{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:43:59Z","timestamp":1774525439763,"version":"3.50.1"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T00:00:00Z","timestamp":1638230400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T00:00:00Z","timestamp":1638230400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11277-021-09395-y","type":"journal-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T12:21:10Z","timestamp":1638274870000},"page":"1081-1108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Wormhole Attack Detection System for IoT Network: A Hybrid Approach"],"prefix":"10.1007","volume":"124","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0275-3554","authenticated-orcid":false,"given":"Snehal A.","family":"Bhosale","sequence":"first","affiliation":[]},{"given":"S. S.","family":"Sonavane","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,30]]},"reference":[{"key":"9395_CR1","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.adhoc.2015.01.006","volume":"32","author":"KT Nguyen","year":"2015","unstructured":"Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the Internet of Things. Ad Hoc Network, 32, 17\u201331. https:\/\/doi.org\/10.1016\/j.adhoc.2015.01.006","journal-title":"Ad Hoc Network"},{"issue":"7","key":"9395_CR2","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645\u20131660. https:\/\/doi.org\/10.1016\/j.future2013.01.010","journal-title":"Future Generation Computer Systems"},{"key":"9395_CR3","doi-asserted-by":"publisher","unstructured":"Pishva, D. (2017). Internet of Things: Security and privacy issues and possible solution. In 2017 19th international conference on advanced communication technology (ICACT). IEEE. https:\/\/doi.org\/10.23919\/ICACT.2017.7890229","DOI":"10.23919\/ICACT.2017.7890229"},{"key":"9395_CR4","doi-asserted-by":"publisher","unstructured":"Deshmukh, S., & Sonavane, S. S. (2017). Security protocols for Internet of Things: A survey. In 2017 international conference on Nextgen electronic technologies: Silicon to software (ICNETS2). IEEE. https:\/\/doi.org\/10.1109\/ICNETS2.2017.8067900","DOI":"10.1109\/ICNETS2.2017.8067900"},{"key":"9395_CR5","doi-asserted-by":"publisher","unstructured":"Pongle, P., & Chavan, G. (2015) A survey: Attacks on RPL and 6LoWPAN in IoT. In 2015 international conference on pervasive computing (ICPC). IEEE. https:\/\/doi.org\/10.1109\/PERVASIVE.2015.708703","DOI":"10.1109\/PERVASIVE.2015.708703"},{"key":"9395_CR6","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/J.Promfg.2019.02.292","volume":"32","author":"S Deshmukh-Bhosale","year":"2019","unstructured":"Deshmukh-Bhosale, S., & Sonavane, S. S. (2019). A real-time intrusion detection system for wormhole attack in the RPL based Internet of Things. Procedia Manufacturing, 32, 840\u2013847. https:\/\/doi.org\/10.1016\/J.Promfg.2019.02.292","journal-title":"Procedia Manufacturing"},{"key":"9395_CR7","doi-asserted-by":"crossref","unstructured":"Kothmayr, T., Hu, W., Schmitt, C., Bruenig, M., & Carle, G. (2011). Securing the internet of things with DTLS. In Proceedings of the 9th ACM, conference on embedded networked sensor systems (pp. 345\u2013346). ACM.","DOI":"10.1145\/2070942.2070982"},{"key":"9395_CR8","doi-asserted-by":"publisher","unstructured":"Raza, S., Duquennoy, S., Chung, A., Yazar, D., Voigt, T., & Roedig, U. (2011). Securing communication in 6LoWPAN with compressed IPsec. In 2011 international conference on distributed computing in sensor systems and workshops (DCOSS). IEEE. https:\/\/doi.org\/10.1109\/DCOSS.2011.5982177","DOI":"10.1109\/DCOSS.2011.5982177"},{"key":"9395_CR9","doi-asserted-by":"publisher","unstructured":"Raza, S., Duquennoy, S., H\u00f6glund, J., Roedig, U., & Voigt, T. (2012). Secure communication for the Internet of Things\u2014A comparison of link layer security and IPsec for 6LoWPAN. In Security and communication networks. Wiley Online Library. https:\/\/doi.org\/10.1002\/sec.406","DOI":"10.1002\/sec.406"},{"key":"9395_CR10","unstructured":"IETF, RPL. Routing over low power and lossy networks. Accessed on August 2018."},{"key":"9395_CR11","doi-asserted-by":"publisher","unstructured":"Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007). Pv6 over low power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. IETF, RFC 4919. https:\/\/doi.org\/10.17487\/RFC4919","DOI":"10.17487\/RFC4919"},{"issue":"8","key":"9395_CR12","doi-asserted-by":"publisher","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","volume":"20","author":"Q Jing","year":"2014","unstructured":"Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: Perspectives and challenges. Wireless Network, 20(8), 2481\u20132501. https:\/\/doi.org\/10.1007\/s11276-014-0761-7","journal-title":"Wireless Network"},{"issue":"1","key":"9395_CR13","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"RH Weber","year":"2010","unstructured":"Weber, R. H. (2010). Internet of Things\u2014New security and privacy challenges. Computer Law & Security Review, 26(1), 23\u201330. https:\/\/doi.org\/10.1016\/j.clsr.2009.11.008","journal-title":"Computer Law & Security Review"},{"key":"9395_CR14","volume-title":"Smart, nest thermostat: A smart spy in your home","author":"G Hernandez","year":"2014","unstructured":"Hernandez, G., Arias, O., Buentello, D., & Jin, Y. (2014). Smart, nest thermostat: A smart spy in your home. Black Hat USA."},{"key":"9395_CR15","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2015.7","volume":"13","author":"W Trappe","year":"2015","unstructured":"Trappe, W., Howard, R., & Moore, R. S. (2015). Low-energy security: Limits and opportunities in the Internet of things. IEEE Security, Privacy, 13, 14\u201321. https:\/\/doi.org\/10.1109\/MSP.2015.7","journal-title":"IEEE Security, Privacy"},{"key":"9395_CR16","doi-asserted-by":"publisher","unstructured":"El-hajj, M., Chamoun, M., Fadlallah, A., & Serhrouchni, A. (2017). Analysis of authentication techniques in Internet of Things (IoT), In Proceedings of the 2017 1st cyber security in networking conference (CSNet), Rio de Janeiro, Brazil, October 18\u201320, 2017 (pp. 1\u20133). https:\/\/doi.org\/10.1109\/CSNET.2017.8242006","DOI":"10.1109\/CSNET.2017.8242006"},{"key":"9395_CR17","unstructured":"Shang, W., Yu, Y., Droms, R., & Zhang, L. Challenges in IoT networking via TCP\/IP architecture. Technical Report 04, NDN, Technical Report NDN-0038; Named Data Networking. http:\/\/nameddata.net\/techreports.html"},{"key":"9395_CR18","doi-asserted-by":"crossref","unstructured":"Azer, M., El-Kassas, S., & El-Soudani, M. (2009). A full image of the wormhole attacks towards introducing complex wormhole attacks, in wireless ad hoc networks. International Journal of Computer Science and Information Security, 1(1).","DOI":"10.1109\/ICSNC.2009.116"},{"issue":"2","key":"9395_CR19","doi-asserted-by":"publisher","first-page":"749","DOI":"10.14419\/ijet.v7i2.33.15488","volume":"7","author":"S Deshmukh-Bhosale","year":"2018","unstructured":"Deshmukh-Bhosale, S., & Sonavane, S. S. (2018). Wormhole attack detection in Internet of Things. International Journal of Engineering & Technology, 7(2), 749\u2013751. https:\/\/doi.org\/10.14419\/ijet.v7i2.33.15488","journal-title":"International Journal of Engineering & Technology"},{"key":"9395_CR20","doi-asserted-by":"publisher","unstructured":"Perazzo, P., Vallati, C., Varano, D., Anastasi, G., & Dini, G. (2018). Implementation of a wormhole attack against a RPL network: Challenges and effects. In 14th annual conference on wireless on-demand network systems and services (WONS). IEEE. https:\/\/doi.org\/10.23919\/WONS.2018.8311669","DOI":"10.23919\/WONS.2018.8311669"},{"key":"9395_CR21","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1186\/s42400-019-0038-7","volume":"2","author":"A Ansam Khraisat","year":"2019","unstructured":"Ansam Khraisat, A., Gondal, I., Vamplew, P., & Kamruzzaman, J. (2019). Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity, 2, 20. https:\/\/doi.org\/10.1186\/s42400-019-0038-7","journal-title":"Cybersecurity"},{"key":"9395_CR22","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpelao","year":"2017","unstructured":"Zarpelao, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A survey of intrusion detection in Internet of Things. Journal of Network and Computer Applications, 84, 25\u201337. https:\/\/doi.org\/10.1016\/j.jnca.2017.02.009","journal-title":"Journal of Network and Computer Applications"},{"key":"9395_CR23","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.asoc.2018.05.049","volume":"72","author":"S Rathore","year":"2018","unstructured":"Rathore, S., & Park, J. H. (2018). Semi-supervised learning based distributed attack detection framework for IoT. Applied Soft Computing, 72, 79\u201389. https:\/\/doi.org\/10.1016\/j.asoc.2018.05.049","journal-title":"Applied Soft Computing"},{"key":"9395_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871719","author":"N Moustafa","year":"2019","unstructured":"Moustafa, N., Turnbull, B., & Choo, K. R. (2019). An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of Internet of Things. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2018.2871719","journal-title":"IEEE Internet of Things Journal"},{"key":"9395_CR25","doi-asserted-by":"publisher","unstructured":"Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007). IPv6 over low power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. IETF, RFC 4919. https:\/\/doi.org\/10.17487\/RFC4919","DOI":"10.17487\/RFC4919"},{"key":"9395_CR26","doi-asserted-by":"publisher","unstructured":"Kasinathan, P., Pastrone, C., Spirito, M. A., & Vinkovits, M. (2013). Denial-of-service detection in 6LoWPAN based Internet of Things. In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE. https:\/\/doi.org\/10.1109\/WiMOB.2013.6673419","DOI":"10.1109\/WiMOB.2013.6673419"},{"key":"9395_CR27","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2512494","author":"P Kasinathan","year":"2013","unstructured":"Kasinathan, P., Costamagna, G., Khaleel, H., Pastrone, C., & Spirito, M. A. (2013). DEMO: An IDS framework for Internet of Things empowered by 6LoWPAN. Proceedings of the ACM SIGSAC Conference on Computer & Communications Security. https:\/\/doi.org\/10.1145\/2508859.2512494","journal-title":"Proceedings of the ACM SIGSAC Conference on Computer & Communications Security"},{"key":"9395_CR28","doi-asserted-by":"publisher","unstructured":"Dvir, A., Holczer, T., & Buttyan, L. (2011). VeRA\u2014Version number and rank authentication in RPL. In 2011 IEEE eighth international conference on mobile ad-hoc and sensor systems. IEEE. https:\/\/doi.org\/10.1109\/MASS.2011.76","DOI":"10.1109\/MASS.2011.76"},{"key":"9395_CR29","unstructured":"Perrey, H., Landsmann, M., Ugus, O., Schmidt, T. C., & W\u00e4hlisch, M. (2013). TRAIL: Topology authentication in RPL. In Proceeding EWSN '16 proceedings of the 2016 international conference on embedded wireless systems and networks (pp. 59\u201364). arXiv:1312.0984v2"},{"key":"9395_CR30","doi-asserted-by":"publisher","unstructured":"Le, A., Loo, J., Luo, Y., & Lasebae, A. (2014). The impacts of internal threats towards routing protocol for low power and Lossy network performance. In 2013 IEEE symposium on computers and communications (ISCC). IEEE. https:\/\/doi.org\/10.1109\/ISCC.2013.6755045.","DOI":"10.1109\/ISCC.2013.6755045"},{"issue":"8","key":"9395_CR31","doi-asserted-by":"publisher","first-page":"794326","DOI":"10.1155\/2013\/794326","volume":"9","author":"L Wallgren","year":"2013","unstructured":"Wallgren, L., Raza, S., & Voigt, T. (2013). Routing attacks and countermeasures in the RPL-based Internet of Things. International Journal of Distributed Sensor Networks, 9(8), 794326. https:\/\/doi.org\/10.1155\/2013\/794326","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"9395_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67910-5_6","volume-title":"Ad-hoc, mobile, and wireless networks. ADHOCNOW 2017. Lecture Notes in Computer Science","author":"P Perazzo","year":"2017","unstructured":"Perazzo, P., Vallati, C., Arena, A., Anastasi, G., & Dini, G. (2017). An implementation and evaluation of the security features of RPL. In A. Puliafito, D. Bruneo, S. Distefano, & F. Longo (Eds.), Ad-hoc, mobile, and wireless networks. ADHOCNOW 2017. Lecture Notes in Computer Science.  (Vol. 10517). Springer. https:\/\/doi.org\/10.1007\/978-3-319-67910-5_6"},{"key":"9395_CR33","doi-asserted-by":"publisher","unstructured":"Mayzaud, A., Sehgal, A., Badonnel, R., Chrisment, I., & Sch\u00f6nw\u00e4lder, J. (2014). A study of RPL DODAG version attacks. In 8th IFIP international conference on autonomous infrastructure, management and security (AIMS), Brno, Czech Republic (pp. 92\u2013104). https:\/\/doi.org\/10.1007\/978-3-662-43862-6_12","DOI":"10.1007\/978-3-662-43862-6_12"},{"key":"9395_CR34","doi-asserted-by":"crossref","unstructured":"Perkins, C., & Das, S. (2003). Ad hoc On-Demand Distance Vector (AODV) Routing. Network Working Group.","DOI":"10.17487\/rfc3561"},{"key":"9395_CR35","doi-asserted-by":"publisher","unstructured":"Xin, H.-M., & Yang, K. (2015). Routing protocols analysis for Internet of Things. In 2015 2nd international conference on information science and control engineering. https:\/\/doi.org\/10.1109\/ICISCE.2015.104","DOI":"10.1109\/ICISCE.2015.104"},{"key":"9395_CR36","unstructured":"Sharma, R., & Sharma, P. (2016). Detection and prevention of wormhole attack in MANETs: A review. International Journal of Science, Engineering and Technology Research (IJSETR), 5(5)."},{"key":"9395_CR37","doi-asserted-by":"publisher","unstructured":"Gupta, S., Kar, S., & Dharmaraja, S. (2011). WHOP: Wormhole attack detection protocol using hound packet. in Proceedings of IEEE international conference on innovations in information technology (pp. 226\u2013231). https:\/\/doi.org\/10.1109\/INNOVATIONS.2011.5893822","DOI":"10.1109\/INNOVATIONS.2011.5893822"},{"key":"9395_CR38","doi-asserted-by":"publisher","unstructured":"Khan, F. I., Shon, T., Lee, T., & Kim, K. (2013). Wormhole attack prevention mechanism for RPL based LLN network. In Proceedings of fifth international conference on ubiquitous and future networks (pp. 149\u2013154). IEEE. https:\/\/doi.org\/10.1109\/ICUFN.2013.6614801","DOI":"10.1109\/ICUFN.2013.6614801"},{"key":"9395_CR39","doi-asserted-by":"publisher","unstructured":"Ji, S., Chen, T., Zhong, S., & Kak, S. (2014). DAWN: Defending against wormhole attacks in wireless network coding systems. In Proceedings of IEEE INFOCOM (pp. 664\u2013672). https:\/\/doi.org\/10.1109\/INFOCOM.2014.6847992","DOI":"10.1109\/INFOCOM.2014.6847992"},{"key":"9395_CR40","doi-asserted-by":"publisher","unstructured":"Arai, M. (2015). Reliability improvement of multi-path routing for wireless sensor networks and its application to wormhole attack avoidance. In Proceedings of ubiquitous intelligence and computing and 2015 IEEE 12th international conference on autonomic and trusted computing and 2015 IEEE 15th international conference on scalable computing and communications and its associated workshops (pp. 533\u2013536). https:\/\/doi.org\/10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.108","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.108"},{"key":"9395_CR41","doi-asserted-by":"publisher","unstructured":"Acharjee, T., Borah, P., & Roy, S. (2015). A new hybrid algorithm to eliminate wormhole attack in wireless mesh networks. In Proceedings of IEEE international conference on computational intelligence and communication networks (CICN) (Vol. 157, pp. 997\u20131002). https:\/\/doi.org\/10.1109\/CICN.2015.198","DOI":"10.1109\/CICN.2015.198"},{"key":"9395_CR42","doi-asserted-by":"publisher","unstructured":"Zheng, J. H., Qian, H. Y., & Wang, L. (2015). Defense technology of wormhole attacks based on node connectivity. In 2015 IEEE international conference on smart city\/SocialCom\/SustainCom together with DataCom 2015 and SC2 2015. https:\/\/doi.org\/10.1109\/SmartCity.2015.107","DOI":"10.1109\/SmartCity.2015.107"},{"key":"9395_CR43","doi-asserted-by":"publisher","unstructured":"Sharma, M. K., & Joshi, B. K. (2016). A mitigation technique for high transmission power based wormhole attack in wireless sensor networks. In IEEE proceedings of international conference on ICT in business industry & government (pp. 1\u20136). https:\/\/doi.org\/10.1109\/ICTBIG.2016.7892698","DOI":"10.1109\/ICTBIG.2016.7892698"},{"issue":"1","key":"9395_CR44","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1186\/s13638-016-0776-0","volume":"2016","author":"GH Lai","year":"2016","unstructured":"Lai, G. H. (2016). Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. EURASIP Journal on Wireless Communications and Networking, 2016(1), 274. https:\/\/doi.org\/10.1186\/s13638-016-0776-0","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"9395_CR45","doi-asserted-by":"publisher","unstructured":"Bendjima, M., & Feham, M. (2016). Wormhole attack detection in wireless sensor networks. In Proceedings of IEEE SAI computing conference (pp. 1319\u20131326). https:\/\/doi.org\/10.1109\/SAI.2016.7556151","DOI":"10.1109\/SAI.2016.7556151"},{"issue":"1","key":"9395_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5121\/ijans.2016.6101","volume":"6","author":"M Patel","year":"2016","unstructured":"Patel, M., & Aggarwal, A. (2016). Detection of hidden wormhole attack in wireless sensor networks using neighbourhood and connectivity information. International Journal on AdHoc Networking Systems (IJANS), 6(1), 1\u201310. https:\/\/doi.org\/10.5121\/ijans.2016.6101","journal-title":"International Journal on AdHoc Networking Systems (IJANS)"},{"issue":"4","key":"9395_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5120\/ijca2017915376","volume":"174","author":"MO Johnson","year":"2017","unstructured":"Johnson, M. O., Siddiqui, A., & Karami, A. (2017). A wormhole attack detection and prevention technique in wireless sensor networks. International Journal of Computer Applications, 174(4), 1\u20138. https:\/\/doi.org\/10.5120\/ijca2017915376","journal-title":"International Journal of Computer Applications"},{"issue":"32\u201349","key":"9395_CR48","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/J.COSE.2018.02.004","volume":"76","author":"DSK Tiruvakadu","year":"2018","unstructured":"Tiruvakadu, D. S. K., & Pallapa, V. (2018). Confirmation of wormhole attack in MANETs using honeypot. Computers & Security, 76(32\u201349), 158. https:\/\/doi.org\/10.1016\/J.COSE.2018.02.004","journal-title":"Computers & Security"},{"key":"9395_CR49","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.jisa.2018.01.005","volume":"39","author":"S Qazi","year":"2018","unstructured":"Qazi, S., Raad, R., Mu, Y., & Susilo, W. (2018). Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. Journal of Information Security and Applications, 39, 31\u201340. https:\/\/doi.org\/10.1016\/j.jisa.2018.01.005","journal-title":"Journal of Information Security and Applications"},{"key":"9395_CR50","doi-asserted-by":"publisher","first-page":"18194","DOI":"10.1109\/ACCESS.2019.2894637","volume":"7","author":"X Luo","year":"2019","unstructured":"Luo, X., Chen, Y., Li, M., Luo, Q., Xue, K., Liu, S., & Chen, L. (2019). CREDND: A novel secure neighbor discovery algorithm for wormhole attack. IEEE Access, 7, 18194\u201318205. https:\/\/doi.org\/10.1109\/ACCESS.2019.2894637","journal-title":"IEEE Access"},{"issue":"3","key":"9395_CR51","doi-asserted-by":"publisher","first-page":"5042","DOI":"10.29042\/2019-5042-5045","volume":"9","author":"S Deshmukh-Bhosale","year":"2019","unstructured":"Deshmukh-Bhosale, S., & Sonavane, S. S. (2019). Detection of security attack in IoT using received signal strength indicator. Helix, 9(3), 5042\u20135045. https:\/\/doi.org\/10.29042\/2019-5042-5045","journal-title":"Helix"},{"key":"9395_CR52","doi-asserted-by":"publisher","unstructured":"Li, X., Shi, H., & Shang, Y. (2005). A sorted RSSI quantization based algorithm for sensor network localization. In 11th international conference on parallel and distributed systems (ICPADS'05). IEEE. https:\/\/doi.org\/10.1109\/ICPADS.2005.53","DOI":"10.1109\/ICPADS.2005.53"},{"key":"9395_CR53","doi-asserted-by":"publisher","unstructured":"Lee, T.-H., Xie, X.-S., & Chang, L.-H. (2014). RSSI-based IPv6 routing metrics for RPL in low power and Lossy networks. In IEEE international conference on systems, man, and cybernetics (SMC). IEEE. https:\/\/doi.org\/10.1109\/SMC.2014.6974164","DOI":"10.1109\/SMC.2014.6974164"},{"key":"9395_CR54","unstructured":"Shojaifar, A. (2015). A thesis on evaluation and Improvement of the RSSI-based localization algorithm. Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden."},{"key":"9395_CR55","unstructured":"Osterlind, F. (2006). A sensor network simulator for the Contiki OS. Swedish Institute of Computer Science (SICS), Technical Report T2006-05."},{"key":"9395_CR56","doi-asserted-by":"publisher","unstructured":"Eriksson, J., \u00d6sterlind, F., Finne, N., & Tsiftes, N. (2009). COOJA\/MSPSim: Interoperability testing for wireless sensor networks. In 2nd international conference on simulation tools and techniques, Rome, Italy (p. 7). https:\/\/doi.org\/10.1145\/1537614.1537650","DOI":"10.1145\/1537614.1537650"},{"key":"9395_CR57","unstructured":"https:\/\/www.fierceelectronics.com\/iot-wireless\/mica-commercialization-microsensor-motes. Accessed on July 2018."},{"key":"9395_CR58","unstructured":"http:\/\/www.eecs.harvard.edu\/\u02dckonrad\/projects\/shimmer\/references\/Tmote-sky-datasheet.pdf. Accessed on July 2018."},{"key":"9395_CR59","unstructured":"Dunkels, A., Eriksson, J., Finne, N., & Tsiftes, N. (2011). Powertrace: Network level power profiling for low-power wireless networks. SICS Technical Report T2011:05, ISSN 1100-3154."},{"issue":"8","key":"9395_CR60","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.1016\/j.adhoc.2013.04.014","volume":"11","author":"R Shahid","year":"2013","unstructured":"Shahid, R., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad Hoc Networks, 11(8), 2661\u20132674. https:\/\/doi.org\/10.1016\/j.adhoc.2013.04.014","journal-title":"Ad Hoc Networks"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09395-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09395-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09395-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T18:14:43Z","timestamp":1651860883000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09395-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,30]]},"references-count":60,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["9395"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09395-y","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-252135\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,30]]},"assertion":[{"value":"14 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The Authors (SAB and SSS) declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}