{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:43:21Z","timestamp":1760708601422},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T00:00:00Z","timestamp":1373328000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/1687-1499-2013-188","type":"journal-article","created":{"date-parts":[[2013,7,9]],"date-time":"2013-07-09T12:09:54Z","timestamp":1373371794000},"source":"Crossref","is-referenced-by-count":15,"title":["Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks"],"prefix":"10.1186","volume":"2013","author":[{"given":"F Richard","family":"Yu","sequence":"first","affiliation":[]},{"given":"Helen","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Shengrong","family":"Bu","sequence":"additional","affiliation":[]},{"given":"Du","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,9]]},"reference":[{"key":"786_CR1","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.1109\/TWC.2007.05776","volume":"6","author":"G Ganesan","year":"2007","unstructured":"Ganesan G, Li Y: Cooperative spectrum sensing in cognitive radio - part II: multiuser networks. IEEE Trans Wireless Commun 2007, 6: 2214-2222.","journal-title":"IEEE Trans Wireless Commun"},{"key":"786_CR2","doi-asserted-by":"publisher","first-page":"2149","DOI":"10.1109\/TVT.2010.2041803","volume":"59","author":"Y Wei","year":"2010","unstructured":"Wei Y, Yu FR, Song M: Distributed optimal relay selection in wireless cooperative networks with finite-state Markov channels. IEEE Trans Veh. Tech. 2010, 59: 2149-2158.","journal-title":"IEEE Trans Veh. Tech"},{"key":"786_CR3","doi-asserted-by":"publisher","first-page":"2162","DOI":"10.1109\/TWC.2011.060711.100702","volume":"10","author":"Q Guan","year":"2011","unstructured":"Guan Q, Yu FR, Jiang S, Leung V: Capacity-optimized topology control for MANETs with cooperative communications. IEEE Trans Wireless Commun 2011, 10: 2162-2170.","journal-title":"IEEE Trans Wireless Commun"},{"key":"786_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MWC.2012.6189416","volume":"19","author":"Q Guan","year":"2012","unstructured":"Guan Q, Yu FR, Jiang S, Leung VCM, Mehrvar H: Topology control in mobile ad hoc networks with cooperative communications. IEEE Wireless Comm 2012, 19: 74-79.","journal-title":"IEEE Wireless Comm"},{"key":"786_CR5","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/MCOM.2012.6146495","volume":"50","author":"C Hoymann","year":"2012","unstructured":"Hoymann C, Chen W, Montojo J, Golitschek A, Koutsimanis C, Shen X: Relaying operation in 3GPP LTE: challenges and solutions. IEEE Comm. Mag 2012, 50: 156-162.","journal-title":"IEEE Comm. Mag"},{"key":"786_CR6","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2006.1708409","volume":"23","author":"A Scaglione","year":"2006","unstructured":"Scaglione A, Goeckel D, Laneman J: Cooperative communications in mobile ad hoc networks. IEEE Signal Process Mag 2006, 23: 18-29.","journal-title":"IEEE Signal Process Mag"},{"key":"786_CR7","volume-title":"University of California at Berkeley","author":"A Gueye","year":"2011","unstructured":"Gueye A, game theoretical approach to communication security A: PhD thesis. University of California at Berkeley 2011."},{"key":"786_CR8","volume-title":"Dynamic Noncooperative Game Theory (Classics in Applied Mathematics)","author":"T Basar","year":"1999","unstructured":"Basar T, Olsder GJ: Dynamic Noncooperative Game Theory (Classics in Applied Mathematics). Society for Industrial and Applied Mathematics, Philadelphia; 1999."},{"issue":"5","key":"786_CR9","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.comcom.2011.07.010","volume":"35","author":"R Ramamoorthy","year":"2012","unstructured":"Ramamoorthy R, Yu FR, Tang H, Mason P, Boukerche A: Joint authentication and quality of service design in cooperative communication networks. Comput. Comm 2012, 35(5):597-607. 10.1016\/j.comcom.2011.07.010","journal-title":"Comput. Comm"},{"key":"786_CR10","first-page":"1","volume-title":"Proceedings of the 2008 ACM CoNEXT Conference, Madrid, 9\u201312 December 2008","author":"T Heer","year":"2008","unstructured":"Heer T, Gotz S, Morchon OG, Wehrle K: ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. In Proceedings of the 2008 ACM CoNEXT Conference, Madrid, 9\u201312 December 2008. ACM, New York; 2008:1-23."},{"issue":"6","key":"786_CR11","doi-asserted-by":"publisher","first-page":"2495","DOI":"10.1109\/TVT.2011.2155686","volume":"60","author":"J Jiang","year":"2011","unstructured":"Jiang J, Thompson JS, Sun H: A singular-value-based adaptive modulation cooperation scheme for virtual-MIMO systems. IEEE Trans. Veh. Tech 2011, 60(6):2495-2504.","journal-title":"IEEE Trans. Veh. Tech"},{"issue":"11","key":"786_CR12","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1049\/iet-com.2011.0169","volume":"6","author":"J Jiang","year":"2012","unstructured":"Jiang J, Thompson JS, Sun H, Grant PM: Performance assessment of virtual multiple-input multiple-output systems with compress-and-forward cooperation. IET Commun 2012, 6(11):1456-1465. 10.1049\/iet-com.2011.0169","journal-title":"IET Commun"},{"issue":"10","key":"786_CR13","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.2004.1341264","volume":"42","author":"A Nosratinia","year":"2004","unstructured":"Nosratinia A, Hunter TE, Hedayat A: Cooperative communication in wireless networks. IEEE Commun. Mag 2004, 42(10):74-80. 10.1109\/MCOM.2004.1341264","journal-title":"IEEE Commun. Mag"},{"issue":"9","key":"786_CR14","doi-asserted-by":"publisher","first-page":"3450","DOI":"10.1109\/TWC.2007.06020050","volume":"6","author":"A Bletsas","year":"2007","unstructured":"Bletsas A, Shin H, Win MZ: Cooperative communications with outage-optimal opportunistic relaying. IEEE Trans, Wireless Commun 2007, 6(9):3450-3460.","journal-title":"IEEE Trans, Wireless Commun"},{"key":"786_CR15","first-page":"1034","volume-title":"Proceedings of IEEE WCNC06, Las Vegas, 3\u20136 April 2006","author":"A Bletsas","year":"2006","unstructured":"Bletsas A, Shin H, Win MZ: Cooperative diversity with opportunistic relaying. In Proceedings of IEEE WCNC06, Las Vegas, 3\u20136 April 2006. IEEE, Piscataway; 2006:1034-1039."},{"key":"786_CR16","doi-asserted-by":"publisher","first-page":"3890","DOI":"10.1109\/TWC.2009.080504","volume":"8","author":"K Woradit","year":"2009","unstructured":"Woradit K, Quek T, Suwansantisuk W, Win M, Wuttisittikulkij L, Wymeersch H: Outage behavior of selective relaying schemes IEEE Trans. Wireless Commun 2009, 8: 3890-3895.","journal-title":"Wireless Commun"},{"issue":"2","key":"786_CR17","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1109\/TWC.2009.071036","volume":"8","author":"J Liu","year":"2009","unstructured":"Liu J, Yu FR, Lung C-H, Tang H, Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks: IEEE Trans, Wireless Commun. 2009, 8(2):806-815.","journal-title":"IEEE Trans, Wireless Commun"},{"key":"786_CR18","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1109\/TVT.2010.2103098","volume":"60","author":"S Bu","year":"2011","unstructured":"Bu S, Yu FR, Liu P, Manson P, Tang H: Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks. IEEE Trans, Veh. Tech 2011, 60: 1025-1036.","journal-title":"IEEE Trans, Veh. Tech"},{"key":"786_CR19","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1109\/TNSM.2010.1012.0362","volume":"7","author":"FR Yu","year":"2010","unstructured":"Yu FR, Tang H, Mason P, Wang F: A hierarchical identity based key management scheme in tactical mobile ad hoc networks. IEEE Trans Net. Serv. Manag 2010, 7: 258-267.","journal-title":"IEEE Trans Net. Serv. Manag"},{"key":"786_CR20","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1145\/1089761.1089777","volume-title":"Proceedings of the 1st ACM international workshop on Quality of service and security in wireless and mobile networks, Montreal, October 2005","author":"N Aboudagga","year":"2005","unstructured":"Aboudagga N, Refaei MT, Eltoweissy M, Dasilva LA, Quisquater JJ: Authentication protocols for ad hoc networks: taxonomy and research issues. In Proceedings of the 1st ACM international workshop on Quality of service and security in wireless and mobile networks, Montreal, October 2005. ACM Press, New York; 2005:96-104."},{"key":"786_CR21","volume-title":"The TESLA broadcast authentication protocol,","author":"A Perrig","year":"2002","unstructured":"Perrig A, Canetti R, Tygar JD, Song D: The TESLA broadcast authentication protocol,. RSA Laboratories, Cambridge; 2002."},{"key":"786_CR22","first-page":"749","volume-title":"23rd International Conference on Distributed Computing Systems Workshops, Providence, 19\u201322 May 2003","author":"S Zhu","year":"2003","unstructured":"Zhu S, Xu S, Setia S, Jajodia S: LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks. In 23rd International Conference on Distributed Computing Systems Workshops, Providence, 19\u201322 May 2003. IEEE, Piscataway; 2003:749-749."},{"key":"786_CR23","doi-asserted-by":"publisher","first-page":"1134","DOI":"10.1016\/j.adhoc.2007.11.002","volume":"6","author":"R Akbani","year":"2008","unstructured":"Akbani R, Korkmaz T, Raju GVS: HEAP: a packet authentication scheme for mobile ad hoc networks. Ad Hoc Netw 2008, 6: 1134-1150. 10.1016\/j.adhoc.2007.11.002","journal-title":"Ad Hoc Netw"},{"key":"786_CR24","first-page":"1","volume-title":"Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Alexandria, 7\u201310 November 2005","author":"C Zouridaki","year":"2005","unstructured":"Zouridaki C, Mark BL, Hejmo M: A quantitative trust establishment framework for reliable data packet delivery in MANETs. In Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Alexandria, 7\u201310 November 2005. ACM, New York; 2005:1-10."},{"key":"786_CR25","volume-title":"A robust reputation system for mobile ad-hoc networks","author":"S Buchegger","year":"2003","unstructured":"Buchegger S, Boudec J-YL: A robust reputation system for mobile ad-hoc networks. Proceedings of P2PEcon 2003"},{"key":"786_CR26","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/BF01386232","volume":"2","author":"EW Dijkstra","year":"1960","unstructured":"Dijkstra EW: Recursive programming. Numerische Mathematik 1960, 2: 312-318. 10.1007\/BF01386232","journal-title":"Numerische Mathematik"},{"key":"786_CR27","first-page":"895","volume-title":"7th international joint conference on Autonomous agents and multiagent systems","author":"P Paruchuri","year":"2008","unstructured":"Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S: Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games. In 7th international joint conference on Autonomous agents and multiagent systems. Estoril, Portugal; 12\u201316 May 2008:895-902."},{"key":"786_CR28","first-page":"566","volume-title":"2010 IEEE\/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, 11\u201313 December 2010","author":"R Ramamoorthy","year":"2010","unstructured":"Ramamoorthy R, Yu FR, Tang H, Mason P: Combined authentication and quality of service in cooperative comunication networks. In 2010 IEEE\/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, 11\u201313 December 2010. IEEE, Piscataway; 2010:566-571."},{"key":"786_CR29","doi-asserted-by":"publisher","first-page":"1926","DOI":"10.1109\/26.966069","volume":"49","author":"MZ Win","year":"2001","unstructured":"Win MZ, Member S, Winters JH: Virtual branch analysis of symbol error probability for hybrid selection\/maximal-ratio combining in Rayleigh fading. IEEE Trans. Commun 2001, 49: 1926-1934. 10.1109\/26.966069","journal-title":"IEEE Trans. Commun"},{"key":"786_CR30","first-page":"36","volume-title":"International Zurich Seminar on Communications (IZS)","author":"P Herhold","year":"2004","unstructured":"Herhold P, Zimmermann E, Fettweis G: A simple cooperative extension to wireless relaying. In International Zurich Seminar on Communications (IZS). IEEE, Piscataway; 2004:36-39."},{"key":"786_CR31","first-page":"1968","volume":"49","author":"JG Kim","year":"1999","unstructured":"Kim JG, Krunz M: Delay Analysis of Selective Repeat ARQ for a Markovian Source Over a Wireless Channel. IEEE Trans. Veh. Technol 1999, 49: 1968-1981.","journal-title":"IEEE Trans. Veh. Technol"},{"key":"786_CR32","volume-title":"Computer Networking: A Top-Down Approach","author":"JF Kurose","year":"2007","unstructured":"Kurose JF, Ross KW: Computer Networking: A Top-Down Approach. Addison Wesley, Boston; 2007."},{"key":"786_CR33","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1023\/A:1013676531988","volume":"2","author":"H Liu","year":"1997","unstructured":"Liu H, Ma H, Zarki ME, Gupta S: Error control schemes for networks: an overview. Mob. Netw. Appl 1997, 2: 167-182. 10.1023\/A:1013676531988","journal-title":"Mob. Netw. Appl"},{"issue":"12","key":"786_CR34","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/MCOM.1984.1091865","volume":"22","author":"S Lin","year":"1984","unstructured":"Lin S, Costello D, Miller M: Automatic-repeat-request error-control schemes. IEEE Commun. Mag 1984, 22(12):5-17.","journal-title":"IEEE Commun. Mag"},{"key":"786_CR35","volume-title":"Proceedings of the Workshop on Game Theory for Communications and Networks 2006 (GameNets \u201906)","author":"Y Liu","year":"2006","unstructured":"Liu Y, Comaniciu C, Man H: A Bayesian game approach for intrusion detection in wireless ad hoc networks. In Proceedings of the Workshop on Game Theory for Communications and Networks 2006 (GameNets \u201906). ACM, New York; 2006."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-188\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-188.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-188.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,27]],"date-time":"2022-02-27T22:00:11Z","timestamp":1645999211000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-188"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,9]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["786"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-188","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,9]]},"article-number":"188"}}