{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:34Z","timestamp":1750306474477,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":27,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1145\/2831296.2831339","type":"proceedings-article","created":{"date-parts":[[2016,3,14]],"date-time":"2016-03-14T13:11:18Z","timestamp":1457961078000},"page":"1-6","source":"Crossref","is-referenced-by-count":13,"title":["R-CARP"],"prefix":"10.1145","author":[{"given":"Angelo","family":"Capossele","sequence":"first","affiliation":[{"name":"Dipartimento di Informatica, Sapienza Universit\u00e0 di Roma, Rome, Italy, WSENSE s.r.l., Rome, Italy"}]},{"given":"Gianluca","family":"De Cicco","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Sapienza Universit\u00e0 di Roma, Rome, Italy"}]},{"given":"Chiara","family":"Petrioli","sequence":"additional","affiliation":[{"name":"Dipartimento di Informatica, Sapienza Universit\u00e0 di Roma, Rome, Italy, WSENSE s.r.l., Rome, Italy"}]}],"member":"320","reference":[{"key":"key-10.1145\/2831296.2831339-1","doi-asserted-by":"crossref","unstructured":"J. Alves, R. Petroccia, and J. R. Potter. MPR: Multi-Point Relay Protocol for Underwater Acoustic Networks. In Proceedings of ACM WUWNet '14, pages 16:1--16:8, New York, NY, USA, 2014.","DOI":"10.1145\/2671490.2674585"},{"key":"key-10.1145\/2831296.2831339-2","unstructured":"G. Ateniese, G. Bianchi, A. T. Capossele, and C. Petrioli. Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? In Proceedings of NDSS 2013, San Diego, CA, USA, Febraury 24-27 2013."},{"key":"key-10.1145\/2831296.2831339-3","doi-asserted-by":"crossref","unstructured":"G. Ateniese, A. T. Capossele, P. Gjanci, C. Petrioli, and D. Spaccini. SecFUN: Security Framework for Underwater acoustic sensor Networks. In Proceedings of MTS\/IEEE OCEANS 2015, pages 1--9, Genova, Italy, May 2015.","DOI":"10.1109\/OCEANS-Genova.2015.7271735"},{"key":"key-10.1145\/2831296.2831339-4","doi-asserted-by":"crossref","unstructured":"S. Azad, P. Casari, and M. Zorzi. Multipath routing with limited cross-path interference in underwater networks. IEEE Wireless Communications Letters, 3(5):465--468, Oct 2014.","DOI":"10.1109\/LWC.2014.2342232"},{"key":"key-10.1145\/2831296.2831339-5","doi-asserted-by":"crossref","unstructured":"S. Basagni, C. Petrioli, R. Petroccia, and D. Spaccini. CARP: A channel-aware routing protocol for underwater acoustic wireless networks. Ad Hoc Networks, Special Issue on Advances in Underwater Communications and Networks, Available on-line, August 2014.","DOI":"10.1016\/j.adhoc.2014.07.014"},{"key":"key-10.1145\/2831296.2831339-6","doi-asserted-by":"crossref","unstructured":"S. Basagni, C. Petrioli, R. Petroccia, and M. Stojanovic. Optimized packet size selection in underwater wireless sensor network communications. IEEE Journal of Oceanic Engineering, 37(3):321--337, July 2012.","DOI":"10.1109\/JOE.2012.2197271"},{"key":"key-10.1145\/2831296.2831339-7","doi-asserted-by":"crossref","unstructured":"G. Bianchi, A. T. Capossele, A. Mei, and C. Petrioli. Flexible Key Exchange Negotiation for Wireless Sensor Networks. In Proceedings of ACM WiNTECH 2010, Chicago, Illinois, USA, 2010.","DOI":"10.1145\/1860079.1860090"},{"key":"key-10.1145\/2831296.2831339-8","doi-asserted-by":"crossref","unstructured":"G. Bianchi, A. T. Capossele, C. Petrioli, and D. Spenza. AGREE: exploiting energy harvesting to support data-centric access control in WSNs. Ad hoc networks, 11(8):2625--2636, 2013.","DOI":"10.1016\/j.adhoc.2013.03.013"},{"key":"key-10.1145\/2831296.2831339-9","doi-asserted-by":"crossref","unstructured":"D. Boneh, B. Lynn, and H. Shacham. Short signatures from the weil pairing. Journal of Cryptology, 17(4):297--319, 2004.","DOI":"10.1007\/s00145-004-0314-9"},{"key":"key-10.1145\/2831296.2831339-10","doi-asserted-by":"crossref","unstructured":"A. T. Capossele, V. Cervo, G. De Cicco, and C. Petrioli. Security as a CoAP resource: an optimized DTLS implementation for the IoT. In Proceedings of IEEE ICC 2015, London, UK, June 2015.","DOI":"10.1109\/ICC.2015.7248379"},{"key":"key-10.1145\/2831296.2831339-11","doi-asserted-by":"crossref","unstructured":"G. Dini and A. Lo Duca. A secure communication suite for underwater acoustic sensor networks. Sensors, 12(11):15133--15158, 2012.","DOI":"10.3390\/s121115133"},{"key":"key-10.1145\/2831296.2831339-12","doi-asserted-by":"crossref","unstructured":"G. Dini and A. Lo Duca. Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network. Ad Hoc Networks, 10(7):1167--1178, Sept. 2012.","DOI":"10.1016\/j.adhoc.2012.03.003"},{"key":"key-10.1145\/2831296.2831339-13","doi-asserted-by":"crossref","unstructured":"M. C. Domingo. Securing underwater wireless communication networks. IEEE Wireless Communications, 18(1):22--28, 2011.","DOI":"10.1109\/MWC.2011.5714022"},{"key":"key-10.1145\/2831296.2831339-14","doi-asserted-by":"crossref","unstructured":"M. Goetz, S. Azad, P. Casari, I. Nissen, and M. Zorzi. Jamming-resistant Multi-path Routing for Reliable Intruder Detection in Underwater Networks. In Proceedings of ACM WUWNet '11, pages 10:1--10:5, New York, NY, USA, 2011.","DOI":"10.1145\/2076569.2076579"},{"key":"key-10.1145\/2831296.2831339-15","unstructured":"J. Heidemann, M. Stojanovic, and M. Zorzi. Underwater sensor networks: applications, advances and challenges. Philosophical Transactions of the Royal Society A, 370(1958):158--175, 2012."},{"key":"key-10.1145\/2831296.2831339-16","doi-asserted-by":"crossref","unstructured":"J. Jebadurai, A. Melvin, and I. Jebadurai. Sinkhole detection in mobile ad-hoc networks using mutual understanding among nodes. In Proceedings of ICECT 2011, volume 3, pages 321--324, April 2011.","DOI":"10.1109\/ICECTECH.2011.5941764"},{"key":"key-10.1145\/2831296.2831339-17","doi-asserted-by":"crossref","unstructured":"I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos. Intrusion detection of sinkhole attacks in wireless sensor networks. In Algorithmic Aspects of Wireless Sensor Networks, volume 4837, pages 150--161. Springer Berlin Heidelberg, 2008.","DOI":"10.1007\/978-3-540-77871-4_14"},{"key":"key-10.1145\/2831296.2831339-18","unstructured":"A. Menezes. An introduction to pairing-based cryptography, 2005."},{"key":"key-10.1145\/2831296.2831339-19","doi-asserted-by":"crossref","unstructured":"L. Pescosolido, C. Petrioli, and L. Picari. A multi-band noise-aware mac protocol for underwater acoustic sensor networks. In Proceedings of IEEE WiMob 2013, Lyon, France, October 2013.","DOI":"10.1109\/WiMOB.2013.6673407"},{"key":"key-10.1145\/2831296.2831339-20","doi-asserted-by":"crossref","unstructured":"C. Petrioli, R. Petroccia, J. R. Potter, and D. Spaccini. The SUNSET framework for simulation, emulation and at-sea testing of underwater wireless sensor networks. Ad Hoc Networks, Special Issue on Advances in Underwater Communications and Networks, Available on-line, August 2014.","DOI":"10.1016\/j.adhoc.2014.08.012"},{"key":"key-10.1145\/2831296.2831339-21","doi-asserted-by":"crossref","unstructured":"C. Petrioli, R. Petroccia, and M. Stojanovic. A Comparative Performance Evaluation of MAC Protocols for Underwater Sensor Networks. In Proceedings of MTS\/IEEE OCEANS 2008, Quebec City, Canada, September 15-18 2008.","DOI":"10.1109\/OCEANS.2008.5152042"},{"key":"key-10.1145\/2831296.2831339-22","doi-asserted-by":"crossref","unstructured":"S. Sciancalepore, A. Capossele, G. Piro, G. Boggia, and G. Bianchi. Key Management Protocol with Implicit Certificates for IoT Systems. In Proceedings of ACM MobiSys 2015 workshop: IoT-Sys 2015, Florence, Italy, May 18 2015.","DOI":"10.1145\/2753476.2753477"},{"key":"key-10.1145\/2831296.2831339-23","doi-asserted-by":"crossref","unstructured":"C. Tapparello, P. Casari, G. Toso, I. Calabrese, R. Otnes, P. van Walree, M. Goetz, I. Nissen, and M. Zorzi. Performance Evaluation of Forwarding Protocols for the RACUN Network. In Proceedings of ACM WUWNet '13, pages 36:1--36:8, New York, NY, USA, 2013.","DOI":"10.1145\/2532378.2532401"},{"key":"key-10.1145\/2831296.2831339-24","doi-asserted-by":"crossref","unstructured":"G. Toso, D. Munaretto, M. Conti, and M. Zorzi. Attack Resilient Underwater Networks Through Software Defined Networking. In Proceedings of ACM WUWNet '14, pages 44:1--44:2, New York, NY, USA, 2014.","DOI":"10.1145\/2671490.2674589"},{"key":"key-10.1145\/2831296.2831339-25","unstructured":"R. Urick. Principles of Underwater Sound. McGraw-Hill, 1983."},{"key":"key-10.1145\/2831296.2831339-26","doi-asserted-by":"crossref","unstructured":"W. Wang, J. Kong, B. Bhargava, and M. Gerla. Visualisation of wormholes in underwater sensor networks: a distributed approach. International Journal of Security and Networks, 3(1):10--23, 2008.","DOI":"10.1504\/IJSN.2008.016198"},{"key":"key-10.1145\/2831296.2831339-27","doi-asserted-by":"crossref","unstructured":"R. Zhang and Y. Zhang. Wormhole-resilient secure neighbor discovery in underwater acoustic networks. In Proceedings of IEEE INFOCOM 2010, pages 1--9, March 2010.","DOI":"10.1109\/INFCOM.2010.5462093"}],"event":{"number":"10","sponsor":["ONRGlobal, U.S. Office of Naval Research Global","SIGMOBILE, ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ASA, American Statistical Association"],"acronym":"WUWNET '15","name":"the 10th International Conference","start":{"date-parts":[[2015,10,22]]},"location":"Arlington, VA, USA","end":{"date-parts":[[2015,10,24]]}},"container-title":["Proceedings of the 10th International Conference on Underwater Networks &amp; Systems - WUWNET '15"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2831296.2831339","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2831339&amp;ftid=1698465&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:12Z","timestamp":1750225692000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2831296.2831339"}},"subtitle":["A Reputation Based Channel Aware Routing Protocol for Underwater Acoustic Sensor Networks"],"proceedings-subject":"Underwater Networks & Systems","short-title":[],"issued":{"date-parts":[[2015]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1145\/2831296.2831339","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}