{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:02:21Z","timestamp":1743094941532,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030114367"},{"type":"electronic","value":"9783030114374"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11437-4_18","type":"book-chapter","created":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T17:10:29Z","timestamp":1553706629000},"page":"233-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SCC-LBS: Secure Criss-Cross Location-Based Service in Logistics"],"prefix":"10.1007","author":[{"given":"Udai Pratap","family":"Rao","sequence":"first","affiliation":[]},{"given":"Gargi","family":"Baser","sequence":"additional","affiliation":[]},{"given":"Ruchika","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,28]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Anjali, Shikha, M. Sharma, Wireless sensor networks: routing protocols and security issues, in Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) (2014), pp. 1\u20135. https:\/\/doi.org\/10.1109\/ICCCNT.2014.6962992","DOI":"10.1109\/ICCCNT.2014.6962992"},{"key":"18_CR2","first-page":"76","volume-title":"A distance routing effect algorithm for mobility (dream), in Proceedings of the 4th Annual ACM\/IEEE International Conference on Mobile Computing and Networking","author":"S Basagni","year":"1998","unstructured":"S. Basagni, I. Chlamtac, V.R. Syrotiuk, B.A. Woodward, A distance routing effect algorithm for mobility (dream), in Proceedings of the 4th Annual ACM\/IEEE International Conference on Mobile Computing and Networking (ACM, New York, 1998), pp. 76\u201384"},{"key":"18_CR3","first-page":"450","volume-title":"Present: an ultra-lightweight block cipher, in International Workshop on Cryptographic Hardware and Embedded Systems","author":"A Bogdanov","year":"2007","unstructured":"A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J. Robshaw, Y. Seurin, C. Vikkelsoe, Present: an ultra-lightweight block cipher, in International Workshop on Cryptographic Hardware and Embedded Systems (Springer, Berlin, 2007), pp. 450\u2013466"},{"key":"18_CR4","unstructured":"T. Camp, J. Boleng, L. Wilcox, Location information services in mobile ad hoc networks, in IEEE International Conference on Communications, 2002. ICC 2002, vol. 5 (IEEE, Piscataway, 2002), pp. 3318\u20133324"},{"key":"18_CR5","first-page":"171","volume-title":"A peer-to-peer spatial cloaking algorithm for anonymous location-based service, in Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems","author":"CY Chow","year":"2006","unstructured":"C.Y. Chow, M.F. Mokbel, X. Liu, A peer-to-peer spatial cloaking algorithm for anonymous location-based service, in Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems (ACM, New York, 2006), pp. 171\u2013178"},{"key":"18_CR6","first-page":"67","volume-title":"General principles of algebraic attacks and new design criteria for cipher components, in International Conference on Advanced Encryption Standard","author":"NT Courtois","year":"2004","unstructured":"N.T. Courtois, General principles of algebraic attacks and new design criteria for cipher components, in International Conference on Advanced Encryption Standard (Springer, Berlin, 2004), pp. 67\u201383"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.adhoc.2006.05.012","volume":"5","author":"X Du","year":"2007","unstructured":"X. Du, Y. Xiao, M. Guizani, H.H. Chen, An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24\u201334 (2007)","journal-title":"Ad Hoc Netw."},{"key":"18_CR8","first-page":"41","volume-title":"A key-management scheme for distributed sensor networks, in Proceedings of the 9th ACM Conference on Computer and Communications Security","author":"L Eschenauer","year":"2002","unstructured":"L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in Proceedings of the 9th ACM Conference on Computer and Communications Security (ACM, New York, 2002), pp. 41\u201347"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"G.G. Finn, Routing and addressing problems in large metropolitan-scale internetworks. ISI Research Report (1987)","DOI":"10.21236\/ADA180187"},{"key":"18_CR10","unstructured":"Global positioning system. https:\/\/en.wikipedia.org\/wiki\/Global_Positioning_System . Accessed 15 Oct 2017"},{"issue":"3","key":"18_CR11","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/JCN.2017.000041","volume":"19","author":"R Gupta","year":"2017","unstructured":"R. Gupta, U.P. Rao, Achieving location privacy through cast in location based services. J. Commun. Netw. 19(3), 239\u2013249 (2017)","journal-title":"J. Commun. Netw."},{"issue":"2","key":"18_CR12","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1007\/s11277-017-4284-2","volume":"96","author":"R Gupta","year":"2017","unstructured":"R. Gupta, U.P. Rao, An exploration to location based service and its privacy preserving techniques: a survey. Wirel. Pers. Commun. 96(2), 1973\u20132007 (2017)","journal-title":"Wirel. Pers. Commun."},{"key":"18_CR13","first-page":"1","volume":"2017","author":"R Gupta","year":"2017","unstructured":"R. Gupta, U.P. Rao, A hybrid location privacy solution for mobile LBS. Mob. Inf. Syst. 2017, 1\u201311 (2017)","journal-title":"Mob. Inf. Syst."},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Z.J. Haas, B. Liang, Ad hoc mobility management with uniform quorum systems. IEEE\/ACM Trans. Netw. (TON) 7(2), 228\u2013240 (1999)","DOI":"10.1109\/90.769770"},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/WD.2011.6098169","volume-title":"A comparative study of location aided routing protocols for MANET, in IFIP Wireless Days (WD), 2011","author":"V Hnatyshin","year":"2011","unstructured":"V. Hnatyshin, M. Ahmed, R. Cocco, D. Urbano, A comparative study of location aided routing protocols for MANET, in IFIP Wireless Days (WD), 2011 (IEEE, Piscataway, 2011), pp. 1\u20133"},{"key":"18_CR16","first-page":"243","volume-title":"Gpsr: Greedy perimeter stateless routing for wireless networks, in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking","author":"B Karp","year":"2000","unstructured":"B. Karp, H.T. Kung, Gpsr: Greedy perimeter stateless routing for wireless networks, in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (ACM, New York, 2000), pp. 243\u2013254"},{"key":"18_CR17","first-page":"52","volume-title":"Establishing pairwise keys in distributed sensor networks, in Proceedings of the 10th ACM Conference on Computer and Communications Security","author":"D Liu","year":"2003","unstructured":"D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in Proceedings of the 10th ACM Conference on Computer and Communications Security (ACM, New York, 2003), pp. 52\u201361"},{"key":"18_CR18","unstructured":"Logistics. https:\/\/en.wikipedia.org\/wiki\/Logistics . Accessed 23 Sept 2017"},{"key":"18_CR19","unstructured":"Logistics and security. https:\/\/www.penskelogistics.com\/technology\/secure-data\/ . Accessed 20 Nov 2017"},{"key":"18_CR20","unstructured":"D.J. Malan, M. Welsh, M.D. Smith, A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography, in First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004 (IEEE, Piscataway, 2004), pp. 71\u201380"},{"issue":"5","key":"18_CR21","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler, Spins: Security protocols for sensor networks. Wirel. Netw. 8(5), 521\u2013534 (2002)","journal-title":"Wirel. Netw."},{"key":"18_CR22","unstructured":"Public key cryptography. https:\/\/en.wikipedia.org\/wiki\/Public-key_cryptography . Accessed 01 Nov 2017"},{"key":"18_CR23","first-page":"90","volume-title":"A related-key attack on block ciphers with weak recurrent key schedules, in International Symposium on Foundations and Practice of Security","author":"M Pudovkina","year":"2011","unstructured":"M. Pudovkina, A related-key attack on block ciphers with weak recurrent key schedules, in International Symposium on Foundations and Practice of Security (Springer, Berlin, 2011), pp. 90\u2013101"},{"key":"18_CR24","unstructured":"RSA. https:\/\/en.wikipedia.org\/wiki\/RSA_(cryptosystem) . Accessed 15 Oct 2017"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"E. Takimoto, S. Aketa, Y. Otsuki, S. Saito, K. Mouri, A hybrid loop-free routing protocol for wireless mesh networks, in International Conference on Frontiers of Communications, Networks and Applications (ICFCNA 2014-Malaysia) (2014)","DOI":"10.1049\/cp.2014.1404"},{"key":"18_CR26","unstructured":"P. Traynor, H. Choi, G. Cao, S. Zhu, T. La Porta, Establishing pair-wise keys in heterogeneous sensor networks, in Proceedings of 25th IEEE International Conference on Computer Communications. INFOCOM 2006. Citeseer (2006), pp. 1\u201312"},{"key":"18_CR27","first-page":"35","volume-title":"The landmark hierarchy: a new hierarchy for routing in very large networks, in ACM SIGCOMM Computer Communication Review,","author":"PF Tsuchiya","year":"1988","unstructured":"P.F. Tsuchiya, The landmark hierarchy: a new hierarchy for routing in very large networks, in ACM SIGCOMM Computer Communication Review, vol. 18 (ACM, New York, 1988), pp. 35\u201342"},{"issue":"9","key":"18_CR28","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1016\/j.camwa.2012.01.038","volume":"65","author":"P Vijayakumar","year":"2013","unstructured":"P. Vijayakumar, S. Bose, A. Kannan, Centralized key distribution protocol using the greatest common divisor method. Comput. Math. Appl. 65(9), 1360\u20131368 (2013)","journal-title":"Comput. Math. Appl."},{"key":"18_CR29","unstructured":"A.S. Wander, N. Gura, H. Eberle, V. Gupta, S.C. Shantz, Energy analysis of public-key cryptography for wireless sensor networks, in Third IEEE International Conference on Pervasive Computing and Communications, 2005. PerCom 2005 (IEEE, Piscataway, 2005), pp. 324\u2013328"},{"key":"18_CR30","unstructured":"G.J. Yu, A quorum-based route cache maintenance protocol for mobile ad-hoc networks, in Proceedings of the 22nd International Conference on Advanced Information Networking and Applications (IEEE Computer Society, Washington, 2008), pp. 196\u2013203"},{"key":"18_CR31","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1145\/948109.948120","volume-title":"Leap: efficient security mechanisms for large-scale distributed sensor networks, in Proceedings of the 10th ACM Conference on Computer and Communications Security","author":"S Zhu","year":"2003","unstructured":"S. Zhu, S. Setia, S. Jajodia, Leap: efficient security mechanisms for large-scale distributed sensor networks, in Proceedings of the 10th ACM Conference on Computer and Communications Security (ACM, New York, 2003), pp. 62\u201372"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","2nd International Conference on Wireless Intelligent and Distributed Environment for Communication"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11437-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T22:47:08Z","timestamp":1694731628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11437-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030114367","9783030114374"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11437-4_18","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"28 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WIDECOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Intelligent and Distributed Environment for Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"widecom2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}