{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:57Z","timestamp":1740140577106,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T00:00:00Z","timestamp":1565136000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T00:00:00Z","timestamp":1565136000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2018B030311049"],"award-info":[{"award-number":["2018B030311049"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61871193"],"award-info":[{"award-number":["61871193"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202453"],"award-info":[{"award-number":["61202453"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1513-2","type":"journal-article","created":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T13:03:03Z","timestamp":1565182983000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Multichannel MAC protocol with dynamic backoff contention for distributed cognitive radio networks"],"prefix":"10.1186","volume":"2019","author":[{"given":"Zong-Heng","family":"Wei","sequence":"first","affiliation":[]},{"given":"Bin-Jie","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhiyong","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,7]]},"reference":[{"key":"1513_CR1","unstructured":"FCC Spectrum Policy Task Force, Report of the spectrum efficiency working group (2002). https:\/\/transition.fcc.gov\/sptf\/files\/SEWGFinalReport_1.pdf ."},{"issue":"7","key":"1513_CR2","doi-asserted-by":"publisher","first-page":"3386","DOI":"10.1109\/TVT.2011.2158673","volume":"60","author":"Y. C. Liang","year":"2011","unstructured":"Y. C. Liang, K. C. Chen, G. Y. Li, P. Mahonen, Cognitive radio networking and communications: an overview. IEEE Trans. Veh. Technol.60(7), 3386\u20133407 (2011).","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"1513_CR3","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1186\/1687-1499-2012-60","volume":"2012","author":"P. Ren","year":"2012","unstructured":"P. Ren, Y. Wang, Q. Du, J. Xu, A survey on dynamic spectrum access protocols for distributed cognitive wireless networks. EURASIP J. Wirel. Commun. Netw.2012(1), 60 (2012).","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"4","key":"1513_CR4","doi-asserted-by":"publisher","first-page":"2092","DOI":"10.1109\/COMST.2014.2322971","volume":"16","author":"L. Gavrilovska","year":"2014","unstructured":"L. Gavrilovska, D. Denkovski, V. Rakovic, M. Angjelichinoski, Medium access control protocols in cognitive radio networks: overview and general classification. IEEE Commun. Surv. Tutor.16(4), 2092\u20132124 (2014).","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"1513_CR5","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1007\/s12083-016-0465-0","volume":"10","author":"A. Sultana","year":"2017","unstructured":"A. Sultana, X. Fernando, L. Zhao, An overview of medium access control strategies for opportunistic spectrum access in cognitive radio networks. Peer-to-Peer Netw. Appl.10(5), 1113\u20131141 (2017).","journal-title":"Peer-to-Peer Netw. Appl."},{"issue":"7","key":"1513_CR6","doi-asserted-by":"publisher","first-page":"1315","DOI":"10.1016\/j.adhoc.2009.01.002","volume":"7","author":"C. Cormio","year":"2009","unstructured":"C. Cormio, K. R. Chowdhury, A survey on MAC protocols for cognitive radio networks. Ad Hoc Netw.7(7), 1315\u20131329 (2009).","journal-title":"Ad Hoc Netw."},{"issue":"4","key":"1513_CR7","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MWC.2011.5999763","volume":"94-A","author":"S. C. Jha","year":"2011","unstructured":"S. C. Jha, M. M. Rashid, V. K. Bhargava, C. Despins, Medium access control in distributed cognitive radio networks. IEEE Wirel. Commun.94-A(4), 41\u201351 (2011).","journal-title":"IEEE Wirel. Commun."},{"issue":"5","key":"1513_CR8","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1109\/TVT.2014.2334605","volume":"64","author":"S. Pandit","year":"2015","unstructured":"S. Pandit, G. Singh, Backoff algorithm in cognitive radio MAC protocol for throughput enhancement. IEEE Trans. Veh. Technol.64(5), 1991\u20132000 (2015).","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"2","key":"1513_CR9","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340799","volume":"3","author":"A. C. V. Gummalla","year":"2000","unstructured":"A. C. V. Gummalla, J. O. Limb, Wireless medium access control protocols. IEEE Commun. Surv. Tutor.3(2), 2\u201315 (2000).","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"6","key":"1513_CR10","doi-asserted-by":"publisher","first-page":"1657","DOI":"10.1587\/transcom.E94.B.1657","volume":"94-B","author":"S. Lim","year":"2011","unstructured":"S. Lim, L. Tae-Jin, A self-scheduling multi-channel cognitive radio MAC protocol based on cooperative communications. Ieice Trans. Commun.94-B(6), 1657\u20131668 (2011).","journal-title":"Ieice Trans. Commun."},{"issue":"1","key":"1513_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/SURV.2011.111510.00108","volume":"14","author":"A. D. Domenico","year":"2012","unstructured":"A. D. Domenico, E. C. Strinati, M. G. D. Benedetto, A survey on MAC strategies for cognitive radio networks. IEEE Commun. Surv. Tutor.14(1), 21\u201344 (2012).","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1513_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01402-9","volume-title":"Cognitive Communication and Cooperative HetNet Coexistence","author":"M. G. D. Benedetto","year":"2014","unstructured":"M. G. D. Benedetto, F. Bader, Cognitive Communication and Cooperative HetNet Coexistence (Springer, Switzerland, 2014)."},{"key":"1513_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-01718-1","volume-title":"Cognitive Radio and Networking for Heterogeneous Wireless Networks","author":"M. G. D. Benedetto","year":"2015","unstructured":"M. G. D. Benedetto, A. F. Cattoni, J. Fiorina, F. Bader, L. D. Nardis, Cognitive Radio and Networking for Heterogeneous Wireless Networks (Springer, Switzerland, 2015)."},{"key":"1513_CR14","doi-asserted-by":"crossref","unstructured":"L. Le, E. Hossain, in Wireless Communications and NETWORKING Conference, 2008.A mac protocol for opportunistic spectrum access in cognitive radio networks (WCNC, 2008), pp. 1426\u20131430.","DOI":"10.1109\/WCNC.2008.256"},{"issue":"1","key":"1513_CR15","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/JSAC.2008.080110","volume":"26","author":"J. Jia","year":"2008","unstructured":"J. Jia, Q. Zhang, X. Shen, HC-MAC: a hardware-constrained cognitive mac for efficient spectrum management. Sel. Areas Commun. IEEE J.26(1), 106\u2013117 (2008).","journal-title":"Sel. Areas Commun. IEEE J."},{"issue":"10","key":"1513_CR16","doi-asserted-by":"publisher","first-page":"3414","DOI":"10.1109\/TWC.2011.072511.102196","volume":"10","author":"S. C. Jha","year":"2011","unstructured":"S. C. Jha, U. Phuyal, M. M. Rashid, V. K. Bhargava, Design of OMC-MAC: an opportunistic multi-channel MAC with QoS provisioning for distributed cognitive radio networks. IEEE Trans. Wirel. Commun.10(10), 3414\u20133425 (2011).","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"1","key":"1513_CR17","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1109\/TVT.2009.2029552","volume":"59","author":"M. Timmers","year":"2010","unstructured":"M. Timmers, e. Pollin, A distributed multichannel MAC protocol for multihop cognitive radio networks. IEEE Trans. Veh. Technol.59(1), 446\u2013459 (2010).","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"1513_CR18","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/JSAC.2008.080111","volume":"26","author":"H. Su","year":"2008","unstructured":"H. Su, X. Zhang, Cross-layer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks. Sel. Areas Commun. IEEE J.26(1), 118\u2013129 (2008).","journal-title":"Sel. Areas Commun. IEEE J."},{"issue":"6","key":"1513_CR19","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1109\/TMC.2011.118","volume":"11","author":"W. S. Jeon","year":"2012","unstructured":"W. S. Jeon, J. A. Han, G. J. Dong, A novel MAC scheme for multichannel cognitive radio ad hoc networks. IEEE Trans. Mob. Comput.11(6), 922\u2013934 (2012).","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"12","key":"1513_CR20","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.1109\/TMC.2014.2352260","volume":"13","author":"S. Debroy","year":"2014","unstructured":"S. Debroy, S. De, M. Chatterjee, Contention based multichannel MAC protocol for distributed cognitive radio networks. Mob Comput. IEEE Trans.13(12), 2749\u20132762 (2014).","journal-title":"Mob Comput. IEEE Trans."},{"issue":"3","key":"1513_CR21","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/SURV.2010.031810.00037","volume":"12","author":"D. K. Klair","year":"2010","unstructured":"D. K. Klair, K. W. Chin, R. Raad, A survey and tutorial of RFID anti-collision protocols. IEEE Commun. Surv. Tutor.12(3), 400\u2013421 (2010).","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1513_CR22","unstructured":"J. Fu, Q. Zhang, H. Wang, in 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, IEEE, Beijing. A new backoff algorithm based on the dynamic modulating parameters of ieee 802.11, (2009), pp. 1\u20134."},{"key":"1513_CR23","first-page":"70","volume-title":"Multiple Access Communications","author":"M. Baher","year":"2013","unstructured":"M. Baher, J. -B. Dor\u00e9, in Multiple Access Communications. CSMA\/CA bottleneck remediation in saturation mode with new backoff strategy (SpringerCham, 2013), pp. 70\u201381."},{"key":"1513_CR24","doi-asserted-by":"publisher","first-page":"2496","DOI":"10.1109\/ACCESS.2017.2783909","volume":"6","author":"G. Wu","year":"2018","unstructured":"G. Wu, P. Xu, Improving performance by a dynamic adaptive success-collision backoff algorithm for contention-based vehicular network. IEEE Access. 6:, 2496\u20132505 (2018).","journal-title":"IEEE Access"},{"key":"1513_CR25","unstructured":"N. Abramson, in November 17-19, 1970, Fall Joint Computer Conference. The aloha system:another alternative for computer communications, (1970), pp. 281\u2013285."},{"key":"1513_CR26","unstructured":"D. T. C. Wong, S. Zheng, Y. C. Liang, in IEEE International Conference on Communications, IEEE, Kyoto, 2011. Cognitive multi-channel mac protocols with perfect and imperfect sensing, (2011), pp. 1\u20135."},{"issue":"8","key":"1513_CR27","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1109\/TMC.2007.70758","volume":"7","author":"B. Hamdaoui","year":"2008","unstructured":"B. Hamdaoui, K. G. Shin, OS-MAC: an efficient mac protocol for spectrum-agile wireless networks. IEEE Trans. Mob. Comput.7(8), 915\u2013930 (2008).","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"7","key":"1513_CR28","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1109\/LCOMM.2014.2327963","volume":"18","author":"S. Kwon","year":"2014","unstructured":"S. Kwon, B. Kim, B. h.Roh, Preemptive opportunistic mac protocol in distributed cognitive radio networks. IEEE Commun. Lett.18(7), 1155\u20131158 (2014).","journal-title":"IEEE Commun. Lett."},{"key":"1513_CR29","first-page":"72","volume":"60","author":"H. Okada","year":"1977","unstructured":"H. Okada, Y. Igarashi, Y. Nakanishi, Analysis and application of framed aloha channel in satellite packet switching networks - fadra method. Electron. Commun. Jpn.60:, 72\u201380 (1977).","journal-title":"Electron. Commun. Jpn."},{"key":"1513_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06764-3","volume-title":"New Trends in Networking, Computing, E-learning, Systems Sciences, and Engineering","author":"K. Elleithy","year":"2015","unstructured":"K. Elleithy, T. Sobh, New Trends in Networking, Computing, E-learning, Systems Sciences, and Engineering (Springer, Switzerland, 2015)."},{"key":"1513_CR31","unstructured":"S. R. Lee, S. D. Joo, C. W. Lee, in International Conference on Mobile and Ubiquitous Systems: NETWORKING and Services, IEEE Computer Society, San Diego, 2005.An enhanced dynamic framed slotted aloha algorithm for rfid tag identification (MOBIQUITOUS, 2005), pp. 166\u2013172."},{"issue":"1","key":"1513_CR32","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/TASE.2008.917093","volume":"6","author":"W. T. Chen","year":"2009","unstructured":"W. T. Chen, An accurate tag estimate method for improving the performance of an RFID anticollision algorithm based on dynamic frame length ALOHA. IEEE Trans. Autom. Sci. Eng.6(1), 9\u201315 (2009).","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"issue":"1","key":"1513_CR33","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/LCOMM.2010.01.091378","volume":"14","author":"J. B. Eom","year":"2010","unstructured":"J. B. Eom, T. J. Lee, Accurate tag estimation for dynamic framed-slotted ALOHA in RFID systems. IEEE Commun. Lett.14(1), 60\u201362 (2010).","journal-title":"IEEE Commun. Lett."},{"issue":"3","key":"1513_CR34","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MCOM.2009.4804392","volume":"47","author":"D. Willkomm","year":"2009","unstructured":"D. Willkomm, S. Machiraju, J. Bolot, A. Wolisz, Primary user behavior in cellular networks and implications for dynamic spectrum access. IEEE Commun. Mag.47(3), 88\u201395 (2009).","journal-title":"IEEE Commun. Mag."},{"issue":"5","key":"1513_CR35","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1002\/ett.2589","volume":"25","author":"G. P. Joshi","year":"2014","unstructured":"G. P. Joshi, S. Y. Nam, S. W. Kim, An analysis of channel access delay in synchronized mac protocol for cognitive radio networks. Trans. Emerg. Telecommun. Technol.25(5), 485\u2013489 (2014).","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"1513_CR36","unstructured":"IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999), 1\u20131076 (2007). IEEE Std. 802.11."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1513-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1513-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1513-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,21]],"date-time":"2024-07-21T19:41:10Z","timestamp":1721590870000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1513-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,7]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1513"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1513-2","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,8,7]]},"assertion":[{"value":"16 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"202"}}