{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:13:24Z","timestamp":1771467204207,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T00:00:00Z","timestamp":1574294400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T00:00:00Z","timestamp":1574294400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004607","name":"Natural Science Foundation of Guangxi Province","doi-asserted-by":"publisher","award":["2016GXNSFBA380010"],"award-info":[{"award-number":["2016GXNSFBA380010"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004607","name":"Natural Science Foundation of Guangxi Province","doi-asserted-by":"publisher","award":["2017GXNSFAA198192"],"award-info":[{"award-number":["2017GXNSFAA198192"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11277-019-06708-0","type":"journal-article","created":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T12:04:07Z","timestamp":1574337847000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["ECOR: An Energy Aware Coded Opportunistic Routing for Cognitive Radio Social Internet of Things"],"prefix":"10.1007","volume":"110","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9307-6247","authenticated-orcid":false,"given":"Xiaoxiong","family":"Zhong","sequence":"first","affiliation":[]},{"given":"Li","family":"Li","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Renhao","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,21]]},"reference":[{"issue":"15","key":"6708_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks,54(15), 2787\u20132805.","journal-title":"Computer Networks"},{"issue":"16","key":"6708_CR2","doi-asserted-by":"publisher","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","volume":"56","author":"L Atzori","year":"2012","unstructured":"Atzori, L., Iera, A., Morabito, G., & Nitti, M. (2012). The social internet of things (SIoT)-when social networks meet the internet of things: Concept, architecture and network characterization. Computer Networks,56(16), 3594\u20133608.","journal-title":"Computer Networks"},{"key":"6708_CR3","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.jnca.2016.06.009","volume":"72","author":"T Qiu","year":"2016","unstructured":"Qiu, T., Lv, Y., Xia, F., Chen, N., Wan, J., & Tolba, A. (2016). ERGID: An efficient routing protocol for emergency response internet of things. Journal Network and Computer Applications,72, 104\u2013112.","journal-title":"Journal Network and Computer Applications"},{"key":"6708_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.comcom.2015.05.010","volume":"74","author":"PD Marco","year":"2016","unstructured":"Marco, P. D., Athanasiou, G., Mekikis, P.-V., & Fischione, C. (2016). MAC-aware routing metrics for the internet of things. Computer Communications,74, 77\u201386.","journal-title":"Computer Communications"},{"issue":"2","key":"6708_CR5","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/JSAC.2004.839380","volume":"23","author":"S Haykin","year":"2005","unstructured":"Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications,23(2), 201\u2013220.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"6708_CR6","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/1090191.1080108","volume":"35","author":"S Biswas","year":"2005","unstructured":"Biswas, S., & Morris, R. (2005). ExOR: Opportunistic multi-hop routing for wireless networks. Proceedings of ACM SIGCOMM,35, 133\u2013144.","journal-title":"Proceedings of ACM SIGCOMM"},{"key":"6708_CR7","unstructured":"Pan, M., Huang, R., & Fang, Y. (2008). Cost design for opportunistic multi-hop routing in cognitive radio networks. In Proceedings of IEEE MILCOM (pp. 1\u20137)."},{"key":"6708_CR8","doi-asserted-by":"crossref","unstructured":"Badarneh, O. S., & Salameh, H. B. (2011). Opportunistic routing in cognitive radio networks: Exploiting spectrum availability and rich channel diversity. In Proceedings of IEEE GLOBECOM (pp. 1\u20135).","DOI":"10.1109\/GLOCOM.2011.6134241"},{"key":"6708_CR9","doi-asserted-by":"crossref","unstructured":"Zhong, X., Qin, Y., Yang, Y., & Li, L. (2014). CROR: Coding-aware opportunistic routing in multi-channel cognitive radio networks. In Proceedings of IEEE GLOBECOM (pp. 100\u2013105).","DOI":"10.1109\/GLOCOM.2014.7036791"},{"key":"6708_CR10","doi-asserted-by":"crossref","unstructured":"Lin, S.-C., & Chen, K.-C. (2010). Spectrum aware opportunistic routing in cognitive radio networks. In Proceedings of IEEE GLOBECOM (pp. 1\u20136).","DOI":"10.1109\/GLOCOM.2010.5683924"},{"issue":"6","key":"6708_CR11","doi-asserted-by":"publisher","first-page":"2848","DOI":"10.1109\/TVT.2013.2296597","volume":"63","author":"S-C Lin","year":"2014","unstructured":"Lin, S.-C., & Chen, K.-C. (2014). Spectrum-map-empowered opportunistic routing for cognitive radio ad hoc networks. IEEE Transactions on Vehicular Technology,63(6), 2848\u20132861.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"6708_CR12","doi-asserted-by":"crossref","unstructured":"Liu, Y., Cai, L. X., Shen, X., & Mark, J. W. (2011). Exploiting heterogeneity wireless channels for opportunistic routing in dynamic spectrum access networks. In Proceedings of IEEE ICC (pp. 1\u20135).","DOI":"10.1109\/icc.2011.5962417"},{"issue":"10","key":"6708_CR13","doi-asserted-by":"publisher","first-page":"1958","DOI":"10.1109\/JSAC.2012.121111","volume":"30","author":"Y Liu","year":"2012","unstructured":"Liu, Y., Cai, L. X., & Shen, X. (2012). Spectrum-aware opportunistic routing in multi-hop cognitive radio networks. IEEE Journal on Selected Areas in Communications,30(10), 1958\u20131968.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"6708_CR14","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.compeleceng.2015.06.002","volume":"52","author":"Y Qin","year":"2016","unstructured":"Qin, Y., Zhong, X., Yang, Y., Li, L., & Ye, Y. (2016). Combined channel assignment and network coded opportunistic routing in cognitive radio networks. Computers & Electrical Engineering,52, 293\u2013306.","journal-title":"Computers & Electrical Engineering"},{"key":"6708_CR15","doi-asserted-by":"crossref","unstructured":"Zheng, C., Dutkiewicz, E., Liu, R., Vesilo, R., Fang, G., & Zhou, Z. (2011). Opportunistic routing in multi-channel cognitive radio networks. In Proceedings of IEEE ISCIT (pp. 532\u2013537).","DOI":"10.1109\/ISCIT.2011.6092165"},{"issue":"1","key":"6708_CR16","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11277-016-3447-x","volume":"91","author":"C Cui","year":"2016","unstructured":"Cui, C., Man, H., Wang, Y., & Liu, S. (2016). Optimal cooperative spectrum aware opportunistic routing in cognitive radio ad hoc networks. Springer Wireless Personal Communications,91(1), 101\u2013118.","journal-title":"Springer Wireless Personal Communications"},{"key":"6708_CR17","doi-asserted-by":"crossref","unstructured":"Tang, X., & Liu, Q. (2012). Network coding based geographical opportunistic routing for ad hoc cognitive radio networks. In Proceedings of IEEE GLOBECOM Workshops (pp. 503\u2013507).","DOI":"10.1109\/GLOCOMW.2012.6477624"},{"issue":"6","key":"6708_CR18","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1007\/s11036-014-0551-6","volume":"19","author":"SS Barve","year":"2014","unstructured":"Barve, S. S., & Kulkarni, P. (2014). Multi-agent reinforcement learning based opportunistic routing and channel assignment for mobile cognitive radio ad hoc network. Mobile Networks and Applications,19(6), 720\u2013730.","journal-title":"Mobile Networks and Applications"},{"issue":"4","key":"6708_CR19","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1007\/s10878-013-9623-y","volume":"29","author":"Z Cai","year":"2015","unstructured":"Cai, Z., Duan, Y., & Bourgeois, A. G. (2015). Delay efficient opportunistic routing in asynchronous multi-channel cognitive radio networks. Journal of Combinatorial Optimization,29(4), 815\u2013835.","journal-title":"Journal of Combinatorial Optimization"},{"key":"6708_CR20","unstructured":"Dai, Y., & Wu, J. (2015). Opportunistic routing based scheme with multi-layer relay sets in cognitive radio networks. In Proceedings of IEEE WCNC (pp.\u00a01159\u20131164)."},{"issue":"4","key":"6708_CR21","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/JIOT.2015.2478435","volume":"3","author":"SC Lin","year":"2016","unstructured":"Lin, S. C., & Chen, K.-C. (2016). Statistical qos control of network coded multipath routing in large cognitive machine-to-machine networks. IEEE Internet of Things Journal,3(4), 619\u2013627.","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"6708_CR22","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1109\/TMC.2015.2421931","volume":"15","author":"SC Lin","year":"2016","unstructured":"Lin, S. C., & Chen, K.-C. (2016). Cognitive and opportunistic relay for qos guarantees in machine-to-machine communications. IEEE Transactions on Mobile Computing,15(3), 599\u2013609.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"6708_CR23","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.comnet.2010.09.008","volume":"55","author":"K How","year":"2011","unstructured":"How, K., Ma, M., & Qin, Y. (2011). Routing and QoS provisioning in cognitive radio networks. Computer Networks,55(1), 330\u2013342.","journal-title":"Computer Networks"},{"issue":"12","key":"6708_CR24","doi-asserted-by":"publisher","first-page":"2254","DOI":"10.1109\/TPDS.2012.83","volume":"23","author":"E Bulut","year":"2012","unstructured":"Bulut, E., & Szymanski, B. K. (2012). Exploiting friendship relations for efficient routing in mobile social networks. IEEE Transactions on Parallel and Distributed Systems,23(12), 2254\u20132265.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"8","key":"6708_CR25","doi-asserted-by":"publisher","first-page":"6547","DOI":"10.1109\/TVT.2015.2476703","volume":"65","author":"L Li","year":"2016","unstructured":"Li, L., Qin, Y., & Zhong, X. (2016). A novel routing scheme for resource -constraint opportunistic netoworks: A cooperative multi-player bargaining game approach. IEEE Transactions on Vehicular Technology,65(8), 6547\u20136561.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"4","key":"6708_CR26","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., Cai, N., Li, S.-Y., & Yeung, R. W. (2000). Network information flow. IEEE Transactions on Information Theory,46(4), 1204\u20131216.","journal-title":"IEEE Transactions on Information Theory"},{"key":"6708_CR27","doi-asserted-by":"crossref","unstructured":"Wu, F., & Vaidya, N. (2012). Workload-aware opportunistic routing in multi-channel, multi-radio wireless mesh networks. In Proceedings of IEEE\u00a0SECON (pp. 344\u2013352).","DOI":"10.1109\/SECON.2012.6275796"},{"key":"6708_CR28","unstructured":"Network Simulator (ns2). (2015). http:\/\/www.isi.edu\/nsnam\/ns\/."},{"key":"6708_CR29","unstructured":"Michigan Technological University. (2015). Cognitive radio cognitive network simulator. http:\/\/stuweb.ee.mtu.edu\/ljialian\/index.htm."},{"issue":"36","key":"6708_CR30","doi-asserted-by":"publisher","first-page":"15274","DOI":"10.1073\/pnas.0900282106","volume":"106","author":"N Eagle","year":"2009","unstructured":"Eagle, N., Pentland, A., & Lazer, D. (2009). Inferring social network structure using mobile phone data. Proceedings of National Academy of Sciences of USA,106(36), 15274\u201315278.","journal-title":"Proceedings of National Academy of Sciences of USA"},{"key":"6708_CR31","doi-asserted-by":"crossref","unstructured":"Cacciapuoti, A., Calcagno, C., & Caleffi, M., et al. (2010). CAODV: Routing in mobile ad-hoc cognitive radio networks. In Proceedings of IFIP wireless days (pp. 1\u20135).","DOI":"10.1109\/WD.2010.5657754"},{"key":"6708_CR32","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1186\/1687-1499-2014-200","volume":"2014","author":"T Jing","year":"2014","unstructured":"Jing, T., Zhou, J., Liu, H., et al. (2014). SoRoute: A reliable and effective social-based routing in cognitive radio ad hoc networks. EURASIP Journal of Wireless Communications and Networking,2014, 200.","journal-title":"EURASIP Journal of Wireless Communications and Networking"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06708-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06708-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06708-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,20]],"date-time":"2020-11-20T02:52:13Z","timestamp":1605840733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06708-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,21]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["6708"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06708-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,21]]},"assertion":[{"value":"21 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}