[1]
P. Kaur, B.S. Sohi, and P. Singh, "Recent Advances in MAC Protocols for the Energy Harvesting Based WSN: A Comprehensive Review", Wirel. Pers. Commun., vol. 102, no. 3, 2018.
[2]
B. Hu, J.-X. Yan, S. Huang, and J. Xu, "A positioning algorithm for wireless sensor networks based on node Hop count and kernel methods", Rec. Adv. Electric. Electron. Eng.. Vol. 10, no. 3, 2017.
[3]
A. Kochhar, K. Pardeep, S. Preeti, and S. Sharma, "Protocols for wireless sensor networks: A survey", J. Telecommun. Inf. Technol., vol. 1, pp. 77-87, 2018.
[4]
K. Daniluk, and E.N. Szynkiewicz, "A survey of energy efficient security architectures and protocols for wireless sensor networks", J. Telecommun. Inf. Technol., vol. 2012, no. 3, pp. 64-72, 2012.
[5]
Q. Wang, "Traffic analysis & modeling in wireless sensor networks and their applications on network", Netw. Protoc. Algor., vol. 2, no. 1, pp. 74-92, 2010.
[6]
Y. Xie, X. Sun, X. Chen, and Z. Jing, "An adaptive PSM mechanism in WLAN based on traffic awareness", In: 10th IEEE International Conference on Networking, Sensing and Control (ICNSC). Evry,France, 2013, pp. 568-573.
[7]
Q. Wang, "Packet traffic: A good data source for wireless sensor network modeling and anomaly detection", IEEE Netw., vol. 25, no. 3, pp. 15-21, 2011.
[8]
V. Paxson, and S. Floyd, "Wide area traffic: The failure of poisson modeling", Trans. Netw., vol. 3, no. 3, pp. 226-244, 1995.
[9]
Q. Wang, "Traffic Analysis, Modeling and Their Applications in Energy-Constrained Wireless Sensor Networks - On Network Optimization and Anomaly Detection,", Netw. Protocols Algor. Vol. 2, no. 2,2010.
[10]
A. Chakraborty, R.R. Rout, and A. Chakrabarti, "On network lifetime expectancy with realistic sensing and traffic generation Model in Wireless Sensor Networks", IEEE Sens. J., vol. 13, no. 7, pp. 2771-2779, 2013.
[11]
B. Chandrasekaran, "Survey of network traffic models, Available at:", www.cse.wustl.edu/jain
[12]
D.C. Harrison, W.K.G. Seah, and R. Rayudu, "Rare event detection and propagation in wireless sensor networks", ACM Comput. Surv., vol. 48, no. 4, pp. 1-22, 2016.
[13]
A.F. Agamy, and A.M. Mohamed, "Performance modeling of WSN with bursty delivery mode", arXiv Prepr. arXiv, pp. 1-12. 2017
[14]
R.C. Jaiswal, Investigation on traffic modelling and recognition techniques in computer networks. Ph.D. Thesis, chapter 3, pp. 28-60 2015.
[15]
A. Tamazian, and M. Bogachev, "Analytcal and numerical estimates of the Weibull/M/1 and Weibull/Weibull/1 queues efficiency", Proc. 2015 IEEE North West Russ. Sect. Young Res. Electr. Electron. Eng. Conf. ElConRusNW 2015. no. 2016, pp. 110–113, 2015.
[16]
M.A. Arfeen, K. Pawlikowski, D. Mcnickle, and A. Willig, "The role of the weibull distribution in internet traffic modeling", In: Proceedings of the 2013 25th International Teletraffic Congress (ITC). Shanghai, China, 2013.
[17]
M.K. Jha, A.K. Pandey, D. Pal, and A. Mohan, "An energy-efficient multi-layer MAC (ML-MAC) protocol for wireless sensor networks", AEU Int. J. Electron. Commun., vol. 65, no. 3, pp. 209-216, 2011.
[18]
"S. Kumar, P. Ranjan, R. Radhakrishnan, M.R. Tripathy," Energy efficient multichannel MAC protocol for high traffic applications in heterogeneous wireless sensor networks, “", Rec. Adv. Electric. Electron.Eng.. Vol. 10, no. 3, 2017.