Page 329 - 《软件学报》2021年第8期
P. 329

张棋飞  等:基于节点运动的机会网络路由算法                                                          2611


                 [4]     Mota VFS, Cunha FD, Macedo DF, Nogueira JMS, Loureiro AAF. Protocols, mobility models and tools in opportunistic networks:
                     A survey. Computer Communications, 2014,48:5−19. [doi: http://dx.doi.org/10.1016/j.comcom.2014.03.019]
                 [5]     Abdelkader T, Naik K, Nayak A, Goel N, Srivastava V. A performance comparison of delay-tolerant network routing protocols.
                     IEEE Network, 2016,30(2):46−53. [doi: 10.1109/MNET.2016.7437024]
                 [6]     Conti  M, Giordano S. Mobile  ad hoc networking:  milestones,  challenges,  and new research directions. IEEE  Communications
                     Magazine, 2014,52(1):85−96. [doi: 10.1109/MCOM.2014.6710069]
                 [7]     Woungang I, Dhurandher SK, Anpalagan A, Vasilakos AV. Routing in Opportunistic Networks. New York: Springer-Verlag, 2013.
                     [doi: 10.1007/978-1-4614-3514-3]
                 [8]     Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D. Energy efficient computing for wildlife tracking: Design tradeoffs
                     and  early  experiences with  ZebraNet.  In: Proc. of the  Int’l Conf. on  Architectural Support for Programming Languages  and
                     Operating Systems. 2002. [doi: 10.13140/RG.2.1.2314.6326]
                 [9]     Grossglauser M, Tse DNC. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. on Networking, 2002,
                     10(4):477−486. [doi: 10.1109/tnet.2002.801403]
                [10]    Spyropoulos T, Psounis K, Raghavendra CS. Efficient routing in intermittently connected mobile networks: The multiple-copy case.
                     IEEE/ACM Trans. on Networking, 2008,16(1):77−90. [doi: 10.1109/tnet.2007.897964]
                [11]    Shah RC, Roy S, Jain S, Brunette W. Data MULEs: Modeling a three-tier architecture for sparse sensor networks. In: Proc. of the
                     1st IEEE Int’l Workshop on Sensor Network Protocols and Applications. 2003. [doi: 10.1109/SNPA.2003.1203354]
                [12]     Zhao WR, Ammar M, Zegura E. A message ferrying approach for data delivery in sparse mobile ad hoc networks. In: Proc. of the
                     ACM Mobihoc. 2004. [doi: 10.1145/989459.989483]
                [13]     Zhao WR, Ammar M, Zegura E. Controlling the mobility of multiple data transport ferries in a delay-tolerant network. In: Proc. of
                     the 24th Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM). 2005. [doi: 10.1109/INFCOM.
                     2005.1498365]
                [14]     Niu JW, Dai  B, Sun LM,  Lin JL,  Xiong  YP. PQBCF: A P2P query  algorithm based on betweenness  centrality forwarding in
                     opportunistic networks. Acta  Electronica Sinica, 2013,41(9):1815−1820 (in  Chinese with  English  abstract). [doi: 10.3969/j.issn.
                     0372-2112.2013.09.023]
                [15]     Zhao D, Ma HD, Yuan PY, Liu L. Differentiated probabilistic forwarding for extending the lifetime of opportunistic networks. In:
                     Proc. of the IEEE Wireless Communications and Networking Conf. (WCNC). 2012. [doi: 10.1109/WCNC.2012.6214318]
                [16]     Chen  K, Shen  HY. SMART:  Lightweight distributed social  map based routing  in delay tolerant networks. In: Proc. of the 20th
                     IEEE Int’l Conf. on Network Protocols (ICNP). 2012. [doi: 10.1109/ICNP.2012.6459982]
                [17]     Mtibaa A, May M, Diot C, Ammar M. PeopleRank: Social opportunistic forwarding. In: Proc. of the IEEE INFOCOM. 2010. [doi:
                     10.1109/INFCOM.2010.5462261]
                [18]     Hui P,  Crowcroft J,  Yoneki  E.  BUBBLE rap: Social-based forwarding in delay-tolerant networks. IEEE Trans. on  Mobile
                     Computing, 2011,10(11):1576−1589. [doi: 10.1109/TMC.2010.246]
                [19]     Xu F, Zhang HY, Wang J, Xu N, Wang ZY, Deng M. Social context-aware routing algorithms in opportunistic networks. Acta
                     Electronica Sinica, 2015,43(5):833−840 (in Chinese with English abstract). [doi: 10.3969/j.issn.0372-2112.2015.05.001]
                [20]     Ying B,  Xu K, Nayak A.  Fair and  social-aware message  forwarding method in  opportunistic  social networks. IEEE
                     Communications Letters, 2019,23(4):720−723. [doi: 10.1109/LCOMM.2019.2900892]
                [21]     Wu L,  Wu DA, Liu  M, Wang XM, Gong HG.  Periodic intermittently connected-based  data  delivery  in  opportunistic  networks.
                     Ruan Jian Xue Bao/Journal of Software, 2013,24(3):507−525 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/
                     4227.htm [doi: 10.3724/SP.J.1001.2013.04227]
                [22]     Lindgren A, Doria A, Schelen O. Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing
                     and Communications Review, 2003,7(3):19−20.
                [23]     Li F, Si YL, Chen Z, Lu N, Shen LM. Trust-based security routing decision method for opportunistic networks. Ruan Jian Xue
                     Bao/Journal of Software, 2018,29(9):2829−2843  (in Chinese with English abstract).  http://www.jos.org.cn/1000-9825/5273.htm
                     [doi: 10.13328/j.cnki.jos.005273]
                [24]     Abdelkader T, Naik K, Nayak A. Choosing the objective of optimal routing protocols in delay tolerant networks. In: Proc. of the
                     Int’l Computer Engineering Conf. (ICENCO). 2010. [doi: 10.1109/ICENCO.2010.5720418]
   324   325   326   327   328   329   330   331   332   333   334