{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:25:38Z","timestamp":1725715538300},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362514"},{"type":"electronic","value":"9783642362521"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36252-1_67","type":"book-chapter","created":{"date-parts":[[2013,2,9]],"date-time":"2013-02-09T04:16:01Z","timestamp":1360383361000},"page":"715-724","source":"Crossref","is-referenced-by-count":1,"title":["A Secure DV-Hop Localization Algorithm Based on Secure Beacon Nodes"],"prefix":"10.1007","author":[{"given":"Jinfa","family":"Zhong","sequence":"first","affiliation":[]},{"given":"Li","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Haifeng","family":"Hu","sequence":"additional","affiliation":[]},{"given":"A\u2019yong","family":"Ye","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"67_CR1","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/S1389-1286(03)00356-6","volume":"43","author":"K. Langendoen","year":"2003","unstructured":"Langendoen, K., Reijers, N.: Distributed localization in wireless sensor networks: a quantitative comparison. Comput. Netw.\u00a043, 499\u2013518 (2003)","journal-title":"Comput. Netw."},{"key":"67_CR2","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/313451.313476","volume-title":"Proceedings of the 5th Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom 1999)","author":"A. Harter","year":"1999","unstructured":"Harter, A., Hopper, A., Steggles, P., Ward, A., Webster, P.: The anatomy of a context-aware application. In: Proceedings of the 5th Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom 1999), pp. 59\u201368. ACM, New York (1999)"},{"key":"67_CR3","first-page":"1312","volume-title":"Proc. of the Intelligent Robots and Systems (IROS 2001)","author":"L. Girod","year":"2001","unstructured":"Girod, L., Estrin, D.: Robust range estimation using acoustic and multimodal sensing. In: Proc. of the Intelligent Robots and Systems (IROS 2001), vol.\u00a03, pp. 1312\u20131320. IEEE Robotics and Automation Society, Maui (2001)"},{"key":"67_CR4","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1109\/ICCD.2002.1106773","volume-title":"Proc. of the Computer Design: VLSI in Computers and Processors","author":"L. Girod","year":"2002","unstructured":"Girod, L., Bychovkiy, V., Elson, J., Estrin, D.: Locating tiny sensors in time and space: A case study. In: Proc. of the Computer Design: VLSI in Computers and Processors, pp. 214\u2013219. IEEE Computer Society, Freiburg (2002)"},{"key":"67_CR5","first-page":"1","volume-title":"Proc. of the 7th Annual Intl. Conf. on Mobile Computing and Networking","author":"N.B. Priyantha","year":"2001","unstructured":"Priyantha, N.B., Akl, M., Balakrishnan, H., Teller, S.: The cricket compass for context-aware mobile applications. In: Proc. of the 7th Annual Intl. Conf. on Mobile Computing and Networking, pp. 1\u201314. ACM Press, Rome (2001)"},{"issue":"5","key":"67_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/98.878533","volume":"7","author":"N. Bulusu","year":"2000","unstructured":"Bulusu, N., Heidemann, J., Estrin, D.: GPS-Less low cost outdoor localization for very mall devices. IEEE Personal Communications\u00a07(5), 28\u201334 (2000)","journal-title":"IEEE Personal Communications"},{"issue":"1\/4","key":"67_CR7","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1023\/A:1023403323460","volume":"22","author":"D. Niculescu","year":"2003","unstructured":"Niculescu, D., Nath, B.: DV based positioning in ad hoc networks. Journal of Telecommunication Systems\u00a022(1\/4), 267\u2013280 (2003)","journal-title":"Journal of Telecommunication Systems"},{"key":"67_CR8","first-page":"1655","volume-title":"Proc. of the IEEE INFOCOM 2001","author":"L. Doherty","year":"2001","unstructured":"Doherty, L., Pister, K.S.J., Ghaoui, L.E.: Convex position estimation in wireless sensor networks. In: Proc. of the IEEE INFOCOM 2001, vol.\u00a03, pp. 1655\u20131663. IEEE Computer and Communications Societies, Anchorage (2001)"},{"key":"67_CR9","first-page":"81","volume-title":"Proc. of the 9th Annual Intl. Conf. on Mobile Computing and Networking","author":"T. He","year":"2003","unstructured":"He, T., Huang, C.D., Blum, B.M., et al.: Range-Free localization schemes in large scale sensor networks. In: Proc. of the 9th Annual Intl. Conf. on Mobile Computing and Networking, pp. 81\u201395. ACM Press, San Diego (2003)"},{"key":"67_CR10","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1145\/778415.778439","volume-title":"Proc. of the 4th ACM Intl. Symp. on Mobile Ad Hoc Networking & Computing","author":"Y. Shang","year":"2003","unstructured":"Shang, Y., Ruml, W., Zhang, Y., Fromherz, M.P.J.: Localization from mere connectivity. In: Proc. of the 4th ACM Intl. Symp. on Mobile Ad Hoc Networking & Computing, pp. 201\u2013212. ACM Press, Annapolis (2003)"},{"issue":"5","key":"67_CR11","doi-asserted-by":"publisher","first-page":"857","DOI":"10.1360\/jos160857","volume":"16","author":"F. Wang","year":"2005","unstructured":"Wang, F., Shi, L., Ren, F.: Self-Localization Systems and Algorithms for Wireless Sensor Networks. Journal of Software\u00a016(5), 857\u2013868 (2005)","journal-title":"Journal of Software"},{"key":"67_CR12","unstructured":"Cao, X., Yu, B., Chen, G., Ren, F.: Security Analysis on Node Localization Systems of Wireless Sensor Networks. Journal of Software, 869\u2013877 (2008)"},{"key":"67_CR13","first-page":"609","volume-title":"Proc. of International Conference on Distributed Computing Systems","author":"D. Liu","year":"2005","unstructured":"Liu, D., Ning, P., Du, W.: Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: Proc. of International Conference on Distributed Computing Systems, pp. 609\u2013619. IEEE, Columbus (2005)"},{"key":"67_CR14","unstructured":"Hu, Y.C., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of IEEE Infocom, 1976C\u20131986C (2003)"}],"container-title":["Communications in Computer and Information Science","Advances in Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36252-1_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T00:37:49Z","timestamp":1557535069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36252-1_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362514","9783642362521"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36252-1_67","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}