1. Wu, D., Zhang, F., Wang, H., et al.: Security-oriented opportunistic data forwarding in mobile social networks. Future Gener. Comput. Syst. 87(10), 803–815 (2017)
2. Yuan, P., Fan, L., Liu, P., et al.: Recent progress in routing protocols of mobile opportunistic networks: a clear taxonomy, analysis and evaluation. J. Network Comput. Appl. 62(C), 163–170 (2016)
3. Patel, D., Shah, R.: Improved PROPHET routing protocol in DTN. Int. Res. J. Eng. Technol. 503–509 (2016)
4. Pan, H., Chaintreau, A., Scott, J., et al.: Pocket switched networks and human mobility in conference environments. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, pp. 244–251. ACM, Philadelphia (2005)
5. Wang, X., Lin, Y., Zhang, S., et al.: A social activity and physical contact-based routing algorithm in mobile opportunistic networks for emergency response to sudden disasters. Enterp. Inf. Syst. 1–30 (2015)