{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T17:28:08Z","timestamp":1763141288113,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/jsyst.2019.2961476","type":"journal-article","created":{"date-parts":[[2020,1,20]],"date-time":"2020-01-20T20:36:40Z","timestamp":1579552600000},"page":"3949-3956","source":"Crossref","is-referenced-by-count":15,"title":["A Lattice Signcrypted Secured Localization in Wireless Sensor Networks"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0026-149X","authenticated-orcid":false,"given":"Gulshan","family":"Kumar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3921-9512","authenticated-orcid":false,"given":"Rahul","family":"Saha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1724-0636","authenticated-orcid":false,"given":"Mritunjay Kumar","family":"Rai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3588-2317","authenticated-orcid":false,"given":"Reji","family":"Thomas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0117-8102","authenticated-orcid":false,"given":"Tai-Hoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"ref38","first-page":"21","article-title":"Tilateration based localization algorithm for wireless sensor network","volume":"1","author":"oguejiofor","year":"2013","journal-title":"International Journal of Science and Modern Engineering"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2017.0075"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023403323460"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.09.006"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/818917"},{"year":"0","key":"ref37","article-title":"[Online]. Available"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2012-83"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36252-1_67"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxx002"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.jnca.2015.11.019","article-title":"A survey on mobility-assisted localization techniques in wireless sensor networks","volume":"60","author":"halder","year":"2016","journal-title":"J Netw Comput Appl"},{"journal-title":"Practical Signcryption Information Security and Cryptography","year":"2011","author":"dent","key":"ref40"},{"key":"ref11","first-page":"29","article-title":"Secure node localization in wireless sensor network: A review","author":"kaur","year":"2015","journal-title":"Proc Int Conf Technol Manage Social Sci"},{"journal-title":"Location Localization and Localizability Location-awareness Technology for Wireless Networks","year":"2010","author":"liu","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861381"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023650"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440942"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861380"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2006.28"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2005.1542800"},{"key":"ref19","article-title":"LAD: Localization anomaly detection for wireless sensor networks","author":"du","year":"2005","journal-title":"Proc 19th IEEE Int Parallel Distributed Process Symp"},{"key":"ref28","article-title":"Secure DV-Hop localization scheme against wormhole","volume":"2012","author":"labraoui","year":"2011","journal-title":"Trans Emerg Telecommun Technol"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.01.007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.03.002"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.apnr.2019.03.005"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.3390\/s19020327","article-title":"Secure smart cameras by aggregate-signcryption with decryption fairness for multi-receiver IoT applications","volume":"19","author":"ullah","year":"2019","journal-title":"SENSORS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2018.8614931"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2018.11.008"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.03.024"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SEGE.2016.7589556"},{"key":"ref20","first-page":"99","article-title":"Attack-resistant location estimation in sensor networks","author":"liu","year":"2005","journal-title":"Proc IEEE 4th Int Symp Inf Process Sensor Netw"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.863855"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1325651.1325654"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00434-7_15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.06.009"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"ref23","first-page":"629","article-title":"Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment","author":"gope","year":"2017","journal-title":"Future Gener Comput Syst"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxx002"},{"key":"ref43","article-title":"GLITCH: A discrete Gaussian testing suite for lattice-based cryptography","author":"james","year":"2017","journal-title":"Proc IACR Cryptology"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.005"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/9185112\/08963926.pdf?arnumber=8963926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:02:30Z","timestamp":1651078950000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8963926\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":43,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2019.2961476","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"type":"print","value":"1932-8184"},{"type":"electronic","value":"1937-9234"},{"type":"electronic","value":"2373-7816"}],"subject":[],"published":{"date-parts":[[2020,9]]}}}