{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:29:32Z","timestamp":1761611372323},"reference-count":99,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/jsyst.2015.2436927","type":"journal-article","created":{"date-parts":[[2015,7,13]],"date-time":"2015-07-13T18:40:51Z","timestamp":1436812851000},"page":"2749-2760","source":"Crossref","is-referenced-by-count":29,"title":["Cooperative Strategies for Challenged Networks and Applications: A Survey"],"prefix":"10.1109","volume":"11","author":[{"given":"Bruno M. C.","family":"Silva","sequence":"first","affiliation":[]},{"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Guangjie","family":"Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"buttyan","year":"2001","journal-title":"Nuglets A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/TMC.2011.151","article-title":"Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks","volume":"11","author":"shen","year":"2012","journal-title":"IEEE Trans Mobile Comput"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/367097"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/814278"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/707839"},{"key":"ref30","first-page":"74","article-title":"Cooperative communications in wireless networks","volume":"42","author":"cottatellucci","year":"2004","journal-title":"EURASIP J Wireless Commun Netw"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2011.5898989"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-328-6_3"},{"key":"ref35","author":"corson","year":"0","journal-title":"Mobile ad hoc networking (MANET) Routing protocol performance issues and evaluation considerations"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/295418"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/598140"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/972739"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070210"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1561\/1300000004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.06.020"},{"key":"ref21","article-title":"Game theory in wireless networks: A tutorial","author":"felegyhazi","year":"2007"},{"key":"ref24","first-page":"4175","article-title":"Symmetrical cooperative strategies in wireless networks: A cooperative game approach","author":"kai","year":"0","journal-title":"Proceedings of the 29th CCC"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/636159"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/368752"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2010.11.006"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2009.5394122"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1036"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185475"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1177\/002200278002400101"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1190195.1190197"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287865"},{"key":"ref53","first-page":"825","article-title":"SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks","volume":"2","author":"he","year":"0","journal-title":"Proc IEEE WCNC"},{"key":"ref52","article-title":"Observation-based cooperation enforcement in ad hoc networks","author":"bansal","year":"0","journal-title":"CoRR"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"ref4","first-page":"1","article-title":"An efficient pricing based protocol for broadcasting in wireless ad hoc networks","author":"rama suri","year":"0","journal-title":"Proc 1st Int Conf Middleware Comsware"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2501"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2012.6314323"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4838"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503532"},{"key":"ref49","first-page":"139","article-title":"DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks","author":"johnson","year":"2001","journal-title":"Ad Hoc Networking"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05218-2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24747-0_6"},{"key":"ref46","first-page":"1","article-title":"Priority forwarding in ad hoc networks with self-interested parties","author":"raghavan","year":"0","journal-title":"Proc Workshop Econ Peer-to-Peer Syst"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2008.12.002"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869216"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45126-6_2"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/939010.939011"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2004.03.003"},{"key":"ref73","author":"vahdat","year":"2000","journal-title":"Epidemic Routing for Partially Connected Ad Hoc Networks"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869228"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2004.1381922"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4838"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282422"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1002\/9781119973584.ch7"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/1080139.1080143"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.228"},{"key":"ref78","first-page":"1","article-title":"Selfish and malicious behavior in delay-tolerant networks","author":"magaia","year":"0","journal-title":"Future Network Summit"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2007.382571"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.161"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120211"},{"key":"ref61","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1109\/TMC.2011.127","article-title":"Energy-Efficient Cooperative Video Distribution with Statistical QoS Provisions Over Wireless Networks","volume":"11","author":"Khalek","year":"2012","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.1458287"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2059720"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2014812"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5762798"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2008.33"},{"key":"ref68","year":"0","journal-title":"Google Maps API"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2182095"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.2008853"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2013.6549255"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2010.36"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22450-8_14"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.12.091520"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT.2011.6182449"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683337"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"4628","DOI":"10.1109\/TVT.2009.2020105","article-title":"Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks","volume":"58","author":"zhu","year":"2009","journal-title":"IEEE Trans Veh Technol"},{"key":"ref98","first-page":"207","article-title":"The challenge of creating cooperating mobile services: Experiences and lessons learned","volume":"48","author":"hinze","year":"0","journal-title":"Proceedings of the 29th ACSC"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019197320544"},{"key":"ref96","first-page":"517","article-title":"Challenges to mobile ad hoc cooperation design","volume":"1","author":"zhang","year":"0","journal-title":"Proc 8th Int Conf Comput Supported Cooperative Work Des"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1002\/9780470740071"},{"key":"ref10","first-page":"73","article-title":"Balancing trust and incentive in peer-to-peer collaborative system","volume":"5","author":"zhang","year":"2007","journal-title":"Int J Security Netw"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2007.13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025146013151"},{"key":"ref13","author":"kramer","year":"2007","journal-title":"Cooperative Communications (Foundations and Trends in Networking)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2011.5872935"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2010.5478815"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1109\/TIT.2005.864421","article-title":"The three-node wireless network: Achievable rates and cooperation strategies","volume":"52","author":"lai","year":"2006","journal-title":"IEEE Trans Inf Theory"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPS.2010.5555572"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SCVT.2012.6399398"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.58"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070223"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2006.1678169"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961272"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2008.4697042"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.68"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2013.6645025"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684271"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/EW.2010.5483523"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462136"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/8118221\/07155467.pdf?arnumber=7155467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T02:35:08Z","timestamp":1633919708000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7155467\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":99,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2015.2436927","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"},{"value":"2373-7816","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}