{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:49:52Z","timestamp":1760237392574,"version":"build-2065373602"},"reference-count":38,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2020,5,11]],"date-time":"2020-05-11T00:00:00Z","timestamp":1589155200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The emerging new paradigm under the fifth generation of wireless communications technologies (5G) and high expectations for massively expanding today\u2019s Internet of Things (IoT) under 5G, are expected to support a large plurality of low-cost devices for an all-increasing number of new IoT applications. Many emerging IoT applications are going to take advantage of techniques and technologies that have high demands from low-cost devices in terms of processing large amounts of data and communication. For example, in systems based on fog computing technology, low-cost devices have to assign some of their limited resources for processing purposes. Considering the drawbacks emerging from using low-cost devices and the fact that many applications are in need for time-constrained approaches, TDMA-based Medium Access Control (MAC) policies need to be revisited and implemented in low-cost devices of today. In this sense, a policy independent of the underlying topology, TiMAC policy, is considered here and is implemented in low-cost devices using 433 MHz RF modules. Even though the implementation is limited by synchronization issues and a small number of nodes, the obtained experimental results demonstrate the potential for employing TDMA-based MAC policies on IoT systems consisting of low-cost devices.<\/jats:p>","DOI":"10.3390\/fi12050086","type":"journal-article","created":{"date-parts":[[2020,5,11]],"date-time":"2020-05-11T10:01:18Z","timestamp":1589191278000},"page":"86","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Implementation of a Topology Independent MAC (TiMAC) Policy on a Low-Cost IoT System"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9010-3422","authenticated-orcid":false,"given":"Georgios","family":"Tsoumanis","sequence":"first","affiliation":[{"name":"Department of Informatics &amp; Telecom., University of Ioannina, 45110 Arta, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5729-4017","authenticated-orcid":false,"given":"Asterios","family":"Papamichail","sequence":"additional","affiliation":[{"name":"Department of Informatics, Ionian University, 49100 Corfu, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9385-7246","authenticated-orcid":false,"given":"Vasileios","family":"Dragonas","sequence":"additional","affiliation":[{"name":"Department of Informatics, Ionian University, 49100 Corfu, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4214-5729","authenticated-orcid":false,"given":"George","family":"Koufoudakis","sequence":"additional","affiliation":[{"name":"Department of Informatics, Ionian University, 49100 Corfu, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9002-4967","authenticated-orcid":false,"given":"Constantinos T.","family":"Angelis","sequence":"additional","affiliation":[{"name":"Department of Informatics &amp; Telecom., University of Ioannina, 45110 Arta, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7279-9710","authenticated-orcid":false,"given":"Konstantinos","family":"Oikonomou","sequence":"additional","affiliation":[{"name":"Department of Informatics, Ionian University, 49100 Corfu, Greece"}]}],"member":"1968","published-online":{"date-parts":[[2020,5,11]]},"reference":[{"key":"ref_1","unstructured":"Osseiran, A., Monserrat, J.F., and Marsch, P. (2016). 5G Mobile and Wireless Communications Technology, Cambridge University Press."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1109\/JSAC.2014.2328098","article-title":"What will 5G be?","volume":"32","author":"Andrews","year":"2014","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_3","first-page":"97","article-title":"That \u2018internet of things\u2019 thing","volume":"22","author":"Ashton","year":"2009","journal-title":"RFID J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","article-title":"Securing fog computing for internet of things applications: Challenges and solutions","volume":"20","author":"Ni","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_5","unstructured":"GSMA Intelligence (2016). Definitive Data and Analysis for the Mobile Industry. GSMA Intell."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","article-title":"Edge computing: Vision and challenges","volume":"3","author":"Shi","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/2677046.2677052","article-title":"Finding your way in the fog: Towards a comprehensive definition of fog computing","volume":"44","author":"Vaquero","year":"2014","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MCOM.2015.7263374","article-title":"Low power wide area machine-to-machine networks: Key techniques and prototype","volume":"53","author":"Xiong","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/SURV.2011.020211.00036","article-title":"A survey of MAC protocols for mission-critical applications in wireless sensor networks","volume":"14","author":"Suriyachai","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.adhoc.2018.01.004","article-title":"A comprehensive review on energy harvesting MAC protocols in WSNs: Challenges and tradeoffs","volume":"71","author":"Sherazi","year":"2018","journal-title":"Ad Hoc Netw."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.adhoc.2018.06.006","article-title":"A Disjoint Frame Topology-Independent TDMA MAC Policy for Safety Applications in Vehicular Networks","volume":"79","author":"Dragonas","year":"2018","journal-title":"Ad Hoc Netw."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2461","DOI":"10.1109\/COMST.2015.2440374","article-title":"TDMA-Based MAC Protocols for Vehicular Ad Hoc Networks: A Survey, Qualitative Analysis, and Open Research Issues","volume":"17","author":"Hadded","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1007\/s11276-009-0183-0","article-title":"TDMA Scheduling Algorithms for Wireless Sensor Networks","volume":"16","author":"Ergen","year":"2010","journal-title":"Wirel. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Wang, F., Zeng, P., and Yu, H. (2008, January 20\u201322). Slot Time Synchronization for TDMA-Based Ad Hoc Networks. Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, Shanghai, China.","DOI":"10.1109\/ISCSCT.2008.240"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.adhoc.2005.01.002","article-title":"Clock synchronization for wireless sensor networks: A Survey","volume":"3","author":"Sundararaman","year":"2005","journal-title":"Ad Hoc Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"56","DOI":"10.3390\/s90100056","article-title":"Clock Synchronization in Wireless Sensor Networks: An Overview","volume":"9","author":"Rhee","year":"2009","journal-title":"Sensors"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/90.282605","article-title":"Making transmission schedules immune to topology changes in multi-hop packet radio networks","volume":"2","author":"Chlamtac","year":"1994","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_18","unstructured":"Banzi, M., and Shiloh, M. (2014). Getting Started with Arduino: The Open Source Electronics Prototyping Platform, Maker Media, Inc."},{"key":"ref_19","unstructured":"WENSHING ELECTRONICS CO., LTD. (2010). Wireless Hi Power Transmitter Module (RF ASK), WENSHING ELECTRONICS CO., LTD.. v1.0.3."},{"key":"ref_20","unstructured":"WENSHING ELECTRONICS CO., LTD. (2008). Wireless Hi Sensitivity Receiver Module (RF ASK), WENSHING ELECTRONICS CO., LTD.. v1.0.3."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Oliveira, L., Rodrigues, J.J., Kozlov, S.A., Rab\u00ealo, R.A., and Albuquerque, V.H.C.d. (2019). MAC layer protocols for internet of things: A survey. Future Internet, 11.","DOI":"10.3390\/fi11010016"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"76228","DOI":"10.1109\/ACCESS.2018.2883391","article-title":"A comprehensive study of iot and wsn mac protocols: Research issues, challenges and opportunities","volume":"6","author":"Kumar","year":"2018","journal-title":"IEEE Access"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ferrer, T., C\u00e9spedes, S., and Becerra, A. (2019). Review and evaluation of MAC protocols for satellite IoT systems using nanosatellites. Sensors, 19.","DOI":"10.3390\/s19081947"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"446","DOI":"10.1109\/JIOT.2016.2566659","article-title":"Distributed and adaptive medium access control for Internet-of-Things-enabled mobile networks","volume":"4","author":"Ye","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1739","DOI":"10.1109\/JIOT.2017.2679119","article-title":"Token-based adaptive MAC for a two-hop Internet-of-Things enabled MANET","volume":"4","author":"Ye","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"18366","DOI":"10.1109\/ACCESS.2018.2815990","article-title":"Hybrid slotted-csma\/ca-tdma for efficient massive registration of iot devices","volume":"6","author":"Shahin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"7296359","DOI":"10.1155\/2016\/7296359","article-title":"A bioinspired fair resource-allocation algorithm for TDMA-based distributed sensor networks for IoT","volume":"12","author":"Kim","year":"2016","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"10757","DOI":"10.1109\/ACCESS.2017.2710304","article-title":"A distributed TDMA scheduling algorithm based on energy-topology factor in Internet of Things","volume":"5","author":"Li","year":"2017","journal-title":"IEEE Access"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"20866","DOI":"10.1109\/ACCESS.2017.2758340","article-title":"A Distributed TDMA Scheduling Algorithm Based on Exponential Backoff Rule and Energy-Topology Factor in Internet of Things","volume":"5","author":"Li","year":"2017","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Stewart, I.N. (2015). Galois Theory, CRC Press.","DOI":"10.1201\/b18187"},{"key":"ref_31","unstructured":"Arduino LLC (2010). Arduino, Arduino LLC. Rev3."},{"key":"ref_32","unstructured":"International Telecommunication Union (ITU) (2020, April 15). Radio Regulations. Available online: https:\/\/www.itu.int\/pub\/R-REG-RR-2016."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"22249","DOI":"10.3390\/s150922249","article-title":"RB Particle Filter Time Synchronization Algorithm Based on the DPM Model","volume":"15","author":"Guo","year":"2015","journal-title":"Sensors"},{"key":"ref_34","unstructured":"(2006). IEEE Recommended Practice for Powering and Grounding Electronic Equipment, IEEE. IEEE Std 1100-2005 (Revision of IEEE Std 1100-1999)."},{"key":"ref_35","unstructured":"Robinson, D., Wysocki, T.A., Smith, V.W., and Popovski, K. (2005). Background Radio Frequency Interference Measurements for Wireless Devices in the Electricity Supply Industry, University of Nebraska."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Mar\u00f3ti, M., Kusy, B., Simon, G., and L\u00e9deczi, \u00c1. (2004, January 3\u20135). The flooding time synchronization protocol. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA.","DOI":"10.1145\/1031495.1031501"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Kumar, R., and Srivastava, M.B. (2003, January 5\u20137). Timing-sync protocol for sensor networks. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Los Angeles, CA, USA.","DOI":"10.1145\/958491.958508"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.adhoc.2019.03.002","article-title":"Synchronization of Data Measurements in Wireless Sensor Networks for IoT Applications","volume":"89","author":"Skiadopoulos","year":"2019","journal-title":"Ad Hoc Netw."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/5\/86\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:27:31Z","timestamp":1760174851000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/5\/86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,11]]},"references-count":38,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2020,5]]}},"alternative-id":["fi12050086"],"URL":"https:\/\/doi.org\/10.3390\/fi12050086","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2020,5,11]]}}}