“…In the negotiation-based scheme in [5] the infected nodes, which are about to forward data, poll their neighbors about their residual energy before adjusting their message forwarding probability. Energy-aware routing protocols such as SPIN, LEACH and their descendants [5], [27], [28] can be considered to fall in this category as they achieve broadcast suppression. Similarly, the active publish/subscribe scheme proposed in [23] uses network coding and excludes some nodes from a phase of the 20th IEEE Symposium on Computers and Communication (ISCC) 978-1-4673-7194-0/15/$31.00 ©2015 IEEE dissemination process.…”