References
[1]. H. Miranda and L. Rodrigues, (2002). .Preventing
selfishness in open mobile ad hoc networks,. in Proc. of
the Seventh CaberNet Radicals Workshop, October
2002.
[2]. L. Buttyan and J-P. Hubaux, .Security and
Cooperation in wireless networks, available at
http://secowinet.ep_.ch/
[3] L. M. Feeney and M. Nilsson, (2001). Investigating the
energy consumption of a wireless network interface in an
ad hoc networking environment,. in IEEE INFOCOM 2001.
[4]. S. Buchegger and J.-Y. Le Boudec, (2000).
“Performance Analysis of the CONFIDANT Protocol:
Cooperation of Nodes, Fairness in Dynamic Ad-Hoc
Networks,” Proc.MobiHoc, June 2000.
[5]. Michiardi P, Molva R. CORE : (2002). A Collaborative
Reputation Mechanism to Enforce Node Cooperation in
th Mobile Ad Hoc Networks. In Proceedings of 6 IFIP
Communication and Multimedia Security Conference,
September 2002.
[6]. Liu J, Issarny V. (2004). Enhanced Reputation
Mechanism for Mobile Ad Hoc Networks. In Proceedings
of 2nd International Conference on Trust Management,
March 2004.
[7]. Bansal S, Baker M., OCEAN: (2003). Observation-
Based Cooperation Enforcement in Ad-Hoc networks.
Technical Report, Stanford University, 2003.
[8]. He Q, Wu D, Khosla P. SORI: (2004). A secure and
objective reputation based incentive scheme for ad-hoc
networks. In Proceedings of IEEE WCNC2004, March.
[9]. Kejun Liu,Jing Deng, (2007). ”An Acknowledgement-
Based Approach for the Detection of Routing Misbehavior
in MANETs”, IEEE Transactions on Mobile Computing,
Vol.6, No.5, May.
[10] Levente Buttyan and Hubaux: (2001). “Nuglets: A
Virtual Currency to Simulate Cooperation in Self-
Organized Mobile Ad Hoc Networks” 18 January 2001.
[11]. Zhong S, Chen J, Yang R. Sprite: (2003). A simple,
cheat-proof, credit based system for mobile ad-hoc
networks. In Proceedings of IEEE INFOCOM2003, April.
[12]. Yang H, Meng X, Lu S. (2002). Self-organized
network-layer security in mobile ad hoc networks. In
Proceedings of ACM WiSe02, September 2002.
[13]. Shamir A. (1979).How to share a secret
Communications, ACM 1979; 22(11): pp. 612-613.
[14]. Kong J, Zerfos P, Luo H, et al. (2001).Providing robust
and ubiquitous security support for mobile ad-hoc
networks. In Proceedings of International Conference on
Network Protocols (ICNP), November 2001.
[15]. Anderegg L, Eidenbenz S. Ad-hoc-VCG: (2003). A
truthful and costefficient routing protocol for mobile adhoc
networks with selfish agents. In Proceedings of 9th
Annual International Conference on Mobile Computing
and Networking, September 2003.