Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Evaluating forwarding protocols in opportunistic networks: trends, advances, challenges and best practices
A variety of applications and forwarding protocols have been proposed for opportunistic
networks (OppNets) in the literature. However, the methodology of evaluation, testing and …
networks (OppNets) in the literature. However, the methodology of evaluation, testing and …
Mobilityfirst: A mobility-centric and trustworthy internet architecture
MobilityFirst is a future Internet architecture with mobility and trustworthiness as central
design goals. Mobility means that all endpoints--devices, services, content, and networks …
design goals. Mobility means that all endpoints--devices, services, content, and networks …
Homing spread: Community home-based multi-copy routing in mobile social networks
A mobile social network (MSN) is a special delay tolerant network (DTN) composed of
mobile nodes with social characteristics. Mobile nodes in MSNs generally visit community …
mobile nodes with social characteristics. Mobile nodes in MSNs generally visit community …
Route or carry: Motion-driven packet forwarding in micro aerial vehicle networks
Micro aerial vehicles (MAVs) provide data such as images and videos from an aerial
perspective, with data typically transferred to the ground. To establish connectivity in larger …
perspective, with data typically transferred to the ground. To establish connectivity in larger …
Crf: Coexistent routing and flooding using wifi packets in heterogeneous iot networks
Routing and flooding are important functions in wireless networks. However, until now
routing and flooding protocols are investigated separately within the same network (ie, a …
routing and flooding protocols are investigated separately within the same network (ie, a …
JamholeHunter: On detecting new wormhole attack in opportunistic mobile networks
This paper first shows that Prophet, Spray and Wait, Epidemic, and First Contact routing
protocols in Opportunistic Mobile Networks (OMNs) are vulnerable to the Jamhole attack. In …
protocols in Opportunistic Mobile Networks (OMNs) are vulnerable to the Jamhole attack. In …
A hybrid MANET-DTN routing scheme for emergency response scenarios
Emergency response operations are a promising application area for mobile ad-hoc
networks (MANETs). Most existing MANET routing protocols assume that an end-to-end path …
networks (MANETs). Most existing MANET routing protocols assume that an end-to-end path …
Tour: time-sensitive opportunistic utility-based routing in delay tolerant networks
In this paper, we propose a time-sensitive utility model for delay tolerant networks (DTNs), in
which each message has an attached time-sensitive benefit that decays over time. The utility …
which each message has an attached time-sensitive benefit that decays over time. The utility …
Contact expectation based routing for delay tolerant networks
In conventional networks, routing problem can be modeled as the design of an efficient
source-to-destination route based on persistent end-to-end paths. However, in a delay …
source-to-destination route based on persistent end-to-end paths. However, in a delay …
On detecting route hijacking attack in opportunistic mobile networks
In this paper, we show that Hybrid Routing and Prophet protocols in Opportunistic Mobile
Networks (OMNs) are vulnerable to the CollusiveHijack attack, in which a malicious attacker …
Networks (OMNs) are vulnerable to the CollusiveHijack attack, in which a malicious attacker …