{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T11:22:53Z","timestamp":1777634573073,"version":"3.51.4"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2016,8,24]],"date-time":"2016-08-24T00:00:00Z","timestamp":1471996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Government of Russian Federation","award":["Grant 074- U01"],"award-info":[{"award-number":["Grant 074- U01"]}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","award":["UID\/EEA\/500008\/2013 Project"],"award-info":[{"award-number":["UID\/EEA\/500008\/2013 Project"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2016,8,24]]},"abstract":"<jats:p>Network architectures based on mobile devices and wireless communications present several constraints (e.g., processor, energy storage, bandwidth, etc.) that affect the overall network performance. Cooperation strategies have been considered as a solution to address these network limitations. In the presence of unstable network infrastructures, mobile nodes cooperate with each other, forwarding data and performing other specific network functionalities. This article proposes a generalized incentive-based cooperation solution for mobile services and applications called MobiCoop. This reputation-based scheme includes an application framework for mobile applications that uses a Web service to handle all the nodes reputation and network permissions. The main goal of MobiCoop is to provide Internet services to mobile devices without network connectivity through cooperation with neighbor devices. The article includes a performance evaluation study of MobiCoop considering both a real scenario (using a prototype) and a simulation-based study. Results show that the proposed approach provides network connectivity independency to users with mobile apps when Internet connectivity is unavailable. Then, it is concluded that MobiCoop improved significantly the overall system performance and the service provided for a given mobile application.<\/jats:p>","DOI":"10.1145\/2957752","type":"journal-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:25:39Z","timestamp":1472214339000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["MobiCoop"],"prefix":"10.1145","volume":"12","author":[{"given":"Bruno M. C.","family":"Silva","sequence":"first","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Universidade da Beira Interior, Covilh\u00e3, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-3800","authenticated-orcid":false,"given":"Joel J. P. C.","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica\u00e7\u00f5es, Universidade da Beira Interior, Covilh\u00e3, Portugal; University of Fortaleza (UNIFOR), Cear\u00e1, Brazil; University ITMO, St. Petersburg, Russia"}]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[{"name":"Thapar University, Patiala (Punjab), India"}]},{"suffix":"Jr.","given":"Mario L.","family":"Proen\u00e7a","sequence":"additional","affiliation":[{"name":"State University of Londrina (UEL), Brazil"}]},{"given":"Guangjie","family":"Han","sequence":"additional","affiliation":[{"name":"Hohai University, China, Changzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2016,8,24]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6655263"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2010.5478815"},{"key":"e_1_2_1_3_1","volume-title":"User-Centric Networking: Future Perspectives","author":"Aldini Alessandro","unstructured":"Alessandro Aldini and Alessandro Bogliolo . 2014. User-Centric Networking: Future Perspectives . Springer , Berlin . Alessandro Aldini and Alessandro Bogliolo. 2014. User-Centric Networking: Future Perspectives. Springer, Berlin."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCVT.2012.6399398"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6503581"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.120713.120790"},{"key":"e_1_2_1_7_1","unstructured":"Sorav Bansal and Mary Baker. 2003. Observation-based Cooperation Enforcement in Ad hoc Networks. (2003).  Sorav Bansal and Mary Baker. 2003. Observation-based Cooperation Enforcement in Ad hoc Networks. (2003)."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/584051.584056"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025146013151"},{"key":"e_1_2_1_12_1","doi-asserted-by":"crossref","unstructured":"V. Cerf S. Burleigh A. Hooke L. Torgerson R. Durst K. Scott K. Fall and H. Weiss. 2007. Delay-Tolerant Networking Architecture. RFC 4838 (Informational). (April 2007). http:\/\/www.ietf.org\/rfc\/rfc4838.txt.  V. Cerf S. Burleigh A. Hooke L. Torgerson R. Durst K. Scott K. Fall and H. Weiss. 2007. Delay-Tolerant Networking Architecture. RFC 4838 (Informational). (April 2007). http:\/\/www.ietf.org\/rfc\/rfc4838.txt.","DOI":"10.17487\/rfc4838"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.06.020"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2013.6645025"},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"S. Corson and J. Macker. 1999. Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. (1999). http:\/\/www.ietf.org\/rfc\/rfc4838.txt.  S. Corson and J. Macker. 1999. Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. (1999). http:\/\/www.ietf.org\/rfc\/rfc4838.txt.","DOI":"10.17487\/rfc2501"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7355571"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2425357"},{"key":"e_1_2_1_19_1","volume-title":"18th International Conference on Telecommunications (ICT","author":"Lofti Froushani M. H.","year":"2011","unstructured":"M. H. Lofti Froushani , B. H. Khalaj , and S. Vakilinia . 2011. A novel approach to incentive-based cooperation in wireless ad hoc networks . In 18th International Conference on Telecommunications (ICT 2011 ). Ayia Napa, Cyprus, 78--83. M. H. Lofti Froushani, B. H. Khalaj, and S. Vakilinia. 2011. A novel approach to incentive-based cooperation in wireless ad hoc networks. In 18th International Conference on Telecommunications (ICT 2011). Ayia Napa, Cyprus, 78--83."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2010.11.006"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.039"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2015.42"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.07.012"},{"key":"e_1_2_1_24_1","volume-title":"IEEE Wireless Communications and Networking Conference (WCNC 2004","volume":"2","author":"He Qi","year":"2004","unstructured":"Qi He , Dapeng Wu , and Pradeep Khosla . 2004 . SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks . In IEEE Wireless Communications and Networking Conference (WCNC 2004 ), Vol. 2 . Atlanta, Georgia, USA, 825--830 Vol.2. DOI:http:\/\/dx.doi.org\/10.1109\/WCNC.2004.1311293 10.1109\/WCNC.2004.1311293 Qi He, Dapeng Wu, and Pradeep Khosla. 2004. SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In IEEE Wireless Communications and Networking Conference (WCNC 2004), Vol. 2. Atlanta, Georgia, USA, 825--830 Vol.2. DOI:http:\/\/dx.doi.org\/10.1109\/WCNC.2004.1311293"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/EW.2010.5483523"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556942"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185475"},{"key":"e_1_2_1_28_1","volume-title":"Guide to Wireless Ad Hoc Networks","author":"Hu Jiangyi","unstructured":"Jiangyi Hu and Mike Burmester . 2009. Cooperation in mobile ad hoc networks . In Guide to Wireless Ad Hoc Networks . Springer , London , 43--57. DOI:http:\/\/dx.doi.org\/10.1007\/978-1-84800-328-6_3 10.1007\/978-1-84800-328-6_3 Jiangyi Hu and Mike Burmester. 2009. Cooperation in mobile ad hoc networks. In Guide to Wireless Ad Hoc Networks. Springer, London, 43--57. DOI:http:\/\/dx.doi.org\/10.1007\/978-1-84800-328-6_3"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287865"},{"key":"e_1_2_1_30_1","first-page":"6","article-title":"Technology trends and architecture research for future mobile internet","volume":"10","author":"Jianping Wu","year":"2013","unstructured":"Wu Jianping , Li Hewu , Sun Wenqi , Wu Qian , Jiang Zhuo , and Zhao Wei . 2013 . Technology trends and architecture research for future mobile internet . IEEE China Commun. 10 , 6 (June 2013), 14--27. DOI:http:\/\/dx.doi.org\/10.1109\/CC.2013.6549255 10.1109\/CC.2013.6549255 Wu Jianping, Li Hewu, Sun Wenqi, Wu Qian, Jiang Zhuo, and Zhao Wei. 2013. Technology trends and architecture research for future mobile internet. IEEE China Commun. 10, 6 (June 2013), 14--27. DOI:http:\/\/dx.doi.org\/10.1109\/CC.2013.6549255","journal-title":"IEEE China Commun."},{"key":"e_1_2_1_31_1","doi-asserted-by":"crossref","unstructured":"J. Jonsson and B. Kaliski. 2003. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. (2003).  J. Jonsson and B. Kaliski. 2003. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. (2003).","DOI":"10.17487\/rfc3447"},{"key":"e_1_2_1_32_1","volume-title":"29th IEEE Chinese Control Conference (CCC","author":"Kai Ma","year":"2010","unstructured":"Ma Kai , Guan Xinping , and Zhao Bin . 2010 . Symmetrical cooperative strategies in wireless networks: A cooperative game approach . In 29th IEEE Chinese Control Conference (CCC 2010). Beijing, China, 4175--4179. Ma Kai, Guan Xinping, and Zhao Bin. 2010. Symmetrical cooperative strategies in wireless networks: A cooperative game approach. In 29th IEEE Chinese Control Conference (CCC 2010). Beijing, China, 4175--4179."},{"key":"e_1_2_1_33_1","volume-title":"The ONE: The Opportunistic Network Environment simulator. (April","author":"Ker\u00e4nen Ari","year":"2016","unstructured":"Ari Ker\u00e4nen , Teemu K\u00e4rkk\u00e4inen , Mikko Pitk\u00e4nen , Frans Ekman , Jouni Karvo , and J\u00f6rg Ott . 2016. The ONE: The Opportunistic Network Environment simulator. (April 2016 ). https:\/\/akeranen.github.io\/the-one\/. Ari Ker\u00e4nen, Teemu K\u00e4rkk\u00e4inen, Mikko Pitk\u00e4nen, Frans Ekman, Jouni Karvo, and J\u00f6rg Ott. 2016. The ONE: The Opportunistic Network Environment simulator. (April 2016). https:\/\/akeranen.github.io\/the-one\/."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2014812"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/598140"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1561\/1300000004"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.864421"},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/MWC.2013.6549281","article-title":"Challenges on wireless heterogeneous networks for mobile cloud computing","volume":"20","author":"Lei Lei","year":"2013","unstructured":"Lei Lei , Zhangdui Zhong , Kan Zheng , Jiadi Chen , and Hanlin Meng . 2013 . Challenges on wireless heterogeneous networks for mobile cloud computing . IEEE Wireless Commun. 20 , 3 (June 2013), 34--44. DOI:http:\/\/dx.doi.org\/10.1109\/MWC.2013.6549281 10.1109\/MWC.2013.6549281 Lei Lei, Zhangdui Zhong, Kan Zheng, Jiadi Chen, and Hanlin Meng. 2013. Challenges on wireless heterogeneous networks for mobile cloud computing. IEEE Wireless Commun. 20, 3 (June 2013), 34--44. DOI:http:\/\/dx.doi.org\/10.1109\/MWC.2013.6549281","journal-title":"IEEE Wireless Commun."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/WOCN.2011.5872935"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.68"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070210"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2009.5394122"},{"key":"e_1_2_1_43_1","first-page":"1","article-title":"Selfish and malicious behavior in delay-tolerant networks","volume":"2013","author":"Magaia N.","year":"2013","unstructured":"N. Magaia , P. Rogerio Pereira , and M. P. Correia . 2013 . Selfish and malicious behavior in delay-tolerant networks . In Future Network and Mobile Summit (FutureNetworkSummit) , 2013. 1 -- 10 . N. Magaia, P. Rogerio Pereira, and M. P. Correia. 2013. Selfish and malicious behavior in delay-tolerant networks. In Future Network and Mobile Summit (FutureNetworkSummit), 2013. 1--10.","journal-title":"Future Network and Mobile Summit (FutureNetworkSummit)"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/647802.737297"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICT.2012.6398495"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/972739"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.1458287"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.Workshops.2008.58"},{"key":"e_1_2_1_49_1","volume-title":"Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC 3962 (Proposed Standard). (February","author":"Raeburn K.","year":"2005","unstructured":"K. Raeburn . 2005. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC 3962 (Proposed Standard). (February 2005 ). http:\/\/www.ietf.org\/rfc\/rfc3962.txt. K. Raeburn. 2005. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC 3962 (Proposed Standard). (February 2005). http:\/\/www.ietf.org\/rfc\/rfc3962.txt."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2182095"},{"key":"e_1_2_1_51_1","doi-asserted-by":"crossref","unstructured":"R. Rivest. 1992. The MD5 Message-Digest Algorithm. (1992).  R. Rivest. 1992. The MD5 Message-Digest Algorithm. (1992).","DOI":"10.17487\/rfc1321"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490825"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2008.33"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.151"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2059720"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2008.4697042"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513003"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2498"},{"key":"e_1_2_1_59_1","volume-title":"Rodrigues","author":"Soares Vasco N. G. J.","year":"2011","unstructured":"Vasco N. G. J. Soares and Joel J. P. C . Rodrigues . 2011 . Cooperative Networking. Wiley , Chapter Cooperation in DTN-Based Network Architectures, 101--115. Vasco N. G. J. Soares and Joel J. P. C. Rodrigues. 2011. Cooperative Networking. Wiley, Chapter Cooperation in DTN-Based Network Architectures, 101--115."},{"key":"e_1_2_1_60_1","volume-title":"Robust nash dynamic game strategy for user cooperation energy efficiency in wireless cellular networks. Math. Probl. Eng. 2012","author":"Wen Shuhuan","year":"2012","unstructured":"Shuhuan Wen , Baozhu Hu , Ahmad B. Rad , Xinbin Li , Huibin Lu , and Jianhua Zhang . 2012. Robust nash dynamic game strategy for user cooperation energy efficiency in wireless cellular networks. Math. Probl. Eng. 2012 ( 2012 ). Shuhuan Wen, Baozhu Hu, Ahmad B. Rad, Xinbin Li, Huibin Lu, and Jianhua Zhang. 2012. Robust nash dynamic game strategy for user cooperation energy efficiency in wireless cellular networks. Math. Probl. Eng. 2012 (2012)."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5762798"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.2008853"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPS.2010.5555572"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.161"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/368752"},{"key":"e_1_2_1_66_1","volume-title":"IEEE Societies 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM 2003","volume":"3","author":"Zhong S.","year":"1987","unstructured":"S. Zhong , J. Chen , and Y. R. Yang . 2003. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks . In IEEE Societies 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM 2003 ), Vol. 3 . 1987 --1997 vol.3. DOI:http:\/\/dx.doi.org\/10.1109\/INFCOM.2003.1209220 10.1109\/INFCOM.2003.1209220 S. Zhong, J. Chen, and Y. R. Yang. 2003. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In IEEE Societies 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM 2003), Vol. 3. 1987--1997 vol.3. DOI:http:\/\/dx.doi.org\/10.1109\/INFCOM.2003.1209220"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2957752","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2957752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:30Z","timestamp":1750220610000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2957752"}},"subtitle":["An Incentive-Based Cooperation Solution for Mobile Applications"],"short-title":[],"issued":{"date-parts":[[2016,8,24]]},"references-count":64,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,8,24]]}},"alternative-id":["10.1145\/2957752"],"URL":"https:\/\/doi.org\/10.1145\/2957752","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,24]]},"assertion":[{"value":"2015-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}