{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:30:36Z","timestamp":1740119436005,"version":"3.37.3"},"reference-count":52,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100003252","name":"Lund University","doi-asserted-by":"publisher","award":["RIT17-0032"],"id":[{"id":"10.13039\/501100003252","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001729","name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001729","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1016\/j.cose.2023.103289","type":"journal-article","created":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T18:11:14Z","timestamp":1683655874000},"page":"103289","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["PrSLoc: Sybil attack detection for localization with private observers using differential privacy"],"prefix":"10.1016","volume":"131","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7498-002X","authenticated-orcid":false,"given":"Yachao","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Yu","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yali","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.cose.2023.103289_bib0001","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/JSYST.2012.2221912","article-title":"Lightweight sybil attack detection in manets","volume":"7","author":"Abbas","year":"2012","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.cose.2023.103289_bib0002","series-title":"2017 16th ACM\/IEEE International Conference on Information Processing in Sensor Networks (IPSN)","first-page":"41","article-title":"PrOLoc: resilient localization with private observers using partial homomorphic encryption","author":"Alanwar","year":"2017"},{"issue":"4","key":"10.1016\/j.cose.2023.103289_bib0003","doi-asserted-by":"crossref","first-page":"1361","DOI":"10.1007\/s11276-021-02871-0","article-title":"Sybil attack detection scheme based on channel profile and power regulations in wireless sensor networks","volume":"28","author":"Almesaeed","year":"2022","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.cose.2023.103289_bib0004","series-title":"20th ACM Conference on Computer and Communications Security (CCS)","first-page":"901","article-title":"Geo-indistinguishability: differential privacy for location-based systems","author":"Andr\u00e9s","year":"2013"},{"issue":"6","key":"10.1016\/j.cose.2023.103289_bib0005","doi-asserted-by":"crossref","first-page":"6567","DOI":"10.1007\/s12652-020-02276-5","article-title":"Novel sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN","volume":"12","author":"Angappan","year":"2021","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"10.1016\/j.cose.2023.103289_bib0006","series-title":"Proceedings of the 2014\u00a0ACM SIGSAC Conference on Computer and Communications Security (CCS)","first-page":"251","article-title":"Optimal geo-indistinguishable mechanisms for location privacy","author":"Bordenabe","year":"2014"},{"issue":"3\u20134","key":"10.1016\/j.cose.2023.103289_bib0007","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1080\/23742917.2017.1384917","article-title":"Lightweight cryptography methods","volume":"1","author":"Buchanan","year":"2017","journal-title":"J. Cyber Secur. Technol."},{"key":"10.1016\/j.cose.2023.103289_bib0008","series-title":"Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks","first-page":"564","article-title":"An RSSI-based scheme for sybil attack detection in wireless sensor networks","author":"Demirbas","year":"2006"},{"issue":"12","key":"10.1016\/j.cose.2023.103289_bib0009","doi-asserted-by":"crossref","first-page":"2360","DOI":"10.1109\/TMC.2012.208","article-title":"Local differential perturbations: location privacy under approximate knowledge attackers","volume":"12","author":"Dewri","year":"2012","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.cose.2023.103289_bib0010","series-title":"International workshop on peer-to-peer systems","first-page":"251","article-title":"The sybil attack","author":"Douceur","year":"2002"},{"issue":"1","key":"10.1016\/j.cose.2023.103289_bib0011","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/JSYST.2018.2868231","article-title":"M-MEMHS: modified minimization of error in multihop system for localization of unknown sensor nodes","volume":"13","author":"Dutta","year":"2018","journal-title":"IEEE Syst. J."},{"key":"10.1016\/j.cose.2023.103289_bib0012","series-title":"Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10\u201314, 2006, Proceedings, Part II 33","first-page":"1","article-title":"Differential privacy","author":"Dwork","year":"2006"},{"issue":"3\u20134","key":"10.1016\/j.cose.2023.103289_bib0013","first-page":"211","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends\u00ae Theor. Comput. Sci."},{"key":"10.1016\/j.cose.2023.103289_bib0014","series-title":"2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004.","first-page":"406","article-title":"The limits of localization using signal strength: a comparative study","author":"Elnahrawy","year":"2004"},{"issue":"1","key":"10.1016\/j.cose.2023.103289_bib0015","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2007.1062","article-title":"Protecting location privacy with personalized k-anonymity: architecture and algorithms","volume":"7","author":"Gedik","year":"2007","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.cose.2023.103289_bib0016","series-title":"GLOBECOM 2017-2017 IEEE Global Communications Conference","first-page":"1","article-title":"Localization of sybil nodes with electro-acoustic positioning in VANETs","author":"Han","year":"2017"},{"key":"10.1016\/j.cose.2023.103289_bib0017","series-title":"Proceedings of the 9th annual international conference on Mobile computing and networking","first-page":"81","article-title":"Range-free localization schemes for large scale sensor networks","author":"He","year":"2003"},{"key":"10.1016\/j.cose.2023.103289_bib0018","series-title":"2016 53nd ACM\/EDAC\/IEEE Design Automation Conference (DAC)","first-page":"1","article-title":"Privacy preserving localization for smart automotive systems","author":"Hussain","year":"2016"},{"issue":"6","key":"10.1016\/j.cose.2023.103289_bib0019","first-page":"79","article-title":"P3: Privacy preserving positioning for smart automotive systems","volume":"23","author":"Hussain","year":"2018","journal-title":"ACM Trans. Des. Automat. Electron. Syst. (TODAES)"},{"key":"10.1016\/j.cose.2023.103289_bib0020","series-title":"2014 International Conference on the Internet of Things (IOT)","first-page":"85","article-title":"Game theoretic secure localization in wireless sensor networks","author":"Jha","year":"2014"},{"key":"10.1016\/j.cose.2023.103289_bib0021","article-title":"A secure localization approach using mutual authentication and insider node validation in wireless sensor networks","volume":"2017","author":"Kumar","year":"2017","journal-title":"Mobile Inf. Syst."},{"key":"10.1016\/j.cose.2023.103289_bib0022","series-title":"2009 Fifth international conference on wireless communication and sensor networks (WCSN)","first-page":"1","article-title":"Distance measurement and error estimation scheme for RSSI based localization in wireless sensor networks","author":"Kumar","year":"2009"},{"issue":"4","key":"10.1016\/j.cose.2023.103289_bib0023","doi-asserted-by":"crossref","first-page":"3607","DOI":"10.1109\/COMST.2018.2855063","article-title":"A survey of enabling technologies for network localization, tracking, and navigation","volume":"20","author":"Laoudias","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.cose.2023.103289_bib0024","series-title":"Proceedings of the 3rd ACM workshop on Wireless security","first-page":"21","article-title":"SeRLoc: secure range-independent localization for wireless sensor networks","author":"Lazos","year":"2004"},{"issue":"2","key":"10.1016\/j.cose.2023.103289_bib0025","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/JSAC.2005.861381","article-title":"HiRLoc: high-resolution robust localization for wireless sensor networks","volume":"24","author":"Lazos","year":"2006","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.cose.2023.103289_bib0026","series-title":"Proceedings of the 4th international symposium on Information processing in sensor networks","first-page":"43","article-title":"Rope: robust position estimation in wireless sensor networks","author":"Lazos","year":"2005"},{"issue":"3","key":"10.1016\/j.cose.2023.103289_bib0027","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.1109\/TWC.2019.2897308","article-title":"Exploiting dispersive power gain and delay spread for sybil detection in industrial WSNs: a multi-kernel approach","volume":"18","author":"Li","year":"2019","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.cose.2023.103289_bib0028","first-page":"130","article-title":"Chapter 3 - security and vulnerability in the internet of things","author":"Li","year":"2017","journal-title":"Secur. Internet Thing."},{"issue":"1","key":"10.1016\/j.cose.2023.103289_bib0029","first-page":"2","article-title":"Attack-tolerant localization via iterative verification of locations in sensor networks","volume":"8","author":"Park","year":"2008","journal-title":"ACM Trans. Embedd. Comput. Syst. (TECS)"},{"issue":"5","key":"10.1016\/j.cose.2023.103289_bib0030","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TKDE.2013.87","article-title":"Privacy-preserving and content-protecting location based queries","volume":"26","author":"Paulet","year":"2013","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"9","key":"10.1016\/j.cose.2023.103289_bib0031","doi-asserted-by":"crossref","first-page":"2478","DOI":"10.1109\/TMC.2016.2627552","article-title":"Drone path planning for secure positioning and secure position verification","volume":"16","author":"Perazzo","year":"2017","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"10.1016\/j.cose.2023.103289_bib0032","first-page":"27","article-title":"Secure positioning in wireless sensor networks through enlargement miscontrol detection","volume":"12","author":"Perazzo","year":"2016","journal-title":"ACM Trans. Sensor Netw. (TOSN)"},{"key":"10.1016\/j.cose.2023.103289_bib0033","article-title":"The long road to computational location privacy: asurvey","author":"Primault","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"21","key":"10.1016\/j.cose.2023.103289_bib0034","doi-asserted-by":"crossref","first-page":"7560","DOI":"10.1016\/j.eswa.2015.05.057","article-title":"Detecting sybil attacks in wireless sensor networks using UWB ranging-based information","volume":"42","author":"Sarigiannidis","year":"2015","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"10.1016\/j.cose.2023.103289_bib0035","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MAP.2003.1232163","article-title":"A survey of various propagation models for mobile communication","volume":"45","author":"Sarkar","year":"2003","journal-title":"IEEE Antennas Propag. Mag."},{"issue":"5","key":"10.1016\/j.cose.2023.103289_bib0036","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/TSC.2016.2514338","article-title":"Privacy-preserving location sharing services for social networks","volume":"10","author":"Schlegel","year":"2016","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.cose.2023.103289_bib0037","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2019.2902815","article-title":"Deep q-network based route scheduling for TNC vehicles with passengers\u00e2\u0102\u0179 location differential privacy","author":"Shi","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.cose.2023.103289_bib0038","article-title":"Privacy-preserving distributed iterative localization for wireless sensor networks","author":"Shi","year":"2022","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"18","key":"10.1016\/j.cose.2023.103289_bib0039","doi-asserted-by":"crossref","first-page":"3042","DOI":"10.1016\/j.comnet.2009.07.013","article-title":"Detecting sybil attacks in wireless sensor networks using neighboring information","volume":"53","author":"Ssu","year":"2009","journal-title":"Comput. Netw."},{"key":"10.1016\/j.cose.2023.103289_bib0040","series-title":"2017 26th International Conference on Computer Communication and Networks (ICCCN)","first-page":"1","article-title":"An efficient privacy-preserving localization algorithm for pervasive computing","author":"Wang","year":"2017"},{"key":"10.1016\/j.cose.2023.103289_bib0041","series-title":"Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems","first-page":"289","article-title":"On location privacy in fingerprinting-based indoor positioning system: an encryption approach","author":"Wang","year":"2019"},{"key":"10.1016\/j.cose.2023.103289_bib0042","series-title":"2009 5th International Conference on Wireless Communications, Networking and Mobile Computing","first-page":"1","article-title":"Tolerant majority-colluding attacks for secure localization in wireless sensor networks","author":"Wang","year":"2009"},{"key":"10.1016\/j.cose.2023.103289_bib0043","doi-asserted-by":"crossref","unstructured":"Weber, M., Jin, B., Lederman, G., Shoukry, Y., Lee, E.A., Seshia, S.A., Sangiovanni-Vincentelli, A.L. Gordian: formal reasoning based outlier detection for secure localization 2019.","DOI":"10.1145\/3386568"},{"issue":"1","key":"10.1016\/j.cose.2023.103289_bib0044","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/s11741-008-0113-2","article-title":"Tdoa-based sybil attack detection scheme for wireless sensor networks","volume":"12","author":"Wen","year":"2008","journal-title":"J. Shanghai Univ. (English Edition)"},{"key":"10.1016\/j.cose.2023.103289_bib0045","series-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS)","first-page":"1298","article-title":"Protecting locations with differential privacy under temporal correlations","author":"Xiao","year":"2015"},{"issue":"12","key":"10.1016\/j.cose.2023.103289_bib0046","doi-asserted-by":"crossref","first-page":"1901","DOI":"10.14778\/3137765.3137804","article-title":"Loclok: location cloaking with differential privacy via hidden markov model","volume":"10","author":"Xiao","year":"2017","journal-title":"Proc. VLDB Endowment"},{"key":"10.1016\/j.cose.2023.103289_bib0047","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2020\/8829523","article-title":"A comprehensive survey on local differential privacy","volume":"2020","author":"Xiong","year":"2020","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"10.1016\/j.cose.2023.103289_bib0048","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1109\/TMC.2018.2833849","article-title":"Multi-channel based sybil attack detection in vehicular ad hoc networks using RSSI","volume":"18","author":"Yao","year":"2018","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.cose.2023.103289_bib0049","doi-asserted-by":"crossref","first-page":"27629","DOI":"10.1109\/ACCESS.2018.2836898","article-title":"Secure APIT localization scheme against sybil attacks in distributed wireless sensor networks","volume":"6","author":"Yuan","year":"2018","journal-title":"IEEE Access"},{"issue":"5","key":"10.1016\/j.cose.2023.103289_bib0050","first-page":"1847","article-title":"Aoa based trust evaluation scheme for sybil attack detection in wsn","volume":"27","author":"Zhang","year":"2010","journal-title":"Appl. Res. Comput."},{"issue":"2","key":"10.1016\/j.cose.2023.103289_bib0051","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1145\/1149283.1149287","article-title":"Models and solutions for radio irregularity in wireless sensor networks","volume":"2","author":"Zhou","year":"2006","journal-title":"ACM Trans. Sensor Netw. (TOSN)"},{"key":"10.1016\/j.cose.2023.103289_bib0052","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1109\/TIFS.2019.2923156","article-title":"Lppa: lightweight privacy-preserving authentication from efficient multi-key secure outsourced computation for location-based services in vanets","volume":"15","author":"Zhou","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404823001992?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404823001992?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T00:55:38Z","timestamp":1711673738000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404823001992"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":52,"alternative-id":["S0167404823001992"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2023.103289","relation":{},"ISSN":["0167-4048"],"issn-type":[{"type":"print","value":"0167-4048"}],"subject":[],"published":{"date-parts":[[2023,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"PrSLoc: Sybil attack detection for localization with private observers using differential privacy","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2023.103289","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103289"}}