Renu Dalal, Manju Khari, Aakash Kumar, and Deepak K. Sharma


  1. [1] K. Fall, A delay-tolerant network architecture for challengedinternets, In Proceedings of the 2003 Conference on Applica-tions, Technologies, Architectures, and Protocols for ComputerCommunications, 2003, 27–34.
  2. [2] R. Dalal, Y. Singh, and M. Khari, A review on key managementschemes in MANET, International Journal of Distributed andParallel Systems, 3(4), 165, 2012.
  3. [3] R. Dalal, M. Khari, and Y. Singh, Different ways to achieveTrust in MANET, International Journal on AdHoc NetworkingSystems (IJANS), 2(2), 2012, 53–64.
  4. [4] R. Dalal, M. Khari, and Y. Singh, Survey of trust schemes on ad-hoc network, in International Conference on Computer Scienceand Information Technology (Springer, Berlin, Heidelberg,2012), 170–180.
  5. [5] R. Dalal, M. Khari, and Y. Singh, Authenticity check to providetrusted platform in MANET (ACTP), in Proceedings of theSecond International Conference on Computational Science,Engineering and Information Technology, 2012, 647–655.78
  6. [6] R. Dalal and M. Khari, The new approach to provide trustedplatform in MANET, International Journal of Security, Pri-vacy and Trust Management (IJSPTM), 1, 2012, 6.
  7. [7] Z. Zhang, Routing in intermittently connected mobile ad hocnetworks and delay tolerant networks: overview and challenges,IEEE Communications Surveys & Tutorials, 8(1), 2006, 24–37.
  8. [8] L. Lilien, Z. H. Kamal, V. Bhuse, and A. Gupta, Opportunisticnetworks: the concept and research challenges in privacy andsecurity, Proc. of the WSPWN, 2006, 134–147.
  9. [9] S. Trifunovic et al., A decade of research in opportunisticnetworks: challenges, relevance, and future directions, IEEECommunications Magazine, 55(1), 2017, 168–173.
  10. [10] R. Dalal, and M. Khari, Empirical analysis of routing pro-tocols in opportunistic network, in Research in Intelligentand Computing in Engineering (Springer, Singapore, 2021),695–703.
  11. [11] A. Elwhishi and P.-H. Ho, Sarp-a novel multi-copy routingprotocol for intermittently connected mobile networks, in GlobalTelecommunications Conference, GLOBECOM (IEEE, 2009),1–7.
  12. [12] A. Vahdat, and D. Becker, Epidemic Routing for PartiallyConnected Ad Hoc Networks, 2000.
  13. [13] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, Spray andwait: an efficient routing scheme for intermittently connectedmobile networks, in Proceedings of the 2005 ACM SIGCOMMWorkshop on Delay-Tolerant Networking, 2005, 252–259.
  14. [14] M. Abbas, N. H. M. Yusof, and N. Fisal, Performance evaluationof Binary Spray and Wait OppNet protocol in the context ofemergency scenario, in 2013 IEEE International Conferenceon Pervasive Computing and Communications Workshops(PERCOM Workshops), 2013, 517–522.
  15. [15] A. Lindgren, A. Doria, and O. Schelen, Probabilistic routingin intermittently connected networks, in Service Assurancewith Partial and Intermittent Resources (Springer, Berlin,Heidelberg, 2004), 239–254.
  16. [16] M. K. Denko (Ed.) Mobile Opportunistic Networks: Architec-tures, Protocols and Applications (CRC Press, 2016).
  17. [17] C. M. Huang, K. C. Lan, and C. Z. Tsai, A survey of oppor-tunistic networks, in 22nd International Conference on Ad-vanced Information Networking and Applications-Workshops(Aina Workshops), 2008, 1672–1677.
  18. [18] M. Musolesi, S. Hailes, and C. Mascolo, Adaptive routing forintermittently connected mobile ad hoc networks, in Sixth IEEEInternational Symposium on a World of wireless mobile andmultimedia networks, Sixth IEEE International Symposium onIEEE.005. WoWMoM 2005, 2005, 183–189.
  19. [19] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, Max-prop: Routing for vehicle-based disruption-tolerant networks,in Proceedings of the 25th IEEE International Conference onComputer Communications, INFOCOM 2006 (IEEE, 2006),1–11.
  20. [20] S. Jain, K. Fall, and R. Patra, Routing in a delay tolerantnetwork, in Proceedings of the 2004 Conference on Applica-tions, Technologies, Architectures, and Protocols for ComputerCommunications, 2004, 145–158.
  21. [21] K. Tan, Q. Zhang, and W. Zhu, Shortest path routing inpartially connected ad hoc networks, in Global Telecommuni-cations Conference, GLOBECOM 2003 (IEEE, Vol. 2, 2003),1038–1042.
  22. [22] R. Ciobanu, C. Dobre, and V. Cristea, SPRINT: Socialprediction-based opportunistic routing, in 2013 IEEE 14thInternational Symposium and Workshops: World of Wireless,Mobile and Multimedia Networks, 2013, 1–7.
  23. [23] C. Boldrini, M. Conti, J. Jacopini, and A. Passarella, Hibop:A history based routing protocol for opportunistic networks, In2007 IEEE International Symposium on a World of Wireless,Mobile and Multimedia Networks (IEEE, 2007), 1–12.
  24. [24] S. Kumaram, S. Srivastava, and D. K. Sharma, Neural net-workbased routing protocol for opportunistic networks withintelligent water drop optimization, International Journal ofCommunication Systems, 33(8), 2020, e4368.
  25. [25] R. Agrawal, T. Imieliski, and A. Swami, Mining associationrules between sets of items in large databases, in Proceed-ings of the 1993 ACM SIGMOD International Conference onManagement of Data, 1993, 207–216.
  26. [26] Q. Zhao, and S. S. Bhowmick, Association rule mining: Asurvey. Nanyang Technological University, Singapore, 2003,135.
  27. [27] A. Kernen, J. Ott, and T. Krkkinen, The ONE simulator forDTN protocol evaluation, in Proceedings of the 2nd Interna-tional Conference on Simulation Tools and Techniques, 2009,1–10.
  28. [28] A. M. Mughal and K. Iqbal, Optimization of biomechanicalsts movement with linear matrix inequalities, MechatronicSystems and Control, 47(1), 2019, 1–11.
  29. [29] A. E. Jajarm, A. H. Abolmasoumi, and H. R. Momeni,Intelligent fuzzy improvement of non-singular terminal sliding-mode control, Mechatronic Systems and Control, 47(1), 2019,12–17.
  30. [30] H. Li, S. Zhang, J. Shi, and Y. Hu, Research and Design ofIntelligent Learning System based on Recommendation Tech-nology.

Important Links:

Go Back