S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misebehaviour in mobile ad-hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking (MobiCom), 2000.

A. Rachedi and A. Benslimane, Toward a cross-layer monitoring process for mobile ad hoc networks, Security and Communication Networks, pp.351-368, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00619749

A. Rachedi and A. Benslimane, Cross-layer approach to improve the monitoring process for mobile ad hoc networks based on ieee 802, IEEE Global Telecommunications Conference (GLOBECOM), 2007.
URL : https://hal.archives-ouvertes.fr/hal-00680886

P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, pp.107-121, 2002.
DOI : 10.1007/978-0-387-35612-9_9

J. Tang and Y. Cheng, Selfish misbehavior detection in 802.11 based wireless networks: An adaptive approach based on Markov decision process, 2013 Proceedings IEEE INFOCOM, 2013.
DOI : 10.1109/INFCOM.2013.6566929

A. Rachedi and H. Badis, MIMODog: How to solve the problem of selfish misbehavior detection mechanism in MANETs using MIMO technology, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC), 2012.
DOI : 10.1109/IWCMC.2012.6314226

URL : https://hal.archives-ouvertes.fr/hal-00687192

J. S. Park, N. Alok, M. Gerla, and H. Lee, Space-mac: Enabling spatial reuse using mimo channel-aware mac, Proceedings of International Conference Communications (ICC), 2005.

M. Raya, I. Aad, J. Hubaux, and A. E. , DOMINO, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, pp.1691-1705, 2006.
DOI : 10.1145/990064.990077

S. Buchegger and J. L. Boudec, Performance analysis of the cofidant protocol, Proceedings of 3rd ACM international Symposium on Mobile ad hoc networking & computing ad hoc networks, pp.226-236, 2002.

T. Chen, A. Bansal, and S. Zhong, A reputation system for wireless mesh networks using network coding, Journal of Network and Computer Applications, vol.34, issue.2, pp.535-541, 2011.
DOI : 10.1016/j.jnca.2010.12.016

R. Braga, I. Chaves, C. De-oliveira, R. Andrade, J. De-souza et al., RETENTION: A reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments, Journal of Network and Computer Applications, vol.36, issue.1, pp.274-283, 2013.
DOI : 10.1016/j.jnca.2012.06.002

URL : https://hal.archives-ouvertes.fr/hal-00865305

L. Chen, L. Libman, and J. Leneutre, Conflicts and Incentives in Wireless Cooperative Relaying: A Distributed Market Pricing Framework, IEEE Transactions on Parallel and Distributed Systems, pp.758-772, 2011.
DOI : 10.1109/TPDS.2010.152

A. Rachedi, H. Otrok, N. Muhamed, A. Benslimane, and M. Debbabi, A Secure Mechanism Design-Based and Game Theoretical Model for MANETs, Mobile Networks and Applications, vol.22, issue.4, pp.191-204, 2010.
DOI : 10.1007/s11036-009-0164-7

URL : https://hal.archives-ouvertes.fr/hal-00619750

L. Buttyan and J. P. Hubeaux, Enforcing service availability in mobile ad-hoc WANs, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444), pp.87-96, 2000.
DOI : 10.1109/MOBHOC.2000.869216

Z. Li and H. Shen, Analysis of a Hybrid Reputation Management System for Mobile Ad hoc Networks, 2009 Proceedings of 18th International Conference on Computer Communications and Networks, 2009.
DOI : 10.1109/ICCCN.2009.5235332

H. Badis, An efficient bandwidth guaranteed routing for ad hoc networks using ieee 802.11 with interference consideration, Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems , MSWiM '07, 2007.
DOI : 10.1145/1298126.1298171

L. Lovasz, A characterization of perfect graphs, Journal of Combinatorial Theory, Series B, vol.13, issue.2, pp.95-98, 1972.
DOI : 10.1016/0095-8956(72)90045-7

Z. Jia, R. Gupta, J. Walerand, and P. Varaiya, Bandwidth Guaranteed routing for Ad hoc Networks with Interference Consideration, IEEE Symposium on Computers and Communication (ISCC), 2014.

P. Gupta and P. Kumar, The capacity of wireless networks, IEEE Transactions in Information Theory, pp.388-404, 2000.
DOI : 10.1109/18.825799

K. Y. Jiang, H. S. , and S. Bradley, On the Asymptotic Capacity of Multi-Hop MIMO Ad Hoc Networks, IEEE Transactions in Wireless Communications, pp.1032-1037, 2011.
DOI : 10.1109/TWC.2011.020111.100528