{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:32:06Z","timestamp":1772044326631,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,21]],"date-time":"2014-09-21T00:00:00Z","timestamp":1411257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,21]]},"DOI":"10.1145\/2642687.2642692","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"79-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Trust-aware opportunistic routing protocol for wireless networks"],"prefix":"10.1145","author":[{"given":"Mahmood","family":"Salehi","sequence":"first","affiliation":[{"name":"University of Ottawa, Ottawa, ON, Canada"}]},{"given":"Azzedine","family":"Boukerche","sequence":"additional","affiliation":[{"name":"University of Ottawa, Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2014,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972387"},{"key":"e_1_3_2_1_2_1","volume-title":"Opportunistic routing in wireless networks: Models, algorithms and classifications. Computing Surveys (ACM) (Accepted to appear","author":"Boukerche A.","year":"2014","unstructured":"A. Boukerche and A. Darehshoorzadeh . Opportunistic routing in wireless networks: Models, algorithms and classifications. Computing Surveys (ACM) (Accepted to appear in volume 47 , issue 2), 2014 . A. Boukerche and A. Darehshoorzadeh. Opportunistic routing in wireless networks: Models, algorithms and classifications. Computing Surveys (ACM) (Accepted to appear in volume 47, issue 2), 2014."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1582379.1582422"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508222.2508224"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2012.6314199"},{"key":"e_1_3_2_1_8_1","first-page":"11","volume-title":"Proceedings of 2007 Allerton Conference on Communication, Control, and Computing","volume":"5","author":"Dubois-Ferriere H.","year":"2007","unstructured":"H. Dubois-Ferriere , M. Grossglauser , and M. Vetterli . Least-cost opportunistic routing . In Proceedings of 2007 Allerton Conference on Communication, Control, and Computing , volume 5 , page 11 , 2007 . H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli. Least-cost opportunistic routing. In Proceedings of 2007 Allerton Conference on Communication, Control, and Computing, volume 5, page 11, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00038-6"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1362542.1362546"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-005-4454-4"},{"key":"e_1_3_2_1_12_1","first-page":"825","volume-title":"Wireless Communications and Networking Conference, 2004","volume":"2","author":"He Q.","year":"2004","unstructured":"Q. He , D. Wu , and P. Khosla . Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks . In Wireless Communications and Networking Conference, 2004 . WCNC. 2004 IEEE, volume 2 , pages 825 -- 830 Vol.2, March 2004. Q. He, D. Wu, and P. Khosla. Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE, volume 2, pages 825--830 Vol.2, March 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.06.021"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INMIC.2001.995315"},{"key":"e_1_3_2_1_15_1","series-title":"The Kluwer International Series in Engineering and Computer Science","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume-title":"Mobile Computing","author":"Johnson D.","year":"1996","unstructured":"D. Johnson and D. Maltz . Dynamic source routing in ad hoc wireless networks . In T. Imielinski and H. Korth, editors, Mobile Computing , volume 353 of The Kluwer International Series in Engineering and Computer Science , pages 153 -- 181 . Springer US , 1996 . D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. In T. Imielinski and H. Korth, editors, Mobile Computing, volume 353 of The Kluwer International Series in Engineering and Computer Science, pages 153--181. Springer US, 1996."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.226"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.01.018"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350376"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_3_2_1_20_1","unstructured":"S. Mccanne S. Floyd and K. Fall. ns2 (network simulator 2). http:\/\/www-nrg.ee.lbl.gov\/ns\/.  S. Mccanne S. Floyd and K. Fall. ns2 (network simulator 2). http:\/\/www-nrg.ee.lbl.gov\/ns\/."},{"key":"e_1_3_2_1_21_1","series-title":"IFIP AT The International Federation for Information Processing","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-0-387-35612-9_9","volume-title":"Advanced Communications and Multimedia Security","author":"Michiardi P.","year":"2002","unstructured":"P. Michiardi and R. Molva . Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks . In B. Jerman-Blazic and T. Klobucar, editors, Advanced Communications and Multimedia Security , volume 100 of IFIP AT The International Federation for Information Processing , pages 107 -- 121 . Springer US , 2002 . P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In B. Jerman-Blazic and T. Klobucar, editors, Advanced Communications and Multimedia Security, volume 100 of IFIP AT The International Federation for Information Processing, pages 107--121. Springer US, 2002."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/520551.837511"},{"key":"e_1_3_2_1_23_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1446","DOI":"10.1007\/978-3-540-24693-0_133","volume-title":"Networking","author":"Pissinou N.","year":"2004","unstructured":"N. Pissinou , T. Ghosh , and K. Makki . Collaborative trust-based secure routing in multihop ad hoc networks . In N. Mitrou, K. Kontovasilis, G. Rouskas, I. Iliadis, and L. Merakos, editors, Networking 2004 , volume 3042 of Lecture Notes in Computer Science , pages 1446 -- 1451 . Springer Berlin Heidelberg , 2004. N. Pissinou, T. Ghosh, and K. Makki. Collaborative trust-based secure routing in multihop ad hoc networks. In N. Mitrou, K. Kontovasilis, G. Rouskas, I. Iliadis, and L. Merakos, editors, Networking 2004, volume 3042 of Lecture Notes in Computer Science, pages 1446--1451. Springer Berlin Heidelberg, 2004."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.82"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A mathematical theory of evidence","author":"Shafer G.","year":"1976","unstructured":"G. Shafer . A mathematical theory of evidence , volume 1 . Princeton university press Princeton , 1976 . G. Shafer. A mathematical theory of evidence, volume 1. Princeton university press Princeton, 1976."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1811380.1811599"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2059690"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1215976.1215978"}],"event":{"name":"MSWiM'14: 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Montreal QC Canada","acronym":"MSWiM'14","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642687.2642692","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642687.2642692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:31Z","timestamp":1750231171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642687.2642692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,21]]},"references-count":28,"alternative-id":["10.1145\/2642687.2642692","10.1145\/2642687"],"URL":"https:\/\/doi.org\/10.1145\/2642687.2642692","relation":{},"subject":[],"published":{"date-parts":[[2014,9,21]]},"assertion":[{"value":"2014-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}