{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T05:57:35Z","timestamp":1648706255375},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T00:00:00Z","timestamp":1428969600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s11277-015-2556-2","type":"journal-article","created":{"date-parts":[[2015,4,13]],"date-time":"2015-04-13T11:54:43Z","timestamp":1428926083000},"page":"2579-2591","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Simple Survey of Incentive Mechanisms for User-Provided Networks"],"prefix":"10.1007","volume":"83","author":[{"given":"Vitor G.","family":"Rolla","sequence":"first","affiliation":[]},{"given":"Marilia","family":"Curado","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,14]]},"reference":[{"issue":"3","key":"2556_CR1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MNET.2005.1453395","volume":"19","author":"D Vassis","year":"2005","unstructured":"Vassis, D., Kormentzas, G., Rouskas, A., & Maglogiannis, I. (2005). The IEEE 802.11g standard for high data rate wlans. Network Magazine of Global Internetworking, 19(3), 21\u201326.","journal-title":"Network Magazine of Global Internetworking"},{"key":"2556_CR2","doi-asserted-by":"crossref","unstructured":"Sweeney, D. (2002). An introduction to bluetooth a standard for short range wireless networking. In: ASIC\/SOC Conference, 2002. 15th Annual IEEE International. (pp. 474\u2013475).","DOI":"10.1109\/ASIC.2002.1158106"},{"issue":"12","key":"2556_CR3","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MCOM.2008.4689212","volume":"46","author":"R Sofia","year":"2008","unstructured":"Sofia, R., & Mendes, P. (2008). User-provided networks: Consumer as provider. IEEE Communications Magazine, 46(12), 86\u201391.","journal-title":"IEEE Communications Magazine"},{"key":"2556_CR4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/j.comcom.2014.03.019","volume":"48","author":"VF Mota","year":"2014","unstructured":"Mota, V. F., Cunha, F. D., Macedo, D. F., Nogueira, J. M., & Loureiro, A. A. (2014). Protocols, mobility models and tools in opportunistic networks: A survey. Computer Communications, 48, 5\u201319. Opportunistic networks.","journal-title":"Computer Communications"},{"key":"2556_CR5","unstructured":"Fonera: http:\/\/www.fon.com (2014)."},{"key":"2556_CR6","unstructured":"Openspark: https:\/\/open.sparknet.fi (2014)."},{"key":"2556_CR7","unstructured":"Google: www.android.com (2014)."},{"key":"2556_CR8","unstructured":"Apple: www.apple.com\/iphone\/ (2014)."},{"key":"2556_CR9","unstructured":"Freifunk: http:\/\/start.freifunk.net\/ (2014)."},{"key":"2556_CR10","unstructured":"OpenWrt: https:\/\/openwrt.org (2014)."},{"issue":"2","key":"2556_CR11","first-page":"1","volume":"54","author":"T Clausen","year":"2003","unstructured":"Clausen, T., Jacquet, P., Adjih, C., Laouiti, A., Minet, P., Muhlethaler, P., et al. (2003). Optimized link state routing protocol (OLSR). RFC, 54(2), 1\u201376.","journal-title":"RFC"},{"key":"2556_CR12","unstructured":"AWMN: http:\/\/www.awmn.net\/ (2014)."},{"issue":"3","key":"2556_CR13","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/2317307.2317313","volume":"42","author":"K Claffy","year":"2012","unstructured":"Claffy, K. (2012). Border gateway protocol (BGP) and traceroute data workshop report. ACM SIGCOMM Computer Communication Review (CCR), 42(3), 28\u201331.","journal-title":"ACM SIGCOMM Computer Communication Review (CCR)"},{"issue":"4","key":"2556_CR14","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MIC.2008.76","volume":"12","author":"J Ishmael","year":"2008","unstructured":"Ishmael, J., Bury, S., Pezaros, D., & Race, N. (2008). Deploying rural community wireless mesh networks. IEEE Internet Computing, 12(4), 22\u201329.","journal-title":"IEEE Internet Computing"},{"key":"2556_CR15","unstructured":"Perkins, C., Belding-Royer, E., & Das, S. (2003). Others: Ad hoc on-demand distance vector (AODV) routing. RFC pp. 1\u201338."},{"key":"2556_CR16","doi-asserted-by":"crossref","unstructured":"Ntareme, H., & Domancich, S. (2011). Security and performance aspects of bytewalla: A delay tolerant network on smartphones. In: Proceedings of the 2011 IEEE 7th international conference on wireless and mobile computing, networking and communications. WIMOB \u201911, Washington, DC, USA, IEEE Computer Society (pp. 449\u2013454).","DOI":"10.1109\/WiMOB.2011.6085360"},{"issue":"3","key":"2556_CR17","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/961268.961272","volume":"7","author":"A Lindgren","year":"2003","unstructured":"Lindgren, A., Doria, A., & Schel\u00e9n, O. (2003). Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), 19.","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"2556_CR18","doi-asserted-by":"crossref","unstructured":"Ma, X., Chen, X., & Refai, H.H. (2009). Performance and reliability of DSRC vehicular safety communication: A formal analysis. EURASIP Journal on Wireless Communications and Networking, 2009, 1\u201313.","DOI":"10.1155\/2009\/969164"},{"key":"2556_CR19","unstructured":"Ibanez, A., Flores, C., Reyes, P., Barba, A., & Reyes, A. (2011). A performance study of the 802.11p standard for vehicular applications. In: Intelligent environments (IE), 2011 7th international conference on. (pp. 165\u2013170)."},{"issue":"2","key":"2556_CR20","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1016\/j.comnet.2010.10.015","volume":"55","author":"M Gerla","year":"2011","unstructured":"Gerla, M., & Kleinrock, L. (2011). Vehicular networks and the future of the mobile internet. Computer Networks, 55(2), 457\u2013469.","journal-title":"Computer Networks"},{"key":"2556_CR21","unstructured":"Rolla, V. G., Silva, D., & Curado, M. (2013). Intelligent epidemic routing for cooperative IEEE 802.11 networks. In: Wireless and mobile networking conference (WMNC), 2013 6th Joint IFIP. (pp. 1\u20136)."},{"key":"2556_CR22","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., Psounis, K., & Raghavendra, C. (2005). Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of the 2005 ACM SIGCOMM workshop on delay-tolerant networking, ACM (pp. 252\u2013259).","DOI":"10.1145\/1080139.1080143"},{"issue":"10","key":"2556_CR23","doi-asserted-by":"crossref","first-page":"2243","DOI":"10.1016\/j.engappai.2013.07.017","volume":"26","author":"VG Rolla","year":"2013","unstructured":"Rolla, V. G., & Curado, M. (2013). A reinforcement learning-based routing for delay tolerant networks. Engineering Applications of Artificial Intelligence, 26(10), 2243\u20132250.","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"1","key":"2556_CR24","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1109\/TNET.2007.897962","volume":"16","author":"T Spyropoulos","year":"2008","unstructured":"Spyropoulos, T., Psounis, K., & Raghavendra, C. (2008). Efficient routing in intermittently connected mobile networks: The single-copy case. IEEE\/ACM Transactions on Networking, 16(1), 63\u201376.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"2556_CR25","doi-asserted-by":"crossref","unstructured":"Doering, M., P\u00f6gel, T., & Wolf, L. (2010). DTN routing in urban public transport systems. In: Proceedings of the 5th ACM workshop on challenged networks, ACM (pp. 55\u201362).","DOI":"10.1145\/1859934.1859947"},{"key":"2556_CR26","unstructured":"Chen, T., & Wu, F. (2010). Stimulating cooperation in vehicular ad hoc networks: A coalitional game theoretic approach. Vehicular Technology, IEEE, 60, 1\u201314."},{"issue":"11","key":"2556_CR27","doi-asserted-by":"crossref","first-page":"1576","DOI":"10.1109\/TMC.2010.246","volume":"10","author":"P Hui","year":"2011","unstructured":"Hui, P., Crowcroft, J., & Yoneki, E. (2011). Bubble rap: Social-based forwarding in delay-tolerant networks. Mobile Computing, IEEE Transactions on, 10(11), 1576\u20131589.","journal-title":"Mobile Computing, IEEE Transactions on"},{"issue":"6","key":"2556_CR28","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/j.pmcj.2009.07.016","volume":"5","author":"I Leontiadis","year":"2009","unstructured":"Leontiadis, I., Costa, P., & Mascolo, C. (2009). A hybrid approach for content-based publish\/subscribe in vehicular networks. Pervasive and Mobile Computing, 5(6), 697\u2013713.","journal-title":"Pervasive and Mobile Computing"},{"issue":"1","key":"2556_CR29","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/TWC.2013.120413.130670","volume":"13","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Chuah, M. C., & Chen, Y. (2014). Incentive based data sharing in delay tolerant mobile networks. Wireless Communications, IEEE Transactions on, 13(1), 370\u2013381.","journal-title":"Wireless Communications, IEEE Transactions on"},{"issue":"3","key":"2556_CR30","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/TAMD.2012.2202658","volume":"4","author":"D Asher","year":"2012","unstructured":"Asher, D., Zaldivar, A., Barton, B., Brewer, A., & Krichmar, J. (2012). Reciprocity and retaliation in social games with adaptive agents. Autonomous Mental Development, IEEE Transactions on, 4(3), 226\u2013238.","journal-title":"Autonomous Mental Development, IEEE Transactions on"},{"issue":"8","key":"2556_CR31","doi-asserted-by":"crossref","first-page":"4628","DOI":"10.1109\/TVT.2009.2020105","volume":"58","author":"H Zhu","year":"2009","unstructured":"Zhu, H., Lin, X., Lu, R., Member, S., Fan, Y., & Shen, X. S. (2009). SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Transactions on Vehicular Technology, 58(8), 4628\u20134639.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"4","key":"2556_CR32","doi-asserted-by":"crossref","first-page":"1368","DOI":"10.1109\/TIFS.2012.2202228","volume":"7","author":"L Xiao","year":"2012","unstructured":"Xiao, L., Chen, Y., Lin, W., & Liu, K. (2012). Indirect reciprocity security game for large-scale wireless networks. Information Forensics and Security, IEEE Transactions on, 7(4), 1368\u20131380.","journal-title":"Information Forensics and Security, IEEE Transactions on"},{"issue":"4","key":"2556_CR33","doi-asserted-by":"crossref","first-page":"1483","DOI":"10.1109\/TWC.2010.04.090557","volume":"9","author":"R Lu","year":"2010","unstructured":"Lu, R., Lin, X., Zhu, H., Shen, X., & Preiss, B. (2010). Pi: A practical incentive protocol for delay tolerant networks. IEEE Transactions on Wireless Communications, 9(4), 1483\u20131493.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"2556_CR34","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1109\/TIFS.2009.2026454","volume":"4","author":"L Xiao","year":"2009","unstructured":"Xiao, L., Greenstein, L., Mandayam, N., & Trappe, W. (2009). Channel-based detection of sybil attacks in wireless networks. Information Forensics and Security, IEEE Transactions on, 4(3), 492\u2013503.","journal-title":"Information Forensics and Security, IEEE Transactions on"},{"issue":"5","key":"2556_CR35","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/JSAC.2006.872882","volume":"24","author":"M Feldman","year":"2006","unstructured":"Feldman, M., Papadimitriou, C., Chuang, J., & Stoica, I. (2006). Free-riding and whitewashing in peer-to-peer systems. Selected Areas in Communications, IEEE Journal on, 24(5), 1010\u20131019.","journal-title":"Selected Areas in Communications, IEEE Journal on"},{"key":"2556_CR36","unstructured":"Wei, L., Cao, Z., & Zhu, H. (2011). Mobigame: A user-centric reputation based incentive protocol for delay\/disruption tolerant networks. In: Global telecommunications conference (GLOBECOM 2011), 2011 IEEE. (dec. 2011) (pp. 1\u20135)."},{"key":"2556_CR37","doi-asserted-by":"crossref","unstructured":"Bala, A., Bansal, M., & Singh, J. (2009). Performance analysis of manet under blackhole attack. In: Networks and communications, 2009. NETCOM \u201909. First international conference on. (pp. 141\u2013145).","DOI":"10.1109\/NetCoM.2009.62"},{"key":"2556_CR38","doi-asserted-by":"crossref","unstructured":"Li, N., & Das, S.K. (2010). Radon: reputation-assisted data forwarding in opportunistic networks. In: Proceedings of the second international workshop on mobile opportunistic networking. MobiOpp \u201910, New York, NY, USA, ACM (pp. 8\u201314).","DOI":"10.1145\/1755743.1755746"},{"key":"2556_CR39","doi-asserted-by":"crossref","unstructured":"Zhuo, X., Gao, W., Cao, G., & Dai, Y. (2011). Win-Coupon: An incentive framework for 3G traffic offloading. 2011 19th IEEE international conference on network protocols (October 2011) pp. 206\u2013215.","DOI":"10.1109\/ICNP.2011.6089054"},{"issue":"10","key":"2556_CR40","doi-asserted-by":"crossref","first-page":"1329","DOI":"10.1109\/TC.2007.1082","volume":"56","author":"S Pal","year":"2007","unstructured":"Pal, S., Kundu, S., Chatterjee, M., & Das, S. (2007). Combinatorial reverse auction based scheduling in multi-rate wireless systems. Computers, IEEE Transactions on, 56(10), 1329\u20131341.","journal-title":"Computers, IEEE Transactions on"},{"issue":"11","key":"2556_CR41","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MCOM.2012.6353688","volume":"50","author":"S Sen","year":"2012","unstructured":"Sen, S., Joe-Wong, C., Ha, S., & Chiang, M. (2012). Incentivizing time-shifting of data: A survey of time-dependent pricing for internet access. Communications Magazine, IEEE, 50(11), 91\u201399.","journal-title":"Communications Magazine, IEEE"},{"key":"2556_CR42","doi-asserted-by":"crossref","unstructured":"Efstathiou, E., Frangoudis, P., & Polyzos, G. (2006). Stimulating participation in wireless community networks. In: INFOCOM 2006. 25th IEEE international conference on computer communications. Proceedings. (pp. 1\u201313).","DOI":"10.1109\/INFOCOM.2006.320"},{"issue":"4","key":"2556_CR43","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1007\/s11277-012-0776-2","volume":"70","author":"G Zhao","year":"2013","unstructured":"Zhao, G., Chen, M., & Wei, X. (2013). Ris: A reciprocal incentive scheme in selfish opportunistic networks. Wireless Personal Communications, 70(4), 1711\u20131734.","journal-title":"Wireless Personal Communications"},{"key":"2556_CR44","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.ins.2014.08.035","volume":"290","author":"VG Rolla","year":"2015","unstructured":"Rolla, V. G., & Curado, M. (2015). Enabling wireless cooperation in delay tolerant networks. Information Sciences, 290, 120\u2013133.","journal-title":"Information Sciences"},{"key":"2556_CR45","doi-asserted-by":"crossref","unstructured":"Guan, X., Liu, C., Chen, M., Chen, H., & Ohtsuki, T. (2011). Internal threats avoiding based forwarding protocol in social selfish delay tolerant networks. In: Communications (ICC), 2011 IEEE international conference on. (pp. 1\u20136).","DOI":"10.1109\/icc.2011.5962592"},{"issue":"3","key":"2556_CR46","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/s10888-011-9188-x","volume":"10","author":"L Ceriani","year":"2012","unstructured":"Ceriani, L., & Verme, P. (2012). The origins of the gini index: Extracts from variabilit e mutabilit (1912) by corrado gini. Journal of Economic Inequality, 10(3), 421\u2013443.","journal-title":"Journal of Economic Inequality"},{"key":"2556_CR47","doi-asserted-by":"crossref","unstructured":"Shevade, U., & Zhang, Y. (2008). Incentive-aware routing in DTNs. IEEE international conference on network protocols (October 2008) pp. 238\u2013247.","DOI":"10.1109\/ICNP.2008.4697042"},{"key":"2556_CR48","unstructured":"Uddin, M., Godfrey, B., & Abdelzaher, T. (2010). Relics: In-network realization of incentives to combat selfishness in dtns. In: Network protocols (ICNP), 2010 18th IEEE international conference on. (pp. 203\u2013212)."},{"issue":"4","key":"2556_CR49","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1016\/j.comnet.2012.11.014","volume":"57","author":"R El-Azouzi","year":"2013","unstructured":"El-Azouzi, R., Pellegrini, F. D., Sidi, H. B., & Kamble, V. (2013). Evolutionary forwarding games in delay tolerant networks: Equilibria, mechanism design and stochastic approximation. Computer Networks, 57(4), 1003\u20131018.","journal-title":"Computer Networks"},{"issue":"11","key":"2556_CR50","doi-asserted-by":"crossref","first-page":"4172","DOI":"10.1109\/TWC.2012.091812.120346","volume":"11","author":"J Liu","year":"2012","unstructured":"Liu, J., Gao, J., Jiang, X., Nishiyama, H., & Kato, N. (2012). Capacity and delay of probing-based two-hop relay in manets. Wireless Communications, IEEE Transactions on, 11(11), 4172\u20134183.","journal-title":"Wireless Communications, IEEE Transactions on"},{"issue":"10","key":"2556_CR51","doi-asserted-by":"crossref","first-page":"1751","DOI":"10.1016\/j.comnet.2008.12.023","volume":"53","author":"E Altman","year":"2009","unstructured":"Altman, E., El-Azouzi, R., Hayel, Y., & Tembine, H. (2009). The evolution of transport protocols: An evolutionary game perspective. Computer Networks, 53(10), 1751\u20131759.","journal-title":"Computer Networks"},{"key":"2556_CR52","doi-asserted-by":"crossref","unstructured":"Sadiq, U., Kumar, M., & Wright, M. (2012). Crisp: collusion-resistant incentive-compatible routing and forwarding in opportunistic networks. In: Proceedings of the 15th ACM international conference on modeling, analysis and simulation of wireless and mobile systems. MSWiM \u201912, New York, NY, USA, ACM (pp. 69\u201378).","DOI":"10.1145\/2387238.2387253"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2556-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-015-2556-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-015-2556-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:18:17Z","timestamp":1559395097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-015-2556-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,14]]},"references-count":52,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["2556"],"URL":"https:\/\/doi.org\/10.1007\/s11277-015-2556-2","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,14]]}}}