{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T16:40:03Z","timestamp":1748709603363,"version":"3.41.0"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319257433"},{"type":"electronic","value":"9783319257440"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25744-0_2","type":"book-chapter","created":{"date-parts":[[2015,11,29]],"date-time":"2015-11-29T12:46:38Z","timestamp":1448801198000},"page":"18-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of Location Spoofing Identification in Cellular Networks"],"prefix":"10.1007","author":[{"given":"Yuxin","family":"Wei","sequence":"first","affiliation":[]},{"given":"Dawei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., Wagner, D.: Secure verification of location claims. In: Proceedings of ACM workshop on Wireless Security, pp. 1\u201310 (2003)","DOI":"10.1145\/941312.941313"},{"key":"2_CR2","first-page":"1917","volume":"3","author":"S Capkun","year":"2005","unstructured":"Capkun, S., Hubaux, J.: Secure positioning of wireless devices with application to sensor networks. Proc. IEEE INFOCOM 3, 1917\u20131928 (2005)","journal-title":"Proc. IEEE INFOCOM"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Anjum, F., Pandey, S., Agrawal, P.: Secure localization in sensor networks using transmission range variation. In: Proceedings of IEEE MASS, pp. 195\u2013203 (2005)","DOI":"10.1109\/MAHSS.2005.1542800"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Wang, T., Yang, Y.: Analysis on perfect location spoofing attacks using beamforming. In: Proceedings of IEEE INFOCOM, pp. 2778\u20132786 (2013)","DOI":"10.1109\/INFCOM.2013.6567087"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Liu, D.: Identifying malicious attacks to wireless localization in bad channel conditions. In: Proceedings of IEEE International Workshop on Mission-Oriented Wireless Sensor Networking (MiSeNet), pp. 636\u2013641 (2014)","DOI":"10.1109\/MASS.2014.115"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1109\/JSAC.2005.863855","volume":"24","author":"Y Zhang","year":"2006","unstructured":"Zhang, Y., Liu, W., Fang, Y., Wu, D.: Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Sel. Areas Commun. 24(4), 829\u2013835 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"3","key":"2_CR7","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1109\/TWC.2002.800542","volume":"1","author":"L Cong","year":"2002","unstructured":"Cong, L., Zhuang, W.: Hybrid TDOA\/AOA mobile user location for wideband CDMA cellularsystems. IEEE Trans. Wirel. Commun. 1(3), 439\u2013447 (2002)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"2_CR8","unstructured":"Liu, D., Ning, P., Du, W.: Attack-resistant location estimation in sensor networks. In: Proceedings of ACM\/IEEE IPSN 2005, pp, 99\u2013106 (2005)"},{"issue":"4","key":"2_CR9","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1109\/TMC.2007.70782","volume":"7","author":"S Capkun","year":"2008","unstructured":"Capkun, S., Rasmussen, K., Cagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. IEEE Trans. Mob. Comput. 7(4), 470\u2013483 (2008)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"4","key":"2_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2005.1458275","volume":"22","author":"A Sayed","year":"2005","unstructured":"Sayed, A., Tarighat, A., Khajehnouri, N.: Network-based wireless location: challenges faced in developing techniques for accurate wireless location information. IEEE Sig. Process. Mag. 22(4), 24\u201340 (2005)","journal-title":"IEEE Sig. Process. Mag."},{"issue":"4","key":"2_CR11","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1109\/TVT.2013.2244928","volume":"62","author":"D Liu","year":"2013","unstructured":"Liu, D., Lee, M.C., Pun, C.M., Liu, H.: Analysis of wireless localization in nonline-of-sight conditions. IEEE Trans. Veh. Technol. 62(4), 1484\u20131492 (2013)","journal-title":"IEEE Trans. Veh. Technol."}],"container-title":["Lecture Notes in Computer Science","Mobile, Secure, and Programmable Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25744-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T16:00:09Z","timestamp":1748707209000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25744-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319257433","9783319257440"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25744-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"25 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}