參考文獻 |
[1] P. Sommer, B. Kusy, P. Valencia, R. Dungavell, and R. Jurdak, “Delay-tolerant networking for long-term animal tracking,” IEEE Internet Computing, vol. 22, no. 1, pp. 62–72, 2018.
[2] B. E. Pataki and L. Kovacs, “Sensor data collection experiments with chaoster in the fed4fire federated testbeds,” ser. Proceedings of 2014 10th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca, Cyprus, 2014, pp. 306–313.
[3] A. Boukerche, B. Turgut, N. Aydin, M. Z. Ahmad, L. Boloni, and D. Turgut, “Routing protocols in ad hoc networks: A survey,” Computer Networks, vol. 55, no. 13, pp. 3032–3080, 2011.
[4] H. Gao, C. Liu, Y. Li, and X. Yang, “V2vr: Reliable hybrid-network-oriented v2v data transmission and routing considering rsus and connectivity probability,” IEEE Transactions on Intelligent Transportation Systems, vol. 22, no. 6, pp. 3533–3546, 2021.
[5] X. Wang, Y. Weng, and H. Gao, “A low-latency and energy-efficient multimetric routing protocol based on network connectivity in vanet communication,” IEEE Transactions on Green Communications and Networking, vol. 5, no. 4, pp. 1761–1776, 2021.
[6] G. Yang, R. Wang, K. Zhao, X. Zhang, W. Li, and X. He, “Queueing analysis of dtn protocols in deep-space communications,” IEEE Aerospace and Electronic Systems Magazine, vol. 33, no. 12, pp. 40–48, 2018.
[7] S. Trifunovic, S. T. Kouyoumdjieva, B. Distl, L. Pajevic, G. Karlsson, and B. Plattner, “A decade of research in opportunistic networks: challenges, relevance, and future directions,” IEEE Communication Magazine, vol. 55, no. 1, pp. 168–173, 2017.
[8] D. Xu, Y. Li, X. Chen, J. Li, P. Hui, S. Chen, and J. Crowcroft, “A survey of opportunistic offloading,” IEEE Communications Surveys and Tutorials, vol. 20, no. 3, pp. 2198–2236, 2018.
[9] S. T. Kouyoumdjieva and G. Karlsson, “From opportunistic networks to 3gpp network-independent deviceto-device communication,” vol. 20, no. 2, 2016.
[10] D. Xu, Y. Li, X. Chen, J. Li, P. Hui, S. Chen, and J. Crowcroft, “A survey of opportunistic offloading,” IEEE Communications Surveys and Tutorials, vol. 20, no. 3, pp. 2198–2236, 2018.
[11] S. CC, V. Raychoudhury, G. Marfia, and A. Singla, “A survey of routing and data dissemination in delay tolerant networks,” Journal of Network and Computer Applications, vol. 67, pp. 128–146, 2016.
[12] Y. Cao, K. Wei, G. Min, J. Weng, X. Yang, and Z. Sun, “A geographic multicopy routing scheme for dtns with heterogeneous mobility,” IEEE Systems Journal, vol. 12, no. 1, pp. 790–801, 2018.
[13] Y. Yang, C. Zhao, S. Yao, W. Zhang, X. Ge, and G. Mao, “Delay performance of network-coding-based epidemic routing,” IEEE Transactions on Vehicular Technology, vol. 65, no. 5, pp. 3676–3684, 2016.
[14] T. Abdelkader, K. Naik, A. Nayak, N. Goel, and V. Srivastava, “A performance comparison of delay-tolerant network routing protocols,” IEEE Network, vol. 30, no. 2, pp. 46–53, 2016.
[15] A. Krifa, C. Barakat, and T. Spyropoulos, “Optimal buffer management policies for delay-tolerant networks,” Proceedings of 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), San Francisco, CA, USA, 2008, pp. 260–268.
[16] Q. Li, S. Zhu, and G. Cao, “Routing in socially selfish delay-tolerant networks,” ser. Proceedings of 2010 IEEE International Conference on Computer Communications (INFOCOM), San Diego, CA, USA, 2010, pp. 1–9.
[17] A. Krifa, C. Barakat, and T. Spyropoulos, “Message drop and scheduling in dtns: Theory and practice,” IEEE Transactions on Mobile Computing, vol. 11, no. 9, pp. 1470–1483, 2012.
[18] T. Le, H. Kalantarian, and M. Gerla, “A joint relay selection and buffer management scheme for delivery rate optimization in dtns,” ser. Proceedings of 2016 IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), Coimbra, Portugal, 2016, pp. 1–9.
[19] Y.-F. Hsu and C.-L. Hu, “Enhanced buffer management for data delivery to multiple destinations in dtns,” IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8735–8739, 2016.
[20] A. Elwhishi, P.-H. Ho, K. Naik, and B. Shihada, “A novel message scheduling framework for delay-tolerant networks routing,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 5, pp. 871–880, 2013.
[21] C.-H. Lee and D. Y. Eun, “On the forwarding performance under heterogeneous contact dynamics in mobile opportunistic networks,” IEEE Transactions on Mobile Computing, vol. 12, no. 6, pp. 1107–1119, 2013.
[22] E. Wang, Y. Yang, and J. Wu, “A knapsack-based buffer management strategy for delay-tolerant networks,” Journal of Parallel and Distributed Computing, vol. 86, pp. 1–15, 2015.
[23] P. Matzakos, T. Spyropoulos, and C. Bonnet, “Buffer management policies for dtn applications with different qos requirements,” ser. Proceedings of 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 2015, pp. 1–7.
[24] T. Le, H. Kalantarian, and M. Gerla, “A dtn routing and buffer management strategy for message delivery delay optimization,” ser. Proceedings of 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC), Munich, Germany, 2015, pp. 32–39.
[25] A. Vahdat and D. Becker, “Epidemic routing for partially-connected ad hoc networks,” Duke University, Durham, NC, USA, Tech. Rep., 2000.
[26] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Spray and wait: An efficient routing scheme for intermittently connected mobile networks,” ser. Proceedings of ACM SIGCOMM workshop on Delay-tolerant networking (WDTN), Philadelphia, Pennsylvania, USA, 2005, pp. 252–259.
[27] Y. Cao, Z. Sun, N. Wang, F. Yao, and H. Cruickshank, “Converge-and-diverge: A geographic routing for delay/disruption-tolerant networks using a delegation replication approach,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2339–2343, 2013.
[28] K. Wei, D. Zeng, S. Guo, and K. Xu, “On social delay-tolerant networking: Aggregation, tie detection, and routing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 6, pp. 1563–1573, 2014.
[29] H. Zhou, V. C. M. Leung, C. Zhu, S. Xu, and J. Fan, “Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 11, pp. 10 372–10 383, 2017.
[30] Y. Liu, H. Wu, Y. Xia, Y. Wang, F. Li, and P. Yang, “Optimal online data dissemination for resource constrained mobile opportunistic networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 6, pp. 5301–5315, 2017.
[31] W. Wang, Y. Bai, P. Feng, Y. Gu, S. Liu, W. Jiang, and J. Huang, “Dtn-knca: A high throughput routing based on contact pattern detection in dtns,” in Proceedings of IEEE COMPSAC’18, vol. 01, Tokyo, Japan, July 2018, pp. 926–931.
[32] Y.-F. Hsu, C. Hu, and H. Hsiao, “On exploiting temporal periodicity for message delivery in mobile opportunistic networks,” in Proceedings of IEEE COMPSAC’18, vol. 01, Tokyo, Japan, July 2018, pp. 809–810.
[33] F. Li, H. Jiang, H. Li, Y. Cheng, and Y. Wang, “Sebar: Social-energy-based routing for mobile social delaytolerant networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 8, pp. 7195–7206, 2017.
[34] X. Bi, T. Qiu, W. Qu, L. Zhao, X. Zhou, and D. O. Wu, “Dynamically transient social community detection for mobile social networks,” IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1282–1293, 2021.
[35] W. Gao, G. Cao, T. L. Porta, and J. Han, “On exploiting transient social contact patterns for data forwarding in delay-tolerant networks,” IEEE Transactions on Mobile Computing, vol. 12, no. 1, pp. 151–165, 2013.
[36] J. Tao, H. Wu, S. Shi, J. Hu, and Y. Gao, “Contacts-aware opportunistic forwarding in mobile social networks: A community perspective,” in IEEE Wireless Communications and Networking Conference (WCNC), Barcelona, Spain, 2018, pp. 1–6.
[37] Z. Li, C. Wang, L. Shao, C. Jiang, and C. Wang, “Exploiting traveling information for data forwarding in community-characterized vehicular networks,” IEEE Transactions on Vehicular Technology, vol. 66, no. 7, pp. 6324–6335, 2017.
[38] M. N. Soorki, W. Saad, M. H. Manshaei, and H. Saidi, “Social community-aware content placement in wireless device-to-device communication networks,” IEEE Transactions on Mobile Computing, vol. 18, no. 8, pp. 1938–1950, 2019.
[39] I. O. Nunes, P. O. S. V. de Melo, and A. A. F. Loureiro, “Group mobility: Detection, tracking and characterization,” in IEEE International Conference on Communications (ICC’16), Kuala Lumpur, Malaysia, 2016, pp. 1–6.
[40] X. Zhang and G. Cao, “Transient community detection and its application to data forwarding in delay tolerant networks,” IEEE/ACM Transactions on Networking, vol. 25, no. 5, pp. 2829–2843, 2017.
[41] M. J. Williams, R. M. Whitaker, and S. M. Allen, “There and back again: Detecting regularity in human encounter communities,” IEEE Transactions on Mobile Computing, vol. 16, no. 6, pp. 1744–1757, 2017.
[42] H. P. Bahman Ravaei, Masoud Sabaei and S. Valaee, “Community-aware single-copy content forwarding in mobile social network,” Wireless Networks, vol. 24, no. 7, pp. 2705–2721, 2018. 131
[43] S. H. Kyunghan Lee, S. J. Kim, I. Rhee, and S. Chong, “Slaw: A new mobility model for human walks,” in Proceedings of 2009 IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, 2009, pp. 855–863.
[44] J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau, “CRAWDAD dataset cambridge/haggle (v. 2009-05-29),” May 2009, https://crawdad.org/cambridge/haggle/20090529.
[45] S. Samo Grasic, E. Davies, A. Lindgren, and A. Doria, “The evolution of a dtn routing protocol - prophetv2,” in Proceedings of ACM CHANTS’11, 2011, pp. 27–30.
[46] G. Goudar and S. Batabyal, “Optimizing bulk transfer size and scheduling for efficient buffer management in mobile opportunistic networks,” IEEE Transactions on Mobile Computing, pp. 1–1, 2021.
[47] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: Routing for vehicle-based disruption tolerant networks,” ser. Proceedings of 2006 IEEE International Conference on Computer Communications (INFOCOM), Barcelona, Spain, 2006, pp. 1–11.
[48] Y. Liu, J. Wang, S. Zhang, and H. Zhou, “A buffer management scheme based on message transmission status in delay-tolerant networks,” ser. Proceedings of 2011 IEEE Global Telecommunications Conference (GLOBECOM), Houston, TX, USA, 2011, pp. 1–5.
[49] K. Shin and S. Kim, “Enhanced buffer management policy that utilises message properties for delay-tolerant networks,” IET Communications, vol. 5, no. 6, pp. 753–759, 2011.
[50] D. Wu, J. Zhou, P. Zhang, and R. Wang, “Intelligent dynamical buffer scheduling mechanism for intermittently connected mobile network,” Wireless Personal Communications, vol. 73, no. 3, pp. 1269–1288, 2013.
[51] K. Wei, S. Guo, D. Zeng, and K. Xu, “A multi-attribute decision making approach to congestion control in delay-tolerant networks,” ser. Proceedings of 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 2014, pp. 2742–2747.
[52] A. Balasubramanian, B. Levine, and A. Venkataramani, “Dtn routing as a resource allocation problem,”. Proceedings of 2007 ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOM), Kyoto, Japan, 2007, pp. 373–384.
[53] P. Matzakos, T. Spyropoulos, and C. Bonnet, “Joint scheduling and buffer management policies for dtn applications of different traffic classes,” IEEE Transactions on Mobile Computing, vol. 17, no. 12, pp. 2818–2834, 2018.
[54] S. Rashid, Q. Ayub, M. S. Zahid, and A. H. Abdullah, “Message drop control buffer management policy for dtn routing protocols,” Wireless Personal Communication, vol. 72, no. 1, p. 653–669, 2013.
[55] P. Sermpezis and T. Spyropoulos, “Delay analysis of epidemic schemes in sparse and dense heterogeneous contact networks,” IEEE Transactions on Mobile Computing, vol. 16, no. 9, pp. 2464–2477, 2017.
[56] K. Sakai, M. Sun, W. Ku, J. Wu, and F. S. Alanazi, “Performance and security analyses of onion-based anonymous routing for delay-tolerant networks,” IEEE Transactions on Mobile Computing, vol. 16, no. 12, pp. 3473–3487, 2017.
[57] S. Moon and A. Helmy, “Understanding periodicity and regularity of nodal encounters in mobile networks: A spectral analysis,” in Proceedings of IEEE GLOBECOM’10, Miami, Fl, USA, Dec. 2010, pp. 1–5.
[58] W.-J. Hsu, T. Spyropoulos, K. Psounis, and A. Helmy, “Modeling time-variant user mobility in wireless mobile networks,” in Proceedings of IEEE INFOCOM’07, Barcelona, Spain, May 2007, pp. 758–766.
[59] W. Gao, Q. Li, B. Zhao, and G. Cao, “Multicasting in delay tolerant networks: A social network perspective,” in Proceedings of ACM MobiHoc’09, 2009, pp. 299–308.
[60] E. Bulut, S. C. Geyik, and B. K. Szymanski, “Efficient routing in delay tolerant networks with correlated node mobility,” in Proceedings of IEEE MASS’10, San Francisco, CA, USA, Nov. 2010, pp. 79–88.
[61] P. Hui, E. Yoneki, S. Y. Chan, and J. Crowcroft, “Distributed community detection in delay tolerant networks,” in Proceedings of 2nd ACM/IEEE International Workshop on Mobility in the Evolving Internet Architecture (MobiArch’07), Kyoto, Japan, August 2007, pp. 1–8.
[62] D. Pisinger and P. Toth, Knapsack problems. Boston, MA: Springer, 1998, iSBN 978-1-4419-7996-4.
[63] E. Wang, Y.-J. Yang, J. Wu, and W.-B. Liu, “A buffer scheduling method based on message priority in delay-tolerant networks,” Journal of Computer Science and Technology, vol. 31, no. 6, pp. 1228–1245, 2016.
[64] A. Picu and T. Spyropoulos, “Dtn-meteo: Forecasting the performance of dtn protocols under heterogeneous mobility,” IEEE/ACM Transactions on Networking, vol. 23, no. 2, pp. 587–602, 2015.
[65] S. Batabyal and P. Bhaumik, “Mobility models, traces and impact of mobility on opportunistic routing algorithms: A survey,” IEEE Communications Surveys Tutorials, vol. 17, no. 3, pp. 1679–1707, 2015.
[66] H. Zhou, J. Chen, H. Zhao, W. Gao, and P. Cheng, “On exploiting contact patterns for data forwarding in duty-cycle opportunistic mobile networks,” IEEE Transactions on Vehicular Technology, vol. 62, no. 9, pp. 4629–4642, 2013.
[67] A. Ker¨anen, J. Ott, and T. K¨arkk¨ainen, “The one simulator for dtn protocol evaluation,” in Proceedings of the 2nd International Conference on Simulation Tools and Techniques (SIMUTools), Rome, Italy, 2009, pp. 55:1–55:10.
[68] M. D. Silva, I. O. Nunes, R. A. Mini, and A. A. F. Loureiro, “St-drop: A novel buffer management strategy for d2d opportunistic networks,” in Proceedings of 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, 2017, pp. 1300–1305.
[69] J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau, “CRAWDAD dataset cambridge/haggle (v. 2006-09-15),” Sep 2006, https://crawdad.org/cambridge/haggle/20060915.
[70] T. Spyropoulos, T. Turletti, and K. Obraczka, “Routing in delay-tolerant networks comprising heterogeneous
node populations,” IEEE Transactions on Mobile Computing, vol. 8, no. 8, pp. 1132–1147, 2009.
[71] W.-J. Hsu, T. Spyropoulos, K. Psounis, and A. Helmy, “Modeling spatial and temporal dependencies of user
mobility in wireless mobile networks, rome, italy,” IEEE/ACM Transactions on Networking, vol. 17, no. 5, pp. 1564–1577, 2009.
[72] T.-C. Tsai and H.-H. Chan, “Nccu trace: Social-network-aware mobility trace,” IEEE Communications Magazine, vol. 53, no. 10, pp. 144–149, 2015.
[73] J. Sun, W. Zheng, Q. Zhang, and Z. Xu, “Graph neural network encoding for community detection in attribute networks,” 2020.
[74] N. Eagle and A. S. Pentland, “CRAWDAD dataset mit/reality (v. 2005-07-01),” Downloaded from https://crawdad.org/mit/reality/20050701, jul 2005.
[75] M. Piorkowski, N. Sarafijanovic-Djukic, and M. Grossglauser, “CRAWDAD dataset epfl/mobility (v. 2009-
02-24),” Downloaded from https://crawdad.org/epfl/mobility/20090224/cab, feb 2009, traceset: cab.
[76] Q. Hao, M. Sheng, D. Zhou, and Y. Shi, “A multi-aspect expanded hypergraph enabled cross-domain resource
management in satellite networks,” IEEE Transactions on Communications, vol. 70, no. 7, pp. 4687–4701, 2022.
[77] J. Zhang, T. Chen, S. Zhong, J. Wang, W. Zhang, X. Zuo, R. G. Maunder, and L. Hanzo, “Aeronautical ad hoc networking for the internet-above-the-clouds,” Proceedings of the IEEE, vol. 107, no. 5, pp. 868–911, 2019.
[78] L. Pelusi, A. Passarella, and M. Conti, “Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks,” Comm. Mag., vol. 44, no. 11, p. 134–141, nov 2006.
[79] R. Wang, A. Sabbagh, S. C. Burleigh, K. Zhao, and Y. Qian, “Proactive retransmission in delay-/disruption tolerant
networking for reliable deep-space vehicle communications,” IEEE Transactions on Vehicular Technology, vol. 67, no. 10, pp. 9983–9994, 2018.
[80] P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot, “Pocket switched networks and human mobility in conference environments,” in Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, 2005, p. 244–251.
[81] L. Jiang, L. Shi, L. Liu, J. Yao, B. Yuan, and Y. Zheng, “An efficient evolutionary user interest community
discovery model in dynamic social networks for internet of people,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 9226–9236, 2019.
[82] A. Khelloufi, H. Ning, S. Dhelim, T. Qiu, J. Ma, R. Huang, and L. Atzori, “A social-relationships-based service recommendation system for siot devices,” IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1859–1870, 2021.
[83] C.-L. Hu, S.-Z. Huang, Z. Zhang, and L. Hui, “Energy-balanced optimization on flying ferry placement for data gathering in wireless sensor networks,” IEEE Access, vol. 9, pp. 70 906–70 923, 2021.
[84] 3GPP, “Feasibility study for proximity services (prose),” 3rd Generation Partnership Project (3GPP), Tech. Rep., TR 22.803, 2013.
[85] M. Usman, A. A. Gebremariam, U. Raza, and F. Granelli, “A software-defined device-to-device communication
architecture for public safety applications in 5g networks,” IEEE Access, vol. 3, pp. 1649–1654, 2015.
[86] L. Gallo and J. Haerri, “Unsupervised long- term evolution device-to-device: A case study for safety-critical v2x communications,” IEEE Vehicular Technology Magazine, vol. 12, no. 2, pp. 69–77, 2017.
[87] M. H¨oyhty¨a, J. Huusko, M. Kiviranta, K. Solberg, and J. Rokka, “Connectivity for autonomous ships: Architecture,
use cases, and research challenges,” in Proceedings of 2017 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), 2017, pp. 345–350.
[88] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and challenges,” IEEE Internet of Things Journal, vol. 3, no. 5, pp. 637–646, 2016.
[89] M. Amadeo, C. Campolo, A. Iera, and A. Molinaro, “Information centric networking in iot scenarios: The
case of a smart home,” in Proceedings of 2015 IEEE International Conference on Communications (ICC), London, UK, 2015, pp. 648–653.
[90] E. Borgia, R. Bruno, and A. Passarella, “Making opportunistic networks in iot environments ccn-ready: A performance evaluation of the mobccn protocol,” Computer Communications, vol. 123, pp. 81–96, 2018.
[91] A. Khelloufi, H. Ning, S. Dhelim, T. Qiu, J. Ma, R. Huang, and L. Atzori, “A social-relationships-based service recommendation system for siot devices,” IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1859–1870, 2021.
[92] C. Han, H. Yao, T. Mai, N. Zhang, and M. Guizani, “Qmix aided routing in social-based delay-tolerant networks,” IEEE Transactions on Vehicular Technology, vol. 71, no. 2, pp. 1952–1963, 2022.
[93] M. Liu, J. Li, and H. Lu, “Routing in small satellite networks: A gnn-based learning approach,” 2021.
[94] J. Zhang, D. Liu, S. Chen, S. X. Ng, R. G. Maunder, and L. Hanzo, “Multiple-objective packet routing optimization for aeronautical ad-hoc networks,” 2022. |