{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:29:00Z","timestamp":1761395340358},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,10,13]],"date-time":"2018-10-13T00:00:00Z","timestamp":1539388800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61473109"],"award-info":[{"award-number":["61473109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671193"],"award-info":[{"award-number":["61671193"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572164"],"award-info":[{"award-number":["61572164"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772472"],"award-info":[{"award-number":["61772472"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LY17F020020"],"award-info":[{"award-number":["LY17F020020"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Research and Development Plan of Zhejiang Province","award":["2018C04012"],"award-info":[{"award-number":["2018C04012"]}]},{"name":"Graduate Scientific Research Foundation of Hangzhou Dianzi University"},{"name":"Excellent Dissertation Fostering Foundation of Hangzhou Dianzi University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s12083-018-0672-y","type":"journal-article","created":{"date-parts":[[2018,10,13]],"date-time":"2018-10-13T05:24:00Z","timestamp":1539408240000},"page":"635-646","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Asynchronous neighbor discovery with unreliable link in wireless mobile networks"],"prefix":"10.1007","volume":"12","author":[{"given":"Wei","family":"Li","sequence":"first","affiliation":[]},{"given":"Jianhui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Feilong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chong","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,13]]},"reference":[{"key":"672_CR1","unstructured":"Bakht M, Trower M, Kravets RH (2012) Searchlight: won\u2019t you be my neighbor? In: Proceedings of the 18th annual international conference on mobile computing and networking. Istanbul, pp 185\u2013196"},{"issue":"7","key":"672_CR2","doi-asserted-by":"publisher","first-page":"1812","DOI":"10.1109\/TMC.2015.2471299","volume":"15","author":"L Bracciale","year":"2016","unstructured":"Bracciale L, Loreti P, Bianchi G (2016) The sleepy bird catches more worms: revisiting energy efficient neighbor discovery. IEEE Trans Mob Comput 15(7):1812\u20131825","journal-title":"IEEE Trans Mob Comput"},{"key":"672_CR3","doi-asserted-by":"crossref","unstructured":"Chen L, Li Y, Vasilakos AV (2016) Oblivious neighbor discovery for wireless devices with directional antennas. In: Proceedings of the IEEE international conference on computer communications. San Francisco, pp 1\u20139","DOI":"10.1109\/INFOCOM.2016.7524570"},{"key":"672_CR4","doi-asserted-by":"crossref","unstructured":"Chen S, Russell A, Jin R, Qin Y, Wang B, Vasudevan S (2015) Asynchronous neighbor discovery on duty-cycled mobile devices: integer and non-integer schedules. In: Proceedings of the 16th ACM international symposium on mobile Ad Hoc networking and computing. Hangzhou, pp 47\u201356","DOI":"10.1145\/2746285.2746297"},{"issue":"5","key":"672_CR5","doi-asserted-by":"publisher","first-page":"4048","DOI":"10.1109\/TIE.2016.2645138","volume":"64","author":"X Duan","year":"2017","unstructured":"Duan X, Zhao C, He S, Cheng P, Zhang J (2017) Distributed algorithms to compute walrasian equilibrium in mobile crowdsensing. IEEE Trans Ind Electron 64(5):4048\u20134057","journal-title":"IEEE Trans Ind Electron"},{"key":"672_CR6","doi-asserted-by":"crossref","unstructured":"Dutta P, Culler D (2008) Practical asynchronous neighbor discovery and rendezvous for mobile sensing applications. In: Proceedings of the 6th ACM conference on embedded network sensor systems. Raleigh, pp 71\u201384","DOI":"10.1145\/1460412.1460420"},{"key":"672_CR7","unstructured":"Hardy GH, Wright EM (1979) An introduction to the theory of numbers. Oxford University Press"},{"issue":"9","key":"672_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/JSAC.2013.SUP.0513007","volume":"31","author":"S He","year":"2013","unstructured":"He S, Li X, Chen J, Cheng P, Sun Y, Simplot-Ryl D (2013) Emd: energy-efficient p2p message dissemination in delay-tolerant wireless sensor and actor networks. IEEE J Selected Areas Commun 31(9):75\u201384","journal-title":"IEEE J Selected Areas Commun"},{"issue":"17","key":"672_CR9","doi-asserted-by":"publisher","first-page":"3296","DOI":"10.1016\/j.comnet.2008.08.023","volume":"52","author":"JR Jiang","year":"2008","unstructured":"Jiang JR (2008) Expected quorum overlap sizes of quorum systems for asynchronous power-saving in mobile ad hoc networks. Comput Netw 52(17):3296\u20133306","journal-title":"Comput Netw"},{"issue":"1\u20132","key":"672_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1023\/B:MONE.0000048553.45798.5e","volume":"10","author":"JR Jiang","year":"2005","unstructured":"Jiang JR, Tseng YC, Hsu CS, Lai TH (2005) Quorum-based asynchronous power-saving protocols for ieee 802.11 ad hoc networks. Mobile Netw Appl 10(1\u20132):169\u2013181","journal-title":"Mobile Netw Appl"},{"key":"672_CR11","doi-asserted-by":"crossref","unstructured":"Kandhalu A, Lakshmanan K, Rajkumar RR (2010) U-connect: a low-latency energy-efficient asynchronous neighbor discovery protocol. In: Proceedings of the 9th ACM\/IEEE international conference on information processing in sensor networks. Stockholm, pp 350\u2013361","DOI":"10.1145\/1791212.1791253"},{"key":"672_CR12","unstructured":"Lang S, Mao L (1998) A torus quorum protocol for distributed mutual exclusion. In: Proceedings of the 10th international conference on parallel and distributed computing and systems. Las Vegas, pp 635\u2013638"},{"issue":"3","key":"672_CR13","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/s12083-016-0520-x","volume":"10","author":"Z Li","year":"2017","unstructured":"Li Z, Zhang J, Shen X, Fan J (2017) Prediction based indoor fire escaping routing with wireless sensor network. Peer-to-Peer Network Appl 10(3):697\u2013707","journal-title":"Peer-to-Peer Network Appl"},{"key":"672_CR14","unstructured":"Luk WS, Wong TT (1997) Two new quorum based algorithms for distributed mutual exclusion. In: Proceedings of the 17th International conference on distributed computing systems. Baltimore, pp 100\u2013106"},{"issue":"2","key":"672_CR15","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1145\/214438.214445","volume":"3","author":"M Maekawa","year":"1985","unstructured":"Maekawa M (1985) A \n                    \n                      \n                    \n                    \n                      \n                        \n                          \n                            n\n                          \n                        \n                      \n                    \n                    $\\sqrt {n}$\n                   algorithm for mutual exclusion in decentralized systems. ACM Trans Comput Syst 3(2):145\u2013159","journal-title":"ACM Trans Comput Syst"},{"issue":"2","key":"672_CR16","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1006\/inco.2001.3054","volume":"170","author":"D Malkhi","year":"2001","unstructured":"Malkhi D, Reiter MK, Wool A, Wright RN (2001) Probabilistic quorum systems. Inf Comput 170 (2):184\u2013206","journal-title":"Inf Comput"},{"issue":"12","key":"672_CR17","doi-asserted-by":"publisher","first-page":"3606","DOI":"10.1109\/JSAC.2016.2611984","volume":"34","author":"R Margolies","year":"2016","unstructured":"Margolies R, Grebla G, Chen T, Rubenstein D, Zussman G (2016) Panda: neighbor discovery on a power harvesting budget. IEEE J Selected Areas Commun 34(12):3606\u20133619","journal-title":"IEEE J Selected Areas Commun"},{"key":"672_CR18","unstructured":"McGlynn MJ, Borbash SA (2001) Birthday protocols for low energy deployment and flexible neighbor discovery in ad hoc wireless networks. In: Proceedings of the 2nd ACM international symposium on mobile ad hoc networking & computing. Long Beach, pp 137\u2013145"},{"issue":"2","key":"672_CR19","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1109\/TNET.2015.2388534","volume":"24","author":"T Meng","year":"2016","unstructured":"Meng T, Wu F, Chen G (2016) Code-based neighbor discovery protocols in mobile wireless networks. IEEE\/ACM Trans Network 24(2):806\u2013819","journal-title":"IEEE\/ACM Trans Network"},{"key":"672_CR20","doi-asserted-by":"crossref","unstructured":"Qiu Y, Li S, Xu X, Li Z (2016) Talk more listen less: Energy-efficient neighbor discovery in wireless sensor networks. In: Proceedings of the IEEE international conference on computer communications. San Francisco, pp 1\u20139","DOI":"10.1109\/INFOCOM.2016.7524336"},{"issue":"4","key":"672_CR21","first-page":"20","volume":"11","author":"MR Rahman","year":"2017","unstructured":"Rahman MR, Tseng L, Nguyen S, Gupta I, Vaidya N (2017) Characterizing and adapting the consistency-latency tradeoff in distributed key-value stores. ACM Trans Autonom Adapt Syst 11(4):20","journal-title":"ACM Trans Autonom Adapt Syst"},{"issue":"1","key":"672_CR22","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TNET.2012.2189892","volume":"21","author":"S Vasudevan","year":"2013","unstructured":"Vasudevan S, Adler M, Goeckel D, Towsley D (2013) Efficient algorithms for neighbor discovery in wireless networks. IEEE\/ACM Trans Network 21(1):69\u201383","journal-title":"IEEE\/ACM Trans Network"},{"key":"672_CR23","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.comnet.2014.11.006","volume":"76","author":"X Wang","year":"2015","unstructured":"Wang X, Sun H, Deng T, Huai J (2015) On the tradeoff of availability and consistency for quorum systems in data center networks. Comput Netw 76:191\u2013206","journal-title":"Comput Netw"},{"issue":"1","key":"672_CR24","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/TVT.2014.2300181","volume":"64","author":"Q Yang","year":"2015","unstructured":"Yang Q, He S, Li J, Chen J, Sun Y (2015) Energy-efficient probabilistic area coverage in wireless sensor networks. IEEE Trans Veh Technol 64(1):367\u2013377","journal-title":"IEEE Trans Veh Technol"},{"key":"672_CR25","doi-asserted-by":"publisher","unstructured":"Zhang H, Zheng WX (2018) Denial-of-service power dispatch against linear quadratic control via a fading channel. IEEE Transactions on Automatic Control. \n                    https:\/\/doi.org\/10.1109\/TAC.2018.2789479","DOI":"10.1109\/TAC.2018.2789479"},{"key":"672_CR26","doi-asserted-by":"crossref","unstructured":"Zhang H, Qi Y, Zhou H, Zhang J, Sun J (2017a) Testing and defending methods against dos attack in state estimation. Asian Jof Control 19(4):1295\u20131305","DOI":"10.1002\/asjc.1441"},{"issue":"1","key":"672_CR27","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TCNS.2016.2614099","volume":"5","author":"H Zhang","year":"2018","unstructured":"Zhang H, Qi Y, Wu J, Fu L, He L (2018) Dos attack energy management against remote state estimation. IEEE Trans Control Netw Syst 5(1):383\u2013394","journal-title":"IEEE Trans Control Netw Syst"},{"key":"672_CR28","doi-asserted-by":"crossref","unstructured":"Zhang J, Tang S, Shen X, Dai G, Nayak A (2011) Quorum-based localized scheme for duty cycling in asynchronous sensor networks. In: Proceedings of the IEEE 8th international conference on mobile Adhoc and sensor systems. Valencia, pp 440\u2013449","DOI":"10.1109\/MASS.2011.140"},{"issue":"1","key":"672_CR29","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/TII.2015.2508745","volume":"12","author":"J Zhang","year":"2016","unstructured":"Zhang J, Li Z, Tang S (2016) Value of information aware opportunistic duty cycling in solar harvesting sensor networks. IEEE Trans Indus Inform 12(1):348\u2013360","journal-title":"IEEE Trans Indus Inform"},{"key":"672_CR30","doi-asserted-by":"crossref","unstructured":"Zhang J, Li Z, Lin X, Jiang F (2017) Composite task selection with heterogeneous crowdsourcing. In: Proceedings of the 14th Annual IEEE international conference on sensing, communication, and networking. San Diego, pp 1\u20139","DOI":"10.1109\/SAHCN.2017.7964917"},{"key":"672_CR31","doi-asserted-by":"publisher","unstructured":"Zhang Z, Zhang H, He S, Cheng P (2017c) Bilateral privacy-preserving utility maximization protocol in database-driven cognitive radio networks. IEEE Transactions on Dependable and Secure Computing. \n                    https:\/\/doi.org\/10.1109\/TDSC.2017.2781248","DOI":"10.1109\/TDSC.2017.2781248"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0672-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-018-0672-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0672-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T02:08:15Z","timestamp":1570932495000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-018-0672-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,13]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["672"],"URL":"https:\/\/doi.org\/10.1007\/s12083-018-0672-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,13]]},"assertion":[{"value":"7 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}