{"id":"https://openalex.org/W2160715681","doi":"https://doi.org/10.1109/icc.2011.5962592","title":"Internal Threats Avoiding Based Forwarding Protocol in Social Selfish Delay Tolerant Networks","display_name":"Internal Threats Avoiding Based Forwarding Protocol in Social Selfish Delay Tolerant Networks","publication_year":2011,"publication_date":"2011-06-01","ids":{"openalex":"https://openalex.org/W2160715681","doi":"https://doi.org/10.1109/icc.2011.5962592","mag":"2160715681"},"language":"en","primary_location":{"id":"doi:10.1109/icc.2011.5962592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2011.5962592","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100690709","display_name":"Xin Guan","orcid":"https://orcid.org/0000-0002-9129-327X"},"institutions":[{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Xin Guan","raw_affiliation_strings":["Graduate School of Science and Technology, Keio University, Yokohama, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Science and Technology, Keio University, Yokohama, Japan","institution_ids":["https://openalex.org/I203951103"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100331605","display_name":"Cong Liu","orcid":"https://orcid.org/0000-0002-5999-2126"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Liu","raw_affiliation_strings":["Computer Science Department, Sun Yet Sen University, China"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Sun Yet Sen University, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100337209","display_name":"Min Chen","orcid":"https://orcid.org/0000-0002-0960-4447"},"institutions":[{"id":"https://openalex.org/I139264467","display_name":"Seoul National University","ror":"https://ror.org/04h9pn542","country_code":"KR","type":"education","lineage":["https://openalex.org/I139264467"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Min Chen","raw_affiliation_strings":["School of Computer Science and Engineering, Seoul National University, South Korea"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Seoul National University, South Korea","institution_ids":["https://openalex.org/I139264467"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008473103","display_name":"Hongyang Chen","orcid":"https://orcid.org/0000-0002-7626-0162"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hongyang Chen","raw_affiliation_strings":["Institute of Industrial Science, University of Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Institute of Industrial Science, University of Tokyo, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016337773","display_name":"Tomoaki Ohtsuki","orcid":"https://orcid.org/0000-0003-3961-1426"},"institutions":[{"id":"https://openalex.org/I203951103","display_name":"Keio University","ror":"https://ror.org/02kn6nx58","country_code":"JP","type":"education","lineage":["https://openalex.org/I203951103"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Tomoaki Ohtsuki","raw_affiliation_strings":["Graduate School of Science and Technology, Keio University, Yokohama, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Science and Technology, Keio University, Yokohama, Japan","institution_ids":["https://openalex.org/I203951103"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100690709"],"corresponding_institution_ids":["https://openalex.org/I203951103"],"apc_list":null,"apc_paid":null,"fwci":1.0502,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.80057934,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/selfishness","display_name":"Selfishness","score":0.926659107208252},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7222276926040649},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.7027510404586792},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5894133448600769},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.5718601942062378},{"id":"https://openalex.org/keywords/gini-coefficient","display_name":"Gini coefficient","score":0.4562169313430786},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44500377774238586},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44294992089271545},{"id":"https://openalex.org/keywords/microeconomics","display_name":"Microeconomics","score":0.30088019371032715},{"id":"https://openalex.org/keywords/inequality","display_name":"Inequality","score":0.18059542775154114},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.17558032274246216}],"concepts":[{"id":"https://openalex.org/C2778841147","wikidata":"https://www.wikidata.org/wiki/Q36381317","display_name":"Selfishness","level":2,"score":0.926659107208252},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7222276926040649},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.7027510404586792},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5894133448600769},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.5718601942062378},{"id":"https://openalex.org/C2779206190","wikidata":"https://www.wikidata.org/wiki/Q162455","display_name":"Gini coefficient","level":4,"score":0.4562169313430786},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44500377774238586},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44294992089271545},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.30088019371032715},{"id":"https://openalex.org/C45555294","wikidata":"https://www.wikidata.org/wiki/Q28113351","display_name":"Inequality","level":2,"score":0.18059542775154114},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.17558032274246216},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C513380476","wikidata":"https://www.wikidata.org/wiki/Q5055020","display_name":"Economic inequality","level":3,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc.2011.5962592","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc.2011.5962592","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/1","display_name":"No poverty","score":0.7799999713897705}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1495019414","https://openalex.org/W1983523466","https://openalex.org/W1985344673","https://openalex.org/W2011107399","https://openalex.org/W2079274032","https://openalex.org/W2110790125","https://openalex.org/W2112316694","https://openalex.org/W2112701160","https://openalex.org/W2122426592","https://openalex.org/W2123030505","https://openalex.org/W2126505669","https://openalex.org/W2135712710","https://openalex.org/W2159502757","https://openalex.org/W4230844703","https://openalex.org/W4234068324","https://openalex.org/W6646342812","https://openalex.org/W6683236141"],"related_works":["https://openalex.org/W2039301641","https://openalex.org/W4376854896","https://openalex.org/W2583941345","https://openalex.org/W2375025128","https://openalex.org/W839810482","https://openalex.org/W1581165554","https://openalex.org/W3208171178","https://openalex.org/W3011329127","https://openalex.org/W2519139425","https://openalex.org/W4224228872"],"abstract_inverted_index":{"In":[0,73],"traditional":[1],"delay":[2],"tolerant":[3],"networks":[4],"(DTNs),":[5],"there":[6],"exists":[7],"a":[8,86],"potential":[9],"assumption":[10,39],"that":[11,40,102],"the":[12,24,38,53,78,109,116,122,126,130,138,143,146,152,157,166,171,184],"nodes":[13,41,79,118],"are":[14,42],"willing":[15],"to":[16,80,141],"help":[17],"others":[18,83],"for":[19,129],"packet":[20],"forwarding.":[21],"However,":[22],"in":[23,47,71,121],"real":[25],"application":[26],"scenarios,":[27],"such":[28],"as":[29],"civilian":[30],"DTNs,":[31],"selfish":[32,60,69,97,106,167],"behaviors":[33],"always":[34],"widely":[35],"exist.":[36],"Therefore,":[37],"cooperative":[43],"is":[44,65,112,175],"not":[45],"realistic":[46],"all":[48],"applications.":[49],"Currently,":[50],"most":[51],"of":[52,145,180],"existing":[54],"incentive":[55,91,107],"mechanism":[56,92],"focuses":[57],"on":[58,67,177],"individual":[59,96,105],"behaviors.":[61,98],"Few":[62],"research":[63],"work":[64],"proposed":[66,185],"social":[68,110,131,147,162,178],"behavior":[70],"DTNs.":[72,132],"this":[74,104],"paper,":[75],"we":[76,100,136,155,169],"stimulate":[77],"cooperate":[81],"with":[82],"by":[84,150,161],"using":[85,151,187],"virtual":[87],"bank":[88],"mechanism.":[89],"This":[90],"can":[93],"effectively":[94],"avoid":[95,134,156],"Meanwhile,":[99],"observe":[101],"under":[103],"mechanism,":[108],"distribution":[111],"unfair.":[113],"That":[114],"means":[115],"poverty":[117],"would":[119],"appear":[120],"networks,":[123],"and":[124],"become":[125],"internal":[127,158],"threats":[128,159],"To":[133,164],"this,":[135],"introduce":[137,170],"Gini":[139],"coefficient":[140],"measure":[142],"inequality":[144],"distribution.":[148],"Furthermore,":[149],"taxation":[153],"strategy,":[154],"caused":[160],"selfishness.":[163],"demonstrate":[165],"behavior,":[168],"forwarding":[172],"protocol":[173],"which":[174],"based":[176],"relations":[179],"nodes.":[181],"We":[182],"verify":[183],"methods":[186],"simulation":[188],"evaluations.":[189]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
