Next Article in Journal
Study on the Effects of Different Water Content Rates on the Strength and Brittle Plasticity of Limestone
Next Article in Special Issue
Blockchain-Based Distributed Computing Consistency Verification for IoT Mobile Applications
Previous Article in Journal
Analysis of Fire Resistance of Prestressed Concrete T-Beam Based on ABAQUS Numerical Simulation
Previous Article in Special Issue
Towards Mitigating Jellyfish Attacks Based on Honesty Metrics in V2X Autonomous Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Sensing and Device Neighborhood-Based Slot Assignment Approach for the Internet of Things

1
Department of Computer Science, COMSATS University Islamabad, Islamabad 47040, Pakistan
2
Faculty of Computing and Informatics, University Malaysia Sabah, Sabah 88400, Malaysia
3
Department of Computer Science, Abdul Wali Khan University Mardan, Mardan 23200, Pakistan
4
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
*
Author to whom correspondence should be addressed.
Appl. Sci. 2023, 13(8), 4682; https://doi.org/10.3390/app13084682
Submission received: 16 February 2023 / Revised: 28 March 2023 / Accepted: 31 March 2023 / Published: 7 April 2023
(This article belongs to the Special Issue Internet of Things Security: Latest Advances and Prospects)

Abstract

:
Concurrent communication constitutes one of the challenging issues associated with IoT networks, as it is highly likely that multiple devices may start communication simultaneously. This issue has become more complex as devices belonging to the IoT networks increasingly become mobile. To resolve this issue, various mechanisms have been reported in the literature. However, none of these approaches has considered the neighborhood information of a server module to resolve this issue. In this paper, a neighborhood-based smart slot allocation scheme for the IoT is presented where member devices are mobile. In this scheme, every CH or server module is bound to maintain two different types of slots, i.e., dedicated and reserved. Dedicated slots are assigned to every device on a First-Come-First-Serve (FCFS) basis, whereas reserved slots are assigned to the migrated devices. Additionally, as long as a device C i is located inside the server module’s coverage area, it is required to use these dedicated slots. Simulation results verified that the proposed neighborhood-based slot allocation scheme performed better than existing approaches and considerably improved various performance metrics, such as 20% in lifetime, 27.8% in slot allocation, and 30.50% in slot waiting time.

1. Introduction

Recent developments in Micro-Electro Mechanical Systems have made Electro-Magnetic Sensing and the Internet of Things (IoT) constitute challenging research areas, which is due to the overwhelming characteristics of these technologies, such as a convergence capacity with numerous emerging technologies and a wide range of application areas [1]. The IoT is a collection of various devices, i.e., C i and S j , which are known as “things’’ where C i and S j represent ordinary and server devices, respectively, such that i = 1 n and j = 1 m , i.e., n > m . A thing is defined as any physical (preferably mechanical) entity or object with different embedded modules, such as sensing, processing, and communication [2,3]. Additionally, these devices should be smart enough to form an operational networking infrastructure and possibly without human intervention [4,5,6]. Generally, devices belonging to the operational IoT networks are either static or mobile, i.e., (i) Both C i and S j are static (ii) For C i and S j , the former is static whereas later is mobile (iii) C i and S j are mobile. It is to be noted that the communication mechanisms are the same—that is, wireless communication protocols—and preferably designed for resource constraint networks [5,7]. Cluster-enabled networking infrastructures are reported in the literature to account for how a device C i with limited transmission power should be able to share its collected data with the intended destination module—that is, server S j in this case. In these networks, devices, C i becomes divided into two groups: (i) an ordinary device and a (ii) cluster head (CH). The former device is used for data collection purposes only, whereas the latter is utilized to process and send it to the centralized module. Usually in these networking infrastructures, i.e., heterogeneous networks, multiple devices C i are eager to transmit captured data to a common receiver, that is, a CH or server module S j , and they preferably want to do this simultaneously. Furthermore, these resource-limited devices C i are designed such that their transceiver modules can either perform the transmission of packets or the receiving, and they are not capable of performing both activities simultaneously. Therefore, the packet loss ratio and collision are among the common issues associated with these networking infrastructures. These issues become more severe if multiple devices C i (preferably more than three) commence a proper communication sessions with a shared destination device S j , i.e., commence concurrent communication [8,9].
Although it is a convincing approach, collision and hidden terminal scenarios are among the most common issues, which are required to be sorted on a priority basis. Likewise, distributed authentication control [10] and combined authentication/association [11] were reported to resolve the aforementioned issues. However, excessive registration time, the ratio of the collided packets, and latency are the challenges linked with these schemes.
One of the most promising random access mechanisms is time division multiple access (TDMA), which was reported to enable the concurrent frame transmission of more devices C i to a shared destination device, i.e., a server, with a certain degree of reliability [12]. In this scheme, every server S j is belted to divide its active time frame into slots of equal sizes. Additionally, a reliable scheduling approach, i.e., a slot assignment, should be followed to resolve the conflicting scenarios among multiple source devices. Furthermore, every device C i is forced to transmit captured data values, preferably in its dedicated slot. A channel-enabled (multi) TDMA and (FDMA) frequency-domain-multiple-access-scheme-based hybrid mechanism was reported that was specifically designed for wearable devices, and its main motive was the realization of reliable and collision-free communication schedules for the IoT [13]. In addition to this mechanism, an enhanced version of the TDMA, which was based on the topological ordering and slot waiting time of member devices, was presented. Given that every device C i knows about the waiting time of neighboring devices, hence, it successfully reduces the collision ratio among multiple competing devices [14]. A hybrid slot allocation and scheduling approach that was based on TDMA and CSMA/CA was presented, which was particularly focused on the core issue—that is, the maximum possible utilization of the on-board battery. Apart from it, numerous modes of member devices were introduced, such as active, sleep, idle and wake-up periods, to further improve the performance of the resource constraint networks, such as the IoT and wireless sensor networks [15,16]. Likewise, a co-operative scheme—that is, one based on the TDMA and ad hoc MAC—was reported in the literature to ensure a reliable transmission of the data collected by devices deployed at locations where direct communication with a server module was not possible. The selection of these device (preferably relaying devices) was based on their transmission range, time slot availability, and probability of success [17]. These approaches have enabled simultaneous communication among multiple competing devices; however, hidden and exposed terminal scenarios, overhearing, bandwidth wastage, and excessive waiting time for a dedicated slot were some of the challenging issues. To the best of our knowledge, a neighborhood-information-enabled TDMA scheme (preferably for IoT networks where member devices are mobile) has not been considered in the literature. Therefore, the proposed communication model should be able to utilize neighborhood information to devise a collision-free communication schedule for multiple competing devices in the operational IoT network.
In this paper, a neighborhood-information-oriented slot allocation scheme is presented to enable the data transmission (preferably simultaneous) of multiple mobile devices, including a common destination module, i.e., a CH or server module. The proposed neighborhood-enabled TDMA scheme is a promising communication scheme for situations where more mobile devices C i are eager to begin a proper communication session with a shared destination device. It is to be noted that the mechanism should (i) be efficient in terms of energy consumption (b) have a minimum possible collision ratio and (c) have minimum overheads. The main contributions are summarized as follows:
1.
A neighborhood-oriented slots allocation scheme for the IoTs networks where member devices are mobile was created;
2.
An algorithm to ensure the maximum possible utilization of both dedicated and reserved slots in the operational IoT network was utilized;
3.
An infrastructure-free scheme for event-based application areas was elaborated.
The rest of the manuscript is organized as follows: In the subsequent section, we have tried to provide a detailed review, preferably comprehensive, of the most relevant techniques. In Section 3, the motivation behind the selection of the problem to resolve in this paper is provided, which is followed by a detailed discussion of the scheme presented in this paper. Simulation results, preferably in both textual and graphical formats, are described in Section 5 of the manuscript. Lastly, we concluded the paper by providing comprehensive remarks.

2. Literature Review

In the literature, numerous approaches have been reported to enable simultaneous communication or packet transmissions of multiple (preferably more than two) devices C i using a common transmission medium [18,19]. A comprehensive review of those existing mechanisms, which are closely related to the work presented in this article, is presented. Frequency division multiple access (orthogonal-based) approaches were presented to ensure the concurrent packet transmissions of more devices C i using a common medium [20]. In these schemes, overall bandwidth is divided into smaller frequency bands (also know as sub-channelizations) that are assigned to the competing devices that are eager to initiate a proper communication session. Single carrier FDMA resolves this issue by utilizing the time domain and the frequency domain information. Likewise, a non-orthogonal multiple access (NOMA) mechanism is an ideal solution for the aforementioned problems, preferably with the IoT networks [21]. A NOMA is the most promising random access technique (preferably radio access), which is the current de facto standard for wireless communication as well; it provides numerous benefits that are desirable in wireless communication, such as minimum possible latency with preferably maximum reliability, connectivity, and spectrum efficiency. Generally, a NOMA approach is designed to serve multiple devices competing for the same resources—that is, the receiving device S j in this case, particularly in terms of time and space. A power-based NOMA is presented where different users are bounded to send data using different power levels while maintaining the same radio band [22,23]. Although, these methodology are very successful in resolving the issue of the parallel transmission linked with IoT networks, bandwidth wastage is a still an open challenge linked to these schemes.
Apart from these approaches, a contention-based multiple access scheme was reported to resolve the scenarios where multiple devices are eager to initiate a proper communication session, preferably with a common receiver. The scenario becomes more complex if these devices are forced to transmit data via a shared channel [24,25]. It is based on a four-way handshaking scheme to minimize the collision probability of packets transmitted by multiple competing devices. However, registration time overheads and packet collisions are among the common issues with these schemes. Centralized authentication control [26], distributed authentication control [10], and combined authentication/association [11] were designed and developed to resolve various issues associated with the contention-based multiple access scheme. Although, these mechanisms have successfully resolved numerous issues linked to the contention-based schemes, various issues were introduced, such as transmission delay and an average packet collision ratio (APDR). In addition to the contention-based scheme, effective handshaking approaches, i.e., clear-to-send (CTS) and request-to-send (RTS), were reported to address the problem of the hidden terminal scenario in operational resource constraint networks [27]. Although they resolved the hidden terminal scenario, they generated another problem—that is, an exposed terminal scenario where a device is bounded to be in a waiting state until a current transmission session is ended.
In [28], a slotted CSMA/CA and TDMA-based approach was developed to ensure collision-free communication sessions, preferably in scenarios where multiple active devices are eager to transmit data to a common receiver over a shared medium in the IoT network. Furthermore, this approach is useful in resolving excessive registration issues as well. Every member device uses the CSMA/CA approach to broadcast authentication requests, whereas the TDMA is utilized for the association request messages. Likewise, Zhai et al. [29] proposed a contention-free multiple access scheme to ensure the schedule-based transmission of packets in both the time and frequency domains. Additionally, an automatic repeat request approach was adopted to further strengthen its efficiency and reliability. However, it was applicable to a particular IoT hardware plate-form, and its applicability is questionable in other application domains. A token-enabled adaptive approach (preferably distributed) was presented to address one of the challenging issues—that is, hidden terminal scenarios—with mobile ad hoc networks (MANET) and IoTs [30]. However, the simultaneous transmission of packets, end-to-end delay, and one-point failure are some of the common issues with this approach. Similarly, a distributed TDMA-enabled approach was presented to resolve bandwidth wastage issue in resource constraint networks where various slots are assigned according to a pre-defined mature scheduling policy [31]. The priority of member devices was utilized to ensure a proper time slot allocation. However, concurrent communication among all devices was not guaranteed, as slots were assigned according to the priority, and low priority devices may starve for a particular resource. A naive multi-channel scheme, which was a hybrid of the TDMA and FDMA, was proposed to enable and ensure the establishment of proper communication sessions among various wearable devices in the Internet of Medical Things (IoMT) [13]. Energy efficiency, as well as time and space complexity, are tightly coupled issues with this approach. In addition to it, topological orders were utilized to develop an enhanced TDMA approach [14] where every device has prior knowledge about its waiting time for its assigned time slot. However, slot waiting time directly is proportional to the network density, i.e., the waiting time is comparatively longer if devices are densely deployed. Likewise, a distributed TDMA-oriented slots allocation mechanism was proposed by Bhatia et al. [32] where slots were randomly assigned. However, synchronization is one of the common issues associated with this approach. Batta et al. [33,34] presented an enhanced version of the distributed TDMA scheduling scheme to improve latency in the IoTs networks. These approaches have neglected an important metric—that is, the device neighborhood—in developing TDMA approaches.

3. Motivation

Simultaneous communication is among the common issues associated with resource constraint networks, such as the IoT and wireless sensor networks. To resolve this issues, TDMA-enabled communication approaches, which were specifically designed for the resource-limited networks, were reported in the literature. These approaches have resolved the aforementioned issue, i.e., the simultaneous communication of multiple devices with a common destination device, preferably with available resources; however, existing approaches were either designed for a particular application area or were very complex. As per our understanding and knowledge, these benchmark approaches (i.e., either flat or hierarchical networks) for available slots are either assigned in a dedicated or in a preemptive nature to numerous requesting or member devices C i in an operational IoT network. However, these approaches are not realistic, as devices that usually belong to the IoT or WSNs are deployed randomly. Apart from it, the majority of the existing approaches are based on an unrealistic assumption, i.e., that member devices C i in an IoT should be similar; that is not always possible in these networks. Moreover, existing schemes do not have a clear policy for scenarios where a member device C i is eager to move into the coverage area of another server or CH S j module in the operational IoT networks. Therefore, a reliable TDMA-enabled schemes needs to be developed that has the capacity to resolve the aforementioned issues (preferably, the mobility of member devices C i ) without changing the available technological infrastructure of the IoT networks. Generally, every member device C i and server S j has a specific neighborhood, as depicted in Figure 1, at a particular time interval, irrespective of the device mobility. If a uniform slot allocation policy (static or dynamic), as prescribed by the existing approaches, is utilized throughout the IoT network where member devices C i are allowed to move from one server to another, then it is high likely that a portion of device will be in a constant waiting state while highest priority devices C i are served first. However, if this slot allotment policy is refined according to the neighborhood of either a member device C i or a server S j , then the above-mentioned problems will be resolved.

4. Proposed Neighborhood-Enabled TDMA Approach

The neighborhood information of devices C i can play a vital role in developing an ideal TDMA-enabled communication approach for the networks in general and for the Internet of Things (IoT) in particular. If number of slots are equal to that of member devices C i , which reside in closed proximity, then it is highly likely that every member device C i can transmit its collected data in its dedicated time slot. Furthermore, this refined mechanism has the capacity to resolve numerous other challenging issues, e.g., an average packet delivery ratio (APDR), starvation, collision, a minimum ratio of the latency and time interval (waiting) for a particular slot, and improvement of the lifespan of the respected IoT network. The proposed TDMA scheme is based on neighborhood information of the server S j , where the number of time frames is divided into slots where the ratio of proportionality is direct to the respected devices C i that reside in the vicinity of the respective server.

4.1. Discovery of Neighbors in the IoT

In this phase, every server module S j is forced to broadcast a control packet, i.e., an M s g b , where the value of the parameter join request is set to zero—that is, J o i n R e q = 0 . This message, i.e., the M s g b , is collected by those member devices C i that are placed in the vicinity of the respective server S j . The neighborhood or the vicinity of the device C i or server module S j is defined as presented in Equation (1).
a = 0 n C a σ ( S b ) iff ( C x a S x b ) 2 + ( C y a S y b ) 2 ( x a + y b ) < δ a = 0 n C a σ ( S b ) iff ( C x a S x b ) 2 + ( C y a S y b ) 2 ( x a + y b ) = δ
where variable S and C are used to describe the respective server and the devices in the networks, respectively.
In this equation, σ and δ represent the neighborhood of the respective server module and threshold values (preferably distance-based), respectively. Devices C i with a distance value equal or less than the prescribed threshold value δ are potential candidate devices for joining the respective server S j . If a device C i that fulfills the criteria (as described by the threshold value) is eager to become a member of the respective server module S j , then, initially, it updates the received message M s g b such that the value of the request is to set to 1, i.e., J o i n R e q = 1 , and it sends to the respective server S j as soon as the prescribed back-off timer is completed, which is defined as the time required by a particular member device C i to collect such messages from potential server modules. The back-off timer of a particular member device C i is obtained through Equation (2).
B a c k o f f T i m e r ( C i ) = R A N D ( 0 t o 100 ) m i c r o s e c
Once the back-off timer is expired, then every device C i thoroughly examines the distance of numerous server modules and the overall strength of the received signal strength indicator ((RSSI) value. Generally, a device C i prefers to send a join request to that server S j that has a minimum distance and maximum value of the RSSI. For value of the RSSI, the following Equation (3) is used to compute the path loss ratio or function, which is an important measure to compute the RSSI value.
P ( d ) = P ( d 0 ) 10 n l o g d d 0 X σ
Once the path loss is computed, then the RSSI of the respective server module S j is calculated using Equation (4)
R S S I ( S j ) = P t P l o s s ( d )
Every device C i is forced to utilize these equations to compute RSSI values of the potential server modules S j (specifically those which are deployed in the vicinity) and send a modified version of the received message, or join request, to that server S j that has minimum possible distance and maximum value of the RSSI. This mechanism is repeatedly applied by every device C i in the operational IoT network to become a member of a particular server module  S j . In this way, every server module S j has a list of member devices. It is to be noted that, unlike in existing schemes where it is assumed that every server S j should have equal member device, this is not mandatory in the proposed TDMA-enabled approach.

4.2. TDMA-Enabled Communication Strategy

In this phase, every server module S j is bounded to develop a TDMA-based packet transmission mechanism specifically for its member devices C i . In this scheme, the TDMA slot number has a direct proportionality ratio to that of active devices C i , i.e., the time frame is separated into three slots if the respective server module has received join requests from three devices. It is to be noted that a server device S j is bounded to receive a message, i.e., a join request, from neighboring devices, and it has to ensure that this device is located in the designated coverage area. For example, if a server module S j has received join requests from ten (10) devices, then it is forced to create at least ten (preferably equal) slots by dividing its sliding window (time). In addition, a sequential approach, that is, first-come-first-serve (FCFS), is utilized to assigned these time slots to various requesting member devices (as described in Equation (5). To ensure a reliable communication infrastructure, these slots are assigned in a non-preemptive manner, where member devices C i are bounded to hold these slots for as long as is needed.
M a x ( C i ) = W a i t i n g t i m e
Additionally, a server module S j should be able to only assign slots and membership to the devices of C i that have made a request, irrespective of the fact that other server modules S j have minimum requests. This is usually the case if devices are deployed randomly in the IoT networks. Additionally, there is the activity of the allocation of time slots, i.e., each C i is carried out by the respective server device S j shortly after the deployment process is completed. The proposed TDMA-enabled approach is a dedicated slots assignment approach that makes it highly likely that every server module S j has a set of devices C i , which are different form other, because the deployment process is random. For example, assume that we have placed IoT networks that have a total of three servers S j such that S 1 , S 2 and S 3 of every server S j have 9, 18, and 24 member devices C i , respectively. By utilizing the proposed neighborhood-enabled TDMA approach, server S 3 is bounded to generate 20 time slots because it has twenty member devices C i , and it should assign these slots using the FCFS approach for the requesting device C i . Similarly, server modules S 1 & S 2 should generate eight (08) and fifteen (15) time slots, respectively, to facilitate their member devices  C i .
Additionally, the proposed neighborhood-enabled TDMA approach allows member devices C i to initiate a request for multiple time slots if needed. However, the assignment of these slots is subjected to various constraints, such as the respective member device (having been assigned) not having data to send, wherein this slot can probably be assigned to the requesting device in a preemptive fashion, i.e., if the respective device has data to send, then it is re-allocated immediately. However, it is not necessary that additional slots be adjacent. Furthermore, additional slots are allocated temporarily (preemptive fashion), i.e., if the respective device C i is interested in initiating proper communication in the upcoming session, it preferably does this in its own or a dedicated time slot. Therefore, the respective server module S j broadcasts a query message “MSG-Q’’ to all member devices C i , preferably before the initialization of another session. This message has two important data fields that are represented by S, M, and L, where S means single slot (preferably a dedicated one), M means multiple slots, and L means that the device is about to leave the coverage area of the respective server module S j and join another, which is signified by J. Therefore, a device C i , preferably a member, is required to deliver an updated version of the received message “MSG-Q’’ with a value of S or M if it wishes to interact during the next session. If and only if the relevant server module does not get any message in response to its inquiry message, it is presumed by default that the device is not interested in communication in the next session. It should be noted that the shift probability distribution P s h i f t , as indicated in the equation, is used to assign the extra free slots (6).
p s h i f ( C i ) = ( 1 γ ) γ k ( 1 γ k ) . γ s
In this equation, variable s has values ranging from 1…k, where k depicts the available free slots number. It is interesting to note that the effective utilization of these slots is one of the main motivations behind this scheme. Additionally, in this scheme, the server module needs to ensure a minimum possible empty slot ratio, preferably zero, in every cycle or frame. Values range as 0 < γ < 1 and γ = C 1 , 2 , 3 , 4 n 1 k 1 such that C 1 , 2 , 3 , 4 n is used to describe a complete set of devices C i , especially contestants or participants. The strategy adopted for the proper management and allocation of the multiple available slots is depicted in Equation (6). It is important to note that a device allocates multiple slots iff, and multiple contestant devices C i are eager to allocate more slots for communication. Additionally, the process should follow either a sequential order or a prioritized fashion to handle such types of scenarios. However, this strategy is not applicable in situations where every device C i has data to transmit, and, thus, free slot availability is negligible. Additionally, the respective server S j will ignore such requests if free slots are not available.
In addition to this methodology, a server S j may be assigned additional responsibilities, i.e., it will forward the data values of those servers S j + 1 where it is not feasible for them to transmit packets directly. Therefore, these servers communicate with the nearest server through the dedicated slot that is reserved for this purpose. To implement this, a few slots, i.e., in every server S j , are kept and allocated from iff to another server S j + 1 to make a request. Servers S j , which do not have the capability to transmit directly, must follow the methodology presented by the following Equation (7), i.e., j = 0 m S j σ ( S j + 1 ) for iff.
( S x i B S x j ) 2 + ( S y i B S y j ) 2 ( x i + y j ) < δ
Additionally, time slots need to be kept for severs S j , which are either placed on edges or far away from the respective sink module in an IoT network. These devices are deployed at a distance, i.e., far beyond the range of the communication module. Slots are reserved according to Equation (8), that is, j = 0 m S j σ ( S j + 1 ) for iff.
( S x i B S x j ) 2 + ( S y i B S y j ) 2 ( x i + y j ) = δ
In this equation, the variable δ is utilized to present the capability of the respective Xbee or radio module, which is preferably wireless, of the S j . However, as opposed to the mechanism adopted for the allocation of temporary time slots to the respective devices C i , slots reserved for other server modules are dedicated and are not assigned to another server S j .
Let us consider a scenario that is depicted in Figure 1, where Server-1 S j has six member or neighboring devices C i . Initially, Server-1 initiates the process by broadcasting a control message “ M S G b ’’ to identify potential neighboring devices C i . It is quite possible that those devices installed in close proximity or vicinity to the respective server S j will receive this message, i.e., C 1 , 2 , 3 6 . These devices may also receive such messages from other server modules S j but are eager to join this particular server S j , as it has a minimum possible distance and a maximum value of RSSI. Thus, these devices send a response message (preferably an updated one) to the respective server module S j , wherein the join request value is set to one or true, i.e., “ J o i n R e q u e s t : 1 ’’. It is to be noted that the response message is sent as soon as the back-off timer is expired. In situations when numerous devices C i are anxious to submit their packets simultaneously, random waiting time is provided to reduce the likelihood of packet collision. Server-1 S j splits the sliding window into equal slots according to the number of asking devices, in this case, 6 (six), when it gets these signals and once its back-off timer has elapsed, as illustrated in Figure 1.

4.3. Device Mobility in the Operational IoT Network

The proposed neighborhood-enabled TDMA approach supports the mobility of member device C i from the coverage area of one server S j to another server S j + 1 . If a particular member device C i is interested in changing its position, then it must inform the respective server module S j by sending a response message with a value of L to the query message of the respective server module S j . Once a server module S j receives query response message with value L, then it is added to the reserved slot class, which are assigned to those devices C i that have migrated from the coverage area of another server S j . Additionally, these slots may be assigned to another requesting device if it has initiated a request for multiple slots. During the movement, it is assumed that the member device is not allowed to send any message, as it is not currently a member of any cluster. Once this device C i reaches its intended destination, then it responds to the query message of that server S j + 1 with value “J’’, which has the minimum possible distance from its current position and the maximum value of the RSSI as described in Equation (9)
i = 0 n C i σ ( S j ) iff ( C x i S x j + 1 ) 2 + ( C y i S y j + 1 ) 2 ( x i + y j + 1 ) δ
Server S j + 1 assigns a time slot to the requesting device C i if it is available and increases its number of member devices C i . However, it is to be noted that dedicated time slots are not assigned to the mobile requesting device, as time slots are fixed and assigned via a preemptive policy. Furthermore, it high likely that the respective server module S j has an empty time slot, which is possible only if one its own member device C i is moved, wherein it is then assigned permanently. Additionally, this device C i (preferably the one which is moved) can communicate via a secondary server module S j + 2 if and only if a slot is available, and the optimized server module S j + 1 does not have any empty time at a particular time interval. This is possible only if the respective device C i responds to the query messages of both servers as depicted in Algorithms 1 and 2.
Algorithm 1 Proposed Algorithm for mobile devices C i
Require: 
Revised TDMA where Neighbor related Information is Utilized
Ensure: 
Allocation of Free Slots to Devices C i
1:
M e m b e r D e v i c e s Null
2:
N o n M e m b e r D e v i c e s Null
3:
Δ← 30 ms
4:
j (Variable)← Server Module S j
5:
i (Variable)← C i
6:
for Server S j I o M T s  do
7:
   Create “ M S G a ’’
8:
   Set value “ R e q u e s t J o i n : 0 ’’
9:
   Transmit “ M S G a ’’
10:
endfor
11:
for Device C i I o M T  do
12:
   if Value of (RSSI) of Current Server, i.e., ( S j + 1 m < S j ) & (Δ:zero) then
13:
      Update Message “ M S G a ’’
14:
      Put value “ R e q u e s t J o i n : o n e ’’
15:
      Update Destination Module “ S j ’’
16:
      Timer (Back-off) = random(0–10,000 ms)
17:
      Transmit “ M S G a ’’
18:
   endif
19:
endfor
20:
for Server S j I o M T  do
21:
   if ( R e q u e s t J o i n : o n e ) then
22:
      Place Device C i in M e m b e r D e v i c e s
23:
      Generate Free Slot for Device C i
24:
   else
25:
      Place Device C i in N o n M e m b e r D e v i c e s
26:
   end if
27:
end for return Time Slots based on Neighborhood Information
A neighborhood-enabled TDMA algorithm for mobile devices C i and servers (static) S j was developed as presented below. In this approach, a device C i is bounded to wait for a defined interval time, i.e., 30 ms in this case, to collect messages, and accept join requests from numerous servers S j , which are deployed in the respective vicinity. Additionally, every server S j is bounded to make sure that a fair slot allocation policy is adopted for every contestant device C i .
The proposed TDMA-enabled algorithm that is presented below has built in support for the mobility of member devices C i from the coverage area of one server S j to another server S j + 1 in the operational IoT network.
Algorithm 2 Proposed TDMA algorithm for mobile devices in the IoT Networks
Require: 
TDMA for Mobile Device C i
Ensure: 
T Allocation of Free Slots to Devices (Mobile) C i
1:
M e m b e r D e v i c e s Null
2:
N o n M e m b e r D e v i c e s Null
3:
Δ 30 ms
4:
j (Variable)← Server Module S j
5:
i (Variable)← C i
6:
for Server S j I o M T s  do
7:
   Generate “ M S G Q ’’
8:
   Set value “ S : 0 , M : 0 , L : 0 , J : 0 ’’
9:
   Broad-Cast “ M S G Q ’’
10:
endfor
11:
for every member or neighbor C i S j  do
12:
   if  C i has data to send then
13:
      Update “ M S G Q ’’
14:
      Set value “ S : 1 , M : 0 , L : 0 , J : 0 ’’
15:
   endif
16:
   if  C i needs multiple slots then
17:
      Update “ M S G Q ’’
18:
      Set value “ S : 0 , M : 1 , L : 0 , J : 0 ’’
19:
   endif
20:
   if  C i is interested to move out then
21:
      Update “ M S G Q ’’
22:
      Set value “ S : o , M : 0 , L : 1 , J : 0 ’’
23:
   endif
24:
   if  C i has moved and is interest to send data then
25:
      Update “ M S G Q ’’
26:
      Set value “ S : 0 , M : 0 , L : 0 , J : 1 ’’
27:
   endif
28:
   Set Destination “ S j ’’
29:
   Backoff Timer = rand(0–100 ms)
30:
   Broad-Cast “ M S G Q ’’
31:
endfor
32:
for every S j I o T do
33:
   if ( M S G Q : m ) then
34:
      Assign multiple slots if available
35:
   elseif ( M S G Q : J ) then
36:
      Assign slot if available
37:
   elseif ( M S G Q : L ) then
38:
      Slot is available
39:
   end if
40:
end for return Time Slots based on Neighborhood Information for Mobile Devices

5. Simulation Results

In this section, a comprehensive and detailed analysis of the proposed neighborhood-enabled TDMA and existing approaches (such as a hybrid-approach TDMA [35], an opportunistic TDMA [36], a prioritized TDMA [28], a cooperative TDMA [37] and a cooperative MAC [38]) is presented. These algorithms were implemented in OMNET++, which is an open source simulation software, and evaluated based on numerous performance metrics, such as average throughput, slot waiting time interval, empty slot utilization, and APDR. A random deployed methodology was adopted to generate the IoT network where an embedded delay is assumed in the transceiver modules of every device C i . Additionally, various other parameters that were used in the simulation setup are shown in Table 1.

5.1. Empty Slots Utilization

One of the key criteria used to assess the effectiveness of the TDMA-enabled scheme in the live IoT networks is the slot usage ratio. Usually, a TDMA-enabled method with the highest feasible slot utilization ratio is seen as a great option for the conventional networks in general and particularly in the IoT if and only if other performance metrics are not sacrificed. In terms of slot usage ratio, the suggested neighborhood-enabled TDMA technique was compared to several field-proven algorithms. Figure 2 unequivocally demonstrates the proposed TDMA-enabled systems’ superior performance over that of their competitors. Even though the suggested technique facilitates device mobility, it still outperformed the current strategy in terms of slot usage ratio. By allocating several vacant slots to a respective member device as long as these were accessible, the suggested technique attained the highest possible slots utilization ratio over existing schemes. In addition, IoT networks are used in a variety of event-driven application fields (ideally automatically) to help people manage different crucial occurrences. Moreover, the suggested neighborhood-enabled TDMA system was created for the event detection application area, but it is equally applicable in other application areas as well. Figure 3 and Figure 4 demonstrates that the suggested strategy successfully attained the highest feasible usage ratio of open slots. These findings were gathered under various conditions, such as when all member devices were active and when only a specific percentage were. The suggested strategy performed better than the benchmark approaches used in both cases.

5.2. Average Throughput Analysis

Average throughput is one of the most well-known measures used in the Internet of Things to assess how well communication methods function. It is defined as the quantity of sent packets or frames that are successfully received by the target device. Figure 5 illustrates a comparison of the performance of the suggested and current ways, in terms of average throughput, and it shows that the former mechanism was the best option for IoT networks, since the highest average throughput was possible at different network densities. Additionally, several networking typologies and a non-balanced clustering method, which is typical in IoT networks, were used to gather these data. Furthermore, we found that, unlike existing schemes, which have a direct link with these metrics, the performance of the proposed scheme was unaffected by changes in the number of member devices in a given cluster. This is similar to how previous systems function; the suggested approach’s performance—in this case, average throughput—was unaffected by the proportion of active devices in a given cluster. Last but not least, the suggested solution supported member device movement, which did not impair the highlighted IoT network’s overall performance.

5.3. Average Packet Loss Ratio (APLR)

The average packet loss ratio is the ratio of the number of transmitted packets to the number of packets that are not successfully received by the target device or are lost during communication, in this case, the base station, and it is inversely correlated with the average throughput of the IoT network. The suggested neighborhood-enabled TDMA scheme had a lower minimum APLR ratio than its opponent schemes when deployed in an IoT network according to a comparison of the proposed and current schemes (in terms of the average packet loss ratio, or APLR) provided in Figure 6. Additionally, in an unbalanced cluster environment seen in IoT networks, every server module S j is constrained to provide time slots that are identical to neighboring or member devices, which is impossible using current methods.

5.4. End-to-End Delay QoS Metric

End-to-end delay is assumed as a vital performance evaluation metric and is described as the total time taken by a packet transmitted from a sender to reach the destination module in the IoT network. Generally, this time is directly proportional to the number of slots, i.e., generated slots for communication, and active devices in the vicinity of a particular server module. As the proposed approach uses server’s neighborhood information to develop a more informed slot development strategy, i.e., the TDMA, than the existing schemes, this ultimately resulted in a minimum of possible time slots. However, these slots are enough to accommodate all active member devices, preferably those residing in the vicinity of server module, simultaneously. In Figure 7, it is clearly visible that that the proposed scheme successfully achieved the minimum possible delay ratio over the available state-of-the-art approaches in terms of different IoT networks.

6. Conclusions and Future Work

Simultaneous or concurrent communication is among the challenging issues associated with the IoT networks that needs to be addressed on a priority basis. It is highly likely that majority of member devices may start communication with a common receiver simultaneously and even in the detection application. This issue becomes more complex if member devices belonging to the operational IoT network are mobile. To resolve this issue, various mechanisms have been reported in the literature, such as time division multiple access (TDMA), frequency division multiple access (FDMA), and non-orthogonal multiple access (NOMA), etc. However, none of these approaches have considered the neighborhood information of a server module or cluster head (CH), which can play a vital role in resolving the concurrent communication issue. In this paper, a neighborhood-based smart slot allocation scheme was presented for an IoT network where member devices were mobile, i.e., they could move from the coverage area of one server to another. In this scheme, every CH or server module was bounded to maintain two different types of slots, i.e., dedicated and reserved. Dedicated slots were assigned to every member device on a first-come-first-serve (FCFS) basis, whereas as reserved slots were assigned to those devices that migrated from the coverage area of another CH or server module. Additionally, a member device was bounded to utilize these dedicated slots, as long as it resided within the coverage area of the underlined server module. Simulation results verified that the proposed neighborhood-based slot allocation scheme performed better than existing approaches and considerably improved various performance metrics, such as 20% in lifetime, 27.8% in slot allocation, and 30.50% slot waiting time. In future, we are planning to present an extended version of the proposed neighborhood-enabled methodology for other infrastructures. Moreover, a multi-hop communication methodology could possibly be explored as well.

Author Contributions

Conceptualization, N.S. and R.K.; Methodology, M.K. and R.K.; Investigation, W.N.; Resources, N.S. and A.G.; Data Curation, W.N., A.G. and J.T.; Writing—Original Draft Preparation, M.K. and R.K.; Writing—Review & Editing, N.S. and J.T.; Supervision, N.S. and W.N.; Project Administration, R.K., A.G. and J.T.; Funding Acquisition, S.A.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R239), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Informed Consent Statement

This article does not contain any studies performed by the authors with human participants or animals.

Acknowledgments

We are grateful to the Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R239), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia, for supporting this project.

Conflicts of Interest

All authors declare that they have no conflict of interest.

References

  1. Alkhariji, L.; De, S.; Rana, O.; Perera, C. Semantics-based privacy by design for internet of things applications. Future Gener. Comput. Syst. 2023, 138, 280–295. [Google Scholar] [CrossRef]
  2. Xu, C.; Zhao, W.; Zhao, J.; Guan, Z.; Song, X.; Li, J. Uncertainty-aware multiview deep learning for internet of things applications. IEEE Trans. Ind. Inform. 2022, 19, 1456–1466. [Google Scholar] [CrossRef]
  3. Zhang, T.; Gao, L.; He, C.; Zhang, M.; Krishnamachari, B.; Avestimehr, A.S. Federated learning for the internet of things: Applications, challenges, and opportunities. IEEE Internet Things Mag. 2022, 5, 24–29. [Google Scholar] [CrossRef]
  4. Savaglio, C.; Ganzha, M.; Paprzycki, M.; ădică, C.B.; Ivanović, M.; Fortino, G. Agent-based internet of things: State-of-the-art and research challenges. Future Gener. Comput. Syst. 2020, 102, 1038–1053. [Google Scholar] [CrossRef]
  5. Tran, D.-N.; Nguyen, T.N.; Khanh, P.C.P.; Tran, D.-T. An iot-based design using accelerometers in animal behavior recognition systems. IEEE Sens. J. 2021, 22, 17515–17528. [Google Scholar] [CrossRef]
  6. Naeem, M.A.; Nguyen, T.N.; Ali, R.; Cengiz, K.; Meng, Y.; Khurshaid, T. Hybrid cache management in iot-based named data networking. IEEE Internet Things J. 2021, 9, 7140–7150. [Google Scholar] [CrossRef]
  7. Azarhava, H.; Abdollahi, M.P.; Niya, J.M. Age of information in wireless powered iot networks: Noma vs. tdma. Ad Hoc Netw. 2020, 104, 102179. [Google Scholar] [CrossRef]
  8. Mehmood, G.; Khan, M.Z.; Abbas, S.; Faisal, M.; Rahman, H.U. An energy-efficient and cooperative fault-tolerant communication approach for wireless body area network. IEEE Access 2020, 8, 69134–69147. [Google Scholar] [CrossRef]
  9. Khan, S.; Iqbal, W.; Waheed, A.; Mehmood, G.; Khan, S.; Zareei, M.; Biswal, R.R. An efficient and secure revocation-enabled attribute-based access control for ehealth in smart society. Sensors 2022, 22, 336. [Google Scholar] [CrossRef]
  10. Bankov, D.; Khorov, E.; Lyakhov, A. The study of the distributed control method to hasten link set-up in ieee 802.11 ah networks. In Proceedings of the 2016 XV International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY), St. Petersburg, Russia, 26–29 September 2016; pp. 13–17. [Google Scholar]
  11. Shahin, N.; Tann, L.; Kim, Y.-T. Enhanced registration procedure with nav for mitigated contentions in m2m communications. In Proceedings of the 2016 18th Asia-Pacific Network Operations and Management Symposium (APNOMS), Kanazawa, Japan, 5–7 October 2016; pp. 1–6. [Google Scholar]
  12. Faruque, S. Time division multiple access (tdma). In Radio Frequency Multiple Access Techniques Made Easy; Springer: Cham, Switzerland, 2019; pp. 35–43. [Google Scholar]
  13. Ramachandran, A.; Taj, M.A.; Maheshwari, R.; Karuppiah, A. Design and simulation of multi-channel v-tdma for iot-based healthcare systems. In Smart Trends in Computing and Communications: Proceedings of SmartCom 2020, Paris, France, 29–31 December 2020; Springer: Singapore, 2020; pp. 319–329. [Google Scholar]
  14. Nguyen, T.-T.; Kim, T.; Kim, T. A distributed tdma scheduling algorithm using topological ordering for wireless sensor networks. IEEE Access 2020, 8, 145316–145331. [Google Scholar] [CrossRef]
  15. Al-Janabi, T.A.; Al-Raweshidy, H.S. An energy efficient hybrid mac protocol with dynamic sleep-based scheduling for high density iot networks. IEEE Internet Things J. 2019, 6, 2273–2287. [Google Scholar] [CrossRef] [Green Version]
  16. Lakhan, A.; Memon, M.S.; Mastoi, Q.U.A.; Elhoseny, M.; Mohammed, M.A.; Qabulio, M.; Abdel-Basset, M. Cost-efficient mobility offloading and task scheduling for microservices iovt applications in container-based fog cloud network. Clust. Comput. 2022, 25, 2061–2083. [Google Scholar] [CrossRef]
  17. Liu, Y.; Zhou, H.; Huang, J. Oca-mac: A cooperative tdma-based mac protocol for vehicular ad hoc networks. Sensors 2019, 19, 2691. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  18. Zhou, I.; Makhdoom, I.; Shariati, N.; Raza, M.A.; Keshavarz, R.; Lipman, J.; Abolhasan, M.; Jamalipour, A. Internet of things 2.0: Concepts, applications, and future directions. IEEE Access 2021, 9, 70961–71012. [Google Scholar] [CrossRef]
  19. Lakhan, A.; Mohammed, M.A.; Kadry, S.; AlQahtani, S.A.; Maashi, M.S.; Abdulkareem, K.H. Federated learning-aware multi-objective modeling and blockchain-enable system for iiot applications. Comput. Electr. Eng. 2022, 100, 107839. [Google Scholar] [CrossRef]
  20. Nguyen, T.-T.; Pham, Q.-V.; Nguyen, V.-D.; Lee, J.-H.; Kim, Y.-H. Resource allocation for energy efficiency in ofdma-enabled wpcn. IEEE Wirel. Commun. Lett. 2020, 9, 2049–2053. [Google Scholar] [CrossRef]
  21. Khan, W.U.; Jameel, F.; Jamshed, M.A.; Pervaiz, H.; Khan, S.; Liu, J. Efficient power allocation for noma-enabled iot networks in 6g era. Phys. Commun. 2020, 39, 101043. [Google Scholar] [CrossRef]
  22. Sun, Y.; Ding, Z.; Dai, X.; Dobre, O.A. On the performance of network noma in uplink comp systems: A stochastic geometry approach. IEEE Trans. Commun. 2019, 67, 5084–5098. [Google Scholar] [CrossRef] [Green Version]
  23. Shahab, M.B.; Shin, S.Y. Time shared half/full-duplex cooperative noma with clustered cell edge users. IEEE Commun. Lett. 2018, 22, 1794–1797. [Google Scholar] [CrossRef]
  24. Adame, T.; Bel, A.; Bellalta, B.; Barcelo, J.; Oliver, M. Ieee 802.11 ah: The wifi approach for m2m communications. IEEE Wirel. Commun. 2014, 21, 144–152. [Google Scholar] [CrossRef] [Green Version]
  25. Doost-Mohammady, R.; Naderi, M.Y.; Chowdhury, K.R. Performance analysis of csma/ca based medium access in full duplex wireless communications. IEEE Trans. Mob. Comput. 2016, 15, 1457–1470. [Google Scholar] [CrossRef] [Green Version]
  26. Pawlowski, M.P.; Jara, A.J.; Ogorzalek, M.J. Extending extensible authentication protocol over ieee 802.15. 4 networks. In Proceedings of the 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Birmingham, UK, 2–4 July 2014; pp. 340–345. [Google Scholar]
  27. Chen, Y.; Ji, F.; Guan, Q.; Wang, Y.; Chen, F.; Yu, H. Adaptive rto for handshaking-based mac protocols in underwater acoustic networks. Future Gener. Comput. Syst. 2018, 86, 1185–1192. [Google Scholar] [CrossRef]
  28. Shahin, N.; Ali, R.; Kim, Y.-T. Hybrid slotted-csma/ca-tdma for efficient massive registration of iot devices. IEEE Access 2018, 6, 18366–18382. [Google Scholar] [CrossRef]
  29. Zhai, C.; Zou, Z.; Chen, Q.; Xu, L.; Zheng, L.-R.; Tenhunen, H. Delay-aware and reliability-aware contention-free mf–tdma protocol for automated rfid monitoring in industrial iot. J. Ind. Inf. Integr. 2016, 3, 8–19. [Google Scholar] [CrossRef]
  30. Ye, Q.; Zhuang, W. Token-based adaptive mac for a two-hop internet-of-things enabled manet. IEEE Internet Things J. 2017, 4, 1739–1753. [Google Scholar] [CrossRef]
  31. Li, Y.; Zhang, X.; Zeng, J.; Wan, Y.; Ma, F. A distributed tdma scheduling algorithm based on energy-topology factor in internet of things. IEEE Access 2017, 5, 10757–10768. [Google Scholar] [CrossRef]
  32. Bhatia, A.; Hansdah, R.C. A distributed tdma slot scheduling algorithm for spatially correlated contention in wsns. In Proceedings of the 2013 27th International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain, 25–28 March 2013; pp. 377–384. [Google Scholar]
  33. Batta, M.S.; Aliouat, Z.; Harous, S. A distributed weight-based tdma scheduling algorithm for latency improvement in iot. In Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 10–12 October 2019; pp. 0768–0774. [Google Scholar]
  34. Batta, M.S.; Harous, S.; Louail, L.; Aliouat, Z. A distributed tdma scheduling algorithm for latency minimization in internet of things. In Proceedings of the 2019 IEEE International Conference on Electro Information Technology (EIT), Brookings, SD, USA, 20–22 May 2019; pp. 108–113. [Google Scholar]
  35. Khan, R.; Ali, I.; Jan, M.A.; Zakarya, M.; Khan, M.A.; Alshamrani, S.S.; Guizani, M. A hybrid approach for a seamless and interoperable communication in the internet of things. IEEE Netw. Mag. 2021, 35, 202–208. [Google Scholar] [CrossRef]
  36. Son, H.; Jeong, C. Virtual mimo beamforming for opportunistic cooperative time division multiple access. IEEE Trans. Commun. 2020, 68, 7521–7532. [Google Scholar] [CrossRef]
  37. Sami, M.; Noordin, N.K.; Khabazian, M. A tdma-based cooperative mac protocol for cognitive networks with opportunistic energy harvesting. IEEE Commun. Lett. 2016, 20, 808–811. [Google Scholar] [CrossRef]
  38. Tiwari, J.; Prakash, A.; Tripathi, R. A novel cooperative mac protocol for safety applications in cognitive radio enabled vehicular ad-hoc networks. Veh. Commun. 2021, 29, 100336. [Google Scholar] [CrossRef]
Figure 1. Neighborhood-Enabled TDMA approach.
Figure 1. Neighborhood-Enabled TDMA approach.
Applsci 13 04682 g001
Figure 2. Empty slots utilization in the IoT network. Devices: 10.
Figure 2. Empty slots utilization in the IoT network. Devices: 10.
Applsci 13 04682 g002
Figure 3. Empty slots utilization in the IoT network. Devices: 20.
Figure 3. Empty slots utilization in the IoT network. Devices: 20.
Applsci 13 04682 g003
Figure 4. Slots Waiting time (ms) where member devices are less than or equal to ten (10).
Figure 4. Slots Waiting time (ms) where member devices are less than or equal to ten (10).
Applsci 13 04682 g004
Figure 5. Evaluation of the proposed and existing methodologies in terms of throughput.
Figure 5. Evaluation of the proposed and existing methodologies in terms of throughput.
Applsci 13 04682 g005
Figure 6. Evaluation of the proposed and existing methodologies in terms of APDR.
Figure 6. Evaluation of the proposed and existing methodologies in terms of APDR.
Applsci 13 04682 g006
Figure 7. Evaluation of the proposed and existing methodologies in terms of end-to-end delay.
Figure 7. Evaluation of the proposed and existing methodologies in terms of end-to-end delay.
Applsci 13 04682 g007
Table 1. IoT network parameters.
Table 1. IoT network parameters.
ParametersValues
Deployment Area of the IoT1200 m × 1200 m
Member Devices C i 50–1000
Server Modules S j 20
Preamble and Physical Headers S j 15 us
Length of Beacon S j 75 to 110 bytes
Back-off Time S j random
IFS & Gaurd Time S j 40 us
Slot S j 70 us
SNR p10 dB
Feedback Bits8 Bits
Energy ( E i )52,000 mAh
Residual Energy ( E r ) E i E c
Transmission Power ( P T x )91.4 mW
Channel Delay ( C h d e l a y )15 ms
Receiving Power ( P R x )59.1 mW
Power Consumption (IM)1.27 mW
Power Consumption (SM)15.4 μW
Transceiver Energy ( T i )1 mW
Transmission Range ( T r )500 m
Receiving Power Threshold ( R T S n )1024 bits
Packet Size ( P s i z e )128 bytes
Distance Between Devices300 m
Sampling Interval10 s
TopologiesStatic and Random
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Khan, M.; Khan, R.; Shah, N.; Ghani, A.; Chelloug, S.A.; Nisar, W.; Teo, J. Sensing and Device Neighborhood-Based Slot Assignment Approach for the Internet of Things. Appl. Sci. 2023, 13, 4682. https://doi.org/10.3390/app13084682

AMA Style

Khan M, Khan R, Shah N, Ghani A, Chelloug SA, Nisar W, Teo J. Sensing and Device Neighborhood-Based Slot Assignment Approach for the Internet of Things. Applied Sciences. 2023; 13(8):4682. https://doi.org/10.3390/app13084682

Chicago/Turabian Style

Khan, Mushtaq, Rahim Khan, Nadir Shah, Abdullah Ghani, Samia Allaoua Chelloug, Wasif Nisar, and Jason Teo. 2023. "Sensing and Device Neighborhood-Based Slot Assignment Approach for the Internet of Things" Applied Sciences 13, no. 8: 4682. https://doi.org/10.3390/app13084682

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop