From: Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks
Attack,
Not attack,
Not attack*
Select
- μ i t k ( 1 - 2 a + C m ) A i - ( 1 - μ i t k ) × ( b C f + C m ) A i , μ i t k ( 1 - 2 a - C a ) A i
-(b C f  + C m ) A i ,0
Not select
- μ i t k A i , μ i t k (1- C a ) A i
0,0