{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T09:55:25Z","timestamp":1694512525006},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,5,15]],"date-time":"2014-05-15T00:00:00Z","timestamp":1400112000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/1687-1499-2014-78","type":"journal-article","created":{"date-parts":[[2014,5,15]],"date-time":"2014-05-15T17:03:52Z","timestamp":1400173432000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["EigenTrust-based non-cooperative game model assisting ACO look-ahead secure routing against selfishness"],"prefix":"10.1186","volume":"2014","author":[{"given":"Surendran","family":"Subbaraj","sequence":"first","affiliation":[]},{"given":"Prakash","family":"Savarimuthu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,15]]},"reference":[{"key":"918_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijdps.2012.3124","volume":"3","author":"V Manoj","year":"2012","unstructured":"Manoj V, Mohammed A, Raghavendiran N, Vijayan R: A novel security framework using trust and fuzzy logic in MANET. Intern J Distributed Parallel Systems 2012, 3: 1.","journal-title":"Intern J Distributed Parallel Systems"},{"key":"918_CR2","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1613\/jair.530","volume":"9","author":"G Di Caro","year":"1998","unstructured":"Di Caro G, Dorigo M, AntNet: distributed stigmergetic control for communications networks. J Artificial Intelligence Res (JAIR) 1998, 9: 317-365.","journal-title":"J Artificial Intelligence Res (JAIR)"},{"issue":"7","key":"918_CR3","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1049\/iet-com.2009.0164","volume":"4","author":"L Yuhua","year":"2010","unstructured":"Yuhua L, et al.: Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET Communications 2010, 4(7):810-816. 10.1049\/iet-com.2009.0164","journal-title":"IET Communications"},{"issue":"5","key":"918_CR4","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1016\/j.adhoc.2011.02.004","volume":"10","author":"H Cheng","year":"2012","unstructured":"Cheng H, et al.: Nodes organization for channel assignment with topology preservation in multi-radio wireless mesh networks. Ad Hoc Networks 2012, 10(5):760-773. 10.1016\/j.adhoc.2011.02.004","journal-title":"Ad Hoc Networks"},{"key":"918_CR5","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-28646-2_23","volume-title":"Ad hoc networking with swarm intelligence in Ant Colony Optimization and Swarm Intelligence","author":"C-C Shen","year":"2004","unstructured":"Shen C-C, Chaiporn J, Chavalit S, Zhuochuan H, Sundaram R: Ad hoc networking with swarm intelligence in Ant Colony Optimization and Swarm Intelligence. Springer, Berlin Heidelberg; 2004:262-269."},{"issue":"2","key":"918_CR6","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1109\/90.993305","volume":"10","author":"X Yuan","year":"2002","unstructured":"Yuan X: Heuristic algorithms for multi-constrained quality-of-service routing. IEEE\/ACM Trans Networking 2002, 10(2):244-256. 10.1109\/90.993305","journal-title":"IEEE\/ACM Trans Networking"},{"issue":"3","key":"918_CR7","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/S1389-1286(00)00090-6","volume":"34","author":"F Antonios","year":"2000","unstructured":"Antonios F, et al.: The use of learning algorithms in ATM networks call admission control problem: a methodology. Computer Networks 2000, 34(3):341-353. 10.1016\/S1389-1286(00)00090-6","journal-title":"Computer Networks"},{"issue":"4","key":"918_CR8","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s005000100099","volume":"5","author":"Y Ahmet Sekercioglu","year":"2001","unstructured":"Ahmet Sekercioglu Y, et al.: Computational intelligence in management of ATM networks: a survey of current state of research. Soft Comput 2001, 5(4):257-263. 10.1007\/s005000100099","journal-title":"Soft Comput"},{"key":"918_CR9","first-page":"6","volume":"17","author":"JJ Wang","year":"2010","unstructured":"Wang JJ, Song M, Zhang Y, J-y W, Man Y: An ACO and position information based intelligent QoS routing mechanism in MANET. J China Universities Posts Telecommunications 2010, 17: 6-16.","journal-title":"J China Universities Posts Telecommunications"},{"issue":"5","key":"918_CR10","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TSMCA.2003.817391","volume":"33","author":"MS Kwang","year":"2003","unstructured":"Kwang MS, Weng HS: Ant Colony Optimization for routing and load balancing: survey and new directions. IEEE Trans Syst Man Cybern 2003, 33(5):560-572. 10.1109\/TSMCA.2003.817391","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"11","key":"918_CR11","doi-asserted-by":"publisher","first-page":"2188","DOI":"10.1016\/j.jss.2010.06.025","volume":"83","author":"S Misra","year":"2010","unstructured":"Misra S, Dhurandher SK, Obaidat MS, Gupta P, Verma K, Narula P: An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks. J Systems Software 2010, 83(11):2188-2199. 10.1016\/j.jss.2010.06.025","journal-title":"J Systems Software"},{"issue":"1","key":"918_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s11227-011-0639-8","volume":"62","author":"S Misra","year":"2011","unstructured":"Misra S, Venkata Krishna P, Bhiwal A, Singh Chawla A, Wolfinger BE, Lee C: A learning automata-based fault-tolerant routing algorithm for mobile ad-hoc networks. J. Supercomput 2011, 62(1):4-23.","journal-title":"J. Supercomput"},{"key":"918_CR13","volume-title":"IEEE International Conference on Communications","author":"S Misra","year":"2009","unstructured":"Misra S, Dhurandher SK, Obaidat MS, Verma K, Gupta P: Using ant-like agents for fault-tolerant routing in mobile ad-hoc networks. In IEEE International Conference on Communications. ICC\u201909, Dresden; 2009. 14\u201318 June 2009, pp. 1\u20135"},{"key":"918_CR14","first-page":"134","volume-title":"Proceedings of the European Conference on Artificial Life, vol. volume 142","author":"A Colorni","year":"1991","unstructured":"Colorni A, Marco D, Vittorio M: Distributed optimization by ant colonies. In Proceedings of the European Conference on Artificial Life, vol. volume 142. Elsevier, Amsterdam; 1991:134-142."},{"issue":"1","key":"918_CR15","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/3477.484436","volume":"26","author":"M Dorigo","year":"1996","unstructured":"Dorigo M, Maniezzo V, Colorni A: Ant system: optimization by a colony of cooperating agents. IEEE Trans Syst Man Cybern B Cybern 1996, 26(1):29-41. 10.1109\/3477.484436","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"918_CR16","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/ICPPW.2002.1039715","volume-title":"Proceedings of the International Conference on Parallel Processing Workshops","author":"M Gunes","year":"2002","unstructured":"Gunes M, Udo S, Imed B: ARA-the ant-colony based routing algorithm for MANETs. In Proceedings of the International Conference on Parallel Processing Workshops. IEEE, Piscataway; 2002:79-85."},{"key":"918_CR17","first-page":"333","volume-title":"Proceedings of the International Conference on Software Engineering, Artificial Intelligence, Networking Parallel\/Distributed Computing","author":"H Matsuo","year":"2001","unstructured":"Matsuo H, Mori K: Accelerated ants routing in dynamic networks. Proceedings of the International Conference on Software Engineering, Artificial Intelligence, Networking Parallel\/Distributed Computing 2001, 333-339."},{"key":"918_CR18","volume-title":"The 4th Asia-Pacific Conference Simulated Evolution Learning, Orchid Country Club, Singapore, 18-22","author":"K Fujita","year":"2002","unstructured":"Fujita K, Akira S, Toshihiro M, Hiroshi M: An adaptive ant-based routing algorithm used routing history in dynamic networks. The 4th Asia-Pacific Conference Simulated Evolution Learning, Orchid Country Club, Singapore, 18-22 November 2002 volume 1, pp 46\u201350"},{"issue":"02","key":"918_CR19","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1142\/S1469026805001556","volume":"5","author":"F Ducatelle","year":"2005","unstructured":"Ducatelle F, Di Caro G, Gambardella LM: Using ant agents to combine reactive and proactive strategies for routing in mobile ad-hoc networks. Int J Computational Intel App 2005, 5(02):169-184. 10.1142\/S1469026805001556","journal-title":"Int J Computational Intel App"},{"issue":"6","key":"918_CR20","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.adhoc.2007.07.003","volume":"6","author":"L Rosati","year":"2008","unstructured":"Rosati L, Berioli M, Reali G: On ant routing algorithms in ad hoc networks with critical connectivity. Ad Hoc Networks 2008, 6(6):827-859. 10.1016\/j.adhoc.2007.07.003","journal-title":"Ad Hoc Networks"},{"issue":"4","key":"918_CR21","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1016\/j.adhoc.2008.06.001","volume":"7","author":"J Wang","year":"2009","unstructured":"Wang J, et al.: HOPNET: a hybrid ant colony optimization routing algorithm for mobile ad hoc network. Ad Hoc Networks 2009, 7(4):690-705. 10.1016\/j.adhoc.2008.06.001","journal-title":"Ad Hoc Networks"},{"issue":"1","key":"918_CR22","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1016\/j.jnca.2011.08.009","volume":"35","author":"J Mohammad","year":"2012","unstructured":"Mohammad J, Azadeh Alsadat Emrani Z, Seyed Mohamad H, MSDP with ACO: A maximal SRLG disjoint routing algorithm based on ant colony optimization. J Network Comput App 2012, 35(1):394-402. 10.1016\/j.jnca.2011.08.009","journal-title":"J Network Comput App"},{"issue":"5","key":"918_CR23","first-page":"1581","volume":"27","author":"E Khosrowshahi-Asl","year":"2011","unstructured":"Khosrowshahi-Asl E, Noorhosseini M, Pirouz AS: A dynamic ant colony based routing algorithm for mobile ad-hoc networks. J Information Science Engineering 2011, 27(5):1581-1596.","journal-title":"J Information Science Engineering"},{"key":"918_CR24","doi-asserted-by":"publisher","first-page":"2406","DOI":"10.1016\/j.tcs.2010.02.012","volume":"411","author":"F Neumann","year":"2010","unstructured":"Neumann F, Witt C: Ant Colony Optimization and the minimum spanning tree problem. Theoretical Comput Science 2010, 411: 2406-2413. 10.1016\/j.tcs.2010.02.012","journal-title":"Theoretical Comput Science"},{"issue":"3","key":"918_CR25","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1016\/j.comnet.2011.10.028","volume":"56","author":"V Ana Cristina Kochem","year":"2012","unstructured":"Ana Cristina Kochem V, Anelise M, Myriam Regattieri D, Aline Carneiro V: Grant: inferring best forwarders from complex networks' dynamics through a greedy ant colony optimization. Comp Networks: The International Journal of Computer and Telecommunications Networking 2012, 56(3):997-1015.","journal-title":"Comp Networks: The International Journal of Computer and Telecommunications Networking"},{"key":"918_CR26","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1016\/j.simpat.2010.01.008","volume":"18","author":"S Misra","year":"2010","unstructured":"Misra S, Dhurandher SK, Obaidat MS, Verma K, Gupta P: A low overhead fault-tolerant routing algorithm for mobile ad hoc networks: a scheme and its simulation analysis. Simulation Modelling Practice Theory 2010, 18: 637-649. 10.1016\/j.simpat.2010.01.008","journal-title":"Simulation Modelling Practice Theory"},{"issue":"4","key":"918_CR27","doi-asserted-by":"publisher","first-page":"4618","DOI":"10.1016\/j.eswa.2011.09.076","volume":"39","author":"M Chandra","year":"2012","unstructured":"Chandra M, Baskaran R: Review: a survey: Ant Colony Optimization based recent research and implementation on several engineering domains. Expert Syst with App 2012, 39(4):4618-4627. 10.1016\/j.eswa.2011.09.076","journal-title":"Expert Syst with App"},{"key":"918_CR28","doi-asserted-by":"publisher","first-page":"1208","DOI":"10.1016\/j.proeng.2012.01.114","volume":"29","author":"CAO Huaihu","year":"2012","unstructured":"Huaihu CAO: A QoS routing algorithm based on ant colony optimization and mobile agent. Procedia Engineering 2012, 29: 1208-1212.","journal-title":"Procedia Engineering"},{"key":"918_CR29","first-page":"11","volume":"9","author":"A Rossi","year":"2009","unstructured":"Rossi A, Samuel P: Collusion resistant reputation based intrusion detection system for MANETs. Intern J Comput Science Network Security (IJCNS) 2009, 9: 11.","journal-title":"Intern J Comput Science Network Security (IJCNS)"},{"key":"918_CR30","first-page":"5","volume":"2","author":"GS Mamatha","year":"2010","unstructured":"Mamatha GS, Sharma SC: A highly secured approach against attacks in MANETS. Intern J Comput Theory Engineering 2010, 2: 5.","journal-title":"Intern J Comput Theory Engineering"},{"key":"918_CR31","first-page":"2","volume":"2","author":"M Rajesh Babu","year":"2010","unstructured":"Rajesh Babu M, Selvan S: A lightweight and attack resistant authenticated routing protocol for mobile ad hoc networks. Intern J Wireless Mobile Networks (IJWMN) 2010, 2: 2.","journal-title":"Intern J Wireless Mobile Networks (IJWMN)"},{"key":"918_CR32","unstructured":"Yonglin R, Azzedine B: An efficient trust based reputation protocol for wireless and mobile ad hoc networks. IEEE \"GLOBECOM\" Proceedings, New Orleans, LA; 30 Nov - 4 Dec 2008"},{"issue":"4","key":"918_CR33","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/TITB.2012.2194788","volume":"16","author":"D He","year":"2012","unstructured":"He D, et al.: ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans Inf Technol Biomed 2012, 16(4):623-632.","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"918_CR34","first-page":"696","volume-title":"Proceedings of the 4th International Conference on Collaborative Computing: Networking. Appl Work Sharing, Orlando, 13-16 Nov 2008, volume 10","author":"W Li","year":"2008","unstructured":"Li W, Parker J, Joshi A: Security through collaboration in MANETs. In Proceedings of the 4th International Conference on Collaborative Computing: Networking. Appl Work Sharing, Orlando, 13-16 Nov 2008, volume 10. Springer LNICST, Berlin Heidelberg; 2008:696-714."},{"issue":"12","key":"918_CR35","doi-asserted-by":"publisher","first-page":"3172","DOI":"10.1109\/JPROC.2012.2208211","volume":"100","author":"A Attar","year":"2012","unstructured":"Attar A, et al.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proceedings IEEE 2012, 100(12):3172-3186.","journal-title":"Proceedings IEEE"},{"key":"918_CR36","first-page":"8","volume":"8","author":"VR Ghorpade","year":"2008","unstructured":"Ghorpade VR: Fuzzy logic based trust management framework for MANET. DSP J 2008, 8: 8.","journal-title":"DSP J"},{"issue":"2","key":"918_CR37","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1109\/JSYST.2010.2095910","volume":"5","author":"SK Dhurandher","year":"2011","unstructured":"Dhurandher SK, Obaidat MS, Verma K, Gupta P, Dhurandher P: FACES: friend-based ad hoc routing using challenges to establish security in manets systems. IEEE Systems Journal 2011, 5(2):321-322.","journal-title":"IEEE Systems Journal"},{"issue":"2","key":"918_CR38","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s10619-012-7113-3","volume":"31","author":"W Li","year":"2012","unstructured":"Li W, Joshi A, Finin T: CAST: context aware security and trust framework for mobile ad hoc networks using policies. Distributed Parallel Databases 2012, 31(2):353-376.","journal-title":"Distributed Parallel Databases"},{"key":"918_CR39","volume-title":"Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops, (MobiQuitous), San Jose, CA, 17-21","author":"A Patwardhan","year":"2006","unstructured":"Patwardhan A, Joshi A, Finin T, Yesha Y: A data intensive reputation management scheme for vehicular ad hoc networks. Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems - Workshops, (MobiQuitous), San Jose, CA, 17-21 July 2006, pp. 1\u20138"},{"key":"918_CR40","doi-asserted-by":"crossref","unstructured":"Ren Y, Boukerche A: Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks. In the IEEE International Conference on Communications. ICC\u201909, Dresden; 14-18 June 2009, pp.1\u20135","DOI":"10.1109\/ICC.2009.5305933"},{"key":"918_CR41","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1145\/513800.513828","volume-title":"MobiHoc\u201902: Proceedings of the 3rd ACM International Symposium on Mobile ad hoc Networking and Computing, Lausanne, Switzerland, 9-11","author":"S Buchegger","year":"2002","unstructured":"Buchegger S, Le Boudec JY: Performance analysis of the confidant protocol. MobiHoc\u201902: Proceedings of the 3rd ACM International Symposium on Mobile ad hoc Networking and Computing, Lausanne, Switzerland, 9-11 June 2002 226-236."},{"key":"918_CR42","first-page":"107","volume-title":"Proceedings of the IFIP TC6\/TC11 Sixth Joint Working Conference on Communications Multimedia Security, Portoro\u017e, Slovenia, 26\u201327 September 2002","author":"P Michiardi","year":"2002","unstructured":"Michiardi P, Molva R, CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Proceedings of the IFIP TC6\/TC11 Sixth Joint Working Conference on Communications Multimedia Security, Portoro\u017e, Slovenia, 26\u201327 September 2002 2002, 107-121."},{"issue":"3","key":"918_CR43","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1109\/TSMCC.2003.817354","volume":"33","author":"AV Vasilakos","year":"2003","unstructured":"Vasilakos AV, Saltouros MP, Atlassis AF, Pedryz W: Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. IEEE Trans Syst Man Cyber Part C 2003, 33(3):297-312. 10.1109\/TSMCC.2003.817354","journal-title":"IEEE Trans Syst Man Cyber Part C"},{"key":"918_CR44","first-page":"1488","volume-title":"IEEE World Congress on Computational Intelligence, The","author":"AV Vasilakos","year":"1998","unstructured":"Vasilakos AV, et al.: Evolutionary-fuzzy prediction for strategic QoS routing in broadband networks. IEEE World Congress on Computational Intelligence, The 1998 International Conference on Fuzzy Systems Proceedings, Anchorage, AK,4\u20139May 1998 volume 2 1488-1493."},{"key":"918_CR45","first-page":"212","volume":"1","author":"H Hallani","year":"2008","unstructured":"Hallani H, Shahrestani SA: Fuzzy trust approach for wireless ad-hoc networks. Communications of the IBIMA 2008, 1: 212-218.","journal-title":"Communications of the IBIMA"},{"key":"918_CR46","volume-title":"the International Conference on Advanced Computing and Communications","author":"J Martin","year":"2007","unstructured":"Martin J, Manickam L, Shanmugavel S: Fuzzy based trusted ad hoc on-demand distance vector routing protocol for MANET. In the International Conference on Advanced Computing and Communications, 2007. ADCOM 2007, Guwahati, Assam; 18-21 Dec 2007, pp. 414\u2013421"},{"key":"918_CR47","first-page":"130","volume":"2","author":"A Rajaram","year":"2010","unstructured":"Rajaram A, Palaniswami S: Detecting malicious node in MANET using trust based cross-layer security protocol. Intern J Comput Science Information Technologies 2010, 2: 130-137.","journal-title":"Intern J Comput Science Information Technologies"},{"key":"918_CR48","doi-asserted-by":"crossref","unstructured":"Pallavikhatr S: Trust evaluation in wireless ad hoc networks using fuzzy system. Proceedings of the CUBE International Information Technology Conference, Pune, India, 03 - 06 September, 2012","DOI":"10.1145\/2381716.2381864"},{"key":"918_CR49","first-page":"303","volume":"15","author":"C Pushphita","year":"2011","unstructured":"Pushphita C, Indranil S, Ghosh SK: A secure trusted auction oriented clustering based routing protocol for MANET. Springer J On Cluster Comput 2011, 15: 303-320.","journal-title":"Springer J On Cluster Comput"},{"key":"918_CR50","volume-title":"Proceedings of the 10th IEEE Symposium on Computers and Communications","author":"R Yacine","year":"2005","unstructured":"Yacine R, Vicente E, Mujica V, Dorgham S: A reputation-based trust mechanism for ad hoc networks. Proceedings of the 10th IEEE Symposium on Computers and Communications, 2005, Cartagena, Spain, 27-30 June 2005"},{"key":"918_CR51","first-page":"1","volume":"2","author":"V Sumalatha","year":"2009","unstructured":"Sumalatha V, Reddy PC: A novel approach for misbehaviour detection in ad hoc networks. Intern J Cryptography Security 2009, 2: 1.","journal-title":"Intern J Cryptography Security"},{"issue":"1","key":"918_CR52","doi-asserted-by":"publisher","first-page":"116","DOI":"10.4304\/jnw.7.1.116-125","volume":"7","author":"Y Khamayseh","year":"2012","unstructured":"Khamayseh Y, Al-Salah R, Yassein MB: Malicious nodes detection in MANETs: behavioral analysis approach. J Networks 2012, 7(1):116-125.","journal-title":"J Networks"},{"issue":"2","key":"918_CR53","first-page":"60","volume":"3","author":"M Ahmed","year":"2011","unstructured":"Ahmed M, Bd E-H, Ihab A, Ibrahim I: AOMDV based TRIUMF implementation and performance evaluation. Intern J Comput Information Syst 2011, 3(2):60-69.","journal-title":"Intern J Comput Information Syst"},{"issue":"9","key":"918_CR54","first-page":"407","volume":"75","author":"S Surendran","year":"2013","unstructured":"Surendran S, Prakash S: An ACO look ahead approach to QoS enabled fault-tolerant and secured routing in MANETs. PennSee Journal 2013, 75(9):407-417.","journal-title":"PennSee Journal"},{"key":"918_CR55","first-page":"727","volume-title":"Proceedings of the","author":"W Guo","year":"2005","unstructured":"Guo W, Xiong Z: Dynamic trust evaluation based routing model for ad hoc networks. Proceedings of the 2005 International Conference on Wireless Communications, Networking Mobile Computing, Wuhan University, China, 23-26 Sept 2005 volume 2 727-730."},{"key":"918_CR56","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/s11036-010-0243-9","volume":"17","author":"C Weinjiai","year":"2012","unstructured":"Weinjiai C, James P, Anupam J: Security through collaboration and trust in MANETs. Springer J Mobile Network Appl 2012, 17: 342-352. 10.1007\/s11036-010-0243-9","journal-title":"Springer J Mobile Network Appl"},{"issue":"18","key":"918_CR57","doi-asserted-by":"publisher","first-page":"3721","DOI":"10.1016\/j.comcom.2007.07.004","volume":"30","author":"K Komathy","year":"2007","unstructured":"Komathy K, Narayanasamy P: Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network. Computer Communications 2007, 30(18):3721-3735. 10.1016\/j.comcom.2007.07.004","journal-title":"Computer Communications"},{"issue":"4","key":"918_CR58","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1016\/j.jnca.2008.02.002","volume":"31","author":"K Komathy","year":"2008","unstructured":"Komathy K, Narayanasamy P: Trust-based evolutionary game model assisting AODV routing against selfishness. J Network Comput Appl 2008, 31(4):446-471. 10.1016\/j.jnca.2008.02.002","journal-title":"J Network Comput Appl"},{"issue":"3","key":"918_CR59","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/j.comcom.2010.01.021","volume":"34","author":"Y Wang","year":"2011","unstructured":"Wang Y, et al.: P2P soft security: on evolutionary dynamics of P2P incentive mechanism. Comput Communications 2011, 34(3):241-249. 10.1016\/j.comcom.2010.01.021","journal-title":"Comput Communications"},{"issue":"4884","key":"918_CR60","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1126\/science.242.4884.1385","volume":"242","author":"R Axelrod","year":"1988","unstructured":"Axelrod R, Dion D: The further evolution of cooperation. Science 1988, 242(4884):1385-1390. 10.1126\/science.242.4884.1385","journal-title":"Science"},{"issue":"1","key":"918_CR61","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.jnca.2010.09.007","volume":"34","author":"M Mejia","year":"2011","unstructured":"Mejia M, Pe\u00f1a N, Mu\u00f1oz JL, Esparza O, Alzate M: A game theoretic trust model for on-line distributed evolution of cooperation in MANETs. J Network Comput Appl 2011, 34(1):39-51. 10.1016\/j.jnca.2010.09.007","journal-title":"J Network Comput Appl"},{"key":"918_CR62","first-page":"2637","volume":"3","author":"H Ishibuchi","year":"2005","unstructured":"Ishibuchi H, Namikawa N: Evolution of cooperative behavior in the iterated prisoner's dilemma under random pairing in game playing. IEEE Congress Evolutionary Computation 2005, 3: 2637-2644.","journal-title":"IEEE Congress Evolutionary Computation"},{"key":"918_CR63","first-page":"2013","volume":"2013","author":"SQ Huang","year":"2013","unstructured":"Huang SQ, et al.: An MPS-BNS mixed strategy based on game theory for wireless mesh networks. Scientific World J 2013, 2013: 2013.","journal-title":"Scientific World J"},{"issue":"1","key":"918_CR64","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1108\/10662240910927849","volume":"19","author":"M Mejia","year":"2009","unstructured":"Mejia M, Pe\u00f1a N, Mu\u00f1oz JL, Esparza O: A review of trust modeling in ad hoc networks. Internet Res volume 2009, 19(1):88-104. 10.1108\/10662240910927849","journal-title":"Internet Res volume"},{"key":"918_CR65","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1023\/B:TELS.0000041015.43191.40","volume":"27","author":"K Wrona","year":"2004","unstructured":"Wrona K, M\u00e4h\u00f6nen P: Analytical model of cooperation in ad hoc networks. Telecommunication Syst 2004, 27: 347-369.","journal-title":"Telecommunication Syst"},{"key":"918_CR66","volume-title":"the","author":"S Rao","year":"2010","unstructured":"Rao S, Wang Y, Tao X: The comprehensive trust model in P2P based on improved EigenTrust algorithm. the 2010 IEEE International Conference on Measuring Technology and Mechatronics Automation, Changsa City, 13-14 March 2010"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2014-78\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-78.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2014-78.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T13:57:50Z","timestamp":1565445470000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2014-78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,15]]},"references-count":66,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["918"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2014-78","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,15]]},"assertion":[{"value":"12 March 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"78"}}