{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:57:30Z","timestamp":1742925450539,"version":"3.40.3"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319231648"},{"type":"electronic","value":"9783319231655"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23165-5_29","type":"book-chapter","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T03:57:43Z","timestamp":1440561463000},"page":"617-631","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["ICEMAN: A Practical Architecture for Situational Awareness at the Network Edge"],"prefix":"10.1007","author":[{"given":"Samuel","family":"Wood","sequence":"first","affiliation":[]},{"given":"James","family":"Mathewson","sequence":"additional","affiliation":[]},{"given":"Joshua","family":"Joy","sequence":"additional","affiliation":[]},{"given":"Mark-Oliver","family":"Stehr","sequence":"additional","affiliation":[]},{"given":"Minyoung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Ashish","family":"Gehani","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Gerla","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Sadjadpour","sequence":"additional","affiliation":[]},{"given":"J. J.","family":"Garcia-Luna-Aceves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,27]]},"reference":[{"key":"29_CR1","unstructured":"ENCODERS. http:\/\/encoders.csl.sri.com\/"},{"key":"29_CR2","unstructured":"Federal Information Processing Standards, Publication 197: Advanced encryption standard. http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"29_CR3","unstructured":"ENCODERS software design description v. 1.0 (2013). http:\/\/encoders.csl.sri.com\/wp-content\/uploads\/2014\/08\/CBMEN-SRI-Design-Description-V1.0-Dist-A.pdf"},{"key":"29_CR4","unstructured":"ENCODERS software design description v. 2.0 (2014). http:\/\/encoders.csl.sri.com\/wp-content\/uploads\/2014\/08\/CBMEN-SRI-Design-Description-V2.0-Dist-A.pdf"},{"key":"29_CR5","unstructured":"Shikfa, A., Oenen, M. (eds.): Haggle 027918: an innovative paradigm for autonomic opportunistic communication prototype of trust and security mechanisms. Technical report (2009). http:\/\/www.haggleproject.org\/deliverables\/D4.3_final.pdf"},{"key":"29_CR6","doi-asserted-by":"crossref","unstructured":"Adamson, B., Bormann, C., Handley, M., Macker, J.: Negative-acknowledgment (NACK)-oriented reliable multicast (NORM) protocol. Internet Society Request for Comments RFC 3940 (2004)","DOI":"10.17487\/rfc3940"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Ahrenholz, J., Danilov, C., Henderson, T.R., Kim, J.H.: Core: a real-time network emulator. In: 2008 IEEE Military Communications Conference, MILCOM 2008, pp, 1\u20137. IEEE (2008)","DOI":"10.1109\/MILCOM.2008.4753614"},{"key":"29_CR8","unstructured":"Akinyele, J., Green, M., Rubin, A.: Charm: a framework for rapidly prototyping cryptosystems. Technical report, Johns Hopkins University (2011)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Basu, P., Krishnan, R., Brown, D.W.: Persistent delivery with deferred binding to descriptively named destinations. In: Proceedings of the IEEE Military Communications Conference (2008)","DOI":"10.1109\/MILCOM.2008.4753335"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 28th IEEE Symposium on Security and Privacy (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1155\/2007\/193641","volume":"3","author":"N Chand","year":"2007","unstructured":"Chand, N., Joshi, R.C., Misra, M.: Cooperative caching in mobile ad hoc networks based on data utility. Mobile Inf. Syst. 3, 19\u201337 (2007)","journal-title":"Mobile Inf. Syst."},{"key":"29_CR12","unstructured":"Defense Advanced Research Projects Agency (DARPA). Content-based mobile edge networking (2012). http:\/\/www.darpa.mil\/Our_Work\/STO\/Programs\/Content-Based_Mobile_Edge _Networking_(CBMEN).aspx"},{"issue":"8","key":"29_CR13","doi-asserted-by":"publisher","first-page":"2437","DOI":"10.1007\/s11276-014-0749-3","volume":"20","author":"B Djamaa","year":"2014","unstructured":"Djamaa, B., Richardson, M., Aouf, N., Walters, B.: Towards efficient distributed service discovery in low-power and lossy networks. Wireless Netw. 20(8), 2437\u20132453 (2014)","journal-title":"Wireless Netw."},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Lindgren, A. et al.: Probabilistic routing protocol for intermittently connected networks. Internet Draft draft-irtf-dtnrg-prophet-10 (2012)","DOI":"10.17487\/rfc6693"},{"key":"29_CR15","unstructured":"Finn, W.: Improving battlefield connectivity for dismounted forces, pp. 6\u201310. Defense Tech Briefs (2012)"},{"key":"29_CR16","unstructured":"Frink, S.: Secure cell phone technology gets ready for deployment. Military and Aerospace Electronics (2012)"},{"issue":"4","key":"29_CR17","doi-asserted-by":"publisher","first-page":"67:1","DOI":"10.1145\/2533686","volume":"10","author":"E Ghadimi","year":"2014","unstructured":"Ghadimi, E., Landsiedel, O., Soldati, P., Duquennoy, S., Johansson, M.: Opportunistic routing in low duty-cycle wireless sensor networks. ACM Trans. Sen. Netw. 10(4), 67:1\u201367:39 (2014)","journal-title":"ACM Trans. Sen. Netw."},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, p. 1. ACM (2011)","DOI":"10.1145\/2070562.2070563"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket switched networks and human mobility in conference environments. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking, WDTN 2005, pp. 244\u2013251, ACM, New York (2005)","DOI":"10.1145\/1080139.1080142"},{"key":"29_CR20","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/1558590.1558599","volume":"13","author":"S Ioannidis","year":"2009","unstructured":"Ioannidis, S., Chaintreau, A., Massouli\u00e9, L.: Distributing content updates over a mobile social network. SIGMOBILE Mob. Comput. Commun. Rev. 13, 44\u201347 (2009)","journal-title":"SIGMOBILE Mob. Comput. Commun. Rev."},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proceedings of the 5th International Conference on Emerging Networking Experiments And Technologies, pp. 1\u201312. ACM (2009)","DOI":"10.1145\/1658939.1658941"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Kim, M., Kim, J.-M., Stehr, M.-O., Gehani, A., Tariq, D., Kim, J.S.: Maximizing availability of content in disruptive environments by cross-layer optimization. In: 28th ACM Symposium on Applied Computing (SAC) (2013)","DOI":"10.1145\/2480362.2480451"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Kim, M., Stehr, M.-O., Kim, J., Ha, S.: An application framework for loosely coupled networked cyber-physical systems. In: 8th IEEE International Conference on Embedded and Ubiquitous Computing (EUC-10), Hong Kong, December 2010","DOI":"10.1109\/EUC.2010.30"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Kopena, J.B., Loo, B.T.: Ontonet: scalable knowledge-based networking. In: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering Workshop, ICDEW 2008, pp. 170\u2013175. IEEE Computer Society, Washington, DC, USA (2008)","DOI":"10.1109\/ICDEW.2008.4498312"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Lakhani, H., McCarthy, T., Kim, M., Wilkins, D., Wood, S.: Evaluation of a delay-tolerant ICN architecture. In: International Conference on Ubiquitous and Future Networks, July 2015","DOI":"10.1109\/ICUFN.2015.7182686"},{"key":"29_CR26","doi-asserted-by":"crossref","unstructured":"Lee, U., Park, J.-S., Yeh, J., Pau, G., Gerla, M.: Code torrent: content distribution using network coding in vanet. In: Proceedings of the 1st International Workshop on Decentralized Resource Sharing in Mobile Computing And Networking, MobiShare 2006, pp. 1\u20135. ACM, New York (2006)","DOI":"10.1145\/1161252.1161254"},{"key":"29_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"568","DOI":"10.1007\/978-3-642-20465-4_31","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"A Lewko","year":"2011","unstructured":"Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568\u2013588. Springer, Heidelberg (2011)"},{"key":"29_CR28","doi-asserted-by":"crossref","unstructured":"Li, H., Costantini, R., Anhalt, D., Alonso, R., Stehr, M.-O., Talcot, C., Kim, M., McCarthy, T., Wood, S.: Adaptive interest modeling improves content services at the network edge. In: 2014 IEEE Military Communications Conference (MILCOM), pp. 1027\u20131033, October 2014","DOI":"10.1109\/MILCOM.2014.175"},{"issue":"3","key":"29_CR29","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/961268.961272","volume":"7","author":"A Lindgren","year":"2003","unstructured":"Lindgren, A., Doria, A., Schel\u00e9n, O.: Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Comput. Commun. Rev. 7(3), 19\u201320 (2003)","journal-title":"ACM SIGMOBILE Mobile Comput. Commun. Rev."},{"key":"29_CR30","doi-asserted-by":"crossref","unstructured":"Mtibaa, A., May, M., Diot, C., Ammar, M.: Peoplerank: social opportunistic forwarding. In: Proceedings of the 29th Conference on Information Communications, INFOCOM 2010, pp. 111\u2013115. IEEE Press, Piscataway, NJ, USA (2010)","DOI":"10.1109\/INFCOM.2010.5462261"},{"key":"29_CR31","doi-asserted-by":"crossref","unstructured":"Musolesi, M., Hui, P., Mascolo, C., Crowcroft, C.: Writing on the clean slate: Implementing a socially-aware protocol in Haggle. In: Proceedings of the 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1\u20136. IEEE Computer Society, Washington, DC, USA (2008)","DOI":"10.1109\/WOWMOM.2008.4594893"},{"key":"29_CR32","unstructured":"Nordstrom, E., Gunningberg, P., Rohner, C.; A search-based network architecture for mobile devices. Technical report, Uppsala University (2009)"},{"key":"29_CR33","doi-asserted-by":"crossref","unstructured":"Oh, S.-Y., Lau, D., Gerla, M.: Content centric networking in tactical and emergency MANETs. In: Wireless Days, pp. 1\u20135. IEEE (2010)","DOI":"10.1109\/WD.2010.5657708"},{"key":"29_CR34","doi-asserted-by":"crossref","unstructured":"Shikfa, A., \u00d6nen, M., Molva, R.: Bootstrapping security associations in opportunistic networks. In: PerCom Workshops, pp. 147\u2013152. IEEE (2010)","DOI":"10.1109\/PERCOMW.2010.5470676"},{"key":"29_CR35","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1016\/j.comcom.2010.04.035","volume":"33","author":"A Shikfa","year":"2010","unstructured":"Shikfa, A., \u00d6nen, M., Molva, R.: Privacy and confidentiality in context-based and epidemic forwarding. Comput. Commun. 33, 1493\u20131504 (2010)","journal-title":"Comput. Commun."},{"key":"29_CR36","doi-asserted-by":"crossref","unstructured":"Solis, I., Garcia-Luna-Aceves, J.J.: Robust content dissemination in disrupted environments. In: Proceedings of the Third ACM Workshop on Challenged Networks, CHANTS 2008, pp. 3\u201310. ACM, New York (2008)","DOI":"10.1145\/1409985.1409988"},{"key":"29_CR37","doi-asserted-by":"crossref","unstructured":"Stehr, M.-O., Talcott, C.: Planning and learning algorithms for routing in disruption-tolerant networks. In: IEEE Military Communications Conference (2008)","DOI":"10.1109\/MILCOM.2008.4753336"},{"key":"29_CR38","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/TMC.2008.172","volume":"8","author":"K Obraczka","year":"2009","unstructured":"Obraczka, K., Spyropoulos, T., Turletti, T.: Routing in delay-tolerant networks comprising heterogeneous node populations. IEEE Trans. Mobile Comput. 8, 1132\u20131147 (2009)","journal-title":"IEEE Trans. Mobile Comput."},{"key":"29_CR39","unstructured":"Vahdat, A., Becker, D. et al.: Epidemic routing for partially connected ad hoc networks. Technical report, Technical Report CS-200006, Duke University (2000)"},{"key":"29_CR40","doi-asserted-by":"crossref","unstructured":"Wood, S., Mathewson, J., Joy, J., Stehr, M.O., Kim, M., Gehani, A., Gerla, M., Sadjadpour, H., Garcia-Luna-Aceves, J.J.: ICEMAN: a system for efficient, robust and secure situational awareness at the network edge. In: Proceedings of IEEE Military Communications Conference (2013)","DOI":"10.1109\/MILCOM.2013.255"}],"container-title":["Lecture Notes in Computer Science","Logic, Rewriting, and Concurrency"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23165-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T16:35:24Z","timestamp":1675874124000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23165-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319231648","9783319231655"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23165-5_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"27 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}