{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T08:45:37Z","timestamp":1772873137359,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s11277-018-5369-2","type":"journal-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T08:49:47Z","timestamp":1517474987000},"page":"3303-3321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":78,"title":["Distributed Location and Trust Based Replica Detection in Wireless Sensor Networks"],"prefix":"10.1007","volume":"102","author":[{"given":"G.","family":"Amudha","sequence":"first","affiliation":[]},{"given":"P.","family":"Narayanasamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,1]]},"reference":[{"issue":"7","key":"5369_CR1","first-page":"55","volume":"2","author":"HN Pratihari","year":"2013","unstructured":"Pratihari, H. N. (2013). A survey on security issues in wireless sensor network. International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology, 2(7), 55\u201358.","journal-title":"International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology"},{"issue":"4","key":"5369_CR2","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393\u2013422.","journal-title":"Computer Networks"},{"issue":"4","key":"5369_CR3","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1145\/1027794.1027800","volume":"3","author":"D Liu","year":"2004","unstructured":"Liu, D., & Ning, P. (2004). Multilevel \u03bcTESLA: Broadcast authentication for distributed sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 3(4), 800\u2013836.","journal-title":"ACM Transactions on Embedded Computing Systems (TECS)"},{"key":"5369_CR4","doi-asserted-by":"crossref","unstructured":"Ho, Y., Ma, R., Sung, C., Tsai, I., Kang, L., & Yu, C., (2015). Deterministic detection of node replication attacks in sensor networks. In International conference on consumer electronics (pp. 468\u2013469).","DOI":"10.1109\/ICCE-TW.2015.7217002"},{"key":"5369_CR5","doi-asserted-by":"crossref","unstructured":"Parno, B., Perrig, A., & Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In 2005 IEEE symposium on security and privacy (pp. 49\u201363). IEEE.","DOI":"10.1109\/SP.2005.8"},{"key":"5369_CR6","first-page":"7","volume-title":"Protocols and architectures for wireless sensor networks","author":"H Karl","year":"2007","unstructured":"Karl, H., & Willig, A. (2007). Protocols and architectures for wireless sensor networks (pp. 7\u20138). Hoboken: Wiley."},{"issue":"122","key":"5369_CR7","first-page":"2","volume":"4","author":"AJ Yves","year":"2015","unstructured":"Yves, A. J., & Hao, P. (2015). RSSI-based indoor localization using RSSI-with-angle-based localization estimation algorithm. Sensor Networks and Data Communications, 4(122), 2.","journal-title":"Sensor Networks and Data Communications"},{"issue":"5","key":"5369_CR8","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TDSC.2010.25","volume":"8","author":"M Conti","year":"2011","unstructured":"Conti, M., Di Pietro, R., Mancini, L., & Mei, A. (2011). Distributed detection of clone attacks in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 8(5), 685\u2013698.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"5369_CR9","doi-asserted-by":"crossref","unstructured":"Braginsky, D., & Estrin, D. (2002). Rumor routing algorithm for sensor networks. In Proceedings of the 1st ACM international workshop on wireless sensor networks and applications (pp. 22\u201331). ACM.","DOI":"10.1145\/570738.570742"},{"key":"5369_CR10","doi-asserted-by":"crossref","unstructured":"Fu, F., Liu, J., & Yin, X. (2007). Space-time related pairwise key predistribution scheme for wireless sensor networks. In International conference on wireless communications, networking and mobile computing, 2007. WiCom 2007 (pp. 2692\u20132696). IEEE.","DOI":"10.1109\/WICOM.2007.669"},{"key":"5369_CR11","doi-asserted-by":"crossref","unstructured":"Newsome, J., Shi, E., Song, D., &Perrig, A. (2004). The sybil attack in sensor networks: Analysis and defenses. In Proceedings of the 3rd international symposium on Information processing in sensor networks (pp. 259\u2013268). ACM.","DOI":"10.1145\/984622.984660"},{"key":"5369_CR12","first-page":"050","volume":"538","author":"M Sugano","year":"2006","unstructured":"Sugano, M., Kawazoe, T., Ohta, Y., & Murata, M. (2006). Indoor localization system using RSSI measurement of WSN based on ZigBee standard. Target, 538, 050.","journal-title":"Target"},{"key":"5369_CR13","doi-asserted-by":"crossref","unstructured":"Choi, H., Zhu, S., & La Porta, T. F. (2007). SET: Detecting node clones in sensor networks. In Third international conference on security and privacy in communications networks and the workshops, 2007. SecureComm 2007 (pp. 341\u2013350). IEEE.","DOI":"10.1109\/SECCOM.2007.4550353"},{"key":"5369_CR14","first-page":"290","volume-title":"Cryptography and network security: Principles and practices","author":"W Stallings","year":"2006","unstructured":"Stallings, W. (2006). Cryptography and network security: Principles and practices (pp. 290\u2013300). Delhi: Pearson Education India."},{"key":"5369_CR15","doi-asserted-by":"crossref","unstructured":"Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Third IEEE international conference on pervasive computing and communications, 2005. PerCom 2005 (pp. 324\u2013328). IEEE.","DOI":"10.1109\/PERCOM.2005.18"},{"issue":"2","key":"5369_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/2493882","volume":"40","author":"F Goualard","year":"2014","unstructured":"Goualard, F. (2014). How do you compute the midpoint of an interval? ACM Transactions on Mathematical Software (TOMS), 40(2), 11.","journal-title":"ACM Transactions on Mathematical Software (TOMS)"},{"key":"5369_CR17","unstructured":"Baker, D. J., & Ephremides, A. (1981). A Distributed algorithm for organizing mobile radio telecommunication networks. In International conference on distributed computing systems ICDCS (pp. 476\u2013483)."},{"key":"5369_CR18","doi-asserted-by":"crossref","unstructured":"Zhu, B., Addada, V. G. K., Setia, S., Jajodia, S., & Roy, S. (2007). Efficient distributed detection of node replication attacks in sensor networks. In Twenty-third annual computer security applications conference, 2007. ACSAC 2007 (pp. 257\u2013267). IEEE.","DOI":"10.1109\/ACSAC.2007.26"},{"key":"5369_CR19","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1002\/047011276X","volume-title":"Wireless sensor networks: Technology, protocols, and applications","author":"K Sohraby","year":"2007","unstructured":"Sohraby, K., Minoli, D., & Znati, T. (2007). Wireless sensor networks: Technology, protocols, and applications (pp. 202\u2013220). Hoboken: Wiley."},{"key":"5369_CR20","doi-asserted-by":"crossref","unstructured":"Qi, Z., & Ping, H. (2013). The topology construction power control algorithm based on birthday paradox. In 2013 International conference on computer sciences and applications (CSA) (pp. 223\u2013228). IEEE.","DOI":"10.1109\/CSA.2013.59"},{"issue":"6","key":"5369_CR21","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1109\/TSMCC.2007.905824","volume":"37","author":"R Brooks","year":"2007","unstructured":"Brooks, R., Govindaraju, P. Y., Pirretti, M., Vijaykrishnan, N., & Kandemir, M. T. (2007). On the detection of clones in sensor networks using random key predistribution. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 37(6), 1246\u20131258.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"5369_CR22","unstructured":"Zhang, M., Khanapure, V., Chen, S., & Xiao, X. (2009). Memory efficient protocols for detecting nodereplication attacks in wireless sensor networks. In Proceedings of 17th IEEE international conferenceon network protocols, ICNP\u201909 (pp. 284\u2013293). Princeton, NJ: IEEE."},{"key":"5369_CR23","doi-asserted-by":"crossref","unstructured":"Sei, Y., & Honiden, S. (2008). Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. In Proceedings of the 4th annual international conference on wireless internet, WICON\u201908 (pp. 01\u201308). Brussels, Belgium: ICST.","DOI":"10.4108\/ICST.WICON2008.4796"},{"key":"5369_CR24","unstructured":"Znaidi, W., Minier, M., & Ubeda, S. (2009). Hierarchical node replication attacks detection in wirelesssensors networks. In Proceedings of IEEE 20th international symposium on personal, indoor andmobile radio communications, 09 (pp. 82\u201386). Tokyo: IEEE."},{"key":"5369_CR25","doi-asserted-by":"crossref","unstructured":"Conti, M., Pietro, R. D., Mancini, L. V., & Mei, A. (2007). A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In Proceedings ofthe 8th ACM international symposium on mobile ad hoc networking and computing, MobiHoc\u201907 (pp. 80\u201389). Montreal, Canada: ACM.","DOI":"10.1145\/1288107.1288119"},{"key":"5369_CR26","doi-asserted-by":"crossref","unstructured":"Ko, L. C., Chen, H. Y., & Lin, G. R. (2009). A neighbor-based detection scheme for wireless sensor networks against node replication attacks. In Proceedings of international conference on ultra modern telecommunications and workshops, ICUMT\u201909 (pp. 1\u20136). St. Petersburg: IEEE.","DOI":"10.1109\/ICUMT.2009.5345637"},{"key":"5369_CR27","doi-asserted-by":"crossref","unstructured":"Krishnamachari, L., Estrin, D., & Wicker, S. (2002). The impact of data aggregation in wireless sensor networks. In Proceedings 22nd international conference on distributed computing systems workshops, 2002 (pp. 575\u2013578). IEEE.","DOI":"10.1109\/ICDCSW.2002.1030829"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5369-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5369-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5369-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T18:40:53Z","timestamp":1660416053000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5369-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,1]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["5369"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5369-2","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,1]]},"assertion":[{"value":"1 February 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}