{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:43:41Z","timestamp":1740123821116,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,2,22]],"date-time":"2016-02-22T00:00:00Z","timestamp":1456099200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373124"],"award-info":[{"award-number":["61373124"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11276-016-1229-8","type":"journal-article","created":{"date-parts":[[2016,2,21]],"date-time":"2016-02-21T23:26:54Z","timestamp":1456097214000},"page":"1387-1399","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An efficient cooperative hybrid routing protocol for hybrid wireless mesh networks"],"prefix":"10.1007","volume":"23","author":[{"given":"Yuan","family":"Chai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2874-0556","authenticated-orcid":false,"given":"Wenxiao","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Tianhe","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Xiaoping","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,22]]},"reference":[{"issue":"4","key":"1229_CR1","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1016\/j.comnet.2004.12.001","volume":"47","author":"IF Akyildiz","year":"2005","unstructured":"Akyildiz, I. F., Wang, X., & Wang, W. (2005). Wireless mesh networks: A survey. Computer Networks, 47(4), 445\u2013487.","journal-title":"Computer Networks"},{"key":"1229_CR2","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1007\/978-3-642-02617-1_54","volume":"5576","author":"AN Le","year":"2009","unstructured":"Le, A. N., Kum, D. W., & Cho, Y. Z. (2009). An efficient hybrid routing approach for hybrid wireless mesh networks. Advances in Information Security and Assurance, 5576, 532\u2013542.","journal-title":"Advances in Information Security and Assurance"},{"issue":"1","key":"1229_CR3","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/SURV.2013.082713.00184","volume":"16","author":"M Youssef","year":"2014","unstructured":"Youssef, M., Ibrahim, M., Abdelatif, M., Chen, L., & Vasilakos, A. V. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 16(1), 92\u2013109.","journal-title":"IEEE Communications Surveys & Tutorials"},{"volume-title":"Routing in opportunistic networks","year":"2013","key":"1229_CR4","unstructured":"Woungang, I., Dhurandher, S. K., Anpalagan, A., & Vasilakos, A. V. (Eds.). (2013). Routing in opportunistic networks. Springer: New York."},{"issue":"3","key":"1229_CR5","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1109\/TSMCC.2003.817354","volume":"33","author":"A Vasilakos","year":"2003","unstructured":"Vasilakos, A., Saltouros, M. P., Atlassis, A. F., & Pedrycz, W. (2003). Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 33(3), 297\u2013312.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"issue":"9","key":"1229_CR6","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1109\/TC.2011.145","volume":"61","author":"C Busch","year":"2012","unstructured":"Busch, C., Kannan, R., & Vasilakos, A. V. (2012). Approximating congestion+ dilation in networks via quality of routing games. IEEE Transactions on Computers, 61(9), 1270\u20131283.","journal-title":"IEEE Transactions on Computers"},{"volume-title":"Delay tolerant networks: Protocols and applications","year":"2011","key":"1229_CR7","unstructured":"Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (Eds.). (2011). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press."},{"issue":"8","key":"1229_CR8","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1007\/s11276-010-0276-9","volume":"16","author":"T Spyropoulos","year":"2010","unstructured":"Spyropoulos, T., Rais, R. N. B., Turletti, T., Obraczka, K., & Vasilakos, A. (2010). Routing for disruption tolerant networks: Taxonomy and design. Wireless Networks, 16(8), 2349\u20132370.","journal-title":"Wireless Networks"},{"issue":"4","key":"1229_CR9","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1145\/1851275.1851233","volume":"41","author":"A Dvir","year":"2011","unstructured":"Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405\u2013406.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"1229_CR10","unstructured":"Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM, 2012 proceedings IEEE (pp. 100\u2013108). IEEE."},{"issue":"12","key":"1229_CR11","doi-asserted-by":"crossref","first-page":"3264","DOI":"10.1109\/TPDS.2013.2297105","volume":"25","author":"P Li","year":"2014","unstructured":"Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264\u20133273.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"11","key":"1229_CR12","doi-asserted-by":"crossref","first-page":"2238","DOI":"10.1016\/j.mcm.2010.10.008","volume":"53","author":"YS Yen","year":"2011","unstructured":"Yen, Y. S., Chao, H. C., Chang, R. S., & Vasilakos, A. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11), 2238\u20132250.","journal-title":"Mathematical and Computer Modelling"},{"issue":"1","key":"1229_CR13","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1109\/TC.2015.2417543","volume":"65","author":"T Meng","year":"2016","unstructured":"Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. V. (2016). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, 65(1), 244\u2013255.","journal-title":"IEEE Transactions on Computers"},{"issue":"3","key":"1229_CR14","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1109\/TNET.2014.2306592","volume":"23","author":"Y Yao","year":"2015","unstructured":"Yao, Y., Cao, Q., & Vasilakos, A. V. (2015). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for heterogeneous wireless sensor networks. IEEE\/ACM Transactions on Networking, 23(3), 810\u2013823.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"1229_CR15","first-page":"1964","volume":"2","author":"S Marwaha","year":"2004","unstructured":"Marwaha, S., Srinivasan, D., Tham, C. K., & Vasilakos, A. (2004). Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks. Evolutionary Computation, 2, 1964\u20131971.","journal-title":"Evolutionary Computation"},{"issue":"7","key":"1229_CR16","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1049\/iet-com.2009.0164","volume":"4","author":"Y Liu","year":"2010","unstructured":"Liu, Y., Xiong, N., Zhao, Y., Vasilakos, A. V., Gao, J., & Jia, Y. (2010). Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Communications, 4(7), 810\u2013816.","journal-title":"IET Communications"},{"key":"1229_CR17","first-page":"1129","volume":"2278","author":"R Kaur","year":"2012","unstructured":"Kaur, R., & Rai, M. K. (2012). A novel review on routing protocols in manets. Undergraduate Academic Research Journal (UARJ), 2278, 1129\u20131134.","journal-title":"Undergraduate Academic Research Journal (UARJ)"},{"key":"1229_CR18","doi-asserted-by":"crossref","unstructured":"Khan, S., Pirzada, A. A., & Portmann, M. (2007). Performance comparison of reactive routing protocols for hybrid wireless mesh networks. In 2nd international conference on wireless broadband and ultra wideband communications (pp. 78\u201383).","DOI":"10.1109\/AUSWIRELESS.2007.55"},{"key":"1229_CR19","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (aodv) routing. RFC 3561.","DOI":"10.17487\/rfc3561"},{"key":"1229_CR20","unstructured":"ns-3. (2015). https:\/\/www.nsnam.org\/ . Accessed November 26, 2015."},{"issue":"2","key":"1229_CR21","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.pmcj.2008.11.005","volume":"5","author":"AA Pirzada","year":"2009","unstructured":"Pirzada, A. A., Portmann, M., Wishart, R., & Indulska, J. (2009). SafeMesh: A wireless mesh network routing protocol for incident area communications. Pervasive and Mobile Computing, 5(2), 201\u2013221.","journal-title":"Pervasive and Mobile Computing"},{"issue":"1","key":"1229_CR22","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11277-010-0048-y","volume":"62","author":"S Khan","year":"2012","unstructured":"Khan, S., & Loo, J. (2012). Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks. Wireless Personal Communications, 62(1), 201\u2013214.","journal-title":"Wireless Personal Communications"},{"key":"1229_CR23","doi-asserted-by":"crossref","unstructured":"Pirzada, A. A., Wishart, R., & Portmann, M. (2007). Congestion aware routing in hybrid wireless mesh networks. In 15th IEEE international conference on networks (pp. 513\u2013518).","DOI":"10.1109\/ICON.2007.4444139"},{"issue":"7","key":"1229_CR24","first-page":"480","volume":"10","author":"W Shi","year":"2015","unstructured":"Shi, W., Liu, D., Wang, J., & Li, Q. (2015). Cross-layer aware routing protocol for hybrid wireless mesh networks. Journal of Communications, 10(7), 480\u2013489.","journal-title":"Journal of Communications"},{"key":"1229_CR25","doi-asserted-by":"crossref","unstructured":"Zhao, L., Yu, Z., Niu, J., Zhang, H., & Ding, W. (2010). A hybrid routing protocol for hierarchy wireless mesh networks. In 6th international conference on wireless communications networking and mobile computing (WiCOM) (pp. 1\u20134).","DOI":"10.1109\/WICOM.2010.5600953"},{"key":"1229_CR26","doi-asserted-by":"crossref","unstructured":"Song, W., & Fang, X. (2007). Cross-layer routing with link quality and stability-aware in ITS hybrid wireless mesh networks. In 6th international conference on advanced language processing and web information technology (pp. 304\u2013308).","DOI":"10.1109\/ALPIT.2007.33"},{"key":"1229_CR27","doi-asserted-by":"crossref","unstructured":"Pirzada, A. A., Portmann, M., & Indulska, J. (2006). Performance comparison of multi-path aodv and dsr protocols in hybrid mesh networks. In 14th IEEE international conference in networks (pp. 1\u20136).","DOI":"10.1109\/ICON.2006.302624"},{"key":"1229_CR28","doi-asserted-by":"crossref","unstructured":"Cho, J., Kim, E., & Song, J. (2008). A study on enhanced multipath routing protocol in hybrid wireless mesh network. In Novel algorithms and techniques in telecommunications. Automation and industrial electronics (pp. 395\u2013400).","DOI":"10.1007\/978-1-4020-8737-0_70"},{"issue":"1","key":"1229_CR29","first-page":"65","volume":"41","author":"AA Pirzada","year":"2009","unstructured":"Pirzada, A. A., Portmann, M., & Indulska, J. (2009). Aodv-hm: A hybrid mesh ad-hoc on-demand distance vector routing protocol. Journal of Research and Practice in Information Technology, 41(1), 65\u201384.","journal-title":"Journal of Research and Practice in Information Technology"},{"key":"1229_CR30","unstructured":"Pirzada, A. A., Wishart, R., Portmann, M., & Indulska, J. (2009). ALARM: An adaptive load-aware routing metric for hybrid wireless mesh networks. In Proceedings of the thirty-second Australasian conference on computer (Vol. 91, pp. 37\u201346)."},{"key":"1229_CR31","doi-asserted-by":"crossref","unstructured":"Pirzada, A. A., & Portmann, M. (2007). Establishing high capacity routes in wireless mesh networks. In Asia-Pacific conference in communications (pp. 285\u2013288).","DOI":"10.1109\/APCC.2007.4433433"},{"key":"1229_CR32","doi-asserted-by":"crossref","unstructured":"Pirzada, A. A., Wishart, R., & Portmann, M. (2007). Multi-linked AODV routing protocol for wireless mesh networks. In Global telecommunications conference (pp. 4925\u20134930).","DOI":"10.1109\/GLOCOM.2007.934"},{"key":"1229_CR33","doi-asserted-by":"crossref","unstructured":"Draves, R., Padhye, J., & Zill, B. (2004). Routing in multi-radio, multi-hop wireless mesh networks. In Proceedings of the 10th annual international conference on mobile computing and networking (pp. 114\u2013128).","DOI":"10.1145\/1023720.1023732"},{"key":"1229_CR34","doi-asserted-by":"crossref","unstructured":"Ali, R. F., Kiani, A. K., & Pirzada, A. A. (2014). Load dependent dynamic path selection in multi-radio hybrid wireless mesh networks. In Wireless communications and networking conference (WCNC) (pp. 2020\u20132025).","DOI":"10.1109\/WCNC.2014.6952600"},{"key":"1229_CR35","doi-asserted-by":"crossref","unstructured":"Kiani, A. K., Ali, R. F., & Rashid, U. (2015). Energy-load aware routing metric for hybrid wireless mesh networks. In Vehicular technology conference (VTC Spring) (pp. 1\u20135).","DOI":"10.1109\/VTCSpring.2015.7145821"},{"issue":"8","key":"1229_CR36","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/CC.2013.6633748","volume":"10","author":"A Trivi\u00f1o","year":"2013","unstructured":"Trivi\u00f1o, A., Ariza, A., Casilari, E., & Cano, J. C. (2013). Cooperative layer-2 based routing approach for hybrid wireless mesh networks. China Communications, 10(8), 88\u201399.","journal-title":"China Communications"},{"issue":"6","key":"1229_CR37","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1016\/j.comcom.2010.12.001","volume":"34","author":"VC Borges","year":"2011","unstructured":"Borges, V. C., Curado, M., & Monteiro, E. (2011). Cross-layer routing metrics for mesh networks: Current status and research directions. Computer Communications, 34(6), 681\u2013703.","journal-title":"Computer Communications"},{"issue":"13","key":"1229_CR38","doi-asserted-by":"crossref","first-page":"1593","DOI":"10.1016\/j.comcom.2010.08.004","volume":"34","author":"J Hu","year":"2011","unstructured":"Hu, J., Min, G., & Woodward, M. E. (2011). Performance analysis of the txop burst transmission scheme in single-hop ad hoc networks with unbalanced stations. Computer Communications, 34(13), 1593\u20131603.","journal-title":"Computer Communications"},{"key":"1229_CR39","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/3-540-36385-8_17","volume":"2571","author":"N Gupta","year":"2002","unstructured":"Gupta, N., & Das, S. R. (2002). Energy-aware on-demand routing for mobile ad hoc networks. Distributed Computing, 2571, 164\u2013173.","journal-title":"Distributed Computing"},{"issue":"4","key":"1229_CR40","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1109\/TMC.2014.2331966","volume":"14","author":"XM Zhang","year":"2015","unstructured":"Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742\u2013754.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"1229_CR41","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/18.825799","volume":"46","author":"P Gupta","year":"2000","unstructured":"Gupta, P., & Kumar, P. R. (2000). The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2), 388\u2013404.","journal-title":"IEEE Transactions on Information Theory"},{"key":"1229_CR42","doi-asserted-by":"crossref","unstructured":"Mozumder, A. H., Acharjee, T., & Roy, S. (2014). Scalability performance analysis of BATMAN and HWMP protocols in wireless mesh networks using NS-3. In International conference in green computing communication and electrical engineering (ICGCCEE) (pp. 1\u20135).","DOI":"10.1109\/ICGCCEE.2014.6921389"},{"issue":"2","key":"1229_CR43","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Zeng, Y., Xiang, K., Li, D., & Vasilakos, A. V. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161\u2013173.","journal-title":"Wireless Networks"},{"issue":"1","key":"1229_CR44","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s11036-011-0316-4","volume":"17","author":"X Wang","year":"2012","unstructured":"Wang, X., Vasilakos, A. V., Chen, M., Liu, Y., & Kwon, T. T. (2012). A survey of green mobile networks: Opportunities and challenges. Mobile Networks and Applications, 17(1), 4\u201320.","journal-title":"Mobile Networks and Applications"},{"issue":"1","key":"1229_CR45","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/JSAC.2012.120111","volume":"30","author":"PB Duarte","year":"2012","unstructured":"Duarte, P. B., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach. IEEE Journal on Selected Areas in Communications, 30(1), 119\u2013127.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"1229_CR46","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1016\/j.adhoc.2011.02.004","volume":"10","author":"H Cheng","year":"2012","unstructured":"Cheng, H., Xiong, N., Vasilakos, A. V., Yang, L. T., Chen, G., & Zhuang, X. (2012). Nodes organization for channel assignment with topology preservation in multi-radio wireless mesh networks. Ad Hoc Networks, 10(5), 760\u2013773.","journal-title":"Ad Hoc Networks"},{"key":"1229_CR47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2015.02.001","volume":"52","author":"AV Vasilakos","year":"2015","unstructured":"Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1\u201310.","journal-title":"Journal of Network and Computer Applications"},{"issue":"12","key":"1229_CR48","doi-asserted-by":"crossref","first-page":"3172","DOI":"10.1109\/JPROC.2012.2208211","volume":"100","author":"A Attar","year":"2012","unstructured":"Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100(12), 3172\u20133186.","journal-title":"Proceedings of the IEEE"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-016-1229-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1229-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1229-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1229-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T17:04:34Z","timestamp":1567616674000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-016-1229-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,22]]},"references-count":48,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["1229"],"URL":"https:\/\/doi.org\/10.1007\/s11276-016-1229-8","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2016,2,22]]}}}