1. [1] Balaji, S., Karan Nathani, and R. Santhakumar. (2019) "IoT technology, applications and challenges: a contemporary survey." Wireless personal communications : 363-388. [
DOI:10.1007/s11277-019-06407-w]
2. [2] Kumar, Sachin, Prayag Tiwari, and Mikhail Zymbler. (2019) "Internet of Things is a revolutionary approach for future technology enhancement: a review." Journal of Big Data : 111. [
DOI:10.1186/s40537-019-0268-2]
3. [3] Serpanos, Dimitrios, and Marilyn Wolf (2017)."Internet-ofthings (IoT) systems: architectures, algorithms, methodologies. Springer. [
DOI:10.1007/978-3-319-69715-4_2]
4. [4] Aleksandrovičs, Vladislavs, Eduards Filičevs, and Jānis Kampars. (2016) "Internet of things: Structure, features and management." Information Technology and Management Science: 78-84. [
DOI:10.1515/itms-2016-0015]
5. [5] Seyfollahi, Ali, Meysam Moodi, and Ali Ghaffari. "MFORPL: A secure RPL-based routing protocol utilizing mothflame optimizer for the IoT applications." Computer Standards & Interfaces 82 (2022): 103622. [
DOI:10.1016/j.csi.2022.103622]
6. [6] Khattak, Hasan Ali, et al. (2019) "Perception layer security in Internet of Things." Future Generation Computer Systems:144-164. [
DOI:10.1016/j.future.2019.04.038]
7. [7] Jafarian, Tohid, et al. "A survey and classification of the security anomaly detection mechanisms in software defined networks." Cluster Computing 24 (2021): 1235-1253.. [
DOI:10.1007/s10586-020-03184-1]
8. [8] Nobahary, Solmaz, Hossein Gharaee Garakani, and Ahmad Khademzadeh. "Detecting Noncooperation Nodes Mechanisms in Wireless Networks: A Survey." Security and Communication Networks 2022 (2022). [
DOI:10.1155/2022/6486816]
9. [9] Padiya, S. A. G. A. R., Rakesh Pandit, and Sachin Patel. (2013)"Survey of innovated techniques to detect selfish nodes in MANET." International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC): 2250-1568.
10. [10] Samian, Normalia, et al. (2015) "Cooperation stimulation mechanisms for wireless multihop networks: A survey. Journal of Network and Computer Applications: 88-106. [
DOI:10.1016/j.jnca.2015.04.012]
11. [11] O. León, J. Hernández-Serrano, and M. Soriano, (2010) "Outwitting smart selfish nodes in wireless mesh networks,"Int. J. Commun. Syst., vol. 23, no. 5, pp. 633-652. [
DOI:10.1002/dac.1102]
12. [12] S. K. Das, P. S. Chatterjee, and M. Roy, (2014) "Detecting and Punishing the Selfish Node and Its Behavior in WSN," vol. 4, no. 2, pp. 11-15. [
DOI:10.14445/22492593/IJCOT-V6P303]
13. [13] G. Rizwana and G. Wasim, (2015) "Enhanced Intrusion Detection & Prevention Mechanism for Selfishness in MANET," Int. J. Innov. Res. Comput. Commun. Eng., vol. 3,no. 10, pp. 10131-10138.
14. [14] C. Science and S. Engineering, (2015) "A Comparative Study of Selfish Node Detection Methods in Manet," Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 5, no. 8, pp. 306-310.
15. [15] Nobahary, S., & Babaie, S. (2018). A Credit-based Method to Selfish Node Detection in Mobile Ad-hoc Network. Applied Computer Systems, 118-127. [
DOI:10.2478/acss-2018-0015]
16. [16] T. S. A. Al-roubaiey, E. Shakshuki, and A. Mahmoud, (2009) "Video transmission enhancement in presence of misbehaving nodes in MANETs," pp. 273-282. [
DOI:10.1007/s00530-009-0166-0]
17. [17] E. M. Shakshuki, S. Member, N. Kang, and T. R. Sheltami, (2013) "EAACK - A Secure Intrusion-Detection System for MANETs," vol. 60, no. 3, pp. 1089-1098. [
DOI:10.1109/TIE.2012.2196010]
18. [18] M. Bounouni, (2018) "Acknowledgment-based punishment and stimulation scheme for mobile ad hoc network," J.Supercomput: 5373-5398 [
DOI:10.1007/s11227-018-2434-2]
19. [19] Basar, Tamer, and Geert Jan Olsder. (1999) "Dynamic noncooperative game theory." Vol. 23. Siam. [
DOI:10.1137/1.9781611971132]
20. [20] C. Vijayakumaran and T. A. Macriga, (2017) "An integrated game theoretical approach to detect misbehaving nodes in MANETs," Proc. 2017 2nd Int. Conf. Comput. Commun. Technol. ICCCT 2017, pp. 173-180. [
DOI:10.1109/ICCCT2.2017.7972268]
21. [21] Nobahary, Solmaz, et al. (2019) "Selfish node detection based on hierarchical game theory in IoT." EURASIP Journal on Wireless Communications and Networking: 255. [
DOI:10.1186/s13638-019-1564-4]
22. [22] I. Introduction, (2017) "A REVIEW ON NODE ACTIVITY DETECTION , SELFISH & MALICIOUS BEHAVIORALPATTERNS USING WATCHDOG," pp. 1-5.
23. [23] A. Lupia, C. A. Kerrache, and F. De Rango ( 2017) "TEEM : Trust-based Energy-Efficient Distributed Monitoring for Mobile Ad-hoc Networks," no. 1, pp. 133-135. [
DOI:10.1109/WD.2017.7918128]
24. [24] Nobahary, Solmaz, et al. (2018) "DISOT: Distributed Selfish Node Detection in Internet of Things." International Journal of Information and Communication Technology Research: 19-30.
25. [25] A. Jesudoss, S. V. Kasmir Raja, and A. Sulaiman, (2015) "Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme, Ad Hoc Networks, vol. 24, no. PA, pp. 250-253. [
DOI:10.1016/j.adhoc.2014.08.018]
26. [26] Zhang, Wei, and et al. (2018) "A novel trust management scheme based on Dempster-Shafer evidence theory for malicious nodes detection in wireless sensor networks." The Journal of Supercomputing: 1779-1801. [
DOI:10.1007/s11227-017-2150-3]
27. [27] Rani, Shalli, Syed Hassan Ahmed, and Ravi Rastogi. (2019)"Dynamic clustering approach based on wireless sensor networks genetic algorithm for IoT applications." Wireless Networks: 1-10. [
DOI:10.1007/s11276-019-02083-7]
28. [28] Geetha V, Hariprasad S A, (2020) "A Conjectural based Framework to Detect & defend/Classify Selfish Nodes and Malicious Nodes in Manet Using AODV" International Journal of Innovations in Engineering and Technology (IJIET):8-14.
29. [29] Lin, Haifeng, and Fuquan Zhang. (2020) "A scheme for stimulating message relaying cooperation." International Journal of Distributed Sensor Networks: 1-8. [
DOI:10.1177/1550147720907038]
30. [30] Susan K, Konyeha C, John-Otumu AM, Mughele ES (2020)" An Improved Token-Based Umpiring Technique for Detecting and Eliminating Selfish Nodes in Mobile Ad-hoc Networks." Egyptian Computer Science Journal: 1-12.