Skip to main content

Table 1 Utility matrix of attacker and source on relay R i with probability μ i t k malicious at stage t k

From: Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks

 

Attack

Not attack

Select

-(1 - 2a - C a )A i ,(1 - 2a - C a )A i

-(b C f  + C m )A i ,0

Not select

-A i ,(1 - C a )A i

0,0