@incollection{, ED87324A319DFB8F1375A4F1271F5A03 , author={{NittaRajkiran}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1332530 } @incollection{b0, , title={{Designing incentives for peer-to-peer routing}} , author={{ YBlanc } and { ALiu } and { Vahdat }} , booktitle={{Proc. IEEE INFOCOM}} IEEE INFOCOM , year={2005} } @incollection{b1, , title={{Stimulating cooperation in self-organizing mobile ad hoc networks}} , author={{ LButtyan } and { JHubaux }} , journal={{ACM Mobile Netw. Appl}} 8 5 , year={Oct. 2003} } @incollection{b2, , title={{Nash equilibria of packet forwarding strategies in wireless ad hoc networks}} , author={{ MFelegyhazi } and { JHubaux } and { LButtyan }} , journal={{IEEE Trans. Mobile Comput}} 5 5 , year={May 2006} } @incollection{b3, , title={{Incentive-based modeling and inference of attacker intent, objectives and strategies}} , author={{ PLiu } and { WZang } and { MYu }} , journal={{ACM Trans. Inf. Syst. Secur}} 8 1 , year={Feb. 2005} } @incollection{b4, , title={{Malicious users in unstructured networks}} , author={{ GTheodorakopoulos } and { JBaras }} , booktitle={{Proc. IEEE INFOCOM}} IEEE INFOCOM , year={2007} } @book{b5, , title={{}} , author={{ DFudenberg } and { JTirole } and { GameTheory }} , year={1991} , publisher={MIT Press} , address={Cambridge, MA} } @incollection{b6, , title={{The evolution of cooperation}} , author={{ RAxelrod } and { WHamilton }} , journal={{Science}} 211 4489 , year={Mar. 1981} } @book{b7, , title={{A game-theoretic analysis of QoS in wireless MAC}} , author={{ PNuggehalli } and { MSarkar } and { KKulkarni } and { RRao }} } @incollection{b8, , title={{Game-theoretic model for collaborative protocols in selfish, tariff-free, multihop wireless networks}} , author={{ SNg } and { WSeah }} , booktitle={{Proc. IEEE INFOCOM}} IEEE INFOCOM , year={2008} } @incollection{b9, , title={{Information concealing games}} , author={{ SSarkar } and { EAltman } and { REl-Azouzi } and { YHayel }} , booktitle={{Proc. IEEE INFOCOM}} IEEE INFOCOM , year={2008} } @incollection{b10, , title={{SPREAD: Foiling smart jammers using multi-layer agility}} , author={{ XLiu } and { GNoubir } and { RSundaram } and { STan }} , booktitle={{Proc. IEEE INFOCOM}} IEEE INFOCOM , year={2007} } @incollection{b11, , title={{A Bayesian game approach for intrusion detection in wireless ad hoc networks}} , author={{ YLiu } and { CComaniciu } and { HMan }} , booktitle={{Proc. ACM Game Nets}} ACM Game Nets 4 } @incollection{b12, , title={{Selfishness, not always a nightmare: Modeling selfish MAC behaviors in wireless mobile ad hoc networks}} , author={{ LChen } and { JLeneutre }} , booktitle={{Proc. IEEE ICDCS}} IEEE ICDCS , year={2007} 16 } @incollection{b13, , title={{A robust reputation system for P2P and mobile ad-hoc networks}} , author={{ SBuchegger } and { JBoudec }} , booktitle={{Proc. 2nd Workshop Econ. Peer-to-Peer Syst}} 2nd Workshop Econ. Peer-to-Peer Syst , year={2004} } @incollection{b14, , title={{CORE: A collaborative reputation mechanism to enforce player cooperation in mobile ad hoc networks}} , author={{ PMichiardi } and { RMolva }} , booktitle={{Proc. Commun. Multimedia Secur}} Commun. Multimedia Secur , year={2002} } @incollection{b15, , title={{Performance analysis of the confidant protocol}} , author={{ SBuchegger } and { JBoudec }} , booktitle={{Proc. ACM MobiHoc}} ACM MobiHoc , year={2002} } @book{b16, , title={{Observation-based cooperation enforcement in ad hoc networks}} , author={{ SBansal } and { MBaker }} CoRRcs.NI/0307012 , year={2003} , publisher={Stanford Univ. Press} , address={Stanford, CA} , note={Tech. Rep} } @incollection{b17, , title={{Mobility reduces uncertainty in MOBILE AD HOC NETWORKs}} , author={{ FLi } and { JWu }} , booktitle={{Proc. IEEE INFOCOM}} IEEE INFOCOM , year={2007} } @book{b18, , title={{A survey of trust and reputation systems for online service provision}} , author={{ RJosang } and { CIsmail } and { Boyd }} } @incollection{b19, , title={{}} , journal={{Decis. Support Syst}} 43 2 , year={Mar. 2007} } @incollection{b20, , title={{Uncertainty mitigation for utility-oriented routing in MOBILE AD HOC NETWORKs}} , author={{ FLi } and { ASrinivasan } and { MLu } and { JWu }} , booktitle={{Proc. IEEE GLOBECOM}} IEEE GLOBECOM , year={2007} } @incollection{b21, , title={{Hit and run: A Bayesian game between malicious and regular players in mobile networks}} , author={{ FLi } and { JWu }} , booktitle={{Proc. IEEE SECON}} IEEE SECON , year={2008} } @incollection{b22, , title={{Cooperation in wireless ad hoc networks}} , author={{ VSrinivasan } and { PNuggehalli } and { CChiasserini } and { RRao }} , booktitle={{Proc. IEEE INFOCOM}} IEEE INFOCOM , year={2003} } @incollection{b23, , title={{Non-cooperative forwarding in ad hoc networks}} , author={{ EAltman } and { AKherani } and { PMichiardi } and { RMolva }} RR- 5116 , journal={{INRIA}} , year={2004} , note={Tech. Rep.} } @incollection{b24, , title={{Mitigating routing misbehaviour in mobile ad hoc networks}} , author={{ SMarti } and { TJGiuli } and { KLai } and { MBaker }} , booktitle={{Proc. ACM MobiCom}} ACM MobiCom , year={2000} } @incollection{b25, , title={{Modeling timevariant user mobility in wireless mobile networks}} , author={{ WHsu } and { TSpyropoulos } and { KPsounis } and { AHelmy }} , booktitle={{Proc. IEEE INFOCOM}} IEEE INFOCOM , year={2007} } @incollection{b26, , title={{Attack and Flee: Game-Theory-Based Analysis on Interactions among Nodes in MANETs}} , author={{ FengLi } and { YinyingYang } and { JieWu }} , booktitle={{Proc. IEEE}} IEEE }