[1] K. Susan, K. C., J.-O. A. M., and M. E. S., An Improved Token-Based Umpiring Technique for Detecting and Eliminating Sel sh Nodes in Mobile Ad-hoc Networks, Egypt. Comput. Sci. J., vol. 44, no. 2 (2020) 74{85.
[2] J. S. Raja. and I. J. Raja, Survey on Sel shness Handling In Mobile Ad Hoc Network, A International Journal of Emerging Technology and Advanced Engineering vol. 2, no. 11 (2012) 688{692.
[3] H. Yadav and H. K. Pati, A Survey on Sel sh Node Detection in MANET, Proceedings of International Conference on Advances in Computing, Communication Control and Networking, ICACCCN, (2018), 217|221.
[4] S. Aifa and T. Thomas, Review on Di erent Techniques Used in Sel sh Node Detection, Proceedings of the IEEE International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET), ( Kottayam, India, 2018), 1|4.
[5] S.J.H. Al-Shakarchi and R. Alubady, A Survey of Sel sh Nodes Detection in MANET: Solutions and Opportunities of Research, Proceedings of the 1st. Babylon International Conference on Information Technology and Science 2021 (BICITS 2021), (Babil, IRAQ, 2021), 178{184.
[6] J. H. Choi, K. S. Shim, S. Lee, and K. L. Wu, Handling Sel shness in Replica Allocation over a Mobile Ad Hoc Network, IEEE Transactions on Mobile Computing vol. 11, no. 2 (2012) 278{291.
[7] N. K. Gupta, A. K. Sharma, and A. Gupta, Sel sh Behaviour Prevention and Detection in Mobile Ad-Hoc Network Using Intrusion Prevention System (IPS), International Journal of Research Review in Engineering Science and Technology (IJRREST) vol. 1, no. 2 (2012) 31{34.
[8] S. Marti, T.J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking (New York, NY, United States, 2000), 255-{265.
[9] R. kaushikand J. Singhai, Detection, and Isolation of Reluctant Nodes Using Reputation Based Scheme in an Ad-hoc Network, International Journal of Computer Networks & Communications (IJCNC) vol. 3, no. 2 (2011) 95{105.
[10] M. Ponnusamy, Dr. A. Senthilkumar, Dr.R.Manikandan, Detection of Sel sh Nodes Through Reputation Model In Mobile Adhoc Network { MANET, Turkish Journal of Computer and Mathematics Education vol. 12, no. 9 (2021) 2404{2410.
[11] T. H. Lacey, R.F. Mills, B.E. Mullins, R.A. Raines, M. E. Oxley, and S.K. Rogers, RIPsece- Using Reputation-based Multilayer Security to Protect MANETs, Computers and Security vol. 31 (2012) 122{136.
[12] B.V. Sherif and P. Salini, Detection and Isolation of Sel sh nodes in Manet using Collaborative Contact-Based Watchdog with Chimp-AODV, Research Square, springer (2021)DOI:
https://doi.org/10.21203/rs.3.rs-754829/v1.
[13] L. Buttyan, J.P. Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, ACM/Kluwer Mobile Networks and Applications vol. 5, no. 8 (2003) 579|592.
[14] L. Buttyan and J.P. Hubaux, Enforcing Service Availability in Mobile Ad-Hoc WANs,Proceedings of 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444), (Boston, MA, USA, 2000), 87{96.
[15] S. Mubeen and S. Johar, Detection and Elimination of the Sel sh Node in Ad-Hoc Network Using Energy Credit Based System, J. Netw. Inf. Secure. vol. 7, no. 2 (2019) 18{22.
[16] K. Rama Abirami and M. G. Sumithra, Evaluation of Neighbor Credit Value-Based AODV Routing Algorithms for Sel sh Node Behavior Detection, Cluster Computing vol. 22 (2018) 1{10.
[17] M. Bounouni and L. Bouallouche-Medjkoune, Adaptive Credit-Based Stimulation Scheme for Dealing with Smart Sel sh Nodes in Mobile Ad Hoc Network, Proceeding of the 2018 International Symposium on Programming and Systems (ISPS), (Algiers,Algeria, 2018), 1{5.
[18] K. Balakrishnan, J. Deng, and P. K. Varshney, TWOACK: Preventing Sel shness in Mobile Ad Hoc Networks, Proceeding of the IEEE Wireless Communications and Networking Conference, WCNC, (New Orleans, LA, USA, 2005), 2137|2142.
[19] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs, IEEE Transactions on Mobile Computing vol. 6, no. 5 (2007) 536{550.
[20] H. M. Sun, Ch. H. Chen and Y. F. Ku, A Novel Acknowledgment-based Approach Against Collude Attacks in MANET, Expert Systems with Applications vol. 39 (2012) 7968{7975.
[21] S. Sayyar, A. Khan, F. Ullah, H. Anwar, and Z. Kaleem, Enhanced TWOACK Based AODV Protocol for Intrusion Detection System, Proceeding of the 2018 International Conference on Computing, Mathematics and Engineering Technologies, (Sukkur, Pakistan, 2018), 1-{4.
[22] A. Srivastsva, S.K. Gupta, M. Najim, N. Sahu, G. Aggarwal, and B.D. Mazumdar, DSSAM: digitally signed secure acknowledgment method for mobile ad hoc network, EURASIP Journal on Wireless Communications and Networkingvol. 12 (2021)
https://doi.org/10.1186/s13638-021-01894-7.
[23] D. B. Roy and R. Chaki, MADSN: Mobile Agent-Based Detection of Sel sh Node in MANET, International Journal of Wireless & Mobile Networks(IJWMN) vol. 3, no. 4 (2011) 225-235.
[24] J. H. Cho and I. R. Chen, On the Tradeo Between Altruism and Sel shnessin MANET Trust Management, Ad Hoc Networks vol. 11 (2013) 2217{2234.
[25] L. Zhao, J. Zhang, K. Yang, and H. Zhang, Using Incompletely Cooperative Game Theory in Mobile Ad Hoc Networks, Proceedings of the 2007 IEEE International Conference on Communications, (Glasgow, UK, 2007), 3401{3406.
[26] A.A. Sharah, M. Alhaj, and M. Hassan, Sel sh Dynamic Punishment Scheme: Misbehavior Detection in MANETs Using Cooperative Repeated Game, International Journal of Computer Science and Network Security (IJCSNS) vol. 20, no. 3 (2020) 168{173.
[27] D. Hales, From Sel sh Nodes to Cooperative Networks { Emergent Link-based incentives in Peer-to-Peer Networks, Proceedings of the Fourth International Conference on Peer-to-Peer Computing (P2P'04), (Zurich, Switzerland, 2004), 151{158.
[28] V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, and R.R. Rao, Cooperation in Wireless Ad Hoc Networks, Proceedings of the IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat.No.03CH37428), (San Francisco, CA, USA, 2003), 808{817.
[29] A. Gupta and A. Saxena, Detection and Prevention of Sel sh Node in MANET using Innovative Brain Mapping Function: Theoretical Model, International Journal of Computer Applications vol. 57, no. 12 (2012) 17{20.
[30] D. E. Charles, K. D. Georgilakis and A. D. Panagopoulos, ICARUS: Hybrid Incentive Mechanism for Cooperation Stimulation in Ad hoc Networks, Ad Hoc Networks vol. 10 (2012) 976{989.
[31] http://www.universalteacherpublications.com/univ/ebooks/or/Ch9/limit.htm (Avail-able at March 15, 2010).