{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:24:48Z","timestamp":1725783888464},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1109\/ccnc.2014.6866592","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T21:10:57Z","timestamp":1406754657000},"page":"336-344","source":"Crossref","is-referenced-by-count":3,"title":["LocJam: A novel jamming-based approach to secure localization in wireless networks"],"prefix":"10.1109","author":[{"given":"Arash","family":"Boustani","sequence":"first","affiliation":[]},{"given":"Navid","family":"Alamatsaz","sequence":"additional","affiliation":[]},{"given":"Murtuza","family":"Jadliwala","sequence":"additional","affiliation":[]},{"given":"Vinod","family":"Namboodiri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/JSAC.2005.861380"},{"key":"35","article-title":"Ecolocation: A sequence based technique for rf-only localization in wireless sensor networks","author":"yedavalli","year":"2005","journal-title":"ACM\/IEEE IPSN"},{"key":"17","article-title":"Detecting malicious beacon nodes for secure location discovery in wireless sensor networks","author":"liu","year":"2005","journal-title":"ICDCS"},{"doi-asserted-by":"publisher","key":"36","DOI":"10.1109\/WIAD.2010.5544935"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/IPDPS.2004.1302934"},{"doi-asserted-by":"publisher","key":"33","DOI":"10.1109\/IPSN.2005.1440942"},{"key":"15","article-title":"Robust statistical methods for securing wireless localization in sensor networks","author":"li","year":"2005","journal-title":"ACM\/IEEE IPSN"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1109\/INFCOM.2003.1208941"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/IPSN.2005.1440904"},{"year":"2006","author":"sawant","journal-title":"Grid-based Coordinated Routing in Wireless Sensor Networks","key":"39"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/1555816.1555820"},{"key":"14","article-title":"Spoofed! fake gps signals lead yacht astray","author":"williams","year":"2013","journal-title":"Computer World"},{"key":"37","article-title":"Group signatures","author":"chaum","year":"1991","journal-title":"Eurocrypt"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1155\/S1110865703212063","article-title":"A self-localization method for wireless sensor networks","author":"moses","year":"2003","journal-title":"Eurasip Journal on Applied Signal Processing Special Issue on Sensor Networks"},{"key":"38","article-title":"How to leak a secret","author":"rivest","year":"2001","journal-title":"ASIACRYPT"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/IROS.2006.282415"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1007\/978-3-642-23822-2_1"},{"key":"20","article-title":"Secure and robust localization in a wireless ad hoc environment","author":"misra","year":"2008","journal-title":"IEEE Transactions on Vehicular Technology"},{"doi-asserted-by":"publisher","key":"42","DOI":"10.1109\/JSAC.2005.861394"},{"doi-asserted-by":"publisher","key":"41","DOI":"10.1002\/0470095121"},{"doi-asserted-by":"publisher","key":"40","DOI":"10.1109\/ICCCN.2007.4317868"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/TCOMM.2012.040212.100291"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1155\/2012\/972101"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/TMC.2010.20"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1145\/941311.941313"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1002\/9780470022962"},{"key":"27","article-title":"Adaptive enhanced cell-id fingerprinting localization by clustering of precise position measurements","author":"wigren","year":"2008","journal-title":"IEEE Transactions on Vehicular Technology"},{"doi-asserted-by":"publisher","key":"28","DOI":"10.1109\/ICUWB.2011.6058930"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1109\/INFCOM.2001.916662"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/INFCOM.2000.832252"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/128756.128759"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1016\/j.comnet.2006.11.007"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/2.940014"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1109\/TPDS.2004.67"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/SAHCN.2004.1381945"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1023\/A:1023403323460"},{"key":"32","article-title":"A beacon-less location discovery scheme for wireless sensor networks","author":"fang","year":"2005","journal-title":"IEEE INFOCOM"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/98.878533"},{"key":"31","article-title":"Sensor positioning in wireless ad-hoc sensor. Networks using multidimensional scaling","author":"ji","year":"2004","journal-title":"IEEE INFOCOM"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/345910.345917"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/1132905.1132933"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1137\/040621600"}],"event":{"name":"2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2014,1,10]]},"location":"Las Vegas, NV","end":{"date-parts":[[2014,1,13]]}},"container-title":["2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6858322\/6866537\/06866592.pdf?arnumber=6866592","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T17:36:59Z","timestamp":1498153019000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866592\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2014.6866592","relation":{},"subject":[],"published":{"date-parts":[[2014,1]]}}}