{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T23:06:15Z","timestamp":1765667175970,"version":"3.41.0"},"reference-count":75,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/comst.2017.2707926","type":"journal-article","created":{"date-parts":[[2017,5,25]],"date-time":"2017-05-25T18:12:27Z","timestamp":1495735947000},"page":"2640-2661","source":"Crossref","is-referenced-by-count":48,"title":["Leveraging MANET-Based Cooperative Cache Discovery Techniques in VANETs: A Survey and Analysis"],"prefix":"10.1109","volume":"19","author":[{"given":"Steve","family":"Glass","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4461-7307","authenticated-orcid":false,"given":"Imad","family":"Mahgoub","sequence":"additional","affiliation":[]},{"given":"Monika","family":"Rathod","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Bond: Unifying mobile networks with named data","year":"2011","author":"meisel","key":"ref73"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6779007"},{"key":"ref71","first-page":"135","article-title":"Cache discovery policies of MANET","volume":"3","author":"salem","year":"2013","journal-title":"World Comput Sci Inf Technol"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2012.6206800"},{"key":"ref74","first-page":"21","article-title":"Proactive approach for cooperative caching in mobile adhoc networks","volume":"7","author":"kumar","year":"2010","journal-title":"Int J Comput Sci Issues"},{"journal-title":"Internet Protocol","year":"1981","key":"ref39"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.254"},{"journal-title":"802 11 Wireless Networks The Definitive Guide","year":"2002","author":"gast","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.33"},{"key":"ref32","first-page":"104","article-title":"Efficient cooperative caching in mobile ad-hoc networks","author":"chuang","year":"2013","journal-title":"Proc 2nd Int Conf Cloud-Comput Super-Comput (CCSC)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2010.16"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70770"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61520-913-2.ch008"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2015.000008"},{"journal-title":"IEEE Standard for Wireless Access in Vehicular Environments (WAVE)","year":"2009","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.01.020"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.127"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2012.12.013"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2010.5600138"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-2723-5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070118"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069467"},{"article-title":"File distribution and caching in MANET","year":"2003","author":"gianuzzi","key":"ref27"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.15"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970709"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.02.020"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-006-9238-z"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.18"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2012.6395884"},{"journal-title":"Feds Cars Must Be Able to Talk to Each Other","year":"2016","key":"ref2"},{"journal-title":"U S Department of Transportation issues advance notice of proposed rulemaking to begin implementation of vehicle-to-vehicle communications technology","year":"2014","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2420097"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.04.005"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2016.01.001"},{"key":"ref24","first-page":"829","article-title":"A survey of vehicular ad hoc networks routing protocols","volume":"3","author":"altayeb","year":"2013","journal-title":"Int J Innov Appl Stud"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090403"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36389-0_2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2371828"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2003.1207823"},{"journal-title":"Ad hoc on-demand distance vector (AODV) routing","year":"2003","key":"ref51"},{"key":"ref59","first-page":"23","article-title":"Group caching: A novel cooperative caching scheme for mobile ad hoc networks","volume":"6","author":"trambadiya","year":"2013","journal-title":"Int J Eng Research & Development"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2007.4"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1143549.1143821"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.07.007"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2003.818880"},{"key":"ref54","first-page":"2","article-title":"The BSD packet filter: A new architecture for user-level packet capture","author":"mccanne","year":"1993","journal-title":"Proc Usenix Winter Conf"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2003.1284147"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2006.94"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5120\/3689-5146"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSE.2012.6282317"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036797"},{"key":"ref12","first-page":"140","article-title":"Review on the simulation of cooperative caching schemes for MANETs","author":"ca\u00f1ete","year":"2014","journal-title":"Proc 2nd Int Conf Wireless Mobile Commun Syst (WMCS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090204"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916653"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref16","first-page":"1","article-title":"Scalable opportunistic VANET content routing with encounter information","author":"yu","year":"2013","journal-title":"Proc 21st IEEE Int Conf Netw Protocols (ICNP)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849267"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0066-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00063"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2009.5235305"},{"key":"ref3","first-page":"517","article-title":"Comparative study of VANET and MANET routing protocols","author":"ranjan","year":"2011","journal-title":"Proc Int Conf Adv Comput Commun Technol (ACCT)"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781107110649","author":"sommer","year":"2014","journal-title":"Vehicular Networking"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1232276"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2285611"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4625806"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2003.1286080"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/TDSC.2013.57","article-title":"Hiding in the mobile crowd: Location privacy through collaboration","volume":"11","author":"shokri","year":"2014","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2248361.2248369"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.110"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIT.2013.6621556"},{"key":"ref47","first-page":"185","article-title":"A coordinated cache data placement scheme for mobile ad hoc networks","author":"joy","year":"2013","journal-title":"Proc 5th Int Conf Adv Comput (ICoAC)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1859983.1859986"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IC-NC.2010.41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2136363"},{"key":"ref43","first-page":"1","article-title":"Listen first, broadcast later: Topology-agnostic forwarding under high dynamics","author":"meisel","year":"2010","journal-title":"Proc Annu Conf Int Technol Alliance Netw Inf Sci"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8115327\/07933944.pdf?arnumber=7933944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:15:35Z","timestamp":1750277735000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7933944\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":75,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2017.2707926","relation":{},"ISSN":["1553-877X"],"issn-type":[{"type":"electronic","value":"1553-877X"}],"subject":[],"published":{"date-parts":[[2017]]}}}