1. Agah, A., Das, S. K., & Basu, K. (2004). A game theory based approach for security in wireless sensor networks. In Proceedings of the IEEE international conference on performance, computing and communications (IPCCC 2004), Phoenix, Arizona, April 15–17, 2004.
2. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: a survey. Computer Networks, 38(4), 393–422.
3. Altman, E., Boulogne, T., Azouzi, R. E., Jimenez, T., & Wynter, L. (2006). A survey on networking games in telecommunications. Computers and Operations Research, 33(2), 286–311.
4. Altman, E., Kherani, A. A., Michiardi, P., & Molva, R. (2005). Non-cooperative forwarding in ad-hoc networks. In Lecture notes on computer science (Vol. 3462/2005, pp. 486–498). Berlin: Springer.
5. Chatterjee, M., Das, S. K., & Turgut, D. (2002). WCA: a weighted clustering algorithm for mobile ad hoc networks. Cluster Computing, 5(2), 193–204.