{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:23:42Z","timestamp":1740122622213,"version":"3.37.3"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T00:00:00Z","timestamp":1592438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T00:00:00Z","timestamp":1592438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100005307","name":"Direction G\u00e9n\u00e9rale de la Recherche Scientifique et du D\u00e9veloppement Technologique","doi-asserted-by":"publisher","award":["08\/U311\/4966"],"award-info":[{"award-number":["08\/U311\/4966"]}],"id":[{"id":"10.13039\/501100005307","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11277-020-07582-x","type":"journal-article","created":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T04:31:31Z","timestamp":1592454691000},"page":"483-497","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Routing Protocol Based on Neighbor Interference Level for Mobile Wireless Networks"],"prefix":"10.1007","volume":"115","author":[{"given":"Amal","family":"Boumedjout","sequence":"first","affiliation":[]},{"given":"C\u00e9dric","family":"Gueguen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9378-3803","authenticated-orcid":false,"given":"Zoulikha","family":"Mekkakia Maaza","sequence":"additional","affiliation":[]},{"given":"Redouane","family":"Belbachir","sequence":"additional","affiliation":[]},{"given":"Bernard","family":"Cousin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,18]]},"reference":[{"key":"7582_CR1","doi-asserted-by":"publisher","unstructured":"Marina, M. K., & Das, S. R. (2001). On-demand multipath distance vector routing in Ad hoc networks. In Proceedings of the international conference for network protocols (ICNP) (pp. 14\u201323). https:\/\/doi.org\/10.1109\/icnp.2001.992756.","DOI":"10.1109\/icnp.2001.992756"},{"key":"7582_CR2","unstructured":"Moy, J. (1994). Open shortest path first. RFC 1583. https:\/\/tools.ietf.org\/html\/rfc1583."},{"key":"7582_CR3","doi-asserted-by":"crossref","unstructured":"Clausen, T., & Jacquet, P. (2003). Optimized link state routing protocol (Olsr) Technical Report RFC3626. https:\/\/tools.ietf.org\/html\/rfc3626.","DOI":"10.17487\/rfc3626"},{"key":"7582_CR4","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. Technical Report RFC3561. https:\/\/tools.ietf.org\/html\/rfc3561.","DOI":"10.17487\/rfc3561"},{"key":"7582_CR5","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1023\/A:101231941","volume":"7","author":"P Bose","year":"2001","unstructured":"Bose, P., Morin, P., Stojmenovic, I., & Urrutia, J. (2001). Routing with guaranteed delivery in ad hoc wireless networks. Wireless Networks, 7, 609\u2013616. https:\/\/doi.org\/10.1023\/A:101231941.","journal-title":"Wireless Networks"},{"key":"7582_CR6","doi-asserted-by":"publisher","unstructured":"Karp, B., & Kung, H. T. (2000) Greedy perimeter stateless routing for wireless networks. In Proceedings of the Sixth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (pp. 243\u2013254). https:\/\/doi.org\/10.1145\/345910.345953.","DOI":"10.1145\/345910.345953"},{"key":"7582_CR7","doi-asserted-by":"publisher","unstructured":"Hui, P., Chaintreau, A., Scott, J., Glass, R., Crowcroft, J., & Diot, C. (2005). Pocket switched networks and human mobility in conference environments. In SIGCOMM (pp. 244\u2013251), Philadelphia, USA: ACM. https:\/\/doi.org\/10.1145\/1080139.1080142.","DOI":"10.1145\/1080139.1080142"},{"key":"7582_CR8","unstructured":"Hamida, E. B., Chelius, G., Busson, A., & Fleury E (2008) Neighbor discovery in multi-hop wireless networks: Evaluation and dimensioning with interferences considerations. DMTCS. https:\/\/hal.inria.fr\/inria-00384147."},{"key":"7582_CR9","doi-asserted-by":"publisher","unstructured":"Heurtefeux, K., Maraninchi, F., & Valois, F. (2011). AreaCast: A cross-layer approach for a communication by area in Wireless Sensor Networks. In Proceedings of the 2011 17th IEEE International Conference on Networks (pp. 112\u2013117). https:\/\/doi.org\/10.1109\/icon.2011.6168516.","DOI":"10.1109\/icon.2011.6168516"},{"key":"7582_CR10","doi-asserted-by":"publisher","unstructured":"Liu, W., Kulin, M., Kazaz, T., Shahid, A, Moerman, I., & De Poorter, E. (2017). Wireless technology recognition based on RSSI distribution at sub-nyquist sampling rate for constrained devices. In Sensors (Basel, Switzerland) vol. 17. https:\/\/doi.org\/10.3390\/s17092081.","DOI":"10.3390\/s17092081"},{"key":"7582_CR11","doi-asserted-by":"publisher","unstructured":"Gomez, C., Boix, A., & Paradells, J. (2010). Impact of LQI-based routing metrics on the performance of a one-to-one routing protocol for IEEE 802.15.4 multihop networks. In EURASIP Journal on Wireless Communications and Networking (pp. 1\u201320). https:\/\/doi.org\/10.1155\/2010\/205407.","DOI":"10.1155\/2010\/205407"},{"key":"7582_CR12","doi-asserted-by":"crossref","unstructured":"Narten, T., Nordmark, E., Simpson, W., & Soliman, H. (2007). Neighbor Discovery for IP version 6 (IPv6), request for comments: 4861. https:\/\/tools.ietf.org\/html\/rfc4861.","DOI":"10.17487\/rfc4861"},{"issue":"5","key":"7582_CR13","doi-asserted-by":"publisher","first-page":"2339","DOI":"10.1109\/tits.2015.2423667","volume":"16","author":"J Cheng","year":"2015","unstructured":"Cheng, J., Cheng, J., Zhou, M., Liu, F., Gao, S., & Liu, C. (2015). Routing in internet of vehicles: A review. IEEE Trans Intell Transp Syst, 16(5), 2339\u20132352. https:\/\/doi.org\/10.1109\/tits.2015.2423667.","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"7582_CR14","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/978-3-642-22333-4_67","volume-title":"Future information technology communications in computer and information science","author":"J Franzolini","year":"2011","unstructured":"Franzolini, J., Guinand, F., & Olivier, D. (2011). Neighborhood Evolution in MANET experiments\u201d. In J. J. Park, L. T. Yang, & C. Lee (Eds.), Future information technology communications in computer and information science (Vol. 184, pp. 514\u2013521). Berlin: Springer. https:\/\/doi.org\/10.1007\/978-3-642-22333-4_67."},{"key":"7582_CR15","unstructured":"Chaudet, C, & Lassous, I. G. (2002). Bruit: Bandwidth reservation under interferences influence. In European Wireless (EW2002), Florence, Italy. https:\/\/hal.inria.fr\/inria-00072279."},{"issue":"1","key":"7582_CR16","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1007\/s11277-013-1534-9","volume":"77","author":"Boumedjout Amel","year":"2014","unstructured":"Amel, Boumedjout, & Zoulikha, Mekkakia Maaza. (2014). The effects of physical layer on the routingwireless protocol. Wireless Personal Communications, 77(1), 749\u2013765. https:\/\/doi.org\/10.1007\/s11277-013-1534-9.","journal-title":"Wireless Personal Communications"},{"key":"7582_CR17","unstructured":"Fall, K., & Varadhan, K. (2011). The ns manual, (formerly ns notes and documentation). https:\/\/www.isi.edu\/nsnam\/ns\/doc\/."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07582-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-07582-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07582-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,17]],"date-time":"2021-06-17T23:55:34Z","timestamp":1623974134000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-07582-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,18]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["7582"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07582-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2020,6,18]]},"assertion":[{"value":"18 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}