R. Axelrod, The evolution of cooperation. Basic Books, 1984.

S. Buchegger and J. Boudec, Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '02, 2002.
DOI : 10.1145/513800.513828

L. Buttyan and J. P. Hubaux, Enforcing service availability in mobile ad-hoc WANs, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444), 2000.
DOI : 10.1109/MOBHOC.2000.869216

L. Buttyan and J. P. Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, special issue on Mobile Ad Hoc Networking, 2002.

R. Dawkins, The selfish gene, 1976.

S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00, pp.255-265, 2000.
DOI : 10.1145/345910.345955

P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks
DOI : 10.1007/978-0-387-35612-9_9

P. Michiardi and R. Molva, Game theoretic analysis of security in mobile ad hoc networks, 2002.

M. J. Osborne and A. Rubinstein, A Course in Game Theory, 1994.

V. Srinivasan, P. Nuggehalli, C. Chiasserini, and R. R. Rao, Cooperation in wireless ad hoc networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003.
DOI : 10.1109/INFCOM.2003.1208918