[1]MASURKAR M S, ASUTKAR G M, KULAT K D. Lifetime maximization in wireless sensor network using cross layer design: a design review[C]// 1st International Conference on Emerging Trends in Engineering and Technology. New York:IEEE,2008:234-237.[2]SAGDUYU Y E, EPHREMIDES A. A gametheoretic analysis of denial of service attacks in wireless random access[C]// 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops. New York:IEEE, 2007:1-10.[3]CHIANG M, LOW S H, CALDERBANK A R, et al. Layering as optimization decomposition: A mathematical theory of network architectures[J]. Proceedings of the IEEE, 2007,95(1):255-312.[4]XU LI, ZHANG YIHUI. A new reputationbased trust management strategy for clustered Ad Hoc networks[C]// 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing. Washington, DC:IEEE Computer Society, 2009:116-119.[5]SAGDUYU Y E, BERRY R, EPHREMIDES A. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types[C]// Proceedings of the 1st ICST International Conference on Game Theory for Networks. Piscataway:IEEE, 2009:130-139.[6]DEHNIE S, MEMON N. Modeling misbehavior in cooperative diversity: a dynamic game approach [C]// Journal on Advances in Signal Processing:Special Issue on Game Theory in Signal Processing and Communications. New York:Hindawi Publishing,2009: 3.[7]YU WEI, LIU K J R. Secure cooperation in autonomous mobile Ad Hoc networks under noise and imperfect monitoring: a gametheoretic approach, information forensics and security[J]. IEEE Transactions on Information Forensics and Security,2008,3(2): 317-330.[8]YANG JIE, KLEIN A G, BROWN D R. Natural cooperation in wireless networks[M]. IEEE Signal Processing Magazine, 2009,26(5):98-106.〖ZK)〗[9]许力.无线传感器网络的安全和优化[M]. 北京: 电子工业出版社, 2010.[10]XU LI, ZHENG BAOYU. Cross layer coordinated energy saving strategy in MANET[J]. Journal of Electronics, 2003,20(6):451-456.[11]URPI A, BONUCCELLI M, GIORDANO S. Modelling cooperation in mobile Ad Hoc networks: a formal description of selfishness[EB/OL].[2011-02-15]. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.9315.[12]ZHAO LIQIANG, ZHANG HUAWEI, ZHANG JIE, et al. Selfish traffic with rational nodes in WLANs[J]. IEEE Communications Letters, 2008, 12(9):645-647.[13]范如国,韩民春. 博弈论[M]. 武汉: 武汉大学出版社, 2007.[14]ALPCAN T, PAVEL L, STEFANOVIC N. A control theoretic approach to noncooperative game design[C]// 48th IEEE Conference on Decision and Control.New York:IEEE, 2009:8575-8580.[15]JEAN D, JABBARI B. Bayesian gametheoretic modeling of transmit power determination in a selforganizing CDMA wireless network[C]// Proceedings of IEEE VTC Fall. New York:IEEE, 2004, 2004:3496-3500.[16]ALTMAN E, DEBBAH M, SILVA A. A game theoretic approach for routing in dense Ad Hoc networks[R]. Stochastic Networks Workshop. Edinburg, UK:SIAM Publishes, 2007.[17]FELEGYHAZI M, HUBAUX J P. Game theory in wireless networks: a tutorial, LCAREPORT2006002[R]. Laboratory for Computer Comunications and Applications, 2006. |