{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:43:48Z","timestamp":1740123828162,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:00:00Z","timestamp":1490313600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61371135"],"award-info":[{"award-number":["No. 61371135"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11276-017-1490-5","type":"journal-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T12:52:08Z","timestamp":1490359928000},"page":"2657-2668","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Sparse recovery formulation for secure distance-based localization in the presence of cheating anchors"],"prefix":"10.1007","volume":"24","author":[{"given":"Qiang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jiangwen","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Dandan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Donghao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,24]]},"reference":[{"issue":"5","key":"1490_CR1","doi-asserted-by":"crossref","first-page":"1209","DOI":"10.1109\/TCOMM.2012.040212.100291","volume":"60","author":"S-H Fang","year":"2012","unstructured":"Fang, S.-H., Chuang, C.-C., & Wang, C. (2012). Attack-resistant wireless localization using an inclusive disjunction model. IEEE Transactions on Communications, 60(5), 1209\u20131214.","journal-title":"IEEE Transactions on Communications"},{"issue":"1","key":"1490_CR2","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s11276-011-0386-z","volume":"18","author":"X Li","year":"2011","unstructured":"Li, X., Chen, Y., Yang, J., & Zheng, X. (2011). Achieving robust wireless localization resilient to signal strength attacks. Wireless Networks, 18(1), 45\u201358.","journal-title":"Wireless Networks"},{"key":"1490_CR3","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.pmcj.2014.01.007","volume":"16","author":"H Chen","year":"2015","unstructured":"Chen, H., Lou, W., Wang, Z., Wu, J., Wang, Z., & Xia, A. (2015). Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive and Mobile Computing, 16, 22\u201335.","journal-title":"Pervasive and Mobile Computing"},{"issue":"21","key":"1490_CR4","doi-asserted-by":"crossref","first-page":"7560","DOI":"10.1016\/j.eswa.2015.05.057","volume":"42","author":"P Sarigiannidis","year":"2015","unstructured":"Sarigiannidis, P., Karapistoli, E., & Economides, A. A. (2015). Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications, 42(21), 7560\u20137572.","journal-title":"Expert Systems with Applications"},{"key":"1490_CR5","doi-asserted-by":"publisher","unstructured":"Boustani, A., Alamatsaz, N., Jadliwala, M., & Namboodiri, V. (2014). LocJam: A novel jamming-based approach to secure localization in wireless networks. In Consumer Communications and Networking Conference (CCNC), 2014 IEEE 11th (pp. 336\u2013344). doi:\n                        10.1109\/CCNC.2014.6866592\n                        \n                    .","DOI":"10.1109\/CCNC.2014.6866592"},{"issue":"3","key":"1490_CR6","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/s11227-010-0501-4","volume":"64","author":"Y Zeng","year":"2013","unstructured":"Zeng, Y., Cao, J., Hong, J., Zhang, S., & Xie, L. (2013). Secure localization and location verification in wireless sensor networks: A survey. Journal of Supercomputing, 64(3), 685\u2013701.","journal-title":"Journal of Supercomputing"},{"issue":"8","key":"1490_CR7","doi-asserted-by":"crossref","first-page":"2519","DOI":"10.1007\/s11276-015-0930-3","volume":"21","author":"RH Milocco","year":"2015","unstructured":"Milocco, R. H., & Boumerdassi, S. (2015). An efficient adaptive method for estimating the distance between mobile sensors. Wireless Networks, 21(8), 2519\u20132529.","journal-title":"Wireless Networks"},{"issue":"7","key":"1490_CR8","doi-asserted-by":"crossref","first-page":"2317","DOI":"10.1007\/s11276-015-1101-2","volume":"22","author":"S Halder","year":"2016","unstructured":"Halder, S., & Ghosal, A. (2016). A survey on mobile anchor assisted localization techniques in wireless sensor networks. Wireless Networks, 22(7), 2317\u20132336.","journal-title":"Wireless Networks"},{"issue":"3","key":"1490_CR9","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1587\/transinf.E96.D.723","volume":"96D","author":"M-H Park","year":"2013","unstructured":"Park, M.-H., Nam, K.-G., Kim, J. S., Yum, D. H., & Lee, P. J. (2013). Secure and lightweight localization method for wireless sensor networks. IEICE Transactions on Information and Systems, E, 96D(3), 723\u2013726.","journal-title":"IEICE Transactions on Information and Systems, E"},{"issue":"4","key":"1490_CR10","first-page":"22:1","volume":"11","author":"D Liu","year":"2008","unstructured":"Liu, D., Ning, P., Liu, A., Wang, C., & Du, W. K. (2008). Attack-resistant location estimation in wireless sensor networks. ACM Transactions on Information and System Security, 11(4), 22:1\u201322:39.","journal-title":"ACM Transactions on Information and System Security"},{"key":"1490_CR11","doi-asserted-by":"publisher","unstructured":"Liu, D., Ning, P., & Du, W. (2005). Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In 25th IEEE International conference on distributed computing systems, 2005. ICDCS 2005. Proceedings, pp. 609\u2013619. doi:\n                        10.1109\/ICDCS.2005.21\n                        \n                    .","DOI":"10.1109\/ICDCS.2005.21"},{"key":"1490_CR12","doi-asserted-by":"crossref","first-page":"981280","DOI":"10.1155\/2010\/981280","volume":"2010","author":"H Chen","year":"2010","unstructured":"Chen, H., Lou, W., & Wang, Z. (2010). A novel secure localization approach in wireless sensor networks. Eurasip Journal on Wireless Communications and Networking, 2010, 981280.","journal-title":"Eurasip Journal on Wireless Communications and Networking"},{"issue":"10","key":"1490_CR13","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1093\/comjnl\/bxr138","volume":"56","author":"G Han","year":"2013","unstructured":"Han, G., Jiang, J., Shu, L., Guizani, M., & Nishio, S. (2013). A two-step secure localization for wireless sensor networks. Computer Journal, 56(10), 1154\u20131166.","journal-title":"Computer Journal"},{"issue":"3","key":"1490_CR14","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/s10207-011-0127-4","volume":"10","author":"WT Zhu","year":"2011","unstructured":"Zhu, W. T., Xiang, Y., Zhou, J., Deng, R. H., & Bao, F. (2011). Secure localization with attack detection in wireless sensor networks. International Journal of Information Security, 10(3), 155\u2013171.","journal-title":"International Journal of Information Security"},{"issue":"2","key":"1490_CR15","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/TIFS.2012.2184094","volume":"7","author":"R Garg","year":"2012","unstructured":"Garg, R., Varna, A. L., & Wu, M. (2012). An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(2), 717\u2013730.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1490_CR16","doi-asserted-by":"publisher","unstructured":"Li, Z., Trappe, W., Zhang, Y., & Nath, B. (2005). Robust statistical methods for securing wireless localization in sensor networks. In Fourth International Symposium on Information Processing in Sensor Networks, 2005. IPSN 2005 (pp. 91\u201398). doi:\n                        10.1109\/IPSN.2005.1440903\n                        \n                    .","DOI":"10.1109\/IPSN.2005.1440903"},{"issue":"3","key":"1490_CR17","doi-asserted-by":"crossref","first-page":"1480","DOI":"10.1109\/TVT.2008.926616","volume":"58","author":"S Misra","year":"2009","unstructured":"Misra, S., Xue, G., & Bhardwaj, S. (2009). Secure and robust localization in a wireless ad hoc environment. IEEE Transactions on Vehicular Technology, 58(3), 1480\u20131489.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1490_CR18","doi-asserted-by":"publisher","unstructured":"Wang, D., & Yang, L. (2012). Cooperative robust localization against malicious anchors based on semi-definite programming. In Military Communications Conference, 2012\u2014MILCOM 2012 (pp. 1\u20136). doi:\n                        10.1109\/MILCOM.2012.6415656\n                        \n                    .","DOI":"10.1109\/MILCOM.2012.6415656"},{"key":"1490_CR19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4419-7011-4","volume-title":"Sparse and redundant representations: From theory to applications in signal and image processing","author":"M Elad","year":"2010","unstructured":"Elad, M. (2010). Sparse and redundant representations: From theory to applications in signal and image processing (1st ed.). Incorporated: Springer.","edition":"1"},{"issue":"6","key":"1490_CR20","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1109\/TMC.2010.20","volume":"9","author":"M Jadliwala","year":"2010","unstructured":"Jadliwala, M., Zhong, S., Upadhyaya, S., Qiao, C., & Hubaux, J.-P. (2010). Secure distance-based localization in the presence of cheating beacon nodes. IEEE Transactions on Mobile Computing, 9(6), 810\u2013823.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1490_CR21","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.adhoc.2013.08.013","volume":"15","author":"S Merkel","year":"2014","unstructured":"Merkel, S., Mostaghim, S., & Schmeck, H. (2014). Hop count based distance estimation in mobile ad hoc networks\u2014Challenges and consequences. Ad Hoc Networks, 15, 39\u201352.","journal-title":"Ad Hoc Networks"},{"issue":"6","key":"1490_CR22","doi-asserted-by":"crossref","first-page":"1431","DOI":"10.1007\/s11276-013-0685-7","volume":"20","author":"S Gurung","year":"2014","unstructured":"Gurung, S., Hossain, A. K. M. M., & Kanchanasut, K. (2014). A hop-count based positioning algorithm for wireless ad-hoc networks. Wireless Networks, 20(6), 1431\u20131444.","journal-title":"Wireless Networks"},{"issue":"1","key":"1490_CR23","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/s11036-010-0281-3","volume":"17","author":"H Chen","year":"2012","unstructured":"Chen, H., Liu, B., Huang, P., Liang, J., & Gu, Y. (2012). Mobility-assisted node localization based on toa measurements without time synchronization in wireless sensor networks. Mobile Networks and Applications, 17(1), 90\u201399.","journal-title":"Mobile Networks and Applications"},{"key":"1490_CR24","doi-asserted-by":"publisher","unstructured":"Zhang, W., Xu, H., & Yang, L. (2011). A novel \n                        $${\\mathbf{\\ell }}$$\n                        \n                            \n                                \u2113\n                            \n                        \n                    1-regularized LS formulation for target localization and malicious anchor identification. In Military Communications Conference, 201\u2014MILCOM 201, pp. 766\u2013771. doi:\n                        10.1109\/MILCOM.2011.6127769\n                        \n                    .","DOI":"10.1109\/MILCOM.2011.6127769"},{"issue":"2","key":"1490_CR25","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1109\/JSAC.2005.861380","volume":"24","author":"S Capkun","year":"2006","unstructured":"Capkun, S., & Hubaux, J.-P. (2006). Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 221\u2013232.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"1490_CR26","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/MSP.2007.4286571","volume":"24","author":"RG Baraniuk","year":"2007","unstructured":"Baraniuk, R. G. (2007). Compressive sensing [lecture notes]. IEEE Signal Processing Magazine, 24(4), 118\u2013121.","journal-title":"IEEE Signal Processing Magazine"},{"key":"1490_CR27","volume-title":"Nonlinear programming","author":"DP Bertsekas","year":"1999","unstructured":"Bertsekas, D. P. (1999). Nonlinear programming (2nd ed.). Cambridge, MA: Athena Scientific.","edition":"2"},{"issue":"4","key":"1490_CR28","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/JSTSP.2007.910281","volume":"1","author":"MAT Figueiredo","year":"2007","unstructured":"Figueiredo, M. A. T., Nowak, R. D., & Wright, S. J. (2007). Gradient projection for sparse reconstruction: Application to compressed sensing and other inverse problems. IEEE Journal of Selected Topics in Signal Processing, 1(4), 586\u2013597.","journal-title":"IEEE Journal of Selected Topics in Signal Processing"},{"key":"1490_CR29","unstructured":"Steven, M. K. (1993). Fundamentals of statistical processing, volume i: Estimation theory (1 edition.). Prentice Hall."},{"issue":"2","key":"1490_CR30","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1049\/iet-spr:20070190","volume":"2","author":"FKW Chan","year":"2008","unstructured":"Chan, F. K. W., So, H. C., Zheng, J., & Lui, K. W. K. (2008). Best linear unbiased estimator approach for time-of-arrival based localisation. IET Signal Processing, 2(2), 156\u2013162.","journal-title":"IET Signal Processing"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-017-1490-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-017-1490-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-017-1490-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,4]],"date-time":"2018-09-04T02:38:06Z","timestamp":1536028686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-017-1490-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,24]]},"references-count":30,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["1490"],"URL":"https:\/\/doi.org\/10.1007\/s11276-017-1490-5","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2017,3,24]]}}}