{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T04:26:08Z","timestamp":1774153568694,"version":"3.50.1"},"reference-count":104,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100003329","name":"Ministerio de Economia y Competitividad, Programa Estatal de Investigaci\u00f3n, Desarrollo e Innovaci\u00f3n Orientada a los Retos de la Sociedad, Proyectos I+D+I 2014, Spain","doi-asserted-by":"publisher","award":["TEC2014-52690-R"],"award-info":[{"award-number":["TEC2014-52690-R"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Universidad Laica Eloy Alfaro de Manab\u00ed"},{"name":"Secretar\u00eda Nacional de Educaci\u00f3n Superior, Ciencia, Tecnolog\u00eda e Innovaci\u00f3n, Ecuador"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/comst.2017.2782182","type":"journal-article","created":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T19:20:43Z","timestamp":1513020043000},"page":"1547-1573","source":"Crossref","is-referenced-by-count":84,"title":["Simulating Opportunistic Networks: Survey and Future Directions"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8422-265X","authenticated-orcid":false,"given":"Jens","family":"Dede","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5755-2672","authenticated-orcid":false,"given":"Anna","family":"Forster","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3284-561X","authenticated-orcid":false,"given":"Enrique","family":"Hernandez-Orallo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8673-0236","authenticated-orcid":false,"given":"Jorge","family":"Herrera-Tapia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6083-4048","authenticated-orcid":false,"given":"Koojana","family":"Kuladinithi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8583-7648","authenticated-orcid":false,"given":"Vishnupriya","family":"Kuppusamy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3753-0403","authenticated-orcid":false,"given":"Pietro","family":"Manzoni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9324-9192","authenticated-orcid":false,"given":"Anas","family":"bin Muslim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8159-5146","authenticated-orcid":false,"given":"Asanga","family":"Udugama","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5047-1175","authenticated-orcid":false,"given":"Zeynep","family":"Vatandas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2005.37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCNW.2009.5172935"},{"key":"ref33","first-page":"55","article-title":"Sumo&#x2013;simulation of urban mobility: An overview","author":"behrisch","year":"2011","journal-title":"Proc Int Conf Adv Syst Simulation (SIMUL)"},{"key":"ref32","author":"gloor","year":"2017","journal-title":"Legion Pedestrian Simulator"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1109\/TMC.2013.160","article-title":"Opportunistic communication and human mobility","volume":"13","author":"kouyoumdjieva","year":"2014","journal-title":"IEEE Trans Mobile Comput"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2010.8684"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1162654.1162657"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080142"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.72"},{"key":"ref34","first-page":"147","article-title":"A survey of mobility models","volume":"206","author":"bai","year":"2004","journal-title":"AdHoc Wireless Networking"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CAMAD.2014.7033202"},{"key":"ref29","author":"papanikos","year":"2015","journal-title":"Adyton A network simulator for opportunistic networks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2343627"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.020811.090163"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.12.091520"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4108\/icst.simutools.2011.245502"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2008.3050"},{"key":"ref101","year":"2017","journal-title":"Issue 13831049 Epidemic Routing Protocol Addition for Review"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2382016.2382022"},{"key":"ref100","year":"2008","journal-title":"Licklider Transmission Protocol"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263744"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1374688.1374695"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.94"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1460412.1460416","article-title":"The beta-factor: Improving bimodal wireless networks","author":"srinivasan","year":"2008","journal-title":"Proc ACM Conf Embedded Netw Sensor Syst (SenSys)"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1149283.1149287"},{"key":"ref57","author":"rappaport","year":"2001","journal-title":"Wireless Communications"},{"key":"ref56","author":"piorkowski","year":"2009","journal-title":"CRAWDAD dataset epfl\/mobility (v 2009-02-24)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.03.007"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6094021"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2005.10.003"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5578912"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20798-3_23"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2411335"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2419819"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231292"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2281262"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2375340"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.01.013"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00088"},{"key":"ref9","author":"le boudec","year":"2010","journal-title":"Performance Evaluation of Computer and Communication Systems"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2120618"},{"key":"ref45","first-page":"2106","article-title":"SWIM: A simple model to generate small mobile worlds","author":"mei","year":"2008","journal-title":"Proc IEEE InfoCom"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2068897.2068957"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.9.4.322-331"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462263"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.04.003"},{"key":"ref44","year":"2006","journal-title":"A Community Resource for Archiving Wireless Data"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7295476"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2011.6012487"},{"key":"ref72","year":"2014","journal-title":"Bluetooth Specification Version 4 0"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2012.6178212"},{"key":"ref70","year":"2017","journal-title":"IEEE 802 11 Wireless Local Area Networks&#x2014;The Working Group for WLAN Standards"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.3390\/s16091523"},{"key":"ref74","year":"2017","journal-title":"LoRa Alliance&#x2014;Wide Area Networks for IoT"},{"key":"ref75","year":"2017","journal-title":"SigFox"},{"key":"ref78","author":"richter","year":"2015","journal-title":"An Average WhatsApp User Sends Messages per Month"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145326"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICACT.2014.6778910"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1002\/0470095121"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2001.944886"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/74.924603","article-title":"Efficient ray-tracing methods for propagation prediction for indoor wireless communications","volume":"43","author":"ji","year":"2001","journal-title":"IEEE Antennas Propag Mag"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2453991"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2030718.2030746"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1868589.1868606"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2159576.2159581"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/958503.958506"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.03.019"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1298126.1298155"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1500527CM"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2014.6962142"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374653"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061994"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2007.108"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.172"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2015.7366801"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288113"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/2534303.2534304"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2756509.2756523"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"ref99","year":"2007","journal-title":"Bundle protocol specification"},{"key":"ref96","year":"2012","journal-title":"Probabilistic routing protocol for intermittently connected networks"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015484"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409955"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2030652.2030656"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195502"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.07.018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.863461"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.028"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.12.013"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/VPPC.2007.4544139"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2414792"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2009.0001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.07.006"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1002\/9781118511305"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.897964"},{"key":"ref83","first-page":"154","article-title":"Battery lifetime prediction for energy-aware computing","author":"rakhmatov","year":"2002","journal-title":"Proc Int Symp Low Power Electron Design"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_7"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.246"},{"key":"ref85","first-page":"1","article-title":"Epidemic routing for partially connected ad hoc networks","author":"vahdat","year":"2000"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892324"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27767-5_24"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080143"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8362823\/08183438.pdf?arnumber=8183438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:22:17Z","timestamp":1642004537000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8183438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":104,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/comst.2017.2782182","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}