduling for IEEE802. 15.4-TSCH and slow channel hopping MAC in low power industrial wireless networks. Comput. Commun. 114 C (2017) 84--105.","DOI":"10.1016\/j.comcom.2017.10.004"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.001"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS120326018W"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249392"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832232"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.03.003"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SENSORCOMM.2007.4394931"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.006"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2017.7964927"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2630696"}],"container-title":["ACM Transactions on Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3354917","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3354917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:56Z","timestamp":1750203896000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3354917"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,16]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,4,30]]}},"alternative-id":["10.1145\/3354917"],"URL":"https:\/\/doi.org\/10.1145\/3354917","relation":{},"ISSN":["2378-962X","2378-9638"],"issn-type":[{"type":"print","value":"2378-962X"},{"type":"electronic","value":"2378-9638"}],"subject":[],"published":{"date-parts":[[2019,11,16]]},"assertion":[{"value":"2018-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}