{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:22:26Z","timestamp":1763202146614,"version":"3.37.3"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2018,5,7]],"date-time":"2018-05-07T00:00:00Z","timestamp":1525651200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s00779-018-1137-2","type":"journal-article","created":{"date-parts":[[2018,5,7]],"date-time":"2018-05-07T11:36:40Z","timestamp":1525693000000},"page":"765-775","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Geographic forwarding rules to reduce broadcast redundancy in mobile ad hoc wireless networks"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4039-4078","authenticated-orcid":false,"given":"Mohammed","family":"Souidi","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Habbani","sequence":"additional","affiliation":[]},{"given":"Halim","family":"Berradi","sequence":"additional","affiliation":[]},{"given":"Fatna","family":"El Mahdi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,7]]},"reference":[{"issue":"2\u20133","key":"1137_CR1","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1023\/A:1013763825347","volume":"8","author":"Y-C Tseng","year":"2002","unstructured":"Tseng Y-C et al (2002) The broadcast storm problem in a mobile ad hoc network. Wirel Netw 8(2\u20133):153\u2013167","journal-title":"Wirel Netw"},{"key":"1137_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s00446-012-0182-8","volume":"26","author":"A Clementi","year":"2013","unstructured":"Clementi A, Monti A, Silvestri R (2013) Fast flooding over Manhattan. Distrib Comput 26:25. \nhttps:\/\/doi.org\/10.1007\/s00446-012-0182-8","journal-title":"Distrib Comput"},{"issue":"7","key":"1137_CR3","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1007\/s00779-015-0884-6","volume":"19","author":"X Wang","year":"2015","unstructured":"Wang X, Wang S, Liang W, Bie R, Zhao F (2015) The dissemination distance of mobile opportunistic networks. Pers Ubiquit Comput 19(7):1011\u20131019","journal-title":"Pers Ubiquit Comput"},{"key":"1137_CR4","unstructured":"Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Second IEEE workshop on mobile computing systems and applications, 1999. Proceedings. WMCSA \u201999, New Orleans, pp 90\u2013100"},{"key":"1137_CR5","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s00446-015-0262-7","volume":"29","author":"R Glabbeek van","year":"2016","unstructured":"van Glabbeek R, H\u00f6fner P, Portmann M et al (2016) Modelling and verifying the AODV routing protocol. Distrib Comput 29:279. \nhttps:\/\/doi.org\/10.1007\/s00446-015-0262-7","journal-title":"Distrib Comput"},{"key":"1137_CR6","unstructured":"Park VD, Corson MS (1997) A highly adaptive distributed routing algorithm for mobile wireless networks. In: INFOCOM \u201997. Sixteenth annual joint conference of the ieee computer and communications societies. driving the information revolution., Proceedings IEEE, Kobe, vol 1403, pp 1405\u20131413"},{"key":"1137_CR7","unstructured":"Jacquet P, Muhlethaler P, Clausen T, Laouiti A, Qayyum A, Viennot L (2001) Optimized link state routing protocol for ad hoc networks. In: Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century. Proceedings. IEEE International, Lahore University of Management Sciences, Pakistan, 2001, pp 62\u201368"},{"issue":"4","key":"1137_CR8","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1145\/190809.190336","volume":"24","author":"CE Perkins","year":"1994","unstructured":"Perkins CE, Bhagwat P (1994) Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Computer Communication Review 24(4):234\u2013244. \nhttps:\/\/doi.org\/10.1145\/190809.190336","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"4","key":"1137_CR9","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1109\/90.944341","volume":"9","author":"ZJ Haas","year":"2001","unstructured":"Haas ZJ, Pearlman MR (2001) The performance of query control schemes for the zone routing protocol. IEEE\/ACM Trans Netw 9(4):427\u2013438. \nhttps:\/\/doi.org\/10.1109\/90.944341","journal-title":"IEEE\/ACM Trans Netw"},{"key":"1137_CR10","doi-asserted-by":"crossref","unstructured":"Souidi M, Habbani A, Berradi H, Essaid B (2017) Node localization to optimize the MPR selection in smart mobile communication. In: Proceedings of the 2017 international conference on smart digital environment. ACM, pp 8\u201313","DOI":"10.1145\/3128128.3128130"},{"issue":"4","key":"1137_CR11","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TMC.2014.2331966","volume":"14","author":"XM Zhang","year":"2015","unstructured":"Zhang XM, Zhang Y, Yan F, Vasilakos AV (2015) Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Trans Mob Comput 14(4):742\u2013754. \nhttps:\/\/doi.org\/10.1109\/TMC.2014.2331966","journal-title":"IEEE Trans Mob Comput"},{"key":"1137_CR12","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1007\/s11277-015-3012-z","volume":"86","author":"F Cadger","year":"2016","unstructured":"Cadger F, Curran K, Santos J et al (2016) Location and Mobility-Aware Routing for Improving Multimedia Streaming Performance in MANETs. Wireless Pers Commun 86:1653. \nhttps:\/\/doi.org\/10.1007\/s11277-015-3012-z","journal-title":"Wireless Pers Commun"},{"issue":"3","key":"1137_CR13","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/TMC.2011.67","volume":"11","author":"M Khabbazian","year":"2012","unstructured":"Khabbazian M, Blake IF, Bhargava VK (2012) Local broadcast algorithms in wireless ad hoc networks: reducing the number of transmissions. IEEE Trans Mob Comput 11(3):402\u2013413. \nhttps:\/\/doi.org\/10.1109\/TMC.2011.67","journal-title":"IEEE Trans Mob Comput"},{"key":"1137_CR14","unstructured":"Lou W, Wu J (2003) On reducing broadcast redundancy in ad hoc wireless networks. In: Proceedings of the 36th annual Hawaii international conference on system sciences, 2003. IEEE, p 10"},{"key":"1137_CR15","doi-asserted-by":"crossref","unstructured":"Kitasuka T, Tagashira S (2013) Finding more efficient multipoint relay set to reduce topology control traffic of OLSR. In: 2013 IEEE 14th international symposium and workshops on World of wireless, mobile and multimedia networks (woWMom), pp 1\u20139","DOI":"10.1109\/WoWMoM.2013.6583478"},{"issue":"3","key":"1137_CR16","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1109\/TMC.2011.277","volume":"12","author":"XM Zhang","year":"2013","unstructured":"Zhang XM, Wang EB, Xia JJ, Sung DK (2013) A neighbor coverage-based probabilistic rebroadcast for reducing routing overhead in mobile ad hoc networks. IEEE Trans Mob Comput 12(3):424\u2013433. \nhttps:\/\/doi.org\/10.1109\/TMC.2011.277","journal-title":"IEEE Trans Mob Comput"},{"issue":"1","key":"1137_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2786005","volume":"48","author":"P Ruiz","year":"2015","unstructured":"Ruiz P, Bouvry P (2015) Survey on broadcast algorithms for mobile ad hoc networks. ACM Comput Surv 48(1):1\u201335. \nhttps:\/\/doi.org\/10.1145\/2786005","journal-title":"ACM Comput Surv"},{"issue":"Part A","key":"1137_CR18","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.adhoc.2014.10.001","volume":"25","author":"DG Reina","year":"2015","unstructured":"Reina DG, Toral SL, Johnson P, Barrero F (2015) A survey on probabilistic broadcast schemes for wireless ad hoc networks. Ad Hoc Networks 25(Part A):263\u2013292. \nhttps:\/\/doi.org\/10.1016\/j.adhoc.2014.10.001","journal-title":"Ad Hoc Networks"},{"issue":"2","key":"1137_CR19","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1016\/j.comcom.2012.10.005","volume":"36","author":"J Yu","year":"2013","unstructured":"Yu J, Wang N, Wang G, Yu D (2013) Connected dominating sets in wireless ad hoc and sensor networks\u2014a comprehensive survey. Comput Commun 36(2):121\u2013134. \nhttps:\/\/doi.org\/10.1016\/j.comcom.2012.10.005","journal-title":"Comput Commun"},{"key":"1137_CR20","doi-asserted-by":"crossref","unstructured":"Blum J, Ding M, Thaeler A, Cheng X (2005) Connected dominating set in sensor networks and MANETs. In: Du D-Z, Pardalos P (eds) Handbook of combinatorial optimization: supplement volume B. Springer, Boston, pp 329\u2013369","DOI":"10.1007\/0-387-23830-1_8"},{"key":"1137_CR21","unstructured":"Qayyum A, Viennot L, Laouiti A (2000) Multipoint relaying: an efficient technique for flooding in mobile wireless networks INRIA"},{"issue":"4","key":"1137_CR22","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/COMST.2006.283820","volume":"8","author":"O Liang","year":"2006","unstructured":"Liang O, Sekercioglu YA, Mani N (2006) A survey of multipoint relay based broadcast schemes in wireless ad hoc networks. IIEEE Commun Surv Tutorials 8(4):30\u201346. \nhttps:\/\/doi.org\/10.1109\/COMST.2006.283820","journal-title":"IIEEE Commun Surv Tutorials"},{"issue":"9","key":"1137_CR23","first-page":"2137","volume":"22","author":"C Sun","year":"2011","unstructured":"Sun C, Yin R-R, Hao X-C, Dou J-J, Liu B (2011) Connected dominating set topology control algorithm of heterogeneous wireless sensor networks. Ruanjian Xuebao\/J of Softw 22(9):2137\u20132148","journal-title":"Ruanjian Xuebao\/J of Softw"},{"key":"1137_CR24","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.ins.2012.02.057","volume":"200","author":"J Akbari Torkestani","year":"2012","unstructured":"Akbari Torkestani J, Meybodi MR (2012) Finding minimum weight connected dominating set in stochastic graph based on learning automata. Inf Sci 200:57\u201377. \nhttps:\/\/doi.org\/10.1016\/j.ins.2012.02.057","journal-title":"Inf Sci"},{"issue":"8","key":"1137_CR25","doi-asserted-by":"publisher","first-page":"1528","DOI":"10.1109\/TPDS.2011.305","volume":"23","author":"Y Zhao","year":"2012","unstructured":"Zhao Y, Wu J, Li F, Lu S (2012) On maximizing the lifetime of wireless sensor networks using virtual backbone scheduling. IEEE Trans Parallel Distrib Syst 23(8):1528\u20131535. \nhttps:\/\/doi.org\/10.1109\/TPDS.2011.305","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"1137_CR26","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/comst.2005.1423333","volume":"7","author":"JY Yu","year":"2005","unstructured":"Yu JY, Chong PHJ (2005) A survey of clustering schemes for mobile ad hoc networks. IEEE Commun Surv Tutorials 7(1):32\u201348. \nhttps:\/\/doi.org\/10.1109\/comst.2005.1423333","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"02","key":"1137_CR27","doi-asserted-by":"publisher","first-page":"8","DOI":"10.4236\/cn.2013.52B002","volume":"05","author":"A Bentaleb","year":"2013","unstructured":"Bentaleb A, Boubetra A, Harous S (2013) Survey of clustering schemes in mobile Ad hoc networks. Commun Netw 05(02):8\u201314. \nhttps:\/\/doi.org\/10.4236\/cn.2013.52B002","journal-title":"Commun Netw"},{"key":"1137_CR28","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s10922-009-9123-7","volume":"17","author":"S Chinara","year":"2009","unstructured":"Chinara S, Rath SK (2009) A survey on one-hop clustering algorithms in mobile ad hoc networks. J Netw Syst Manage 17:183. \nhttps:\/\/doi.org\/10.1007\/s10922-009-9123-7","journal-title":"J Netw Syst Manage"},{"issue":"2","key":"1137_CR29","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/COMST.2004.5342238","volume":"6","author":"C Maihofer","year":"2004","unstructured":"Maihofer C (2004) A survey of geocast routing protocols. IEEE Commun Surv Tutorials 6(2):32\u201342. \nhttps:\/\/doi.org\/10.1109\/comst.2004.5342238","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"2","key":"1137_CR30","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.adhoc.2006.11.002","volume":"6","author":"L Dekar","year":"2008","unstructured":"Dekar L, Kheddouci H (2008) A cluster based mobility prediction scheme for ad hoc networks. Ad Hoc Netw 6(2):168\u2013194. \nhttps:\/\/doi.org\/10.1016\/j.adhoc.2006.11.002","journal-title":"Ad Hoc Netw"},{"key":"1137_CR31","doi-asserted-by":"crossref","unstructured":"Amis AD, Prakash R, Vuong THP, Huynh DT (2000) Max-min d-cluster formation in wireless ad hoc networks. In: INFOCOM 2000. Nineteenth annual joint conference of the IEEE computer and communications societies. Proceedings, vol 31. IEEE, pp 32\u201341","DOI":"10.1109\/INFCOM.2000.832171"},{"key":"1137_CR32","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1007\/s00779-012-0600-8","volume":"17","author":"N Kumar","year":"2013","unstructured":"Kumar N, Chilamkurti N, Park JH (2013) ALCA: agent learningbased clustering algorithm in vehicular ad hoc networks. Pers Ubiquit Comput 17:1683. \nhttps:\/\/doi.org\/10.1007\/s00779-012-0600-8","journal-title":"Pers Ubiquit Comput"},{"issue":"2-3","key":"1137_CR33","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s10586-005-6176-6","volume":"8","author":"L Wang","year":"2005","unstructured":"Wang L, Olariu S (2005) Cluster maintenance in mobile ad-hoc networks. Clust Comput 8(2-3):111\u2013118. \nhttps:\/\/doi.org\/10.1007\/s10586-005-6176-6","journal-title":"Clust Comput"},{"key":"1137_CR34","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.adhoc.2017.08.007","volume":"66","author":"Amit Banerjee","year":"2017","unstructured":"Banerjee A, King C-T, Hsiao H-C (2017) On state maintenance in cluster-based mobile ad-hoc networks. \nhttps:\/\/doi.org\/10.1016\/j.adhoc.2017.08.007","journal-title":"Ad Hoc Networks"},{"issue":"4","key":"1137_CR35","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1023\/A:1019106118419","volume":"6","author":"YB Ko","year":"2000","unstructured":"Ko YB, Vaidya NH (2000) Location aided routing (LAR) in mobile ad hoc networks. Wirel Netw 6(4):307\u2013321. \nhttps:\/\/doi.org\/10.1023\/a:1019106118419","journal-title":"Wirel Netw"},{"issue":"2","key":"1137_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijwmn.2013.5201","volume":"5","author":"V Hnatyshin","year":"2013","unstructured":"Hnatyshin V (2013) Improving MANET routing protocols through the use of geographical information. International Journal of Wireless & Mobile Networks 5(2):1","journal-title":"International Journal of Wireless & Mobile Networks"},{"key":"1137_CR37","doi-asserted-by":"crossref","unstructured":"Noguchi T, Kobayashi T (2017) Adaptive location-aware routing with directional antennas in mobile adhoc networks. In: 2017 international conference on computing, networking and communications (ICNC), pp 1006-1011","DOI":"10.1109\/ICCNC.2017.7876272"},{"key":"1137_CR38","unstructured":"Mikki MA (2009) Energy efficient location aided routing protocol for wireless MANETs. arXiv preprint arXiv:\n0909.0093"},{"issue":"6","key":"1137_CR39","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/TMC.2012.65","volume":"12","author":"H Shen","year":"2013","unstructured":"Shen H, Zhao L (2013) ALERT: an anonymous location-based efficient routing protocol in MANETs. IEEE Trans Mob Comput 12(6):1079\u20131093","journal-title":"IEEE Trans Mob Comput"},{"key":"1137_CR40","unstructured":"Qayyum A, Viennot L, Laouiti A (2002) Multipoint relaying for flooding broadcast messages in mobile wireless networks. In: Proceedings of the 35th annual Hawaii international conference on system sciences, 2002. HICSS, 7-10 Jan. 2002, pp 3866\u2013 3875"},{"issue":"1","key":"1137_CR41","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/LCOMM.2012.112012.121467","volume":"17","author":"T Lu","year":"2013","unstructured":"Lu T, Zhu J (2013) Genetic algorithm for energy-efficient QoS multicast routing. IEEE Commun Lett 17(1):31\u201334. \nhttps:\/\/doi.org\/10.1109\/LCOMM.2012.112012.121467","journal-title":"IEEE Commun Lett"},{"key":"1137_CR42","unstructured":"The network simulator NS-3. Available: \nhttps:\/\/www.nsnam.org\/"},{"key":"1137_CR43","doi-asserted-by":"crossref","unstructured":"Carneiro G, Fortuna P, Ricardo M (2009) FlowMonitor: a network monitoring framework for the network simulator 3 (NS-3). In: Paper presented at the proceedings of the fourth international ICST conference on performance evaluation methodologies and tools, Pisa","DOI":"10.4108\/ICST.VALUETOOLS2009.7493"},{"key":"1137_CR44","doi-asserted-by":"crossref","unstructured":"Aschenbruck N, Ernst R, Gerhards-Padilla E, Schwamborn M (2010) BonnMotion: a mobility scenario generation and analysis tool. In: Paper presented at the proceedings of the 3rd international ICST conference on simulation tools and techniques, Torremolinos","DOI":"10.4108\/ICST.SIMUTOOLS2010.8684"},{"issue":"8","key":"1137_CR45","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/2.940014","volume":"34","author":"J Hightower","year":"2001","unstructured":"Hightower J, Borriello G (2001) Location systems for ubiquitous computing. Computer 34(8):57\u201366","journal-title":"Computer"},{"issue":"6","key":"1137_CR46","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/65.967595","volume":"15","author":"M Mauve","year":"2001","unstructured":"Mauve M, Widmer J, Hartenstein H (2001) A survey on position-based routing in mobile ad hoc networks. Network, IEEE 15(6):30\u201339. \nhttps:\/\/doi.org\/10.1109\/65.967595","journal-title":"Network, IEEE"},{"issue":"2","key":"1137_CR47","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1109\/COMST.2016.2631146","volume":"19","author":"X Wei","year":"2016","unstructured":"Wei X, Wang Q, Wang T, Fan J (2016) Jammer localization in multi-hop wireless network: a comprehensive survey. IEEE Commun Surv Tutorials 19(2):765\u2013799","journal-title":"IEEE Commun Surv Tutorials"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-018-1137-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-018-1137-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-018-1137-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,19]],"date-time":"2019-11-19T04:11:14Z","timestamp":1574136674000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-018-1137-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,7]]},"references-count":47,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["1137"],"URL":"https:\/\/doi.org\/10.1007\/s00779-018-1137-2","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"type":"print","value":"1617-4909"},{"type":"electronic","value":"1617-4917"}],"subject":[],"published":{"date-parts":[[2018,5,7]]},"assertion":[{"value":"15 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}