{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T19:03:16Z","timestamp":1726254196053},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031578397"},{"type":"electronic","value":"9783031578403"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57840-3_1","type":"book-chapter","created":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T05:01:53Z","timestamp":1712725313000},"page":"1-10","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Game Theory-Based Efficient Message Forwarding Scheme for\u00a0Opportunistic Networks"],"prefix":"10.1007","author":[{"given":"Vinesh","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Jagdeep","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Sanjay Kumar","family":"Dhurandher","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Woungang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,11]]},"reference":[{"issue":"1","key":"1_CR1","first-page":"556","volume":"16","author":"K Wei","year":"2013","unstructured":"Wei, K., Liang, X., Xu, K.: A survey of social-aware routing protocols in delay tolerant networks: applications, taxonomy and design-related issues. IEEE Commun. Surv. Tutorials 16(1), 556\u2013578 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, pp. 252\u2013259 (2005)","DOI":"10.1145\/1080139.1080143"},{"issue":"3","key":"1_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/961268.961272","volume":"7","author":"A Lindgren","year":"2003","unstructured":"Lindgren, A., Doria, A., Schel\u00e9n, O.: Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Comput. Commun. Rev. 7(3), 19\u201320 (2003)","journal-title":"ACM SIGMOBILE Mobile Comput. Commun. Rev."},{"issue":"2","key":"1_CR4","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1007\/s11277-020-07086-8","volume":"112","author":"Y Akbari","year":"2020","unstructured":"Akbari, Y., Tabatabaei, S.: A new method to find a high reliable route in IoT by using reinforcement learning and fuzzy logic. Wireless Pers. Commun. 112(2), 967\u2013983 (2020)","journal-title":"Wireless Pers. Commun."},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Singh, J., Dhurandher, S.K., Woungang, I.: Game theory-based energy efficient routing in opportunistic networks. In: International Conference on Advanced Information Networking and Applications, pp. 627\u2013639 (2022)","DOI":"10.1007\/978-3-030-99584-3_54"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.comnet.2018.11.022","volume":"149","author":"X Qin","year":"2019","unstructured":"Qin, X., Wang, X., Wang, L., Lin, Y., Wang, X.: An efficient probabilistic routing scheme based on game theory in opportunistic networks. Comput. Netw. 149, 144\u2013153 (2019)","journal-title":"Comput. Netw."},{"key":"1_CR7","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1016\/j.comnet.2017.07.005","volume":"129","author":"SJ Borah","year":"2017","unstructured":"Borah, S.J., Dhurandher, S.K., Woungang, I., Kumar, V.: A game theoretic context-based routing protocol for opportunistic networks in an IoT scenario. Comput. Netw. 129, 572\u2013584 (2017)","journal-title":"Comput. Netw."},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Deng, X., Chen, H., Cai, R., Zeng, F., Xu, G., Zhang, H.: A knowledge-based multiplayer collaborative routing in opportunistic networks. In: 2019 IEEE International Conference on Dependable, pp. 16\u201321. Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (2019)","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/CyberSciTech.2019.00019"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.asoc.2015.10.019","volume":"38","author":"H Guo","year":"2016","unstructured":"Guo, H., Wang, X., Cheng, H., Huang, M.: A routing defense mechanism using evolutionary game theory for delay tolerant networks. Appl. Soft Comput. 38, 469\u2013476 (2016)","journal-title":"Appl. Soft Comput."},{"key":"1_CR10","unstructured":"Deshpande, S.: Cost Efficient Predictive Routing in Disruption Tolerant Networks-Doctoral Dissertation, The Ohio State University (2011)"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Shrivastav, V., Dhurandher, S.K., Woungang, I., Kumar, V., Rodrigues, J.J.: Game theory-based channel allocation in cognitive radio networks. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20135 (2016)","DOI":"10.1109\/GLOCOM.2016.7841855"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.jpdc.2017.08.008","volume":"118","author":"SK Dhurandher","year":"2018","unstructured":"Dhurandher, S.K., Borah, S.J., Woungang, I., Bansal, A., Gupta, A.: A location prediction-based routing scheme for opportunistic networks in an IoT scenario. J. Parallel Distrib. Comput. 118, 369\u2013378 (2018)","journal-title":"J. Parallel Distrib. Comput."},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"1694","DOI":"10.1007\/s11227-014-1243-5","volume":"71","author":"SK Dhurandher","year":"2015","unstructured":"Dhurandher, S.K., Sharma, D.K., Woungang, I., Saini, A.: Efficient routing based on past information to predict the future location for message passing in infrastructure-less opportunistic networks. J. Supercomput. 71, 1694\u20131711 (2015)","journal-title":"J. Supercomput."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Kumar, V., Dhurandher, S.K., Woungang, I., Gupta, S., Singh, S.: Channel allocation in cognitive radio networks: a game-theoretic approach. In: International Conference on Network-Based Information Systems, pp. 182\u2013192 (2022)","DOI":"10.1007\/978-3-031-14314-4_18"},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"286","DOI":"10.2307\/1969529","volume":"54","author":"J Nash","year":"1951","unstructured":"Nash, J.: Non-cooperative games. Ann. Math. 54, 286\u2013295 (1951)","journal-title":"Ann. Math."},{"issue":"4","key":"1_CR16","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.1109\/TWC.2013.022113.120282","volume":"12","author":"F Wu","year":"2013","unstructured":"Wu, F., Chen, T., Zhong, S., Qiao, C., Chen, G.: A game-theoretic approach to stimulate cooperation for probabilistic routing in opportunistic networks. IEEE Trans. Wireless Commun. 12(4), 1573\u20131583 (2013)","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"2","key":"1_CR17","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1109\/COMST.2017.2782182","volume":"20","author":"J Dede","year":"2017","unstructured":"Dede, J., et al.: Simulating opportunistic networks: survey and future directions. IEEE Commun. Surv. Tutorials 20(2), 1547\u20131573 (2017)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Singh, J., Dhurandher, S.K., Woungang, I.: Game theory-based energy efficient routing in opportunistic networks. In: International Conference on Advanced Information Networking and Applications, pp. 627\u2013639 (2022)","DOI":"10.1007\/978-3-030-99584-3_54"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Ker\u00e4nen, A., Ott, J., K\u00e4rkk\u00e4inen, T.: The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques, pp. 1\u201310 (2009)","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57840-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T05:08:14Z","timestamp":1712725694000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57840-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031578397","9783031578403"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57840-3_1","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}