{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T07:16:10Z","timestamp":1694675770332},"reference-count":40,"publisher":"Wiley","issue":"9","license":[{"start":{"date-parts":[[2014,3,10]],"date-time":"2014-03-10T00:00:00Z","timestamp":1394409600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,6]]},"abstract":"Abstract<\/jats:title>IEEE 802.11 distributed coordination function (DCF) is a popular protocol used for the physical and medium access control layers in most ad hoc networks. DCF employs carrier sense multiple access with collision avoidance and a binary slotted exponential back off. It has been observed that the hidden and exposed terminal problems among stations degrade DCF's performance in terms of throughput and fairness. Hence, the effectiveness of the IEEE 802.11 DCF mechanism in ad hoc networks has attracted many research studies. Many collision avoidance schemes were proposed to address the IEEE 802.11 DCF weaknesses as the performance of the medium access control layer directly impacts the performance of higher\u2010layer protocols and hence the entire network. An evaluation of representative schemes under the same conditions will be helpful in understanding the limitations and strengths of these schemes. This paper surveys various collision avoidance schemes, classify them on the basis of their mechanism, and then provide a comparative study of representative schemes based on their performance. They are evaluated on a chain topology, a pair topology, and a random topology with static environment to measure their throughput, fairness, collision probabilities, and delay. On the basis of the evaluation, we conclude that gentle DCF is the best scheme that has lesser collisions with improved throughput and fairness. A comparison with the legacy carrier sense multiple access with collision avoidance suggests that these proposed schemes do tend to be promising and would inspire future researchers who are interested to find solutions to the age\u2010old collision and fairness issues in ad hoc networks. Copyright \u00a9 2014 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.959","type":"journal-article","created":{"date-parts":[[2014,3,10]],"date-time":"2014-03-10T08:12:42Z","timestamp":1394439162000},"page":"910-937","source":"Crossref","is-referenced-by-count":0,"title":["Performance evaluation of collision avoidance schemes in ad hoc networks"],"prefix":"10.1002","volume":"9","author":[{"given":"Suryakant","family":"Bhandare","sequence":"first","affiliation":[{"name":"Auburn University Auburn AL 36849 U.S.A."}]},{"given":"Taha Ben","family":"Brahim","sequence":"additional","affiliation":[{"name":"Auburn University Auburn AL 36849 U.S.A."}]},{"given":"Saad","family":"Biaz","sequence":"additional","affiliation":[{"name":"Auburn University Auburn AL 36849 U.S.A."}]},{"given":"Prathima","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Auburn University Auburn AL 36849 U.S.A."}]}],"member":"311","published-online":{"date-parts":[[2014,3,10]]},"reference":[{"key":"e_1_2_7_2_1","first-page":"86","article-title":"Performance evaluation of algorithms for wireless medium access","volume":"0","author":"Bharghavan V","year":"1998","journal-title":"Computer Performance and Dependability Symposium, 1998. Proceedings. IEEE International"},{"key":"e_1_2_7_3_1","doi-asserted-by":"crossref","unstructured":"HaasZ DengJ.Dual busy tone multiple access (DBTMA) \u2010 a multiple access control scheme for ad hoc networks IEEE Transactions on Communications 2002;975\u2013985.","DOI":"10.1109\/TCOMM.2002.1010617"},{"key":"e_1_2_7_4_1","doi-asserted-by":"crossref","unstructured":"KwonY FangY LatchmanH.A novel MAC protocol with fast collision resolution for wireless LANs IEEE Infocom San Francisco 2003;793\u2013807.","DOI":"10.1109\/TWC.2004.827731"},{"key":"e_1_2_7_5_1","unstructured":"AcharyaA MisraA BansalS.MACA\u2010P: a MAC for concurrent transmissions in multi\u2010hop wireless networks First IEEE International Conference on Pervasive Computing and Communications Percom Fort Worth TX 2003;505\u2013508."},{"key":"e_1_2_7_6_1","doi-asserted-by":"crossref","unstructured":"BianchiG TinnirelloI.Kalman filter estimation of the number of competing terminals in an IEEE 802.11 network INFOCOM 2003. Twenty\u2010Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies vol. 2 San Francisco 2003;844\u2013852.","DOI":"10.1109\/INFCOM.2003.1208922"},{"key":"e_1_2_7_7_1","doi-asserted-by":"crossref","unstructured":"KongaraH KondareddyY AgrawalP.Fairness and gateway classification algorithm (GCA) in multihop wireless mesh networks 41st Southeastern Symposium on System Theory 2009. SSST 2009 Tullahoma TN 2009;77\u201381.","DOI":"10.1109\/SSST.2009.4806830"},{"key":"e_1_2_7_8_1","unstructured":"KarnP.MACA: a new channel access method for packet radio Computer Networking Conference vol. 9th Tallin USSR 1990;134\u2013140."},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190334"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/217382.217458"},{"key":"e_1_2_7_11_1","unstructured":"DiepstratenW EnnisG BelangerP.DFWMAC: distributed foundation wireless medium access control. IEEE Document P802.11\u201093\/190 1993."},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1478462.1478502"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1975.1092768"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1975.1092768"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1976.1093393"},{"key":"e_1_2_7_16_1","unstructured":"IEEE 802.11 wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Standard 2007."},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.57"},{"key":"e_1_2_7_18_1","doi-asserted-by":"crossref","unstructured":"BarceloJ BellaltaB CanoC SfairopoulouA OliverM.Carrier sense multiple access with enhanced collision avoidance: a performance analysis Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly Leipzig Germany 2009;733\u2013738.","DOI":"10.1145\/1582379.1582538"},{"key":"e_1_2_7_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2004.830951"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCAS.2004.1346122"},{"key":"e_1_2_7_21_1","unstructured":"TaifourM Nat\u2010abdesselamF Simplot\u2010rylD.Neighbourhood backoff algorithm for optimizing bandwidth in single hop wireless ad\u2010hoc networks Proceedings MobiWac \u201905 Barcelona Spain 2005;336\u2013341."},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/584051.584052"},{"key":"e_1_2_7_23_1","unstructured":"DengJ VarshneyP HaasZ.A new backoff algorithm for the IEEE 802.11 Distributed Coordination Function In Communication Networks and Distributed Systems Modeling and Simulation CNDS \u201904 San Diego CA 2004;215\u2013225."},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.872963"},{"key":"e_1_2_7_25_1","doi-asserted-by":"crossref","unstructured":"RomaszkoS BlondiaC.Neighbour\u2010aware collision avoidance MAC protocol (NCMac) for mobile ad hoc networks 3rd International Symposium on Wireless Communication Systems 2006. ISWCS \u201906 Valencia Spain 2006;322\u2013326.","DOI":"10.1109\/ISWCS.2006.4362312"},{"key":"e_1_2_7_26_1","unstructured":"ManaseerS Ould\u2010khaouaM.Logarithmic based backoff algorithm for MAC protocol in MANETs technical report University of Glasgow 2006."},{"key":"e_1_2_7_27_1","unstructured":"TalucciF GerlaM FrattaL.MACA\u2010BI (MACA by invitation) \u2010 a receiver oriented access protocol for wireless multihop networks In proceedings IEEE PIMRC Helsinkin Finland 1997;435\u2013439."},{"key":"e_1_2_7_28_1","doi-asserted-by":"crossref","unstructured":"ChoiE LeeW.Distributed backoff reservation and scheduling for collision mitigation in IEEE 802.11 WLANs International Conference on Information Networking 2008 Busan Korea 2008;1\u20135.","DOI":"10.1109\/ICOIN.2008.4472740"},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.605"},{"key":"e_1_2_7_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501427"},{"key":"e_1_2_7_31_1","unstructured":"WuH PengY LongK ChengS MaJ.Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement INFOCOM \u201902 New York NY 2002;917\u2013931."},{"key":"e_1_2_7_32_1","unstructured":"MonksJ BharghavanV HwuWM.A power controlled multiple access protocol for wireless packet networks INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE vol. 1 Anchorage Alaska 2001;219\u2013228."},{"key":"e_1_2_7_33_1","unstructured":"MuqattashA KrunzM.Power controlled dual channel (PCDC) medium access protocol for wireless ad hoc networks Proceeding of IEEE Infocom Conference San Francisco 2003;470\u2013480."},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.845422"},{"key":"e_1_2_7_35_1","doi-asserted-by":"crossref","unstructured":"WangP ZhuangW.An improved busy\u2010tone solution for collision avoidance in wireless ad hoc networks International Conference in Communications (ICC) Istanbul Turkey 2006;1417\u20131433.","DOI":"10.1109\/ICC.2006.255664"},{"key":"e_1_2_7_36_1","unstructured":"HuJ RaymondC.A statistics based design of MAC protocols with distributed collision resolution for ad hoc networks International Conference on Wireless Networks Communications and Mobile Computing 2005 vol. 2 Wuhan China 2005;917\u2013922."},{"key":"e_1_2_7_37_1","unstructured":"ChoiJ LevisP.Grant to send: fairness and isolation in low\u2010power wireless.Technical Report SING\u201006\u201001 Stanford Information Networks Group 2006."},{"key":"e_1_2_7_38_1","doi-asserted-by":"crossref","unstructured":"VargaA.OMNeT++ 2010.http:\/\/www.omnetpp.org.","DOI":"10.1007\/978-3-642-12331-3_3"},{"key":"e_1_2_7_39_1","unstructured":"JainR ChiuD HaweW.A quantitative measure Of fairness and discrimination for resource allocation in shared computer systems.Technical Report DEC\u2010TR\u2010301 Digital Equipment Corporation 1984."},{"key":"e_1_2_7_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869217"},{"key":"e_1_2_7_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1470836"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.959","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.959","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:59:27Z","timestamp":1694624367000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.959"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,10]]},"references-count":40,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["10.1002\/sec.959"],"URL":"https:\/\/doi.org\/10.1002\/sec.959","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,10]]}}}