{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:12:29Z","timestamp":1742958749902,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030335816"},{"type":"electronic","value":"9783030335823"}],"license":[{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33582-3_64","type":"book-chapter","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T07:46:34Z","timestamp":1572594394000},"page":"683-694","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Survey of Geocast Routing Protocols in Opportunistic Networks"],"prefix":"10.1007","author":[{"given":"Aliyu M.","family":"Abali","sequence":"first","affiliation":[]},{"given":"Norafida Bte","family":"Ithnin","sequence":"additional","affiliation":[]},{"given":"Tekenate Amah","family":"Ebibio","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Dawood","sequence":"additional","affiliation":[]},{"given":"Wadzani A.","family":"Gadzama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,2]]},"reference":[{"issue":"6","key":"64_CR1","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/MCOM.2010.5560597","volume":"48","author":"M Conti","year":"2010","unstructured":"Conti, M., Giordano, S., May, M., Passarella, A.: From opportunistic networks to opportunistic computing. IEEE Commun. Mag. 48(6), 126\u2013139 (2010)","journal-title":"IEEE Commun. Mag."},{"key":"64_CR2","doi-asserted-by":"crossref","unstructured":"Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proceedings of the 2003 Conference on Applications, Technology, Architectures and Protocols Computer Communications - SIGCOMM 2003, pp. 27\u201334 (2003)","DOI":"10.1145\/863956.863960"},{"issue":"5","key":"64_CR3","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1109\/JSAC.2008.080609","volume":"26","author":"K Fall","year":"2008","unstructured":"Fall, K., Farrell, S.: DTN: an architectural retrospective. IEEE J. Sel. Areas Commun. 26(5), 828\u2013836 (2008)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"64_CR4","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MC.2010.19","volume":"43","author":"M Conti","year":"2010","unstructured":"Conti, M., Kumar, M.: Opportunities in opportunistic computing. Computer 43, 42\u201350 (2010)","journal-title":"Computer"},{"key":"64_CR5","doi-asserted-by":"crossref","unstructured":"Ott, J., Hyyti\u00e4, E., Lassila, P., Vaegs, T., Kangasharju, J.: Floating content: information sharing in urban areas. In: 2011 IEEE International Conference on Pervasive Computing and Communications PerCom, pp. 136\u2013146. IEEE (2011)","DOI":"10.1109\/PERCOM.2011.5767578"},{"key":"64_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.jnca.2016.05.011","volume":"70","author":"TE Amah","year":"2016","unstructured":"Amah, T.E., Kamat, M., Moreira, W., Bakar, K.A., Mandala, S., Batista, M.A.: Towards next-generation routing protocols for pocket switched networks. J. Netw. Comput. Appl. 70, 51\u201388 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"64_CR7","doi-asserted-by":"crossref","unstructured":"Navas, J.C., Imielinski, T.: GeoCast - geographic addressing and routing. In: Proceedings of the 3rd Annual ACM\/IEEE International Conference Mobile Computing Network (MobiCom 1997), pp. 66\u201376 (1997)","DOI":"10.1145\/262116.262132"},{"issue":"3","key":"64_CR8","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/1226736.1226765","volume":"50","author":"BS Manoj","year":"2007","unstructured":"Manoj, B.S., Baker, A.H.: Communication challenges in emergency response. Commun. ACM 50(3), 51\u201353 (2007)","journal-title":"Commun. ACM"},{"key":"64_CR9","doi-asserted-by":"publisher","first-page":"1308","DOI":"10.1109\/TNET.2016.2533612","volume":"24","author":"MZ Shafiq","year":"2016","unstructured":"Shafiq, M.Z., Ji, L., Liu, A.X., Pang, J., Venkataraman, S., Wang, J.: Characterizing and optimizing cellular network performance during crowded events. IEEE\/ACM Trans. Netw. 24, 1308\u20131321 (2016)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"64_CR10","doi-asserted-by":"crossref","unstructured":"Wakeman, I., Naicken, S., Rimmer, J., Chalmers, D., Fisher, C.: The fans united will always be connected: Building a practical DTN in a football stadium. In: Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (2014)","DOI":"10.1007\/978-3-319-14225-8_11"},{"key":"64_CR11","doi-asserted-by":"crossref","unstructured":"Guo, B., Yu, Z., Zhou, X., Zhang, D.: Opportunistic IoT: exploring the social side of the internet of things. In: Proceedings of the 2012 IEEE 16th International Conference Computer Supported Cooperative Work in Design CSCWD 2012, pp. 925\u2013929 (2012)","DOI":"10.1109\/CSCWD.2012.6221932"},{"issue":"6","key":"64_CR12","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/j.pmcj.2011.09.001","volume":"7","author":"J Ott","year":"2011","unstructured":"Ott, J., Hyyti, E., Lassila, P., Kangasharju, J., Santra, S.: Floating content for probabilistic information sharing. Pervasive Mob. Comput. 7(6), 671\u2013689 (2011)","journal-title":"Pervasive Mob. Comput."},{"issue":"2","key":"64_CR13","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/COMST.2014.2369742","volume":"17","author":"F Rebecchi","year":"2014","unstructured":"Rebecchi, F., et al.: Survey data offloading techniques in cellular networks : a survey. IEEE Commun. Surv. Tutor. 17(2), 580\u2013603 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"64_CR14","doi-asserted-by":"crossref","unstructured":"Han, B., Hui, P., Kumar, V.S.A., Marathe, M.V., Pei, G., Srinivasan, A.: Cellular traffic offloading through opportunistic communications (2010)","DOI":"10.1145\/1859934.1859943"},{"key":"64_CR15","doi-asserted-by":"publisher","first-page":"821","DOI":"10.1109\/TMC.2011.101","volume":"11","author":"B Han","year":"2012","unstructured":"Han, B., Hui, P., Kumar, V.S.A., Marathe, M.V., Shao, J., Srinivasan, A.: Mobile data offloading through opportunistic communications and social participation. IEEE Trans. Mob. Comput. 11, 821\u2013834 (2012)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1\u20134","key":"64_CR16","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.peva.2005.07.018","volume":"62","author":"R Groenevelt","year":"2005","unstructured":"Groenevelt, R., Nain, P., Koole, G.: The message delay in mobile ad hoc networks. Perform. Eval. 62(1\u20134), 210\u2013228 (2005)","journal-title":"Perform. Eval."},{"key":"64_CR17","doi-asserted-by":"crossref","unstructured":"Piorkowski, M.: Mobility-centric geocasting for mobile partitioned networks. In: Proceedings of the International Conference on Network Protocols, ICNP, pp. 228\u2013237 (2008)","DOI":"10.1109\/ICNP.2008.4697041"},{"key":"64_CR18","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.comcom.2018.05.014","volume":"127","author":"A Rajaei","year":"2018","unstructured":"Rajaei, A., Chalmers, D., Wakeman, I., Parisis, G.: Efficient geocasting in opportunistic networks. Comput. Commun. 127, 105\u2013121 (2018)","journal-title":"Comput. Commun."},{"key":"64_CR19","doi-asserted-by":"crossref","unstructured":"Kuhn, F., Wattenhofer, R., Zhang, Y., Zollinger, A.: Geometric ad-hoc routing: of theory and practice. In: Proceedings of the 22nd Annual Symposium on Principles Distributed Computing (PODC) (2003)","DOI":"10.1145\/872035.872044"},{"issue":"2","key":"64_CR20","first-page":"32","volume":"6","author":"C Maih\u00f6fer","year":"2004","unstructured":"Maih\u00f6fer, C., Daimlerchrysler, A.C.: Geocast routing protocols. Delab. Csd. Auth. Gr. 6(2), 32\u201342 (2004)","journal-title":"Delab. Csd. Auth. Gr."},{"key":"64_CR21","doi-asserted-by":"crossref","unstructured":"Ma, Y., Jamalipour, A.: Opportunistic geocast in large scale intermittently connected mobile ad hoc networks. In: The 17th Asia Pacific Conference on Communications, pp. 445\u2013449. IEEE (2011)","DOI":"10.1109\/APCC.2011.6152850"},{"key":"64_CR22","doi-asserted-by":"crossref","unstructured":"Costantino, G., Maiti, R.R., Martinelli, F., Santi, P.: LoSeRO: a locality sensitive routing protocol in opportunistic networks. In: Proceedings of the 31st Annual ACM Symposium Applied Computing - SAC 2016, vol. 14, no. 8, pp. 644\u2013650 (2016)","DOI":"10.1145\/2851613.2851726"},{"key":"64_CR23","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and focus: efficient mobility-assisted routing for heterogeneous and correlated mobility. In: Proceedings of the Fifth Annual IEEE International Conference Pervasive Computing and Communications Workshops (PerCom Work 2007), pp. 79\u201385 (2007)","DOI":"10.1109\/PERCOMW.2007.108"},{"key":"64_CR24","unstructured":"Vahdat, A., Becker, D., et al.: Epidemic routing for partially connected ad hoc - google scholar (2000)"},{"key":"64_CR25","doi-asserted-by":"crossref","unstructured":"Lu, S., Liu, Y., Liu, Y., Kumar, M.: LOOP: a location based routing scheme for opportunistic networks. In: MASS 2012 \u2013 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, pp. 118\u2013126 (2012)","DOI":"10.1109\/MASS.2012.6502509"},{"key":"64_CR26","doi-asserted-by":"crossref","unstructured":"Costantino, G., Maiti, R.R., Martinelli, F., Santi, P.: LoSeRO. In: Proceedings 31st Annual ACM Symposium Applied Computing - SAC 2016, pp. 644\u2013650 (2016)","DOI":"10.1145\/2851613.2851726"},{"key":"64_CR27","doi-asserted-by":"crossref","unstructured":"Lu, S., Liu, Y.: Geoopp: geocasting for opportunistic networks. In: 2014 IEEE Wireless Communications and Networking Conference (WCNC), vol. 3, pp. 2582\u20132587. IEEE (2014)","DOI":"10.1109\/WCNC.2014.6952815"},{"key":"64_CR28","doi-asserted-by":"crossref","unstructured":"Yuan, Q., Cardei, I., Wu, J.: Predict and relay: an efficient routing in disruption-tolerant networks. In: Proceedings tenth ACM International Symposium Mobile ad hoc Network Computing - MobiHoc 2009 (2009)","DOI":"10.1145\/1530748.1530762"},{"issue":"1","key":"64_CR29","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/TNET.2013.2296751","volume":"23","author":"K Chen","year":"2015","unstructured":"Chen, K., Shen, H.: DTN-FLOW: inter-landmark data flow for high-throughput routing in DTNs. IEEE\/ACM Trans. Netw. 23(1), 212\u2013226 (2015)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"64_CR30","unstructured":"Ma, Y., Jamalipour, A.: Opportunistic geocast in disruption-tolerant networks. In: GLOBECOM - IEEE Glob. Telecommunications Conference (2011)"},{"key":"64_CR31","doi-asserted-by":"crossref","unstructured":"Lee, K.C., Le, M., H\u00e4rri, J., Gerla, M.: LOUVRE: landmark overlays for urban vehicular routing environments. In: IEEE Vehicular Technology Conference (2008)","DOI":"10.1109\/VETECF.2008.447"},{"key":"64_CR32","doi-asserted-by":"crossref","unstructured":"Singh, J., Dhurandher, S.K., Woungang, I., Takizawa, M.: Centrality based geocasting for opportunistic networks, vol. 1. Springer, Heidelberg (2019)","DOI":"10.1007\/978-3-030-15032-7_59"},{"key":"64_CR33","unstructured":"Eric, H.: Point in polygon strategies. In: Graphics Gems IV (1994)"},{"key":"64_CR34","doi-asserted-by":"crossref","unstructured":"Wang, T., Cao, Y., Zhou, Y., Li, P.: A survey on geographic routing protocols in delay\/disruption tolerant networks. Int. J. Distrib. Sens. Netw. 2016 (2016)","DOI":"10.1155\/2016\/3174670"},{"issue":"2","key":"64_CR35","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/TMC.2008.107","volume":"8","author":"M Musolesi","year":"2009","unstructured":"Musolesi, M., Mascolo, C.: CAR: context-aware adaptive routing for delay-tolerant mobile networks. IEEE Trans. Mob. Comput. 8(2), 246\u2013260 (2009)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"64_CR36","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/TNET.2007.897962","volume":"16","author":"T Spyropoulos","year":"2008","unstructured":"Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Efficient routing in intermittently connected mobile networks: the single-copy case. IEEE\/ACM Trans. Netw. 16(1), 63\u201376 (2008)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"64_CR37","unstructured":"Burns, B., Brock, O., Levine, B.N., Burns, B., Levine, B.N.: MV routing and capacity building in disruption tolerant networks. In: Proceedings of the IEEE 24th Annual Jt. Conference IEEE Computing Communications Society, pp. 398\u2013408 (2005)"},{"key":"64_CR38","doi-asserted-by":"crossref","unstructured":"Aviv, A.J., Sherr, M., Blaze, M., Smith, J.M.: Privacy-aware message exchanges for geographically routed human movement networks. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2012)","DOI":"10.1007\/978-3-642-33167-1_11"},{"key":"64_CR39","doi-asserted-by":"publisher","first-page":"2867","DOI":"10.1016\/j.comnet.2006.11.028","volume":"51","author":"X Zhang","year":"2007","unstructured":"Zhang, X., Neglia, G., Kurose, J., Towsley, D.: Performance modeling of epidemic routing. Comput. Netw. 51, 2867\u20132891 (2007)","journal-title":"Comput. Netw."},{"key":"64_CR40","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/s10955-012-0645-0","volume":"151","author":"S Hasan","year":"2013","unstructured":"Hasan, S., Schneider, C.M., Ukkusuri, S.V., Gonz\u00e1lez, M.C.: Spatiotemporal Patterns of Urban Human Mobility. J. Stat. Phys. 151, 304\u2013318 (2013)","journal-title":"J. Stat. Phys."},{"key":"64_CR41","doi-asserted-by":"crossref","unstructured":"Zhang, L., Cai, Z., Lu, J., Wang, X.: Spacial mobility prediction based routing scheme in delay\/disruption-tolerant networks. In: Proceedings 2014 International Conference Identification Information Knowledge Internet of Things, IIKI 2014, pp. 274\u2013279 (2014)","DOI":"10.1109\/IIKI.2014.63"}],"container-title":["Advances in Intelligent Systems and Computing","Emerging Trends in Intelligent Computing and Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33582-3_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T17:11:05Z","timestamp":1572628265000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33582-3_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"ISBN":["9783030335816","9783030335823"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33582-3_64","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,2]]},"assertion":[{"value":"2 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IRICT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Reliable Information and Communication Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Johor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"irict2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/irict.co\/irict2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}