{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T20:10:06Z","timestamp":1738786206325,"version":"3.37.0"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Commun. Netw."],"published-print":{"date-parts":[[2007,3]]},"DOI":"10.1109\/jcn.2007.6182814","type":"journal-article","created":{"date-parts":[[2013,8,30]],"date-time":"2013-08-30T20:25:47Z","timestamp":1377894347000},"page":"56-66","source":"Crossref","is-referenced-by-count":15,"title":["A scalable and robust approach to collaboration enforcement in mobile ad-hoc networks"],"prefix":"10.23919","volume":"9","author":[{"given":"Ning","family":"Jiang","sequence":"first","affiliation":[{"name":"Microsoft Corporation, One Microsoft Way, Redmond, WA 98052, USA"}]},{"given":"Kien A.","family":"Hua","sequence":"additional","affiliation":[{"name":"School of EECS, University of Central Florida, Orlando, FL 32816, USA"}]},{"given":"Danzhou","family":"Liu","sequence":"additional","affiliation":[{"name":"School of EECS, University of Central Florida, Orlando, FL 32816, USA"}]}],"member":"263","reference":[{"key":"ref39","first-page":"245","article-title":"Truthful multicast routing in selfish wireless networks","author":"zhao","year":"2004","journal-title":"Proc Mobicom"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-585-29603-6_5"},{"key":"ref33","article-title":"Wireless LAN medium access control (MAC) and physical layer (PHY) specification","author":"committee","year":"1997","journal-title":"IEEE 802 11 Standard"},{"article-title":"Detecting wireless LAN MAC address spoofing","year":"0","author":"wright","key":"ref32"},{"journal-title":"Ansi\/ieee Standard 802 11","year":"1999","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"ref37","article-title":"SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks","author":"he","year":"2004","journal-title":"Proc WCNC"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/98.760423"},{"key":"ref34","article-title":"Simulation-based analysis of security exposures in mobile ad-hoc networks","author":"michiardi","year":"2002","journal-title":"Proc European Wireless Conf"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023648"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345958"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EMPDP.2002.994321"},{"key":"ref13","article-title":"IBM research report: The selfish node: Increasing routing security in mobile ad-hoc networks","author":"buchegger","year":"2001","journal-title":"Res Rep RR-3354"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/278009.278027"},{"key":"ref15","article-title":"Ariadne: A secure on-demand routing protocol for ad-hoc networks","author":"hu","year":"2001","journal-title":"Dept Computer Sci Rice Univ Tech Rep TR 01&#x2013;383"},{"key":"ref16","article-title":"Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks","author":"buchegger","year":"0","journal-title":"EPFL Technical Report IC"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570683"},{"journal-title":"National Institute of Standards and Technology Information Technology Laboratory","article-title":"The keyed-hash message authentication code (HMAC)","year":"0","key":"ref18"},{"key":"ref19","article-title":"A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad-hoc networks","author":"michiardi","year":"2003","journal-title":"Proc Modeling and Optimization in Mobile Ad Hoc and Wireless Networks (WiOpt)"},{"key":"ref28","article-title":"Ad-hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad-hoc networks with selfish agents","author":"eidenbenz","year":"2003","journal-title":"Proc Mobicom"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570684"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2005.24"},{"journal-title":"Game Theory Analysis of Conflict","year":"1991","author":"myerson","key":"ref3"},{"key":"ref6","article-title":"Secure routing for mobile ad-hoc networks","author":"papadimitratos","year":"2002","journal-title":"Proc CNDS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062722"},{"journal-title":"The Evolution of Cooperation","year":"1984","author":"axelrod","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501437"},{"key":"ref7","article-title":"SEAD: Secure efficient distance vector routing for mobile wireless ad-hoc networks","author":"hu","year":"2002","journal-title":"Proc WMCSA"},{"key":"ref2","article-title":"Prevention of denial of service attacks and selfishness in mobile ad-hoc networks","author":"michiardi","year":"2002","journal-title":"Res Rep RR- 02&#x2013;63"},{"key":"ref9","article-title":"Security in ad-hoc networks","author":"k\u00e4rpijoki","year":"2000","journal-title":"Proc of Helsinki University of Technology Seminar on Network Security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208918"},{"key":"ref20","article-title":"Secure data transmission in mobile adhoc networks","author":"papadimitratos","year":"2003","journal-title":"Proc ACM WiSe"},{"key":"ref22","first-page":"24","article-title":"Securing ad-hoc networks","volume":"13","author":"zhou","year":"1999","journal-title":"IEEE Network Special Issue on Networking Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref41","article-title":"Design multicast protocols for noncooperative networks","author":"zhao","year":"2005","journal-title":"Proc IEEE InfoCom"},{"key":"ref23","article-title":"A charging and rewarding scheme for packet forwarding","author":"salem","year":"2003","journal-title":"Proc IEEE\/ACM MobiHoc"},{"key":"ref26","article-title":"Stimulating cooperation in self-organizing mobile ad-hoc networks","author":"buttyan","year":"2001","journal-title":"EPFL-DI-ICA Technical Report"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2000.869216"}],"container-title":["Journal of Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5449605\/6182804\/06182814.pdf?arnumber=6182814","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T18:58:12Z","timestamp":1738781892000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6182814\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3]]},"references-count":41,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jcn.2007.6182814","relation":{},"ISSN":["1229-2370","1976-5541"],"issn-type":[{"type":"print","value":"1229-2370"},{"type":"electronic","value":"1976-5541"}],"subject":[],"published":{"date-parts":[[2007,3]]}}}