@incollection{, F6AC0F982A53D5884EBBC0357A4571F3 , author={{ShaheenBohra} and {NaveenChoudhary} and {College of Technology and Engineering}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1521723 } @incollection{b0, , title={{A System for MANET to Detect Selfish Nodes Using NS2}} , author={{ SDPadiya } and { RPandit } and { SPatel }} , journal={{International Journal of Engineering Science and Innovative Technology}} 1 } @incollection{b1, , title={{Stimulating cooperation in self-organizing mobile ad hoc networks}} , author={{ LButtyan } and { JHubaux }} , journal={{Mobile Networks and Applications}} 8 , year={2002} } @incollection{b2, , title={{Secure 2ACK Routing Protocol in mobile ad hoc networks}} , author={{ KVijaya }} , booktitle={{Proceedings of TENCON '08}} TENCON '08 , year={2008} IEEE } @incollection{b3, , title={{TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks}} , author={{ KBalakrishnan } and { JDeng } and { PKVarshney }} , booktitle={{Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05)}} IEEE Wireless Comm. and Networking Conf. (WCNC '05) , year={2005} 4 } @incollection{b4, , title={{Observation-based cooperation enforcement in ad hoc network}} , author={{ SBansal } and { MBaker }} , journal={{IEEE arXiv}} 2 , year={2003} } @book{b5, , title={{Guide to wireless ad hoc networks}} , author={{ SMisra } and { IWoungang } and { SCMisra }} , year={2009} , publisher={Springer} } @incollection{b6, , title={{Mitigating Routing Misbehavior in Mobile Ad Hoc Networks}} , author={{ SMarti } and { TJGiuli } and { KLai } and { MBaker }} , booktitle={{Proc. International conference on mobile computing and networking (MobiCom)}} International conference on mobile computing and networking (MobiCom) , year={2000} } @incollection{b7, , title={{Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks}} , author={{ SZhong } and { JChen } and { YYang }} , booktitle={{INFOCOM 2003.Twenty-Second Annual Joint Conference of the IEEE Computer and Communications}} , year={2003} 3 } @incollection{b8, , title={{Performance Analysis of the CONFIDANT Protocol : Cooperation of Nodes -Fairness in Dynamic Ad Hoc NeTworks}} , author={{ SBuchegger } and { JYBoudec }} , booktitle={{Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)}} IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC) , year={2002} } @incollection{b9, , title={{CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks}} , author={{ PMichiardi } and { RMolva }} , booktitle={{Communication and Multimedia Security Conference}} , year={2002. 2002} } @incollection{b10, , title={{Analysis of Selfish and Malicious Nodes on DSR Based Ocean Protocol in MANET}} , author={{ ASaxena } and { JLRana }} , journal={{International Journal of Computer Science and Communication Technologies}} 3 , year={2010} } @incollection{b11, , title={{SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks}} , author={{ HQi } and { ODWu } and { PKhosla }} , booktitle={{IEEE Wireless Communications and Networking Conference}} , year={2004} 2 } @incollection{b12, , title={{An Efficient Scheme to Motivate Cooperation in Mobile Ad hoc Networks}} , author={{ SSoltanali } and { SPirahesh } and { SNiksefat } and { MSabaei }} , booktitle={{Proceedings of the 2007 Third International Conference on Networking and Services}} the 2007 Third International Conference on Networking and Services , year={2007} } @incollection{b13, , title={{AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement}} , author={{ AAl-Roubaiey } and { TSheltami } and { AMahmoud } and { EShakshuki } and { H }} , booktitle={{24th IEEE International Conference on Advanced Information Networking and Applications}} , year={Mouftah 2010} }