{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:55:15Z","timestamp":1742957715376,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_11","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T03:35:53Z","timestamp":1501904153000},"page":"131-142","source":"Crossref","is-referenced-by-count":1,"title":["Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System"],"prefix":"10.1007","author":[{"given":"Jerzy","family":"Konorski","sequence":"first","affiliation":[]},{"given":"Karol","family":"Rydzewski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Li Z., Shen, H.: Analysis of the cooperation strategies in mobile ad hoc networks. In: Proceedings of MASS 2008, Atlanta, GA (2008)","DOI":"10.1109\/MAHSS.2008.4660129"},{"key":"11_CR2","volume-title":"Game Theory","author":"D Fudenberg","year":"1991","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)"},{"issue":"1","key":"11_CR3","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jtbi.2004.06.005","volume":"231","author":"H Ohtsuki","year":"2004","unstructured":"Ohtsuki, H., Iwasa, Y.: How should we define goodness? \u2014 reputation dynamics in indirect reciprocity. J. Theor. Biol. 231(1), 107\u2013120 (2004)","journal-title":"J. Theor. Biol."},{"key":"11_CR4","volume-title":"Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc Networks)","author":"S Buchegger","year":"2002","unstructured":"Buchegger, S., Le Boudec, J.: Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc Networks). \u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausannen, Lausanne (2002)"},{"issue":"5","key":"11_CR5","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1109\/TMC.2007.1036","volume":"6","author":"K Liu","year":"2007","unstructured":"Liu, K., Deng, J., Varshney, P., Balakrishnan, K.: An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput. 6(5), 536\u2013550 (2007)","journal-title":"IEEE Trans. Mobile Comput."},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Graffi, K., Mogre, P., Hollick, M., Steinmetz, R.: Detection of colluding misbehaving nodes in mobile ad hoc and wireless mesh networks. In: Proceedings of IEEE GLOBECOM, Washington DC (2007)","DOI":"10.1109\/GLOCOM.2007.966"},{"issue":"10","key":"11_CR7","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.1109\/JPROC.2010.2059690","volume":"98","author":"H Yu","year":"2010","unstructured":"Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: A survey of trust and reputation management systems in wireless communications. Proc. IEEE 98(10), 1755\u20131772 (2010)","journal-title":"Proc. IEEE"},{"key":"11_CR8","unstructured":"Sivanantham, S., Kirankumar, K., Akshaya, V.: Detection and avoidance of intrusion, packet drop and modification in WSN. Int. J. Adv. Res. Comput. Commun. Eng. 2(11) (2013)"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Konorski, J., Rydzewski, K.: A centralized reputation system for MANETs based on observed path performance. In: Proceedings of 8th IFIP WMNC, Munich (2015)","DOI":"10.1109\/WMNC.2015.42"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Konorski, J., Orlikowski, R.: A reputation system for MANETs and WSNs using traffic shedding. In: Proceedings of International Conference on Applied Sciences in Biomedical and Communication Technologies, Rome (2010)","DOI":"10.1109\/ISABEL.2010.5702858"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Karakostas, G., Kharaud, R., Viglas, A.: Dynamics of a localized reputation-based network protocol. In: 2013 International Conference on Parallel and Distributed Computing, Applications and Technologies (2013)","DOI":"10.1109\/PDCAT.2013.30"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T14:25:29Z","timestamp":1502202329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}