On the comparison between performance of DHT-based protocols for opportunistic networks