{"id":"https://openalex.org/W2065044449","doi":"https://doi.org/10.1109/blackseacom.2014.6849023","title":"BRAVO: A black-hole resilient ad-hoc on demand distance Vector rOuting for tactical communications","display_name":"BRAVO: A black-hole resilient ad-hoc on demand distance Vector rOuting for tactical communications","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2065044449","doi":"https://doi.org/10.1109/blackseacom.2014.6849023","mag":"2065044449"},"language":"en","primary_location":{"id":"doi:10.1109/blackseacom.2014.6849023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/blackseacom.2014.6849023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002252520","display_name":"Ermanno Guardo","orcid":null},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Ermanno Guardo","raw_affiliation_strings":["DIEEI \u2013 University of Catania, Catania, Italy","DIEEI, University of Catania,Catania,Italy"],"affiliations":[{"raw_affiliation_string":"DIEEI \u2013 University of Catania, Catania, Italy","institution_ids":["https://openalex.org/I39063666"]},{"raw_affiliation_string":"DIEEI, University of Catania,Catania,Italy","institution_ids":["https://openalex.org/I39063666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050880787","display_name":"Giacomo Morabito","orcid":"https://orcid.org/0000-0002-8714-4001"},"institutions":[{"id":"https://openalex.org/I39063666","display_name":"University of Catania","ror":"https://ror.org/03a64bh57","country_code":"IT","type":"education","lineage":["https://openalex.org/I39063666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giacomo Morabito","raw_affiliation_strings":["DIEEI \u2013 University of Catania, Catania, Italy","DIEEI, University of Catania,Catania,Italy"],"affiliations":[{"raw_affiliation_string":"DIEEI \u2013 University of Catania, Catania, Italy","institution_ids":["https://openalex.org/I39063666"]},{"raw_affiliation_string":"DIEEI, University of Catania,Catania,Italy","institution_ids":["https://openalex.org/I39063666"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059985838","display_name":"Girolamo Catania","orcid":null},"institutions":[{"id":"https://openalex.org/I76806421","display_name":"SELEX Sistemi Integrati","ror":"https://ror.org/02sj0zy88","country_code":"IT","type":"company","lineage":["https://openalex.org/I76806421"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Girolamo Catania","raw_affiliation_strings":["Selex ES SPA, Network and Comm. Simulators Eng., Italy","Network & Comm. Simulators Eng., Selex ES SPA, Catania, Italy"],"affiliations":[{"raw_affiliation_string":"Selex ES SPA, Network and Comm. Simulators Eng., Italy","institution_ids":["https://openalex.org/I76806421"]},{"raw_affiliation_string":"Network & Comm. Simulators Eng., Selex ES SPA, Catania, Italy","institution_ids":["https://openalex.org/I76806421"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044365120","display_name":"Agatino Mursia","orcid":null},"institutions":[{"id":"https://openalex.org/I76806421","display_name":"SELEX Sistemi Integrati","ror":"https://ror.org/02sj0zy88","country_code":"IT","type":"company","lineage":["https://openalex.org/I76806421"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Agatino Mursia","raw_affiliation_strings":["Selex ES SPA, Network and Comm. Simulators Eng., Italy","Network & Comm. Simulators Eng., Selex ES SPA, Catania, Italy"],"affiliations":[{"raw_affiliation_string":"Selex ES SPA, Network and Comm. Simulators Eng., Italy","institution_ids":["https://openalex.org/I76806421"]},{"raw_affiliation_string":"Network & Comm. Simulators Eng., Selex ES SPA, Catania, Italy","institution_ids":["https://openalex.org/I76806421"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038158377","display_name":"Ferdinando Battiati","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ferdinando Battiati","raw_affiliation_strings":["SCUTI Esercito Italiano, Cecchignola, Italy","SCUTI-Esercito Italiano, Cecchignola, Italy"],"affiliations":[{"raw_affiliation_string":"SCUTI Esercito Italiano, Cecchignola, Italy","institution_ids":[]},{"raw_affiliation_string":"SCUTI-Esercito Italiano, Cecchignola, Italy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5002252520"],"corresponding_institution_ids":["https://openalex.org/I39063666"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.14491533,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"127","last_page":"128"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7474271059036255},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.7267919778823853},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7262328267097473},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.6671146154403687},{"id":"https://openalex.org/keywords/packet-drop-attack","display_name":"Packet drop attack","score":0.6430069208145142},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5687685608863831},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5216988921165466},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5064622163772583},{"id":"https://openalex.org/keywords/optimized-link-state-routing-protocol","display_name":"Optimized Link State Routing Protocol","score":0.4720533490180969},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4700765907764435},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46075066924095154},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.43764346837997437},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.435005247592926},{"id":"https://openalex.org/keywords/black-hole","display_name":"Black hole (networking)","score":0.4349829852581024},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.41717085242271423},{"id":"https://openalex.org/keywords/link-state-routing-protocol","display_name":"Link-state routing protocol","score":0.22115153074264526},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.20530149340629578},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.14769572019577026},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12860313057899475}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7474271059036255},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.7267919778823853},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7262328267097473},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.6671146154403687},{"id":"https://openalex.org/C35546906","wikidata":"https://www.wikidata.org/wiki/Q2900718","display_name":"Packet drop attack","level":5,"score":0.6430069208145142},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5687685608863831},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5216988921165466},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5064622163772583},{"id":"https://openalex.org/C204739117","wikidata":"https://www.wikidata.org/wiki/Q1368373","display_name":"Optimized Link State Routing Protocol","level":4,"score":0.4720533490180969},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4700765907764435},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46075066924095154},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.43764346837997437},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.435005247592926},{"id":"https://openalex.org/C50341732","wikidata":"https://www.wikidata.org/wiki/Q880302","display_name":"Black hole (networking)","level":5,"score":0.4349829852581024},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.41717085242271423},{"id":"https://openalex.org/C89305328","wikidata":"https://www.wikidata.org/wiki/Q1755411","display_name":"Link-state routing protocol","level":4,"score":0.22115153074264526},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.20530149340629578},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.14769572019577026},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12860313057899475},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/blackseacom.2014.6849023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/blackseacom.2014.6849023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2033613909","https://openalex.org/W2102258543","https://openalex.org/W2125997818"],"related_works":["https://openalex.org/W2265231577","https://openalex.org/W1123412569","https://openalex.org/W2768875466","https://openalex.org/W3013627169","https://openalex.org/W2221751701","https://openalex.org/W26370491","https://openalex.org/W2749079590","https://openalex.org/W2293776035","https://openalex.org/W2765741883","https://openalex.org/W1967980825"],"abstract_inverted_index":{"Mobile":[0],"Ad":[1],"Hoc":[2],"Networks":[3],"(MANET)":[4],"are":[5],"widely":[6],"used":[7],"in":[8,17,43,58,75,117],"tactical":[9],"scenarios":[10,119],"because":[11],"they":[12],"can":[13],"be":[14,41],"deployed":[15],"rapidly":[16],"hostile":[18],"areas":[19],"and":[20,83],"the":[21,59,65,68,71,76,108],"distributed":[22,34],"nature":[23],"of":[24,67,79,110],"their":[25],"operations":[26],"makes":[27],"them":[28],"robust":[29,122],"to":[30,106,123],"nodes":[31,105],"failures.":[32],"However,":[33],"control":[35],"involves":[36],"new":[37],"vulnerabilities":[38],"that":[39,97,116],"might":[40],"critical":[42],"electronic":[44],"warfare":[45],"scenarios.":[46],"In":[47,88],"this":[48,89],"paper":[49,90],"we":[50],"focus":[51],"on":[52,102],"black":[53,124],"hole":[54,125],"attacks":[55],"which":[56],"introduce":[57],"network":[60],"fake":[61],"routing":[62],"information.":[63],"On":[64],"consequence":[66],"above":[69],"information,":[70],"malicious":[72],"node":[73],"enters":[74],"end-to-end":[77],"path":[78],"most":[80,118],"communication":[81],"sessions":[82],"discards":[84],"all":[85],"received":[86],"packets.":[87],"a":[91,99],"solution,":[92],"named":[93],"BRAVO":[94,120],"is":[95,121],"proposed,":[96],"exploits":[98],"mechanism":[100],"based":[101],"credits":[103],"allowing":[104],"estimate":[107],"trustworthiness":[109],"neighboring":[111],"nodes.":[112],"Simulation":[113],"results":[114],"demonstrate":[115],"attacks.":[126]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
