2023
DOI: 10.1109/tii.2022.3215990
|View full text |Cite
|
Sign up to set email alerts
|

MSU-TSCH: A Mobile Scheduling Updated Algorithm for TSCH in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…Generally speaking, all the approaches aimed at increasing communication quality (latency and reliability) by decreasing the average number of retransmissions have a positive impact on power consumption as well. This is the case of black and white listing techniques, which are meant to dynamically select the best channel on which transmissions are performed: in [22] bad channels are blacklisted based on the packet delivery ratio, [23] introduces the concept of probabilistic blacklisting, where the probability that a channel is not skipped depends on its perceived communication quality, in [24] cells are scheduled based on network metrics including the packet delivery ratio and end-to-end latency, and finally in [25] blacklisting is managed as a dynamic multi-armed Bernoulli bandit process to adapt selected channels to time-varying interference.…”
Section: B Conserving Energy In Wsnsmentioning
confidence: 99%
“…Generally speaking, all the approaches aimed at increasing communication quality (latency and reliability) by decreasing the average number of retransmissions have a positive impact on power consumption as well. This is the case of black and white listing techniques, which are meant to dynamically select the best channel on which transmissions are performed: in [22] bad channels are blacklisted based on the packet delivery ratio, [23] introduces the concept of probabilistic blacklisting, where the probability that a channel is not skipped depends on its perceived communication quality, in [24] cells are scheduled based on network metrics including the packet delivery ratio and end-to-end latency, and finally in [25] blacklisting is managed as a dynamic multi-armed Bernoulli bandit process to adapt selected channels to time-varying interference.…”
Section: B Conserving Energy In Wsnsmentioning
confidence: 99%
“…Jerbi et al [24], [25] introduce Crypto-ECC, a rapid secure protocol designed for large-scale wireless sensor networks deployed on the Internet of Things (IoT). Their work, published in the book" Theory and Applications of Dependable Computer Systems," focuses on enhancing the security of IoT deployments by proposing a cryptographic protocol tailored to the resource constraints of wireless sensor networks.…”
Section: Related Workmentioning
confidence: 99%
“…MSU‐TSCH 16 is a modern scheduling algorithm that is distributed and mobile, known as an autonomous scheduling strategy since each node independently creates its own schedule without consulting its neighbors. The schedule is generated using the routing data that is currently available, and it is automatically updated when the routing topology changes.…”
Section: Introductionmentioning
confidence: 99%
“…[13][14][15] Centralized scheduling approaches require additional communication overhead since each node must communicate with its neighbors or a central sink, to exchange network and traffic information in addition to scheduling information. MSU-TSCH 16 is a modern scheduling algorithm that is distributed and mobile, known as an autonomous scheduling strategy since each node independently creates its own schedule without consulting its neighbors. The schedule is generated using the routing data that is currently available, and it is automatically updated when the routing topology changes.…”
mentioning
confidence: 99%