{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:05:47Z","timestamp":1773950747463,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319999654","type":"print"},{"value":"9783319999661","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-319-99966-1_20","type":"book-chapter","created":{"date-parts":[[2019,1,23]],"date-time":"2019-01-23T20:35:28Z","timestamp":1548275728000},"page":"215-224","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["DEAR-2: An Energy-Aware Routing Protocol with Guaranteed Delivery in Wireless Ad-hoc Networks"],"prefix":"10.1007","author":[{"given":"Muhammad Umair","family":"Hassan","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Shahzaib","sequence":"additional","affiliation":[]},{"given":"Kamran","family":"Shaukat","sequence":"additional","affiliation":[]},{"given":"Syed Nakhshab","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Mubashir","sequence":"additional","affiliation":[]},{"given":"Saad","family":"Karim","sequence":"additional","affiliation":[]},{"given":"Muhammad Ahmad","family":"Shabir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,23]]},"reference":[{"key":"20_CR1","volume-title":"MILCOM 2002. Proceedings","author":"A Avudainayagam","year":"2002","unstructured":"Avudainayagam, A., Fang, Y., & Lou, W. (2002). DEAR: A device and energy aware routing protocol for mobile adhoc networks. In MILCOM 2002. Proceedings (Vol. 1). Piscataway, NJ: IEEE."},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-319-54978-1_14","volume-title":"Information technology-New generations","author":"F Khan","year":"2018","unstructured":"Khan, F., Rahman, F., Khan, S., & Kamal, S. A. (2018). Performance analysis of transport protocols for multimedia traffic over mobile Wi-Max network under nakagami fading. In Information technology-New generations (pp. 101\u2013110). Cham: Springer."},{"key":"20_CR3","first-page":"1400","volume-title":"2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC)","author":"MA Jan","year":"2013","unstructured":"Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2013, November). Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network. In 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC) (pp. 1400\u20131407). Piscataway, NJ: IEEE."},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1109\/GCCE.2014.7031298","volume-title":"2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE)","author":"F Khan","year":"2014","unstructured":"Khan, F. (2014). Secure communication and routing architecture in wireless sensor networks. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE) (pp. 647\u2013650). Piscataway, NJ: IEEE."},{"key":"20_CR5","volume-title":"Proceedings of the 4th Annual ACM\/IEEE International Conference on Mobile Computing and Networking","author":"S Singh","year":"1998","unstructured":"Singh, S., Woo, M., & Raghavendra, C. S. (1998). Power-aware routing in mobile adhoc networks. In Proceedings of the 4th Annual ACM\/IEEE International Conference on Mobile Computing and Networking. New York: ACM."},{"issue":"4","key":"20_CR6","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1023\/A:1019106118419","volume":"6","author":"Y-B Ko","year":"2000","unstructured":"Ko, Y.-B., & Vaidya, N. H. (2000). Location-aided routing (LAR) in mobile adhoc networks. Wireless Networks, 6(4), 307\u2013321.","journal-title":"Wireless Networks"},{"issue":"6","key":"20_CR7","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1016\/j.adhoc.2008.10.002","volume":"7","author":"M Tarique","year":"2009","unstructured":"Tarique, M., & Tepe, K. E. (2009). Minimum energy hierarchical dynamic source routing for mobile adhoc networks. Adhoc Networks, 7(6), 1125\u20131135.","journal-title":"Adhoc Networks"},{"key":"20_CR8","volume-title":"Proceedings of the 6th Annual International Conference on Mobile Computing and Networking","author":"B Karp","year":"2000","unstructured":"Karp, B., & Kung, H.-T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. New York: ACM."},{"issue":"1","key":"20_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/30.920411","volume":"47","author":"J-H Ryu","year":"2001","unstructured":"Ryu, J.-H., & Cho, D.-H. (2001). A new routing scheme concerning energy conservation in wireless home ad-hoc networks. IEEE Transactions on Consumer Electronics, 47(1), 1\u20135.","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"20_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-03521-2","volume-title":"Graph theory with applications","author":"JA Bondy","year":"1976","unstructured":"Bondy, J. A., & Murty, U. S. R. (1976). Graph theory with applications. Amsterdam: Elsevier North-Holland."},{"issue":"4","key":"20_CR11","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MVT.2017.2753540","volume":"12","author":"M Alam","year":"2017","unstructured":"Alam, M., Ferreira, J., Mumtaz, S., Jan, M. A., Rebelo, R., & Fonseca, J. A. (2017). Smart cameras are making our beaches safer: A 5G-envisioned distributed architecture for safe, connected coastal areas. IEEE Vehicular Technology Magazine, 12(4), 50\u201359.","journal-title":"IEEE Vehicular Technology Magazine"},{"issue":"3","key":"20_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11036-018-1018-y","volume":"23","author":"MA Jan","year":"2018","unstructured":"Jan, M. A., Jan, S. R. U., Alam, M., Akhunzada, A., & Rahman, I. U. (2018). A comprehensive analysis of congestion control protocols in wireless sensor networks. Mobile Networks and Applications, 23(3), 1\u201313.","journal-title":"Mobile Networks and Applications"},{"key":"20_CR13","first-page":"476","volume-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"M Alam","year":"2012","unstructured":"Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2012). Context parameter prediction to prolong mobile terminal battery life. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (pp. 476\u2013489). Berlin: Springer."},{"key":"20_CR14","volume-title":"2012 IEEE International Conference on Communications (ICC)","author":"M Alam","year":"2012","unstructured":"Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2012). Context based node discovery mechanism for energy efficiency in wireless networks. In 2012 IEEE International Conference on Communications (ICC)."},{"key":"20_CR15","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.sigpro.2018.02.030","volume":"148","author":"M Usman","year":"2018","unstructured":"Usman, M., Jan, M. A., He, X., & Alam, M. (2018). Performance evaluation of high definition video streaming over mobile ad hoc networks. Signal Processing, 148, 303\u2013313.","journal-title":"Signal Processing"},{"key":"20_CR16","doi-asserted-by":"publisher","unstructured":"Jan, M. A., Usman, M., He, X., & Rehman, A. U. (2018). SAMS: A Seamless and Authorized Multimedia Streaming framework for WMSN-based IoMT. IEEE Internet of Things Journal. \n                  https:\/\/doi.org\/10.1109\/JIOT.2018.2848284","DOI":"10.1109\/JIOT.2018.2848284"},{"issue":"6","key":"20_CR17","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1023\/A:1012319418150","volume":"7","author":"Prosenjit Bose","year":"2001","unstructured":"Bose, P., Morin, P., Stojmenovi\u0107, I., & Urrutia, J. (2001). Routing with guaranteed delivery in ad hoc wireless networks. Wireless Networks, 7(6), 609\u2013616.","journal-title":"Wireless Networks"},{"issue":"3","key":"20_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11036-018-1020-4","volume":"23","author":"F Khan","year":"2018","unstructured":"Khan, F., ur Rehman, A., Usman, M., Tan, Z., & Puthal, D. (2018). Performance of cognitive radio sensor networks using hybrid automatic repeat ReQuest: Stop-and-wait. Mobile Networks and Applications, 23(3), 1\u201310. \n                  https:\/\/doi.org\/10.1007\/s11036-018-1020-4\n                  \n                .","journal-title":"Mobile Networks and Applications"},{"key":"20_CR19","volume-title":"Proceedings of the 12th Annual International Conference on Mobile Computing and Networking","author":"H Frey","year":"2006","unstructured":"Frey, H., & Stojmenovic, I. (2006). On delivery guarantees of face and combined greedy-face routing in adhoc and sensor networks. In Proceedings of the 12th Annual International Conference on Mobile Computing and Networking. New York: ACM."},{"key":"20_CR20","first-page":"157","volume-title":"International Conference on Future Intelligent Vehicular Technologies","author":"N Fida","year":"2016","unstructured":"Fida, N., Khan, F., Jan, M. A., & Khan, Z. (2016, September). Performance analysis of vehicular adhoc network using different highway traffic scenarios in cloud computing. In International Conference on Future Intelligent Vehicular Technologies (pp. 157\u2013166). Cham: Springer."},{"key":"20_CR21","unstructured":"Jan, M. A., Khan, F., Alam, M., & Usman, M. (2017). A payload-based mutual authentication scheme for internet of things. Future Generation Computer Systems."},{"issue":"5","key":"20_CR22","doi-asserted-by":"publisher","first-page":"861","DOI":"10.1002\/ett.2763","volume":"26","author":"M Alam","year":"2013","unstructured":"Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2013). CANDi: Context-aware node discovery for short-range cooperation. Transactions on Emerging Telecommunications Technologies, 26(5), 861\u2013875. \n                  https:\/\/doi.org\/10.1002\/ett.2763\n                  \n                .","journal-title":"Transactions on Emerging Telecommunications Technologies"}],"updated-by":[{"DOI":"10.1007\/978-3-319-99966-1_30","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000}}],"container-title":["EAI\/Springer Innovations in Communication and Computing","Recent Trends and Advances in Wireless and IoT-enabled Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99966-1_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T06:27:31Z","timestamp":1557988051000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-99966-1_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783319999654","9783319999661"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99966-1_20","relation":{"correction":[{"id-type":"doi","id":"10.1007\/978-3-319-99966-1_30","asserted-by":"object"}]},"ISSN":["2522-8595","2522-8609"],"issn-type":[{"value":"2522-8595","type":"print"},{"value":"2522-8609","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"1 March 2019","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The original version of the book was inadvertently published with the incorrect Affiliation of Muhammad Umair Hassan, Muhammad Mubashir and Muhammad Ahmad Shabir. The Affiliation detail has now been corrected from \u201cUniversity of Jian, Jian, China\u201d to \u201cUniversity of Jinan, Jinan, China\u201d.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}