Game theory for multi-access edge computing: Survey, use cases, and future trends

J Moura, D Hutchison - IEEE Communications Surveys & …, 2018 - ieeexplore.ieee.org
Game theory (GT) has been used with significant success to formulate, and either design or
optimize, the operation of many representative communications and networking scenarios …

Incentive mechanisms in peer-to-peer networks—a systematic literature review

C Ihle, D Trautwein, M Schubotz, N Meuschke… - ACM Computing …, 2023 - dl.acm.org
Centralized networks inevitably exhibit single points of failure that malicious actors regularly
target. Decentralized networks are more resilient if numerous participants contribute to the …

Counteracting selfish nodes using reputation based system in mobile ad hoc networks

M Fayaz, G Mehmood, A Khan, S Abbas, M Fayaz… - Electronics, 2022 - mdpi.com
A mobile ad hoc network (MANET) is a group of nodes constituting a network of mobile
nodes without predefined and pre-established architecture where mobile nodes can …

A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic mobile adhoc networks

BUI Khan, F Anwar, RF Olanrewaju, BR Pampori… - Ieee …, 2020 - ieeexplore.ieee.org
The Mobile Ad-Hoc Network (MANET) incorporates a collaborative networking scenario,
where dynamic host movement results in frequent topology changes. In MANET, nodes …

Blockchain incentivized data forwarding in MANETs: Strategies and challenges

C Machado, CM Westphall - Ad Hoc Networks, 2021 - Elsevier
Recently, blockchain trustless properties started to be investigated to design cooperation
enforcement mechanisms in many systems. This paper presents a comprehensive and …

To trust or not to trust: evolutionary dynamics of an asymmetric N-player trust game

IS Lim, N Masuda - IEEE Transactions on Evolutionary …, 2023 - ieeexplore.ieee.org
Trusting others and reciprocating the received trust with trustworthy actions are fundaments
of economic and social interactions. The trust game (TG) is widely used for studying trust …

[PDF][PDF] A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network.

S Nobahary, S Babaie - Appl. Comput. Syst., 2018 - intapi.sciendo.com
Ad-hoc networks are a set of mobile nodes that are connected via a wireless channel. Some
of the nodes in this network behave selfishly and do not send data to other nodes so that in …

A dummy packet-based hybrid security framework for mitigating routing misbehavior in multi-hop wireless networks

T Sakthivel, RM Chandrasekaran - Wireless Personal Communications, 2018 - Springer
Wireless networks have emerged as a key enabling technology, expanding rapidly and
offers numerous potential applications. The security issues have to be adequately …

Detecting noncooperation nodes mechanisms in wireless networks: a survey

S Nobahary, H Gharaee Garakani… - Security and …, 2022 - Wiley Online Library
Wireless networks face security problems compared with traditional wired networks. In
wireless networks such as wireless sensor networks (WSNs), mobile ad hoc networks …

A bio inspired optimization with reliable QoS routing through efficient packet transmission in mobile ad-hoc network

CV Subbaiah, K Govinda - Renewable Energy Focus, 2022 - Elsevier
A collection of mobile devices is defined as a Mobile Ad-hoc Network (MANET). Without any
prior management these devices can communicate and synchronize with one another. The …