{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:03:32Z","timestamp":1768406612649,"version":"3.49.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s11277-024-11290-1","type":"journal-article","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T15:05:47Z","timestamp":1719500747000},"page":"1375-1402","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Secure 3D: Secure and Energy Efficient Localization in 3D Environment using Wireless Sensor Networks"],"prefix":"10.1007","volume":"136","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2289-4968","authenticated-orcid":false,"given":"A. V.","family":"Kalpana","sequence":"first","affiliation":[]},{"given":"A. V.","family":"Geetha","sequence":"additional","affiliation":[]},{"given":"M. S.","family":"Jagadeesh","sequence":"additional","affiliation":[]},{"given":"J.","family":"Shobana","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,27]]},"reference":[{"issue":"18","key":"11290_CR1","doi-asserted-by":"publisher","first-page":"6119","DOI":"10.1109\/JSEN.2017.2732464","volume":"17","author":"X Liu","year":"2017","unstructured":"Liu, X., Li, W., Han, F., & Xie, Y. (2017). An optimization scheme of enhanced adaptive dynamic energy consumption based on joint network-channel coding in WSNs. IEEE Sensors Journal, 17(18), 6119\u20136128.","journal-title":"IEEE Sensors Journal"},{"key":"11290_CR2","unstructured":"Wireless Sensors Network Market | 2021 - 26 | Industry Share, Size, Growth - Mordor Intelligence. https:\/\/www.mordorintelligence.com\/industry-reports\/wireless-sensor-networks-market Accessed 2022-01-17"},{"issue":"7","key":"11290_CR3","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1109\/JSEN.2010.2102748","volume":"11","author":"CH Ou","year":"2011","unstructured":"Ou, C. H. (2011). A localization scheme for wireless sensor networks using mobile anchors with directional antennas. IEEE Sensors Journal, 11(7), 1607\u20131616.","journal-title":"IEEE Sensors Journal"},{"issue":"2","key":"11290_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1049\/iet-wss.2010.0057","volume":"1","author":"KH Kwong","year":"2011","unstructured":"Kwong, K. H., Wu, T. T., Goh, H. G., Sasloglou, K., Stephen, B., Glover, I., Shen, C., Du, W., Michie, C., & Andonovic, I. (2011). Implementation of herd management systems with wireless sensor networks. IET Wireless Sensor Systems, 1(2), 55\u201365.","journal-title":"IET Wireless Sensor Systems"},{"issue":"8","key":"11290_CR5","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102\u2013114.","journal-title":"IEEE Communications Magazine"},{"issue":"4","key":"11290_CR6","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1109\/JSAC.2005.843548","volume":"23","author":"AT Ihler","year":"2005","unstructured":"Ihler, A. T., Fisher, J. W., Moses, R. L., & Willsky, A. S. (2005). Nonparametric belief propagation for self-localization of sensor networks. IEEE Journal on Selected Areas in Communications, 23(4), 809\u2013819. https:\/\/doi.org\/10.1109\/JSAC.2005.843548","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"11290_CR7","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1109\/TWC.2011.120911.101147","volume":"11","author":"JT Chiang","year":"2011","unstructured":"Chiang, J. T., Haas, J. J., Choi, J., & Hu, Y.-C. (2011). Secure location verification using simultaneous multilateration. IEEE Transactions on Wireless Communications, 11(2), 584\u2013591.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"11290_CR8","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1049\/iet-spr:20080029","volume":"3","author":"K Yu","year":"2009","unstructured":"Yu, K., Guo, Y. J., & Hedley, M. (2009). ToA-based distributed localisation with unknown internal delays and clock frequency offsets in wireless sensor networks. IET Signal Processing, 3(2), 106\u2013118.","journal-title":"IET Signal Processing"},{"key":"11290_CR9","doi-asserted-by":"publisher","unstructured":"Xiao, J., Ren, L., & Tan, J. (2006). Research of TDOA based self-localization approach in wireless sensor network. In 2006 IEEE\/RSJ International Conference on Intelligent Robots and Systems, pp. 2035\u20132040. https:\/\/doi.org\/10.1109\/IROS.2006.282415","DOI":"10.1109\/IROS.2006.282415"},{"key":"11290_CR10","doi-asserted-by":"publisher","unstructured":"Niculescu, D., & Nath, B. (2003). Ad hoc positioning system (APS) using AOA. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), vol. 3, pp. 1734\u201317433. https:\/\/doi.org\/10.1109\/INFCOM.2003.1209196","DOI":"10.1109\/INFCOM.2003.1209196"},{"issue":"2","key":"11290_CR11","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1109\/JSEN.2010.2070872","volume":"11","author":"BN Hood","year":"2011","unstructured":"Hood, B. N., & Barooah, P. (2011). Estimating DoA from radio-frequency RSSI measurements using an actuated reflector. IEEE Sensors Journal, 11(2), 413\u2013417. https:\/\/doi.org\/10.1109\/JSEN.2010.2070872","journal-title":"IEEE Sensors Journal"},{"key":"11290_CR12","doi-asserted-by":"publisher","first-page":"23168","DOI":"10.1109\/ACCESS.2021.3056701","volume":"9","author":"RA Nazib","year":"2021","unstructured":"Nazib, R. A., & Moh, S. (2021). Energy-efficient and fast data collection in UAV-aided wireless sensor networks for hilly terrains. IEEE Access, 9, 23168\u201323190. https:\/\/doi.org\/10.1109\/ACCESS.2021.3056701","journal-title":"IEEE Access"},{"key":"11290_CR13","doi-asserted-by":"publisher","unstructured":"Cai, W., & Zhang, M. (2018). Smooth 3d dubins curves based mobile data gathering in sparse underwater sensor networks. Sensors 18(7). https:\/\/doi.org\/10.3390\/s18072105","DOI":"10.3390\/s18072105"},{"issue":"4","key":"11290_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1380564.1380570","volume":"11","author":"D Liu","year":"2008","unstructured":"Liu, D., Ning, P., Liu, A., Wang, C., & Du, W. K. (2008). Attack-resistant location estimation in wireless sensor networks. ACM Transactions on Information and System Security (TISSEC), 11(4), 1\u201339. https:\/\/doi.org\/10.1145\/1380564.1380570","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"10","key":"11290_CR15","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1093\/comjnl\/bxr138","volume":"56","author":"G Han","year":"2013","unstructured":"Han, G., Jiang, J., Shu, L., Guizani, M., & Nishio, S. (2013). A two-step secure localization for wireless sensor networks. The Computer Journal, 56(10), 1154\u20131166.","journal-title":"The Computer Journal"},{"key":"11290_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, L., Yang, Z., Zhang, S., Yang, H., et al. (2019). Three-dimensional localization algorithm of wsn nodes based on rssi-toa and single mobile anchor node. Journal of Electrical and Computer Engineering 2019","DOI":"10.1109\/ICMTMA.2019.00116"},{"issue":"2","key":"11290_CR17","doi-asserted-by":"publisher","first-page":"448","DOI":"10.3390\/s21020448","volume":"21","author":"X Huang","year":"2021","unstructured":"Huang, X., Han, D., Cui, M., Lin, G., & Yin, X. (2021). Three-dimensional localization algorithm based on improved A* and DV-Hop algorithms in wireless sensor network. Sensors, 21(2), 448.","journal-title":"Sensors"},{"key":"11290_CR18","doi-asserted-by":"publisher","unstructured":"Boustani, A., Alamatsaz, N., Jadliwala, M., & Namboodiri, V. (2014). LocJam: A novel jamming-based approach to secure localization in wireless networks. In 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 336\u2013344. https:\/\/doi.org\/10.1109\/CCNC.2014.6866592","DOI":"10.1109\/CCNC.2014.6866592"},{"key":"11290_CR19","doi-asserted-by":"publisher","unstructured":"Jiang, J., Han, G., Shu, L., Chao, H.-C., & Nishio, S. (2011). A novel secure localization scheme against collaborative collusion in wireless sensor networks. In 2011 7th International Wireless Communications and Mobile Computing Conference, pp. 308\u2013313 . https:\/\/doi.org\/10.1109\/IWCMC.2011.5982551","DOI":"10.1109\/IWCMC.2011.5982551"},{"key":"11290_CR20","doi-asserted-by":"crossref","unstructured":"Mi, Q., Stankovic, J.A., & Stoleru, R. (2010). Secure walking gps: A secure localization and key distribution scheme for wireless sensor networks. In Proceedings of the Third ACM Conference on Wireless Network Security, pp. 163\u2013168","DOI":"10.1145\/1741866.1741893"},{"issue":"6","key":"11290_CR21","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1109\/TMC.2010.20","volume":"9","author":"M Jadliwala","year":"2010","unstructured":"Jadliwala, M., Zhong, S., Upadhyaya, S. J., Qiao, C., & Hubaux, J.-P. (2010). Secure distance-based localization in the presence of cheating beacon nodes. IEEE Transactions on Mobile Computing, 9(6), 810\u2013823.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"2","key":"11290_CR22","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TMC.2011.258","volume":"12","author":"M Fiore","year":"2011","unstructured":"Fiore, M., Casetti, C. E., Chiasserini, C.-F., & Papadimitratos, P. (2011). Discovery and verification of neighbor positions in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 12(2), 289\u2013303.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"11290_CR23","doi-asserted-by":"crossref","unstructured":"Kristalina, P., Sudarsono, A., Syafrudin, M., & Putra, B.K. (2016). SCLoc: secure localization platform for Indoor wireless sensor network. In 2016 International Electronics Symposium (IES), pp. 420\u2013425. IEEE","DOI":"10.1109\/ELECSYM.2016.7861043"},{"issue":"2","key":"11290_CR24","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1109\/JSEN.2018.2877306","volume":"19","author":"X Liu","year":"2018","unstructured":"Liu, X., Su, S., Han, F., Liu, Y., & Pan, Z. (2018). A range-based secure localization algorithm for wireless sensor networks. IEEE Sensors Journal, 19(2), 785\u2013796.","journal-title":"IEEE Sensors Journal"},{"issue":"2","key":"11290_CR25","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TIFS.2012.2184094","volume":"7","author":"R Garg","year":"2012","unstructured":"Garg, R., Varna, A. L., & Wu, M. (2012). An efficient gradient descent approach to secure localization in resource constrained wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(2), 717\u2013730.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"11290_CR26","doi-asserted-by":"crossref","unstructured":"Jha, S., Tripakis, S., Seshia, S.A., & Chatterjee, K. (2014). Game theoretic secure localization in wireless sensor networks. In 2014 International Conference on the Internet of Things (IoT), pp. 85\u201390. IEEE","DOI":"10.1109\/IOT.2014.7030120"},{"issue":"1\u20132","key":"11290_CR27","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1504\/IJAHUC.2016.078481","volume":"23","author":"N Saeed","year":"2016","unstructured":"Saeed, N., & Stojkoska, B. R. (2016). Robust localisation algorithm for large scale 3D wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 23(1\u20132), 82\u201391.","journal-title":"International Journal of Ad Hoc and Ubiquitous Computing"},{"key":"11290_CR28","doi-asserted-by":"publisher","unstructured":"Villalpando-Hernandez, R., Vargas-Rosales, C., & Munoz-Rodriguez, D. (2021). Localization algorithm for 3d sensor networks: A recursive data fusion approach. Sensors 21(22) . https:\/\/doi.org\/10.3390\/s21227626","DOI":"10.3390\/s21227626"},{"key":"11290_CR29","doi-asserted-by":"crossref","unstructured":"Mani, R., Rios-Navarro, A., Sevillano-Ramos, J. L., & Liouane, N. (2023). Improved 3d localization algorithm for large scale wireless sensor networks. Wireless Networks, 1\u201316","DOI":"10.1007\/s11276-023-03265-0"},{"key":"11290_CR30","doi-asserted-by":"crossref","unstructured":"Kumar, P., Mishra, S., Singh, S., Nikolovski, S., Louzazni, M., et al. (2024). Localization in 3d wireless sensor networks with obstacle consideration. Journal of Sensors 2024","DOI":"10.1155\/2024\/3426319"},{"issue":"3","key":"11290_CR31","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s11235-022-00888-0","volume":"80","author":"P Singh","year":"2022","unstructured":"Singh, P., Mittal, N., & Singh, P. (2022). A novel hybrid range-free approach to locate sensor nodes in 3d WSN using GWO-fa algorithm. Telecommunication Systems, 80(3), 303\u2013323.","journal-title":"Telecommunication Systems"},{"issue":"11","key":"11290_CR32","doi-asserted-by":"publisher","first-page":"4275","DOI":"10.3390\/s22114275","volume":"22","author":"Q Liang","year":"2022","unstructured":"Liang, Q., Chu, S.-C., Yang, Q., Liang, A., & Pan, J.-S. (2022). Multi-group gorilla troops optimizer with multi-strategies for 3d node localization of wireless sensor networks. Sensors, 22(11), 4275.","journal-title":"Sensors"},{"issue":"3","key":"11290_CR33","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s11276-021-02557-7","volume":"27","author":"P Singh","year":"2021","unstructured":"Singh, P., & Mittal, N. (2021). An efficient localization approach to locate sensor nodes in 3d wireless sensor networks using adaptive flower pollination algorithm. Wireless Networks, 27(3), 1999\u20132014.","journal-title":"Wireless Networks"},{"issue":"6","key":"11290_CR34","doi-asserted-by":"publisher","first-page":"8354","DOI":"10.1109\/JSEN.2020.3046736","volume":"21","author":"Y Fan","year":"2020","unstructured":"Fan, Y., Qi, X., & Liu, L. (2020). Fault-tolerant cooperative localization of 3d mobile networks via two-layer filter multidimensional scaling. IEEE Sensors Journal, 21(6), 8354\u20138366.","journal-title":"IEEE Sensors Journal"},{"key":"11290_CR35","doi-asserted-by":"publisher","unstructured":"Recent Advances in Geometric Inequalities. (1992). vol. 28. Kluwer Academic Publishers, Heidelberg, Germany . https:\/\/doi.org\/10.1007\/BF00047034","DOI":"10.1007\/BF00047034"},{"issue":"21","key":"11290_CR36","doi-asserted-by":"publisher","first-page":"10003","DOI":"10.1109\/JSEN.2019.2927733","volume":"19","author":"X Cai","year":"2019","unstructured":"Cai, X., Wang, P., Du, L., Cui, Z., Zhang, W., & Chen, J. (2019). Multi-objective three-dimensional DV-hop localization algorithm with NSGA-II. IEEE Sensors Journal, 19(21), 10003\u201310015. https:\/\/doi.org\/10.1109\/JSEN.2019.2927733","journal-title":"IEEE Sensors Journal"},{"key":"11290_CR37","doi-asserted-by":"publisher","unstructured":"Shu, J., Yan, C., & Liu, L. l. (2012). Improved three-dimensional localization algorithm based on volume-test scan for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications, 19(2), 1\u20136. https:\/\/doi.org\/10.1016\/S1005-8885(11)60452-4","DOI":"10.1016\/S1005-8885(11)60452-4"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11290-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11290-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11290-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T16:28:51Z","timestamp":1720110531000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11290-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["11290"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11290-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6]]},"assertion":[{"value":"8 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author(s) declare(s) that there is no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}