S. C. Peng, G. J. Wang, Z. W. Hu, and J. P. Chen, Survivability modeling and analysis on 3D mobile ad-hoc networks, Journal of Central South University of Technology, vol.18, issue.4, pp.1144-1152, 2011.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking, pp.255-265, 2000.

L. Buttyan and J. P. Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, Mobile Networks and Applications, vol.8, issue.5, pp.579-592, 2003.

C. Zong and S. Yang, Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks, Twenty-Second Annual Joint Conf. IEEE Computer and Communications (INFOCOM), pp.1987-1997, 2003.

S. Bansal and M. Baker, Observation-based cooperation enforcement in ad hoc networks, 2003.

H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, Smart: A secure multilayer creditbased incentive scheme for delay-tolerant networks, Journal of IEEE Transactions on Vehicular Technology, vol.58, issue.8, pp.4628-4639, 2009.

M. M. Mahmoud and . Shen, X: FESCIM: fair, efficient, and secure cooperation incentive mechanism for multihop cellular networks, Journal of IEEE Transactions on Mobile Computing, vol.11, issue.5, pp.753-766, 2012.

S. Buchegger and J. Y. Le-boudec, Performance analysis of the CONFIDANT protocol, Proc. The 3rd ACM Int. symposium on Mobile ad hoc networking and computing, pp.226-236, 2002.

P. Michiardi and R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Advanced Communications and Multimedia Security, pp.107-121, 2002.

Q. He, D. Wu, and P. Khosla, SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks, Wireless Communications and Networking, pp.825-830, 2004.

P. W. Yau and C. J. Mitchell, Reputation methods for routing security for mobile ad hoc networks, Proc. Mobile Future and Symposium on Trends in Communications, pp.130-137, 2003.

K. Balakrishnan, J. Deng, and P. K. Varshney, TWOACK: preventing selfishness in mobile ad hoc networks, Wireless Communications and Networking, pp.2137-2142, 2005.

E. M. Shakshuki, N. Kang, and T. R. Sheltami, EAACK-A Secure IntrusionDetection System for MANETs, IEEE Transactions on Industrial Electronics, vol.60, issue.3, pp.1089-1098, 2013.

G. A. Shafer, Mathematical Theory of Evidence, 1976.

T. Sudkamp, The consistency of Dempster-Shafer updating, International Journal of Approximate Reasoning, vol.7, issue.1, pp.19-44, 1992.

T. M. Chen and V. Venkataramanan, Dempster-Shafer theory for intrusion detection in ad hoc networks, IEEE Internet Computer, vol.9, issue.6, pp.35-41, 2005.

D. B. Johnson and D. A. Maltz, Dynamic source routing in ad hoc wireless networks. Mobile computing, pp.153-181, 1996.

K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, An acknowledgmentbased approach for the detection of routing misbehavior in MANETs, IEEE Transactions on Mobile Computing, vol.6, issue.5, pp.536-550, 2007.

T. Sheltami, A. Al-roubaiey, E. Shakshuki, and A. Mahmoud, Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimedia systems, vol.15, pp.273-282, 2009.

H. M. Sun, C. H. Chen, and Y. F. Ku, A novel acknowledgment-based approach against collude attacks in MANET, Expert Systems with Applications, vol.39, issue.9, pp.7968-7975, 2012.

S. Djahel, F. Natabdesselam, Z. Zhang, and A. Khokhar, Defending against packet dropping attack in vehicular ad hoc networks, Security and Communication Networks, vol.1, issue.3, pp.245-258, 2008.

F. Campos and S. Cavalcante, An extended approach for Dempster-Shafer theory. Information Reuse and Integration, pp.338-344, 2003.

I. Bloch, Some aspects of Dempster-Shafer evidence theory for classification of multi-modality medical images considering partial volume effect, Pattern Recognition Letters, vol.17, issue.8, pp.905-919, 1996.

M. Bounouni and L. Bouallouche-medjkoune, A Hybrid Stimulation Approach for Coping Against the Malevolence and Selfishness in Mobile Ad hoc Network, Wireless Personal Communications, vol.88, issue.2, pp.255-281, 2016.