1 |
M. Seredynski, P. Bouvry, and M. A. Klopotek, "Modelling the evolution of cooperative behavior in ad hoc networks using a game based model," Proceedings of IEEE Symposium on Computational Intelligence and Games, Honolulu, HI, pp. 96-103, 2007.
|
2 |
J. S. Baras and T. Jiang, "Cooperation, trust and games in wireless networks," in Advances in Control, Communication Networks, and Transportation Systems, Boston, MA: Birkhauser, pp. 183-202, 2005.
|
3 |
J. M. Smith and G. R. Price, "The logic of animal conflict," Nature, vol. 246, no. 5427, pp. 15-18, 1973.
DOI
|
4 |
P. D. Straffin, Game Theory and Strategy, Washington, DC: Mathematical Association of America, 1993.
|
5 |
M. Allman, V. Paxson, and W. Stevens, "TCP congestion control," The Internet Engineering Task Force, Fremont, CA, RFC 2581, 2001.
|
6 |
T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research," Wireless Communications & Mobile Computing, vol. 2, no. 5, pp. 483-502, 2002.
DOI
ScienceOn
|
7 |
D. Johnson, Y. Hu, and D. Maltz, "The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4," The Internet Engineering Task Force, Fremont, CA, RFC 4728, 2007.
|
8 |
C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," The Internet Engineering Task Force, Fremont, CA, RFC 3561, 2003.
|
9 |
S. Buchegger and J. de Boudec, "Performance analysis of the CONFIDANT protocol," Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Lausanne, Switzerland, pp. 226-236, 2002.
|
10 |
P. Michiardi and R. Mova, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Proceedings of the 6th Joint Working Conference on Communications and Multimedia Security, Portoroz, Slovenia, pp. 107-121, 2002.
|
11 |
P. K. Dutta, Strategies and Games: Theory and Practice, Cambridge, MA: MIT Press, 1999.
|
12 |
S. R. Das, C. E. Perkins, and E. M. Royer, "Performance comparison of two on-demand routing protocols for ad hoc networks," Proceedings of the 9th Joint Conference of the IEEE Computer and Communications Societies, Tel Aviv, Israel, pp. 3- 12, 2000.
|
13 |
Q. He, D. Wu, and P. Khosla, "SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks," Proceedings of IEEE Wireless Communications and Networking Conference, Atlanta, GA, pp. 825-830, 2004.
|
14 |
F. Almenarez, A. Marin, D. Diaz, and J. Sanchez, "Developing a model for trust management in pervasive devices," Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications Workshop, Pisa, Italy, pp. 1-5, 2006.
|
15 |
A. Boukerch, L. Xu, and K. El-Khatib, "Trust-based security for wireless ad hoc and sensor networks," Computer Communications, vol. 30, no. 11-12, pp. 2413-2427, 2007.
DOI
ScienceOn
|
16 |
A. Ukil, "Secure trust management in distributed computing systems," Proceedings of the 6th IEEE International Conference on Electronic Design, Test and Application, Qeenstwon, New Zealand, pp. 116-121, 2011.
|