{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:39:22Z","timestamp":1762875562228},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T00:00:00Z","timestamp":1381968000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s11277-013-1443-y","type":"journal-article","created":{"date-parts":[[2013,10,16]],"date-time":"2013-10-16T15:46:23Z","timestamp":1381938383000},"page":"1635-1667","source":"Crossref","is-referenced-by-count":31,"title":["A Dempster\u2013Shafer Based Tit-for-Tat Strategy to Regulate the Cooperation in VANET Using QoS-OLSR Protocol"],"prefix":"10.1007","volume":"75","author":[{"given":"Omar Abdel","family":"Wahab","sequence":"first","affiliation":[]},{"given":"Hadi","family":"Otrok","sequence":"additional","affiliation":[]},{"given":"Azzam","family":"Mourad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,17]]},"reference":[{"key":"1443_CR1","doi-asserted-by":"crossref","unstructured":"Anderegg, L., & Eidenbenz, S. (2003). Ad hoc-VCG: A truthful and cost-efficient routing protocol for Mobile ad hoc networks with selfish agents. In Proceedings of the 9th annual international conference on Mobile computing and networking, pp. 245\u2013259.","DOI":"10.1145\/938985.939011"},{"key":"1443_CR2","doi-asserted-by":"crossref","DOI":"10.1002\/0470118474","volume-title":"Security for wireless ad hoc networks","author":"F Anjum","year":"2007","unstructured":"Anjum, F., & Mouchtaris, P. (2007). Security for wireless ad hoc networks. Hoboken: Wiley."},{"key":"1443_CR3","doi-asserted-by":"crossref","first-page":"306","DOI":"10.2307\/1961366","volume":"75","author":"R Axelrod","year":"1981","unstructured":"Axelrod, R. (1981). The Emergence of Cooperation among Egoists. The American Political Science Review, 75, 306\u2013318.","journal-title":"The American Political Science Review"},{"key":"1443_CR4","volume-title":"The evolution of cooperation","author":"R Axelrod","year":"1984","unstructured":"Axelrod, R. (1984). The evolution of cooperation. New York: Basic."},{"key":"1443_CR5","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1002\/ett.1067","volume":"16","author":"H Badis","year":"2005","unstructured":"Badis, H., & Al Agha, K. (2005). QOLSR, QoS routing for ad hoc wireless networks using OLSR. European Transactions on Telecommunications, 16, 427\u2013442.","journal-title":"European Transactions on Telecommunications"},{"key":"1443_CR6","doi-asserted-by":"crossref","unstructured":"Balakrishnan, K., Deng, J., & Varshney, P.-K. (2005). TWOACK: Preventing selfishness in Mobile ad hoc networks. In Proceedings of IEEE wireless communications and networking conference (WCNC\u201905), (Vol. 4, pp. 2137\u20132142).","DOI":"10.1109\/WCNC.2005.1424848"},{"key":"1443_CR7","doi-asserted-by":"crossref","unstructured":"Buchegger, S., & Le Boudec, J.-Y. (2002). Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, (pp. 226\u2013236).","DOI":"10.1145\/513800.513828"},{"key":"1443_CR8","doi-asserted-by":"crossref","unstructured":"Chen, T.-M., Venkataramanan, V. (2005). Dempster-shafer theory for intrusion detection in ad hoc networks. IEEE Internet Computing, 9, 35\u201341.","DOI":"10.1109\/MIC.2005.123"},{"key":"1443_CR9","volume-title":"Elements of information theory","author":"T-M Cover","year":"2006","unstructured":"Cover, T.-M., & Thomas, J.-A. (2006). Elements of information theory (2nd ed.). Hoboken: Wiley.","edition":"2"},{"key":"1443_CR10","doi-asserted-by":"crossref","unstructured":"Douceur, J.-R., & Moscibroda, T. (2007). Lottery trees: Motivational deployment of networked systems. In Proceedings of the 2007 conference on applications, technologies, architectures, and protocols for, computer communications, (pp. 121\u2013132).","DOI":"10.1145\/1282380.1282395"},{"key":"1443_CR11","doi-asserted-by":"crossref","unstructured":"Felegyhazi, M., Hubaux, J. P., & Buttyan, L. (2006). Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Transactions on Mobile Computing, 5, 463\u2013476.","DOI":"10.1109\/TMC.2006.68"},{"key":"1443_CR12","doi-asserted-by":"crossref","unstructured":"Fiore, M., Harri, J., Filali, F., & Bonnet, C. (2007). Vehicular Mobility Simulation for VANETs. In Simulation symposium, annual, (pp. 301\u2013309).","DOI":"10.1109\/ANSS.2007.44"},{"key":"1443_CR13","volume-title":"MATLAB: An introduction with applications","author":"A Gilat","year":"2008","unstructured":"Gilat, A. (2008). MATLAB: An introduction with applications. Hoboken: Wiley."},{"key":"1443_CR14","doi-asserted-by":"crossref","unstructured":"Harri, J., Filali, F., Bonnet, C., & Fiore, M. (2006). VanetMobiSim: Generating realistic mobility patterns for VANETs. In Proceedings of the 3rd international workshop on vehicular, ad hoc networks, (pp. 96\u201397).","DOI":"10.1145\/1161064.1161084"},{"key":"1443_CR15","doi-asserted-by":"crossref","unstructured":"Jain, S., Fall, K., & Patra, R. (2004). Routing in a delay tolerant network. SIGCOMM Computer Communications Review, 34, 145\u2013158.","DOI":"10.1145\/1030194.1015484"},{"key":"1443_CR16","first-page":"4063","volume":"2","author":"P Jawandhiya","year":"2010","unstructured":"Jawandhiya, P., Ghonge, M., Ali, M.-S., & Deshpande, J.-S. (2010). A survey of mobile ad hoc network attacks. International Journal of Engineering Science and Technology, 2, 4063\u20134071.","journal-title":"International Journal of Engineering Science and Technology"},{"key":"1443_CR17","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/978-0-585-29603-6_5","volume":"353","author":"D-B Johnson","year":"1996","unstructured":"Johnson, D.-B., & Maltz, D.-A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile Computing, 353, 153\u2013181.","journal-title":"Mobile Computing"},{"key":"1443_CR18","doi-asserted-by":"crossref","first-page":"943","DOI":"10.1109\/TMC.2007.1016","volume":"6","author":"E Jones","year":"2007","unstructured":"Jones, E., Li, L., & Ward, P. (2007). Practical routing in delay-tolerant networks. IEEE Transactions on Mobile Computing, 6, 943\u2013959.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1443_CR19","doi-asserted-by":"crossref","unstructured":"Lee, S., Pan, G., Park, J., Gerla, M., & Lu, S. (2007). Secure incentives for commercial ad dissemination in vehicular networks. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing, (pp. 150\u2013159).","DOI":"10.1145\/1288107.1288128"},{"key":"1443_CR20","doi-asserted-by":"crossref","unstructured":"Li, F., & Wu, J. (2009). FRAME: An innovative incentive scheme in vehicular networks. In Proceedings of the 2009 IEEE international conference on communications, (pp. 4638\u20134643).","DOI":"10.1109\/ICC.2009.5199041"},{"key":"1443_CR21","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1002\/cpe.1190","volume":"20","author":"Q Lian","year":"2008","unstructured":"Lian, Q., Peng, Y., Yang, M., Zhang, Z., Dai, Y., & Li, X. (2008). Robust incentives via multi-level Tit-for-Tat: research articles. Concurrency and Computation: Practice and Experience, 20, 167\u2013178.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"1443_CR22","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1109\/TMC.2007.1036","volume":"6","author":"K Liu","year":"2007","unstructured":"Liu, K., Deng, J., Varshney, K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6, 536\u2013550.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1443_CR23","unstructured":"Marasigan, D., & Rommel, P. (2005). MV routing and capacity building in disruption tolerant networks. In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, (Vol. 1, pp. 398\u2013408)."},{"key":"1443_CR24","doi-asserted-by":"crossref","unstructured":"Marti, S., Giuli, T.-J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, (pp. 255\u2013265).","DOI":"10.1145\/345910.345955"},{"key":"1443_CR25","doi-asserted-by":"crossref","unstructured":"Michiardi, P., Molva, R. (2002). CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6\/TC11 sixth joint working conference on communications and multimedia security.","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"1443_CR26","doi-asserted-by":"crossref","unstructured":"Milan, F. (2006). Achieving cooperation in multihop wireless networks of selfish nodes. In Workshop on game theory for networks (GameNets 2006).","DOI":"10.1145\/1190195.1190197"},{"key":"1443_CR27","doi-asserted-by":"crossref","unstructured":"Milan, F., Jaramillo, & J., Srikant, R. (2006). Performance analysis of Reputation-based mechanisms for multi-hop wireless networks. In Proceedings of 40TH conference on information sciences and systems (CISS 2006), (pp. 12\u201317).","DOI":"10.1109\/CISS.2006.286423"},{"key":"1443_CR28","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1038\/355250a0","volume":"355","author":"M-A Nowak","year":"1992","unstructured":"Nowak, M.-A., & Sigmund, K. (1992). Tit for tat in heterogeneous populations. Nature, 355, 250\u2013253.","journal-title":"Nature"},{"key":"1443_CR29","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1006\/jtbi.1994.1101","volume":"168","author":"M-A Nowak","year":"1994","unstructured":"Nowak, M.-A., & Sigmundl, K. (1994). The alternating prisoner\u2019s dilemma. Journal of Theoretical Biology, 168, 219\u2013226.","journal-title":"Journal of Theoretical Biology"},{"key":"1443_CR30","doi-asserted-by":"crossref","unstructured":"Nzouonta, J., Rajgure, N., Wang, G., Borcea, C. (2009). VANET routing on city roads using real-time vehicular traffic information. IEEE Transactions on Vehicular Technology, 58, 3609\u20133626.","DOI":"10.1109\/TVT.2009.2014455"},{"key":"1443_CR31","doi-asserted-by":"crossref","unstructured":"Otrok, H., Mourad, A., Robert, J.-M., Moati, N., & Sanadiki, H. (2011). A cluster-based model for QoS-OLSR protocol. In IWCMC, (pp. 1099\u20131104).","DOI":"10.1109\/IWCMC.2011.5982694"},{"key":"1443_CR32","unstructured":"Ramakrishnan, B. (2012). Performance analysis of AODV routing protocol in Vehicular ad-hoc network service discovery architecture. ARPN Journal of Systems and Software, 96, 65\u201372."},{"key":"1443_CR33","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A mathematical theory of evidence","author":"G Shafer","year":"1976","unstructured":"Shafer, G. (1976). A mathematical theory of evidence. Princeton, NJ, USA: Princeton University Press."},{"key":"1443_CR34","doi-asserted-by":"crossref","unstructured":"Spyropoulos, T., Psounis, K., & Raghavendra, C.-S. (2005). Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, (pp. 252\u2013259).","DOI":"10.1145\/1080139.1080143"},{"key":"1443_CR35","unstructured":"Turocy, T.-L., & Stengel, B. (2001). Game theory. Technical report."},{"key":"1443_CR36","unstructured":"Vahdat, A., & Becker, D. (2000). Epidemic routing for partially-connected ad hoc networks. Technical report."},{"key":"1443_CR37","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1177\/0022002795039001008","volume":"39","author":"J Wu","year":"1995","unstructured":"Wu, J., & Axelrod, R. (1995). How to cope with noise in the iterated prisoner\u2019s dilemma. Journal of Conflict Resolution, 39, 183\u2013189.","journal-title":"Journal of Conflict Resolution"},{"key":"1443_CR38","unstructured":"Zhao, J., & Guohong, G. (2008). VADD: Vehicle-assisted data delivery in vehicular ad hoc networks. In IEEE Transactions on Vehicular Technology, (Vol. 57, pp. 1910\u20131922)."},{"key":"1443_CR39","doi-asserted-by":"crossref","unstructured":"Zhong, S., Yang, Y., & Chen, J. (2003). Sprite: A simple, cheat-proof, credit-based system for Mobile ad hoc networks. In Proceedings of INFOCOM, (pp. 1987\u20131997).","DOI":"10.1109\/INFCOM.2003.1209220"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1443-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-013-1443-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-013-1443-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T08:46:01Z","timestamp":1646815561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-013-1443-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,17]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["1443"],"URL":"https:\/\/doi.org\/10.1007\/s11277-013-1443-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,17]]}}}