{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:22:10Z","timestamp":1768418530715,"version":"3.49.0"},"reference-count":60,"publisher":"SAGE Publications","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/100009042","name":"Universidad de Sevilla","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009042","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015]]},"abstract":"<jats:p>Disastrous events are one of the most challenging applications of multihop ad hoc networks due to possible damages of existing telecommunication infrastructure. The deployed cellular communication infrastructure might be partially or completely destroyed after a natural disaster. Multihop ad hoc communication is an interesting alternative to deal with the lack of communications in disaster scenarios. They have evolved since their origin, leading to different ad hoc paradigms such as MANETs, VANETs, DTNs, or WSNs. This paper presents a survey on multihop ad hoc network paradigms for disaster scenarios. It highlights their applicability to important tasks in disaster relief operations. More specifically, the paper reviews the main work found in the literature, which employed ad hoc networks in disaster scenarios. In addition, it discusses the open challenges and the future research directions for each different ad hoc paradigm.<\/jats:p>","DOI":"10.1155\/2015\/647037","type":"journal-article","created":{"date-parts":[[2015,10,4]],"date-time":"2015-10-04T17:07:04Z","timestamp":1443978424000},"page":"1-16","source":"Crossref","is-referenced-by-count":89,"title":["A Survey on Multihop Ad Hoc Networks for Disaster Response Scenarios"],"prefix":"10.1177","volume":"2015","author":[{"given":"D. G.","family":"Reina","sequence":"first","affiliation":[]},{"given":"M.","family":"Askalani","sequence":"additional","affiliation":[]},{"given":"S. L.","family":"Toral","sequence":"additional","affiliation":[]},{"given":"F.","family":"Barrero","sequence":"additional","affiliation":[]},{"given":"E.","family":"Asimakopoulou","sequence":"additional","affiliation":[]},{"given":"N.","family":"Bessis","sequence":"additional","affiliation":[]}],"member":"179","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.3166\/jds.16.143-172"},{"key":"3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1007\/978-3-642-29047-3_34","volume-title":"Lessons learned in using social media for disaster relief\u2014ASU crisis response game","volume":"7227","year":"2012"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.05.012"},{"key":"5","first-page":"89","volume-title":"The role of ad hoc networks in the internet of things","year":"2013"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1680\/udap.2008.161.4.183"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/mprv.2004.18"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-012-0113-3"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.10.004"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.02.097"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-013-1207-3"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.10.024"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.11.001"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06704-9_1"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21937-5_16"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.04.028"},{"key":"63","first-page":"727","volume-title":"A message priority routing protocol for Delay Tolerant Networks (DTN) in disaster areas","year":"2010"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.06.008"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2013.090413.121697"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2011.2159003"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2011.110314"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/651957"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.08.010"},{"key":"88","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/524543"},{"issue":"3","key":"92","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1061\/(ASCE)CP.1943-5487.0000033","volume":"24","year":"2010","journal-title":"Journal of Computing in Civil Engineering"},{"key":"96","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"97"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6710069"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/s1389-1286(01)00302-4"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2005.1404606"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2007.343616"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2007.343617"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/9781118511305.ch2"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/a:1013763825347"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/71.980024"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2006.876186"},{"key":"20","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.adhoc.2014.10.001","volume":"25","year":"2015","journal-title":"Ad Hoc Networks"},{"key":"21","series-title":"The Electrical Engineering Handbook Series","first-page":"127","volume-title":"Unicast routing techniques for mobile ad hoc networks","year":"2003"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.05.010"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2008.4625806"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2011.070711.00131"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2011.061411.00019"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5560597"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/896760"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2013.03.005"},{"key":"28","volume-title":"A survey of RFID data processing","year":"2013"},{"key":"29","year":"2004"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2009.5350367"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2008.4547517"},{"key":"35","series-title":"edited by: G. Quirchmayr, J. Basl, I. You, L. Xu, E. Weippl","year":"2012"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-013-0177-8"},{"key":"42","series-title":"edited by: C. E. Perkins","year":"2001"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961272"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2009.07.009"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2010.5395779"},{"key":"95","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2005.1458287"},{"key":"98","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-013-9466-1"},{"key":"101","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2013.05.009"},{"key":"102","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6807947"},{"key":"106","first-page":"355","volume-title":"MOVE: a practical simulator for mobility model in VANET","year":"2010"},{"key":"108","doi-asserted-by":"publisher","DOI":"10.1145\/1129582.1129588"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2015\/647037.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2015\/647037.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/647037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T02:25:01Z","timestamp":1509675901000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/ijdsn\/2015\/647037\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":60,"alternative-id":["647037","647037"],"URL":"https:\/\/doi.org\/10.1155\/2015\/647037","relation":{},"ISSN":["1550-1329","1550-1477"],"issn-type":[{"value":"1550-1329","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}