{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:37Z","timestamp":1750220077084,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T00:00:00Z","timestamp":1637539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"WTD 71"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,22]]},"DOI":"10.1145\/3491315.3491316","type":"proceedings-article","created":{"date-parts":[[2022,3,17]],"date-time":"2022-03-17T15:34:41Z","timestamp":1647531281000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Trustworthiness in the GUWMANET Protocol for Underwater Acoustic Mobile Ad-Hoc Networks"],"prefix":"10.1145","author":[{"given":"Alberto","family":"Signori","sequence":"first","affiliation":[{"name":"Department of Information Engineering, University of Padova, Italy"}]},{"given":"Emanuele","family":"Coccolo","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Padova, Italy"}]},{"given":"Filippo","family":"Campagnaro","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Padova, Italy"}]},{"given":"Ivor","family":"Nissen","sequence":"additional","affiliation":[{"name":"Bundeswehr Technical Center for Ships and Naval Weapons, Maritime Technology and Research, Germany"}]},{"given":"Michele","family":"Zorzi","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, University of Padova, Italy"}]}],"member":"320","published-online":{"date-parts":[[2022,3,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. EvoLogics S2C Acoustic Modems. https:\/\/evologics.de\/acoustic-modems. (2021). Last time accessed: Jul.\u00a02021.  2021. EvoLogics S2C Acoustic Modems. https:\/\/evologics.de\/acoustic-modems. (2021). Last time accessed: Jul.\u00a02021."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECACE.2019.8679165"},{"key":"e_1_3_2_1_3_1","volume-title":"Second Workshop on Economics of P2P Systems","author":"Buchegger S.","year":"2004","unstructured":"S. Buchegger and J.\u00a0 L. Boudec . 2004 . A Robust Reputation System for P2P and Mobile Ad-hoc Networks . In Second Workshop on Economics of P2P Systems , Boston. S. Buchegger and J.\u00a0L. Boudec. 2004. A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In Second Workshop on Economics of P2P Systems, Boston."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/UComms.2016.7583420"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.23919\/OCEANS44145.2021.9706058"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF38699.2020.9389259"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"e_1_3_2_1_8_1","volume-title":"[n. d.]. ITrust: An Anomaly-resilient Trust Model Based on Isolation Forest for Underwater Acoustic Sensor Networks","author":"Du J.","year":"2020","unstructured":"J. Du , G. Han , C. Lin , and M. Martinez-Garcia . [n. d.]. ITrust: An Anomaly-resilient Trust Model Based on Isolation Forest for Underwater Acoustic Sensor Networks . IEEE Transactions on Mobile Computing (Early Access) ( [n. d.]). https:\/\/doi.org\/10.1109\/TMC. 2020 .3028369 10.1109\/TMC.2020.3028369 J. Du, G. Han, C. Lin, and M. Martinez-Garcia. [n. d.]. ITrust: An Anomaly-resilient Trust Model Based on Isolation Forest for Underwater Acoustic Sensor Networks. IEEE Transactions on Mobile Computing (Early Access) ([n. d.]). https:\/\/doi.org\/10.1109\/TMC.2020.3028369"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc.\u00a0MCC","author":"Goetz Michael","year":"2012","unstructured":"Michael Goetz and Ivor Nissen . 2012 . GUWMANET - Multicast Routing in Underwater Acoustic Networks . In Proc.\u00a0MCC . Warsaw, Poland. Michael Goetz and Ivor Nissen. 2012. GUWMANET - Multicast Routing in Underwater Acoustic Networks. In Proc.\u00a0MCC. Warsaw, Poland."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/776322.776346"},{"key":"e_1_3_2_1_11_1","volume-title":"On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. In IEEE International Conference on Communications, Vol.\u00a08. 3383\u20133389","author":"Ngai C. H.","year":"2006","unstructured":"E.\u00a0 C. H. Ngai , J. Liu , and M.\u00a0 R. Lyu . 2006 . On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. In IEEE International Conference on Communications, Vol.\u00a08. 3383\u20133389 . E.\u00a0C. H. Ngai, J. Liu, and M.\u00a0R. Lyu. 2006. On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks. In IEEE International Conference on Communications, Vol.\u00a08. 3383\u20133389."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2011.0214"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2864127"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of the second Australian workshop on commonsense reasoning, Vol.\u00a048","author":"J\u00f8sang Audun","year":"1997","unstructured":"Audun J\u00f8sang . 1997 . Artificial reasoning with subjective logic . In Proc. of the second Australian workshop on commonsense reasoning, Vol.\u00a048 . 34. Audun J\u00f8sang. 1997. Artificial reasoning with subjective logic. In Proc. of the second Australian workshop on commonsense reasoning, Vol.\u00a048. 34."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2940820"},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE Aerospace Conference Proceedings (IEEE Cat. No. 04TH8720)","author":"Li Xiaoqi","year":"2004","unstructured":"Xiaoqi Li , Michael\u00a0 R Lyu , and Jiangchuan Liu . 2004 . A trust model based routing protocol for secure ad hoc networks . In IEEE Aerospace Conference Proceedings (IEEE Cat. No. 04TH8720) , Vol.\u00a02. 1286\u20131295. Xiaoqi Li, Michael\u00a0R Lyu, and Jiangchuan Liu. 2004. A trust model based routing protocol for secure ad hoc networks. In IEEE Aerospace Conference Proceedings (IEEE Cat. No. 04TH8720), Vol.\u00a02. 1286\u20131295."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSP.2017.8286550"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.374"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2982613"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1347364.1347373"},{"key":"e_1_3_2_1_22_1","volume-title":"MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE. 2406\u20132411","author":"Tomasi B.","year":"2010","unstructured":"B. Tomasi , P. Casari , L. Finesso , G. Zappa , K. McCoy , and M. Zorzi . 2010. On modeling JANUS packet errors over a shallow water acoustic channel using Markov and hidden Markov models . In MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE. 2406\u20132411 . https:\/\/doi.org\/10.1109\/MILCOM. 2010 .5680327 10.1109\/MILCOM.2010.5680327 B. Tomasi, P. Casari, L. Finesso, G. Zappa, K. McCoy, and M. Zorzi. 2010. On modeling JANUS packet errors over a shallow water acoustic channel using Markov and hidden Markov models. In MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE. 2406\u20132411. https:\/\/doi.org\/10.1109\/MILCOM.2010.5680327"},{"key":"e_1_3_2_1_23_1","volume-title":"Principles of Underwater Sound","author":"Urick J.","unstructured":"Robert\u00a0 J. Urick . 1983. Principles of Underwater Sound ( 3 rd ed.). McGraw-Hill . Robert\u00a0J. Urick. 1983. Principles of Underwater Sound(3rd ed.). McGraw-Hill.","edition":"3"},{"volume-title":"Information retrieval","author":"Van\u00a0Rijsbergan C","key":"e_1_3_2_1_24_1","unstructured":"C Van\u00a0Rijsbergan . 1979. Information retrieval ( second ed.). Buttersmiths . C Van\u00a0Rijsbergan. 1979. Information retrieval(second ed.). Buttersmiths."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPAN.2005.55"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2008.016198"},{"volume-title":"Proceedings of 29th IEEE International Conference on Computer Communications(INFOCOM\u201910)","author":"Zhang R.","key":"e_1_3_2_1_27_1","unstructured":"R. Zhang and Y. Zhang . 2010. Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks . In Proceedings of 29th IEEE International Conference on Computer Communications(INFOCOM\u201910) . San Diego, CA, USA, 1\u20139. R. Zhang and Y. Zhang. 2010. Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks. In Proceedings of 29th IEEE International Conference on Computer Communications(INFOCOM\u201910). San Diego, CA, USA, 1\u20139."}],"event":{"name":"WUWNet'21: The 15th International Conference on Underwater Networks & Systems","acronym":"WUWNet'21","location":"Shenzhen, Guangdong China"},"container-title":["The 15th International Conference on Underwater Networks &amp; Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491315.3491316","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491315.3491316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:20Z","timestamp":1750183760000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491315.3491316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,22]]},"references-count":27,"alternative-id":["10.1145\/3491315.3491316","10.1145\/3491315"],"URL":"https:\/\/doi.org\/10.1145\/3491315.3491316","relation":{},"subject":[],"published":{"date-parts":[[2021,11,22]]}}}