[1]
|
I. F. Akyildiz, S. Weilian, Y. Sankarasubramaniam, et al., “A Survey on Sensor Networks,” IEEE Communications Magazine, Vol. 40, No. 8, 2002, pp. 102-114.
doi:10.1109/MCOM.2002.1024422
|
[2]
|
S. Vikram, N. Pavan, C. F. Chiasserini, et al., “Cooperation in Wireless Ad Hoc Networks,” Proceedings of the INFOCOM 2003 Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, San Franciso, 30 March-3 April 2003.
|
[3]
|
E. Altman, A. A. Kherani, P. Michiardi and R. Molva. “Non-Cooperative Forwarding in Ad-hoc Networks,” Technical Report INRIA Report No. RR-5116, 2004..
|
[4]
|
P. Marbach and Q. Ying, “Cooperation in Wireless Ad Hoc Networks: A Market-Based Approach,” IEEE/ACM Transactions on Networking, Vol. 13, No. 6, 2005, pp. 1325-1338. doi:10.1109/TNET.2005.860109
|
[5]
|
P. Michiardi and R. Molva, “Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks,” Proceedings of the IFIP TC6/ TC11 6th Joint Working Conference on Communications and Multimedia Security, Deventer, 3-5 September 2002, pp. 107-121.
|
[6]
|
S. Bansal and M. Baker, “Observation-Based Cooperation Enforcement in Ad Hoc Networks,” Technical Paper, 2003.
|
[7]
|
S. G. Marti, T. J. Giuli and K. Lai, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” MOBICOM, Boston, 2000, pp. 255-265.
|
[8]
|
S. Buchegger and J. L. Boudec, “Performance Analysis of the CONFIDANT Protocol Cooperation of Nodes-Fairness in Dynamic Ad-Hoc Networks,” ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, 9-11 June 2002, pp. 226-236.
doi:10.1145/513800.513828
|
[9]
|
S. Zhong, J. Chen and Y. R. Yang, “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” Proceedings of the INFOCOM 2003 Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, San Franciso, 30 March-3 April 2003.
|
[10]
|
L. Buttyaan and J. P. Hubaux, “Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks,” Technical Report No. DSC/2001/001, Swiss Federal Institute of Technology (EPFL), Lausanne, 2001.
|
[11]
|
R. Gibbons, “Game Theory for Applied Economists,” Pricenton University Press, Princeton, 1992.
|
[12]
|
M. J. Osborne and A. Rubinste, “A Course in Game Theory,” The MIT Press, Cambridge, 1994.
|
[13]
|
D. Levin, “Punishment in Selfish Wireless Networks: A Game Theoretic Analysis,” Proceedings of the ACM Workshop on the Economics of Networked Systems (NetEcon 2006), Ann Arbor, 11 June 2006.
|
[14]
|
H. Zhu, J. Zhu and K. J. R. Liu, “A Cartel Maintenance Framework to Enforce Cooperation in Wireless Networks with Selfish Users,” IEEE Transactions on Wireless Communications, Vol. 7, No. 5, 2008, pp. 1889-1899.
doi:10.1109/TWC.2008.061014
|
[15]
|
Y. Lu, J. Shi and L. Xie, “Repeated-Game Modeling of Cooperation Enforcement in Wireless Ad Hoc Network,” Journal of Software, Vol. 19, 2008, pp. 755-756.
doi:10.3724/SP.J.1001.2008.00755
|
[16]
|
J. Harsanyi and R. Selten, “A General Theory of Equilibrium Selection in Games,” Cambridge University Press, Cambridge, 1988.
|