{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:38Z","timestamp":1761401918103,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811063879"},{"type":"electronic","value":"9789811063886"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6388-6_17","type":"book-chapter","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T14:13:30Z","timestamp":1505484810000},"page":"198-211","source":"Crossref","is-referenced-by-count":5,"title":["A Novel Range-Free Jammer Localization Solution in Wireless Network by Using PSO Algorithm"],"prefix":"10.1007","author":[{"given":"Liang","family":"Pang","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Rida","family":"Khatoun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,16]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Wood, A.D., Stankovic, J.A., Son, S.H.: JAM: a jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium, RTSS 2003, pp. 286\u2013297 (2003)","DOI":"10.1109\/REAL.2003.1253275"},{"key":"17_CR2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/SURV.2009.090403","volume":"11","author":"FF Jrme Hrri","year":"2009","unstructured":"Jrme Hrri, F.F.: Mobility models for vehicular ad hoc networks: a survey and taxonomy. IEEE Commun. Surv. Tutorials 11, 19\u201341 (2009)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: ACM International Symposium on Mobile Ad-hoc Networking and Computing, MobiHoc 2005, p. 46 (2005)","DOI":"10.1145\/1062689.1062697"},{"key":"17_CR4","first-page":"1593","volume":"13","author":"JB Schmitt","year":"2013","unstructured":"Schmitt, J.B., Giustiniano, D.: Detection of reactive jamming in DSSS-based wireless networks detection of reactive jamming in DSSS-based wireless networks. IEEE Trans. Wirel. Commun. 13, 1593\u20131603 (2013)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"17_CR5","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1007\/s40815-015-0009-4","volume":"17","author":"E Sasikala","year":"2015","unstructured":"Sasikala, E., Rengarajan, N.: An intelligent technique to detect jamming attack in wireless sensor networks (WSNs). Int. J. Fuzzy Syst. 17, 76\u201383 (2015)","journal-title":"Int. J. Fuzzy Syst."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Siddhabathula, K.: Fast jamming detection in wireless sensor networks. In: IEEE International Conference on Communications, pp. 934\u2013938 (2010)","DOI":"10.1109\/ICC.2012.6363672"},{"key":"17_CR7","doi-asserted-by":"crossref","first-page":"3444","DOI":"10.3390\/s100403444","volume":"10","author":"S Misra","year":"2010","unstructured":"Misra, S., Singh, R., Mohan, S.V.R.: Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system. Sensors 10, 3444\u20133479 (2010)","journal-title":"Sensors"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Muraleedharan, R., Osadciw, L.A.: Jamming attack detection and countermeasures in wireless sensor network using ant system. In: Proceedings of the SPIE - International Society for Optical Engineering, vol. 6248, pp. 62480G\u201362480G-12 (2006)","DOI":"10.1117\/12.666330"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Liu, Q., Yin, J., Yu, S.: A bio-inspired jamming detection and restoration for WMNs: in view of adaptive immunology (2013)","DOI":"10.1007\/978-3-319-03584-0_18"},{"key":"17_CR10","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1109\/TCOM.1984.1096025","volume":"32","author":"RL Pickholtz","year":"1984","unstructured":"Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Revisions to \u201ctheory of spread-spectrum communications - a tutorial\u201d. IEEE Trans. Commun. 32, 211\u2013212 (1984)","journal-title":"IEEE Trans. Commun."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Agalj, M., Apkun, S., Hubaux, J.P.: Wormhole-based antijamming techniques in sensor networks. IEEE Educational Activities Department (2007)","DOI":"10.1109\/TMC.2007.250674"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Xu, W.: Channel surfing: defending wireless sensor networks from interference. In: 2007 6th International Symposium on Information Processing in Sensor Networks, pp. 499\u2013508 (2007)","DOI":"10.1145\/1236360.1236423"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Xu, W., Trappe, W., Zhang, Y.: Anti-jamming timing channels for wireless networks. In: Proceedings of the first ACM Conference on Wireless Network Security - WiSec 2008, p. 203 (2008)","DOI":"10.1145\/1352533.1352567"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Vadlamani, S., Eksioglu, B., Medal, H., Nandi, A.: Jamming attacks on wireless networks: a taxonomic survey (2016)","DOI":"10.1016\/j.ijpe.2015.11.008"},{"key":"17_CR15","first-page":"293","volume":"71","author":"AA Hussein","year":"2015","unstructured":"Hussein, A.A., Rahman, T.A., Leow, C.Y.: A survey and open issues of jammer localization techniques in wireless sensor networks. J. Theor. Appl. Inf. Technol. 71, 293\u2013301 (2015)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Bahl, P., Padmanabhan, V.N.: RADAR: An in-building RF based user location and tracking system. In: Proceedings IEEE INFOCOM 2000, Conference on Computer Communications, Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No. 00CH37064), pp. 775\u2013784 (2000)","DOI":"10.1109\/INFCOM.2000.832252"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Elnahrawy, E., Li, X., Martin, R.P.: The limits of localization using signal strength: a comparative study. In: 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004, pp. 406\u2013414 (2004)","DOI":"10.1109\/SAHCN.2004.1381942"},{"key":"17_CR18","volume-title":"Global Positioning System: Signal, Measurements, and Performance","author":"P Misra","year":"2006","unstructured":"Misra, P., Enge, P.: Global Positioning System: Signal, Measurements, and Performance. Ganga-Jamuna Press, Lincoln (2006)"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Yang, Z., Ekici, E., Xuan, D.: A localization-based anti-sensor network system. In: Proceedings of IEEE INFOCOM, pp. 2396\u20132400 (2007)","DOI":"10.1109\/INFCOM.2007.288"},{"key":"17_CR20","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/98.878533","volume":"7","author":"N Bulusu","year":"2000","unstructured":"Bulusu, N., Heidermann, J., Estrin, D.: GPS-less low-cost outdoor localization for very small devices. IEEE Pers. Commun. 7, 28\u201334 (2000). Special Issue on Smart Spaces and Environment","journal-title":"IEEE Pers. Commun."},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Blumenthal, J., Grossmann, R., Golatowski, F., Timmermann, D.: Weighted centroid localization in Zigbee-based sensor networks. In: IEEE International Symposium on Intelligent Signal Processing, pp. 1\u20136 (2007)","DOI":"10.1109\/WISP.2007.4447528"},{"key":"17_CR22","unstructured":"Liu, H., Xu, W., Chen, Y., Liu, Z.: Localizing jammers in wireless networks. In: 7th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, pp. 1\u20136. IEEE (2009)"},{"key":"17_CR23","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.peva.2015.01.003","volume":"87","author":"L Mokdad","year":"2015","unstructured":"Mokdad, L., Ben-Othman, J., Nguyen, A.T.: DJAVAN: detecting jamming attacks in vehicle ad hoc networks. Perform. Eval. 87, 47\u201359 (2015)","journal-title":"Perform. Eval."},{"key":"17_CR24","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.comcom.2016.04.009","volume":"86","author":"K Pelechrinis","year":"2016","unstructured":"Pelechrinis, K., Koutsopoulos, I., Broustis, I., Krishnamurthy, S.V.: Jammer localization in wireless networks: an experimentation-driven approach. Comput. Commun. 86, 75\u201385 (2016)","journal-title":"Comput. Commun."},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"He, T., Huang, C., Blum, B.M., Stankovic, J.A., Abdelzaher, T.: Range-free localization schemes for large scale sensor networks. In: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (2003)","DOI":"10.1145\/938985.938995"},{"key":"17_CR26","first-page":"735","volume":"20","author":"Y Sun","year":"2011","unstructured":"Sun, Y., Wang, X., Zhou, X.: Jammer localization for wireless sensor networks. Chin. J. Electron. 20, 735\u2013738 (2011)","journal-title":"Chin. J. Electron."},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Poli, R., Kennedy, J., Blackwell, T.: Particle swarm optimization. In: Swarm Intelligence Symposium, SIS 2007, pp. 120\u2013127. IEEE (2007)","DOI":"10.1007\/s11721-007-0002-0"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Kennedy, J.: The particle swarm: social adaptation of knowledge. In: Proceedings of 1997 IEEE International Conference on Evolutionary Computation, ICEC 1997, pp. 303\u2013308 (1997)","DOI":"10.1109\/ICEC.1997.592326"},{"key":"17_CR29","doi-asserted-by":"crossref","unstructured":"Eberhart, R., Kennedy, J.: A new optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micro Machine and Human Science, pp. 39\u201343 (1995)","DOI":"10.1109\/MHS.1995.494215"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6388-6_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T19:27:00Z","timestamp":1750879620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6388-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811063879","9789811063886"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6388-6_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}