Page 329 - 《软件学报》2021年第8期
P. 329
张棋飞 等:基于节点运动的机会网络路由算法 2611
[4] Mota VFS, Cunha FD, Macedo DF, Nogueira JMS, Loureiro AAF. Protocols, mobility models and tools in opportunistic networks:
A survey. Computer Communications, 2014,48:5−19. [doi: http://dx.doi.org/10.1016/j.comcom.2014.03.019]
[5] Abdelkader T, Naik K, Nayak A, Goel N, Srivastava V. A performance comparison of delay-tolerant network routing protocols.
IEEE Network, 2016,30(2):46−53. [doi: 10.1109/MNET.2016.7437024]
[6] Conti M, Giordano S. Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Communications
Magazine, 2014,52(1):85−96. [doi: 10.1109/MCOM.2014.6710069]
[7] Woungang I, Dhurandher SK, Anpalagan A, Vasilakos AV. Routing in Opportunistic Networks. New York: Springer-Verlag, 2013.
[doi: 10.1007/978-1-4614-3514-3]
[8] Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D. Energy efficient computing for wildlife tracking: Design tradeoffs
and early experiences with ZebraNet. In: Proc. of the Int’l Conf. on Architectural Support for Programming Languages and
Operating Systems. 2002. [doi: 10.13140/RG.2.1.2314.6326]
[9] Grossglauser M, Tse DNC. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. on Networking, 2002,
10(4):477−486. [doi: 10.1109/tnet.2002.801403]
[10] Spyropoulos T, Psounis K, Raghavendra CS. Efficient routing in intermittently connected mobile networks: The multiple-copy case.
IEEE/ACM Trans. on Networking, 2008,16(1):77−90. [doi: 10.1109/tnet.2007.897964]
[11] Shah RC, Roy S, Jain S, Brunette W. Data MULEs: Modeling a three-tier architecture for sparse sensor networks. In: Proc. of the
1st IEEE Int’l Workshop on Sensor Network Protocols and Applications. 2003. [doi: 10.1109/SNPA.2003.1203354]
[12] Zhao WR, Ammar M, Zegura E. A message ferrying approach for data delivery in sparse mobile ad hoc networks. In: Proc. of the
ACM Mobihoc. 2004. [doi: 10.1145/989459.989483]
[13] Zhao WR, Ammar M, Zegura E. Controlling the mobility of multiple data transport ferries in a delay-tolerant network. In: Proc. of
the 24th Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM). 2005. [doi: 10.1109/INFCOM.
2005.1498365]
[14] Niu JW, Dai B, Sun LM, Lin JL, Xiong YP. PQBCF: A P2P query algorithm based on betweenness centrality forwarding in
opportunistic networks. Acta Electronica Sinica, 2013,41(9):1815−1820 (in Chinese with English abstract). [doi: 10.3969/j.issn.
0372-2112.2013.09.023]
[15] Zhao D, Ma HD, Yuan PY, Liu L. Differentiated probabilistic forwarding for extending the lifetime of opportunistic networks. In:
Proc. of the IEEE Wireless Communications and Networking Conf. (WCNC). 2012. [doi: 10.1109/WCNC.2012.6214318]
[16] Chen K, Shen HY. SMART: Lightweight distributed social map based routing in delay tolerant networks. In: Proc. of the 20th
IEEE Int’l Conf. on Network Protocols (ICNP). 2012. [doi: 10.1109/ICNP.2012.6459982]
[17] Mtibaa A, May M, Diot C, Ammar M. PeopleRank: Social opportunistic forwarding. In: Proc. of the IEEE INFOCOM. 2010. [doi:
10.1109/INFCOM.2010.5462261]
[18] Hui P, Crowcroft J, Yoneki E. BUBBLE rap: Social-based forwarding in delay-tolerant networks. IEEE Trans. on Mobile
Computing, 2011,10(11):1576−1589. [doi: 10.1109/TMC.2010.246]
[19] Xu F, Zhang HY, Wang J, Xu N, Wang ZY, Deng M. Social context-aware routing algorithms in opportunistic networks. Acta
Electronica Sinica, 2015,43(5):833−840 (in Chinese with English abstract). [doi: 10.3969/j.issn.0372-2112.2015.05.001]
[20] Ying B, Xu K, Nayak A. Fair and social-aware message forwarding method in opportunistic social networks. IEEE
Communications Letters, 2019,23(4):720−723. [doi: 10.1109/LCOMM.2019.2900892]
[21] Wu L, Wu DA, Liu M, Wang XM, Gong HG. Periodic intermittently connected-based data delivery in opportunistic networks.
Ruan Jian Xue Bao/Journal of Software, 2013,24(3):507−525 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/
4227.htm [doi: 10.3724/SP.J.1001.2013.04227]
[22] Lindgren A, Doria A, Schelen O. Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing
and Communications Review, 2003,7(3):19−20.
[23] Li F, Si YL, Chen Z, Lu N, Shen LM. Trust-based security routing decision method for opportunistic networks. Ruan Jian Xue
Bao/Journal of Software, 2018,29(9):2829−2843 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5273.htm
[doi: 10.13328/j.cnki.jos.005273]
[24] Abdelkader T, Naik K, Nayak A. Choosing the objective of optimal routing protocols in delay tolerant networks. In: Proc. of the
Int’l Computer Engineering Conf. (ICENCO). 2010. [doi: 10.1109/ICENCO.2010.5720418]