{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T13:29:44Z","timestamp":1744896584842},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,5,31]],"date-time":"2015-05-31T00:00:00Z","timestamp":1433030400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s11036-015-0610-7","type":"journal-article","created":{"date-parts":[[2015,5,30]],"date-time":"2015-05-30T09:26:09Z","timestamp":1432977969000},"page":"593-603","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A Game Theoretical Model for Energy-Aware DTN Routing in MANETs with Nodes\u2019 Selfishness"],"prefix":"10.1007","volume":"20","author":[{"given":"Yuxin","family":"Mao","sequence":"first","affiliation":[]},{"given":"Ping","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,31]]},"reference":[{"key":"610_CR1","doi-asserted-by":"crossref","unstructured":"Corson S, Macker J (1998) Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations (Internet-draft). Mobile Ad-hoc Network (MANET) Working Group, IETF","DOI":"10.17487\/rfc2501"},{"issue":"6","key":"610_CR2","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/65.967595","volume":"1","author":"M Mauve","year":"2001","unstructured":"Mauve M, Widmer J, Hartenstein H (2001) A survey on position-based routing in mobile ad hoc networks. IEEE Netw 1(6):30\u201339","journal-title":"IEEE Netw"},{"issue":"1","key":"610_CR3","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/SURV.2012.032612.00004","volume":"15","author":"Y Zhu","year":"2013","unstructured":"Zhu Y, Xu B, Shi X, Wang Y (2013) A survey of social-based routing in Dela tolerant networks: positive and negative social effects. IEEE Commun Surv Tutorials 15(1):387\u2013401","journal-title":"IEEE Commun Surv Tutorials"},{"key":"610_CR4","unstructured":"Jung S, Hundewale N, Zelikovsky A (2005) Energy efficiency of load balancing in MANET routing protocols. Proc. 6th Int. Conf. on Software Eng., AI, Networking and Parallel\/ Distributed Computing, 2005 and First ACIS Int. Workshop on Self-Assembling Wireless Networks, p 476\u2013483"},{"key":"610_CR5","unstructured":"Fudenberg D, Tirole J (1991) Game theory. MIT Press, Cambridge"},{"key":"610_CR6","doi-asserted-by":"crossref","unstructured":"Clausen T, Jacquet P (2003) Optimized link state routing protocol (OLSR). RFC 3626, IETF Network Working Group","DOI":"10.17487\/rfc3626"},{"key":"610_CR7","doi-asserted-by":"crossref","unstructured":"Perkins C, Belding-Royer E, Das S (2003) Ad hoc on-demand distance vector (AODV) routing. RFC 3561, IETF Network Working Group","DOI":"10.17487\/rfc3561"},{"key":"610_CR8","doi-asserted-by":"crossref","unstructured":"Johnson DB, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks. In: Imielinski, Korth (eds) Mobile computing, vol. 353. Kluwer Academic Publishers, Boston","DOI":"10.1007\/978-0-585-29603-6_5"},{"issue":"4","key":"610_CR9","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1023\/A:1019106118419","volume":"6","author":"YB Ko","year":"2000","unstructured":"Ko YB, Vaidy N (2000) Location-aided routing in mobile ad hoc networks. ACM Wireless Netw J 6(4):307\u2013321","journal-title":"ACM Wireless Netw J"},{"key":"610_CR10","doi-asserted-by":"crossref","unstructured":"Grossglauser M, Vetterli M (2003) Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion. Proc. INFOCOM 2003, 3:1954\u20131964","DOI":"10.1109\/INFCOM.2003.1209217"},{"key":"610_CR11","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1145\/778415.778446","volume":"2003","author":"H Dubois-Ferriere","year":"2003","unstructured":"Dubois-Ferriere H, Grossglauser M, Vetterli M (2003) Age matters: efficient route discovery in mobile ad hoc networks using encounter age. Proc MobiHoc 2003:257\u2013266","journal-title":"Proc MobiHoc"},{"issue":"4","key":"610_CR12","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1023\/A:1011478628358","volume":"6","author":"SJ Lee","year":"2001","unstructured":"Lee SJ, Su W, Gerla M (2001) Wireless ad hoc multicast routing with mobility prediction. Mobile Netw Appl 6(4):351\u2013360","journal-title":"Mobile Netw Appl"},{"key":"610_CR13","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/978-3-540-24646-6_22","volume":"2004","author":"R Handorean","year":"2004","unstructured":"Handorean R, Gill GD, Roman G (2004) Accommodating transient connectivity in ad hoc and mobile settings. Proc Pervasive Comput 2004:305\u2013322","journal-title":"Proc Pervasive Comput"},{"key":"610_CR14","doi-asserted-by":"crossref","unstructured":"Jain S et al (2004) Routing in delay tolerant network. Proc. ACM SIGCOM\u2019 04","DOI":"10.1145\/1015467.1015484"},{"key":"610_CR15","unstructured":"Vahdat A, Becker D (2000) Epidemic routing for partially connected ad hoc networks. Tech. Rep. CS-200006, Department of Computer Science, Duke University, Durham, NC"},{"key":"610_CR16","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1145\/778415.778443","volume":"2003","author":"T Small","year":"2003","unstructured":"Small T, Haas ZJ (2003) The shared wireless infostation model\u2014a new ad hoc networking paradigm (or where there is a whale, there is a way). Proc Mobihoc 2003:233\u2013244","journal-title":"Proc Mobihoc"},{"key":"610_CR17","unstructured":"Jung S, Hundewale N, Zelikovsky A (2005) Energy efficiency of load balancing in MANET routing protocols. Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD\/SAWN\u201905), p 476\u2013483"},{"key":"610_CR18","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1023\/A:1011474616255","volume":"6","author":"LM Feeney","year":"2001","unstructured":"Feeney LM (2001) An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks. Mobile Netw Appl 6:239\u2013249","journal-title":"Mobile Netw Appl"},{"key":"610_CR19","doi-asserted-by":"crossref","unstructured":"Khouzani MHR, Eshghi S, Sarkar S, Shroff NB, Venkatesh SS (2012) Optimal energy-aware epidemic routing in DTNs. Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing (MobiHoc \u201912), p 175\u2013182","DOI":"10.1145\/2248371.2248397"},{"issue":"1","key":"610_CR20","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1007\/s11276-013-0583-z","volume":"20","author":"VKC Manam","year":"2014","unstructured":"Manam VKC, Mahendran V, Murthy CSR (2014) Performance modeling of DTN routing with heterogeneous and selfish nodes. Wirel Netw 20(1):25\u201340","journal-title":"Wirel Netw"},{"issue":"2007","key":"610_CR21","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1016\/j.pmcj.2007.02.001","volume":"3","author":"Y Wang","year":"2007","unstructured":"Wang Y, Singhal M (2007) On improving the efficiency of truthful routing in MANETs with selfish nodes. Pervasive Mob Comput 3(2007):537\u2013559","journal-title":"Pervasive Mob Comput"},{"issue":"2","key":"610_CR22","first-page":"808","volume":"2003","author":"V Srinivasan","year":"2003","unstructured":"Srinivasan V, Nuggehalli P, Chiasserini F, Rao RR (2003) Cooperation in wireless ad hoc networks. Proc INFOCOM 2003(2):808\u2013817","journal-title":"Proc INFOCOM"},{"key":"610_CR23","unstructured":"Michiardi P, Molva R (2003) A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks. Proceedings of WiOpt\u201903, 3\u20135."},{"key":"610_CR24","unstructured":"Saad W, Han Z, Zheng R, et al (2012) Poor: coalitional games in partition form for joint spectrum sensing and access in cognitive radio networks. CoRR abs\/1202.0467"},{"key":"610_CR25","doi-asserted-by":"crossref","unstructured":"Gao Z, Zhu H, Du S, Xiao C, Lu R (2012) PMDS: a probabilistic misbehavior detectio scheme in DTN. Proc. IEEE International Conference on Communication (IEEE ICC\u201912), 4970\u20134974","DOI":"10.1109\/ICC.2012.6364184"},{"key":"610_CR26","doi-asserted-by":"crossref","unstructured":"Naserian M, Tepe K (2014) Dynamic probabilistic forwarding in wireless ad hoc networks based on game theory. 2014 I.E. Vehicular Technology Conference (VTC Spring), 1\u20135","DOI":"10.1109\/VTCSpring.2014.7022895"},{"issue":"3","key":"610_CR27","doi-asserted-by":"crossref","first-page":"1616","DOI":"10.1109\/TWC.2013.122313.131118","volume":"13","author":"Y Wang","year":"2014","unstructured":"Wang Y, Yu FR, Tang H, Huang M (2014) A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Trans Wirel Commun 13(3):1616\u20131627","journal-title":"IEEE Trans Wirel Commun"},{"issue":"6","key":"610_CR28","doi-asserted-by":"crossref","first-page":"1135","DOI":"10.1109\/JSAC.2013.130615","volume":"31","author":"G Wei","year":"2013","unstructured":"Wei G, Zhu P, Vasilakos AV, Mao Y et al (2013) Cooperation dynamics on collaborative social networks of heterogeneous population. IEEE J Sel Areas Commun 31(6):1135\u20131146","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"610_CR29","volume":"9","author":"P Zhu","year":"2014","unstructured":"Zhu P, Wei G (2014) Stochastic heterogeneous interaction promotes cooperation in spatial prisoner\u2019s dilemma game. PLoS One 9(4), e95169","journal-title":"PLoS One"},{"key":"610_CR30","author":"Y Mao","year":"2014","unstructured":"Mao Y, Zhu P, Wei G, Hassan MM, Hossain MA (2014) A game-based incentive model for service cooperation in VANETs. Concurr Comput: Pract Exper. doi: 10.1002\/cpe.3340 (To appear)","journal-title":"Concurr Comput: Pract Exper"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-015-0610-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-015-0610-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-015-0610-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,2]],"date-time":"2020-09-02T21:57:19Z","timestamp":1599083839000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-015-0610-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,31]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["610"],"URL":"https:\/\/doi.org\/10.1007\/s11036-015-0610-7","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,31]]}}}