Research Article
Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model
Table 7
Cooperation rate of node
in relation to nodes
and
.
| ā | Node | Node |
| Node : iteration 1 | +1 (ACK is received) | +1 (ACK is received) | Node : iteration 2 | +2 (ACK is received) | +2 (ACK is received) | Node : iteration 3 | +3 (ACK is received) | (ACK is not received) | Node : iteration 4 | +4 (ACK is received) | (ACK is not received) | Node : iteration 5 | +5 (ACK is received) | (ACK is not received) |
|
|