{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:06Z","timestamp":1740148866137,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T00:00:00Z","timestamp":1476316800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["6-1508-2-616"],"award-info":[{"award-number":["6-1508-2-616"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s12083-016-0513-9","type":"journal-article","created":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T00:56:09Z","timestamp":1476320169000},"page":"726-749","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["ORACE-Net: A novel multi-hop body-to-body routing protocol for public safety networks"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0466-9863","authenticated-orcid":false,"given":"Dhafer","family":"Ben Arbia","sequence":"first","affiliation":[]},{"given":"Muhammad Mahtab","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Rabah","family":"Attia","sequence":"additional","affiliation":[]},{"given":"Elyes","family":"Ben Hamida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,13]]},"reference":[{"key":"513_CR1","unstructured":"UNISDR (2013) Global assessment report on disaster risk reduction 2013. [Online]. Available: http:\/\/www.preventionweb.net\/english\/hyogo\/gar\/2013\/en\/home\/download.html"},{"key":"513_CR2","unstructured":"Plyer A (2015) Facts for features: Katrina impact. [Online]. Available: http:\/\/www.datacenterresearch.org\/data-resources\/katrina\/facts-for-impact\/"},{"key":"513_CR3","unstructured":"Arbia DB, Alam MM, Attia R, Hamida EB (2015) Data dissemination strategies for emerging wireless body-to-body networks based internet of humans. In: 11th IEEE WiMob Conference in proceedings of the workshop on emergency networks for public protection and disaster relief (EN4PPDR 2015)"},{"key":"513_CR4","unstructured":"Hamida EB, Alam MM, Maman M, Denis B, D\u2019Errico R (2014) Wearable body-to-body networks for critical and rescue operations, the crow 2: Project. In: Procedding of the workshop on the convergence of wireless technologies for personalized healthcare in IEEE PIMRC 2014, pp 2145\u20132149"},{"key":"513_CR5","doi-asserted-by":"crossref","unstructured":"Alam MM, Ben Arbia D, Ben Hamida E (2015) Research trends in multi-standard device-to-device communication in wearable wireless networks. In: 10th CROWNCOM Conference in proceedings of the workshop on cognitive radio for 5G networks, vol 156. Springer LNICST, pp 1\u201313","DOI":"10.1007\/978-3-319-24540-9_61"},{"key":"513_CR6","unstructured":"Arbia DB, Alam MM, Attia R, Hamida EB (2015) Behavior of wireless body-to-body networks routing strategies for public protection and disaster relief. In: 11th IEEE WiMob Conference in proceedings of the workshop on advances in body-centric wireless communications and networks and their applications (BCWNets 2015)"},{"key":"513_CR7","doi-asserted-by":"crossref","unstructured":"Ramrekha T A, Politis C (2010) A hybrid adaptive routing protocol for extreme emergency ad hoc communication. In: Proceedings of 19th International conference on computer communications and networks (ICCCN)","DOI":"10.1109\/ICCCN.2010.5560057"},{"issue":"3","key":"513_CR8","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/MCOM.2010.5434384","volume":"48","author":"SM George","year":"2010","unstructured":"George SM, Zhou W, Chenji H, Won M, Lee YO, Pazarloglou A, Stoleru R, Barooah P (2010) Distressnet: A wireless ad hoc and sensor network architecture for situation management in disaster response. IEEE Commun Mag 48(3):128\u2013136","journal-title":"IEEE Commun Mag"},{"key":"513_CR9","unstructured":"Varun JPP, Menon G, Priya J (2016) Ensuring reliable communication in disaster recovery operations with reliable routing technique. Mobile Inf Syst:10"},{"key":"513_CR10","unstructured":"Group DTNR (2015) Delay tolerant network 2. [Online]. Available: https:\/\/dtnrg.org\/"},{"key":"513_CR11","unstructured":"Zongqing Lu GC, Porta TL (2016) Networking smartphones for disaster recovery. In: Proceedings of IEEE PerCom"},{"key":"513_CR12","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1145\/345910.345953","volume-title":"Proceedings of the 6th annual international conference on mobile computing and networking, ser. MobiCom \u201900","author":"B Karp","year":"2000","unstructured":"Karp B, Kung HT (2000) Gpsr: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th annual international conference on mobile computing and networking, ser. MobiCom \u201900. doi: 10.1145\/345910.345953 . ACM, New York, pp 243\u2013254"},{"key":"513_CR13","unstructured":"Perkins C, Ratliff SDJ (2013) Dynamic manet on-demand (aodvv2) routing draft-ietf-manet-dymo-26. [Online]. Available: https:\/\/datatracker.ietf.org\/doc\/draft-ietf-manet-dymo\/"},{"key":"513_CR14","unstructured":"Clausen T, Dearlove C, Jacquet P, Herberg U (2014) Rfc7181: The optimized link state routing protocol version 2 (proposed standard). [Online]. Available: http:\/\/www.rfc-editor.org\/info\/rfc7181"},{"key":"513_CR15","unstructured":"(2015) Facts and statistics on wearable technology,. [Online]. Available: http:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/"},{"key":"513_CR16","unstructured":"Rose Qingyang Hu YQE (ed) (2013) Heterogeneous cellular networks. Wiley"},{"key":"513_CR17","doi-asserted-by":"crossref","unstructured":"Tata C, Kadoch M (2014) Multipath routing algorithm for device-to-device communications for public safety over lte heterogeneous networks. In: 2014 1st International conference on information and communication technologies for disaster management (ICT-DM), pp 1\u20137","DOI":"10.1109\/ICT-DM.2014.6918583"},{"key":"513_CR18","unstructured":"Hu Y, Guo W, Wang S (2014) Emergency route selection for D2D cellular communications during an urban terrorist attack, CoRR, vol. abs\/1403.6923. [Online]. Available: 1403.6923"},{"key":"513_CR19","doi-asserted-by":"crossref","unstructured":"Ren P, Du Q, Sun L (2013) Interference-aware routing for hop-count minimization in wireless d2d networks. In: 2013 IEEE\/CIC International conference on communications in china - workshops (CIC\/ICCC), pp 65\u201370","DOI":"10.1109\/ICCChinaW.2013.6670569"},{"key":"513_CR20","unstructured":"Babun L (2015) Extended coverage for public safety and critical communications using multi-hop and d2d communications, m.sc dissertation, florida international university, usa"},{"key":"513_CR21","doi-asserted-by":"crossref","unstructured":"Laha A, Cao X, Shen W, Tian X, Cheng Y (2015) An energy efficient routing protocol for device-to-device based multihop smartphone networks. In: 2015 IEEE International conference on communications (ICC), pp 5448\u20135453","DOI":"10.1109\/ICC.2015.7249190"},{"issue":"1","key":"513_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S1570-8705(03)00043-X","volume":"2","author":"M Abolhasan","year":"2004","unstructured":"Abolhasan M, Wysocki T, Dutkiewicz E (2004) A review of routing protocols for mobile ad hoc networks. Ad Hoc Netw 2(1):1\u201322","journal-title":"Ad Hoc Netw"},{"key":"513_CR23","unstructured":"Jiazi Y, Cizeron E, Hamma S, Parrein B, Lesage P (2009) Implementation of multipath and multiple description coding in olsr. In: Proceedings of the Fourth OLSR interop\/workshop, pp 1\u20135"},{"key":"513_CR24","doi-asserted-by":"crossref","unstructured":"Clausen T, Jacquet P (2003) Optimized link state routing protocol (olsr). Tech. Rep.","DOI":"10.17487\/rfc3626"},{"key":"513_CR25","doi-asserted-by":"crossref","unstructured":"Perkins C, Royer E (1999) Ad-hoc on-demand distance vector routing. In: Proceedings of the second IEEE workshop on mobile computing systems and applications, pp 90\u2013100","DOI":"10.1109\/MCSA.1999.749281"},{"issue":"5","key":"513_CR26","doi-asserted-by":"crossref","first-page":"2565","DOI":"10.1016\/j.eswa.2013.10.004","volume":"41","author":"LE Quispe","year":"2014","unstructured":"Quispe LE, Galan LM (2014) Review: Behavior of ad hoc routing protocols, analyzed for emergency and rescue scenarios, on a real urban area. Expert Syst Appl 41(5):2565\u20132573","journal-title":"Expert Syst Appl"},{"issue":"3","key":"513_CR27","doi-asserted-by":"crossref","first-page":"1632","DOI":"10.1109\/TNET.2015.2425146","volume":"24","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, He S, Chen J (2016) Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks. IEEE\/ACM Trans Netw 24(3):1632\u20131646","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"5","key":"513_CR28","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1109\/TPDS.2010.145","volume":"22","author":"P Thulasiraman","year":"2011","unstructured":"Thulasiraman P, Chen J, Shen X (2011) Multipath routing and max-min fair qos provisioning under interference constraints in wireless multihop networks. IEEE Trans Parallel Distrib Syst 22(5):716\u2013728","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"2","key":"513_CR29","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1109\/COMST.2014.2386799","volume":"17","author":"F Mansourkiaie","year":"2015","unstructured":"Mansourkiaie F, Ahmed MH (2015) Cooperative routing in wireless networks: A comprehensive survey. IEEE Commun Surveys Tutor 17(2):604\u2013626. Secondquarter","journal-title":"IEEE Commun Surveys Tutor"},{"issue":"4","key":"513_CR30","doi-asserted-by":"crossref","first-page":"2214","DOI":"10.1109\/COMST.2015.2411335","volume":"17","author":"N Chakchouk","year":"2015","unstructured":"Chakchouk N (2015) A survey on opportunistic routing in wireless communication networks. IEEE Commun Surveys Tutor 17(4):2214\u20132241. Fourthquarter","journal-title":"IEEE Commun Surveys Tutor"},{"key":"513_CR31","volume-title":"Ad hoc networking","author":"DB Johnson","year":"2001","unstructured":"Johnson DB, Maltz DA, Broch J (2001) Ad hoc networking. Addison-Wesley Longman Publishing Co., Inc., Boston. ch. DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, pp 139\u2013172. [Online]. Available: http:\/\/dl.acm.org\/citation.cfm?id=374547.374552"},{"issue":"2","key":"513_CR32","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1007\/s11036-011-0336-0","volume":"17","author":"TA Ramrekha","year":"2012","unstructured":"Ramrekha TA, Talooki VN, Rodriguez J, Politis C (2012) Energy efficient and scalable routing protocol for extreme emergency ad hoc communications. Int J Mobile Netw Appl 17(2):312\u2013324","journal-title":"Int J Mobile Netw Appl"},{"key":"513_CR33","unstructured":"Ben Hamida E, Chelius G (2010) Investigating the impact of human activity on the performance of wireless networks: An experimental approach. In: WoWMoM 2010 conference, pp 1\u20138"},{"key":"513_CR34","first-page":"3","volume-title":"Analytical evaluation of virtual infrastructures for data dissemination in wireless sensor networks with mobile sink. In: 1st ACM workshop on sensor actor networks (SANET 2007)","author":"E BenHamida","year":"2007","unstructured":"BenHamida E, Chelius G (2007) Analytical evaluation of virtual infrastructures for data dissemination in wireless sensor networks with mobile sink. In: 1st ACM workshop on sensor actor networks (SANET 2007). [Online]. Available: https:\/\/hal.inria.fr\/inria-00384834 . ACM, Montr\u00e9al, pp 3\u201310"},{"key":"513_CR35","volume-title":"Mediterranean ad hoc networking workshop (MedHocNet\u201905)","author":"A Busson","year":"2005","unstructured":"Busson A, Mitton N, Fleury E (2005) Analysis of the multi-point relays selection in OLSR and consequences. In: Mediterranean ad hoc networking workshop (MedHocNet\u201905). ACM, France"},{"key":"513_CR36","doi-asserted-by":"crossref","unstructured":"Frikha M (2013) Ad Hoc networks: Routing, QoS and optimization. Wiley","DOI":"10.1002\/9781118557747"},{"key":"513_CR37","unstructured":"Gast M (2013) 802.11ac: A survival guide. [Online]. Available: http:\/\/chimera.labs.oreilly.com\/books\/1234000001739\/ch03.html"},{"key":"513_CR38","doi-asserted-by":"crossref","unstructured":"Perrucci G, Fitzek F, Widmer J (2011) Survey on energy consumption entities on the smartphone platform. In: 2011 IEEE 73rd vehicular technology conference (VTC Spring), pp 1\u20136","DOI":"10.1109\/VETECS.2011.5956528"},{"key":"513_CR39","unstructured":"Copyright D S (2016) Mobile devices specifications. [Online]. Available: http:\/\/www.devicespecifications.com\/en\/model-battery\/d1332bee"},{"key":"513_CR40","doi-asserted-by":"crossref","unstructured":"Aschenbruck N, Ernst R, Gerhards-Padilla E, Schwamborn M (2010) Bonnmotion: A mobility scenario generation and analysis tool. In: Proceedings of the 3rd international conference on simulation tools and techniques, pp 51:1\u201351:10","DOI":"10.4108\/ICST.SIMUTOOLS2010.8684"},{"key":"513_CR41","unstructured":"WSNET 3.0 Simulator. http:\/\/wsnet.gforge.inria.fr\/ , accessed: 2015-11-30"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0513-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-016-0513-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0513-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T10:42:35Z","timestamp":1568457755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-016-0513-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,13]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["513"],"URL":"https:\/\/doi.org\/10.1007\/s12083-016-0513-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2016,10,13]]}}}