{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:59:52Z","timestamp":1725893992633},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642171963"},{"type":"electronic","value":"9783642171970"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17197-0_11","type":"book-chapter","created":{"date-parts":[[2010,11,22]],"date-time":"2010-11-22T15:35:06Z","timestamp":1290440106000},"page":"168-179","source":"Crossref","is-referenced-by-count":3,"title":["A Localization Game in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Nicola","family":"Gatti","sequence":"first","affiliation":[]},{"given":"Mattia","family":"Monga","sequence":"additional","affiliation":[]},{"given":"Sabrina","family":"Sicari","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"11_CR1","first-page":"102","volume":"40","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on wireless sensor network. IEEE Wireless Communications\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Wireless Communications"},{"issue":"7","key":"11_CR2","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1016\/j.comcom.2006.12.020","volume":"30","author":"P. Baronti","year":"2007","unstructured":"Baronti, P., Pillai, P., Chook, V.W.C., Chessa, S., Gotta, A., Hu, Y.F.: Wireless sensor networks: A survey on the state of the art and the 802.15.4 and zigbee standards. Computer Communications\u00a030(7), 1655\u20131695 (2007)","journal-title":"Computer Communications"},{"key":"11_CR3","unstructured":"Brands, S., Chaum, D.: Distance-bounding protocols. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol.\u00a0950. Springer, Heidelberg (1995)"},{"issue":"5","key":"11_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/98.878533","volume":"7","author":"N. Bulusu","year":"2000","unstructured":"Bulusu, N., Heidemann, J., Estrin, D.: GPS-less low-cost outdoor localization for very small devices. IEEE Personal Communications\u00a07(5), 28\u201334 (2000)","journal-title":"IEEE Personal Communications"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1023\/A:1013933626682","volume":"5","author":"S. \u010capkun","year":"2002","unstructured":"\u010capkun, S., Hamdi, M., Hubaux, J.-P.: GPS-free positioning in mobile ad-hoc networks. Cluster Computing\u00a05(2), 157\u2013167 (2002)","journal-title":"Cluster Computing"},{"issue":"2","key":"11_CR6","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1109\/JSAC.2005.861380","volume":"24","author":"S. \u010capkun","year":"2006","unstructured":"\u010capkun, S., Hubaux, J.P.: Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 221\u2013232 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"11_CR7","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/79.985676","volume":"19","author":"J. Chen","year":"2002","unstructured":"Chen, J., Yao, K., Hudson, R.: Source localization and beamforming. IEEE Signal Processing Magazine\u00a019(2), 30\u201339 (2002)","journal-title":"IEEE Signal Processing Magazine"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Doherty, L., Pister, K., Ghaoui, L.E.: Convex position estimation in wireless sensor networks. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM) (2001)","DOI":"10.1109\/INFCOM.2001.916662"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Gatti, N., Monga, M., Sicari, S.: Localization security in wireless sensor networks as a non-cooperative game. In: International Congress on Ultra Modern Telecommunications and Control Systems, ICUMT 2010, Moscow, Russia. IEEE, Los Alamitos (to appear, 2010) ISBN: 978-1-4244-7286-4","DOI":"10.1109\/ICUMT.2010.5676623"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/1667502.1667517","volume-title":"Proceedings of the 2nd SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS (SPRINGL 2009)","author":"M. Monga","year":"2009","unstructured":"Monga, M., Sicari, S.: On the impact of localization data in wireless sensor networks with malicious nodes. In: Kamra, A. (ed.) Proceedings of the 2nd SIGSPATIAL ACM GIS International Workshop on Security and Privacy in GIS and LBS (SPRINGL 2009), ACM SIGSPATIAL, pp. 63\u201370. ACM, New York (2009)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Niculescu, D., Nath, B.: Ad-hoc positioning system. In: Proceedings of the IEEE Global Communication Conference (GLOBECOM) (2001)","DOI":"10.1109\/GLOCOM.2001.965964"},{"key":"11_CR12","volume-title":"A course in game theory","author":"M. Osborne","year":"1994","unstructured":"Osborne, M., Rubinstein, A.: A course in game theory. MIT Press, Cambridge (1994)"},{"key":"11_CR13","unstructured":"Ramadurai, V., Sichitiu, M.: Localization in wireless sensor networks: A probabilistic approach. In: Proceedings of the International Conference on Wireless Networks (ICWN) (2003)"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Savvides, A., Park, H., Srivastava, M.: The bits and flops of the n-hop multilateration primitive for node localization problems. In: Proceedings of the ACM International Workshop on Wireless Sensor Networks and Application (WSNA) (2002)","DOI":"10.1145\/570738.570755"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"He, T., Huang, C., Blum, B.M., Stankovic, J.A., Abdelzaher, T.: Range-free localization schemes for large scale sensor networks. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (MOBICOM) (2003)","DOI":"10.1145\/938985.938995"},{"key":"11_CR16","unstructured":"Wessendorf, M.: The on-line encyclopedia of integer sequences, aT&T Labs Research (2002), \n                    \n                      http:\/\/www.research.att.com\/~njas\/sequences\/A067771"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17197-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T09:03:05Z","timestamp":1553245385000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17197-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642171963","9783642171970"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17197-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}