{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T14:39:14Z","timestamp":1759588754446},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,8,28]],"date-time":"2014-08-28T00:00:00Z","timestamp":1409184000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/1687-1499-2014-141","type":"journal-article","created":{"date-parts":[[2014,8,28]],"date-time":"2014-08-28T01:01:49Z","timestamp":1409187709000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Integrated social network reputation inspired routing for effective data forwarding"],"prefix":"10.1186","volume":"2014","author":[{"given":"Femilda Josephin Joseph","family":"Shobana","sequence":"first","affiliation":[]},{"given":"Ramaraj","family":"Narayanasamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,28]]},"reference":[{"issue":"12","key":"963_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPROC.2013.2257631","volume":"101","author":"M Li","year":"2013","unstructured":"Li M, Zhenjiang L, Vasilakos AV: A survey on topology control in wireless sensor networks: taxonomy, comparative study, and open issues. Proc. IEEE 2013, 101(12):1-20.","journal-title":"Proc. IEEE"},{"key":"963_CR2","first-page":"297","volume":"3","author":"A Vasilakos","year":"2003","unstructured":"Vasilakos A, Saltouros MP, Atlassis AF, Pedrycz W IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 33. Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques 2003, 3: 297-312.","journal-title":"Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques"},{"issue":"8","key":"963_CR3","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1007\/s11276-010-0276-9","volume":"16","author":"T Spyropoulos","year":"2010","unstructured":"Spyropoulos T, Rais RN, Turletti T, Obraczka K, Vasilakos A: Routing for disruption tolerant networks: taxonomy and design. Wirel. Netw 2010, 16(8):2349-2370. 10.1007\/s11276-010-0276-9","journal-title":"Wirel. Netw"},{"key":"963_CR4","volume-title":"Delay Tolerant Networks: Protocols and Applications","year":"2012","unstructured":"Vasilakos AV, Zhang Y, Spyropoulos T (Eds): Delay Tolerant Networks: Protocols and Applications. CRC Press; 2012."},{"key":"963_CR5","first-page":"182","volume-title":"EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Wireless Sensor Networks","author":"Y Yao","year":"2013","unstructured":"Yao Y, Cao Q, Vasilakos AV IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS). EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Wireless Sensor Networks 2013, 182-190."},{"key":"963_CR6","first-page":"51","volume":"7","author":"K Han","year":"2013","unstructured":"Han K, Luo J, Liu Y, Vasilakos AV: Algorithm design for data communications in duty-cycled wireless sensor networks: a survey, communications magazine. IEEE 2013, 7: 51.","journal-title":"IEEE"},{"issue":"12","key":"963_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPROC.2013.2262913","volume":"101","author":"G Acampora","year":"2013","unstructured":"Acampora G, Cook DJ, Rashidi P, Vasilakos AV: A survey on ambient intelligence in healthcare. Proc. IEEE 2013, 101(12):1-25.","journal-title":"Proc. IEEE"},{"key":"963_CR8","first-page":"62","volume-title":"Privacy-Enhanced Social Network Routing, Computer Communications","author":"I Parris","year":"2012","unstructured":"Parris I, Henderson T: Privacy-Enhanced Social Network Routing, Computer Communications. Volume 1. 35th edition. Elsevier; 2012:62-74.","edition":"35"},{"key":"963_CR9","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-0-387-71058-7_5","volume-title":"Mobile Wireless Network Secur. Privacy","author":"L Lilien","year":"2007","unstructured":"Lilien L, Kamal ZH, Bhuse V, Gupta A: The concept of opportunistic networks and their research challenges in privacy and security. Mobile Wireless Network Secur. Privacy 2007, 85-117."},{"key":"963_CR10","first-page":"100","volume":"108","author":"P Li","year":"2012","unstructured":"Li P, Guo S, Yu S, Vasilakos AV: CodePipe: an opportunistic feeding and routing protocol for reliable multicast with pipelined network coding, INFOCOM. Proc. IEEE 2012, 108: 100-108.","journal-title":"Proc. IEEE"},{"issue":"4","key":"963_CR11","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2011.01.018","volume":"11","author":"N Li","year":"2013","unstructured":"Li N, Das SK: A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Netw. 2013, 11(4):1497-1509. 10.1016\/j.adhoc.2011.01.018","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"963_CR12","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/TITB.2012.2194788","volume":"16","author":"D He","year":"2012","unstructured":"He D, Chen C, Chan S, Bu J, Vasilakos AV: ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. 2012, 16(4):623-632.","journal-title":"IEEE Trans. Inf. Technol. Biomed"},{"issue":"6","key":"963_CR13","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1109\/TITB.2012.2199996","volume":"16","author":"D He","year":"2012","unstructured":"He D, Chen C, Chan S, Bu J, Vasilakos AV: A distributed trust evaluation model and its application scenarios for medical sensor networks. Inf. Technol. Biomed. IEEE Trans. 2012, 16(6):1164-1175.","journal-title":"Inf. Technol. Biomed. IEEE Trans"},{"issue":"6","key":"963_CR14","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2013.6704479","volume":"20","author":"S Zhengguo","year":"2013","unstructured":"Zhengguo S, Yang S, Yu Y, Vasilakos AV, McCann JA, Leung KK: A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities. Wireless Commun. IEEE 2013, 20(6):91-98.","journal-title":"Wireless Commun. IEEE"},{"key":"963_CR15","first-page":"1","volume-title":"Routing Metrics of Cognitive Radio Networks: A Survey","author":"Y Moustafa","year":"2013","unstructured":"Moustafa Y, Ibrahim M, Abdelatif M, Chen L, Vasilakos A: Routing Metrics of Cognitive Radio Networks: A Survey. 2013, 1-18."},{"issue":"5","key":"963_CR16","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.future.2010.03.006","volume":"27","author":"Y Liu","year":"2011","unstructured":"Liu Y, Li K, Jin Y, Zhang Y, Qu W: A novel reputation computation model based on subjective logic for mobile ad hoc networks. Futur. Gener. Comput. Syst. 2011, 27(5):547-554. 10.1016\/j.future.2010.03.006","journal-title":"Futur. Gener. Comput. Syst"},{"key":"963_CR17","first-page":"65","volume-title":"IRONMAN: Using Social Networks to Add Incentives and Reputation to Opportunistic Networks, Rivacy, Security, Risk And Trust (Passat)","author":"G Bigwood","year":"2011","unstructured":"Bigwood G, Henderson T 2011 IEEE third international conference on and 2011 ieee third international conference on social computing (socialcom). In IRONMAN: Using Social Networks to Add Incentives and Reputation to Opportunistic Networks, Rivacy, Security, Risk And Trust (Passat). IEEE, MIT, Boston, USA; 2011:65-72."},{"issue":"2","key":"963_CR18","first-page":"64","volume":"7","author":"Q Li","year":"2012","unstructured":"Li Q, Cao G: Mitigating routing misbehavior in disruption tolerant networks. Inf. Forensics Secur. IEEE Trans. 2012, 7(2):64-675.","journal-title":"Inf. Forensics Secur. IEEE Trans"},{"issue":"7","key":"963_CR19","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1016\/j.adhoc.2012.03.003","volume":"10","author":"G Dini","year":"2012","unstructured":"Dini G, Lo Duca A: Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Ad Hoc Netw. 2012, 10(7):1167-1178. 10.1016\/j.adhoc.2012.03.003","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"963_CR20","first-page":"671","volume":"2","author":"I Ahmedy","year":"2012","unstructured":"Ahmedy I, Ngadi MA, Omar SN: Using store-forward technique to conserve energy in wireless sensor networks: initial step for routing mechanism, Computing Technology and Information Management (ICCM). 8th Int Conf 2012, 2(1):671-676.","journal-title":"8th Int Conf"},{"key":"963_CR21","first-page":"14","volume-title":"Simulated Annealing for Maximizing the Lifetime of Sensor Networks under Opportunistic Routing, Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications","author":"S Chelloug","year":"2012","unstructured":"Chelloug S, Benmohammed M: Simulated Annealing for Maximizing the Lifetime of Sensor Networks under Opportunistic Routing, Proceedings of the 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications. IEEE Computer Society, Canada; 2012:14-19."},{"issue":"5","key":"963_CR22","doi-asserted-by":"publisher","first-page":"2452","DOI":"10.1109\/TWC.2009.071388","volume":"8","author":"C Wei","year":"2009","unstructured":"Wei C, Zhi C, Fan P, Letaief KB: AsOR: an energy efficient multi-hop opportunistic routing protocol for wireless sensor networks over Rayleigh fading channels. Wireless Commun. IEEE Trans. 2009, 8(5):2452-2463.","journal-title":"Wireless Commun. IEEE Trans"},{"key":"963_CR23","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1109\/ACSSC.2010.5757872","volume-title":"Maximizing Lifetime in Wireless Sensor Networks Under Opportunistic Routing, Signals, Systems and Computers (ASILOMAR), 2010 Conference Record of the Forty Fourth Asilomar Conference","author":"M Kaliszan","year":"2010","unstructured":"Kaliszan M, Stanczak S: Maximizing Lifetime in Wireless Sensor Networks Under Opportunistic Routing, Signals, Systems and Computers (ASILOMAR), 2010 Conference Record of the Forty Fourth Asilomar Conference. IEEE, California, USA; 2010:1913-1917."},{"key":"963_CR24","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/CIMSim.2012.49","volume-title":"Computational Intelligence, Modelling and Simulation (CIMSiM), 2012 Fourth International Conference","author":"ME Rusli","year":"2012","unstructured":"Rusli ME, Harris R, Punchihewa A: Quality aware opportunistic routing protocol with adaptive coordination scheme for wireless sensor networks. In Computational Intelligence, Modelling and Simulation (CIMSiM), 2012 Fourth International Conference. IEEE, Malaysia; 2012:434-439."},{"key":"963_CR25","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/ISTT.2012.6481577","volume-title":"Telecommunication Technologies (ISTT), 2012 International Symposium","author":"ME Rusli","year":"2012","unstructured":"Rusli ME, Harris R, Punchihewa A: Performance analysis of implicit acknowledgement coordination scheme for opportunistic routing in wireless sensor networks. In Telecommunication Technologies (ISTT), 2012 International Symposium. IEEE, Malaysia; 2012:131-136."},{"key":"963_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/WD.2009.5449666","volume-title":"Wireless Days (WD), 2009 2nd IFIP","author":"JM Soares","year":"2009","unstructured":"Soares JM, Rocha RM: CHARON: routing in low-density opportunistic wireless sensor networks. In Wireless Days (WD), 2009 2nd IFIP. IEEE, Paris; 2009:1-5."},{"key":"963_CR27","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/ICNSC.2012.6204919","volume-title":"Networking, Sensing and Control (ICNSC), 2012 9th IEEE International Conference","author":"Y Han","year":"2012","unstructured":"Han Y, Lin Z: A geographically opportunistic routing protocol used in mobile wireless sensor networks. In Networking, Sensing and Control (ICNSC), 2012 9th IEEE International Conference. IEEE, Beijing; 2012:216-221."},{"issue":"2","key":"963_CR28","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Zeng Y, Xiang K, Li D, Vasilakos AV: Directional routing and scheduling for green vehicular delay tolerant networks. Wirel. Netw 2013, 19(2):161-173. 10.1007\/s11276-012-0457-9","journal-title":"Wirel. Netw"},{"key":"963_CR29","first-page":"1","volume-title":"Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference","author":"J Luo","year":"2012","unstructured":"Luo J, Cai Y: A data forwarding scheme based on delaunay triangulation for CPSs. In Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference. IEEE, China; 2012:1-6."},{"key":"963_CR30","series-title":"Proceedings of 16th International Conference","first-page":"1105","volume-title":"Computer Communications and Networks, 2007. ICCCN 2007","author":"SK Tan","year":"2007","unstructured":"Tan SK, Munro A: Adaptive probabilistic epidemic protocol for wireless sensor networks in an urban environment. Proceedings of 16th International Conference. In Computer Communications and Networks, 2007. ICCCN 2007. IEEE; 2007:1105-1110."},{"issue":"1","key":"963_CR31","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1186\/1687-1499-2014-78","volume":"2014","author":"S Subbaraj","year":"2014","unstructured":"Subbaraj S, Prakash S: EigenTrust-based non-cooperative game model assisting ACO look-ahead secure routing against selfishness. Eurasip J. Wirel. Commun. Netw. 2014, 2014(1):78. 10.1186\/1687-1499-2014-78","journal-title":"Eurasip J. Wirel. Commun. Netw"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2014-141\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-141.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-141.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,21]],"date-time":"2019-01-21T21:28:23Z","timestamp":1548106103000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2014-141"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,28]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["963"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2014-141","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,28]]},"assertion":[{"value":"26 June 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"141"}}