{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:22:37Z","timestamp":1773616957485,"version":"3.50.1"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,11,9]],"date-time":"2010-11-09T00:00:00Z","timestamp":1289260800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11227-010-0501-4","type":"journal-article","created":{"date-parts":[[2010,11,8]],"date-time":"2010-11-08T14:09:08Z","timestamp":1289225348000},"page":"685-701","source":"Crossref","is-referenced-by-count":71,"title":["Secure localization and location verification in wireless sensor networks: a survey"],"prefix":"10.1007","volume":"64","author":[{"given":"Yingpei","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Jiannong","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Jue","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Shigeng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,11,9]]},"reference":[{"issue":"4","key":"501_CR1","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I Akyildiz","year":"2002","unstructured":"Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393\u2013422","journal-title":"Comput Netw"},{"key":"501_CR2","unstructured":"Anderson R, Kuhn M (1996) Tamper resistance\u2014a cautionary note. In: Proceedings of the second usenix workshop on electronic commerce"},{"key":"501_CR3","doi-asserted-by":"crossref","unstructured":"Anjum F, Pandey S, Agrawal P (2005) Secure localization in sensor networks using transmission range variation. In: Proceedings of MASS","DOI":"10.1109\/MAHSS.2005.1542800"},{"key":"501_CR4","doi-asserted-by":"crossref","unstructured":"Becher A, Benenson Z, Dornseif M (2006) Tampering with motes: real-world physical attacks on wireless sensor networks. In: Proceedings of third international conference on security in pervasive computing (SPC \u201906)","DOI":"10.1007\/11734666_9"},{"issue":"4","key":"501_CR5","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MCOM.2008.4481347","volume":"46","author":"A Boukerche","year":"2008","unstructured":"Boukerche A, Oliveira H, Nakamura E, Loureiro A (2008) Secure localization algorithms for wireless sensor networks. IEEE Commun Mag 46(4):96\u2013101","journal-title":"IEEE Commun Mag"},{"key":"501_CR6","unstructured":"Brands S, Chaum D (1993) Distance-bounding protocols. In: Proceedings of EUROCRYPT"},{"key":"501_CR7","doi-asserted-by":"crossref","unstructured":"Capkun S, Hubaux JP (2005) Secure positioning of wireless devices with application to sensor networks. In: Proceedings of INFOCOM","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"501_CR8","doi-asserted-by":"crossref","unstructured":"Capkun S, Hubaux JP (2006) Secure positioning in wireless networks. IEEE J Sel Areas Commun. doi: 10.1109\/JSAC.2005.861380","DOI":"10.1109\/JSAC.2005.861380"},{"key":"501_CR9","doi-asserted-by":"crossref","unstructured":"Capkun S, Cagalj M, Srivastava M (2006) Securing localization with hidden and mobile base stations. In: Proceedings of INFOCOM","DOI":"10.1109\/INFOCOM.2006.302"},{"issue":"4","key":"501_CR10","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1109\/TMC.2007.70782","volume":"7","author":"S Capkun","year":"2008","unstructured":"Capkun S, Rasmussen K, Cagalj M, Srivastava M (2008) Secure location verification with hidden and mobile base stations. IEEE Trans Mobile Comput 7(4):470\u2013483","journal-title":"IEEE Trans Mobile Comput"},{"key":"501_CR11","doi-asserted-by":"crossref","unstructured":"Chandran N, Goyal V, Moriarty R, Ostrovsky R (2009) Position based cryptography. In: Proceedings of CRYPTO","DOI":"10.1007\/978-3-642-03356-8_23"},{"key":"501_CR12","unstructured":"Du W, Fang L, Ning P (2005) LAD: Localization anomaly detection forwireless sensor networks. In: Proceedings of IPDPS"},{"key":"501_CR13","doi-asserted-by":"crossref","unstructured":"Ekici E, Mcnair J, Al-Abri D (2006) A probabilistic approach to location verification in wireless sensor networks. In: Proceedings of ICC","DOI":"10.1109\/ICC.2006.255612"},{"issue":"2","key":"501_CR14","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.adhoc.2006.11.006","volume":"6","author":"E Ekici","year":"2008","unstructured":"Ekici E, Vural S, McNair J, Al-Abri D (2008) Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Netw 6(2):195\u2013209","journal-title":"Ad Hoc Netw"},{"issue":"3","key":"501_CR15","first-page":"72","volume":"7","author":"AT Ferreres","year":"2008","unstructured":"Ferreres AT, Alvarez B, Garnacho A (2008) Guaranteeing the authenticity of location information. IEEE Personal Commun Mag 7(3):72\u201380","journal-title":"IEEE Personal Commun Mag"},{"key":"501_CR16","doi-asserted-by":"crossref","DOI":"10.1002\/9781118723203","volume-title":"Practical methods of optimization","author":"R Fletcher","year":"2000","unstructured":"Fletcher R (2000) Practical methods of optimization, 2nd edn. Wiley, New York","edition":"2"},{"key":"501_CR17","doi-asserted-by":"crossref","unstructured":"Goldenberg DK, Bihler P, Cao M, Fang J, Anderson BDO, Morse AS, Yang YR (2006) Localization in sparse networks using sweeps. In: Proceedings of MobiCom","DOI":"10.1145\/1161089.1161103"},{"key":"501_CR18","doi-asserted-by":"crossref","unstructured":"He T, Huang C, Blum BM, Stankovic JA, Abdelzaher T (2003) Range-free localization schemes for large scale sensor networks. In: Proceedings of MobiCom","DOI":"10.1145\/938985.938995"},{"issue":"7","key":"501_CR19","doi-asserted-by":"crossref","first-page":"1050","DOI":"10.1109\/TPDS.2008.166","volume":"20","author":"D He","year":"2009","unstructured":"He D, Cui L, Huang H, Ma M (2009) Design and verification of enhanced secure localization scheme in wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(7):1050\u20131058","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"501_CR20","doi-asserted-by":"crossref","unstructured":"Hu Y, Perrig A, Johnson D (2003) Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of INFOCOM","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"501_CR21","doi-asserted-by":"crossref","unstructured":"Hwang J, He T, Kim Y (2007) Detecting phantom nodes in wireless sensor networks. In: Proceedings of INFOCOM","DOI":"10.1109\/INFCOM.2007.287"},{"key":"501_CR22","doi-asserted-by":"crossref","unstructured":"Jian L, Yang Z, Liu Y (2010) Beyond triangle inequality: Sifting noisy and outlier distance measurements for localization. In: Proceedings of INFOCOM","DOI":"10.1109\/INFCOM.2010.5462019"},{"key":"501_CR23","doi-asserted-by":"crossref","unstructured":"Karp B, Kung HT (2000) GPSR: greedy perimeter stateless routing for wireless networks. In: Proceedings of MobiCom","DOI":"10.1145\/345910.345953"},{"key":"501_CR24","doi-asserted-by":"crossref","unstructured":"Kindberg T, Zhang K, Shankar N (2002) Context authentication using constrained channels. In: Proceedings of WMCSA","DOI":"10.1109\/MCSA.2002.1017481"},{"key":"501_CR25","doi-asserted-by":"crossref","unstructured":"Kiyavash N, Koushanfar F (2007) Anti-collusion position estimation in wireless sensor networks. In: Proceedings of MASS","DOI":"10.1109\/MOBHOC.2007.4428647"},{"issue":"4","key":"501_CR26","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1016\/S1389-1286(03)00356-6","volume":"43","author":"K Langendoen","year":"2003","unstructured":"Langendoen K, Reijers N (2003) Distributed localization in wireless sensor networks: a quantitative comparison. Comput Netw 43(4):499\u2013518","journal-title":"Comput Netw"},{"key":"501_CR27","doi-asserted-by":"crossref","unstructured":"Lazos L, Poovendran R (2004) SeRLoc: Secure range-independent localization for wireless sensor networks. In: Proceedings of ACM WiSe","DOI":"10.1145\/1023646.1023650"},{"issue":"2","key":"501_CR28","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/JSAC.2005.861381","volume":"24","author":"L Lazos","year":"2006","unstructured":"Lazos L, Poovendran R (2006) HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J Sel Areas Commun 24(2):233\u2013246","journal-title":"IEEE J Sel Areas Commun"},{"key":"501_CR29","doi-asserted-by":"crossref","unstructured":"Lazos L, Poovendran R, Capkun S (2005) ROPE: robust position estimation in wireless sensor networks. In: Proceedings of IPSN","DOI":"10.1109\/IPSN.2005.1440942"},{"issue":"5","key":"501_CR30","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/WC-M.2006.250353","volume":"13","author":"T Leinmuller","year":"2006","unstructured":"Leinmuller T, Schoch E, Kargl F (2006) Position verification approaches for vehicular ad hoc networks. IEEE Wirel Commun 13(5):16\u201321","journal-title":"IEEE Wirel Commun"},{"key":"501_CR31","unstructured":"Li Z, Trappe W, Zhang Y, Nath B (2005) Robust statistical methods for securing wireless localization in sensor networks. In: Proceedings of IPSN"},{"key":"501_CR32","doi-asserted-by":"crossref","unstructured":"Liu D, Ning P (2003) Location-based pairwise key establishments for static sensor networks. In: Proceedings of ACM SASN","DOI":"10.1145\/986858.986869"},{"key":"501_CR33","unstructured":"Liu D, Ning P, Du W (2005) Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In: Proceedings of ICDCS"},{"key":"501_CR34","unstructured":"Liu D, Ning P, Du WK (2005) Attack-resistant location estimation in sensor networks. In: Proceedings of IPSN"},{"issue":"4","key":"501_CR35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1380564.1380570","volume":"11","author":"D Liu","year":"2008","unstructured":"Liu D, Ning P, Liu A, Wang C, Du WK (2008) Attack-resistant location estimation in wireless sensor networks. ACM Trans Inf Syst Secur 11(4):1\u201339","journal-title":"ACM Trans Inf Syst Secur"},{"key":"501_CR36","doi-asserted-by":"crossref","unstructured":"Liu J, Zhang Y, Zhao F (2006) Robust distributed node localization with error management. In: Proceedings of MobiHoc","DOI":"10.1145\/1132905.1132933"},{"issue":"10","key":"501_CR37","doi-asserted-by":"crossref","first-page":"2529","DOI":"10.1016\/j.comnet.2006.11.018","volume":"51","author":"G Mao","year":"2007","unstructured":"Mao G, Fidan B, Anderson BDO (2007) Wireless sensor network localization techniques. Comput Netw 51(10):2529\u20132553","journal-title":"Comput Netw"},{"key":"501_CR38","doi-asserted-by":"crossref","unstructured":"Misra S, Bhardwaj S, Xue G (2006) ROSETTA: Robust and secure mobile target tracking in a wireless ad hoc environment. In: Proceedings of MILCOM","DOI":"10.1109\/MILCOM.2006.302534"},{"issue":"3","key":"501_CR39","doi-asserted-by":"crossref","first-page":"1480","DOI":"10.1109\/TVT.2008.926616","volume":"58","author":"S Misra","year":"2009","unstructured":"Misra S, Xue G, Bhardwaj S (2009) Secure and robust localization in a wireless ad hoc environment. IEEE Trans Veh Technol 58(3):1480\u20131489","journal-title":"IEEE Trans Veh Technol"},{"key":"501_CR40","doi-asserted-by":"crossref","unstructured":"Moore D, Leonard J, Rus D, Teller S (2004) Robust distributed network localization with noisy range measurements. In: Proceedings of SenSys","DOI":"10.1145\/1031495.1031502"},{"key":"501_CR41","doi-asserted-by":"crossref","unstructured":"Niculescu D, Nath B (2001) Ad hoc positioning system (APS). In: Proceedings of IEEE GLOBECOM","DOI":"10.1109\/GLOCOM.2001.965964"},{"key":"501_CR42","doi-asserted-by":"crossref","unstructured":"Niculescu D, Nath B (2003) Ad hoc positioning system (aps) using aoa. In: Proceedings of INFOCOM","DOI":"10.1109\/INFCOM.2003.1209196"},{"key":"501_CR43","volume-title":"Robust regression and outlier detection","author":"P Rousseeuw","year":"2003","unstructured":"Rousseeuw P, Leroy A (2003) Robust regression and outlier detection. Wiley-Interscience, New York"},{"key":"501_CR44","doi-asserted-by":"crossref","unstructured":"Sastry N, Shankar U, Wagner D (2003) Secure verification of location claims. In: Proceedings of WiSe","DOI":"10.1145\/941311.941313"},{"key":"501_CR45","unstructured":"Savarese C, Rabay J (2002) Robust positioning algorithms for distributed ad-hoc wireless sensor networks. In: Proceedings of USENIX"},{"key":"501_CR46","doi-asserted-by":"crossref","unstructured":"Savvides A, Han CC, Srivastava M (2001) Dynamic fine-grained localization in ad-hoc networks of sensors. In: Proceedings of MobiCom","DOI":"10.1145\/381677.381693"},{"key":"501_CR47","doi-asserted-by":"crossref","unstructured":"Savvides A, Park H, Srivastava MB (2002) The bits and flops of the n-hop multilateration primitive for node localization problems. In: Proceedings of WSNA","DOI":"10.1145\/570738.570755"},{"key":"501_CR48","doi-asserted-by":"crossref","unstructured":"Shang Y, Ruml W, Zhang Y (2003) Localization from mere connectivity. In: Proceedings of MobiHoc","DOI":"10.1145\/778415.778439"},{"key":"501_CR49","doi-asserted-by":"crossref","unstructured":"Srinivasan A, Teitelbaum J, Wu J (2006) Drbts: Distributed reputation-based beacon trust system. In: Proceedings of DASC","DOI":"10.1109\/DASC.2006.28"},{"key":"501_CR50","volume-title":"Encyclopedia of wireless and mobile communications","author":"A Srinivasan","year":"2008","unstructured":"Srinivasan A, Wu J (2008) A survey on secure localization in wireless sensor networks. In: Furht B (ed) Encyclopedia of wireless and mobile communications. CRC Press, Boca Raton"},{"key":"501_CR51","unstructured":"Srinivasan A, Wu J, Teitelbaum J (2007) Distributed reputation-based secure localization in sensor networks. J Auton Trusted Comput. http:\/\/www.cis.temple.edu\/~wu\/DRBTS_JournalVersion_JoATC.pdf"},{"issue":"4","key":"501_CR52","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1109\/TDSC.2006.57","volume":"3","author":"A Vora","year":"2006","unstructured":"Vora A, Nesterenko M (2006) Secure location verification using radio broadcast. IEEE Trans Depend Secure Comput 3(4):377\u2013385","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"501_CR53","doi-asserted-by":"crossref","unstructured":"Wang C, Xiao L (2006) Locating sensors in concave areas. In: Proceedings of INFOCOM","DOI":"10.1109\/INFOCOM.2006.224"},{"issue":"3","key":"501_CR54","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/MNET.2007.364254","volume":"21","author":"C Wang","year":"2007","unstructured":"Wang C, Xiao L (2007) Sensor localization under limited measurement capabilities. IEEE Netw 21(3):16\u201323","journal-title":"IEEE Netw"},{"key":"501_CR55","doi-asserted-by":"crossref","unstructured":"Wei Y, Yu Z, Guan Y (2007) Location verification algorithms for wireless sensor networks. In: Proceedings of ICDCS","DOI":"10.1109\/ICDCS.2007.117"},{"key":"501_CR56","doi-asserted-by":"crossref","unstructured":"Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of MobiHoc","DOI":"10.1145\/1062689.1062697"},{"key":"501_CR57","doi-asserted-by":"crossref","unstructured":"Zeng Y, Zhang S, Guo S, Li X (2007) Secure hop-count based localization in wireless sensor networks. In: Proceedings of CIS","DOI":"10.1109\/CIS.2007.22"},{"key":"501_CR58","doi-asserted-by":"crossref","unstructured":"Zeng Y, Cao J, Hong J, Xie L (2009) Secure localization and location verification in wireless sensor networks. In: Proceedings of TSP","DOI":"10.1109\/MOBHOC.2009.5337043"},{"key":"501_CR59","doi-asserted-by":"crossref","unstructured":"Zeng Y, Cao J, Hong J, Zhang S, Xie L (2009) SecMCL: A secure Monte Carlo localization algorithm for mobile sensor networks. In: Proceedings of WSNS","DOI":"10.1109\/MOBHOC.2009.5337010"},{"key":"501_CR60","doi-asserted-by":"crossref","unstructured":"Zeng Y, Cao J, Zhang S, Guo S, Xie L (2009) Pollution attack: a new attack against localization in wireless sensor networks. In: Proceedings of WCNC","DOI":"10.1109\/WCNC.2009.4917910"},{"issue":"4","key":"501_CR61","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1109\/JSAC.2005.863855","volume":"24","author":"Y Zhang","year":"2006","unstructured":"Zhang Y, Liu W, Fang Y, Wu D (2006) Secure localization and authentication in ultra-wideband sensor networks. IEEE J Sel Areas Commun 24(4):829\u2013835","journal-title":"IEEE J Sel Areas Commun"},{"key":"501_CR62","doi-asserted-by":"crossref","unstructured":"Zhong S, Jadliwala M, Upadhyaya S, Qiao C (2008) Towards a theory of robust localization against malicious beacon nodes. In: Proceedings of INFOCOM","DOI":"10.1109\/INFOCOM.2008.197"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0501-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-010-0501-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-010-0501-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T04:08:50Z","timestamp":1559794130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-010-0501-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,9]]},"references-count":62,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["501"],"URL":"https:\/\/doi.org\/10.1007\/s11227-010-0501-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,11,9]]}}}