{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:43:54Z","timestamp":1740123834925,"version":"3.37.3"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,3,30]],"date-time":"2018-03-30T00:00:00Z","timestamp":1522368000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11276-018-1721-4","type":"journal-article","created":{"date-parts":[[2018,3,30]],"date-time":"2018-03-30T05:13:40Z","timestamp":1522386820000},"page":"3275-3296","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["STEEP: speed and time-based energy efficient neighbor discovery in opportunistic networks"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9783-3409","authenticated-orcid":false,"given":"Abhishek","family":"Thakur","sequence":"first","affiliation":[]},{"given":"R.","family":"Sathiyanarayanan","sequence":"additional","affiliation":[]},{"given":"Chittaranjan","family":"Hota","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,30]]},"reference":[{"key":"1721_CR1","doi-asserted-by":"crossref","unstructured":"Fall, K. (2003). A delay-tolerant network architecture for challenged internets. In Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications. ACM, 2003.","DOI":"10.1145\/863955.863960"},{"issue":"2","key":"1721_CR2","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/SURV.2012.042512.00053","volume":"15","author":"Y Cao","year":"2013","unstructured":"Cao, Y., & Sun, Z. (2013). Routing in delay\/disruption tolerant networks: A taxonomy, survey and challenges. IEEE Communications Surveys & Tutorials,\n                           15(2), 654\u2013677.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"9","key":"1721_CR3","doi-asserted-by":"publisher","first-page":"1936","DOI":"10.1109\/JSAC.2017.2720898","volume":"35","author":"H Zhang","year":"2017","unstructured":"Zhang, H., et al. (2017). Energy efficient user association and power allocation in millimeter-wave-based ultra dense networks with energy harvesting base stations. IEEE Journal on Selected Areas in Communications,\n                           35(9), 1936\u20131947.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"1721_CR4","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1109\/ACCESS.2015.2457031","volume":"3","author":"R Pozza","year":"2015","unstructured":"Pozza, R., et al. (2015). Neighbor discovery for opportunistic networking in internet of things scenarios: A survey. IEEE Access,\n                           3, 1101\u20131131.","journal-title":"IEEE Access"},{"issue":"9","key":"1721_CR5","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1109\/TMC.2010.229","volume":"10","author":"BJ Choi","year":"2011","unstructured":"Choi, B. J., & Shen, X. (2011). Adaptive asynchronous sleep scheduling protocols for delay tolerant networks. IEEE Transactions on Mobile Computing,\n                           10(9), 1283\u20131296.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1721_CR6","doi-asserted-by":"crossref","unstructured":"Shih, E., Bahl, P., & Sinclair, M. J. (2002). Wake on wireless: An event driven energy saving strategy for battery operated devices. In Proceedings of the 8th annual international conference on Mobile computing and networking. ACM.","DOI":"10.1145\/570645.570666"},{"issue":"5","key":"1721_CR7","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1109\/TNET.2008.2008990","volume":"17","author":"W Wang","year":"2009","unstructured":"Wang, W., Motani, M., & Srinivasan, V. (2009). Opportunistic energy-efficient contact probing in delay-tolerant applications. IEEE\/ACM Transactions on Networking (TON),\n                           17(5), 1592\u20131605.","journal-title":"IEEE\/ACM Transactions on Networking (TON)"},{"key":"1721_CR8","unstructured":"Orlinski, M., & Filer, N. (2012). Movement speed based inter-probe times for neighbor discovery in mobile ad-hoc networks. In International conference on ad hoc networks. Berlin: Springer."},{"key":"1721_CR9","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.adhoc.2014.07.024","volume":"25","author":"M Orlinski","year":"2015","unstructured":"Orlinski, M., & Filer, N. (2015). Neighbor discovery in opportunistic networks. Ad Hoc Networks,\n                           25, 383\u2013392.","journal-title":"Ad Hoc Networks"},{"issue":"4","key":"1721_CR10","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1109\/TMC.2014.2333749","volume":"14","author":"B Han","year":"2015","unstructured":"Han, B., Li, J., & Srinivasan, A. (2015). On the energy efficiency of device discovery in mobile opportunistic networks: A systematic approach. IEEE Transactions on Mobile Computing,\n                           14(4), 786\u2013799.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1721_CR11","unstructured":"Izumikawa, H., et al. Energy-efficient adaptive interface activation for delay\/disruption tolerant networks. In 2010 The 12th international conference on advanced communication technology (ICACT) (Vol. 1). IEEE, 2010."},{"key":"1721_CR12","doi-asserted-by":"crossref","unstructured":"Feng, Y., et al. (2015). A sleep scheduling mechanism based on power law distribution for mobile delay tolerate networks. In 2015 International conference on cyber-enabled distributed computing and knowledge discovery (CyberC). IEEE, 2015.","DOI":"10.1109\/CyberC.2015.102"},{"key":"1721_CR13","doi-asserted-by":"crossref","unstructured":"Feeney, L. M., & Nilsson, M. (2001). Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In INFOCOM 2001. Twentieth annual joint conference of the IEEE computer and communications societies. Proceedings. IEEE (Vol. 3). IEEE, 2001.","DOI":"10.1109\/INFCOM.2001.916651"},{"issue":"2","key":"1721_CR14","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1109\/TWC.2016.2628821","volume":"16","author":"H Zhang","year":"2017","unstructured":"Zhang, H., et al. (2017). Sensing time optimization and power control for energy efficient cognitive small cell with imperfect hybrid spectrum sensing. IEEE Transactions on Wireless Communications,\n                           16(2), 730\u2013743.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"1721_CR15","unstructured":"Kamath, S., Lindh, J. (2012). Measuring bluetooth low energy power consumption. Available: \n                    http:\/\/www.ti.com\/lit\/an\/swra347a\/swra347a.pdf\n                    \n                  . Accessed February 4, 2018."},{"key":"1721_CR16","unstructured":"Ti.com. (2015). CC3200 power management optimizations and measurements. Available: \n                    http:\/\/processors.wiki.ti.com\/index.php\/CC3200_Power_Management_Optimizations_and_Measurements\n                    \n                  . Accessed February 4, 2018."},{"issue":"1","key":"1721_CR17","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/JCN.2015.000007","volume":"17","author":"D Yang","year":"2015","unstructured":"Yang, D., et al. (2015). OPEED: Optimal energy-efficient neighbor discovery scheme in opportunistic networks. Journal of Communications and Networks,\n                           17(1), 34\u201339.","journal-title":"Journal of Communications and Networks"},{"key":"1721_CR18","doi-asserted-by":"crossref","unstructured":"Ker\u00e4nen, A., Ott, J., & K\u00e4rkk\u00e4inen, T. (2009). The ONE simulator for DTN protocol evaluation.In Proceedings of the 2nd international conference on simulation tools and techniques. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"1721_CR19","doi-asserted-by":"crossref","unstructured":"Ekman, F., et al. (2008). Working day movement model. In Proceedings of the 1st ACM SIGMOBILE workshop on Mobility models. ACM.","DOI":"10.1145\/1374688.1374695"},{"key":"1721_CR20","doi-asserted-by":"publisher","unstructured":"Piorkowski, M., Sarafijanovic\u2013Djukic, N., Grossglauser, M. (2009). CRAWDAD dataset epfl\/mobility (v. 2009-02-24), downloaded from \n                    http:\/\/crawdad.org\/epfl\/mobility\/20090224\n                    \n                  , \n                    https:\/\/doi.org\/10.15783\/C7J010\n                    \n                  .","DOI":"10.15783\/C7J010"},{"key":"1721_CR21","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.adhoc.2014.07.001","volume":"25","author":"W Moreira","year":"2015","unstructured":"Moreira, W., & Mendes, P. (2015). Impact of human behavior on social opportunistic forwarding. Ad Hoc Networks,\n                           25, 293\u2013302.","journal-title":"Ad Hoc Networks"},{"issue":"7","key":"1721_CR22","doi-asserted-by":"publisher","first-page":"1864","DOI":"10.1109\/TPDS.2013.240","volume":"25","author":"L Cheng","year":"2014","unstructured":"Cheng, L., et al. (2014). QoS aware geographic opportunistic routing in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems,\n                           25(7), 1864\u20131875.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1721_CR23","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al. (2015). Performance and energy consumption analysis of a delay-tolerant network for censorship-resistant communication. In Proceedings of the 16th ACM international symposium on mobile ad hoc networking and computing. ACM.","DOI":"10.1145\/2746285.2746320"},{"key":"1721_CR24","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2005). Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking. ACM.","DOI":"10.1145\/1080139.1080143"},{"key":"1721_CR25","doi-asserted-by":"crossref","unstructured":"Grossglauser, M., & Tse, D. (2001). Mobility increases the capacity of ad-hoc wireless networks. In INFOCOM 2001. Twentieth annual joint conference of the IEEE computer and communications societies. Proceedings. IEEE (Vol. 3).","DOI":"10.1109\/INFCOM.2001.916631"},{"key":"1721_CR26","unstructured":"Vahdat, A., & Becker, D. (2000). Epidemic routing for partially-connected adhoc networks. Duke University Technical Report Cs-2000-06, Tech.Rep."},{"issue":"2","key":"1721_CR27","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s11276-014-0790-2","volume":"21","author":"S Batabyal","year":"2015","unstructured":"Batabyal, S., & Bhaumik, P. (2015). Analysing social behaviour and message dissemination in human based delay tolerant network. Wireless Networks,\n                           21(2), 513\u2013529.","journal-title":"Wireless Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-018-1721-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-018-1721-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-018-1721-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,10]],"date-time":"2019-06-10T09:16:58Z","timestamp":1560158218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-018-1721-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,30]]},"references-count":27,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["1721"],"URL":"https:\/\/doi.org\/10.1007\/s11276-018-1721-4","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2018,3,30]]},"assertion":[{"value":"30 March 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}