![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Trust-Based Routing Protocol for Ad Hoc Networks
Ad hoc networks are particularly vulnerable as compare to traditional networks mainly due to their lack of infrastructure. A malicious node can easily disrupt both the routing discovery phase and the data forw...
-
Chapter and Conference Paper
A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11
In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablet...
-
Chapter and Conference Paper
A New Model for Cooperative Cognitive Radio Network Using Coalitional Game
In this paper we study the resources access problem in cognitive radio networks, especially we are interested in the large number of secondary users (SUs) present in the system. We propose a model based on cha...