L. Atzori, A. Iera, and G. Morabito, The Internet of Things: A survey, Computer Networks, vol.54, issue.15, pp.2787-2805, 2010.
DOI : 10.1016/j.comnet.2010.05.010

A. Knight, Networked Journalism in the Arab Spring, REASSESSING JOUR- NALISM, p.107, 2013.

J. Matt and . Duffy, Smartphones in the Arab spring. IPI Report : Media and Money, pp.53-56, 2011.

D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris, Linklevel measurements from an 802.11b mesh network, Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '04, pp.121-132, 2004.

P. Gardner-stephen, The serval project : Practical wireless ad-hoc mobile telecommunications . Rural, Remote & Humanitarian Telecommunications Fellow, Flinders University and Founder, 2011.

T. Clausen and P. Jacquet, Optimized link state routing protocol (OLSR), 2003.
DOI : 10.17487/rfc3626

URL : https://hal.archives-ouvertes.fr/inria-00471712

C. Perkins, E. Belding-royer, and S. Das, Ad hoc on-demand distance vector (AODV) routing, 2003.
DOI : 10.17487/rfc3561

A. Neumann, C. Aichele, M. Lindner, and S. Wunderlich, Better approach to mobile ad-hoc networking (BATMAN). IETF draft, 2008.

M. Conti and M. Kumar, Opportunities in Opportunistic Computing, Computer, vol.43, issue.1, pp.42-50, 2010.
DOI : 10.1109/MC.2010.19

R. Schollmeier, A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications, Proceedings First International Conference on Peer-to-Peer Computing, pp.101-102, 2001.
DOI : 10.1109/P2P.2001.990434

R. Steinmetz and K. Wehrle, What Is This " Peer-to-Peer " About ? In Peerto-Peer Systems and Applications, pp.9-16, 2005.

S. Saroiu, P. Krishna, . Gummadi, D. Steven, and . Gribble, Measuring and analyzing the characteristics of Napster and Gnutella hosts. Multimedia systems, pp.170-184, 2003.

B. Alan, . Johnston, C. Daniel, and . Burnett, WebRTC : APIs and RTCWEB protocols of the HTML5 real-time web, Digital Codex LLC, 2012.

S. Corson and J. Macker, Mobile ad hoc networking (MANET) : Routing protocol performance issues and evaluation considerations, 1998.
DOI : 10.17487/rfc2501

G. Anastasi, E. Borgia, M. Conti, and E. Gregori, Wi-fi in ad hoc mode: a measurement study, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the, pp.145-154, 2004.
DOI : 10.1109/PERCOM.2004.1276853

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.7167

Y. Barowski, S. Biaz, and P. Agrawal, Towards the performance analysis of IEEE 802.11 in multi-hop ad-hoc networks, IEEE Wireless Communications and Networking Conference, 2005, pp.100-106, 2005.
DOI : 10.1109/WCNC.2005.1424483

G. Anastasi, E. Borgia, M. Conti, and E. Gregori, IEEE 802.11 ad hoc networks: performance measurements, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings., pp.758-763, 2003.
DOI : 10.1109/ICDCSW.2003.1203643

L. Jack, . Burbank, F. Philip, . Chimento, K. Brian et al., Key challenges of military tactical networking and the elusive promise of MANET technology, IEEE Communications Magazine, issue.11, pp.4439-4484, 2006.

X. Lu, Y. Chen, I. Leung, Z. Xiong, and P. Liò, A Novel Mobility Model from a Heterogeneous Military MANET Trace, International Conference on Ad-Hoc Networks and Wireless, pp.463-474, 2008.
DOI : 10.1007/978-3-540-85209-4_37

L. Barrère, Étude et proposition de services dans les réseaux mobiles militaires de type MANet, 2009.

J. Zygmunt, . Haas, R. Marc, P. Pearlman, and . Samar, The zone routing protocol (ZRP) for ad hoc networks, 2002.

P. Juang, H. Oki, Y. Wang, M. Martonosi, L. S. Peh et al., Energy-efficient computing for wildlife tracking, ACM SIGPLAN Notices, vol.37, issue.10, pp.96-107, 2002.
DOI : 10.1145/605432.605408

P. Zhang, M. Christopher, . Sadler, A. Stephen, M. Lyon et al., Hardware design experiences in ZebraNet, Proceedings of the 2nd international conference on Embedded networked sensor systems , SenSys '04, pp.227-238, 2004.
DOI : 10.1145/1031495.1031522

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.1094

T. Liu, M. Christopher, P. Sadler, M. Zhang, and . Martonosi, Implementing software on resource-constrained mobile sensors, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.256-269, 2004.
DOI : 10.1145/990064.990095

M. Martonosi, Embedded systems in the wild, ACM SIGPLAN Notices, vol.41, issue.7, pp.1-1, 2006.
DOI : 10.1145/1159974.1134651

T. Small, J. Zygmunt, and . Haas, The shared wireless infostation model, Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '03, pp.233-244, 2003.
DOI : 10.1145/778415.778443

H. Soroush, N. Banerjee, M. Corner, B. Levine, and B. Lynn, A retrospective look at the UMass DOME mobile testbed, ACM SIGMOBILE Mobile Computing and Communications Review, vol.15, issue.4, pp.2-15, 2012.
DOI : 10.1145/2169077.2169079

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.640.1170

K. Fall and S. Farrell, DTN: an architectural retrospective, IEEE Journal on Selected Areas in Communications, vol.26, issue.5, pp.828-836, 2008.
DOI : 10.1109/JSAC.2008.080609

URL : http://www.tara.tcd.ie/bitstream/2262/39149/1/DTN%20-%20an%20architectural%20retrospective.pdf

A. Mcmahon and S. Farrell, Delay- and Disruption-Tolerant Networking, IEEE Internet Computing, vol.13, issue.6, p.82, 2009.
DOI : 10.1109/MIC.2009.127

M. Conti and S. Giordano, Multihop Ad Hoc Networking: The Reality, IEEE Communications Magazine, vol.45, issue.4, pp.88-95, 2007.
DOI : 10.1109/MCOM.2007.343617

L. Pelusi, A. Passarella, and M. Conti, Opportunistic networking: data forwarding in disconnected mobile ad hoc networks, IEEE Communications Magazine, vol.44, issue.11, pp.134-141, 2006.
DOI : 10.1109/MCOM.2006.248176

S. Ferretti, Shaping opportunistic networks, Computer Communications, vol.36, issue.5, pp.481-503, 2013.
DOI : 10.1016/j.comcom.2012.12.006

F. Vinícius, F. D. Mota, . Cunha, F. Daniel, . Macedo et al., Protocols, mobility models and tools in opportunistic networks : A survey, Computer Communications, vol.48, pp.5-19, 2014.

H. Ntareme, M. Zennaro, and B. Pehrson, Delay tolerant network on smartphones, Proceedings of the 3rd Extreme Conference on Communication The Amazon Expedition, ExtremeCom '11, 2011.
DOI : 10.1145/2414393.2414407

S. Farrell, A. Mcmahon, S. Weber, K. Hartnett, A. Lynch et al., Report on DTN Applications During Arctic Summer 2010 Trial, 1st International Workshop on Opportunistic and Delay/Disruption-Tolerant Networking, 2011.
DOI : 10.1007/s11276-011-0323-1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.432.3104

. Md, A. Islam, T. Turkulainen, M. Kärkkäinen, J. Pitkänen et al., Practical Voice Communications in Challenged Networks, 1st Extreme Workshop on Communications, 2009.

C. Tziouvas, L. Lambrinos, and C. Chrysostomou, A Delay Tolerant Platform for Voice Message Delivery, 1st International Workshop on Opportunistic and Delay/Disruption-Tolerant Networking, pp.1-5, 2011.

Y. Mahéo, N. L. Sommer, P. Launay, F. Guidec, and M. Dragone, Beyond Opportunistic Networking Protocols : a Disruption-Tolerant Application Suite for Disconnected MANETs, 4th Extreme Conference on Communication (ExtremeCom'12), pp.1-6, 2012.

C. Jaap and . Haartsen, The Bluetooth radio system, IEEE personal communications, vol.7, issue.1, pp.28-36, 2000.

P. Brian, I. Crow, . Widjaja, . Kim, T. Prescott et al., IEEE 802.11 wireless local area networks, IEEE Communications magazine, vol.35, issue.9, pp.116-126, 1997.

D. Camps-mur, A. Garcia-saavedra, and P. Serrano, Device-to-device communications with Wi-Fi Direct: overview and experimentation, IEEE Wireless Communications, vol.20, issue.3, pp.96-104, 2013.
DOI : 10.1109/MWC.2013.6549288

P. Kinney, Zigbee technology : Wireless control that simply works, Communications design conference, pp.1-7, 2003.

A. Asadi and V. Mancuso, WiFi Direct and LTE D2D in action, 2013 IFIP Wireless Days (WD), pp.1-8, 2013.
DOI : 10.1109/WD.2013.6686520

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.475.6040

T. Kärkkäinen, M. Pitkänen, P. Houghton, and J. Ott, SCAMPI application platform, Proceedings of the seventh ACM international workshop on Challenged networks, CHANTS '12, pp.83-86, 2012.
DOI : 10.1145/2348616.2348636

J. Scott, J. Crowcroft, P. Hui, and C. Diot, Haggle : A networking architecture designed around mobile users, WONS 2006 : Third Annual Conference on Wireless On-demand Network Systems and Services, pp.78-86, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00001012

S. Farrell, S. Weber, A. Mcmahon, E. Meehan, and K. Hartnett, An n4c dtn router node design, 1st Extreme Workshop on Communication, 2009.

J. Haillot, F. Guidec, S. Corlay, and J. Turbert, Disruption-tolerant content-driven information dissemination in partially connected military tactical radio networks, MILCOM 2009, 2009 IEEE Military Communications Conference, pp.2326-2332, 2009.
DOI : 10.1109/MILCOM.2009.5379983

URL : https://hal.archives-ouvertes.fr/hal-00452208

F. Laforest, N. L. Sommer, S. Frénot, F. De-corbière, Y. Mahéo et al., C3PO: A Spontaneous and Ephemeral Social Networking Framework for a Collaborative Creation and Publishing of Multimedia Contents, International conference on selected topics in Mobile and Wireless Networking Procedia Computer Science, pp.1-6, 2014.
DOI : 10.1016/j.procs.2014.10.040

URL : https://hal.archives-ouvertes.fr/hal-01069778

M. Mrissa, L. Médini, J. Jamont, N. L. Sommer, and J. Laplace, An Avatar Architecture for the Web of Things, IEEE Internet Computing, vol.19, issue.2, p.30, 2015.
DOI : 10.1109/MIC.2015.19

URL : https://hal.archives-ouvertes.fr/hal-01376637

T. Spyropoulos, K. Psounis, S. Cauligi, and . Raghavendra, Single-copy routing in intermittently connected mobile networks, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004., pp.235-244, 2004.
DOI : 10.1109/SAHCN.2004.1381922

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.7392

A. Vahdat and D. Becker, Epidemic routing for partially connected ad hoc networks, 2000.

A. Balasubramanian, B. Levine, and A. Venkataramani, DTN routing as a resource allocation problem, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.373-384, 2007.
DOI : 10.1145/1282427.1282422

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.9966

R. Ramanathan, R. Hansen, P. Basu, R. Rosales-hain, and R. Krishnan, Prioritized epidemic routing for opportunistic networks, Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking , MobiOpp '07
DOI : 10.1145/1247694.1247707

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.218.8422

T. Spyropoulos, K. Psounis, and C. S. Raghavendra, Spray and wait, Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking , WDTN '05, pp.252-259, 2005.
DOI : 10.1145/1080139.1080143

T. Spyropoulos, K. Psounis, S. Cauligi, and . Raghavendra, Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), pp.79-85, 2007.
DOI : 10.1109/PERCOMW.2007.108

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.7432

S. Milgram, The small world problem, Psychology today, vol.2, issue.1, pp.60-67, 1967.
DOI : 10.1037/e400002009-005

W. Hsu and A. Helmy, On Nodal Encounter Patterns in Wireless LAN Traces, Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks 4th International Symposium on, pp.1-10, 2006.
DOI : 10.1109/TMC.2010.123

URL : http://ceng.usc.edu/~helmy/papers/SmallWorld-revision1-2.pdf

J. Duncan, . Watts, H. Steven, and . Strogatz, Collective dynamics of 'smallworld'networks, nature, vol.393, issue.6684, pp.440-442, 1998.

E. M. Daly and M. Haahr, Social network analysis for routing in disconnected delay-tolerant MANETs, Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '07, pp.32-40, 2007.
DOI : 10.1145/1288107.1288113

A. Lindgren, A. Doria, and O. Schelen, Probabilistic routing in intermittently connected networks. Service Assurance with Partial and Intermittent Resources, pp.239-254, 2004.
DOI : 10.1145/961268.961272

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.6027

J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-11, 2006.
DOI : 10.1109/INFOCOM.2006.228

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.272

C. Boldrini, M. Conti, J. Jacopini, and A. Passarella, HiBOp: a History Based Routing Protocol for Opportunistic Networks, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp.1-12, 2007.
DOI : 10.1109/WOWMOM.2007.4351716

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.5452

M. Musolesi and C. Mascolo, CAR: Context-Aware Adaptive Routing for Delay-Tolerant Mobile Networks, IEEE Transactions on Mobile Computing, vol.8, issue.2, pp.246-260, 2009.
DOI : 10.1109/TMC.2008.107

P. Cheng, J. Weng, L. Tung, C. Kevin, M. Lee et al., GeoDTN+ Nav : a hybrid geographic and DTN routing with navigation assistance in urban vehicular networks, ISVCS, 2008.

P. Cheng, C. Kevin, M. Lee, J. Gerla, and . Härri, GeoDTN+Nav: Geographic DTN Routing with Navigator Prediction for Urban Vehicular Environments, Mobile Networks and Applications, pp.61-82, 2010.
DOI : 10.1007/s11036-009-0181-6

N. Vasco, . Soares, J. Joel, F. Rodrigues, and . Farahmand, GeoSpray : A geographic routing protocol for vehicular delay-tolerant networks, Information Fusion, vol.15, pp.102-113, 2014.

A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, and I. Stoica, Geographic routing without location information, Proceedings of the 9th annual international conference on Mobile computing and networking , MobiCom '03, pp.96-108, 2003.
DOI : 10.1145/938985.938996

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.8405

V. Cisco and . Mobile, Cisco visual networking index : global mobile data traffic forecast update, pp.2011-2016, 2014.

A. Masaracchia, Opportunistic traffic Offloading Mechanisms for Mobi- le/4G Networks, Proceedings of the 2015 on MobiSys PhD Forum, pp.15-16, 2015.
DOI : 10.1145/2752746.2752785

J. Whitbeck, Y. Lopez, J. Leguay, V. Conan, M. D. De et al., Push-andtrack : Saving infrastructure bandwidth through opportunistic forwarding, Pervasive and Mobile Computing, 2012.
DOI : 10.1016/j.pmcj.2012.02.001

URL : http://arxiv.org/abs/1201.4292

H. Izumikawa and J. Katto, RoCNet: Spatial mobile data offload with user-behavior prediction through delay tolerant networks, 2013 IEEE Wireless Communications and Networking Conference (WCNC), pp.2196-2201, 2013.
DOI : 10.1109/WCNC.2013.6554902

M. Sanjeev-arulampalam, S. Maskell, N. Gordon, and T. Clapp, A tutorial on particle filters for online nonlinear/non-Gaussian Bayesian tracking, IEEE Transactions on Signal Processing, vol.50, issue.2, pp.174-188, 2002.
DOI : 10.1109/78.978374

P. Christoph, . Mayer, P. Oliver, and . Waldhorst, Offloading infrastructure using delay tolerant networks and assurance of delivery, Wireless Days (WD), 2011 IFIP, pp.1-7, 2011.

P. Baier, F. Dürr, and K. Rothermel, TOMP: Opportunistic traffic offloading using movement predictions, 37th Annual IEEE Conference on Local Computer Networks, pp.50-58, 2012.
DOI : 10.1109/LCN.2012.6423668

P. David, J. Anderson, E. Cobb, M. Korpela, D. Lebofsky et al., SETI@ home : an experiment in public-resource computing, Communications of the ACM, vol.45, issue.11, pp.56-61, 2002.

I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, Chord, ACM SIGCOMM Computer Communication Review, vol.31, issue.4, pp.149-160, 2001.
DOI : 10.1145/964723.383071

D. Eastlake and P. Jones, US secure hash algorithm 1 (SHA1), 2001.
DOI : 10.17487/rfc3174

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.184.9221

A. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Middleware, pp.329-350, 2001.
DOI : 10.1007/3-540-45518-3_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.752

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network, 2001.
DOI : 10.1145/383059.383072

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.1538

M. Jelasity, A. Montresor, and O. Babaoglu, T-Man: Gossip-based fast overlay topology construction, Computer Networks, vol.53, issue.13, pp.2321-2339, 2009.
DOI : 10.1016/j.comnet.2009.03.013

A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson et al., Epidemic algorithms for replicated database maintenance, Proceedings of the sixth annual ACM Symposium on Principles of distributed computing, pp.1-12, 1987.
DOI : 10.1145/43921.43922

A. Kermarrec and M. Van-steen, ACM SIGOPS operating systems review 41. Special issue on gossip-based networking, 2007.

O. Babaoglu, M. Jelasity, O. Babaoglu, and M. Jelasity, Self-* properties through gossiping, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol.449, issue.7160, pp.3747-3757, 1881.
DOI : 10.1038/449287a

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.139.2874

M. Jelasity, S. Voulgaris, R. Guerraoui, A. Kermarrec, and M. Van-steen, Gossip-based peer sampling, ACM Transactions on Computer Systems, vol.25, issue.3, p.8, 2007.
DOI : 10.1145/1275517.1275520

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.501

M. Ripeanu, Peer-to-peer architecture case study: Gnutella network, Proceedings First International Conference on Peer-to-Peer Computing, pp.99-100, 2001.
DOI : 10.1109/P2P.2001.990433

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4482

H. Burton and . Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970.

M. Mcilroy, Development of a Spelling List, IEEE Transactions on Communications, vol.30, issue.1, pp.91-99, 1982.
DOI : 10.1109/TCOM.1982.1095395

K. James, . Mullin, J. Daniel, and . Margoliash, A tale of three spelling checkers. Software : Practice and Experience, pp.625-630, 1990.

L. Fan, P. Cao, J. Almeida, and A. Z. Broder, Summary cache: a scalable wide-area Web cache sharing protocol, IEEE/ACM Transactions on Networking, vol.8, issue.3, pp.281-293, 2000.
DOI : 10.1109/90.851975

A. Kumar, J. Xu, and E. W. Zegura, Efficient and scalable query routing for unstructured peer-to-peer networks, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.1162-1173, 2005.
DOI : 10.1109/INFCOM.2005.1498343

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.3884

T. Heer, S. Götz, S. Rieche, and K. Wehrle, Adapting Distributed Hash Tables for Mobile Ad Hoc Networks, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06), pp.173-178, 2006.
DOI : 10.1109/PERCOMW.2006.16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.4234

P. Karwaczy´nskikarwaczy´nski, D. Konieczny, J. Mocnik, and M. Novak, Dual proximity neighbour selection method for peer-to-peer-based discovery service, Proceedings of the 2007 ACM symposium on Applied computing, pp.590-591, 2007.

N. B. Dang, S. T. Vu, and H. S. Nguyen, Building a Low-latency, Proximity-aware DHT-Based P2P Network, 2009 International Conference on Knowledge and Systems Engineering, pp.195-200, 2009.
DOI : 10.1109/KSE.2009.49

Q. Xu, L. Sun, and J. Liu, Topology-aware kademlia based on distributed clustering in self-organizing mode, Computer Engineering and Technology (ICCET), 2010 2nd International Conference on, pp.1-267, 2010.

H. Pucha, M. Saumitra, C. Das, and . Hu, Ekta: An Efficient DHT Substrate for Distributed Applications in Mobile Ad Hoc Networks, Sixth IEEE Workshop on Mobile Computing Systems and Applications, pp.163-173, 2004.
DOI : 10.1109/MCSA.2004.11

T. Zahn and J. Schiller, DHT-based Unicast for Mobile Ad Hoc Networks, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06), p.5, 2006.
DOI : 10.1109/PERCOMW.2006.42

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.404.6382

A. Klemm, C. Lindemann, P. Oliver, and . Waldhorst, A specialpurpose peer-to-peer file sharing system for mobile ad hoc networks, Vehicular Technology Conference VTC 2003-Fall. 2003 IEEE 58th, pp.2758-2763, 2003.
DOI : 10.1109/vetecf.2003.1286080

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.9634

W. Kellerer and R. Schollmeier, Proactive search routing for mobile peer-to-peer networks : Zone-based p2p, Proc. of ASWN. Citeseer, 2005.

N. Shah and D. Qian, An Efficient Unstructured P2P Overlay over MANET Using Underlying Proactive Routing, 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks, pp.248-255, 2011.
DOI : 10.1109/MSN.2011.15

B. David, . Johnson, A. David, and . Maltz, Dynamic source routing in ad hoc wireless networks, Mobile computing, pp.153-181, 1996.

O. Babaoglu, T. Binci, M. Jelasity, and A. Montresor, Firefly-inspired Heartbeat Synchronization in Overlay Networks, First International Conference on Self-Adaptive and Self-Organizing Systems (SASO 2007), pp.77-86, 2007.
DOI : 10.1109/SASO.2007.25

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.6497

M. Jelasity, A. Montresor, and O. Babaoglu, Gossip-based aggregation in large dynamic networks, ACM Transactions on Computer Systems, vol.23, issue.3, pp.219-252, 2005.
DOI : 10.1145/1082469.1082470

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.8747

J. Byers, J. Considine, M. Mitzenmacher, and S. Rost, Informed content delivery across adaptive overlay networks, ACM SIGCOMM Computer Communication Review, vol.32, issue.4, pp.47-60, 2002.
DOI : 10.1145/964725.633031

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.9552

C. Rohrs, Query routing for the Gnutella network. lime Wire LLC, 2001.

T. Michael and . Prinkey, An efficient scheme for query processing on peer-to-peer networks, aeolus Research, Inc, 2001.

C. Sean, J. Rhea, and . Kubiatowicz, Probabilistic location and routing, IN- FOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, pp.1248-1257, 2002.

S. Voulgaris, D. Gavidia, and M. Van-steen, CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays, Journal of Network and Systems Management, vol.21, issue.6, pp.197-217, 2005.
DOI : 10.1007/s10922-005-4441-x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.546.4161

F. Bonnet, F. Tronel, and S. Voulgaris, Brief announcement, Proceedings of the 28th ACM symposium on Principles of distributed computing, PODC '09, p.114
DOI : 10.1145/1582716.1582773

URL : https://hal.archives-ouvertes.fr/hal-00934186

A. Keränen, J. Ott, and T. Kärkkäinen, The ONE simulator for DTN protocol evaluation, Proceedings of the Second International ICST Conference on Simulation Tools and Techniques, 2009.
DOI : 10.4108/ICST.SIMUTOOLS2009.5674

M. Haklay and P. Weber, Openstreetmap : User-generated street maps. Pervasive Computing, IEEE, vol.7, issue.4, pp.12-18, 2008.
DOI : 10.1109/mprv.2008.80

A. Lindgren, A. Doria, and O. Schelén, Probabilistic Routing in Intermittently Connected Networks, Proceedings of the The First International Workshop on Service Assurance with Partial and Intermittent Resources, 2004.
DOI : 10.1145/961268.961272

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.6027

Y. Yu, R. Govindan, and D. Estrin, Geographical and energy aware routing : A recursive data dissemination protocol for wireless sensor networks, 2001.

T. Imielinski, C. Julio, and . Navas, Geographic Addressing, Routing, and resource discovery with the global Positioning system, 1996.

C. Julio, T. Navas, and . Imielinski, GeoCast?geographic addressing and routing, Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, pp.66-76, 1997.

J. Alfred, . Menezes, C. Paul, . Van-oorschot, A. Scott et al., Handbook of applied cryptography, 1996.

G. Dini and A. L. Duca, A reputation-based approach to tolerate misbehaving carriers in Delay Tolerant Networks, The IEEE symposium on Computers and Communications, pp.772-777, 2010.
DOI : 10.1109/ISCC.2010.5546701

L. Wei, H. Zhu, Z. Cao, and X. Sherman-shen, MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks, International Conference on Ad-Hoc Networks and Wireless, pp.177-190, 2011.
DOI : 10.1007/978-3-540-70514-7

G. Dini and A. L. Duca, Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network, Ad Hoc Networks, pp.1167-1178, 2012.
DOI : 10.1016/j.adhoc.2012.03.003