{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T22:44:08Z","timestamp":1771022648707,"version":"3.50.1"},"reference-count":260,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2872686","type":"journal-article","created":{"date-parts":[[2018,10,3]],"date-time":"2018-10-03T18:23:23Z","timestamp":1538591003000},"page":"59589-59617","source":"Crossref","is-referenced-by-count":21,"title":["Wireless Social Networks: A Survey of Recent Advances, Applications and Challenges"],"prefix":"10.1109","volume":"6","author":[{"given":"Furqan","family":"Jameel","sequence":"first","affiliation":[]},{"given":"Shurjeel","family":"Wyne","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7004-2930","authenticated-orcid":false,"given":"Dushantha Nalin K.","family":"Jayakody","sequence":"additional","affiliation":[]},{"given":"Georges","family":"Kaddoum","sequence":"additional","affiliation":[]},{"given":"Richard","family":"O'Kennedy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.5539\/mas.v10n5p177"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47011-4_11"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2303091"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/2934664"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1145\/2611567"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0066-9_2"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037227"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref177","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MNET.2014.6843226","article-title":"CoLoR: An information-centric Internet architecture for innovations","volume":"28","author":"luo","year":"2014","journal-title":"IEEE Netw"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2477836"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2015.9"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.2015AMI0001"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2633485"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.328"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2420552"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706973"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.07.028"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2009.5188784"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2636454"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7089259"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221912"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144503424786"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1145\/1953122.1953146"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7157940"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.100"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231278"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2014.6857093"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2013.59"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037254"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.08.005"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2014.26"},{"key":"ref28","first-page":"520","article-title":"Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems","author":"dellarocas","year":"2000","journal-title":"Proc 21st Int Conf Inf Syst"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2308200"},{"key":"ref179","article-title":"Ego-munities, Exploring Socially Cohesive Person-based Communities","author":"friggeri","year":"2011"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2587259"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1224"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1177\/0049124111404820"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124378"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1126\/science.1215842"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481349"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2414792"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510912"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6853634"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2395959"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.6256251"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683313"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774339"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1145\/2641798.2641834"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2394367"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13329-4_3"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2670024"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2014.6962214"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICROIT.2014.6798311"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2014.7023171"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2016.2566584"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600029CM"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-009-9353-9"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2644671"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2731805"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2410768"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2014.6952481"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2334661"},{"key":"ref40","first-page":"1","article-title":"Proactive small cell networks","author":"bastug","year":"2013","journal-title":"Proc Int Conf Telecommun (ICT)"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700360"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2011.39"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/1951365.1951432"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/69.50905"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2299233"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2013.72"},{"key":"ref161","first-page":"1","volume":"14","author":"villars","year":"2011","journal-title":"Big Data What It Is and Why You Should Care"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2305192"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.246"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/nature11421"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2169033"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.101"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/753024"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1109\/SURV.2013.042313.00103","article-title":"A survey of social-aware routing protocols in delay tolerant networks: Applications, taxonomy and design-related issues","volume":"16","author":"wei","year":"2014","journal-title":"IEEE Commun Surveys Tuts"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2444385"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.032612.00004"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962526"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/2512921.2512924"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2016.1141077"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2741481"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2453793"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700244"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.269"},{"key":"ref42","first-page":"1","article-title":"Anticipatory caching in small cell networks: A transfer learning approach","author":"bastug","year":"2014","journal-title":"Proceedings of the 1st KuVS Workshop on Anticipatory Networks"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6871674"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2478476"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2016.7523523"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.042512.00053"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60795-5_10"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0407-0"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2016.03.102"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683082"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2008.4594893"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5578912"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2007.55"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.161"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2008.04.003"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2015.2421286"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2016.12.041"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2281262"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2014.01.003"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.07.018"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-013-0142-8"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063741"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1209\/0295-5075\/101\/18004"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.38"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963481"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.347"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849174"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE.2011.5722896"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2659478"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2470258"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS.2009.5409895"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963471"},{"key":"ref95","first-page":"1","article-title":"The impact of social distance on utility based resource allocation in next generation networks","author":"tsiropoulos","year":"2011","journal-title":"Proc Int Congr Ultra Mod Telecommun Control Syst Workshops (ICUMT)"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2016.7490601"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2240670"},{"key":"ref93","first-page":"8","article-title":"A variable order Markov model approach for mobility prediction","author":"bapierre","year":"2011","journal-title":"Proc Int Joint Artif Intell Conf"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6549285"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2010.5625119"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2764925"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-010-0303-x"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2005.1460597"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132915"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2181196.2181199"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2764259"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3018661.3018680"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.03.013"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21937-5_18"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2011.5720201"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2183643"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530762"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7553028"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2011.51"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.04.092066"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/7148564"},{"key":"ref88","first-page":"1","article-title":"Social-aware content delivery with D2D communications support for emergency scenarios in 5G systems","author":"orsino","year":"2016","journal-title":"Proc 22th Eur Wireless Conf"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2011.5955189"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124380"},{"key":"ref100","first-page":"18","article-title":"Mobility prediction using pattern matching","volume":"12","author":"al-hattab","year":"2012","journal-title":"Int J Elect Comp Sci"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.12.008"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1108\/IJPCC-03-2017-0023"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/63.4.967"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/TIWDC.2013.6664193"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.08.019"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.09.024"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.2007.24348410"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.11.014"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.10.007"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/VITAE.2013.6617083"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0146"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1705-6"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/MoWNet.2016.7496623"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2384734"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.004"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.03.012"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/iNCoS.2012.25"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7054718"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2416657"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506368"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.039"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2017.7983269"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1601065"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2441064"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1500657CM"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3216"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2475746"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2017.7925620"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.101713.131839"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2450774"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2457427"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2329956"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2453234"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2348950"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2466238"},{"key":"ref133","first-page":"7125","article-title":"A method for network assisted relay selection in device to device communication for the 5G","volume":"11","author":"mishra","year":"2016","journal-title":"Int J Appl Eng Res"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2549046"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7553033"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2461214"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6852086"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2626362"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/LPT.2016.2624281"},{"key":"ref231","first-page":"252","article-title":"Visible light energy harvesting in modern communication systems","author":"chedup","year":"2015","journal-title":"Proc EECCMC"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.06.002"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDSC.2016.7460394"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2432513"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/JLT.2015.2510021"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1016\/j.electacta.2009.03.008"},{"key":"ref236","first-page":"1","article-title":"Visible light communication system for outdoor applications","author":"louren\u00e7o","year":"2012","journal-title":"Proc Int Symp Commun Syst Netw Digit Signal Process (CSNDSP)"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2749320"},{"key":"ref135","first-page":"650","article-title":"Social-aware data caching mechanism in D2D-enabled cellular networks","author":"liu","year":"2017","journal-title":"Proc Int Conf 5G Future Wireless Netw"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/2444776.2444798"},{"key":"ref137","author":"lu","year":"2012","journal-title":"Security and privacy preservation in vehicular social networks"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/1435497.1435505"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom.2014.6849025"},{"key":"ref141","first-page":"612","article-title":"Bfriend: Context-aware ad-hoc social networking for mobile users","author":"smailovic","year":"2012","journal-title":"Proc 35th Int Conv (MIPRO)"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37974-1_5"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462161"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ISWTA.2011.6089402"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pbio.1002195"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-012-0136-8"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7437030"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2010.5657708"},{"key":"ref242","first-page":"13","article-title":"Data aggregation with multiple sinks in information-centric wireless sensor network","author":"shim","year":"2014","journal-title":"Proc Int Conf Inf Netw (ICOIN)"},{"key":"ref243","first-page":"65","article-title":"A service-oriented cloud computing network management architecture for wireless sensor networks","volume":"22","author":"chang","year":"2014","journal-title":"The Journal of Ad Hoc and Sensor Wireless Networks"},{"key":"ref244","first-page":"297","article-title":"Event-oriented data aggregation in wireless sensor networks","volume":"23","author":"guo","year":"2014","journal-title":"Ad Hoc Sensor Wireless Netw"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364828"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2016.11.022"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7248935"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2530716"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2009.4917495"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.04.052"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2244230"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120221"},{"key":"ref107","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1109\/TNET.2010.2041467","article-title":"Scaling laws for overlaid wireless networks: A cognitive radio network versus a primary network","volume":"18","author":"yin","year":"2010","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-016-0958-0"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2013.6583442"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838390"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557091"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370421"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2017.00068"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2772244"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632961"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2012.6227922"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2366729"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/INDCOMP.2014.7011743"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/PESGM.2014.6938910"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2014.2379618"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2017.01.043"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2642923"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2328098"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/APSIPA.2015.7415515"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6829957"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2707442"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5621973"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2014.2307452"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460445"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288113"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2318835"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491302"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2015.2483902"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2582778"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2415528"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2621060"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2679712"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2992"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2530058"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2462826"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.060912.00108"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2768568"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2553121"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2328098"},{"key":"ref122","first-page":"1","year":"2014","journal-title":"Understanding 5G Perspectives on Future Technological Advancements in Mobile"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2644760"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08480637.pdf?arnumber=8480637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:14:47Z","timestamp":1642004087000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8480637\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":260,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2872686","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}