{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T04:05:21Z","timestamp":1772856321901,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"31","license":[{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T00:00:00Z","timestamp":1739750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-025-20683-8","type":"journal-article","created":{"date-parts":[[2025,2,17]],"date-time":"2025-02-17T19:39:47Z","timestamp":1739821187000},"page":"37845-37864","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Joint trust-based detection and signature-based authentication technique for secure localization in underwater wireless sensor network"],"prefix":"10.1007","volume":"84","author":[{"given":"Manni","family":"Kumar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nitin","family":"Goyal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ramy Mohammed Aiesh","family":"Qaisi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohd","family":"Najim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sachin Kumar","family":"Gupta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,2,17]]},"reference":[{"issue":"17","key":"20683_CR1","doi-asserted-by":"publisher","first-page":"e3350","DOI":"10.1002\/dac.3350","volume":"30","author":"G Tuna","year":"2017","unstructured":"Tuna G, Gungor VC (2017) A survey on deployment techniques, localization algorithms, and research challenges for underwater acoustic sensor networks. Int J Commun Syst 30(17):e3350","journal-title":"Int J Commun Syst"},{"key":"20683_CR2","doi-asserted-by":"crossref","unstructured":"Shanthi MB, Anvekar DK (2018) Secure localization for underwater wireless sensor networks based on a probabilistic approach. In: 2018 IEEE second international conference on advances in electronics, computers, and communications (ICAECC).\u00a0Bangalore, India, pp 1\u20136","DOI":"10.1109\/ICAECC.2018.8479451"},{"issue":"3","key":"20683_CR3","first-page":"153","volume":"5","author":"V Shukla","year":"2018","unstructured":"Shukla V, Kumar A, Bhan V (2018) Minimizing the Energy Consumption Using a Secure Recursive Localization Approach for Distributed Networks in Underwater Acoustic Wireless Sensor Networks. Int J Sci Res Math Stat Sci 5(3):153\u2013159","journal-title":"Int J Sci Res Math Stat Sci"},{"key":"20683_CR4","doi-asserted-by":"publisher","first-page":"108157","DOI":"10.1016\/j.engappai.2024.108157","volume":"133","author":"M Dong","year":"2024","unstructured":"Dong M, Li H, Qin Y, Hu Y, Huang H (2024) A secure and accurate localization algorithm for mobile nodes in underwater acoustic network. Eng Appl Artif Intell 133:108157","journal-title":"Eng Appl Artif Intell"},{"issue":"1","key":"20683_CR5","doi-asserted-by":"publisher","first-page":"1444024","DOI":"10.1155\/2021\/1444024","volume":"2021","author":"I Ahmad","year":"2021","unstructured":"Ahmad I, Rahman T, Zeb A, Khan I, Ullah I, Hamam H, Cheikhrouhou O (2021) Analysis of security attacks and taxonomy in underwater wireless sensor networks. Wirel Commun Mob Comput 2021(1):1444024","journal-title":"Wirel Commun Mob Comput"},{"issue":"11","key":"20683_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MCOM.2015.7321972","volume":"53","author":"H Li","year":"2015","unstructured":"Li H, He Y, Cheng X, Zhu H, Sun L (2015) Security and privacy in localization for underwater sensor networks. IEEE Commun Mag 53(11):56\u201362","journal-title":"IEEE Commun Mag"},{"key":"20683_CR7","doi-asserted-by":"publisher","first-page":"7852","DOI":"10.1109\/ACCESS.2021.3140038","volume":"10","author":"P Sharma","year":"2021","unstructured":"Sharma P, Singh RP, Mohammed MA, Shah R, Nedoma J (2021) A survey on holes problem in wireless underground sensor networks. IEEE Access 10:7852\u20137880","journal-title":"IEEE Access"},{"key":"20683_CR8","first-page":"100731","volume":"35","author":"Y Yang","year":"2022","unstructured":"Yang Y, Wu Y, Yuan H, Khishe M, Mohammadi M (2022) Nodes clustering and multi-hop routing protocol optimization using hybrid chimp optimization and hunger games search algorithms for sustainable energy efficient underwater wireless sensor networks. Sustain Comput: Inf Syst 35:100731","journal-title":"Sustain Comput: Inf Syst"},{"issue":"3","key":"20683_CR9","doi-asserted-by":"publisher","first-page":"379","DOI":"10.4218\/etrij.2022-0036","volume":"45","author":"A Kumar","year":"2023","unstructured":"Kumar A, Kumar P (2023) An improved sparsity-aware normalized least-mean-square scheme for underwater communication. ETRI J 45(3):379\u2013393","journal-title":"ETRI J"},{"key":"20683_CR10","doi-asserted-by":"crossref","unstructured":"Draz U, Ali T, Ahmad Zafar N, Saeed Alwadie A, Irfan M, Yasin S, ... Khan Khattak MA (2021) Energy efficient watchman-based flooding algorithm for IoT\u2010enabled underwater wireless sensor and actor networks. ETRI J, 43(3), 414\u2013426","DOI":"10.4218\/etrij.2019-0591"},{"key":"20683_CR11","doi-asserted-by":"crossref","unstructured":"Guqhaiman A, Akanbi O, Aljaedi A, Chow CE (2020) Lightweight multi-factor authentication for underwater wireless sensor networks. In: 2020 IEEE international conference on computational science and computational intelligence (CSCI).\u00a0Las Vegas, NV, USA, pp 188\u2013194","DOI":"10.1109\/CSCI51800.2020.00039"},{"key":"20683_CR12","doi-asserted-by":"crossref","unstructured":"Wang H, Wen Y, Lu Y, Zhao D, Ji C (2019) Secure localization algorithms in wireless sensor networks: a review. Advances in computer communication and computational sciences: Proceedings of IC4S 2017, vol 2. pp 543\u2013553","DOI":"10.1007\/978-981-13-0344-9_47"},{"issue":"4","key":"20683_CR13","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MCOM.2008.4481347","volume":"46","author":"A Boukerche","year":"2008","unstructured":"Boukerche A, Oliveira HA, Nakamura EF, Loureiro AA (2008) Secure localization algorithms for wireless sensor networks. IEEE Commun Mag 46(4):96\u2013101","journal-title":"IEEE Commun Mag"},{"key":"20683_CR14","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.future.2021.06.039","volume":"125","author":"R Goyat","year":"2021","unstructured":"Goyat R, Kumar G, Alazab M, Saha R, Thomas R, Rai MK (2021) A secure localization scheme based on trust assessment for WSNs using blockchain technology. Futur Gener Comput Syst 125:221\u2013231","journal-title":"Futur Gener Comput Syst"},{"key":"20683_CR15","doi-asserted-by":"publisher","unstructured":"Svendsen B, Kadry S (2024) A dataset for recognition of norwegian sign language. International Journal of Mathematics, Statistics, and Computer Science 2.\u00a0https:\/\/doi.org\/10.59543\/ijmscs.v2i.8049","DOI":"10.59543\/ijmscs.v2i.8049"},{"key":"20683_CR16","doi-asserted-by":"publisher","unstructured":"Nguyen TN, Le VV, Chu SI, Liu BH, Hsu YC (2022) Secure localization algorithms against localization attacks in wireless sensor networks.\u00a0Wirel Pers Commun 127:767\u2013792. https:\/\/doi.org\/10.1007\/s11277-021-08404-4","DOI":"10.1007\/s11277-021-08404-4"},{"issue":"2","key":"20683_CR17","doi-asserted-by":"publisher","first-page":"229","DOI":"10.3390\/s16020229","volume":"16","author":"G Han","year":"2016","unstructured":"Han G, Liu L, Jiang J, Shu L, Rodrigues JJ (2016) A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks. Sensors 16(2):229","journal-title":"Sensors"},{"key":"20683_CR18","first-page":"1535","volume":"7","author":"MB Shanthi","year":"2019","unstructured":"Shanthi MB, Anvekar DK (2019) Secure localization in UWSN using combined approach of PSO and GD methods. J Recent Technol Eng 7:1535\u20131538","journal-title":"J Recent Technol Eng"},{"key":"20683_CR19","doi-asserted-by":"crossref","unstructured":"Hu X, Tan W, Yan J, Ma C (2020) Security and improvement of aggregate signature scheme for underwater wireless sensor networks and certificateless aggregate signature scheme for vehicular ad hoc networks. In: 2020 IEEE 5th international conference on mechanical, control and computer engineering (ICMCCE). Harbin, China, pp 574\u2013577","DOI":"10.1109\/ICMCCE51767.2020.00129"},{"key":"20683_CR20","doi-asserted-by":"publisher","first-page":"1880","DOI":"10.1109\/TIFS.2020.3045320","volume":"16","author":"J Yan","year":"2020","unstructured":"Yan J, Meng Y, Yang X, Luo X, Guan X (2020) Privacy-preserving localization for underwater sensor networks via deep reinforcement learning. IEEE Trans Inf Forensics Secur 16:1880\u20131895","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"3","key":"20683_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3476513","volume":"18","author":"M Elhoseny","year":"2022","unstructured":"Elhoseny M, Lakhan A, Rashid A, Mohammed M, Abdulkareem K (2022) Underwater Sensor Multi-Parameter Scheduling for Heterogenous Computing Nodes. ACM Trans Sensor Networks (TOSN) 18(3):1\u201323","journal-title":"ACM Trans Sensor Networks (TOSN)"},{"key":"20683_CR22","doi-asserted-by":"publisher","unstructured":"Misra S, Ojha T (2021) SecRET: secure range-based localization with evidence theory for underwater sensor networks. ACM Transactions on Autonomous and Adaptive Systems (TAAS) 15(1):1\u201326.\u00a0https:\/\/doi.org\/10.1145\/3431390","DOI":"10.1145\/3431390"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20683-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-025-20683-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-025-20683-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T09:43:29Z","timestamp":1758102209000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-025-20683-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,17]]},"references-count":22,"journal-issue":{"issue":"31","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["20683"],"URL":"https:\/\/doi.org\/10.1007\/s11042-025-20683-8","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,17]]},"assertion":[{"value":"23 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Ethical approval is not applicable for this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"The authors declare that they have no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}