{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:43:18Z","timestamp":1762875798158},"reference-count":29,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1016\/j.comnet.2016.08.001","type":"journal-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T15:39:12Z","timestamp":1470411552000},"page":"141-151","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":32,"special_numbering":"C","title":["Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems"],"prefix":"10.1016","volume":"111","author":[{"given":"L.","family":"Militano","sequence":"first","affiliation":[]},{"given":"A.","family":"Orsino","sequence":"additional","affiliation":[]},{"given":"G.","family":"Araniti","sequence":"additional","affiliation":[]},{"given":"M.","family":"Nitti","sequence":"additional","affiliation":[]},{"given":"L.","family":"Atzori","sequence":"additional","affiliation":[]},{"given":"A.","family":"Iera","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.comnet.2016.08.001_bib0001","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MVT.2014.2380581","article-title":"Horizon 2020 and beyond: on the 5g operating system for a true digital society","volume":"10","author":"Soldani","year":"2015","journal-title":"Veh. Technol. Mag. IEEE"},{"issue":"2","key":"10.1016\/j.comnet.2016.08.001_bib0002","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCOM.2014.6736746","article-title":"Five disruptive technology directions for 5g","volume":"52","author":"Boccardi","year":"2014","journal-title":"Commun. Mag. IEEE"},{"issue":"3","key":"10.1016\/j.comnet.2016.08.001_bib0003","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MWC.2012.6231164","article-title":"Operator controlled device-to-device communications in LTE-advanced networks","volume":"19","author":"Lei","year":"2012","journal-title":"IEEE Wireless Commun."},{"issue":"4","key":"10.1016\/j.comnet.2016.08.001_bib0004","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MCOM.2014.6807942","article-title":"Smart-device-to-smart-device communications","volume":"52","author":"Mumtaz","year":"2014","journal-title":"Commun. Mag. IEEE"},{"issue":"4","key":"10.1016\/j.comnet.2016.08.001_bib0005","doi-asserted-by":"crossref","first-page":"1163","DOI":"10.1007\/s11276-014-0842-7","article-title":"Exploiting online and offline activity-based metrics for opportunistic forwarding","volume":"21","author":"Rango","year":"2015","journal-title":"Wireless Netw."},{"issue":"4","key":"10.1016\/j.comnet.2016.08.001_bib0006","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MCOM.2014.6807947","article-title":"Relay-by-smartphone: realizing multihop device-to-device communications","volume":"52","author":"Nishiyama","year":"2014","journal-title":"Commun. Mag. IEEE"},{"issue":"6","key":"10.1016\/j.comnet.2016.08.001_bib0007","doi-asserted-by":"crossref","first-page":"1295","DOI":"10.1007\/s11276-013-0677-7","article-title":"Survey on mobile social networking in proximity (msnp): approaches, challenges and architecture","volume":"20","author":"Wang","year":"2014","journal-title":"Wireless Netw."},{"key":"10.1016\/j.comnet.2016.08.001_bib0008","series-title":"Vehicular Technology Conference (VTC Fall), 2014 IEEE 80th","first-page":"1","article-title":"A spatially consistent radio channel model enabling dual mobility","author":"Nurmela","year":"2014"},{"issue":"99","key":"10.1016\/j.comnet.2016.08.001_sbref0009","article-title":"A constrained coalition formation game for multihop d2d content uploading","volume":"PP","author":"Militano","year":"2015","journal-title":"Wireless Commun. IEEE Trans."},{"key":"10.1016\/j.comnet.2016.08.001_bib0010","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","article-title":"A survey on trust management for internet of things","volume":"42","author":"Yan","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.comnet.2016.08.001_bib0011","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","article-title":"Security, privacy and trust in internet of things: the road ahead","volume":"76","author":"Sicari","year":"2015","journal-title":"Comput. Netw."},{"issue":"16","key":"10.1016\/j.comnet.2016.08.001_bib0012","doi-asserted-by":"crossref","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","article-title":"The social internet of things (SIoT) \u2013 when social networks meet the internet of things: concept, architecture and network characterization","volume":"56","author":"Atzori","year":"2012","journal-title":"Comput. Netw."},{"issue":"5","key":"10.1016\/j.comnet.2016.08.001_bib0013","doi-asserted-by":"crossref","first-page":"1253","DOI":"10.1109\/TKDE.2013.105","article-title":"Trustworthiness Management in the Social Internet of Things","volume":"26","author":"Nitti","year":"2014","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"10.1016\/j.comnet.2016.08.001_bib0014","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/1120717.1120723","article-title":"Overcoming free-riding behavior in peer-to-peer systems","volume":"5","author":"Feldman","year":"2005","journal-title":"ACM SIGecom Exch."},{"issue":"2","key":"10.1016\/j.comnet.2016.08.001_bib0015","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MC.2007.76","article-title":"Trust management in distributed systems","author":"Li","year":"2007","journal-title":"Computer"},{"key":"10.1016\/j.comnet.2016.08.001_bib0016","series-title":"Trust Management","first-page":"91","article-title":"Trust management tools for internet applications","author":"Grandison","year":"2003"},{"key":"10.1016\/j.comnet.2016.08.001_bib0017","series-title":"Communications Workshops, 2008. ICC Workshops\u2019 08. IEEE International Conference on","first-page":"311","article-title":"A distributed merge and split algorithm for fair cooperation in wireless networks","author":"Saad","year":"2008"},{"issue":"1","key":"10.1016\/j.comnet.2016.08.001_bib0018","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/JSAC.2011.110106","article-title":"Coalition formation games for distributed cooperation among roadside units in vehicular networks","volume":"29","author":"Saad","year":"2011","journal-title":"Sel. Areas Commun. IEEE J."},{"key":"10.1016\/j.comnet.2016.08.001_bib0019","series-title":"Web Information Systems Engineering\u2013WISE 2015","first-page":"570","article-title":"Trust-based coalition formation for dynamic service composition in social networks","author":"Louati","year":"2015"},{"key":"10.1016\/j.comnet.2016.08.001_bib0020","series-title":"Advances in Artificial Intelligence-SBIA 2012","first-page":"162","article-title":"A coalition formation mechanism for trust and reputation-aware multi-agent systems","author":"Hoelz","year":"2012"},{"issue":"7","key":"10.1016\/j.comnet.2016.08.001_bib0021","doi-asserted-by":"crossref","first-page":"3965","DOI":"10.1109\/TWC.2014.2325552","article-title":"Coalitional games for resource allocation in the device-to-device uplink underlaying cellular networks","volume":"13","author":"Li","year":"2014","journal-title":"Wireless Commun. IEEE Trans."},{"key":"10.1016\/j.comnet.2016.08.001_bib0022","series-title":"Technical Report","article-title":"TS 36.300, Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN), Rel. 11","author":"3GPP","year":"2012"},{"key":"10.1016\/j.comnet.2016.08.001_bib0023","series-title":"Technical Report","article-title":"TS 36.213 Evolved Universal Terrestrial Radio Access (E-UTRA): Physical layer procedures, Rel. 11","author":"3GPP","year":"2012"},{"issue":"9","key":"10.1016\/j.comnet.2016.08.001_bib0024","doi-asserted-by":"crossref","first-page":"881","DOI":"10.1080\/08839510050144868","article-title":"Trust management through reputation mechanisms","volume":"14","author":"Zacharia","year":"2000","journal-title":"Appl. Artif. Intell."},{"issue":"1","key":"10.1016\/j.comnet.2016.08.001_bib0025","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1109\/TVT.2013.2274533","article-title":"A layered coalitional game framework of wireless relay network","volume":"63","author":"Lu","year":"2014","journal-title":"Veh. Technol. IEEE Trans."},{"key":"10.1016\/j.comnet.2016.08.001_bib0026","series-title":"Technical Report","article-title":"TS 36.101, LTE Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio transmission and reception, Rel. 10","author":"3GPP","year":"2011"},{"key":"10.1016\/j.comnet.2016.08.001_bib0027","doi-asserted-by":"crossref","unstructured":"M. Iturralde, T. Yahiya, A. Wei, A.Beylot, Interference mitigation by dynamic self-power control in femtocell scenarios in LTE networks, IEEE GLOBECOM (2012) 4810\u20134815.","DOI":"10.1109\/GLOCOM.2012.6503880"},{"key":"10.1016\/j.comnet.2016.08.001_bib0028","article-title":"Joint beamforming and power control for device-to-device communications underlaying cellular networks","author":"Lin","year":"2015","journal-title":"Sel. Areas Commun. IEEE J."},{"key":"10.1016\/j.comnet.2016.08.001_bib0029","series-title":"Texas Bitcoin Conference","article-title":"Blockchain thinking: the brain as a dac (decentralized autonomous organization)","author":"Swan","year":"2015"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1389128616302432?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1389128616302432?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,9]],"date-time":"2018-09-09T07:50:57Z","timestamp":1536479457000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128616302432"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":29,"alternative-id":["S1389128616302432"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comnet.2016.08.001","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2016,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1016\/j.comnet.2016.08.001","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}