{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:02:28Z","timestamp":1773406948995,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319339351","type":"print"},{"value":"9783319339368","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33936-8_19","type":"book-chapter","created":{"date-parts":[[2016,4,27]],"date-time":"2016-04-27T06:33:55Z","timestamp":1461738835000},"page":"241-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs"],"prefix":"10.1007","author":[{"given":"Taiwo","family":"Oyedare","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ashraf Al","family":"Sharah","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sachin","family":"Shetty","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,4,28]]},"reference":[{"issue":"4","key":"19_CR1","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/SURV.2009.090404","volume":"11","author":"A Mpitziopoulos","year":"2009","unstructured":"Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. Commun. Surv. Tutorials, IEEE 11(4), 42\u201356 (2009)","journal-title":"Commun. Surv. Tutorials, IEEE"},{"issue":"5","key":"19_CR2","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1109\/TCOM.1982.1095533","volume":"30","author":"RL Pickholtz","year":"1982","unstructured":"Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of spread-spectrum communications-a tutorial. IEEE Trans. Commun. 30(5), 855\u2013884 (1982)","journal-title":"IEEE Trans. Commun."},{"key":"19_CR3","volume-title":"Antenna Theory and Design","author":"WL Stutzman","year":"2012","unstructured":"Stutzman, W.L., Thiele, G.A.: Antenna Theory and Design. John Wiley & Sons, New York (2012)"},{"issue":"1","key":"19_CR4","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TCOMM.2009.0901.060661","volume":"57","author":"Z Han","year":"2009","unstructured":"Han, Z., Poor, H.V.: Coalition games with cooperative transmission: A cure for the curse of boundary nodes in selfish packet-forwarding wireless networks. IEEE Trans. Commun. 57(1), 203\u2013213 (2009)","journal-title":"IEEE Trans. Commun."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Nguyen, H., Pongthawornkamol, T., Nahrstedt, K.: ALIBI: A novel approach for detecting insider-based jamming attacks in wireless networks. In: MILCOM Conference, pp. 855\u2013884 (2009)","DOI":"10.1109\/MILCOM.2009.5379934"},{"key":"19_CR6","first-page":"220","volume":"2014","author":"L Li","year":"2014","unstructured":"Li, L., Zhu, S., Torrieri, D., Jajodia, S.: Self-healing wireless networks under insider jamming attacks. IEEE Conf. CNS IEEE 2014, 220\u2013228 (2014)","journal-title":"IEEE Conf. CNS IEEE"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255\u2013265. ACM (2000)","DOI":"10.1145\/345910.345955"},{"key":"19_CR8","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-0-387-35612-9_9","volume-title":"Advanced Communications and Multimedia Security","author":"Pietro Michiardi","year":"2002","unstructured":"Michiardi, P., Molva, R.: Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Advanced Communications and Multimedia Security, pp. 107\u2013121. Springer, Heidelberg (2002)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R.: A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks. In: WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, p. 4 (2003)","DOI":"10.1002\/0471656895.ch12"},{"issue":"1","key":"19_CR10","first-page":"1","volume":"9","author":"A Peleteiro","year":"2014","unstructured":"Peleteiro, A., Burguillo, J.C., Arcos, J.L., Rodriguez-Aguilar, J.A.: Fostering cooperation through dynamic coalition formation and partner switching. ACM (TAAS) 9(1), 1 (2014)","journal-title":"ACM (TAAS)"},{"key":"19_CR11","unstructured":"Ferguson, T.: Game Theory (2nd\/ed). Mathematics Department, UCLA 2014 (2014)"},{"key":"19_CR12","unstructured":"Li, X.: Achieving Secure and Cooperative Wireless Networks with Trust Modeling and Game Theory (2009)"},{"issue":"1","key":"19_CR13","doi-asserted-by":"publisher","first-page":"9","DOI":"10.2307\/2312726","volume":"69","author":"D Gale","year":"1962","unstructured":"Gale, D., Shapley, L.S.: College admissions and the stability of marriage. Am. Math. Monthly 69(1), 9\u201315 (1962)","journal-title":"Am. Math. Monthly"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Al-Sharah, A., Shetty, S.: Accumulative feedback adaptation transmission rate in mobile ad-hoc networks. In: 2015 IEMCON, pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/IEMCON.2015.7344460"},{"issue":"9","key":"19_CR15","doi-asserted-by":"publisher","first-page":"4580","DOI":"10.1109\/TWC.2009.080522","volume":"8","author":"W Saad","year":"2009","unstructured":"Saad, W., Han, Z., Debbah, M., Hj\u00f8rungnes, A.: A distributed coalition formation framework for fair user cooperation in wireless networks. IEEE Trans. Wirel. Commun. 8(9), 4580\u20134593 (2009)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"19_CR16","unstructured":"Liao, X., Hao, D., Sakurai, K.: Classification on attacks in wireless ad hoc networks: A game theoretic view. In: 7th International Conference on NCM, 2011, pp. 144\u2013149. IEEE (2011)"},{"key":"19_CR17","unstructured":"Balasubratuanian, A., Ghosh, J.: A reputation based scheme for stimulating cooperation in MANETs. In: Proceedings of the 19th International Teletraffic Congress (2005)"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33936-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,16]],"date-time":"2024-06-16T00:30:16Z","timestamp":1718497816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-33936-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319339351","9783319339368"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33936-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"28 April 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}