{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T20:06:48Z","timestamp":1762459608169,"version":"3.41.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T00:00:00Z","timestamp":1530230400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s10922-018-9467-y","type":"journal-article","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T08:46:09Z","timestamp":1530261969000},"page":"327-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["QoS and Cost-Aware Protocol Selection for Next Generation Wireless Network"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9837-0717","authenticated-orcid":false,"given":"Meenakshi","family":"Munjal","sequence":"first","affiliation":[]},{"given":"Niraj Pratap","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,29]]},"reference":[{"issue":"4","key":"9467_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCOM.2015.7081072","volume":"53","author":"X Duan","year":"2015","unstructured":"Duan, X., Wang, X.: Authentication handover and privacy protection in 5G hetnets using software-defined networking. IEEE Commun. Mag. 53(4), 28\u201335 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"9467_CR2","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/j.compeleceng.2013.10.002","volume":"40","author":"J Astorga","year":"2014","unstructured":"Astorga, J., Jacob, E., Toledo, N., Aguado, M.: Analytical evaluation of a time- and energy-efficient security protocol for IP-enabled sensors. Comput. Electr. Eng. 40(2), 539\u2013550 (2014)","journal-title":"Comput. Electr. Eng."},{"issue":"2","key":"9467_CR3","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TMC.2015.2411603","volume":"15","author":"H Ko","year":"2016","unstructured":"Ko, H., Lee, G., Pack, S., Member, S., Kweon, K.: Timer-Based Bloom Filter Aggregation for Reducing Signaling Overhead in Distributed Mobility Management. IEEE Trans. Mob. Comput. 15(2), 516\u2013529 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"9467_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TDSC.2015.2399300","volume":"13","author":"P Fernandez","year":"2016","unstructured":"Fernandez, P., Santa, J., Bernal, F., Gomez-Skarmeta, A.F.: Securing Vehicular IPv6 Communications. IEEE Trans. Dependable Secur. Comput. 13(1), 46\u201358 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"3","key":"9467_CR5","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1109\/TWC.2008.060725","volume":"7","author":"C Makaya","year":"2008","unstructured":"Makaya, C., Pierre, S.: An Analytical Framework for Performance Evaluation of IPv6-Based Mobility Management Protocols. IEEE Trans. Wirel. Commun. 7(3), 972\u2013983 (2008)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"9467_CR6","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.ins.2012.07.016","volume":"219","author":"M-S Kim","year":"2013","unstructured":"Kim, M.-S., Lee, S., Cypher, D., Golmie, N.: Performance analysis of fast handover for proxy Mobile IPv6. Inf. Sci. (Ny) 219, 208\u2013224 (2013)","journal-title":"Inf. Sci. (Ny)"},{"issue":"1","key":"9467_CR7","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/TVT.2011.2157949","volume":"61","author":"J-H Lee","year":"2012","unstructured":"Lee, J.-H., Ernst, T., Chilamkurti, N.: Performance Analysis of PMIPv6-Based Network Mobility for Intelligent Transportation Systems. IEEE Trans. Veh. Technol. 61(1), 74\u201385 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"9467_CR8","doi-asserted-by":"crossref","unstructured":"J.-E. Kang, D.-W. Kum, Y. Li, and Y.-Z. Cho, \u201cSeamless Handover Scheme for Proxy Mobile IPv6,\u201d IEEE Int. Conf. Wirel. Mob. Comput. Netw. Commun., pp. 410\u2013414, 2008","DOI":"10.1109\/WiMob.2008.105"},{"key":"9467_CR9","volume-title":"Emerging Wireless Networks:Concepts, Techniques, and Applications","author":"C Makaya","year":"2012","unstructured":"Makaya, C., Pierre, S.: Emerging Wireless Networks:Concepts, Techniques, and Applications. CRC Press, New York (2012)"},{"key":"9467_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.comcom.2014.10.004","volume":"74","author":"M Bouaziz","year":"2016","unstructured":"Bouaziz, M., Rachedi, A.: A survey on mobility management protocols in Wireless Sensor Networks based on 6LoWPAN technology. Comput. Commun. 74, 3\u201315 (2016)","journal-title":"Comput. Commun."},{"issue":"1","key":"9467_CR11","doi-asserted-by":"crossref","first-page":"122","DOI":"10.29020\/nybg.ejpam.v1i1.6","volume":"1","author":"TL Saaty","year":"2008","unstructured":"Saaty, T.L.: The Analytic Hierarchy and Analytic Network Measurement Processes: applications to Decisions under Risk. Eur. J. Pure Appl. Math. 1(1), 122\u2013196 (2008)","journal-title":"Eur. J. Pure Appl. Math."},{"issue":"1","key":"9467_CR12","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/SURV.2012.010912.00044","volume":"15","author":"L Wang","year":"2013","unstructured":"Wang, L., Kuo, G.G.S.: Mathematical Modeling for Network Selection in Heterogeneous Wireless Networks \u2013 A Tutorial. IEEE Commun. Surv. Tutorials 15(1), 271\u2013292 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"9467_CR13","doi-asserted-by":"crossref","unstructured":"J. D. Mart\u00ednez-Morales, U. Pineda-Rico, and E. Stevens-Navarro, \u201cPerformance comparison between MADM algorithms for vertical handoff in 4G networks,\u201d in 7th International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE, 2010, pp. 309\u2013314","DOI":"10.1109\/ICEEE.2010.5608646"},{"key":"9467_CR14","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.knosys.2015.05.025","volume":"86","author":"J Qin","year":"2015","unstructured":"Qin, J., Liu, X., Pedrycz, W.: An extended VIKOR method based on prospect theory for multiple attribute decision making under interval type-2 fuzzy environment. Knowledge-Based Syst. 86, 116\u2013130 (2015)","journal-title":"Knowledge-Based Syst."},{"issue":"5","key":"9467_CR15","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1016\/j.pmcj.2010.10.001","volume":"7","author":"A Sgora","year":"2011","unstructured":"Sgora, A., Gizelis, C.A., Vergados, D.D.: Network selection in a WiMAX\u2013WiFi environment. Pervasive Mob. Comput. 7(5), 584\u2013594 (2011)","journal-title":"Pervasive Mob. Comput."},{"issue":"23","key":"9467_CR16","doi-asserted-by":"publisher","first-page":"9379","DOI":"10.1016\/j.eswa.2015.07.056","volume":"42","author":"L Wang","year":"2015","unstructured":"Wang, L., Zhang, Z., Wang, Y.: A prospect theory-based interval dynamic reference point method for emergency decision making. Expert Syst. Appl. 42(23), 9379\u20139388 (2015)","journal-title":"Expert Syst. Appl."},{"key":"9467_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aap.2014.08.004","volume":"73","author":"L Zhou","year":"2014","unstructured":"Zhou, L., Zhong, S., Ma, S., Jia, N.: Prospect theory based estimation of drivers\u2019 risk attitudes in route choice behaviors. Accid. Anal. Prev. 73, 1\u201311 (2014)","journal-title":"Accid. Anal. Prev."},{"key":"9467_CR18","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.is.2014.08.001","volume":"48","author":"C Cho","year":"2015","unstructured":"Cho, C., Kang, J.-J., Jeong, J.: Performance analysis of DNS-assisted global mobility management scheme in cost-optimized proxy mobile IPv6 Networks. Inf. Syst. 48, 226\u2013235 (2015)","journal-title":"Inf. Syst."},{"key":"9467_CR19","doi-asserted-by":"crossref","unstructured":"T. Y. Wu, W. K. Liu, and W. T. Lee, \u201cAdvanced handover enhancement for 6LoWPAN PMIPv6 by HF-PMIPv6,\u201d Proc. - 2014 Int. Conf. Inf. Sci. Electron. Electr. Eng. ISEEE 2014, vol. 3, pp. 1770\u20131774, 2014","DOI":"10.1109\/InfoSEEE.2014.6946227"},{"key":"9467_CR20","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/ICCSA.2008.23","volume":"6","author":"S Ryu","year":"2008","unstructured":"Ryu, S., Kim, G.Y., Kim, B., Mun, Y.: A scheme to reduce packet loss during PMIPv6 handover considering authentication. Proceedings - The International Conference on Computational Sciences and its Applications, ICCSA 6, 47\u201351 (2008)","journal-title":"Proceedings - The International Conference on Computational Sciences and its Applications, ICCSA"},{"key":"9467_CR21","doi-asserted-by":"crossref","unstructured":"M. Gohar, S. Il Choi, and S. J. Koh, \u201cFast handover using multicast handover agents in PMIPv6-based wireless networks,\u201d in International Conference on Information Networking, ICOIN, 2011, pp. 367\u2013372","DOI":"10.1109\/ICOIN.2011.5723130"},{"key":"9467_CR22","doi-asserted-by":"crossref","unstructured":"W. Xu, Wu, Daneshmand, Liu, \u201cSmart Buffering for seamless handover in Proxy Mobile IPv6,\u201d Wirel. Commun. Mob. Comput., vol. 11, no. 4, pp. 491\u2013499, 2011","DOI":"10.1002\/wcm.843"},{"key":"9467_CR23","first-page":"181","volume":"6","author":"N Kwon","year":"2011","unstructured":"Kwon, N., Kim, H., Oh, S., Choo, H.: Fast handover scheme based on mobility management of head MAG in PMIPv6. Springer ICCSA 6, 181\u2013192 (2011)","journal-title":"Springer ICCSA"},{"key":"9467_CR24","doi-asserted-by":"crossref","unstructured":"M. C. Chuang and J. F. Lee, \u201cFH-PMIPv6: A fast handoff scheme in Proxy Mobile IPv6 networks,\u201d in International Conference on Consumer Electronics, Communications and Networks, CECNet, 2011, pp. 1297\u20131300","DOI":"10.1109\/CECNET.2011.5768193"},{"issue":"3\u20134","key":"9467_CR25","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1016\/j.mcm.2010.03.028","volume":"53","author":"Z Yan","year":"2011","unstructured":"Yan, Z., Zhou, H., Wang, H.C., Zhang, H., Zhang, S.: Design and implementation of a hybrid MIPv6\/PMIPv6-based mobility management architecture. Math. Comput. Model. 53(3\u20134), 421\u2013442 (2011)","journal-title":"Math. Comput. Model."},{"key":"9467_CR26","doi-asserted-by":"crossref","unstructured":"I. Al-Surmi, M. Othman, N. A. W. A. Hamid, and B. M. Ali, Latency low handover mechanism considering data traffic lost preventing for proxy mobile IPv6 over WLAN, vol. 70, no. 1. 2013","DOI":"10.1007\/s11277-012-0703-6"},{"key":"9467_CR27","doi-asserted-by":"crossref","unstructured":"S. Ryu and Y. Mun, \u201cScheme to prevent packet loss during PMIPv6 handover,\u201d in Transactions on Computational Science VI, 2009, pp. 131\u2013142","DOI":"10.1007\/978-3-642-10649-1_8"},{"key":"9467_CR28","unstructured":"I. Al-Surmi, M. Othman, and B. M. Ali, \u201cReview on mobility management for future-IP-based next generation wireless networks,\u201d in 12th International Conference on Advanced Communication Technology (ICACT), 2010, vol. 2, pp. 989\u2013994"},{"issue":"7","key":"9467_CR29","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/LCOMM.2010.07.100558","volume":"14","author":"SJ Koh","year":"2010","unstructured":"Koh, S.J., Gohar, M.: Multicast Handover Agents for Fast Handover in Wireless Multicast Networks. IEEE Commun. Lett. 14(7), 676\u2013678 (2010)","journal-title":"IEEE Commun. Lett."},{"key":"9467_CR30","doi-asserted-by":"crossref","unstructured":"H. Choi, K. Kim, H. Lee, and S. Min, \u201cReactive Smart Buffering Scheme for Seamless Handover in PMIPv6,\u201d in International Conference On Principles Of Distributed Systems, 2008, pp. 568\u2013571","DOI":"10.1007\/978-3-540-92221-6_42"},{"issue":"1","key":"9467_CR31","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/JSYST.2013.2297705","volume":"10","author":"H Modares","year":"2016","unstructured":"Modares, H., Moravejosharieh, A., Lloret, J., Bin Salleh, R.: A survey on proxy mobile IPv6 handover. IEEE Syst. J. 10(1), 208\u2013217 (2016)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"9467_CR32","first-page":"1","volume":"173","author":"AJ Jabir","year":"2012","unstructured":"Jabir, A.J., Subramaniam, S.K., Ahmad, Z.Z., Asilah, N., Hamid, W.A.: A cluster-based proxy mobile IPv6 for IP-WSNs. EURASIP J. Wirel. Commun. Netw. 173(1), 1\u201317 (2012)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"9467_CR33","doi-asserted-by":"crossref","unstructured":"Meenakshi and N. P. Singh, \u201cA comparative study of cooperative and non-cooperative game theory in network selection,\u201d in IEEE International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 2016, pp. 612\u2013617","DOI":"10.1109\/ICCTICT.2016.7514652"},{"key":"9467_CR34","doi-asserted-by":"crossref","unstructured":"M. Munjal and N. P. Singh, \u201cUtility aware network selection in small cell,\u201d Wirel. Networks, 2018","DOI":"10.1007\/s11276-018-1676-5"},{"key":"9467_CR35","doi-asserted-by":"crossref","unstructured":"F. Bari and V. Leung, \u201cMulti-Attribute Network Selection by Iterative TOPSIS for Heterogeneous Wireless Access,\u201d in 4th IEEE Consumer Communications and Networking Conference, 2007, pp. 808\u2013812","DOI":"10.1109\/CCNC.2007.164"},{"issue":"2","key":"9467_CR36","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.1007\/s11277-013-1087-y","volume":"72","author":"R Verma","year":"2013","unstructured":"Verma, R., Singh, N.P.: GRA Based Network Selection in Heterogeneous Wireless Networks. Wirel. Pers. Commun. 72(2), 1437\u20131452 (2013)","journal-title":"Wirel. Pers. Commun."},{"issue":"2","key":"9467_CR37","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2307\/1914185","volume":"47","author":"D Kahneman","year":"1979","unstructured":"Kahneman, D., Tversky, A.: Prospect Theory: an Analysis of Decision under Risk. Econometrica 47(2), 263\u2013292 (1979)","journal-title":"Econometrica"},{"issue":"1","key":"9467_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00820ED1V01Y201712AIM036","volume":"12","author":"A Rosenfeld","year":"2018","unstructured":"Rosenfeld, A., Kraus, S.: Predicting Human Decision-Making: from Prediction to Action. Synth. Lect. Artif. Intell. Mach. Learn. 12(1), 1\u2013150 (2018)","journal-title":"Synth. Lect. Artif. Intell. Mach. Learn."},{"key":"9467_CR39","doi-asserted-by":"crossref","unstructured":"M. Munjal and N. P. Singh, \u201cImproved network selection for multimedia applications,\u201d Trans. Emerg. Telecommun. Technol., vol. 28, no. 5, 2017","DOI":"10.1002\/ett.3121"},{"issue":"4","key":"9467_CR40","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF00122574","volume":"5","author":"A Tversky","year":"1992","unstructured":"Tversky, A., Kahneman, D.: Advances in Prospect-Theory - Cumulative Representation of Uncertainty. J. Risk Uncertain. 5(4), 297\u2013323 (1992)","journal-title":"J. Risk Uncertain."},{"issue":"1","key":"9467_CR41","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.jmp.2010.08.006","volume":"55","author":"H Nilsson","year":"2011","unstructured":"Nilsson, H., Rieskamp, J., Wagenmakers, E.J.: Hierarchical Bayesian parameter estimation for cumulative prospect theory. J. Math. Psychol. 55(1), 84\u201393 (2011)","journal-title":"J. Math. Psychol."},{"issue":"4","key":"9467_CR42","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/s11238-016-9582-8","volume":"82","author":"MO Rieger","year":"2017","unstructured":"Rieger, M.O., Wang, M., Hens, T.: Estimating cumulative prospect theory parameters from an international survey. Theory Decis. 82(4), 567\u2013596 (2017)","journal-title":"Theory Decis."},{"issue":"3","key":"9467_CR43","first-page":"237","volume":"12","author":"X Zhang","year":"2010","unstructured":"Zhang, X., Liu, P.: Method for Multiple Attribute Decision-making under Risk with Interval Numbers. Int. J. Fuzzy Syst. 12(3), 237\u2013242 (2010)","journal-title":"Int. J. Fuzzy Syst."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9467-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-018-9467-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-018-9467-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T12:21:19Z","timestamp":1751718079000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-018-9467-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,29]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["9467"],"URL":"https:\/\/doi.org\/10.1007\/s10922-018-9467-y","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2018,6,29]]},"assertion":[{"value":"10 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}