Research Article

Security-Based Mechanism for Proactive Routing Schema Using Game Theory Model

Table 9

Cooperation rate of node in relation to nodes and .

ā€‰ Node Node

Node : iteration 1+1 (ACK is received)+1 (ACK is received)
Node : iteration 2+2 (ACK is received)+2 (ACK is received)
Node : iteration 3+3 (ACK is received) (ACK is not received)
Node : iteration 4+4 (ACK is received) (ACK is not received)
Node : iteration 5+5 (ACK is received) (ACK is not received)