{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T03:48:31Z","timestamp":1747194511320,"version":"3.40.5"},"reference-count":24,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,5]]},"abstract":"<jats:p> In this study, we propose a contribution-level-based opportunistic flooding for multihop wireless networks. Traditional flooding techniques typically use fixed routing and predetermined relay nodes based on the assumption of fixed and reliable links. However, because of the inherent instability of wireless links, these approaches typically lead to fragile and unreliable broadcasting. To overcome this problem, we adopt an opportunistic routing where the relay node is determined by the transmission result. In addition, we introduce a new criterion: a contribution level defined as packet infectiousness, and it represents the transmission priority. Namely, contribution level implies the degree of contagiosity determined by the distribution of uninfected entities. It also falls with an increase in the number of infected entities. Thus, the contribution level of a node is initially determined by the number of neighbors and distances to the neighbors. Once a node receives a packet, it waits a certain amount of time according to the initial priority. The node changes its own contribution level when it overhears a packet while waiting. If the contribution level reaches near zero, it discards the received packet such that unnecessary duplicates are removed. Consequently, higher reliability and efficiency can be achieved. <\/jats:p>","DOI":"10.1177\/1550147718778200","type":"journal-article","created":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T14:05:26Z","timestamp":1527689126000},"page":"155014771877820","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["CLOF: Contribution-level-based opportunistic flooding for multihop wireless networks"],"prefix":"10.1177","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5128-8495","authenticated-orcid":false,"given":"Seunggyu","family":"Byeon","sequence":"first","affiliation":[{"name":"School of Electrical and Computer Engineering, Pusan National University, Busan, Republic of Korea"}]},{"given":"Sejin","family":"Park","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Pusan National University, Busan, Republic of Korea"}]},{"given":"Hyung-Yoon","family":"Seo","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Pusan National University, Busan, Republic of Korea"}]},{"given":"Jong-Deok","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Electrical and Computer Engineering, Pusan National University, Busan, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2018,5,30]]},"reference":[{"key":"bibr1-1550147718778200","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00233-4"},{"volume-title":"Proceedings of the 1st ACM international symposium on mobile ad hoc networking & computing","author":"Peng W","key":"bibr2-1550147718778200"},{"key":"bibr4-1550147718778200","doi-asserted-by":"publisher","DOI":"10.1007\/BF02950416"},{"key":"bibr5-1550147718778200","first-page":"529","volume":"12","author":"Peng W","year":"2001","journal-title":"J Software"},{"key":"bibr6-1550147718778200","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972387"},{"key":"bibr7-1550147718778200","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080108"},{"volume-title":"Proceedings of the IEEE 6th international conference on mobile adhoc and sensor systems, 2009 (MASS\u201909)","author":"Li Y","key":"bibr8-1550147718778200"},{"volume-title":"Proceedings of the 9th ACM international symposium on mobile ad hoc networking and computing","author":"Zhang X","key":"bibr9-1550147718778200"},{"key":"bibr10-1550147718778200","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282400"},{"key":"bibr11-1550147718778200","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.82"},{"key":"bibr12-1550147718778200","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.092711.101713"},{"volume-title":"Proceedings of the international conference on ultra modern telecommunications & workshops, 2009 (ICUMT\u201909)","author":"Cacciapuoti AS","key":"bibr13-1550147718778200"},{"issue":"7","key":"bibr14-1550147718778200","first-page":"359","volume":"4","author":"Subramanian JV","year":"2012","journal-title":"Wirel Commun"},{"volume-title":"Proceedings of the 2012 3rd international conference on networking and distributed computing (ICNDC)","author":"Zhizhong J","key":"bibr15-1550147718778200"},{"volume-title":"Proceedings of the 2013 international conference on computing, networking and communications (ICNC)","author":"Wong GKW","key":"bibr16-1550147718778200"},{"key":"bibr17-1550147718778200","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2374071"},{"issue":"2","key":"bibr18-1550147718778200","first-page":"170","volume":"3","author":"Trivi\u00f1o-Cabrera A","year":"2011","journal-title":"Int J Comm Network Inform Secur"},{"key":"bibr19-1550147718778200","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.03.076"},{"volume-title":"Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing","author":"Williams B","key":"bibr20-1550147718778200"},{"volume-title":"Proceedings of the IEEE 6th international conference on mobile adhoc and sensor systems, 2009 (MASS\u201909)","author":"Li M","key":"bibr21-1550147718778200"},{"key":"bibr22-1550147718778200","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.142"},{"volume":"1","volume-title":"Proceedings of the 1999 IEEE 49th vehicular technology conference","author":"Sohrabi K","key":"bibr24-1550147718778200"},{"key":"bibr25-1550147718778200","volume":"2","author":"Rappaport TS","year":"1996","journal-title":"Wireless communications: principles and practice"},{"key":"bibr26-1550147718778200","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1255648"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718778200","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718778200","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718778200","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T06:49:40Z","timestamp":1607323780000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718778200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["10.1177\/1550147718778200"],"URL":"https:\/\/doi.org\/10.1177\/1550147718778200","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}