{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:28:52Z","timestamp":1742801332494},"reference-count":34,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61309023","61272463","61273079"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Shandong Provincial Natural Science Foundation, China","award":["ZR2013FQ032"]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["13CX02100A"],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Zhejiang Provincial Key Lab of Intelligent Processing Research of Visual Media","award":["2012008"]},{"name":"Hong Kong GRF","award":["PolyU-524308","PolyU-521312"]},{"name":"HKPU","award":["A-PL16","A-PL84"]},{"DOI":"10.13039\/501100011311","name":"State Key Laboratory of Industrial Control Technology","doi-asserted-by":"crossref","award":["ICT1206","ICT1207"],"id":[{"id":"10.13039\/501100011311","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pervasive and Mobile Computing"],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1016\/j.pmcj.2014.01.007","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T14:45:19Z","timestamp":1391179519000},"page":"22-35","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":47,"special_numbering":"PA","title":["Securing DV-Hop localization against wormhole attacks in wireless sensor networks"],"prefix":"10.1016","volume":"16","author":[{"given":"Honglong","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9784-5741","authenticated-orcid":false,"given":"Wei","family":"Lou","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5804-3279","authenticated-orcid":false,"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Junfeng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhibo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Aihua","family":"Xia","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.pmcj.2014.01.007_br000005","doi-asserted-by":"crossref","unstructured":"N. Bulusu, J. Heidemann, D. Estrin, GPS-less low cost outdoor localization for very small devices, vol. 7, 2000, pp. 28\u201334.","DOI":"10.1109\/98.878533"},{"key":"10.1016\/j.pmcj.2014.01.007_br000010","doi-asserted-by":"crossref","unstructured":"T. He, C. Huang, B. Blum, J.A. Stankovic, T. Abdelzaher, Range-free localization schemes for large scale sensor networks, in: Proc. of ACM MOBICOM, 2003, pp. 81\u201395.","DOI":"10.1145\/938994.938995"},{"key":"10.1016\/j.pmcj.2014.01.007_br000015","unstructured":"D. Niculescu, B. Nath, Ad hoc positioning system (APS) using AOA, in: Proc. of IEEE INFOCOM, 2003."},{"key":"10.1016\/j.pmcj.2014.01.007_br000020","doi-asserted-by":"crossref","unstructured":"S. Capkun, M. Cagalj, M. Srivastava, Secure localization with hidden and mobile base stations, in: Proc. of IEEE INFOCOM, 2006.","DOI":"10.1109\/INFOCOM.2006.302"},{"key":"10.1016\/j.pmcj.2014.01.007_br000025","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MCOM.2008.4481347","article-title":"Secure localization algorithms for wireless sensor networks","author":"Boukerche","year":"2008","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.pmcj.2014.01.007_br000030","unstructured":"D. Liu, P. Ning, W. Du, Attack-resistant location estimation in sensor networks, in: Proc. of IEEE IPSN, 2005."},{"key":"10.1016\/j.pmcj.2014.01.007_br000035","doi-asserted-by":"crossref","unstructured":"S. Capkun, J.P. Hubaux, Secure positioning of wireless devices with application to sensor networks, in: Proc. of IEEE INFOCOM, 2005.","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"10.1016\/j.pmcj.2014.01.007_br000040","doi-asserted-by":"crossref","unstructured":"F. Anjum, S. Pandey, P. Agrawal, Secure localization in sensor networks using transmission range variation, in: Proc. of IEEE MASS, 2005.","DOI":"10.1109\/MAHSS.2005.1542800"},{"key":"10.1016\/j.pmcj.2014.01.007_br000045","doi-asserted-by":"crossref","unstructured":"H. Chen, W. Lou, J. Ma, Z. Wang, TSCD: a novel secure localization approach for wireless sensor networks, in: Proc. of the International Conference on Sensor Technologies and Applications, SensorComm, 2008.","DOI":"10.1109\/SENSORCOMM.2008.79"},{"key":"10.1016\/j.pmcj.2014.01.007_br000050","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1155\/2010\/981280","article-title":"A novel secure localization approach in wireless sensor networks","volume":"2010","author":"Chen","year":"2010","journal-title":"EURASIP J. Wirel. Comm. Netw."},{"key":"10.1016\/j.pmcj.2014.01.007_br000055","doi-asserted-by":"crossref","unstructured":"L. Lazos, R. Poovendran, S. Capkun, ROPE: robust position estimation in wireless sensor networks, in: Proc. of IEEE IPSN, 2005.","DOI":"10.1109\/IPSN.2005.1440942"},{"key":"10.1016\/j.pmcj.2014.01.007_br000060","unstructured":"D. Liu, P. Ning, W. Du, Detecting malicious beacon nodes for secure localization discovery in wireless sensor networks, in: Proc. of IEEE ICDCS, 2005."},{"key":"10.1016\/j.pmcj.2014.01.007_br000065","unstructured":"Z. Li, W. Trappe, Y. Zhang, B. Nath, Robust statistical methods for securing wireless localization in sensor networks, in: Proc. of IEEE IPSN, 2005."},{"issue":"2","key":"10.1016\/j.pmcj.2014.01.007_br000070","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JSAC.2005.861394","article-title":"Wormhole attacks in wireless networks","volume":"24","author":"Hu","year":"2006","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.pmcj.2014.01.007_br000075","doi-asserted-by":"crossref","unstructured":"W. Wang, B. Bhargava, Visualization of wormholes in sensor networks, in: Proc. of ACM WiSec, 2004.","DOI":"10.1145\/1023646.1023657"},{"issue":"1","key":"10.1016\/j.pmcj.2014.01.007_br000080","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1057\/palgrave.ivs.9500144","article-title":"Interactive wormhole detection and evaluation","volume":"6","author":"Wang","year":"2007","journal-title":"Inf. Vis."},{"issue":"4","key":"10.1016\/j.pmcj.2014.01.007_br000085","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1002\/wcm.292","article-title":"Defending against wormhole attacks in mobile ad hoc networks","volume":"6","author":"Wang","year":"2006","journal-title":"Wireless Commun. Mobile Comput."},{"key":"10.1016\/j.pmcj.2014.01.007_br000090","doi-asserted-by":"crossref","unstructured":"S. Capkun, L. Buttyan, J.-P. Hubaux, SECTOR: secure tracking of node encounters in multi-hop wireless networks, in: Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.","DOI":"10.1145\/986858.986862"},{"key":"10.1016\/j.pmcj.2014.01.007_br000095","doi-asserted-by":"crossref","unstructured":"Y.C. Hu, A. Perrig, D.B. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, in: Proc. of ACM workshop on Wireless Security, 2003.","DOI":"10.1145\/941311.941317"},{"key":"10.1016\/j.pmcj.2014.01.007_br000100","doi-asserted-by":"crossref","unstructured":"J. Eriksson, S. Krishnamurthy, M. Faloutsos, TrueLink: a practical countermeasure to the wormhole attack in wireless networks, in: Proc. of IEEE Internation Conference on Network Protocols, ICNP, 2006.","DOI":"10.1109\/ICNP.2006.320200"},{"key":"10.1016\/j.pmcj.2014.01.007_br000105","unstructured":"Y. Xu, G. Chen, J. Ford, F. Makedon, Detecting wormhole attacks in wireless sensor networks, in: Proc. of IFIP, 2008."},{"key":"10.1016\/j.pmcj.2014.01.007_br000110","doi-asserted-by":"crossref","unstructured":"R. Maheshwari, J. Gao, S.R. Das, Detecting wormhole attacks in wireless networks using connectivity information, in: Proc. of IEEE Infocom, 2007.","DOI":"10.1109\/INFCOM.2007.21"},{"key":"10.1016\/j.pmcj.2014.01.007_br000115","doi-asserted-by":"crossref","unstructured":"X. Ban, R. Sarkar, J. Gao, Local connectivity tests to identify wormholes in wireless networks, in: Proc. of ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc, 2011.","DOI":"10.1145\/2107502.2107519"},{"issue":"6","key":"10.1016\/j.pmcj.2014.01.007_br000120","doi-asserted-by":"crossref","first-page":"1787","DOI":"10.1109\/TNET.2011.2163730","article-title":"Topological detection on wormholes in wireless ad hoc and sensor networks","volume":"19","author":"Dong","year":"2009","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.pmcj.2014.01.007_br000125","doi-asserted-by":"crossref","unstructured":"T. Dimitriou, A. Giannetsos, Wormholes no more? Localized wormhole detection and prevention in wireless networks, in: Proc. of the International Conference on Distributed Computing in Sensor Systems, DCOSS, 2010.","DOI":"10.1007\/978-3-642-13651-1_24"},{"key":"10.1016\/j.pmcj.2014.01.007_br000130","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/1077391.1077395","article-title":"SeRLoc: robust localization for wireless sensor networks","author":"Lazos","year":"2005","journal-title":"ACM Trans. Sensor Netw."},{"issue":"2","key":"10.1016\/j.pmcj.2014.01.007_br000135","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/JSAC.2005.861381","article-title":"HiRLoc: high-resolution robust localization for wireless sensor networks","volume":"24","author":"Lazos","year":"2006","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"10.1016\/j.pmcj.2014.01.007_br000140","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1380564.1380570","article-title":"Attack-resistant location estimation in wireless sensor networks","volume":"11","author":"Liu","year":"2008","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10.1016\/j.pmcj.2014.01.007_br000145","doi-asserted-by":"crossref","unstructured":"H. Chen, W. Lou, Z. Wang, A consistency-based secure localization scheme against wormhole attacks in WSNs, in: Proc. of the International Conference on Wireless Algorithms, Systems and Applications, WASA, 2009.","DOI":"10.1007\/978-3-642-03417-6_36"},{"key":"10.1016\/j.pmcj.2014.01.007_br000150","doi-asserted-by":"crossref","DOI":"10.1155\/2010\/627039","article-title":"A secure localization approach against wormhole attacks using distance consistency","author":"Chen","year":"2010","journal-title":"EURASIP J. Wirel. Comm. Netw."},{"key":"10.1016\/j.pmcj.2014.01.007_br000155","doi-asserted-by":"crossref","unstructured":"H. Chen, W. Lou, Z. Wang, Conflicting-set-based wormhole attack resistant localization in wireless sensor networks, in: Proc. 6th Int. Conf. on Ubiquitous Intelligence and Computing, UIC, 2009.","DOI":"10.1007\/978-3-642-02830-4_23"},{"key":"10.1016\/j.pmcj.2014.01.007_br000160","doi-asserted-by":"crossref","unstructured":"H. Chen, W. Lou, Z. Wang, Secure localization against wormhole attacks using conflicting sets, in: Proc. of IEEE International Performance Computing and Communications Conference, IPCCC, 2010.","DOI":"10.1109\/PCCC.2010.5682340"},{"key":"10.1016\/j.pmcj.2014.01.007_br000165","doi-asserted-by":"crossref","DOI":"10.1002\/wcm.2462","article-title":"On providing wormhole attack resistant localization using conflicting sets","author":"Chen","year":"2014","journal-title":"Wireless Commun. Mobile Comput."},{"key":"10.1016\/j.pmcj.2014.01.007_br000170","first-page":"449","article-title":"Distributed localization in wireless sensor networks: a quantitative comparison","author":"Langendoen","year":"2003","journal-title":"Comput. Netw."}],"container-title":["Pervasive and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119214000248?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119214000248?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,5,11]],"date-time":"2020-05-11T19:06:56Z","timestamp":1589224016000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1574119214000248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":34,"alternative-id":["S1574119214000248"],"URL":"https:\/\/doi.org\/10.1016\/j.pmcj.2014.01.007","relation":{},"ISSN":["1574-1192"],"issn-type":[{"value":"1574-1192","type":"print"}],"subject":[],"published":{"date-parts":[[2015,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Securing DV-Hop localization against wormhole attacks in wireless sensor networks","name":"articletitle","label":"Article Title"},{"value":"Pervasive and Mobile Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.pmcj.2014.01.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2014 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}