[1] K. Patel and J. M. Rathod, “Effective Utilization of Bandwidth for Mobile Ad Hoc Network,” <em>Indian J. Sci. Technol.</em>, vol. 9, no. 27, 2016. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.17485/ijst/2016/v9i27/92429" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.17485/ijst/2016/v9i27/92429</a>">https://doi.org/10.17485/ijst/2016/v9i27/92429</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.17485/ijst/2016/v9i27/92429" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.17485/ijst/2016/v9i27/92429</a></dgdoi:pub-id>
[2] S. Stieglitz and C. Fuchß, “Challenges of MANET for mobile social networks,” <em>Procedia Comput. Sci.</em>, vol. 5, pp. 820–825, 2011. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.procs.2011.07.112" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.procs.2011.07.112</a>">https://doi.org/10.1016/j.procs.2011.07.112</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.procs.2011.07.112" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.procs.2011.07.112</a></dgdoi:pub-id>
[3] N. Raza, M. U. Aftab, M. Qasim Akbar, O. Ashraf, and M. Irfan, “Mobile Ad-Hoc Networks Applications and Its Challenges,” <em>Commun. Netw.</em>, vol. 8, no. 8, pp. 131–136, 2016. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.4236/cn.2016.83013" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.4236/cn.2016.83013</a>">https://doi.org/10.4236/cn.2016.83013</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.4236/cn.2016.83013" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.4236/cn.2016.83013</a></dgdoi:pub-id>
[4] D. Helen and D. Arivazhagan, “Applications, Advantages, and Challenges of Ad Hoc Networks,” <em>J. Acad. Ind. Res.</em>, vol. 2, no. 8, pp. 453–457, 2014.
[6] C. Chakrabarti, A. Banerjee and S. Roy, “An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network,” in <em>2014 Applications and Innovations in Mobile Computing (AIMoC)</em>, 2014, pp. 151–156. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/AIMOC.2014.6785534" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/AIMOC.2014.6785534</a>">https://doi.org/10.1109/AIMOC.2014.6785534</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/AIMOC.2014.6785534" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/AIMOC.2014.6785534</a></dgdoi:pub-id>
[8] D. Das, K. Majumder, and A. Dasgupta, “Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory,” <em>Procedia Comput. Sci.</em>, vol. 54, pp. 92–101, 2015. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.procs.2015.06.011" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.procs.2015.06.011</a>">https://doi.org/10.1016/j.procs.2015.06.011</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.procs.2015.06.011" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.procs.2015.06.011</a></dgdoi:pub-id>
[9] R. I. Ciobanu, C. Dobre, M. Dascǎlu, Ş. Trǎuşan-Matu, and V. Cristea, “SENSE: A collaborative selfish node detection and incentive mechanism for opportunistic networks,” <em>J. Netw. Comput. Appl.</em>, vol. 41, no. 1, pp. 240–249, 2014. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.jnca.2014.01.009" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.jnca.2014.01.009</a>">https://doi.org/10.1016/j.jnca.2014.01.009</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.jnca.2014.01.009" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.jnca.2014.01.009</a></dgdoi:pub-id>
[11] S. Bama B, and Indira K., “Detection of Selfish and Malicious Node in Mobile Ad-Hoc Network with NS-2 Using Chord Algorithm,” <em>Int. J. Eng. Technol.</em>, vol. 9, no. 2, pp. 466–471, 2017. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.21817/ijet/2017/v9i2/170902326" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.21817/ijet/2017/v9i2/170902326</a>">https://doi.org/10.21817/ijet/2017/v9i2/170902326</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.21817/ijet/2017/v9i2/170902326" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.21817/ijet/2017/v9i2/170902326</a></dgdoi:pub-id>
[12] S. Mittal, and S. Dahiya, “Identification Technique for All Passive Selfish Node Attacks In a Mobile Network,” 2015. [Online]. Available: <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.ijarcsms.com/docs/paper/volume3/issue4/V3I4-0011.pdf">http://www.ijarcsms.com/docs/paper/volume3/issue4/V3I4-0011.pdf</ext-link> [Accessed: December 13, 2018].
[14] P. P. Patel and R. H. Jhaveri, “Various schemes to detect selfishness in wireless ad-hoc networks: A survey,” <em>Proc. 2015 Int. Conf. Green Comput. Internet Things, ICGCIoT 2015</em>, pp. 881–886, 2016. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/icgciot.2015.7380587" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/icgciot.2015.7380587</a>">https://doi.org/10.1109/icgciot.2015.7380587</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/ICGCIoT.2015.7380587" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ICGCIoT.2015.7380587</a></dgdoi:pub-id>
[15] S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” in <em>IEEE INFOCOM 2003, Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies,</em> pp. 1987–1997, 2003. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/INFCOM.2003.1209220" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/INFCOM.2003.1209220</a>">https://doi.org/10.1109/INFCOM.2003.1209220</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/INFCOM.2003.1209220" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/INFCOM.2003.1209220</a></dgdoi:pub-id>
[17] F. Wang, F. Wang, B. Huang, and L. T. Yang, “COSR: A reputation-based secure route protocol in MANET,” <em>Eurasip J. Wirel. Commun. Netw.</em>, vol. 2010:258935, July 2010. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1155/2010/258935" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1155/2010/258935</a>">https://doi.org/10.1155/2010/258935</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1155/2010/258935" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1155/2010/258935</a></dgdoi:pub-id>
[18] N. Samian, Z. A. Zukarnain, W. K. G. Seah, A. Abdullah, and Z. M. Hanapi, “Cooperation stimulation mechanisms for wireless multihop networks: A survey,” <em>Int. J. Adv. Res. Comp. Sc. Soft. Eng.,</em> vol. 5, no. 8, pp. 306–106, 2015. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.jnca.2015.04.012" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.jnca.2015.04.012</a>">https://doi.org/10.1016/j.jnca.2015.04.012</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.jnca.2015.04.012" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.jnca.2015.04.012</a></dgdoi:pub-id>
[19] S. S. Shinde, B. D. Phulpagar, “A Comparative Study of Selfish Node Detection Methods in Manet,” <em>Int. J. Adv. Res. Comput. Sci. Softw. Eng.</em>, vol. 5, no. 8, pp. 306–310, 2015.
[20] Z. Li and H. Shen, “Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks,” <em>IEEE Trans. Mob. Comput.</em>, vol. 11, no. 8, pp. 1287–1303, 2012. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/TMC.2011.151" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/TMC.2011.151</a>">https://doi.org/10.1109/TMC.2011.151</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/TMC.2011.151" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/TMC.2011.151</a></dgdoi:pub-id>
[22] M. Touati, R. El-Azouzi, M. Coupechoux, E. Altman, and J. M. Kelif, “A Controlled Matching Game for WLANs,” <em>IEEE J. Sel. Areas Commun.</em>, vol. 35, no. 3, pp. 707–720, 2017. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/JSAC.2017.2672258" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/JSAC.2017.2672258</a>">https://doi.org/10.1109/JSAC.2017.2672258</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/JSAC.2017.2672258" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/JSAC.2017.2672258</a></dgdoi:pub-id>
[23] Z. Ullah, M. S. Khan, I. Ahmed, N. Javaid, and M. I. Khan, “Fuzzy-based trust model for detection of selfish nodes in MANETs,” <em>Proc. IEEE 30th Int. Conf. Adv. Inf. Netw. Appl. AINA</em>, pp. 965–972, 2016. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/AINA.2016.142" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/AINA.2016.142</a>">https://doi.org/10.1109/AINA.2016.142</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/AINA.2016.142" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/AINA.2016.142</a></dgdoi:pub-id>
[25] K. Komathy and P. Narayanasamy, “A Probabilistic Behavioral Model for Selfish Neighbors in a Wireless Ad Hoc Network,” <em>IJCSNS International Journal of Computer Science and Network Security</em>, vol. 7, no. 7, July 2007.
[26] A. Azni, R. Ahmad, Z. Noh, and A. Basari, “Correlated Node Behavior Model based on Semi Markov Process for MANETS,” <em>J. Comput. Sci. Issues</em>, vol. 9, no. 1, pp. 50–59, 2012.
[27] A. H. Azni, A. Rabiah, and M. N. Zul Azri, “Epidemic Modeling for Correlated Node Behavior in Ad Hoc Networks Center for Advanced Computing Technology,” vol. 2, no. 1, pp. 22–30, 2013.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.20533/ijcc.2046.3359.2013.0003" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.20533/ijcc.2046.3359.2013.0003</a></dgdoi:pub-id>
[28] O. A. Wahab, H. Otrok, and A. Mourad, “A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles,” <em>Comput. Commun.</em>, vol. 41, pp. 43–54, 2014. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.comcom.2013.12.005" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.comcom.2013.12.005</a>">https://doi.org/10.1016/j.comcom.2013.12.005</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.comcom.2013.12.005" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.comcom.2013.12.005</a></dgdoi:pub-id>
[29] A. Jesudoss, S. V. Kasmir Raja, and A. Sulaiman, “Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme,” <em>Ad Hoc Networks</em>, vol. 24, Part A, pp. 250–253, 2015. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1016/j.adhoc.2014.08.018" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1016/j.adhoc.2014.08.018</a>">https://doi.org/10.1016/j.adhoc.2014.08.018</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1016/j.adhoc.2014.08.018" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.adhoc.2014.08.018</a></dgdoi:pub-id>
[30] T. Hayajneh, G. Almashaqbeh, and S. Ullah, “A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless Networks,” <em>Mob. Networks Appl.</em>, vol. 20, no. 5, pp. 623–635, 2015. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1007/s11036-015-0605-4" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1007/s11036-015-0605-4</a>">https://doi.org/10.1007/s11036-015-0605-4</ext-link> D. Djenouri, N. Ouali, and A. Mahmoudi, “Random Two-hop ACK to Detect Uncooperative Nodes in MANETs,” <em>Security</em>, vol. 2, no. 7, pp. 165–175, 2017.<dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1007/s11036-015-0605-4" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/s11036-015-0605-4</a></dgdoi:pub-id>
[33] K. Chaker, A.Lakas, and N. Lagraa. “Detection of intelligent malicious and selfish nodes in VANET using threshold adaptive control,” <em>2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA)</em>, 2016. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/icedsa.2016.7818492" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/icedsa.2016.7818492</a>">https://doi.org/10.1109/icedsa.2016.7818492</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/ICEDSA.2016.7818492" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ICEDSA.2016.7818492</a></dgdoi:pub-id>
[34] C. Nimje, and P. Junghare, “A review on node activity detection, selfish & malicious behavioral patterns using watchdog algorithm,” <em>2017 International Conference Inventive Systems and Control (ICISC),</em> 2017. <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="<a href="https://doi.org/10.1109/icisc.2017.8068663" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">https://doi.org/10.1109/icisc.2017.8068663</a>">https://doi.org/10.1109/icisc.2017.8068663</ext-link><dgdoi:pub-id xmlns:dgdoi="http://degruyter.com/resources/doi-from-crossref" pub-id-type="doi"><a href="https://doi.org/10.1109/ICISC.2017.8068663" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ICISC.2017.8068663</a></dgdoi:pub-id>