{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:25:43Z","timestamp":1772555143008,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,10,20]],"date-time":"2018-10-20T00:00:00Z","timestamp":1539993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s12083-018-0689-2","type":"journal-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T21:56:38Z","timestamp":1539986198000},"page":"912-923","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["FINDER: A D2D based critical communications framework for disaster management in 5G"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0774-2512","authenticated-orcid":false,"given":"Anil","family":"Thomas","sequence":"first","affiliation":[]},{"given":"Gunasekaran","family":"Raja","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,20]]},"reference":[{"issue":"1","key":"689_CR1","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/COMST.2016.2612223","volume":"19","author":"A Kumbhar","year":"2017","unstructured":"Kumbhar A, Koohifar F, Guvenc I, Mueller B (2017) A survey on legacy and emerging technologies for public safety communications. IEEE Commun Surv Tutorials 19(1):97\u2013124","journal-title":"IEEE Commun Surv Tutorials"},{"key":"689_CR2","unstructured":"3GPP TS 23.203 (2015) Policy and charging control architecture, v13.4.0"},{"key":"689_CR3","doi-asserted-by":"publisher","first-page":"1510","DOI":"10.1109\/ACCESS.2014.2379938","volume":"2","author":"G Fodor","year":"2014","unstructured":"Fodor G, Parkvall S, Sorrentino S, Wallentin P, Lu Q, Brahmi N (2014) Device-to-Device communications for national security and public safety. IEEE Access 2:1510\u20131520","journal-title":"IEEE Access"},{"issue":"4","key":"689_CR4","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1109\/COMST.2014.2319555","volume":"16","author":"A Asadi","year":"2014","unstructured":"Asadi A, Wang Q, Mancuso V (2014) A survey on device-to-device communication in cellular networks. IEEE Commun Surv Tutorials 16(4):1801\u20131819","journal-title":"IEEE Commun Surv Tutorials"},{"key":"689_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04963-2","volume-title":"Smart device to smart device communication","author":"S Mumtaz","year":"2014","unstructured":"Mumtaz S, Rodriguez J (2014) Smart device to smart device communication. Springer International Publishing, Cham. ISBN: 9783319049632"},{"key":"689_CR6","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.jnca.2016.06.004","volume":"71","author":"P Gandotra","year":"2016","unstructured":"Gandotra P, Jha RK (2016) Device-to-Device communication in cellular networks: a survey. J Netw Comput Appl 71:99\u2013117","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"689_CR7","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1111\/1468-5973.12116","volume":"24","author":"M Eriksson","year":"2016","unstructured":"Eriksson M, Olsson E-K (2016) Facebook and twitter in crisis communication: a comparative study of crisis communication professionals and citizens. J Conting Crisis Manag 24(4):198\u2013208","journal-title":"J Conting Crisis Manag"},{"issue":"4","key":"689_CR8","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MCOM.2014.6807947","volume":"52","author":"H Nishiyama","year":"2014","unstructured":"Nishiyama H, Ito M, Kato N (2014) Relay-by-smartphone: realizing multihop Device-to-Device communications. IEEE Commun Mag 52(4):56\u201365","journal-title":"IEEE Commun Mag"},{"key":"689_CR9","doi-asserted-by":"crossref","unstructured":"Hunukumbure M, Moulsley T, Oyawoye A, Vadgama S, Wilson M (2013) D2D for energy efficient communications in disaster and emergency situations. In: 21st international conference on software, telecommunications and computer networks - (SoftCOM 2013), pp 1\u20135","DOI":"10.1109\/SoftCOM.2013.6671863"},{"issue":"6","key":"689_CR10","doi-asserted-by":"publisher","first-page":"2283","DOI":"10.1007\/s11276-017-1469-2","volume":"24","author":"H Ahmad","year":"2017","unstructured":"Ahmad H, Agiwal M, Saxena N, Roy A (2017) D2D-based survival on sharing for critical communications. Wirel Netw 24(6):2283\u20132295","journal-title":"Wirel Netw"},{"issue":"5","key":"689_CR11","doi-asserted-by":"publisher","first-page":"3005","DOI":"10.1109\/TVT.2015.2450223","volume":"65","author":"A Al-Hourani","year":"2016","unstructured":"Al-Hourani A, Kandeepan S, Jamalipour A (2016) Stochastic geometry study on Device-to-Device communication as a disaster relief solution. IEEE Trans Veh Technol 65(5):3005\u20133017","journal-title":"IEEE Trans Veh Technol"},{"key":"689_CR12","doi-asserted-by":"crossref","unstructured":"Paulson A, Schwengler T (2013) A review of public safety communications, from LMR to voice over LTE (voLT E). In: 2013 IEEE 24th annual international symposium on personal, indoor, and mobile radio communications, (PIMRC), pp 3513\u20133517","DOI":"10.1109\/PIMRC.2013.6666757"},{"issue":"1","key":"689_CR13","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MNET.2016.7389836","volume":"30","author":"T Sakano","year":"2016","unstructured":"Sakano T, Kotabe S, Komukai T, Kumagai T, Shimizu Y, Takahara A, Ngo T, Fadlullah ZM, Nishiyama H, Kato N (2016) Bringing movable and deployable networks to disaster areas: development and field test of MDRU. IEEE Netw 30(1):86\u201391","journal-title":"IEEE Netw"},{"issue":"8","key":"689_CR14","doi-asserted-by":"publisher","first-page":"1712","DOI":"10.1109\/TMC.2014.2360389","volume":"14","author":"A Vergne","year":"2015","unstructured":"Vergne A, Decreusefond L, Martins P (2015) Simplicial homology for future cellular networks. IEEE Trans Mob Comput 14(8):1712\u20131725","journal-title":"IEEE Trans Mob Comput"},{"key":"689_CR15","doi-asserted-by":"crossref","unstructured":"Altay C, Bozdemir NZ, Camcioglu E (2016) Standalone eNode-B design with integrated virtual EPC in public safety networks. In: NOMS 2016 - IEEE\/IFIP network operations and management symposium, pp 731\u2013734","DOI":"10.1109\/NOMS.2016.7502887"},{"issue":"9","key":"689_CR16","doi-asserted-by":"publisher","first-page":"2709","DOI":"10.1109\/TCOMM.2010.080310.090199","volume":"58","author":"L Xiao","year":"2010","unstructured":"Xiao L, Fuja T, Costello DJ (2010) Mobile relaying: coverage extension and throughput enhancement. IEEE Trans Commun 58(9):2709\u20132717","journal-title":"IEEE Trans Commun"},{"issue":"11","key":"689_CR17","doi-asserted-by":"publisher","first-page":"3122","DOI":"10.1109\/TCOMM.2011.100411.100541","volume":"59","author":"JG Andrews","year":"2011","unstructured":"Andrews JG, Baccelli F, Ganti RK (2011) A tractable approach to coverage and rate in cellular networks. IEEE Trans Commun 59(11):3122\u20133134","journal-title":"IEEE Trans Commun"},{"issue":"3","key":"689_CR18","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/JSAC.2012.120405","volume":"30","author":"HS Dhillon","year":"2012","unstructured":"Dhillon HS, Ganti RK, Baccelli F, Andrews JG (2012) Modeling and analysis of K-Tier downlink heterogeneous cellular networks. IEEE J Sel Areas Commun 30(3):550\u2013560","journal-title":"IEEE J Sel Areas Commun"},{"issue":"8","key":"689_CR19","doi-asserted-by":"publisher","first-page":"1520","DOI":"10.1016\/j.adhoc.2011.07.006","volume":"10","author":"AS Cacciapuoti","year":"2012","unstructured":"Cacciapuoti AS, Calabrese F, Caleffi M, Lorenzo GD, Paura L (2012) Human-mobility enabled networks in urban environments: is there any (mobile wireless) small world out there? Ad Hoc Netw 10(8):1520\u20131531","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"689_CR20","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1016\/j.pmcj.2012.01.002","volume":"9","author":"AS Cacciapuoti","year":"2013","unstructured":"Cacciapuoti AS, Calabrese F, Caleffi M, Lorenzo GD, Paura L (2013) Human-mobility enabled wireless networks for emergency communications during special events. Pervasive Mob Comput 9(4):472\u2013483","journal-title":"Pervasive Mob Comput"},{"key":"689_CR21","doi-asserted-by":"crossref","unstructured":"Al-Rimawi A, Dardari D (2015) Analytical modeling of D2D communications over cellular networks. In: 2015 IEEE international conference on communications (ICC), pp 2117\u20132122","DOI":"10.1109\/ICC.2015.7248638"},{"key":"689_CR22","doi-asserted-by":"crossref","unstructured":"Babun L, Yurekli AI, Guvenc I (2015) Multi-hop and D2D communications for extending coverage in public safety scenarios. In: 2015 IEEE 40th local computer networks conference workshops (LCN Workshops), pp 912\u2013919","DOI":"10.1109\/LCNW.2015.7365946"},{"key":"689_CR23","doi-asserted-by":"crossref","unstructured":"Ali K, Nguyen HX, Shah P, Vien Q-T, Ever E (2017) D2D multi-hop relaying services towards disaster communication system. In: 2017 24th international conference on telecommunications (ICT), pp 1\u20135","DOI":"10.1109\/ICT.2017.7998287"},{"issue":"2","key":"689_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1005-8885(15)60632-X","volume":"22","author":"Z Jingyi","year":"2015","unstructured":"Jingyi Z, Xi L, Quansheng X (2015) Multi-hop routing for energy-efficiency enhancement in relay-assisted Device-to-Device communication. J China Univ Posts Telecommun 22(2):1\u20136","journal-title":"J China Univ Posts Telecommun"},{"key":"689_CR25","doi-asserted-by":"publisher","unstructured":"Shaikh FS, Wismuller R (2018) Routing in multi-hop cellular Device-to-Device (D2D) networks: a survey. IEEE Commun Surv Tutorials. \n                    https:\/\/doi.org\/10.1109\/COMST.2018.2848108","DOI":"10.1109\/COMST.2018.2848108"},{"issue":"5","key":"689_CR26","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.2014.6815897","volume":"52","author":"MN Tehrani","year":"2014","unstructured":"Tehrani MN, Uysal M, Yanikomeroglu H (2014) Device-to-Device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Commun Mag 52(5):86\u201392","journal-title":"IEEE Commun Mag"},{"key":"689_CR27","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.jnca.2014.07.020","volume":"45","author":"KLA Yau","year":"2014","unstructured":"Yau KLA, Ramli N, Hashim W, Mohamad H (2014) Clustering algorithms for cognitive radio networks: a survey. J Netw Comput Appl 45:79\u201395","journal-title":"J Netw Comput Appl"},{"key":"689_CR28","doi-asserted-by":"publisher","first-page":"1649","DOI":"10.1109\/ACCESS.2015.2479855","volume":"3","author":"M Usman","year":"2015","unstructured":"Usman M, Gebremariam AA, Raza U, Granelli F (2015) A software-defined device-to-device communication architecture for public safety applications in 5G networks. IEEE Access 3:1649\u20131654","journal-title":"IEEE Access"},{"issue":"4","key":"689_CR29","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1007\/s11036-017-0838-5","volume":"22","author":"S Anbalagan","year":"2017","unstructured":"Anbalagan S, Kumar D, Ghosal D, Raja G, Muthuvalliammai V (2017) SDN-assisted learning approach for data offloading in 5G HetNets. Mobile Netw Appl 22(4):771\u2013782","journal-title":"Mobile Netw Appl"},{"issue":"12","key":"689_CR30","doi-asserted-by":"publisher","first-page":"6993","DOI":"10.1109\/TWC.2015.2463280","volume":"14","author":"D Feng","year":"2015","unstructured":"Feng D, Yu G, Xiong C, Yuan-Wu Y, Li GY, Feng G, Li S (2015) Mode switching for energy-efficient Device-to-Device communications in cellular networks. IEEE Trans Wirel Commun 14(12):6993\u20137003","journal-title":"IEEE Trans Wirel Commun"},{"issue":"8","key":"689_CR31","doi-asserted-by":"publisher","first-page":"2246","DOI":"10.1109\/TMC.2016.2621041","volume":"16","author":"A Asadi","year":"2017","unstructured":"Asadi A, Mancuso V (2017) Network-assisted outband D2D-clustering in 5G cellular networks: theory and practice. IEEE Trans Mobile Comput 16(8):2246\u20132259","journal-title":"IEEE Trans Mobile Comput"},{"issue":"8","key":"689_CR32","doi-asserted-by":"publisher","first-page":"2637","DOI":"10.1007\/s11276-015-1061-6","volume":"22","author":"A Mohajerani","year":"2015","unstructured":"Mohajerani A, Gharavian D (2015) An ant colony optimization based routing algorithm for extending network lifetime in wireless sensor networks. Wirel Netw 22(8):2637\u20132647","journal-title":"Wirel Netw"},{"key":"689_CR33","doi-asserted-by":"publisher","first-page":"24139","DOI":"10.1109\/ACCESS.2017.2762472","volume":"5","author":"H Zhang","year":"2017","unstructured":"Zhang H, Wang X, Memarmoshrefi P, Hogrefe D (2017) A survey of ant colony optimization based routing protocols for mobile ad hoc networks. IEEE Access 5:24139\u201324161","journal-title":"IEEE Access"},{"key":"689_CR34","doi-asserted-by":"crossref","unstructured":"Bista BB (2016) Improving energy consumption of epidemic routing in delay tolerant networks. In: 10th international conference on innovative mobile and internet services in ubiquitous computing (IMIS), pp 278\u2013283","DOI":"10.1109\/IMIS.2016.74"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0689-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-018-0689-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-018-0689-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T19:31:55Z","timestamp":1571513515000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-018-0689-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,20]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["689"],"URL":"https:\/\/doi.org\/10.1007\/s12083-018-0689-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,20]]},"assertion":[{"value":"8 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}