Skip to main content

Table 2 Utility matrix of attacker and source on relay R i with probability 1 - μ i t k  cooperative at stage t k

From: Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks

 

Not attack

Select

-(b C f  + C m )A i ,0

Not select

0,0