Buffer Occupancy-Based Congestion Control Protocol for Wireless Multimedia Sensor Networks
Abstract
:1. Introduction
- The proposed BOCC algorithm retains the high-priority I-frames, discarding further low-priority frames in scenarios where congestion occurs, hence improving the performance of different media sent over the network.
- A dual-buffer-based congestion control mechanism is modeled to predict the congestion in WMSNs. Congestion can be effectively detected by this approach.
- Moreover, to further optimize the performance of the BOCC protocol, the problem is mathematically modeled as a constrained optimization problem. Convex optimization and sequential quadratic programming (SQP) methods are further mathematically modeled to solve the optimization problem. It is observed that convex optimization is better than the SQP method as it converges in less time.
- This article represents practical experiments conducted with a Raspberry Pi sensor node.
2. Related Work
2.1. Traffic-Based Congestion Control Protocols
2.2. Resource-Based Congestion Control Protocols
2.3. Hybrid Congestion Control Protocols (HCCPs)
3. Buffer Occupancy-Based Congestion Control Algorithm
3.1. The Formation of Video Packets
- I-frames (intra-coded frames): These are the main entities in video streaming and are considered reference points for other frames. I-frames are encoded separately, and contain all the necessary information to show the image. I-frames are commonly larger in size due to the addition of essential information for better quality. I-frames are given high priority to obtain better video quality. If an image with I-frames is lost, then the quality of video will be compromised as all other frames including P-frames rely on the I-frames.
- P-frames (predictive-coded frames): P-frames are encoded based on the difference between the current frame and the preceding I-frame or another P-frame. This predictive coding allows P-frames to be smaller in size compared to I-frames, making them more efficient in terms of bandwidth utilization. The loss of P-frames leads to error propagation as they depend on previous frames, which affects the subsequent frames till the next I-frame is received. The P-frames are given lower priority than I-frames but are very important to maintain the overall video quality.
- B-frames (bi-predictive frames): B-frames are compressed frames in comparison with P-frames. They also use the subsequent frames as references. Due to their higher compression rates, additional complexity and delay are added in the encoding and decoding processes. The coding delay for B-frames is high because the encoder has to wait for the following frames to generate them. In the scenario where low latency is required, B-frames are ignored due to their increased complexity and high delay factors. In our scenario, we excluded the B-frames to reduce the coding delay and to simplify the transmission process.
3.2. Problem Formulation for Buffer Occupancy-Based Congestion Control (BOCC) Algorithm
- Buffer occupancy: Let for a given time t represent the buffer occupancy, represent the buffer occupancy at the previous time step t − , and represent the rate of change in buffer occupancy; then, the rate of change in buffer occupancy is given byTo handle the frequent changes in buffer states that lead to instability and increased overhead in the congestion control mechanism, an averaging technique for buffer occupancy over a short moving window is incorporated. This helps to mitigate the impact of frequent adjustments in the data transmission rate potentially overloading the network control mechanism. Using an averaging technique smooths out transient fluctuations and prevents rapid oscillations between congestion states. Specifically, an exponential moving average (EMA) is applied to buffer occupancy values over recent time slots. This is achieved by calculating the average buffer occupancy as follows:
- Congestion levels: In our scenario, we defined two congestion thresholds: as the threshold for entering the slow state, and as the threshold for entering the urgent state. The system’s state based on buffer occupancy can be categorized as follows:
- Normal state:
- Slow state: .
- Urgent state: where Bmax is the buffer capacity.
Here, is a predefined threshold rate of change that indicates when the buffer occupancy is increasing rapidly. The factor is a critical parameter in the BOCC protocol as it determines when the buffer occupancy growth rate signals a transition between congestion states. Setting an effective value is essential to balance responsiveness with stability. To determine , we consider both empirical analysis and network requirements. This process typically involves the following steps:- Empirical calibration: During the initial protocol testing phase, is calibrated by analyzing network simulations under various traffic conditions. These simulations help to observe typical rates of buffer occupancy growth during normal and congested states. By analyzing buffer behavior across different traffic loads, an optimal threshold range for can be identified.
- QoS and latency requirements: The value of is also influenced by the specific QoS and latency requirements of the WMSN application. For applications sensitive to delays or packet losses, a lower may be chosen to trigger congestion control more aggressively. Conversely, applications that can tolerate minor delays may use a higher to prevent unnecessary rate adjustments in response to transient changes in buffer occupancy.
- Adaptation through feedback: Additionally, we propose an adaptive approach, where can be dynamically adjusted based on network feedback. If the network experiences frequent but unnecessary congestion triggers, can be increased incrementally. Similarly, if congestion frequently escalates without timely intervention, can be decreased to improve responsiveness.
- Packet priority and transmission rate: Let denote the priority level of a packet, where {1, 2}, represents the I-frame packets (highest priority), and represents the P-frame packets (lowest priority).The transmission rate for node n at time t is represented as .The transmission rate is adjusted based on the buffer occupancy:
- In the normal state: where is the normal data rate.
- In the slow state: where is a factor determined experimentally.
- In the urgent state: where reduces the data rate further to prioritize high-priority packets.
- Feedback mechanism: Each node receives feedback from its parent node about buffer occupancy. Let denote the feedback received, which is a function of the parent node’s buffer occupancy:This ensures that if the parent node is congested, the child node reduces its sending rate. In the BOCC protocol, each node adjusts its transmission rate, , based on the feedback , which reflects the buffer occupancy status of its parent node. The function converts the buffer occupancy of the parent node, , into a feedback value that modulates the child node’s data transmission rate to prevent congestion. The purpose of is to translate the parent node’s buffer occupancy into a feedback multiplier, , that dynamically adjusts the data transmission rate of the child node. This adjustment is made to control the data flow to the parent node and avoid buffer overflow, effectively reducing congestion as the parent’s buffer occupancy increases.The feedback is not a data rate itself but a multiplier applied to the transmission rate of the child node. Thus, is a dimensionless value between 0 and 1, where 0 indicates no congestion (allowing the child node to transmit at full rate) and 1 indicates severe congestion (reducing the transmission rate to zero). The effective transmission rate of the child node becomesThe thresholds and define the buffer occupancy levels where congestion control should begin () and where it should be maximized (). Between these thresholds, increases linearly from 0 to 1, allowing for a gradual response as buffer occupancy rises.The BOCC protocol assumes that each node communicates with a single designated parent node, which results in a hierarchical tree-like structure. This model is relevant to hierarchical or cluster-based wireless multimedia sensor networks (WMSNs), commonly found in applications such as surveillance or environmental monitoring. In real-world WMSNs, especially in multi-hop networks, data flows typically follow a tree structure to minimize data redundancy and optimize energy usage. Each node reports data to a central sink or gateway via intermediate parent nodes, making the single-parent assumption both practical and efficient. This hierarchical structure is suitable for scenarios where data aggregation and congestion control are crucial, as it allows the BOCC protocol to dynamically adjust transmission rates based on congestion levels and reduce overall network traffic.
- Packet drop probability: The probability of packet drop is a function of buffer occupancy and congestion level. Let represent the packet drop probability at time t. This can be modeled as
- Overall optimization problem: The goal of the BOCC algorithm is to minimize packet loss, as defined in Equation (4), while maintaining video quality and transmission rate, as defined in Equation (3). This can be formulated as an optimization problem:
4. Proposed Solutions
4.1. Convex Optimization Framework for BOCC Algorithm
- Formulation of the optimization problem: To obtain the optimal solution, the first step is to model and define the optimization problem with objectives to minimize the packet loss while maintaining the video quality defined in Equation (5), subject to the constraints defined in Equations (6) and (7). Where represents the transmission rate at node n at time t, depicts the buffer occupancy at time t, is the probability of packet drop, is the priority of the packet, is a weighting factor, and is the rate of change of buffer occupancy.
- Check for convexity: The next step is to verify that the objective function and constraints are convex. The packet drop probability is typically convex in , and the rate of change of buffer occupancy is linear and convex. Hence, the sum of convex functions is convex, thus is convex. The constraints and are linear and convex.
- Lagrangian function and dual problem: The next step is to formulate the Lagrangian and solve the dual problem. The Lagrangian function is given by
- Karush–Kuhn–Tucker (KKT) conditions: In the following step, we need to solve the KKT conditions for optimality for different states for the functions defined in Equations (8) and (9).
- Stationarity
- Primal feasibility
- Dual feasibility
- Complementary slackness
- Solving the optimization problem After that, we solve for the optimal values of and using the KKT conditions.
- Algorithm
- (a)
- Initialization: Start with initial values for , , , and .
- (b)
- Iteration:
- i.
- Update and using the stationarity equations.
- ii.
- Check primal and dual feasibility.
- iii.
- Adjust and using complementary slackness.
- (c)
- Convergence: Continue iteration until convergence to the optimal values.
- Validation and fine-tuning: The last step is to validate the results after obtaining the optimal solution by testing under different network conditions and tuning the weighting factor to balance the packet drop probability and buffer occupancy.
4.2. Sequential Quadratic Programming (SQP) Solution for BOCC Algorithm Optimization
- Initialization: Begin with an initial guess for the decision variables . Initialize the Lagrange multipliers for the equality constraints (if any) and for the inequality constraints.
- Formulate the quadratic programming (QP) subproblem: At each iteration k, formulate the QP subproblem by approximating the Lagrangian function around the current point :The QP subproblem defined in Equation (10) needs to be solved at the k-th iteration, which is given by
- Solve the QP subproblem: Following the steps, then solve the QP subproblem using a QP solver. The solution provides the search direction for the next iteration.
- Update variables: The next step is to update the decision variables and Lagrange multipliers given by
- Termination: Once the optimal convergence is achieved, then the algorithm terminates with the optimal solution .
4.3. Quadratic Programming (QP) Subproblem
4.3.1. Formulation of the QP Subproblem
Algorithm 1 BOCC Algorithm—Convex Optimization |
|
Algorithm 2 Sequential Quadratic Programming (SQP) Method |
|
4.3.2. Interpretation of the QP Subproblem
- A quadratic objective function:
- Linear equality constraints:
- Linear inequality constraints:
4.3.3. Solution of the QP Subproblem
- Solve the quadratic objective function by finding the search direction that minimizes the function while satisfying the constraints defined in Equations (15)–(17). This can be achieved using methods such as the active-set method, interior-point method, or others, depending on the specific QP solver used.
- Update the decision variables: Once the optimal search direction is found, then update the decision variables , where is a step size determined by a line search or trust-region approach.
- Update the Lagrange multipliers: Update the Lagrange multipliers and based on the solution of the QP subproblem, ensuring that the Karush–Kuhn–Tucker (KKT) conditions are satisfied.
4.4. Solving Quadratic Programming Problem Using the Active-Set Method (ASM)
4.4.1. Active-Set Method
- Initialization:
- Start with an initial feasible point that satisfies all the constraints.
- Initialize the working set to include all the equality constraints and any inequality constraints that are active (i.e., those for which .
- Iterative steps. At each iteration k, the following steps are performed:
- Check for optimality: Compute the Lagrange multipliers associated with the constraints in the working set . If all the Lagrange multipliers corresponding to inequality constraints are non-negative, the current solution is optimal. If not, remove the constraint with the most negative multiplier from the working set and go to the next step.
- Determine step length: Compute the maximum step length that maintains feasibility with respect to all inequality constraints:
- Update the working set: If , the step is blocked by some inequality constraint not currently in the working set. Add the most restrictive constraint to the working set .
4.4.2. Convergence
5. Experimental Results
5.1. Packet Delivery Ratio of I-Frame Packets
5.2. Packet Delivery Ratio of P-Frame Packets
5.3. Average End-to-End Delay vs. Data Rate
5.4. PSNR
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
Abbreviations
WMSN | Wireless multimedia sensor network |
BOCC | Buffer Occupancy-Based Congestion Control |
QoS | Quality of service |
EMA | Exponential moving average |
PSNR | Peak signal-to-noise ratio |
SQP | Sequential quadratic programming |
CMOS | Complementary metal–oxide–semiconductor |
MEMSs | Micro-electromechanical systems |
PPI | Priority Packet Index |
ECODA | Enhanced Congestion Detection and Avoidance |
TARA | Topology-aware resource adaptation |
TMR | Time-delay-based multipath routing |
HRTC | Hybrid resource and traffic control |
HTAP | Hierarchical tree alternative path |
SLEB | Secure load-balanced scheme |
DHSSRP | Dynamic hop selection static routing protocol |
HOCA | Healthcare-aware optimized congestion avoidance |
CADA | Congestion-aware data acquisition |
ESRT | Event-to-sink reliable transport |
AWF | Adaptive weight firefly |
NACK | Negative acknowledgment |
References
- Manuel, E.M.; Pankajakshan, V.; Mohan, M.T. Efficient Strategies for Signal Aggregation in Low-Power Wireless Sensor Networks With Discrete Transmission Ranges. IEEE Sens. Lett. 2023, 7, 7500304. [Google Scholar] [CrossRef]
- Yokoyama, T.; Narieda, S.; Naruse, H. Optimization of Sensor Node Placement for CO2 Concentration Monitoring Based on Wireless Sensor Networks in an Indoor Environment. IEEE Sens. Lett. 2024, 8, 7001904. [Google Scholar] [CrossRef]
- Usman, M.; Jan, M.A.; He, X.; Chen, J. A mobile multimedia data collection scheme for secured wireless multimedia sensor networks. IEEE Trans. Netw. Sci. Eng. 2018, 7, 274–284. [Google Scholar] [CrossRef]
- Kizilkaya, B.; Ever, E.; Yatbaz, H.Y.; Yazici, A. An effective forest fire detection framework using heterogeneous wireless multimedia sensor networks. ACM Trans. Multimed. Comput. Commun. Appl. (TOMM) 2022, 18, 1–21. [Google Scholar] [CrossRef]
- Alqaralleh, B.A.; Mohanty, S.N.; Gupta, D.; Khanna, A.; Shankar, K.; Vaiyapuri, T. Reliable multi-object tracking model using deep learning and energy efficient wireless multimedia sensor networks. IEEE Access 2020, 8, 213426–213436. [Google Scholar] [CrossRef]
- Devulapalli, P.K.; GAE, S.K.; Maganti, S.B.; Rachapogula, S. Image transmission in mobile wireless multimedia sensor networks using cat swarm optimization. Multimed. Tools Appl. 2024, 83, 17557–17578. [Google Scholar] [CrossRef]
- Goyat, R.; Kumar, G.; Saha, R.; Conti, M. Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities. Clust. Comput. 2024, 27, 4823–4839. [Google Scholar] [CrossRef]
- Felici-Castell, S.; García-Pineda, M.; Segura-Garcia, J.; Fayos-Jordan, R.; Lopez-Ballester, J. Adaptive live video streaming on low-cost wireless multihop networks for road traffic surveillance in smart cities. Future Gener. Comput. Syst. 2021, 115, 741–755. [Google Scholar] [CrossRef]
- Chiwariro, R.; Thangadurai, N. Quality of service aware routing protocols in wireless multimedia sensor networks: Survey. Int. J. Inf. Technol. 2022, 14, 789–800. [Google Scholar] [CrossRef]
- Afzal, S.S.; Akbar, W.; Rodriguez, O.; Doumet, M.; Ha, U.; Ghaffarivardavagh, R.; Adib, F. Battery-free wireless imaging of underwater environments. Nat. Commun. 2022, 13, 5546. [Google Scholar] [CrossRef]
- Jiang, J.; Wang, H.; Mu, X.; Guan, S. Logistics industry monitoring system based on wireless sensor network platform. Comput. Commun. 2020, 155, 58–65. [Google Scholar] [CrossRef]
- Zikria, Y.B.; Afzal, M.K.; Kim, S.W. Internet of multimedia things (IoMT): Opportunities, challenges and solutions. Sensors 2020, 20, 2334. [Google Scholar] [CrossRef] [PubMed]
- Samiayya, D.; Ramasamy, J.; Gunasekar, M. An efficient congestion control in multimedia streaming using adaptive BRR and fuzzy butterfly optimization. Trans. Emerg. Telecommun. Technol. 2023, 34, e4707. [Google Scholar] [CrossRef]
- Budati, A.K.; Islam, S.; Hasan, M.K.; Safie, N.; Bahar, N.; Ghazal, T.M. Optimized visual internet of things for video streaming enhancement in 5G sensor network devices. Sensors 2023, 23, 5072. [Google Scholar] [CrossRef]
- León, J.P.A.; de la Cruz Llopis, L.J.; Rico-Novella, F.J. A machine learning based distributed congestion control protocol for multi-hop wireless networks. Comput. Netw. 2023, 231, 109813. [Google Scholar] [CrossRef]
- Majeed, U.; Malik, A.N.; Abbas, N.; Abbass, W. An energy-efficient distributed congestion control protocol for wireless multimedia sensor networks. Electronics 2022, 11, 3265. [Google Scholar] [CrossRef]
- Matheen, M.; Sundar, S. IoT multimedia sensors for energy efficiency and security: A review of QoS aware and methods in wireless multimedia sensor networks. Int. J. Wirel. Inf. Netw. 2022, 29, 407–418. [Google Scholar] [CrossRef]
- Montazerolghaem, A. Software-defined internet of multimedia things: Energy-efficient and load-balanced resource management. IEEE Internet Things J. 2021, 9, 2432–2442. [Google Scholar] [CrossRef]
- Srivastava, V.; Tripathi, S.; Singh, K.; Son, L.H. Energy efficient optimized rate based congestion control routing in wireless sensor network. J. Ambient. Intell. Humaniz. Comput. 2020, 11, 1325–1338. [Google Scholar] [CrossRef]
- Javaid, S.; Fahim, H.; Hamid, Z.; Hussain, F.B. Traffic-aware congestion control (TACC) for wireless multimedia sensor networks. Multimed. Tools Appl. 2018, 77, 4433–4452. [Google Scholar] [CrossRef]
- Ee, C.T.; Bajcsy, R. Congestion control and fairness for many-to-one routing in sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, 3–5 November 2004; pp. 148–161. [Google Scholar]
- Akan, O.B.; Akyildiz, I.F. Event-to-sink reliable transport in wireless sensor networks. IEEE/ACM Trans. Netw. 2005, 13, 1003–1016. [Google Scholar] [CrossRef]
- Kuthadi, V.M.; Selvaraj, R.; Baskar, S.; Shakeel, P.M.; Ranjan, A. Optimized energy management model on data distributing framework of wireless sensor network in IoT system. Wirel. Pers. Commun. 2022, 127, 1377–1403. [Google Scholar] [CrossRef]
- Sergiou, C.; Vassiliou, V.; Paphitis, A. Hierarchical Tree Alternative Path (HTAP) algorithm for congestion control in wireless sensor networks. Ad Hoc Netw. 2013, 11, 257–272. [Google Scholar] [CrossRef]
- Kang, J.; Zhang, Y.; Nath, B. TARA: Topology-aware resource adaptation to alleviate congestion in sensor networks. IEEE Trans. Parallel Distrib. Syst. 2007, 18, 919–931. [Google Scholar] [CrossRef]
- Ghaemi, Y.; El-Ocla, H.; Yadav, N.R.; Madana, M.R.; Raju, D.K.; Dhanabal, V.; Sheshadri, V. Intelligent transport system using time delay-based multipath routing protocol for vehicular ad hoc networks. Sensors 2021, 21, 7706. [Google Scholar] [CrossRef]
- Zhou, J.; Lin, Z.; Jiang, X. Secure load-balanced scheme for cluster-based WSNs. In Proceedings of the 2019 6th International Conference on Systems and Informatics (ICSAI), Shanghai, China, 2–4 November 2019; pp. 804–809. [Google Scholar]
- Adil, M. Congestion free opportunistic multipath routing load balancing scheme for Internet of Things (IoT). Comput. Netw. 2021, 184, 107707. [Google Scholar] [CrossRef]
- Rezaee, A.A.; Yaghmaee, M.H.; Rahmani, A.M.; Mohajerzadeh, A.H. HOCA: Healthcare aware optimized congestion avoidance and control protocol for wireless sensor networks. J. Netw. Comput. Appl. 2014, 37, 216–228. [Google Scholar] [CrossRef]
- Yadav, S.L.; Ujjwal, R.; Kumar, S.; Kaiwartya, O.; Kumar, M.; Kashyap, P.K. Traffic and energy aware optimization for congestion control in next generation wireless sensor networks. J. Sens. 2021, 2021, 5575802. [Google Scholar] [CrossRef]
- Zandi, R.; Behzad, K.; Motamedi, E.; Salehinejad, H.; Siami, M. Robofisense: Attention-based robotic arm activity recognition with wifi sensing. IEEE J. Sel. Top. Signal Process. 2024, 18, 396–406. [Google Scholar] [CrossRef]
- Banani Ardecani, F.; Mahmoudzadeh, A.; Mesbah, M. Fuzing multiple erroneous sensors to estimate travel time. J. Intell. Transp. Syst. 2024, 1–14. [Google Scholar] [CrossRef]
- Jamil, U.; Malmir, M.; Chen, A.; Filipovska, M.; Xie, M.; Ding, C.; Jin, Y.F. Developing an eco-driving strategy in a hybrid traffic network using reinforcement learning. Sci. Prog. 2024, 107, 00368504241263406. [Google Scholar] [CrossRef] [PubMed]
- Sheu, J.P.; Hu, W.K. Hybrid congestion control protocol in wireless sensor networks. In Proceedings of the VTC Spring 2008-IEEE Vehicular Technology Conference, Marina Bay, Singapore, 11–14 May 2008; pp. 213–217. [Google Scholar]
- Sergiou, C.; Vassiliou, V. HRTC: A hybrid algorithm for efficient congestion control in wireless sensor networks. In Proceedings of the 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), Dubai, United Arab Emirates, 30 March–2 April 2014; pp. 1–5. [Google Scholar]
- Sayyada, J.; Choudhari, N. Hierarchical tree based congestion control using fuzzy logic for heterogeneous traffic in WSN. Int. J. Curr. Eng. Technol. 2014, 4, 4136–4143. [Google Scholar]
- Donta, P.K.; Amgoth, T.; Annavarapu, C.S.R. Congestion-aware data acquisition with q-learning for wireless sensor networks. In Proceedings of the 2020 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Vancouver, BC, Canada, 9–12 September 2020; pp. 1–6. [Google Scholar]
- Tao, L.Q.; Yu, F.Q. ECODA: Enhanced congestion detection and avoidance for multiple class of traffic in sensor networks. IEEE Trans. Consum. Electron. 2010, 56, 1387–1394. [Google Scholar] [CrossRef]
- Shelke, M.P.; Malhotra, A.; Mahalle, P. A packet priority intimation-based data transmission for congestion free traffic management in wireless sensor networks. Comput. Electr. Eng. 2017, 64, 248–261. [Google Scholar] [CrossRef]
- Ahmed, A.M.; Paulus, R. Congestion detection technique for multipath routing and load balancing in WSN. Wirel. Netw. 2017, 23, 881–888. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Majeed, U.; Malik, A.N.; Abbas, N.; Alfakeeh, A.S.; Javed, M.A.; Abbass, W. Buffer Occupancy-Based Congestion Control Protocol for Wireless Multimedia Sensor Networks. Electronics 2024, 13, 4454. https://doi.org/10.3390/electronics13224454
Majeed U, Malik AN, Abbas N, Alfakeeh AS, Javed MA, Abbass W. Buffer Occupancy-Based Congestion Control Protocol for Wireless Multimedia Sensor Networks. Electronics. 2024; 13(22):4454. https://doi.org/10.3390/electronics13224454
Chicago/Turabian StyleMajeed, Uzma, Aqdas Naveed Malik, Nasim Abbas, Ahmed S. Alfakeeh, Muhammad Awais Javed, and Waseem Abbass. 2024. "Buffer Occupancy-Based Congestion Control Protocol for Wireless Multimedia Sensor Networks" Electronics 13, no. 22: 4454. https://doi.org/10.3390/electronics13224454
APA StyleMajeed, U., Malik, A. N., Abbas, N., Alfakeeh, A. S., Javed, M. A., & Abbass, W. (2024). Buffer Occupancy-Based Congestion Control Protocol for Wireless Multimedia Sensor Networks. Electronics, 13(22), 4454. https://doi.org/10.3390/electronics13224454