Game theory for multi-access edge computing: Survey, use cases, and future trends
Game theory (GT) has been used with significant success to formulate, and either design or
optimize, the operation of many representative communications and networking scenarios …
optimize, the operation of many representative communications and networking scenarios …
Incentive mechanisms in peer-to-peer networks—a systematic literature review
Centralized networks inevitably exhibit single points of failure that malicious actors regularly
target. Decentralized networks are more resilient if numerous participants contribute to the …
target. Decentralized networks are more resilient if numerous participants contribute to the …
Counteracting selfish nodes using reputation based system in mobile ad hoc networks
A mobile ad hoc network (MANET) is a group of nodes constituting a network of mobile
nodes without predefined and pre-established architecture where mobile nodes can …
nodes without predefined and pre-established architecture where mobile nodes can …
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic mobile adhoc networks
The Mobile Ad-Hoc Network (MANET) incorporates a collaborative networking scenario,
where dynamic host movement results in frequent topology changes. In MANET, nodes …
where dynamic host movement results in frequent topology changes. In MANET, nodes …
Blockchain incentivized data forwarding in MANETs: Strategies and challenges
Recently, blockchain trustless properties started to be investigated to design cooperation
enforcement mechanisms in many systems. This paper presents a comprehensive and …
enforcement mechanisms in many systems. This paper presents a comprehensive and …
To trust or not to trust: evolutionary dynamics of an asymmetric N-player trust game
Trusting others and reciprocating the received trust with trustworthy actions are fundaments
of economic and social interactions. The trust game (TG) is widely used for studying trust …
of economic and social interactions. The trust game (TG) is widely used for studying trust …
[PDF][PDF] A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network.
S Nobahary, S Babaie - Appl. Comput. Syst., 2018 - intapi.sciendo.com
Ad-hoc networks are a set of mobile nodes that are connected via a wireless channel. Some
of the nodes in this network behave selfishly and do not send data to other nodes so that in …
of the nodes in this network behave selfishly and do not send data to other nodes so that in …
A dummy packet-based hybrid security framework for mitigating routing misbehavior in multi-hop wireless networks
Wireless networks have emerged as a key enabling technology, expanding rapidly and
offers numerous potential applications. The security issues have to be adequately …
offers numerous potential applications. The security issues have to be adequately …
Detecting noncooperation nodes mechanisms in wireless networks: a survey
S Nobahary, H Gharaee Garakani… - Security and …, 2022 - Wiley Online Library
Wireless networks face security problems compared with traditional wired networks. In
wireless networks such as wireless sensor networks (WSNs), mobile ad hoc networks …
wireless networks such as wireless sensor networks (WSNs), mobile ad hoc networks …
A bio inspired optimization with reliable QoS routing through efficient packet transmission in mobile ad-hoc network
CV Subbaiah, K Govinda - Renewable Energy Focus, 2022 - Elsevier
A collection of mobile devices is defined as a Mobile Ad-hoc Network (MANET). Without any
prior management these devices can communicate and synchronize with one another. The …
prior management these devices can communicate and synchronize with one another. The …