T. [. Alpcan and . Basar, A game theoretic approach to decision and analysis in network intrusion detection, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475), pp.2595-2600, 2003.
DOI : 10.1109/CDC.2003.1273013

T. [. Alpcan and . Basar, A game theoretic analysis of intrusion detection in access control systems, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601), pp.1568-1573, 2004.
DOI : 10.1109/CDC.2004.1430267

T. [. Alpcan, S. Basar, and . Dey, A power control game based on outage probabilities for multicell wireless data networks, IEEE Transactions on Wireless Communications, vol.5, issue.4, pp.890-899, 2006.
DOI : 10.1109/TWC.2006.1618938

E. [. Accinelli and . Carrera, Contraction of best response functions and uniqueness of nash-cournot equilibrium

S. [. Agah, K. Das, M. Basu, and . Asadi, Intrusion detection in sensor networks: a non-cooperative game approach, Proc. 3rd IEEE International Symposium on Network Computing and Applications, pp.343-346, 2004.

R. [. Altman, T. El-azouzi, and . Jimenez, Slotted aloha as a stochastic game with partial information, Proc. 1st International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 03), 2003.
URL : https://hal.archives-ouvertes.fr/inria-00466286

J. [. Buttyán and . Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, Mobile Networks and Applications, vol.8, issue.5, pp.579-592, 2003.
DOI : 10.1023/A:1025146013151

L. Buttyan and J. Hubaux, Security and Cooperation in Wireless Networks, 2007.
DOI : 10.1017/CBO9780511815102

]. R. Bha97 and . Bhandari, Optimal physical diversity algorithms and survivable networks, Proc. 2nd IEEE Symposium on Computers and Communications, pp.433-441, 1997.

]. S. Bho-+-02, J. P. Bohacek, K. Hespanha, J. Obraczka, C. Lee et al., Enhancing security via stochastic routing, Proc. 11th International Conference on Computer Communications and Networks (ICCCN 02), pp.58-62, 2002.

]. G. Bia00 and . Bianchi, Performance analysis of the ieee 802

D. [. Brumbaugh-smith and . Shier, Minimax Models for Diverse Routing, INFORMS Journal on Computing, vol.14, issue.1, pp.81-95, 2002.
DOI : 10.1287/ijoc.14.1.81.7707

J. [. Bertsekas and . Tsitsiklis, Parallel and Distributed Compuation: Numerical Methods, Athena Scientific, 1997.

S. [. Cagalj, J. Capkun, and . Hubaux, Wormhole-Based Antijamming Techniques in Sensor Networks, IEEE Transactions on Mobile Computing, vol.6, issue.1, pp.100-114, 2007.
DOI : 10.1109/TMC.2007.250674

M. Cagalj, S. Ganeriwal, I. Aad, and J. Hubaux, On selfish behavior in CSMA/CA networks, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.2513-2524, 2005.
DOI : 10.1109/INFCOM.2005.1498536

]. L. Cl07a, J. Chen, and . Leneutre, A game theoretic framework of distributed power and rate control in ieee 802.11 wlans, Proc. 15th IEEE International Conference on Network Protocols (ICNP 07), pp.338-339, 2007.

]. L. Cl07b, J. Chen, and . Leneutre, On the power and rate control in ieee 802.11 wlans -a game theoretical approach, Proc. 16th International Conference on Computer Communications and Networks (ICCCN 07), pp.450-456, 2007.

]. L. Cl07c, J. Chen, and . Leneutre, Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks, Proc. ICDCS 2007, pp.16-23, 2007.

]. L. Cl07d, J. Chen, and . Leneutre, Toward secure and scalable time synchronization in ad hoc networks, Computer Communication, vol.30, pp.11-122453, 2007.

J. [. Chen and . Leneutre, A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs, IEEE Journal on Selected Areas in Communications, vol.26, issue.7, pp.1128-1137, 2008.
DOI : 10.1109/JSAC.2008.080910

E. [. Kumar, A. Altman, R. Kumar, and . Venkatesh, Cooperative and non-cooperative control in ieee 802.11 wlans, Proc. 19th International Teletraffic Congress (ITC-19), 2005.
URL : https://hal.archives-ouvertes.fr/inria-00077211

L. [. Elson, D. Girod, and . Estrin, Fine-grained network time synchronization using reference broadcasts, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.147-163, 2002.
DOI : 10.1145/844128.844143

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.7382

J. [. Felegyhazi and . Hubaux, Game theory in wireless networks: A tutorial, 2006.

J. [. Felegyhazi, L. Hubaux, and . Buttyan, Nash equilibria of packet forwarding strategies in wireless ad hoc networks, IEEE Transactions on Mobile Computing, vol.5, issue.5, pp.463-476, 2006.
DOI : 10.1109/TMC.2006.68

R. [. Ganeriwal, M. B. Kumar, and . Srivastava, Timing-sync protocol for sensor networks, Proceedings of the first international conference on Embedded networked sensor systems , SenSys '03, pp.138-149, 2003.
DOI : 10.1145/958491.958508

]. S. Gvhs05, S. Ganeriwal, C. Capkun, M. B. Han, and . Srivastava, Secure time synchronization service for sensor networks, Proc. 4th ACM workshop on Wireless security (Wise 05), pp.97-106, 2005.

C. [. Hayajneh and . Abdallah, Distributed Joint Rate and Power Control Game-Theoretic Algorithms for Wireless Data, IEEE Communications Letters, vol.8, issue.8, pp.511-513, 2004.
DOI : 10.1109/LCOMM.2004.833817

S. [. Hespanha and . Bohacek, Preliminary results in routing games, Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148), pp.1904-1909, 2001.
DOI : 10.1109/ACC.2001.946017

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.111

W. [. Huang, W. Fan, P. S. Lee, and . Yu, Cross-feature analysis for detecting ad-hoc routing anomalies, Proc. IEEE ICDCS 2003, pp.478-487, 2003.

A. [. Hunter and . Nosratinia, Diversity through coded cooperation, IEEE Transactions on Wireless Communications, vol.5, issue.2, pp.283-289, 2006.
DOI : 10.1109/TWC.2006.1611050

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.419.2315

A. [. Hu, D. B. Perrig, and . Johnson, Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.12-23, 2002.
DOI : 10.1145/570645.570648

M. Heusse, F. Rousseau, R. Guillier, and A. Duda, Idle sense, ACM SIGCOMM Computer Communication Review, vol.35, issue.4, pp.121-132, 2005.
DOI : 10.1145/1090191.1080107

URL : https://hal.archives-ouvertes.fr/hal-01199108

N. [. Holland, P. Vaidya, and . Bahl, A rate-adaptive MAC protocol for multi-Hop wireless networks, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.236-251, 2001.
DOI : 10.1145/381677.381700

]. M. Jak02 and . Jakobsson, Fractal hash sequence representation and traversal, Proc. IEEE International Symposium on Information Theory, 2002.

M. Janani, A. Hedayat, T. E. Hunter, and A. Nosratinia, Coded Cooperation in Wireless Communications: Space-Time Transmission and Iterative Decoding, IEEE Transactions on Signal Processing, vol.52, issue.2, pp.362-371, 2004.
DOI : 10.1109/TSP.2003.821100

[. Jin and G. Kesidis, Equilibria of a noncooperative game for heterogeneous users of an aloha network, IEEE Communications Letters, vol.6, issue.7, pp.282-284, 2002.

R. [. Jaramillo and . Srikant, DARWIN, Proceedings of the 13th annual ACM international conference on Mobile computing and networking , MobiCom '07, 2007.
DOI : 10.1145/1287853.1287865

A. Kumar, E. Altman, D. Miorandi, and M. Goyal, New insights from a fixed point analysis of single cell ieee 802.11 wlans, Proc. IEEE INFOCOM 2005, pp.1550-1561, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00070776

T. [. Kodialam and . Lakshman, Detecting network intrusions via sampling: a game theoretic approach, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1880-1889, 2003.
DOI : 10.1109/INFCOM.2003.1209210

A. [. Khanna, C. N. Masood, and . Rotaru, Synchronization attacks against 802.11, Workshop of the 12th Networks and Distributed Systems Symposium (NDSS 05), 2005.

A. [. Kelly, D. K. Maulloo, and . Tan, Rate control for communication networks: shadow prices, proportional fairness and stability, Journal of the Operational Research Society, vol.49, issue.3, pp.237-252, 1998.
DOI : 10.1057/palgrave.jors.2600523

M. Kefayati, H. R. Rabiee, S. G. Miremadi, and A. Khonsari, Misbehavior resilient multi-path data transmission in mobile ad-hoc networks, Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks , SASN '06, pp.91-100, 2006.
DOI : 10.1145/1180345.1180357

N. [. Kyasanur and . Vaidya, Detection and handling of MAC layer misbehavior in wireless networks, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., pp.173-182, 2003.
DOI : 10.1109/DSN.2003.1209928

Y. Liu, C. Comaniciu, and H. Man, Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection, International Journal of Security and Networks, vol.1, issue.3/4, 2006.
DOI : 10.1504/IJSN.2006.011784

]. L. Lib and . Libman, Noncooperative Failure Recovery in Large-Scale Networks

I. [. Li, R. Koutsopoulos, and . Poovendran, Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.1307-1315, 2007.
DOI : 10.1109/INFCOM.2007.155

W. [. Lou, Y. Liu, and . Fang, Spread: enhancing data confidentiality in mobile ad hoc networks, Proc. IEEE INFOCOM 2004, pp.2404-2413, 2004.

K. [. Lai and H. Liu, The three-node wireless network: Achievable rates and cooperation strategies, IEEE Transactions on Information Theory, vol.52, issue.3, pp.805-828, 2006.

V. [. Lee, D. Misra, and . Rubenstein, Distributed algorithms for secure multipath routing, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.1952-1963, 2005.
DOI : 10.1109/INFCOM.2005.1498473

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.7869

G. [. Lin and . Noubir, On link layer denial of service in data wireless LANs, Wireless Communications and Mobile Computing, vol.47, issue.3, pp.273-284, 2005.
DOI : 10.1002/wcm.221

S. [. Lee, K. W. Stolfo, and . Mok, Adaptive intrusion detection: A data mining approach, Artificial Intelligence Review, vol.14, issue.6, pp.533-567, 2000.
DOI : 10.1023/A:1006624031083

J. N. Laneman, D. N. Tse, and G. W. , Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior, IEEE Transactions on Information Theory, vol.50, issue.12, pp.3062-3080, 2004.
DOI : 10.1109/TIT.2004.838089

G. [. Laneman, Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks, IEEE Transactions on Information Theory, issue.10, pp.492415-2425, 2003.

D. [. Lai and . Zhou, Efficient,and scalable ieee 802.11 ad-hoc-mode timing synchronization function, Proc. 17th International Conference on Advanced Information Networking and Applications (AINA 03), pp.318-323, 2003.

J. K. Mackie-mason and H. R. Varian, Pricing the Internet Network intrusion and fault detection: a statistical anomaly approach, Public Access to the Internet, pp.4076-82, 1994.

Y. [. Marbach and . Qiu, Cooperation in wireless ad hoc networks: a market-based approach, IEEE/ACM Transactions on Networking, vol.13, issue.6, pp.1325-1338, 2005.
DOI : 10.1109/TNET.2005.860109

R. [. Mallik, G. P. Scholtz, and . Papavassilopoulos, Analysis of an on-off jamming situation as a dynamic game, IEEE Transactions on Communications, vol.48, issue.8, pp.1360-1373, 2000.
DOI : 10.1109/26.864173

M. Meneganti, F. S. Saviello, and R. Tagliaferri, Fuzzy neural networks for classification and detection of anomalies, IEEE Transactions on Neural Networks, vol.9, issue.5, pp.848-861, 1998.
DOI : 10.1109/72.712157

M. [. Mayeda, . Van, and . Valkenburg, Properties of Lossy Communication Nets, IEEE Transactions on Circuit Theory, vol.12, issue.3, pp.334-338, 1965.
DOI : 10.1109/TCT.1965.1082444

S. [. Mackenzie and . Wicker, Stability of multipacket slotted Aloha with selfish users and perfect information, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1583-1590, 2003.
DOI : 10.1109/INFCOM.2003.1209181

]. R. Mye91 and . Myerson, Game Theory: Analysis of Conflict, 1991.

T. [. Nosratinia, A. Hunter, and . Hedayat, Cooperative communication in wireless networks, IEEE Communications Magazine, vol.42, issue.10, pp.74-80, 2004.
DOI : 10.1109/MCOM.2004.1341264

A. [. Osborne and . Rubinstein, A Course in Game Theory, 1994.

]. C. Pap01 and . Papadimitriou, Algorithms, games and the Internet, Proc. ACM Symposium on the Theory of Computing (STOC), 2001.

Z. [. Papadimitratos and . Haas, Secure data communication in mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.343-356, 2006.
DOI : 10.1109/JSAC.2005.861392

Z. [. Papadimitratos, E. G. Haas, and . Sirer, Path set selection in mobile ad hoc networks, Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '02, pp.1-11, 2002.
DOI : 10.1145/513800.513802

J. [. Patcha and . Park, A game theoretic formulation for intrusion detection in mobile ad hoc networks, International Journal of Network Security, vol.2, issue.2, pp.146-152, 2006.

]. A. Pst-+-02, R. Perrig, J. D. Szewczyk, V. Tygar, D. E. Wen et al., Spins: security protocols for sensor networks, Wireless Networks, vol.8, issue.5, pp.521-534, 2002.

S. [. Qiao, A. Choi, K. G. Jain, and . Shin, MiSer, Proceedings of the 9th annual international conference on Mobile computing and networking , MobiCom '03, pp.161-175, 2003.
DOI : 10.1145/938985.939003

A. [. Rachedi and . Benslimane, A Secure Architecture for Mobile Ad Hoc Networks
DOI : 10.1007/11943952_36

URL : https://hal.archives-ouvertes.fr/hal-00680891

P. [. Römer, L. Blum, and . Meier, Time Synchronization and Calibration in Wireless Sensor Networks, Handbook of Sensor Networks: Algorithms and Architectures, 2005.
DOI : 10.1002/047174414X.ch7

T. [. Rentel and . Kunz, Network synchronization in wireless ad hoc networks, 2004.

R. [. Magnanti, J. B. Ahuja, and . Orlin, Network Flows: Theory, Algorithms, and Applications, 1993.

]. J. [-ros65 and . Rosen, Existence and uniqueness of equilibrium points for concave n-person games, Econometrica, vol.33, issue.3, pp.520-534, 1965.

]. A. Rub98 and . Rubinstein, Modeling Bounded Rationality, 1998.

R. [. Stajano and . Anderson, The Resurrecting Duckling: security issues for ubiquitous computing, Computer, vol.35, issue.4, pp.22-26, 2002.
DOI : 10.1109/MC.2002.1012427

C. [. Sheu, C. Chao, and . Sun, A clock synchronization algorithm for multi-hop wireless ad hoc networks, Proc. ICDCS 2004, pp.574-581, 2004.

A. [. Sagduyu and . Ephremides, A game-theoretic analysis of denial of service attacks in wireless random access, Proc. Wiopt, pp.1-10, 2007.

E. [. Sendonaris, B. Erkip, and . Aazhang, User cooperation diversity (parts I,II)
DOI : 10.1109/tcomm.2003.818096

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.7396

]. M. Shi04 and . Shigeno, A survey of combinatorial maximum flow algorithms on a network with gains, Journal of the Operations Research Society of Japan, vol.47, issue.4, pp.244-264, 2004.

]. C. Smg02a, N. B. Saraydar, D. J. Mandayam, and . Goodman, Efficient power control via pricing in wireless data networks, IEEE Transactions on Communications, vol.50, issue.2, pp.291-303, 2002.

]. C. Smg02b, N. B. Saraydar, D. J. Mandayam, and . Goodman, Efficient power control via pricing in wireless data networks, IEEE Transactions on Communications, vol.50, issue.2, pp.291-303, 2002.

P. [. Srinivasan, C. F. Nuggehalli, R. R. Chiasserini, and . Rao, Cooperation in wireless ad hoc networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.808-817
DOI : 10.1109/INFCOM.2003.1208918

P. [. Sun, C. Ning, and . Wang, Secure and resilient clock synchronization in wireless sensor networks, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.395-408, 2006.
DOI : 10.1109/JSAC.2005.861396

S. [. Subhadrabandhu, F. Sarkar, and . Anjum, A Statistical Framework for Intrusion Detection in Ad Hoc Networks, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-13, 2006.
DOI : 10.1109/INFOCOM.2006.230

N. [. So and . Vaidya, A distributed selfstabilizing time synchronization protocol for multi-hop wireless networks, 2004.

S. [. Song, G. Zhu, and . Cao, Attack-resilient time synchronization for wireless sensor networks, Proc. IEEE International Conference on Mobile Ad hoc and Sensor Systems Conference (MASS 2005), 2005.
DOI : 10.1016/j.adhoc.2006.05.016

J. [. Tan and . Guttag, The 802.11 MAC protocol leads to inefficient equilibria, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
DOI : 10.1109/INFCOM.2005.1497873

A. Tang, J. Wang, S. H. Low, and M. Chiang, Equilibrium of Heterogeneous Congestion Control: Existence and Uniqueness, IEEE/ACM Transactions on Networking, vol.15, issue.4, pp.824-837, 2007.
DOI : 10.1109/TNET.2007.893885

]. K. Way and . Wayne, Generalized Maximum Flow Algorithms

J. Wang, L. Li, S. H. Low, and J. C. Doyle, Can shortest-path routing and TCP maximize utility, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003.
DOI : 10.1109/INFCOM.2003.1209226

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.2005

Y. Wang, M. Martonosi, and L. Peh, A new scheme on link quality prediction and its applications to metric-based routing, Proceedings of the 3rd international conference on Embedded networked sensor systems , SenSys '05, pp.288-289, 2005.
DOI : 10.1145/1098918.1098958

J. [. Wood, S. H. Stankovic, and . Son, JAM: a jammed-area mapping service for sensor networks, Proceedings. 2003 International Symposium on System-on-Chip (IEEE Cat. No.03EX748), pp.286-297, 2003.
DOI : 10.1109/REAL.2003.1253275

J. [. Wood, G. Stankovic, and . Zhou, DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp.60-69
DOI : 10.1109/SAHCN.2007.4292818

K. [. Washburn and . Wood, Two-Person Zero-Sum Games for Network Interdiction, Operations Research, vol.43, issue.2, pp.243-251, 1995.
DOI : 10.1287/opre.43.2.243

W. [. Xu, Y. Trappe, T. Zhang, and . Wood, The feasibility of launching and detecting jamming attacks in wireless networks, Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '05, pp.46-57, 2005.
DOI : 10.1145/1062689.1062697

W. Xu, T. Wood, W. Trappe, and Y. Zhang, Channel surfing and spatial retreats, Proceedings of the 2004 ACM workshop on Wireless security , WiSe '04, pp.80-89, 2004.
DOI : 10.1145/1023646.1023661

E. [. Xi and . Yeh, Pricing, Competition, and Routing for Selfish and Strategic Nodes in Multi-Hop Relay Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008.
DOI : 10.1109/INFOCOM.2008.205

]. R. Yat95 and . Yates, A framework for uplink power control in cellular radio systems, IEEE Journal on Selected Areas in Communications, vol.13, issue.7, pp.1341-1347, 1995.

S. [. Yang and . Papavassiliou, Improving network security by multipath traffic dispersion, IEEE Military Communications Conference (MILCOM 01), pp.34-38, 2001.

W. [. Zhang and . Lee, Intrusion detection in wireless ad-hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00
DOI : 10.1145/345910.345958

T. [. Zhou and . Lai, A compatible and scalable clock synchronization protocol in ieee 802.11 ad hoc networks, Proc. 34th International Conference on Parallel Processing (ICPP 05), pp.295-302, 2005.

]. S. Zlly07a, L. Zhong, Y. Li, Y. Liu, and . Yang, On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: An integrated approach using game theoretic and cryptographic techniques, Wireless Networks, vol.13, issue.6, pp.799-816, 2007.

]. S. Zlly07b, L. Zhong, Y. G. Li, R. Liu, and . Yang, On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretic and cryptographic techniques, Wireless Networks, vol.13, issue.6, pp.799-816, 2007.