{"id":"https://openalex.org/W2774544177","doi":"https://doi.org/10.1109/smc.2017.8123048","title":"Next-transmission backoff reservation scheme for wireless sensor networks","display_name":"Next-transmission backoff reservation scheme for wireless sensor networks","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2774544177","doi":"https://doi.org/10.1109/smc.2017.8123048","mag":"2774544177"},"language":"en","primary_location":{"id":"doi:10.1109/smc.2017.8123048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc.2017.8123048","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045565673","display_name":"Haeyeon Shin","orcid":null},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Haeyeon Shin","raw_affiliation_strings":["Department of Computer Science, Yonsei University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Yonsei University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665472","display_name":"Yena Kim","orcid":"https://orcid.org/0000-0003-2196-2156"},"institutions":[{"id":"https://openalex.org/I1321296531","display_name":"National Institute of Standards and Technology","ror":"https://ror.org/05xpvk416","country_code":"US","type":"funder","lineage":["https://openalex.org/I1321296531","https://openalex.org/I1343035065"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yena Kim","raw_affiliation_strings":["Wireless Networks Division, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA"],"affiliations":[{"raw_affiliation_string":"Wireless Networks Division, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA","institution_ids":["https://openalex.org/I1321296531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101964277","display_name":"SuKyoung Lee","orcid":"https://orcid.org/0000-0002-3497-3295"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"SuKyoung Lee","raw_affiliation_strings":["Department of Computer Science, Yonsei University, Seoul, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Yonsei University, Seoul, Republic of Korea","institution_ids":["https://openalex.org/I193775966"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5045565673"],"corresponding_institution_ids":["https://openalex.org/I193775966"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21634916,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2784","last_page":"2789"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11392","display_name":"Energy Harvesting in Wireless Networks","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.8296087980270386},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7964651584625244},{"id":"https://openalex.org/keywords/reservation","display_name":"Reservation","score":0.7311303615570068},{"id":"https://openalex.org/keywords/exponential-backoff","display_name":"Exponential backoff","score":0.7194712162017822},{"id":"https://openalex.org/keywords/carrier-sense-multiple-access-with-collision-avoidance","display_name":"Carrier sense multiple access with collision avoidance","score":0.6909259557723999},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.6388447284698486},{"id":"https://openalex.org/keywords/frame","display_name":"Frame (networking)","score":0.6268376111984253},{"id":"https://openalex.org/keywords/multiple-access-with-collision-avoidance-for-wireless","display_name":"Multiple Access with Collision Avoidance for Wireless","score":0.5743592977523804},{"id":"https://openalex.org/keywords/hidden-node-problem","display_name":"Hidden node problem","score":0.5457538366317749},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5177109241485596},{"id":"https://openalex.org/keywords/collision","display_name":"Collision","score":0.5165202021598816},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.5148657560348511},{"id":"https://openalex.org/keywords/ieee-802.11","display_name":"IEEE 802.11","score":0.4915717542171478},{"id":"https://openalex.org/keywords/network-allocation-vector","display_name":"Network allocation vector","score":0.45846450328826904},{"id":"https://openalex.org/keywords/distributed-coordination-function","display_name":"Distributed coordination function","score":0.4553111791610718},{"id":"https://openalex.org/keywords/collision-avoidance","display_name":"Collision avoidance","score":0.44273459911346436},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.434871643781662},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4298091232776642},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.3992961645126343},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3618876338005066},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.31135082244873047},{"id":"https://openalex.org/keywords/wi-fi-array","display_name":"Wi-Fi array","score":0.19693779945373535},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.19238978624343872},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15300580859184265}],"concepts":[{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.8296087980270386},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7964651584625244},{"id":"https://openalex.org/C2777632111","wikidata":"https://www.wikidata.org/wiki/Q1937518","display_name":"Reservation","level":2,"score":0.7311303615570068},{"id":"https://openalex.org/C30777684","wikidata":"https://www.wikidata.org/wiki/Q1417920","display_name":"Exponential backoff","level":4,"score":0.7194712162017822},{"id":"https://openalex.org/C59229178","wikidata":"https://www.wikidata.org/wiki/Q944633","display_name":"Carrier sense multiple access with collision avoidance","level":4,"score":0.6909259557723999},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.6388447284698486},{"id":"https://openalex.org/C126042441","wikidata":"https://www.wikidata.org/wiki/Q1324888","display_name":"Frame (networking)","level":2,"score":0.6268376111984253},{"id":"https://openalex.org/C156643399","wikidata":"https://www.wikidata.org/wiki/Q15995329","display_name":"Multiple Access with Collision Avoidance for Wireless","level":5,"score":0.5743592977523804},{"id":"https://openalex.org/C156738730","wikidata":"https://www.wikidata.org/wiki/Q2565413","display_name":"Hidden node problem","level":5,"score":0.5457538366317749},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5177109241485596},{"id":"https://openalex.org/C121704057","wikidata":"https://www.wikidata.org/wiki/Q352070","display_name":"Collision","level":2,"score":0.5165202021598816},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.5148657560348511},{"id":"https://openalex.org/C185298936","wikidata":"https://www.wikidata.org/wiki/Q193228","display_name":"IEEE 802.11","level":4,"score":0.4915717542171478},{"id":"https://openalex.org/C643704","wikidata":"https://www.wikidata.org/wiki/Q1460774","display_name":"Network allocation vector","level":5,"score":0.45846450328826904},{"id":"https://openalex.org/C115338102","wikidata":"https://www.wikidata.org/wiki/Q1229557","display_name":"Distributed coordination function","level":5,"score":0.4553111791610718},{"id":"https://openalex.org/C2780864053","wikidata":"https://www.wikidata.org/wiki/Q5147495","display_name":"Collision avoidance","level":3,"score":0.44273459911346436},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.434871643781662},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4298091232776642},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.3992961645126343},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3618876338005066},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.31135082244873047},{"id":"https://openalex.org/C152153834","wikidata":"https://www.wikidata.org/wiki/Q1339878","display_name":"Wi-Fi array","level":4,"score":0.19693779945373535},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.19238978624343872},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15300580859184265},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc.2017.8123048","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc.2017.8123048","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1828746609","https://openalex.org/W1967272927","https://openalex.org/W2005775359","https://openalex.org/W2007097982","https://openalex.org/W2008657021","https://openalex.org/W2017246830","https://openalex.org/W2098502411","https://openalex.org/W2116222864","https://openalex.org/W2129374252","https://openalex.org/W2130470770","https://openalex.org/W2142332462","https://openalex.org/W2152977462","https://openalex.org/W2158738303","https://openalex.org/W2162352403","https://openalex.org/W2162598825","https://openalex.org/W2194541131","https://openalex.org/W6677278042","https://openalex.org/W6682391053"],"related_works":["https://openalex.org/W1977911846","https://openalex.org/W2098812874","https://openalex.org/W2129374252","https://openalex.org/W1177802595","https://openalex.org/W2057446194","https://openalex.org/W1511576148","https://openalex.org/W2537574780","https://openalex.org/W2011497955","https://openalex.org/W1903131529","https://openalex.org/W2186650359"],"abstract_inverted_index":{"Wireless":[0],"Sensor":[1],"Network":[2],"(WSN)":[3],"acts":[4],"as":[5],"one":[6],"of":[7,11,47,60,96,106,112],"the":[8,22,44,55,61,64,68,93,99],"fundamental":[9],"elements":[10],"network":[12,20],"infrastructure,":[13],"requiring":[14],"to":[15,86,133],"establish":[16],"a":[17,73,88,123],"wireless":[18],"communication":[19],"for":[21,83,92,126],"reliable":[23,56,89],"frame":[24,57],"transmission.":[25],"The":[26,102,109],"channel":[27],"access":[28],"in":[29],"IEEE":[30,50,84],"802.15.4":[31,85],"employs":[32],"Carrier":[33],"Sense":[34],"Multiple":[35],"Access":[36],"with":[37,98],"Collision":[38],"Avoidance":[39],"(CSMA)":[40],"without":[41],"amendment.":[42],"However,":[43],"contention":[45,94],"collision":[46,75,95],"typical":[48],"technique,":[49],"802.15.4,":[51],"could":[52],"not":[53],"guarantee":[54,87],"transmission":[58,90],"because":[59],"difficulties":[62],"avoiding":[63],"collision.":[65],"To":[66],"tackle":[67],"aforementioned":[69],"challenges,":[70],"we":[71],"propose":[72],"new":[74],"resolution":[76],"scheme,":[77],"Next-Transmission":[78,117],"Backoff":[79,118],"Reservation":[80,119,129],"(N-TBR)":[81],"Scheme,":[82],"especially":[91],"messages":[97],"reservation":[100],"scheme.":[101],"proposed":[103],"scheme":[104],"consists":[105],"two":[107],"sub-schemes.":[108],"main":[110],"contributions":[111],"this":[113],"paper":[114],"are":[115],"twofold:":[116],"Process":[120,132],"that":[121],"reserves":[122],"backoff":[124],"counter":[125],"next":[127],"transmission,":[128],"Window":[130],"Adjust":[131],"avoid":[134],"conflicts.":[135]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
