Skip to main content

Table 3 Utility matrix of attacker and source on relay R i at stage t k after Harsanyi transformation

From: Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks

 

Attack,

Not attack,

 

Not attack*

Not attack*

Select

- μ i t k ( 1 - 2 a + C m ) A i - ( 1 - μ i t k ) × ( b C f + C m ) A i , μ i t k ( 1 - 2 a - C a ) A i

-(b C f  + C m ) A i ,0

Not select

- μ i t k A i , μ i t k (1- C a ) A i

0,0