{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T09:49:02Z","timestamp":1748425742116,"version":"3.37.3"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300198"],"award-info":[{"award-number":["61300198"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong University Scientific Innovation","award":["2013KJCX0177","2014KTSCX188"],"award-info":[{"award-number":["2013KJCX0177","2014KTSCX188"]}]},{"name":"Education Department of Guangdong Province","award":["YQ2015158"],"award-info":[{"award-number":["YQ2015158"]}]},{"name":"Guangdong Provincial Science & Technology Plan","award":["2016A010101035"],"award-info":[{"award-number":["2016A010101035"]}]},{"name":"JSPS KAKENHI","award":["16K00117","15K15976","26730056"],"award-info":[{"award-number":["16K00117","15K15976","26730056"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/jsyst.2016.2569568","type":"journal-article","created":{"date-parts":[[2016,6,15]],"date-time":"2016-06-15T15:34:48Z","timestamp":1466004888000},"page":"1024-1033","source":"Crossref","is-referenced-by-count":10,"title":["Multiobjective Network Opportunistic Access for Group Mobility in Mobile Internet"],"prefix":"10.1109","volume":"12","author":[{"given":"Ming","family":"Tao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2788-3451","authenticated-orcid":false,"given":"Mianxiong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Kaoru","family":"Ota","sequence":"additional","affiliation":[]},{"given":"Zhimin","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424726"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEI.2011.6021759"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-008-0152-z"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6884094"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.02.003"},{"key":"ref15","first-page":"860","article-title":"Cell selection in two-tier femtocell networks with open\/closed access using evolutionary game","author":"feng","year":"0","journal-title":"Proc IEEE Wireless Commun Netw Conf"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.090513.122033"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-013-0437-z"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.01.009"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120513"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.01.002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567093"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1109\/MCOM.2015.7010527","article-title":"Distributed mobility management for future 5g networks: Overview and analysis of existing approaches","volume":"53","author":"fabio","year":"2015","journal-title":"Commun Mag"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.08.008"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1747-9"},{"key":"ref7","first-page":"64","article-title":"A comparative analysis of mobility-based lifetime-aware multicast routing protocols for manets","author":"guo","year":"0","journal-title":"Proc IPSJ Int Conf Mobile Comput Ubiquitous Netw"},{"key":"ref2","first-page":"351","article-title":"Secure route optimization for MIPv6 using enhanced CGA and DNSSEC","volume":"7","author":"angelo","year":"2013","journal-title":"Syst J"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2005.09.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-013-0603-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.12.007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2014.6903780"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-010-0303-x"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.03.015"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/8323440\/07492306.pdf?arnumber=7492306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:41:50Z","timestamp":1641987710000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7492306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":23,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2016.2569568","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"type":"print","value":"1932-8184"},{"type":"electronic","value":"1937-9234"},{"type":"electronic","value":"2373-7816"}],"subject":[],"published":{"date-parts":[[2018,3]]}}}