{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:05:44Z","timestamp":1772064344828,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,5,14]],"date-time":"2018-05-14T00:00:00Z","timestamp":1526256000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s12652-018-0808-1","type":"journal-article","created":{"date-parts":[[2018,5,14]],"date-time":"2018-05-14T05:57:01Z","timestamp":1526277421000},"page":"4243-4260","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["PCSM: an efficient multihop proximity aware clustering scheme for mobile peer-to-peer systems"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7548-313X","authenticated-orcid":false,"given":"Moufida","family":"Rahmani","sequence":"first","affiliation":[]},{"given":"Mahfoud","family":"Bencha\u00efba","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,14]]},"reference":[{"key":"808_CR1","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.comnet.2014.02.006","volume":"64","author":"S Abid","year":"2014","unstructured":"Abid S, Othman M, Shah N (2014) 3D P2P overlay over MANETs. Comput Netw 64:89\u2013111. \n                    https:\/\/doi.org\/10.1016\/j.comnet.2014.02.006","journal-title":"Comput Netw"},{"key":"808_CR2","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/s12083-016-0503-y","volume":"11","author":"N Amirazodi","year":"2018","unstructured":"Amirazodi N, Saghiri AM, Meybodi M (2018) An adaptive algorithm for super-peer selection considering peer\u2019s capacity in mobile peer-to-peer networks based on learning automata. Peer-to-Peer Netw Appl 11:74\u201389. \n                    https:\/\/doi.org\/10.1007\/s12083-016-0503-y","journal-title":"Peer-to-Peer Netw Appl"},{"key":"808_CR3","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1016\/j.procs.2013.06.049","volume":"19","author":"Khalid Elgazzar","year":"2013","unstructured":"Elgazzar K, Ibrahim W, Oteafy S, Hassanein HS (2013) RobP2P: a robust architecture for resource sharing in mobile peer-to-peer networks. In: Proc of the 4th Int Conf on ambient systems, networks and technologies, Elsevier, Halifax Nova Scotia, Canada, pp 356\u2013363. \n                    https:\/\/doi.org\/10.1016\/j.procs.2013.06.049","journal-title":"Procedia Computer Science"},{"key":"808_CR4","doi-asserted-by":"publisher","unstructured":"Han JS, Lee KJ, Song JW, Yang SB (2008a) Mobile peer-to-peer systems using super peers for mobile environments. In: Proc of 2008 Int Conf on information networking, IEEE, Busan, South Korea, pp 1\u20134. \n                    https:\/\/doi.org\/10.1109\/ICOIN.2008.4472831","DOI":"10.1109\/ICOIN.2008.4472831"},{"key":"808_CR5","doi-asserted-by":"publisher","unstructured":"Han JS, Song JW, Kim TH, Yang SB (2008b) Double-layered mobile p2p systems using energy-efficient routing schemes. In: Proc of the telecommunication networks and applications Conf, IEEE, Adelaide, SA, Australia, pp 122\u2013127. \n                    https:\/\/doi.org\/10.1109\/ATNAC.2008.4783308","DOI":"10.1109\/ATNAC.2008.4783308"},{"key":"808_CR6","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1016\/j.comcom.2009.04.005","volume":"32","author":"DN Hora da","year":"2009","unstructured":"da Hora DN, Macedo DF, Oliveira LB, Siqueira IG, Loureiro AA, Nogueira JM, Pujolle G (2009) Enhancing peer-to-peer content discovery techniques over mobile ad hoc networks. Comput Commun 32:1445\u20131459. \n                    https:\/\/doi.org\/10.1016\/j.comcom.2009.04.005","journal-title":"Comput Commun"},{"key":"808_CR7","doi-asserted-by":"publisher","first-page":"1990","DOI":"10.1016\/j.jnca.2012.07.022","volume":"35","author":"CL Hu","year":"2012","unstructured":"Hu CL, Kuo TH (2012) A hierarchical overlay with cluster-based reputation tree for dynamic peer-to-peer systems. Netw Comput Appl 35:1990\u20132002. \n                    https:\/\/doi.org\/10.1016\/j.jnca.2012.07.022","journal-title":"Netw Comput Appl"},{"key":"808_CR8","unstructured":"Jiang M, Li J, Tay YC (1998) Cluster based routing protocol (CBRP) Functional specification. Tech. rep., \n                    https:\/\/www.ietf.org\/proceedings\/43\/I-D\/draft-ietf-manet-cbrp-spec-00.txt"},{"key":"808_CR9","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/978-3-642-27207-3_51","volume":"30","author":"JH Kim","year":"2011","unstructured":"Kim JH, Song JW, Kim TH, Yang SB (2011) An enhanced double-layered P2P system for the reliability in dynamic mobile environments. Comput Inform 30:467\u2013489","journal-title":"Comput Inform"},{"key":"808_CR10","unstructured":"Kumar R, Kumar P (2012) Replica allocation techniques based on clusters for MANETs. In: Proc of the Int Conf on emerging trends in computer and electronics engineering, Dubai, pp 24\u201325"},{"key":"808_CR11","doi-asserted-by":"publisher","unstructured":"Li H, Bok K, Park Y, Yoo J (2011) An efficient mobile peer to peer architecture in wireless Ad Hoc network. In: Proc of the Int Conf on hybrid information technology, Springer, New York, pp 1\u20138. \n                    https:\/\/doi.org\/10.1007\/978-3-642-24082-9-1","DOI":"10.1007\/978-3-642-24082-9-1"},{"key":"808_CR12","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/s11276-010-0289-4","volume":"17","author":"JC Liang","year":"2011","unstructured":"Liang JC, Chen JC, Zhang T (2011) An adaptive low-overhead resource discovery protocol for mobile ad-hoc networks. Wirel Netw 17:437\u2013452. \n                    https:\/\/doi.org\/10.1007\/s11276-010-0289-4","journal-title":"Wirel Netw"},{"key":"808_CR13","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1023\/A:1013941929408","volume":"5","author":"C Mainak","year":"2002","unstructured":"Mainak C, Das SK, Turgut D (2002) WCA: a weighted clustering algorithm for mobile Ad Hoc networks. Clust Comput 5:193\u2013204. \n                    https:\/\/doi.org\/10.1023\/A:1013941929408","journal-title":"Clust Comput"},{"key":"808_CR14","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/j.pmcj.2011.04.003","volume":"7","author":"A Mawji","year":"2011","unstructured":"Mawji A, Hassaneina H, Zhang X (2011) Peer-to-peer overlay topology control for mobile ad hoc networks. Pervasive Mobile Comput 7:467\u2013478. \n                    https:\/\/doi.org\/10.1016\/j.pmcj.2011.04.003","journal-title":"Pervasive Mobile Comput"},{"key":"808_CR15","unstructured":"Mondal A, Madria SK, Kitsuregawa M (2006) EcoRep: an economic model for efficient dynamic replication in mobile-P2P networks. In: Proc of the 13th Int Conf on management of data, New Delhi, India, pp 116\u2013127"},{"key":"808_CR16","doi-asserted-by":"publisher","unstructured":"Nakahara S, Ohta T, Kakuda Y (2014) A routing scheme based on autonomous clustering and P2P overlay network in MANETs. In: Proc of 2014 IEEE 11th Intl Conf on ubiquitous intelligence and computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on scalable computing and communications and its associated workshops, IEEE, pp 518\u2013524. \n                    https:\/\/doi.org\/10.1109\/UIC-ATC-ScalCom.2014.18","DOI":"10.1109\/UIC-ATC-ScalCom.2014.18"},{"key":"808_CR17","first-page":"487","volume":"1","author":"TB Noor","year":"2012","unstructured":"Noor TB, Salehin MR, Islam SR (2012) A clustering scheme for peer-to-peer file searching in mobile Ad Hoc networks. Int J Adv Res Comput Commun Eng 1:487\u2013493","journal-title":"Int J Adv Res Comput Commun Eng"},{"key":"808_CR18","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1109\/TPDS.2012.137","volume":"24","author":"H Papadakis","year":"2013","unstructured":"Papadakis H, Fragopoulou P, Markatos EP, Roussopoulos M (2013) ITA: innocuous topology awareness for unstructured P2P networks. IEEE Trans Parallel Distrib Syst 24:1589\u20131601. \n                    https:\/\/doi.org\/10.1109\/TPDS.2012.137","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"808_CR19","doi-asserted-by":"publisher","unstructured":"Perkins CE, Royer EM (1999) Ad-hoc on-demand distance vector routing. In: Proc of 2nd workshop on mobile computing systems and applications, IEEE, New Orleans, LA, USA, pp 90\u2013100. \n                    https:\/\/doi.org\/10.1109\/MCSA.1999.749281","DOI":"10.1109\/MCSA.1999.749281"},{"key":"808_CR20","doi-asserted-by":"publisher","unstructured":"Rahmani M, Bencha\u00efba M (2017a) An efficient replication scheme to increase file availability in mobile peer to peer systems. In: Proc of the 2017 Int symposium on networks, computers and communications, IEEE, pp 1\u20136. \n                    https:\/\/doi.org\/10.1109\/ISNCC.2017.8072021","DOI":"10.1109\/ISNCC.2017.8072021"},{"key":"808_CR21","doi-asserted-by":"publisher","unstructured":"Rahmani M, Bencha\u00efba M (2017b) Toward a resource availability measurement in peer to peer systems. In: Proc of the 5th Int Conf on networked systems, Springer, New York, pp 248\u2013252. \n                    https:\/\/doi.org\/10.1007\/978-3-319-59647-1-19","DOI":"10.1007\/978-3-319-59647-1-19"},{"key":"808_CR22","doi-asserted-by":"publisher","unstructured":"Ratnasamy S, Francis P, Handley M, Karp R, Shenker S (2001) A scalable content-addressable network. In: Proc of the 2001 Conf on applications, technologies, architectures, and protocols for computer communications, ACM, San Diego, California, USA, pp 161\u2013172. \n                    https:\/\/doi.org\/10.1145\/383059.383072","DOI":"10.1145\/383059.383072"},{"key":"808_CR23","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/4236.978369","volume":"6","author":"M Ripeanu","year":"2002","unstructured":"Ripeanu M, Iamnitchi A, Foster I (2002) Mapping the gnutella network. IEEE Internet Comput 6:50\u201357. \n                    https:\/\/doi.org\/10.1109\/4236.978369","journal-title":"IEEE Internet Comput"},{"issue":"3","key":"808_CR24","doi-asserted-by":"publisher","first-page":"e2977","DOI":"10.1002\/dac.2977","volume":"30","author":"Ali Mohammad Saghiri","year":"2015","unstructured":"Saghiri AM, Meybodi MR (2017) A distributed adaptive landmark clustering algorithm based on mOverlay and learning automata for topology mismatch problem in unstructured peer-to-peer networks. Int J Commun Syst. \n                    https:\/\/doi.org\/10.1002\/dac.2977\n                    \n                  .","journal-title":"International Journal of Communication Systems"},{"key":"808_CR25","doi-asserted-by":"publisher","unstructured":"Seddiki M, Bencha\u00efba M (2015) An adaptive P2P overlay for MANETs. In: Proc of the Int Conf on distributed computing and networking, ACM, pp 1\u20138. \n                    https:\/\/doi.org\/10.1145\/2684464.2684496","DOI":"10.1145\/2684464.2684496"},{"key":"808_CR26","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.jnca.2016.03.017","volume":"71","author":"M Seddiki","year":"2016","unstructured":"Seddiki M, Bencha\u00efba M (2016) 2P-lookup: popularity and proximity based P2P lookup mechanism over MANETs. J Netw Comput Appl 71:181\u2013193. \n                    https:\/\/doi.org\/10.1016\/j.jnca.2016.03.017","journal-title":"J Netw Comput Appl"},{"key":"808_CR27","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1007\/s11277-013-1560-7","volume":"77","author":"B Shah","year":"2014","unstructured":"Shah B, Kim KI (2014) Towards enhanced searching architecture for unstructured peer-to-peer over mobile Ad Hoc networks. Wirel Pers Commun 77:1167\u20131189. \n                    https:\/\/doi.org\/10.1007\/s11277-013-1560-7","journal-title":"Wirel Pers Commun"},{"key":"808_CR28","doi-asserted-by":"publisher","first-page":"799","DOI":"10.3837\/tiis.2010.10.006","volume":"4","author":"N Shah","year":"2010","unstructured":"Shah N, Qian D (2010a) An Efficient overlay for unstructured P2P file sharing over MANET using underlying cluster-based routing. KSII Trans Internet Inform Syst 4:799\u2013818. \n                    https:\/\/doi.org\/10.3837\/tiis.2010.006","journal-title":"KSII Trans Internet Inform Syst"},{"key":"808_CR29","doi-asserted-by":"publisher","unstructured":"Shah N, Qian D (2010b) An efficient structured P2P overlay over MANET. In: Proc of Ninth ACM int workshop on data engineering for wireless and mobile access, ACM, Indianapolis, Indiana, pp 57\u201364. \n                    https:\/\/doi.org\/10.1145\/1850822.1850832","DOI":"10.1145\/1850822.1850832"},{"key":"808_CR30","first-page":"517","volume":"12","author":"N Shah","year":"2011","unstructured":"Shah N, Qian DP, Wang R (2011) An efficient unstructured P2P overlay for file sharing over MANETs using underlying reactive routing. J Internet Technol 12:517\u2013530","journal-title":"J Internet Technol"},{"key":"808_CR31","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1007\/s11277-013-1403-6","volume":"75","author":"N Shah","year":"2014","unstructured":"Shah N, Ahmad A, Mehmood W, Qian D, Wang R (2014) An efficient and scalable routing for MANETs. Wirel Pers Commun 75:987\u20131004. \n                    https:\/\/doi.org\/10.1007\/s11277-013-1403-6","journal-title":"Wirel Pers Commun"},{"key":"808_CR32","first-page":"199","volume":"25","author":"N Shah","year":"2015","unstructured":"Shah N, Qian D, Wang R (2015) Merging of P2P overlays over mobile ad hoc network: evaluation of three approaches. Ad Hoc Sens Wirel Netw 25:199\u2013222","journal-title":"Ad Hoc Sens Wirel Netw"},{"key":"808_CR33","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/s12083-015-0341-3","volume":"9","author":"N Shah","year":"2016","unstructured":"Shah N, Ahmad A, Nazir B, Qian D (2016) A cross-layer approach for partition detection at overlay layer for structured P2P in MANETs. Peer-to-Peer Netw Appl 9:356\u2013371. \n                    https:\/\/doi.org\/10.1007\/s12083-015-0341-3","journal-title":"Peer-to-Peer Netw Appl"},{"key":"808_CR34","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.compeleceng.2016.12.013","volume":"57","author":"N Shah","year":"2017","unstructured":"Shah N, Abida S, Qian D, Mehmood W (2017) A survey of P2P content sharing in MANETs. Comput Electr Eng 57:55\u201368. \n                    https:\/\/doi.org\/10.1016\/j.compeleceng.2016.12.013","journal-title":"Comput Electr Eng"},{"key":"808_CR35","doi-asserted-by":"publisher","unstructured":"Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: scalable peer-to-peer lookup service for internet applications. In: Proc of the 2001 Conf on applications, technologies, architectures, and protocols for computer communications, IEEE\/ACM, San Diego, California, USA, pp 149\u2013160. \n                    https:\/\/doi.org\/10.1145\/383059.383071","DOI":"10.1145\/383059.383071"},{"key":"808_CR36","doi-asserted-by":"crossref","unstructured":"Varga A, Hornig R (2008) An overview of the omnet++ simulation environment. In: Proc of the 1st Int Conf on Simulation tools and techniques for communications, networks and systems & workshops, ICST\/ACM, Marseille, France, pp 1\u201310","DOI":"10.4108\/ICST.SIMUTOOLS2008.3027"},{"key":"808_CR37","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1016\/j.future.2011.06.005","volume":"29","author":"K Zhang","year":"2013","unstructured":"Zhang K, Antonopoulos N (2013) A novel bartering exchange ring based incentive mechanism for peer-to-peer systems. Future Gener Comput Syst 29:361\u2013369. \n                    https:\/\/doi.org\/10.1016\/j.future.2011.06.005","journal-title":"Future Gener Comput Syst"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0808-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-018-0808-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0808-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T06:21:55Z","timestamp":1570602115000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-018-0808-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,14]]},"references-count":37,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["808"],"URL":"https:\/\/doi.org\/10.1007\/s12652-018-0808-1","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,14]]},"assertion":[{"value":"29 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}