{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:46:49Z","timestamp":1740160009378,"version":"3.37.3"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:00:00Z","timestamp":1725580800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:00:00Z","timestamp":1725580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s13198-024-02442-4","type":"journal-article","created":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T13:02:19Z","timestamp":1725627739000},"page":"4714-4729","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["WON: A hypothetical multi-hop ad-hoc wireless ultra-large scale worldwide one network"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7295-0115","authenticated-orcid":false,"given":"Raghuram","family":"Shivram","sequence":"first","affiliation":[]},{"given":"B. G.","family":"Prasad","sequence":"additional","affiliation":[]},{"given":"S. Vishwa","family":"Kiran","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,6]]},"reference":[{"key":"2442_CR1","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.jnca.2018.03.026","volume":"113","author":"G Aceto","year":"2018","unstructured":"Aceto G, Botta A, Marchetta P, Persico V, Pescap\u00e9 A (2018) A comprehensive survey on Internet outages. J Netw Comput Appl 113:36\u201363","journal-title":"J Netw Comput Appl"},{"issue":"10","key":"2442_CR2","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MCOM.2018.8493125","volume":"56","author":"MK Afzal","year":"2018","unstructured":"Afzal MK, Zikria YB, Mumtaz S, Rayes A, Al-Dulaimi A, Guizani M (2018) Unlocking 5g spectrum potential for intelligent IoT: opportunities, challenges, and solutions. IEEE Commun Magazine 56(10):92\u201393","journal-title":"IEEE Commun Magazine"},{"issue":"2","key":"2442_CR3","doi-asserted-by":"publisher","first-page":"153","DOI":"10.47602\/jpsp.v4i2.231","volume":"4","author":"G Arslan","year":"2020","unstructured":"Arslan G, Co\u015fkun M (2020) Student subjective wellbeing, school functioning, and psychological adjustment in high school adolescents: a latent variable analysis. J Positive School Psychol 4(2):153\u2013164","journal-title":"J Positive School Psychol"},{"issue":"3","key":"2442_CR4","first-page":"188","volume":"4","author":"J Balen","year":"2011","unstructured":"Balen J, Zagar D, Martinovic G (2011) Quality of service in wireless sensor networks: a survey and related patents. Recent Patents Comput Sci 4(3):188\u2013202","journal-title":"Recent Patents Comput Sci"},{"key":"2442_CR5","doi-asserted-by":"publisher","first-page":"984","DOI":"10.1016\/j.sbspro.2016.02.081","volume":"217","author":"S Berdibayeva","year":"2016","unstructured":"Berdibayeva S, Garber A, Ivanov D, Massalimova A, Kukubayeva A, Berdibayev S (2016) Psychological prevention of older dolescents\u2019 interpersonal relationships, who are prone to Internet addiction. Procedia Soc Behav Sci 217:984\u2013989","journal-title":"Procedia Soc Behav Sci"},{"key":"2442_CR6","doi-asserted-by":"crossref","unstructured":"Bischof ZS, Fontugne R and Bustamante FE (2018) Untangling the world-wide mesh of undersea cables. In: Proceedings of the 17th ACM workshop on hot topics in networks, pp 78\u201384","DOI":"10.1145\/3286062.3286074"},{"issue":"5","key":"2442_CR7","doi-asserted-by":"publisher","first-page":"874","DOI":"10.1080\/13510347.2020.1747051","volume":"27","author":"C-C Chang","year":"2020","unstructured":"Chang C-C, Lin T-H (2020) Autocracy login: internet censorship and civil society in the digital age. Democratization 27(5):874\u2013895","journal-title":"Democratization"},{"issue":"3","key":"2442_CR8","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TMC.2012.20","volume":"12","author":"Q Chen","year":"2012","unstructured":"Chen Q, Kanhere SS, Hassan M (2012) Adaptive position update for geographic routing in mobile ad hoc networks. IEEE Trans Mob Comput 12(3):489\u2013501","journal-title":"IEEE Trans Mob Comput"},{"key":"2442_CR9","unstructured":"Chen D and Varshney PK 2004 Qos support in wireless sensor networks: a survey. In: International conference on wireless networks, vol. 233. Citeseer, pp 1\u20137."},{"key":"2442_CR10","doi-asserted-by":"crossref","unstructured":"Clausen T and Jacquet P (2003) Rfc3626: optimized link state routing protocol (olsr)","DOI":"10.17487\/rfc3626"},{"issue":"4","key":"2442_CR11","doi-asserted-by":"publisher","first-page":"2825","DOI":"10.1007\/s11276-019-02242-w","volume":"26","author":"M Dibaei","year":"2020","unstructured":"Dibaei M, Ghaffari A (2020) Full-duplex medium access control protocols in wireless networks: a survey. Wirel Netw 26(4):2825\u20132843","journal-title":"Wirel Netw"},{"key":"2442_CR12","unstructured":"Diego W (2020) Evolution toward the next generation radio access network. In: 2020 IFIP networking conference (Networking). IEEE, pp 685\u2013685"},{"key":"2442_CR13","unstructured":"Fishman GS (1978) Principles of discrete event simulation. [book review]"},{"key":"2442_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2021\/5531185","volume":"2021","author":"R Gantassi","year":"2021","unstructured":"Gantassi R, Ben Gouissem B, Cheikhrouhou O, El Khediri S, Hasnaoui S (2021) Optimizing quality of service of clustering protocols in large-scale wireless sensor networks with mobile data collector and machine learning. Secur Commun Netw 2021:1\u201312","journal-title":"Secur Commun Netw"},{"key":"2442_CR15","unstructured":"Hagberg A and Conway D (2023) NetworkX: Network analysis with python. URL: https:\/\/networkx.org\/"},{"issue":"3","key":"2442_CR16","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1016\/j.adhoc.2012.11.009","volume":"11","author":"M Haghpanahi","year":"2013","unstructured":"Haghpanahi M, Kalantari M, Shayman M (2013) Topology control in large-scale wireless sensor networks: between information source and sink. Ad Hoc Netw 11(3):975\u2013990","journal-title":"Ad Hoc Netw"},{"key":"2442_CR17","doi-asserted-by":"crossref","unstructured":"Hekmat R and Van Mieghem P (2003) Degree distribution and hop count in wireless ad-hoc networks. In: ICON. Citeseer, pp 603\u2013609","DOI":"10.1109\/ICON.2003.1266257"},{"key":"2442_CR19","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2568619","author":"PN Howard","year":"2011","unstructured":"Howard PN, Agarwal SD, Hussain MM (2011) The dictators\u2019 digital dilemma: when do states disconnect their digital networks? SSRN Electron J. https:\/\/doi.org\/10.2139\/ssrn.2568619","journal-title":"SSRN Electron J"},{"key":"2442_CR20","doi-asserted-by":"crossref","unstructured":"Huang L and Lai T-H (2002) On the scalability of ieee 802.11 ad hoc networks. In: Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing, pp 173\u2013182.","DOI":"10.1145\/513800.513822"},{"key":"2442_CR21","doi-asserted-by":"publisher","unstructured":"IEEE 802.11ah-2016 Amendment 1: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications for sub 1 GHz operation. IEEE Std 802.11ah-2016 (Amendment to IEEE Std 802.11\u20132016), 2017, https:\/\/doi.org\/10.1109\/IEEESTD.2017.7969048.","DOI":"10.1109\/IEEESTD.2017.7969048"},{"key":"2442_CR22","doi-asserted-by":"publisher","unstructured":"IEEE 802.11s-2011: IEEE standard for information technology - telecommunications and information exchange between systems\u2014Local and metropolitan area networks\u2014specific requirements\u2014Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Mesh Networking. IEEE Std 802.11s-2011, 2012, https:\/\/doi.org\/10.1109\/IEEESTD.2012.6181508.","DOI":"10.1109\/IEEESTD.2012.6181508"},{"key":"2442_CR23","unstructured":"Joshi N (2021) Internet shutdowns during protests: Aapractice in digital authoritarianism"},{"key":"2442_CR24","unstructured":"Kathuria R. Kedia M, Varma G, Bagchi K and Sekhani R (2018) The anatomy of an Internet blackout: measuring the economic impact of Internet shutdowns in India."},{"key":"2442_CR25","doi-asserted-by":"crossref","unstructured":"Katz M, Matinmikko-Blue M, and Latva-Aho M (2018) 6genesis flagship program: building the bridges towards 6g-enabled wireless smart society and ecosystem. In: 2018 IEEE 10th Latin-American conference on communications (LATINCOM). IEEE, pp 1\u20139.","DOI":"10.1109\/LATINCOM.2018.8613209"},{"issue":"9","key":"2442_CR26","doi-asserted-by":"publisher","first-page":"5684","DOI":"10.1109\/TWC.2018.2846222","volume":"17","author":"B Klaiqi","year":"2018","unstructured":"Klaiqi B, Chu X, Zhang J (2018) Energy-and spectral-efficient adaptive forwarding strategy for multi-hop device-to-device communications overlaying cellular networks. IEEE Trans Wirel Commun 17(9):5684\u20135699","journal-title":"IEEE Trans Wirel Commun"},{"key":"2442_CR27","doi-asserted-by":"publisher","unstructured":"Ko Y-B and Vaidya NH (1998) Location-aided routing (lar) in mobile ad hoc networks. In: Proceedings of the 4th annual ACM\/IEEE international conference on mobile computing and networking, ser. MobiCom \u201998. New York, NY, USA: Association for Computing Machinery, p 66\u00e2\u0102\u015e75. [Online]. Available: https:\/\/doi.org\/10.1145\/288235.288252","DOI":"10.1145\/288235.288252"},{"key":"2442_CR28","doi-asserted-by":"crossref","unstructured":"Kumar SKA, Ihita GV, Chaudhari S and Arumugam P (2022) A survey on rural Internet connectivity in India. In: 2022 14th international conference on communication systems & networks (COMSNETS). IEEE, pp 911\u2013916.","DOI":"10.1109\/COMSNETS53615.2022.9668358"},{"issue":"25","key":"2442_CR29","doi-asserted-by":"publisher","first-page":"4026","DOI":"10.2174\/13816128113199990617","volume":"20","author":"DJ Kuss","year":"2014","unstructured":"Kuss DJ, Griffiths MD, Karila L, Billieux J (2014) Internet addiction: a systematic review of epidemiological research for the last decade. Curr Pharm Des 20(25):4026\u20134052","journal-title":"Curr Pharm Des"},{"issue":"4","key":"2442_CR30","doi-asserted-by":"publisher","first-page":"3498","DOI":"10.3390\/s110403498","volume":"11","author":"C Li","year":"2011","unstructured":"Li C, Zhang H, Hao B, Li J (2011) A survey on routing protocols for large-scale wireless sensor networks. Sensors 11(4):3498\u20133526","journal-title":"Sensors"},{"key":"2442_CR31","first-page":"18","volume":"14","author":"E Marchant","year":"2020","unstructured":"Marchant E, Stremlau N (2020) The changing landscape of Internet shutdown in africa| a spectrum of shutdowns: reframing Internet shutdowns from africa. Int J Commun 14:18","journal-title":"Int J Commun"},{"key":"2442_CR32","unstructured":"Matloff N (2008) Introduction to discrete-event simulation and the simpy language. In: Davis, CA. Dept of Computer Science. University of California at Davis. Retrieved on August, vol. 2, no. 2009, pp 1\u201333"},{"issue":"3","key":"2442_CR33","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1109\/JSAC.2004.842557","volume":"23","author":"T Melodia","year":"2005","unstructured":"Melodia T, Pompili D, Akyildiz IF (2005) On the interdependence of distributed topology control and geographical routing in ad hoc and sensor networks. IEEE J Sel Areas Commun 23(3):520\u2013532","journal-title":"IEEE J Sel Areas Commun"},{"issue":"12","key":"2442_CR34","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MC.2013.374","volume":"46","author":"B Metcalfe","year":"2013","unstructured":"Metcalfe B (2013) Metcalfe\u2019s law after 40 years of ethernet. Computer 46(12):26\u201331","journal-title":"Computer"},{"key":"2442_CR35","unstructured":"Meza JJ (2018) Large scale studies of memory, storage, and network failures in a modern data center. Ph.D. dissertation, Carnegie Mellon University"},{"key":"2442_CR36","unstructured":"Mitton N, Busson A and Fleury E (2004) Self-organization in large scale ad hoc networks. In: Mediterranean ad hoc networking workshop (MedHocNet\u201904)."},{"issue":"5","key":"2442_CR37","doi-asserted-by":"publisher","first-page":"2831","DOI":"10.1007\/s11276-019-01997-6","volume":"25","author":"M Mohammadnezhad","year":"2019","unstructured":"Mohammadnezhad M, Ghaffari A (2019) Hybrid routing scheme using imperialist competitive algorithm and RBF neural networks for VANETs. Wirel Netw 25(5):2831\u20132849","journal-title":"Wirel Netw"},{"issue":"6","key":"2442_CR38","first-page":"1204","volume":"4","author":"K Nair","year":"2012","unstructured":"Nair K (2012) Eccentricity in zone routing protocol for manet. Int J Comput Sci Eng 4(6):1204","journal-title":"Int J Comput Sci Eng"},{"key":"2442_CR39","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/s11276-020-02481-2","volume":"27","author":"M Peer","year":"2021","unstructured":"Peer M, Bohara VA, Srivastava A (2021) Enabling disaster-resilient communication using multi-hop device-to-device framework. Wirel Netw 27:649\u2013661","journal-title":"Wirel Netw"},{"key":"2442_CR40","doi-asserted-by":"crossref","unstructured":"Perkins CE and Royer EM (1999) Ad hoc on-demand distance vector routing. In: Proceedings of the 2nd IEEE workshop on mobile computing systems and applications. IEEE, pp 90\u2013100.","DOI":"10.1109\/MCSA.1999.749281"},{"issue":"5","key":"2442_CR41","doi-asserted-by":"publisher","first-page":"925","DOI":"10.5829\/ije.2023.36.05b.09","volume":"36","author":"RP Puneeth","year":"2023","unstructured":"Puneeth RP, Parthasarathy G (2023) Security and data privacy of medical information in blockchain using lightweight cryptographic system. Int J Eng 36(5):925\u2013933. https:\/\/doi.org\/10.5829\/ije.2023.36.05b.09","journal-title":"Int J Eng"},{"key":"2442_CR42","doi-asserted-by":"crossref","unstructured":"Ramanathan R (2001) Making ad hoc networks density adaptive. In: 2001 MILCOM proceedings communications for network-centric operations: creating the information force (Cat. No. 01CH37277), 2. IEEE, pp 957\u2013961","DOI":"10.1109\/MILCOM.2001.985980"},{"key":"2442_CR43","doi-asserted-by":"crossref","first-page":"24","DOI":"10.46300\/9107.2020.14.5","volume":"14","author":"J Rydzak","year":"2020","unstructured":"Rydzak J, Karanja M, Opiyo N (2020) Internet shutdowns in africa| dissent does not die in darkness: network shutdowns and collective action in african countries. Int J Commun 14:24","journal-title":"Int J Commun"},{"issue":"4\u20135","key":"2442_CR44","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1080\/03071847.2022.2156234","volume":"167","author":"J Ryng","year":"2022","unstructured":"Ryng J, Guicherd G, Saman JA, Choudhury P, Kellett A (2022) Internet shutdowns: a human rights issue. RUSI J 167(4\u20135):50\u201363","journal-title":"RUSI J"},{"issue":"1","key":"2442_CR45","doi-asserted-by":"publisher","DOI":"10.1002\/jnm.2676","volume":"33","author":"A Shirmarz","year":"2020","unstructured":"Shirmarz A, Ghaffari A (2020) An adaptive greedy flow routing algorithm for performance improvement in software defined network. Int J Numer Model Electron Netw Dev Fields 33(1):e2676","journal-title":"Int J Numer Model Electron Netw Dev Fields"},{"key":"2442_CR46","unstructured":"Shivram R and Prasad BG (2003) Efficient and calable localization technique using COTS Wi-Fi Devices. J Xi\u2019an Univ Archit Technol, (VOLUME XV, ISSUE IV, APRIL 2023) ISSN: 1006\u20137930, Page No: 154\u2013172."},{"key":"2442_CR47","doi-asserted-by":"crossref","unstructured":"Shivram R and Prasad BG (2018) Agile network simulator framework. In: 2018 international conference on networking, embedded and wireless systems (ICNEWS), IEEE, pp 1\u20134","DOI":"10.1109\/ICNEWS.2018.8904041"},{"key":"2442_CR48","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/ACCESS.2021.3092039","volume":"9","author":"R Shrestha","year":"2021","unstructured":"Shrestha R, Bajracharya R, Kim S (2021) 6g enabled unmanned aerial vehicle traffic management: a perspective. IEEE Access 9:91","journal-title":"IEEE Access"},{"issue":"1","key":"2442_CR49","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1002\/hbe2.230","volume":"3","author":"KS Tarisayi","year":"2021","unstructured":"Tarisayi KS, Munyaradzi E (2021) A teacher perspective on the impact of Internet shutdown on the teaching and learning in high schools in Zimbabwe. Human Behav Emerg Technol 3(1):169\u2013175","journal-title":"Human Behav Emerg Technol"},{"issue":"5","key":"2442_CR50","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.2014.6815897","volume":"52","author":"MN Tehrani","year":"2014","unstructured":"Tehrani MN, Uysal M, Yanikomeroglu H (2014) Device-to-device communication in 5g cellular networks: challenges, solutions, and future directions. IEEE Commun Mag 52(5):86\u201392","journal-title":"IEEE Commun Mag"},{"issue":"13","key":"2442_CR51","doi-asserted-by":"publisher","first-page":"465","DOI":"10.5897\/ERR2019.3768","volume":"14","author":"Z Tras","year":"2019","unstructured":"Tras Z (2019) Internet addiction and loneliness as predictors of Internet gaming disorder in adolescents. Educ Res Rev 14(13):465\u2013473","journal-title":"Educ Res Rev"},{"key":"2442_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11066-014-9084-1","volume":"15","author":"L Van Hove","year":"2014","unstructured":"Van Hove L (2014) Metcalfe\u2019s law: not so wrong after all. NETNOMICS Econ Res Electron Netw 15:1\u20138","journal-title":"NETNOMICS Econ Res Electron Netw"},{"key":"2442_CR52","volume-title":"Internet shutdowns cost countries $2.4 billion last year","author":"DM West","year":"2016","unstructured":"West DM (2016) Internet shutdowns cost countries $2.4 billion last year. Center for Technological Innovation at Brookings, Washington"},{"issue":"9","key":"2442_CR53","doi-asserted-by":"publisher","first-page":"1572","DOI":"10.1109\/TMC.2011.177","volume":"11","author":"X Xiang","year":"2011","unstructured":"Xiang X, Wang X, Zhou Z (2011) Self-adaptive on-demand geographic routing for mobile ad hoc networks. IEEE Trans Mob Comput 11(9):1572\u20131586","journal-title":"IEEE Trans Mob Comput"},{"issue":"4","key":"2442_CR54","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1177\/0002764204270278","volume":"48","author":"KS Young","year":"2004","unstructured":"Young KS (2004) Internet addiction: a new clinical phenomenon and its consequences. Am Behav Sci 48(4):402\u2013415","journal-title":"Am Behav Sci"},{"key":"2442_CR55","unstructured":"Yu Y, Govindan R, and Estrin D (2001) Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks"},{"key":"2442_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-019-2789-y","volume":"63","author":"Y Yuan","year":"2020","unstructured":"Yuan Y, Zhao Y, Zong B, Parolari S (2020) Potential key technologies for 6g mobile communications. Sci China Inf Sci 63:1\u201319","journal-title":"Sci China Inf Sci"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02442-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-024-02442-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-024-02442-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T12:13:26Z","timestamp":1728044006000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-024-02442-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,6]]},"references-count":56,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["2442"],"URL":"https:\/\/doi.org\/10.1007\/s13198-024-02442-4","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"type":"print","value":"0975-6809"},{"type":"electronic","value":"0976-4348"}],"subject":[],"published":{"date-parts":[[2024,9,6]]},"assertion":[{"value":"12 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}