{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T03:58:54Z","timestamp":1768708734294,"version":"3.49.0"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T00:00:00Z","timestamp":1726444800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T00:00:00Z","timestamp":1726444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No. 11875164"],"award-info":[{"award-number":["No. 11875164"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No. 11875164"],"award-info":[{"award-number":["No. 11875164"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No. 11875164"],"award-info":[{"award-number":["No. 11875164"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"crossref","award":["2024JJ5338"],"award-info":[{"award-number":["2024JJ5338"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"crossref","award":["2024JJ5338"],"award-info":[{"award-number":["2024JJ5338"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation of China","doi-asserted-by":"crossref","award":["2024JJ5338"],"award-info":[{"award-number":["2024JJ5338"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s11235-024-01213-7","type":"journal-article","created":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T05:01:51Z","timestamp":1726462911000},"page":"835-843","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secure positioning of wireless sensor networks against wormhole attacks"],"prefix":"10.1007","volume":"87","author":[{"given":"Xiuwu","family":"Yu","sequence":"first","affiliation":[]},{"given":"Xun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,16]]},"reference":[{"issue":"11","key":"1213_CR1","doi-asserted-by":"publisher","first-page":"11255","DOI":"10.1016\/j.heliyon.2022.e11255","volume":"8","author":"S Srinivasan","year":"2022","unstructured":"Srinivasan, S., Ramesh, T., & Paccapeli, R. (2022). Industrial functional safety assessment for WSN using QOS metrics. Journal of Heliyon, 8(11), 11255. https:\/\/doi.org\/10.1016\/j.heliyon.2022.e11255","journal-title":"Journal of Heliyon"},{"key":"1213_CR2","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.comcom.2022.05.008","volume":"191","author":"T Deng","year":"2022","unstructured":"Deng, T., Tang, X., & Wu, Z. (2022). An improved DECPSOHDV-hop algorithm for node location of WSN in cyber-physical-social-system. Journal of Computer Communications, 191, 349\u2013359. https:\/\/doi.org\/10.1016\/j.comcom.2022.05.008","journal-title":"Journal of Computer Communications"},{"key":"1213_CR3","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11235-022-00888-0","volume":"80","author":"P Singh","year":"2022","unstructured":"Singh, P., Mittal, N., & Wu, Z. (2022). A novel hybrid range-free approach to locate sensor nodes in 3d WSN using GWO-FA algorithm. Journal of Telecommunication Systems, 80, 303\u2013323. https:\/\/doi.org\/10.1007\/s11235-022-00888-0","journal-title":"Journal of Telecommunication Systems"},{"key":"1213_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11235-022-00915-0","volume":"81","author":"H Yin","year":"2022","unstructured":"Yin, H., Yang, H., & Shahmoradi, S. (2022). Eatmr: An energy-aware trust algorithm based the AODV protocol and multi-path routing approach in wireless sensor networks. Journal Telecommunication Systems, 81, 1\u201319. https:\/\/doi.org\/10.1007\/s11235-022-00915-0","journal-title":"Journal Telecommunication Systems"},{"key":"1213_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102852","volume":"173","author":"Z Shen","year":"2021","unstructured":"Shen, Z., Zhang, T., Tagami, A., & Jin, J. (2021). When RSSI encounters deep learning: An area localization scheme for pervasive sensing systems. Journal of Network and Computer Applications, 173, 102852. https:\/\/doi.org\/10.1016\/j.jnca.2020.102852","journal-title":"Journal of Network and Computer Applications"},{"key":"1213_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109427","volume":"219","author":"P Tripathy","year":"2022","unstructured":"Tripathy, P., & Khilar, M. P. (2022). An ensemble approach for improving localization accuracy in wireless sensor network. Journal of Computer Networks, 219, 109427. https:\/\/doi.org\/10.1016\/j.comnet.2022.109427","journal-title":"Journal of Computer Networks"},{"key":"1213_CR7","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.neucom.2022.03.050","volume":"491","author":"J Liu","year":"2022","unstructured":"Liu, J., Liu, M., Du, X., Stanimirovi, P. S., & Jin, L. (2022). An improved DV-HOP algorithm for wireless sensor networks based on neural dynamics. Journal of Neurocomputing, 491, 172\u2013185. https:\/\/doi.org\/10.1016\/j.neucom.2022.03.050","journal-title":"Journal of Neurocomputing"},{"key":"1213_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.103035","volume":"139","author":"Y Cao","year":"2023","unstructured":"Cao, Y., & Xu, J. (2023). Dv-hop-based localization algorithm using optimum anchor nodes subsets for wireless sensor network. Journal of Ad Hoc Networks, 139, 103035. https:\/\/doi.org\/10.1016\/j.adhoc.2022.103035","journal-title":"Journal of Ad Hoc Networks"},{"key":"1213_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103606","volume":"214","author":"M Mohammadzad","year":"2023","unstructured":"Mohammadzad, M., & Karimpour, J. (2023). Using rootkits hiding techniques to conceal honeypot functionality. Journal of Network and Computer Applications, 214, 103606. https:\/\/doi.org\/10.1016\/j.jnca.2023.103606","journal-title":"Journal of Network and Computer Applications"},{"issue":"3","key":"1213_CR10","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1049\/iet-wss.2011.0064","volume":"2","author":"SH Jokhio","year":"2012","unstructured":"Jokhio, S. H., Jokhio, I. A., & Kemp, A. H. (2012). Node capture attack detection and defence in wireless sensor networks. Journal IET Wireless Sensor Systems, 2(3), 161\u2013169. https:\/\/doi.org\/10.1049\/iet-wss.2011.0064","journal-title":"Journal IET Wireless Sensor Systems"},{"issue":"3","key":"1213_CR11","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s11235-022-00914-1","volume":"80","author":"D Han","year":"2022","unstructured":"Han, D., Liu, M., Weng, T. H., Tang, C., Marino, M. D., & Li, K. C. (2022). A novel secure DV-HOP localization algorithm against wormhole attacks. Journal of Telecommunication Systems, 80(3), 413\u2013430. https:\/\/doi.org\/10.1007\/s11235-022-00914-1","journal-title":"Journal of Telecommunication Systems"},{"issue":"1","key":"1213_CR12","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1145\/1077391.1077395","volume":"1","author":"L Lazos","year":"2005","unstructured":"Lazos, L., & Poovendran, R. (2005). Serloc: Robust localization for wireless sensor networks. Journal of ACM Transactions on Sensor Networks, 1(1), 73\u2013100. https:\/\/doi.org\/10.1145\/1077391.1077395","journal-title":"Journal of ACM Transactions on Sensor Networks"},{"issue":"2","key":"1213_CR13","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1109\/JSAC.2005.861381","volume":"24","author":"L Lazos","year":"2006","unstructured":"Lazos, L., & Poovendran, R. (2006). Hirloc: High-resolution robust localization for wireless sensor networks. Journal of IEEE Journal on Selected Areas in Communications, 24(2), 233\u2013246. https:\/\/doi.org\/10.1109\/JSAC.2005.861381","journal-title":"Journal of IEEE Journal on Selected Areas in Communications"},{"key":"1213_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.pmcj.2014.01.007","volume":"16","author":"H Chen","year":"2015","unstructured":"Chen, H., Lou, W., Wang, Z., Wu, J., Wang, Z., & Xia, A. (2015). Securing DV-HOP localization against wormhole attacks in wireless sensor networks. Journal of Pervasive and Mobile Computing, 16, 22\u201335. https:\/\/doi.org\/10.1016\/j.pmcj.2014.01.007","journal-title":"Journal of Pervasive and Mobile Computing"},{"key":"1213_CR15","doi-asserted-by":"publisher","unstructured":"Wu, J., Chen, H., L, W., & W, Z. (2010). Label-based dv-hop localization against wormhole attacks in wireless sensor networks. In: Journal of IEEE fifth international conference on networking. pp. 79\u201388 https:\/\/doi.org\/10.1109\/NAS.2010.41","DOI":"10.1109\/NAS.2010.41"},{"key":"1213_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103014","volume":"125","author":"R Alghamdi","year":"2023","unstructured":"Alghamdi, R., & Bellaiche, M. (2023). A cascaded federated deep learning based framework for detecting wormhole attacks in IOT networks. Journal of Computers & Security, 125, 103014. https:\/\/doi.org\/10.1016\/j.cose.2022.103014","journal-title":"Journal of Computers & Security"},{"key":"1213_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.170163","volume":"271","author":"R Priyadarshini","year":"2022","unstructured":"Priyadarshini, R., Alagirisamy, M., Rajendran, N., & Varunkumar, K. A. (2022). Invalidation of tunnelling attacks in ubiquitous IOT & wireless sensor enviroment using ML methods. Journal of Optik, 271, 170163. https:\/\/doi.org\/10.1016\/j.ijleo.2022.170163","journal-title":"Journal of Optik"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-024-01213-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-024-01213-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-024-01213-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T08:22:30Z","timestamp":1729930950000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-024-01213-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,16]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["1213"],"URL":"https:\/\/doi.org\/10.1007\/s11235-024-01213-7","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,16]]},"assertion":[{"value":"24 August 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}