{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:30:02Z","timestamp":1761611402365},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T00:00:00Z","timestamp":1475193600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11277-016-3733-7","type":"journal-article","created":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T07:19:01Z","timestamp":1475219941000},"page":"5145-5166","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Hybrid MANET\u2013DTN and a New Algorithm for Relay Nodes Selection"],"prefix":"10.1007","volume":"96","author":[{"given":"Jan","family":"Papaj","sequence":"first","affiliation":[]},{"given":"Lubomir","family":"Dobos","sequence":"additional","affiliation":[]},{"given":"Anton","family":"Cizmar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,30]]},"reference":[{"key":"3733_CR1","unstructured":"Cizmar, A., Dobos, L., & Papaj, J. (2012). Security and QoS integration model for MANETs. Computing and Informatics, 31(5), 1025\u20131044. ISSN 1335-9150."},{"key":"3733_CR2","doi-asserted-by":"publisher","unstructured":"Bhatt, U. R., Nema, N., & Upadhyay, R. (2014). Enhanced DSR an efficient routing protocol for MANET. Issues and challenges in intelligent computing techniques (ICICT) (pp. 215\u2013219). doi:\n                        10.1109\/ICICICT.2014.6781282\n                        \n                    .","DOI":"10.1109\/ICICICT.2014.6781282"},{"issue":"8","key":"3733_CR3","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1109\/TMC.2007.1016","volume":"6","author":"EPC Jones","year":"2007","unstructured":"Jones, E. P. C., Li, L., Schmidtke, J. K., & Ward, P. A. S. (2007). Practical routing in delay-tolerant networks. IEEE Mobile Computing, 6(8), 943\u2013959.","journal-title":"IEEE Mobile Computing"},{"key":"3733_CR4","doi-asserted-by":"crossref","unstructured":"Brida, P., Machaj, J., & Benikovsky, J. (2014). A modular localization system as a positioning service for road transport. International Journal of Antennas and Propagation, Sensors, 14(11), 20274\u201320296. ISSN 1424-8220.","DOI":"10.3390\/s141120274"},{"key":"3733_CR5","unstructured":"Papaj, J., Dobos, L., & Cizmar, A. (2012). Routing strategies in opportunistic networks. Journal of Electrical and Electronics Engineering, 5(1), 167\u2013172. ISSN 1844-6035."},{"key":"3733_CR6","doi-asserted-by":"publisher","unstructured":"Kurth, J. P., Zubow, A., & Redlich, J. P. (2008). Cooperative opportunistic routing using transmit diversity in wireless mesh networks. In INFOCOM 2008, The 27th Conference on Computer Communications, IEEE (2008) (pp. 1310\u20131318). doi:\n                        10.1109\/INFOCOM.2007.188\n                        \n                    .","DOI":"10.1109\/INFOCOM.2007.188"},{"key":"3733_CR7","doi-asserted-by":"publisher","unstructured":"Whitbeck, J., & Conan, V. (2009). HYMAD hybrid DTN-MANET routing for dense and highly dynamic wireless networks. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops (WoWMoM 2009) (pp. 1\u20137). doi:\n                        10.1109\/WOWMOM.2009.5282448\n                        \n                    .","DOI":"10.1109\/WOWMOM.2009.5282448"},{"key":"3733_CR8","doi-asserted-by":"publisher","unstructured":"Raffelsberger, C., & Hellwagner, H. (2013). A hybrid MANET-DTN routing scheme for emergency response scenarios. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM '13)  (pp. 505\u2013510). doi:\n                        10.1109\/PerComW.2013.6529549\n                        \n                    .","DOI":"10.1109\/PerComW.2013.6529549"},{"key":"3733_CR9","doi-asserted-by":"crossref","unstructured":"Ni, X., Lan, K., & Malaney, R. (2008). On the performance of expected transmission count (ETX) for wireless mesh networks. In Proceedings of the 3rd international conference on performance evaluation methodologies and tools, Belgium.","DOI":"10.4108\/ICST.VALUETOOLS2008.4588"},{"key":"3733_CR10","doi-asserted-by":"publisher","unstructured":"Fang, X., Yang, D., Gundecha, P., & Xue, G. (2010). Multi-constrained anypath routing in wireless mesh networks. In 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (pp. 1\u20139). doi:\n                        10.1109\/SECON.2010.5508266\n                        \n                    .","DOI":"10.1109\/SECON.2010.5508266"},{"key":"3733_CR11","unstructured":"Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey, communications surveys and tutorials. IEEE, 14(2), 279\u2013298. ISSN 1553-877X."},{"key":"3733_CR12","doi-asserted-by":"publisher","unstructured":"Li, Y., Chen, W., & Zhang, Z. L. (2009). Optimal forwarder list selection in opportunistic routing. In IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, MASS '09 (pp. 670\u2013675). doi:\n                        10.1109\/MOBHOC.2009.5336939\n                        \n                    .","DOI":"10.1109\/MOBHOC.2009.5336939"},{"issue":"01","key":"3733_CR13","doi-asserted-by":"crossref","first-page":"4","DOI":"10.4304\/jnw.10.01.4-14","volume":"10","author":"F Rango De","year":"2015","unstructured":"De Rango, F., Amelio, S., & Fazio, P. (2015). Epidemic strategies in delay tolerant networks from an energetic point of view: Main issues and performance evaluation. Journal of Networks, 10(01), 4\u201314.","journal-title":"Journal of Networks"},{"issue":"9","key":"3733_CR14","doi-asserted-by":"crossref","first-page":"1623","DOI":"10.1109\/LCOMM.2014.2346488","volume":"18","author":"SLF Maia","year":"2014","unstructured":"Maia, S. L. F., Silva, E. R., & Guardieiro, P. R. (2014). A new optimization strategy proposal for multi-copy forwarding in energy constrained DTNs. IEEE Communications Letters, 18(9), 1623\u20131626.","journal-title":"IEEE Communications Letters"},{"key":"3733_CR15","doi-asserted-by":"publisher","unstructured":"Thorat, M., Sandeep, A., & Kulkarni, P. J. (2014). Design issues in trust based routing for MANET.\u00a0 In 5th International Conference on Computing Communication and Networking Technologies, ICCCNT 2014 (pp. 1\u20137). doi:\n                        10.1109\/ICCCNT.2014.6963101\n                        \n                    .","DOI":"10.1109\/ICCCNT.2014.6963101"},{"key":"3733_CR16","doi-asserted-by":"crossref","unstructured":"Xia, H., Jia, Z., Li, X., Ju, L., & Sha, E. (2013). Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Networks, 11(7), 2096\u20132114. ISSN 1570-8705.","DOI":"10.1016\/j.adhoc.2012.02.009"},{"key":"3733_CR17","doi-asserted-by":"publisher","unstructured":"Trifunovic, S., Legendre, F., & Anastasiades, C. (2010). Social trust in opportunistic networks.\u00a0 In INFOCOM IEEE Conference on Computer Communications Workshops (pp. 1\u20136). doi:\n                        10.1109\/INFCOMW.2010.5466696\n                        \n                    .","DOI":"10.1109\/INFCOMW.2010.5466696"},{"key":"3733_CR18","unstructured":"Guanghao, W., & Yue, W. (2014). BIBRM: A Bayesian inference based road message trust model in vehicular ad hoc networks. In Trust, security and privacy in computing and communications (TrustCom) (pp. 481\u2013486). IEEE."},{"key":"3733_CR19","unstructured":"Zhexiong, W., Tang, H., Yu, F. R., & Mason, P. (2014). Trust establishment based on Bayesian networks for threat mitigation in mobile ad hoc networks. In Military communications conference (MILCOM) (pp. 171\u2013177). IEEE."},{"key":"3733_CR20","first-page":"93","volume":"1","author":"JS Baras","year":"2004","unstructured":"Baras, J. S., & Tao, J. (2004). Cooperative games, phase transitions on graphs and distributed trust in MANET. CDC, 1, 93\u201398.","journal-title":"CDC"},{"issue":"4","key":"3733_CR21","doi-asserted-by":"crossref","first-page":"1846","DOI":"10.1109\/TVT.2008.2005415","volume":"58","author":"Ch Ben-Jy","year":"2009","unstructured":"Ben-Jy, Ch., & Szu-Liang, K. (2009). Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs. IEEE Vehicular Technology, 58(4), 1846\u20131863.","journal-title":"IEEE Vehicular Technology"},{"key":"3733_CR22","doi-asserted-by":"publisher","unstructured":"Estahbanati, M. M., Rasti, M., & Hamami, S. M. S. (2014). A mobile ad hoc network routing based on energy and Markov chain trust. In Telecommunications (IST), 2014 7th International Symposium on (pp. 596\u2013601). doi:\n                        10.1109\/ISTEL.2014.7000775\n                        \n                    .","DOI":"10.1109\/ISTEL.2014.7000775"},{"issue":"4","key":"3733_CR23","doi-asserted-by":"crossref","first-page":"240","DOI":"10.4304\/jnw.10.4.240-251","volume":"10","author":"A Lupia","year":"2015","unstructured":"Lupia, A., & De Rango, F. (2015). Evaluation of the energy consumption introduced by a trust management scheme on mobile ad-hoc networks. Journal of Networks, 10(4), 240\u2013251.","journal-title":"Journal of Networks"},{"key":"3733_CR24","volume-title":"Trust-based routing mechanism in MANET: Design and implementation","author":"T Eissa","year":"2011","unstructured":"Eissa, T., Razak, A., Khokhar, R. S., & Samian, N. (2011). Trust-based routing mechanism in MANET: Design and implementation. Berlin: Springer."},{"key":"3733_CR25","doi-asserted-by":"publisher","unstructured":"Rashidi, R., Jamali, M. A. J., Salmasi, A., & Tati, R. (2009). Trust routing protocol based on congestion control in MANET. In International Conference on Application of Information and Communication Technologies (pp. 1\u201350). doi:\n                        10.1109\/ICAICT.2009.5372623\n                        \n                    .","DOI":"10.1109\/ICAICT.2009.5372623"},{"key":"3733_CR26","doi-asserted-by":"publisher","unstructured":"Xia, H., Yu, J., Zhang, Z.-Y., Cheng, X. G., Pan, Z. K. (2014). Trust-enhanced multicast routing protocol based on node's behavior assessment for MANETs. In Trust, security and privacy in computing and communications (TrustCom) (pp. 473\u2013480). doi:\n                        10.1109\/TrustCom.2014.60\n                        \n                    .","DOI":"10.1109\/TrustCom.2014.60"},{"key":"3733_CR27","doi-asserted-by":"publisher","unstructured":"Azer, M. A., El-Kassas, S. M., Hassan, A. W. F., & El-Soudani, M. (2008). A survey on trust and reputation schemes in ad hoc networks. In ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings (pp. 881\u2013886). doi:\n                        10.1109\/ARES.2008.180\n                        \n                    .","DOI":"10.1109\/ARES.2008.180"},{"key":"3733_CR28","volume-title":"Network security: A decision and game theoretic approach","author":"T Alpcan","year":"2010","unstructured":"Alpcan, T., & Basar, T. (2010). Network security: A decision and game theoretic approach. Cambridge: Cambridge University Press."},{"issue":"1","key":"3733_CR29","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1109\/SURV.2012.062612.00056","volume":"15","author":"X Liang","year":"2013","unstructured":"Liang, X., & Xiao, Y. (2013). Game theory for network security. IEEE Communications Surveys & Tutorials, 15(1), 472\u2013486.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"3733_CR30","doi-asserted-by":"publisher","unstructured":"Santosh, N., Saranyan, R., Senthil, K. P., & Vetriselvi, V. (2008). Cluster based co-operative game theory approach for intrusion detection in mobile ad-hoc grid. In Proceedings of the 2008 16th International Conference on Advanced Computing and Communications, ADCOM 2008 (pp. 273\u2013278). doi:\n                        10.1109\/ADCOM.2008.4760460\n                        \n                    .","DOI":"10.1109\/ADCOM.2008.4760460"},{"key":"3733_CR31","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/TSMCB.2009.2035929","volume":"40","author":"F Li","year":"2010","unstructured":"Li, F., Yang, Y., & Wu, J. (2010). Attack and flee: Game-theory-based analysis on interactions among nodes in MANETs. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 40, 612\u2013622.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"3733_CR32","unstructured":"OPNET Modeler Simulator. \n                        http:\/\/www.opnet.com\n                        \n                    ."},{"key":"3733_CR33","doi-asserted-by":"crossref","unstructured":"Sok, P., Tan, S., & Kim, K. (2013). PRoPHET routing protocol based on neighbor node distance using a community mobility model in delay tolerant networks. High performance computing and communications (pp. 1233\u20131240).","DOI":"10.1109\/HPCC.and.EUC.2013.175"},{"key":"3733_CR34","unstructured":"Scott, K., & Burleigh, S. (2007). Bundle protocol specification, RFC5050. \n                        https:\/\/tools.ietf.org\/html\/rfc5050\n                        \n                    ."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3733-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3733-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3733-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T17:46:59Z","timestamp":1506361619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3733-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,30]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["3733"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3733-7","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9,30]]}}}