{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:04:45Z","timestamp":1775145885735,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61772554, No. 61602398, No. 61672447"],"award-info":[{"award-number":["No. 61772554, No. 61602398, No. 61672447"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hunan Provincial National Natural Science Foundation of China","award":["No. 2017JJ3316, No. 2019JJ50592"],"award-info":[{"award-number":["No. 2017JJ3316, No. 2019JJ50592"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The Internet of Things (IoT) is the latest Internet development, with billions of Internet-connected devices and a wide range of industrial applications. Wireless sensor networks are an important part of the Internet of Things. It has received extensive attention from researchers due to its large-scale, self-organizing, and dynamic characteristics and has been widely used in industry, traffic information, military, environmental monitoring, and so on. With the development of microprocessor technology, sensor nodes are becoming more and more powerful, which enables the same wireless sensor networks (WSNs) platform to meet the different quality of service (QoS) requirements of many applications. Applications for industrial wireless sensor networks range from lower physical layers to higher application layers. The same wireless sensor network sometimes needs to process information from different layers. Traditional protocols lack differentiated services and cannot make full use of network resources. In this paper, an Adaptive Retransmit Mechanism for Delay Differentiated Services (ARM-DDS) scheme is proposed to meet different levels of delays of applications. Firstly, we analyze the impact of different retransmit mechanisms and parameter optimization on delays and energy consumption. Based on the results of the analysis, in ARM-DDS scheme, for routes with transmission delay tolerance, energy-saving retransmission mechanisms are used, and low-latency retransmission mechanisms are used for latency-sensitive routes. In this way, the data routing delays of different applications are guaranteed within bound and the energy consumption of the network is reduced. What is more, ARM-DDS scheme makes full use of the residual energy of the network and uses a small delay routing retransmit mechanism in the far-sink area to reduce end-to-end delay. Both theoretical analysis and simulation experiments show that under the premise of the same reliability requirements, ARM-DDS scheme reduces data transmission delay 12.1% and improves network energy utilization 28%. Given that the reliability requirements of the data stream are different, the scheme can also extend the network lifetime.<\/jats:p>","DOI":"10.1186\/s13638-019-1566-2","type":"journal-article","created":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T15:03:13Z","timestamp":1574953393000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["An adaptive retransmit mechanism for delay differentiated services in industrial WSNs"],"prefix":"10.1186","volume":"2019","author":[{"given":"Ye","family":"Chen","sequence":"first","affiliation":[]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qingyong","family":"Deng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-4761","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"issue":"1","key":"1566_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TCC.2015.2485206","volume":"6","author":"S Sarkar","year":"2018","unstructured":"S. Sarkar, S. Chatterjee, S. Misra, Assessment of the suitability of fog computing in the context of Internet of Things. IEEE Transactions on Cloud Computing 6(1), 46\u201359 (2018)","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"39","key":"1566_CR2","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.ins.2015.01.028","volume":"305","author":"Y Deng","year":"2015","unstructured":"Y. Deng, H. Hu, N. Xiong, W. Xiong, L. Liu, A general hybrid model for chaos robust synchronization and degradation reduction. Inf. Sci. 305(39), 146\u2013164 (2015)","journal-title":"Inf. Sci."},{"key":"1566_CR3","doi-asserted-by":"crossref","unstructured":"X. Xiang, W. Liu, T. Wang, M. Xie, X. Li, H. Song, A. Liu, G. Zhang. Delay and energy efficient data collection scheme based matrix filling theory for dynamic traffic IoT. EURASIP Journal on Wireless Communications and Networking, 168 (2019). DOI: 10.1186\/s13638-019-1490-5.","DOI":"10.1186\/s13638-019-1490-5"},{"issue":"6","key":"1566_CR4","doi-asserted-by":"publisher","first-page":"1550","DOI":"10.1007\/s12083-019-00752-0","volume":"12","author":"Lang Hu","year":"2019","unstructured":"L. Hu, A. Liu, M Xie, T Wang. UAVs joint vehicles as data mules for fast codes dissemination for edge networking in smart city. Peer-to-Peer Networking and Applications, (2019). DOI: https:\/\/doi.org\/10.1007\/s12083-019-00752-0.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"1566_CR5","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1016\/j.future.2019.04.043","volume":"100","author":"Y Liu","year":"2019","unstructured":"Y. Liu, A. Liu, T. Wang, X. Liu, N. Xiong, An intelligent incentive mechanism for coverage of data collection in cognitive Internet of Things. Futur. Gener. Comput. Syst. 100, 701\u2013714 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"1566_CR6","doi-asserted-by":"publisher","first-page":"88547","DOI":"10.1109\/ACCESS.2019.2925829","volume":"7","author":"X Sun","year":"2019","unstructured":"X. Sun, W. Liu, T. Wang, Q. Deng, A. Liu, N. Xiong, S. Zhang, Two-hop neighborhood information joint double broadcast radius for effective code dissemination in WSNs. IEEE Access 7(1), 88547\u201388569 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"1566_CR7","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/s11227-011-0708-z","volume":"62","author":"Zhe Wang","year":"2011","unstructured":"Z. Wang, T. Li, N. Xiong, Y Pan. A novel dynamic network data replication scheme based on historical access record and proactive deletion. The Journal of Supercomputing, 62 (1), 227-250 (2012).","journal-title":"The Journal of Supercomputing"},{"key":"1566_CR8","doi-asserted-by":"publisher","unstructured":"X. Xiang, W. Liu, A. Liu, N. Xiong, Z. Zeng, Z. Cai. Adaptive duty cycle control based opportunistic routing scheme to reduce delay in cyber physical systems. International Journal of Distributed Sensor Networks. 15 (4), DoI: https:\/\/doi.org\/10.1177\/1550147719841870 2019.","DOI":"10.1177\/1550147719841870"},{"issue":"1","key":"1566_CR9","doi-asserted-by":"publisher","first-page":"105258","DOI":"10.1109\/ACCESS.2019.2932006","volume":"7","author":"T Shu","year":"2019","unstructured":"T. Shu, W. Liu, T. Wang, M. Zhao, N. Xiong, M. Ma, X. Li, A. Liu, Broadcast based code dissemination scheme for duty cycle based wireless sensor networks. IEEE Access 7(1), 105258\u2013105286 (2019)","journal-title":"IEEE Access"},{"key":"1566_CR10","doi-asserted-by":"publisher","unstructured":"Y. Liu, M. Ma, X. Liu, N. Xiong, A. Liu, Y. Zhu. Design and analysis of probing route to defense sink-hole attacks for Internet of Things security. IEEE Transactions on Network Science and Engineering, (2018). DOI: https:\/\/doi.org\/10.1109\/TNSE.2018.2881152.","DOI":"10.1109\/TNSE.2018.2881152"},{"key":"1566_CR11","doi-asserted-by":"publisher","unstructured":"T. Wang, L. Qiu, G. Xu, A. Sangaiah, A. Liu. Energy-efficient and trustworthy data collection protocol based on mobile fog computing in Internet of Things. IEEE Transactions on Industrial Informatics, (2019). DOI: https:\/\/doi.org\/10.1109\/TII.2019.2920277.","DOI":"10.1109\/TII.2019.2920277"},{"key":"1566_CR12","doi-asserted-by":"publisher","first-page":"120475","DOI":"10.1109\/ACCESS.2019.2937626","volume":"7","author":"Weiwei Shi","year":"2019","unstructured":"W. Shi, W. Liu, T. Wang, Z. Zeng, G. Zhi. Adding duty cycle only in connected dominating sets for energy efficient and fast data collection, IEEE Access, (2019) DoI: https:\/\/doi.org\/10.1109\/ACCESS.2019.2937626.","journal-title":"IEEE Access"},{"key":"1566_CR13","doi-asserted-by":"publisher","first-page":"111559","DOI":"10.1109\/ACCESS.2019.2934515","volume":"7","author":"Mingfeng Huang","year":"2019","unstructured":"M. Huang, W. Liu, T. Wang, Q. Deng, A. Liu, M. Xie, M. Ma, G. Zhang. A game-based economic model for price decision making in cyber-physical-social systems, IEEE Access, (2019) DoI: https:\/\/doi.org\/10.1109\/ACCESS.2019.2934515.","journal-title":"IEEE Access"},{"issue":"2","key":"1566_CR14","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s12083-016-0457-0","volume":"10","author":"Xiaoheng Deng","year":"2016","unstructured":"X. Deng, G. Li, M. Dong, K Ota. Finding overlapping communities based on Markov chain and link clustering. Peer-to-Peer Networking and Applications, 10(2), 411-420 (2017).","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"5","key":"1566_CR15","doi-asserted-by":"publisher","first-page":"3143","DOI":"10.1109\/TWC.2016.2517618","volume":"15","author":"J Ren","year":"2016","unstructured":"J. Ren, Y. Zhang, N. Zhang, D. Zhang, X. Shen, Dynamic channel access to improve energy efficiency in cognitive radio sensor networks. IEEE Trans. Wirel. Commun. 15(5), 3143\u20133156 (2016)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"2","key":"1566_CR16","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TMC.2014.2313576","volume":"14","author":"J Zhang","year":"2014","unstructured":"J. Zhang, F. Ren, S. Gao, H. Yang, et al., Dynamic routing for data integrity and delay differentiated services in wireless sensor networks. IEEE Trans. Mob. Comput. 14(2), 328\u2013343 (2014)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"1566_CR17","doi-asserted-by":"publisher","first-page":"70212","DOI":"10.1109\/ACCESS.2019.2918928","volume":"7","author":"Q Wang","year":"2019","unstructured":"Q. Wang, W. Liu, T. Wang, M. Zhao, X. Li, M. Xie, M. Ma, G. Zhang, A. Liu, Reducing delay and maximizing lifetime for wireless sensor networks with dynamic traffic patterns. IEEE Access 7(1), 70212\u201370236 (2019)","journal-title":"IEEE Access"},{"issue":"6","key":"1566_CR18","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1007\/s12083-019-00753-z","volume":"12","author":"Qiaoyan Li","year":"2019","unstructured":"Q. Li, A. Liu, T. Wang, M. Xie, N. Xiong, Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications. Peer-to-Peer Networking and Applications. (2019). https:\/\/doi.org\/10.1007\/s12083-019-00753-z","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"1566_CR19","doi-asserted-by":"publisher","first-page":"114639","DOI":"10.1109\/ACCESS.2019.2935462","volume":"7","author":"Yicong Yuan","year":"2019","unstructured":"Y. Yuan, W. Liu, T. Wang, Q. Deng, A. Liu, H. Song. Compressive sensing based clustering joint annular routing data gathering scheme for wireless sensor networks. IEEE Access, (2019) DoI: https:\/\/doi.org\/10.1109\/ACCESS.2019.2935462.","journal-title":"IEEE Access"},{"key":"1566_CR20","doi-asserted-by":"crossref","unstructured":"C. Lin, YX He, N Xiong. An energy-efficient dynamic power management in wireless sensor networks. Fifth International Symposium on Parallel and Distributed Computing , 37, (2006).","DOI":"10.1109\/ISPDC.2006.8"},{"issue":"1","key":"1566_CR21","doi-asserted-by":"publisher","first-page":"55983","DOI":"10.1109\/ACCESS.2019.2913885","volume":"7","author":"F Wang","year":"2019","unstructured":"F. Wang, W. Liu, T. Wang, M. Zhao, M. Xie, H. Song, X. Li, A. Liu, To reduce delay, energy consumption and collision through optimization duty-cycle and size of forwarding node set in WSNs. IEEE Access 7(1), 55983\u201356015 (2019)","journal-title":"IEEE Access"},{"key":"1566_CR22","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.comnet.2018.07.022","volume":"144","author":"S Sarang","year":"2018","unstructured":"S. Sarang, M. Drieberg, A. Awang, R. Ahmad, A QoS MAC protocol for prioritized data in energy harvesting wireless sensor networks. Comput. Netw. 144, 141\u2013153 (2018)","journal-title":"Comput. Netw."},{"issue":"2","key":"1566_CR23","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s11227-008-0244-7","volume":"63","author":"Hongju Cheng","year":"2008","unstructured":"H. Cheng, N. Xiong, LT Yang, YS Jeong. Distributed scheduling algorithms for channel access in TDMA wireless mesh networks. The Journal of Supercomputing, 63(2), 407-430 (2013).","journal-title":"The Journal of Supercomputing"},{"key":"1566_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2019\/5298508","volume":"2019","author":"Long Yin","year":"2019","unstructured":"L. Yin, J. Gui, Z. Zeng. Improving energy efficiency of multimedia content dissemination by adaptive clustering and D2D multicast. Mobile Information Systems, 2019, 5298508 (2019). DOI: https:\/\/doi.org\/10.1155\/2019\/5298508.","journal-title":"Mobile Information Systems"},{"key":"1566_CR25","doi-asserted-by":"publisher","unstructured":"Y. Bi, G. Han, C. Lin, X. Wang, Q. Zhang, Z. Liu, Effective packet loss elimination in IP mobility support for vehicular networks. IEEE Netw. (2019). https:\/\/doi.org\/10.1109\/MNET.2019.1900093","DOI":"10.1109\/MNET.2019.1900093"},{"key":"1566_CR26","doi-asserted-by":"crossref","unstructured":"N. Xiong, AV Vasilakos, J Wu, YR Yang, A Rindos, Y Zhou, WZ Song. A self-tuning failure detection scheme for cloud computing service. 2012 IEEE 26th International Parallel and Distributed Processing Symposium. 40, (2012).","DOI":"10.1109\/IPDPS.2012.126"},{"key":"1566_CR27","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.inffus.2019.06.020","volume":"53","author":"X Liu","year":"2020","unstructured":"X. Liu, M. Zhao, A. Liu, K. Wong, Adjusting forwarder nodes and duty cycle using packet aggregation routing for Body Sensor Networks. Information Fusion 53, 183\u2013195 (2020)","journal-title":"Information Fusion"},{"key":"1566_CR28","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.pmcj.2017.03.012","volume":"41","author":"Y Liu","year":"2017","unstructured":"Y. Liu, A. Liu, Y. Li, Z. Li, Y. Choi, H. Sekiya, J. Li, APMD: A fast data transmission protocol with reliability guarantee for pervasive sensing data communication. Pervasive and Mobile Computing 41, 413\u2013435 (2017)","journal-title":"Pervasive and Mobile Computing"},{"key":"1566_CR29","doi-asserted-by":"crossref","unstructured":"Y. Yang, N. Xiong, NY Chong, X D\u00e9fago. A decentralized and adaptive flocking algorithm for autonomous mobile robots. The 3rd International Conference on Grid and Pervasive Computing, (2008).","DOI":"10.1109\/GPC.WORKSHOPS.2008.18"},{"issue":"1","key":"1566_CR30","doi-asserted-by":"publisher","first-page":"1537","DOI":"10.1007\/s11277-017-4255-7","volume":"96","author":"X Deng","year":"2017","unstructured":"X. Deng, T. He, L. He, J. Gui, Q. Peng, Performance analysis for IEEE 802.11 s wireless mesh network in smart grid. Wirel. Pers. Commun. 96(1), 1537\u20131555 (2017)","journal-title":"Wirel. Pers. Commun."},{"issue":"8","key":"1566_CR31","doi-asserted-by":"publisher","first-page":"1739","DOI":"10.1109\/JSAC.2019.2927097","volume":"37","author":"Y Bi","year":"2019","unstructured":"Y. Bi, G. Han, C. Lin, M. Guizani, X. Wang, Mobility Management for intro\/inter domain handover in software defined networks. IEEE Journal on Selected Areas in Communications. 37(8), 1739\u20131754 (2019)","journal-title":"IEEE Journal on Selected Areas in Communications."},{"issue":"3","key":"1566_CR32","doi-asserted-by":"publisher","first-page":"1816","DOI":"10.1109\/JIOT.2018.2812803","volume":"5","author":"X Peng","year":"2018","unstructured":"X. Peng, J. Ren, L. She, D. Zhang, J. Li, Y. Zhang, BOAT: A block-streaming app execution scheme for lightweight IoT devices. IEEE Internet-of-Things Journal 5(3), 1816\u20131829 (2018)","journal-title":"IEEE Internet-of-Things Journal"},{"key":"1566_CR33","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1186\/s13638-018-1069-6","volume":"2018","author":"H Cheng","year":"2018","unstructured":"H. Cheng, D. Feng, X. Shi, et al., Data quality analysis and cleaning strategy for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018, 61 (2018). https:\/\/doi.org\/10.1186\/s13638-018-1069-6","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"10","key":"1566_CR34","doi-asserted-by":"publisher","first-page":"1946","DOI":"10.1109\/TSMC.2019.2898982","volume":"49","author":"Yuxin Liu","year":"2019","unstructured":"Y. Liu, A. Liu, N. Xiong, T. Wang, W. Gui. Content propagation for content-centric networking from location-based social networks. IEEE Transactions on Systems Man Cybernetics-Systems, (2019). DOI: https:\/\/doi.org\/10.1109\/TSMC.2019.2898982.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"1566_CR35","doi-asserted-by":"publisher","unstructured":"G. Zhang, T. Wang, G. Wang, A. Liu, W. Jia. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurrency and Computation: Practice and Experience, (2018). DOI: https:\/\/doi.org\/10.1002\/cpe.5109.","DOI":"10.1002\/cpe.5109"},{"key":"1566_CR36","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1016\/j.ins.2015.09.039","volume":"329","author":"H Cheng","year":"2016","unstructured":"H. Cheng, Z. Su, N. Xiong, Y. Xiao, Energy-efficient node scheduling algorithms for wireless sensor networks using Markov Random Field model. Inf. Sci. 329, 461\u2013477 (2016)","journal-title":"Inf. Sci."},{"issue":"21","key":"1566_CR37","doi-asserted-by":"publisher","first-page":"30561","DOI":"10.1007\/s11042-018-6284-y","volume":"78","author":"Chengyuan Zhang","year":"2018","unstructured":"C. Zhang, R. Chen, L. Zhu, A. Liu, Y. Lin, F. Huang. Hierarchical information quadtree: efficient spatial temporal image search for multimedia stream. Multimedia Tools and Applications, (2018). DOI: https:\/\/doi.org\/10.1007\/s11042-018-6284-y.","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"1566_CR38","doi-asserted-by":"publisher","first-page":"2192","DOI":"10.1109\/TNNLS.2018.2801880","volume":"29","author":"W Liu","year":"2018","unstructured":"W. Liu, P. Zhuang, H. Liang, J. Peng, Z. Huang, Distributed economic dispatch in microgrids based on cooperative reinforcement learning. IEEE Transactions on Neural Networks and Learning 29(6), 2192\u20132203 (2018)","journal-title":"IEEE Transactions on Neural Networks and Learning"},{"issue":"3","key":"1566_CR39","doi-asserted-by":"publisher","first-page":"923","DOI":"10.1007\/s11277-014-2164-6","volume":"81","author":"Y Liu","year":"2015","unstructured":"Y. Liu, A. Liu, Z. Chen, Analysis and Improvement of send-and-wait automatic repeat-reQuest protocols for wireless sensor networks. Wirel. Pers. Commun. 81(3), 923\u2013959 (2015)","journal-title":"Wirel. Pers. Commun."},{"issue":"5","key":"1566_CR40","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/49.768202","volume":"17","author":"W Turin","year":"1999","unstructured":"W. Turin, Throughput analysis of the Go-Back-N protocol in fading radio channels. IEEE Journal on Selected Areas in Communications 17(5), 881\u2013887 (1999)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3","key":"1566_CR41","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/TCOM.1982.1095497","volume":"30","author":"E Weldon","year":"1982","unstructured":"E. Weldon, An improved selective-repeat ARQ strategy. IEEE Trans. Commun. 30(3), 480\u2013486 (1982)","journal-title":"IEEE Trans. Commun."},{"key":"1566_CR42","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.adhoc.2017.06.006","volume":"64","author":"A Laouid","year":"2017","unstructured":"A. Laouid, A. Dahmani, A. Bounceur, R. Euler, F. Lalem, A. Tari, A distributed multi-path routing algorithm to balance energy consumption in wireless sensor networks. Ad Hoc Netw. 64, 53\u201364 (2017)","journal-title":"Ad Hoc Netw."},{"key":"1566_CR43","doi-asserted-by":"crossref","unstructured":"Y. Sang, H. Shen, Y. Tan, N. Xiong. Efficient protocols for privacy preserving matching against distributed datasets. International Conference on Information and Communications Security, 210-227, (2006).","DOI":"10.1007\/11935308_15"},{"issue":"7","key":"1566_CR44","doi-asserted-by":"publisher","first-page":"3255","DOI":"10.1109\/TVT.2012.2205284","volume":"61","author":"A Liu","year":"2012","unstructured":"A. Liu, Z. Zheng, C. Zhang, Z. Chen, et al., Secure and energy-efficient disjoint multipath routing for WSNs. IEEE Trans. Veh. Technol. 61(7), 3255\u20133265 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1566_CR45","doi-asserted-by":"crossref","unstructured":"J. Zhang, A. Liu, P. Hu, J Long. A fuzzy-rule-based packet reproduction routing for sensor networks. International Journal of Distributed Sensor Networks, 14(4), (2018). DOI: 1550147718774016.","DOI":"10.1177\/1550147718774016"},{"issue":"2","key":"1566_CR46","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TNET.2013.2256795","volume":"22","author":"C Joo","year":"2014","unstructured":"C. Joo, N.B. Shroff, On the delay performance of in-network aggregation in lossy wireless sensor networks. IEEE\/ACM Transactions on Networking (TON) 22(2), 662\u2013673 (2014)","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"1566_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/9715428","volume":"2018","author":"Mingfeng Huang","year":"2018","unstructured":"M. Huang, A. Liu, T. Wang, C. Huang. Green data gathering under delay differentiated services constraint for Internet of Things. Wireless Communications and Mobile Computing, 2018, 9715428 (2018). DOI: https:\/\/doi.org\/10.1155\/2018\/9715428.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"2","key":"1566_CR48","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/TWC.2009.080008","volume":"8","author":"Q Chen","year":"2009","unstructured":"Q. Chen, S.S. Kanhere, M. Hassan, Analysis of per-node traffic load in multi-hop wireless sensor networks. IEEE transaction on wireless communications 8(2), 958\u2013967 (2009)","journal-title":"IEEE transaction on wireless communications"},{"issue":"10","key":"1566_CR49","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1016\/j.jpdc.2011.05.003","volume":"71","author":"AF Liu","year":"2011","unstructured":"A.F. Liu, P.H. Zhang, Z.G. Chen, Theoretical analysis of the lifetime and energy hole in cluster based Wireless. Journal of Parallel and Distributed Computing 71(10), 1327\u20131355 (2011)","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"1566_CR50","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1007\/s11276-009-0235-5","volume":"16","author":"Z Rosberg","year":"2010","unstructured":"Z. Rosberg, R.P. Liu, T.L. Dinh, Y.F. Dong, S. Jha, Statistical reliability for energy efficient data transport in wireless sensor networks. Wirel. Netw 16, 1913\u20131927 (2010)","journal-title":"Wirel. Netw"},{"issue":"9","key":"1566_CR51","doi-asserted-by":"publisher","first-page":"2493","DOI":"10.1109\/TPDS.2014.2366474","volume":"26","author":"H Zhou","year":"2015","unstructured":"H. Zhou, J. Wu, H. Zhao, S. Tang, C. Chen, J. Chen, Incentive-driven and freshness-aware content dissemination in selfish opportunistic mobile networks. IEEE Transactions on Parallel and Distributed Systems 26(9), 2493\u20132505 (2015)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1566_CR52","doi-asserted-by":"publisher","unstructured":"T. Wang, H. Luo, W. Jia, A. Liu, M Xie. MTES: An intelligent trust evaluation scheme in sensor-cloud enabled industrial Internet of Things, IEEE Transactions on Industrial Informatics, (2019) DoI: https:\/\/doi.org\/10.1109\/TII.2019.2930286.","DOI":"10.1109\/TII.2019.2930286"},{"key":"1566_CR53","doi-asserted-by":"publisher","unstructured":"Y. Liu, A. Liu, X. Liu, M. Ma, A trust-based active detection for cyber-physical security in industrial environments. IEEE Transactions on Industrial Informatics (2019). https:\/\/doi.org\/10.1109\/TII.2019.2931394","DOI":"10.1109\/TII.2019.2931394"},{"key":"1566_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/4172049","volume":"2018","author":"Haojun Teng","year":"2018","unstructured":"H. Teng, K. Zhang, M. Dong, K. Ota, A. Liu, M. Zhao, T Wang. Adaptive transmission range based topology control scheme for fast and reliable data collection. Wireless Communications and Mobile Computing, 2018, 4172049 (2018). DOI: https:\/\/doi.org\/10.1155\/2018\/4172049.","journal-title":"Wireless Communications and Mobile Computing"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1566-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1566-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1566-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,27]],"date-time":"2020-11-27T00:27:39Z","timestamp":1606436859000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1566-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,28]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1566"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1566-2","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,28]]},"assertion":[{"value":"26 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"258"}}