{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T15:00:01Z","timestamp":1776351601540,"version":"3.51.2"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T00:00:00Z","timestamp":1653004800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T00:00:00Z","timestamp":1653004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61873160"],"award-info":[{"award-number":["61873160"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61672338"],"award-info":[{"award-number":["61672338"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11235-022-00914-1","type":"journal-article","created":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T17:25:04Z","timestamp":1653067504000},"page":"413-430","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A novel secure DV-Hop localization algorithm against wormhole attacks"],"prefix":"10.1007","volume":"80","author":[{"given":"Dezhi","family":"Han","sequence":"first","affiliation":[]},{"given":"Mengxiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Tien-Hsiung","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Canren","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Mario Donato","family":"Marino","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1381-4364","authenticated-orcid":false,"given":"Kuan-Ching","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,20]]},"reference":[{"issue":"12","key":"914_CR1","doi-asserted-by":"publisher","first-page":"15815","DOI":"10.1109\/TVT.2020.3036631","volume":"69","author":"M Cui","year":"2020","unstructured":"Cui, M., Han, D., Wang, J., Li, K.-C., & Chang, C.-C. (2020). ARFV: An efficient shared data auditing scheme supporting revocation for fog-assisted vehicular ad-hoc networks. IEEE Transactions on Vehicular Technology, 69(12), 15815\u201315827. https:\/\/doi.org\/10.1109\/TVT.2020.3036631","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"914_CR2","doi-asserted-by":"publisher","first-page":"102821","DOI":"10.1016\/j.jisa.2021.102821","volume":"59","author":"P Chen","year":"2021","unstructured":"Chen, P., Han, D., Weng, T., et al. (2021). A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement. Journal of Information Security and Applications, 59, 102821.","journal-title":"Journal of Information Security and Applications"},{"issue":"5","key":"914_CR3","doi-asserted-by":"publisher","first-page":"9076","DOI":"10.1109\/JIOT.2019.2927497","volume":"6","author":"M Cui","year":"2019","unstructured":"Cui, M., Han, D., & Wang, J. (2019). An efficient and safe road condition monitoring authentication scheme based on fog computing. IEEE Internet of Things Journal, 6(5), 9076\u20139084. https:\/\/doi.org\/10.1109\/JIOT.2019.2927497","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"914_CR4","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1002\/ett.1532","volume":"23","author":"N Labraoui","year":"2012","unstructured":"Labraoui, N., Aliouat, M., & Gueroui, M. (2012). Secure DV-Hop localization scheme against wormhole attacks in wireless sensor networks. Transactions on Emerging Telecommunications Technologies, 23(4), 303\u2013316.","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"7","key":"914_CR5","doi-asserted-by":"publisher","first-page":"6392","DOI":"10.1109\/JIOT.2020.2974281","volume":"7","author":"W Liang","year":"2020","unstructured":"Liang, W., Huang, W., Long, J., et al. (2020). Deep reinforcement learning for resource protection and real-time detection in IoT environment. IEEE Internet of Things Journal, 7(7), 6392\u20136401.","journal-title":"IEEE Internet of Things Journal"},{"issue":"14","key":"914_CR6","doi-asserted-by":"publisher","first-page":"e4924","DOI":"10.1002\/dac.4924","volume":"34","author":"D Han","year":"2021","unstructured":"Han, D., Wang, J., Tang, C., et al. (2021). A multi-objective distance vector-hop localization algorithm based on differential evolution quantum particle swarm optimization. International Journal of Communication Systems, 34(14), e4924.","journal-title":"International Journal of Communication Systems"},{"key":"914_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3144971","author":"Y Fan","year":"2022","unstructured":"Fan, Y., Wu, G., Li, K., et al. (2022). Robust end hopping for secure satellite communication in moving target defense. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2022.3144971","journal-title":"IEEE Internet of Things Journal"},{"issue":"3","key":"914_CR8","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1109\/TII.2019.2946791","volume":"16","author":"W Liang","year":"2020","unstructured":"Liang, W., Li, K., Long, J., et al. (2020). An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Transactions on Industrial Informatics, 16(3), 2063\u20132071.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"22","key":"914_CR9","doi-asserted-by":"publisher","first-page":"4871","DOI":"10.3390\/s19224871","volume":"19","author":"J Chen","year":"2019","unstructured":"Chen, J., Wang, S., Ouyang, M., et al. (2019). Iterative positioning algorithm for indoor node based on distance correction in WSNs. Sensors, 19(22), 4871.","journal-title":"Sensors"},{"key":"914_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3156266","author":"W Liang","year":"2022","unstructured":"Liang, W., Li, Y., Xie, K., et al. (2022). Spatial-temporal aware inductive graph neural network for C-ITS data recovery. IEEE Transactions on Intelligent Transportation Systems. https:\/\/doi.org\/10.1109\/TITS.2022.3156266","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"914_CR11","doi-asserted-by":"publisher","first-page":"84132","DOI":"10.1109\/ACCESS.2019.2924283","volume":"7","author":"WA Aliady","year":"2019","unstructured":"Aliady, W. A., & Al-Ahmadi, S. A. (2019). Energy preserving secure measure against wormhole attack in wireless sensor networks. IEEE Access, 7, 84132\u201384141.","journal-title":"IEEE Access"},{"key":"914_CR12","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.comcom.2020.01.064","volume":"152","author":"PP Devi","year":"2020","unstructured":"Devi, P. P., & Jaison, B. (2020). Protection on wireless sensor network from clone attack using the SDN-enabled hybrid clone node detection mechanisms. Computer Communications, 152, 316\u2013322.","journal-title":"Computer Communications"},{"key":"914_CR13","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1007\/s11277-019-06160-0","volume":"105","author":"G Farjamnia","year":"2019","unstructured":"Farjamnia, G., Gasimov, Y., & Kazimov, C. (2019). Review of the techniques against the wormhole attacks on wireless sensor networks. Wireless Personal Communications, 105, 1561\u20131584.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"914_CR14","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TDSC.2020.2977646","volume":"19","author":"D Han","year":"2022","unstructured":"Han, D., Pan, N., & Li, K. (2022). A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection. IEEE Transactions on Dependable and Secure Computing, 19(1), 316\u2013327.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"914_CR15","first-page":"1","volume":"99","author":"TH Kim","year":"2019","unstructured":"Kim, T. H., Goyat, R., Rai, M. K., Kumar, G., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 99, 1\u20131.","journal-title":"IEEE Access"},{"key":"914_CR16","doi-asserted-by":"publisher","first-page":"153956","DOI":"10.1109\/ACCESS.2020.3018119","volume":"8","author":"L Xiao","year":"2020","unstructured":"Xiao, L., Han, D., Meng, X., et al. (2020). A secure framework for data sharing in private blockchain-based WBANs. IEEE Access, 8, 153956\u2013153968.","journal-title":"IEEE Access"},{"issue":"3","key":"914_CR17","first-page":"3530","volume":"18","author":"D Han","year":"2020","unstructured":"Han, D., Zhu, Y., Li, D., Liang, W., Souri, A., & Li, K.-C. (2020). A Blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE Transactions on Industrial Informatics, 18(3), 3530\u20133540.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"2","key":"914_CR18","doi-asserted-by":"publisher","first-page":"665","DOI":"10.2298\/CSIS200406014X","volume":"17","author":"J Xu","year":"2020","unstructured":"Xu, J., Han, D., et al. (2020). A K-means algorithm based on characteristics of density applied to network intrusion detection. Computer Science and Information Systems, 17(2), 665\u2013687.","journal-title":"Computer Science and Information Systems"},{"key":"914_CR19","doi-asserted-by":"publisher","first-page":"3162","DOI":"10.1007\/s10489-020-01694-4","volume":"50","author":"Q Tian","year":"2020","unstructured":"Tian, Q., Han, D., Li, K. C., et al. (2020). An intrusion detection approach based on improved deep belief network. Applied Intelligence, 50, 3162\u20133178.","journal-title":"Applied Intelligence"},{"key":"914_CR20","doi-asserted-by":"publisher","first-page":"12361","DOI":"10.1007\/s00500-020-04678-1","volume":"24","author":"W Zhang","year":"2020","unstructured":"Zhang, W., Han, D., Li, K. C., et al. (2020). Wireless sensor network intrusion detection system based on MK-ELM. Soft Computing, 24, 12361\u201312374.","journal-title":"Soft Computing"},{"key":"914_CR21","unstructured":"Dwivedi, R. K., Sharma, P., & Kumar, R. (2018). Detection and prevention analysis of wormhole attack in wireless sensor network. In: Proceedings of the 2018 8th International Conference on Cloud Computing, Data Science and Engineering (Confluence)."},{"key":"914_CR22","doi-asserted-by":"crossref","unstructured":"Verma, R., Sharma, R., & Singh, U. (2017). New approach through detection and prevention of wormhole attack in manet. pp. 526\u2013531.","DOI":"10.1109\/ICECA.2017.8212719"},{"key":"914_CR23","unstructured":"Ji, C. (2015). Research on location algorithm of non-ranging nodes in wireless sensor networks. PhD thesis, Jiangxi University of Science and Technology."},{"key":"914_CR24","doi-asserted-by":"crossref","unstructured":"Liu, G., Qian, Z., & Wang, X. (2019). An improved DV-Hop localization algorithm based on hop distances correction. Communications, China.","DOI":"10.23919\/JCC.2019.06.016"},{"key":"914_CR25","doi-asserted-by":"publisher","first-page":"2743","DOI":"10.1007\/s11276-021-02618-x","volume":"27","author":"M Ghafour","year":"2021","unstructured":"Ghafour, M., Kamel, S. H., & Abouelseoud, Y. (2021). Improved DV-Hop based on squirrel search algorithm for localization in wireless sensor networks. Wireless Networks, 27, 2743\u20132759.","journal-title":"Wireless Networks"},{"key":"914_CR26","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1007\/s11276-020-02533-7","volume":"27","author":"A Kaushik","year":"2021","unstructured":"Kaushik, A., Lobiyal, D. K., & Kumar, S. (2021). Improved 3-dimensional DV-Hop localization algorithm based on information of nearby nodes. Wireless Networks, 27, 1801\u20131819.","journal-title":"Wireless Networks"},{"issue":"2","key":"914_CR27","doi-asserted-by":"publisher","first-page":"448","DOI":"10.3390\/s21020448","volume":"21","author":"X Huang","year":"2021","unstructured":"Huang, X., Han, D., Cui, M., Lin, G., & Yin, X. (2021). Three-Dimensional localization algorithm based on improved a and DV-Hop algorithms in wireless sensor network. Sensors, 21(2), 448.","journal-title":"Sensors"},{"issue":"2","key":"914_CR28","doi-asserted-by":"publisher","first-page":"343","DOI":"10.3390\/s20020343","volume":"20","author":"D Han","year":"2020","unstructured":"Han, D., Yu, Y., Li, K. C., & Mello, R. (2020). Enhancing the sensor node localization algorithm based on improved DV-Hop and DE algorithms in wireless sensor networks. Sensors, 20(2), 343.","journal-title":"Sensors"},{"key":"914_CR29","unstructured":"Kairen, C. (2018). Research on wormhole detecting scheme based on hierarchy structure in WSN. PhD thesis, Liaoning University, China."},{"issue":"2","key":"914_CR30","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1049\/iet-wss.2017.0075","volume":"8","author":"J Li","year":"2017","unstructured":"Li, J., Wang, D., & Wang, Y. (2017). Security DV-Hop localization algorithm against wormhole attack in wireless sensor network. IET Wireless Sensor Systems, 8(2), 68\u201375.","journal-title":"IET Wireless Sensor Systems"},{"issue":"Part A","key":"914_CR31","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.pmcj.2014.01.007","volume":"16","author":"H Chen","year":"2015","unstructured":"Chen, H., Lou, W., Wang, Z., Wu, J., Wang, Z., & Xia, A. (2015). Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive and Mobile Computing, 16(Part A), 22\u201335.","journal-title":"Pervasive and Mobile Computing"},{"key":"914_CR32","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.promfg.2019.02.292","volume":"32","author":"S Deshmukh-Bhosale","year":"2019","unstructured":"Deshmukh-Bhosale, S., & Sonavane, S. S. (2019). A realtime intrusion detection system for wormhole attack in the RPL based Internet of Things. Procedia Manufacturing, 32, 840\u2013847.","journal-title":"Procedia Manufacturing"},{"key":"914_CR33","doi-asserted-by":"publisher","first-page":"18194","DOI":"10.1109\/ACCESS.2019.2894637","volume":"7","author":"X Luo","year":"2019","unstructured":"Luo, X., Chen, Y., Miao, L., Qian, L., & Kang, X. (2019). CREDND: A novel secure neighbor discovery algorithm for wormhole attack. IEEE Access, 7, 18194\u201318205.","journal-title":"IEEE Access"},{"key":"914_CR34","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/s11277-020-07365-4","volume":"114","author":"N Tamilarasi","year":"2020","unstructured":"Tamilarasi, N., & Santhi, S. G. (2020). Detection of wormhole attack and secure path selection in wireless sensor network. Wireless Personal Communications, 114, 329\u2013345.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"914_CR35","first-page":"51","volume":"50","author":"D Ping","year":"2015","unstructured":"Ping, D., & Hongjiang, Z. (2015). A DV-Hop localization algorithm for wormhole resistance in wireless sensor networks. Journal of Southwest Jiaotong University, 50(1), 51\u201357.","journal-title":"Journal of Southwest Jiaotong University"},{"issue":"4","key":"914_CR36","first-page":"2223","volume":"13","author":"J Li","year":"2019","unstructured":"Li, J., & Wang, D. (2019). The security DV-Hop algorithm against multiple-wormhole node link in WSN. KSII Transactions on Internet and Information Systems, 13(4), 2223\u20132242.","journal-title":"KSII Transactions on Internet and Information Systems"},{"issue":"22","key":"914_CR37","doi-asserted-by":"publisher","first-page":"5028","DOI":"10.3390\/s19225028","volume":"19","author":"X Zhu","year":"2019","unstructured":"Zhu, X., Li, K., Zhang, J., et al. (2019). Distributed reliable and efficient transmission task assignment for WSNs. Sensors, 19(22), 5028.","journal-title":"Sensors"},{"key":"914_CR38","unstructured":"Zhengfei, D. (2018). Research on attackresistant secure localization algorithm for wireless sensor networks. PhD thesis, Southwest Jiaotong University."},{"key":"914_CR39","unstructured":"Yahui, F. (2020). Research on trust model of wireless sensor network based on recommendation and risk control. PhD thesis, South China University of Technology.."},{"key":"914_CR40","doi-asserted-by":"publisher","first-page":"128349","DOI":"10.1109\/ACCESS.2020.3007388","volume":"8","author":"C Tang","year":"2020","unstructured":"Tang, C., Han, D., & Wang, J. (2020). A low resource consumption clone detection method for multi base station wireless sensor networks. IEEE Access, 8, 128349\u2013128361.","journal-title":"IEEE Access"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-022-00914-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-022-00914-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-022-00914-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T04:10:58Z","timestamp":1655698258000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-022-00914-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,20]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["914"],"URL":"https:\/\/doi.org\/10.1007\/s11235-022-00914-1","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,20]]},"assertion":[{"value":"19 April 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}