{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T04:04:05Z","timestamp":1748837045289,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789812879899"},{"type":"electronic","value":"9789812879905"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-287-990-5_24","type":"book-chapter","created":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T13:25:13Z","timestamp":1454333113000},"page":"301-309","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["New Classification of Nodes Cooperation in Delay Tolerant Networks"],"prefix":"10.1007","author":[{"given":"Salah Eddine","family":"Loudari","sequence":"first","affiliation":[]},{"given":"Maria","family":"Benamar","sequence":"additional","affiliation":[]},{"given":"Nabil","family":"Benamar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,2]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Scott, K., Burleigh, S.: Bundle Protocol Specification. RFC 5050, November 2007","DOI":"10.17487\/rfc5050"},{"key":"24_CR2","doi-asserted-by":"crossref","unstructured":"Pereira, P.R., Casaca, A., Rodrigues, J.J., Soares, V.N., Triay, J., Cervell\u00f3-Pastor, C.: From Delay-Tolerant Networks to Vehicular Delay-Tolerant Networks. IEEE Commun. Surveys Tuts. PP(99), 1\u201317 (2011)","DOI":"10.1109\/NGI.2011.5985945"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Burleigh, S., Hooke, A., Torgerson, L., Durst, B., Scott, K., Corporation, T.M.: Delay-Tolerant Networking\u202f: An Approach to Interplanetary Internet. IEEE Communications Magazine, 128\u2013136 (2003)","DOI":"10.1109\/MCOM.2003.1204759"},{"issue":"1","key":"24_CR4","first-page":"331","volume":"5","author":"AG Voyiatzis","year":"2012","unstructured":"Voyiatzis, A.G.: A Survey of Delay- and Disruption-Tolerant Networking Applications. Journal of Internet Engineering 5(1), 331\u2013344 (2012)","journal-title":"Journal of Internet Engineering"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Partan, J., Kurose, J., Levine, B.N.: A survey of practical issues in underwater networks. In: Proc. 1st ACM Int. Work. Underw. networks - WUWNet 2006, p. 17 (2006)","DOI":"10.1145\/1161039.1161045"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Juang, P., Oki, H., Wang, Y.: Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet. In: Proc. ASPLOS, October 2002","DOI":"10.1145\/605397.605408"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Krishnan, R., Basu, P., Mikkelson, J.M., Small, C., Ramanathan, R., Brown, D.W., Burgess, J.R., Caro, A.L., Condell, M., Goffee, N.C., Hain, R.R., Hansen, R.E., Jones, C.E., Kawadia, V., Mankins, D.P., Schwartz, B.I., Strayer, W.T., Ward, J.W., Wiggins, D.P., Polit, S.H.: The SPINDLE disruption-tolerant networking system. In: MILCOM 2007 - IEEE Mil. Commun. Conf., pp. 1\u20137, October 2007","DOI":"10.1109\/MILCOM.2007.4454942"},{"key":"24_CR8","unstructured":"DTN Work Group: http:\/\/datatracker.ietf.org\/list\/wg\/"},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.comcom.2014.03.024","volume":"48","author":"N Benamar","year":"2014","unstructured":"Benamar, N., Singh, K.D., Benamar, M., Bonnin, J., El Ouadghiri, D.: Routing protocols in Vehicular Delay Tolerant Networksm: A comprehensive survey. Computer Communication (Com Com) 48, 141\u2013158 (2014)","journal-title":"Computer Communication (Com Com)"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Benamar, N., Benamar, M., Bonnin, J.M.: Routing protocols for DTN in vehicular environment. In: 2012 International Conference on Multimedia Computing and Systems (ICMCS), pp. 589\u2013593, May 10\u201312, 2012","DOI":"10.1109\/ICMCS.2012.6320307"},{"issue":"3","key":"24_CR11","first-page":"589","volume":"58","author":"N Benamar","year":"2013","unstructured":"Benamar, N., Benamar, M., Ahnana, S., Saiyari, F.Z., el Ouadghiri, M.D., Bonnin, J.-M.: Are VDTN routing protocols suitable for data collection in smart cities: a performance assessment. J. Theor. Appl. Inf. Technol. 58(3), 589\u2013600 (2013)","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"1&2","key":"24_CR12","first-page":"78","volume":"10","author":"M Benamar","year":"2014","unstructured":"Benamar, M., Ahnana, S., Saiyari, F.Z., Benamar, N., El Ouadghiri, M.D., Bonnin, J.-M.: Study of VDTN routing protocols performances in sparse and dense traffic in the presence of relay nodes. J. Mob. Multimedia 10(1&2), 78\u201393 (2014)","journal-title":"J. Mob. Multimedia"},{"key":"24_CR13","unstructured":"Benamar, M., Benamar, N., Singh, K.D., El Ouadghiri, D.: Recent study of routing protocols in VANET: survey and taxonomy. In: WVNT 2013: 1st International Workshop on Vehicular Networks and Telematics, May 2013, Marrakech, Morocco (2013)"},{"key":"24_CR14","unstructured":"http:\/\/www.unitedvillages.com\/"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Guo, S., Falaki, M.H., Oliver, E.A., Rahman, S.U., Seth, A., Zaharia, M.A., Keshav, S.: Very Low-Cost Internet Access Using KioskNet. ACM Computer Communication Review, October 2007","DOI":"10.1145\/1290168.1290181"},{"key":"24_CR16","unstructured":"http:\/\/www.widernet.org\/"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Ivancic, W.D.: Security analysis of DTN architecture and bundle protocol specification for space-based networks. In: 2010 IEEE Aerosp. Conf., pp. 1\u201312, March 2010","DOI":"10.1109\/AERO.2010.5446946"},{"key":"24_CR18","unstructured":"DTN Research Group - www.dtnrg.org\/"},{"issue":"3","key":"24_CR19","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1145\/1925019.1925034","volume":"38","author":"TV Prabhakar","year":"2011","unstructured":"Prabhakar, T.V., Nambi Sn, A.U., Jamadagni, H.S., Swaroop, K., Prasad, R.V., Niemegeers, I.G.M.M.: A novel DTN based energy neutral transfer scheme for energy harvested WSN Gateways. ACM SIGMETRICS Perform. Eval. Rev. 38(3), 71 (2011)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"key":"24_CR20","unstructured":"Ardra, P.S.: A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks, vol. 2, pp. 656\u2013660, December 2012"},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Ansa, G., Cruickshank, H., Sun, Z.: A proactive DOS filter mechanism for delay tolerant networks. In: ICST PSATS, Conference, Malaga, Spain, February 2011","DOI":"10.1007\/978-3-642-23825-3_20"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Jain, S.: Black Hole Attack in Delay Tolerant Networks: A Survey, no. 4, pp. 172\u2013175 (2014)","DOI":"10.1049\/joe.2014.0067"},{"issue":"2","key":"24_CR23","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/TNSM.2012.011812.100071","volume":"9","author":"M Nogueira","year":"2012","unstructured":"Nogueira, M., Silva, H., Santos, A., Pujolle, G.: A Security Management Architecture for Supporting Routing Services on WANETs. IEEE Trans. Netw. Serv. Manag. 9(2), 156\u2013168 (2012)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"5","key":"24_CR24","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MWC.2010.5601956","volume":"17","author":"Y Ren","year":"2010","unstructured":"Ren, Y., Chuah, M.C., Yang, J., Chen, Y.: Detecting wormhole attacks in delay tolerant networks. IEEE Wireless Commun. Mag. 17(5), 36\u201342 (2010)","journal-title":"IEEE Wireless Commun. Mag."},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Onen, M., Molva, R.: Denial of service prevention in satellite networks. In: 2004 IEEE Int. Conf. Commun. (IEEE Cat. No. 04CH37577), vol. 7, pp. 4387\u20134391 (2004)","DOI":"10.1109\/ICC.2004.1313376"},{"key":"24_CR26","unstructured":"Mangrulkar, R.S., Atique, M.: Procedia Computer Science Heterogeneous Highly Dense Mobile Environment, pp. 1\u201313 (2013)"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Keranen, A., Pitkanen, M., Vuori, M., Ott, J.: Effect of non-cooperative nodes in mobile DTNs. In: Proc. 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1\u20137, June 2011","DOI":"10.1109\/WoWMoM.2011.5986144"},{"key":"24_CR28","unstructured":"Mishra, D., Chawla, M.: Minimax Theory Based Scheme to Detect Selfish Node and Reduce Latency in Delay Tolerant Network, vol. 2013, no. Cac2s, pp. 78\u201382 (2013)"},{"key":"24_CR29","unstructured":"Ahnana, S., Saiyari, F.Z., Benamar, N., el Ouadghiri, M.D.: Study of DTN routing protocols in vehicular environment in the presence of misbehaving nodes. In: Proc. - WINCOM (2013)"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Li, F., Wu, J., Srinivasan, A.: Thwarting blackhole attacks in distruption-tolerant networks using encounter tickets. In: Proc. - IEEE INFOCOM, pp. 2428\u20132436 (2009)","DOI":"10.1109\/INFCOM.2009.5062170"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Miao, J., Hasan, O., Mokhtar, S.B., Brunie, L., Yim, K.: An Analysis of Strategies for Preventing Selfish Behavior in Mobile Delay Tolerant Networks (2012)","DOI":"10.1109\/IMIS.2012.121"},{"key":"24_CR32","doi-asserted-by":"crossref","unstructured":"Liu, L.: A survey on barter-based incentive mechanism in opportunistic networks. In: 2013 2nd Int. Symp. Instrum. Meas. Sens. Netw. Autom., pp. 365\u2013367, December 2013","DOI":"10.1109\/IMSNA.2013.6743291"},{"issue":"1","key":"24_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.adhoc.2009.02.005","volume":"8","author":"L Buttyan","year":"2010","unstructured":"Buttyan, L., Dora, L., Felegyhazi, M., Vajda, I.: Barter trade improves message delivery in opportunistic networks. Ad Hoc Networks 8(1), 1\u201314 (2010)","journal-title":"Ad Hoc Networks"},{"issue":"7","key":"24_CR34","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1016\/j.adhoc.2012.03.003","volume":"10","author":"G Dini","year":"2012","unstructured":"Dini, G., Duca, A.L.: Ad Hoc Networks Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Ad Hoc Networks 10(7), 1167\u20131178 (2012)","journal-title":"Ad Hoc Networks"}],"container-title":["Lecture Notes in Electrical Engineering","Advances in Ubiquitous Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-287-990-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T08:20:24Z","timestamp":1748766024000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-287-990-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789812879899","9789812879905"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-287-990-5_24","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 February 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}