Miranda H, Rodrigues L. Preventing selfishness in open mobile Ad hoc networks.
[2]
Marti S, Giuli T J. Mitigating routing misbehavior in mobile Ad hoc networks//MobiCOM 2000. Boston:, 2000: 255-265.
[3]
Michiardi P, Molva R. Simulation-based analysis of security exposures in mobile Ad hoc networks//Proceedings of European Wireless Conference. Firenze: , 2002.
[4]
Buchegger S, Boudec J Y L. Performance analysis of the Confidant protocol: cooperation of nodes-fairness in dynamic Ad-hoc networks//MobiHOC 2002. Lausanne: , 2002: 226-236.
[5]
Buchegger S, Boudec J Y L. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile Ad hoc networks//Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing. Canary Islands: , 2002: 403-410.
[6]
Michiardi P, Molva R. Core: a collaborative reputetion mechanism to enforce node cooperation in mobile Ad hoc networks//CMS2002. Portoroz:, 2002: 107-121.
[7]
Buttyan L, Hubaux J P. Report on a working session on security in wireless Ad hoc networks[J]. Mobile Computing and Communications Review, 2003, 7(1): 74-94.
[8]
Michiardi P, Molva R. Game theoretic analysis of security in mobile Ad hoc networks. 2002. http://www.eurecom.fr?/?util?/?publidownload.en.htm?id=981.
[9]
Buttyan L, Hubaux J P. Enforcing service availability in mobile Ad hoc WANs//MobiHOC 2000. Boston: , 2000: 87-96.
[10]
Buttyan L, Hubaux J P. Stimulating cooperation in self-organizing mobile Ad hoc networks[J]. Mobile Networks and Applications, 2003, 8(5): 579-592.
[11]
Zhong S, Chen J, Yang Y R. Sprite: a simple, cheat-proof, credit-based system for mobile Ad hoc networks//INFOCOM 2003. San Francisco:, 2003: 1987-1997.