{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:33:36Z","timestamp":1725680016579},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/pccc.2010.5682340","type":"proceedings-article","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T14:08:43Z","timestamp":1294409323000},"page":"25-33","source":"Crossref","is-referenced-by-count":8,"title":["Secure localization against wormhole attacks using conflicting sets"],"prefix":"10.1109","author":[{"given":"Honglong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Wei","family":"Lou","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"SLAW: A Secure Localization Aproach Against Wormhole Attacks Using Conflicting Sets","author":"chen","year":"2010","journal-title":"Technical Report Dept of Computing The Hong Kong Polytechnic University"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861381"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-02830-4_23","article-title":"Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks","author":"chen","year":"2009","journal-title":"the 6th International Conference on Ubiquitous Intelligence and Computing (UIC)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/627039"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4481347"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440942"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2006.28"},{"key":"ref16","article-title":"Detecting Malicious Beacon Nodes for Secure Localization Discovery in Wireless Sensor Networks","author":"liu","year":"2005","journal-title":"IEEE ICDCS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MAHSS.2005.1542800"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.302"},{"key":"ref19","article-title":"Attack-Resistant Location Estimation in Sensor Networks","author":"liu","year":"2005","journal-title":"IEEE IPSN"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2009.5339673"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209196"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381693"},{"key":"ref6","article-title":"Sensor Localization with Ring Overlapping Based on Comparison of Received Signal Strength Indicator","author":"liu","year":"2004","journal-title":"IEEE MASS"},{"key":"ref29","article-title":"Wormholes no more? Localized Wormhole Detection and Prevention in Wireless Networks","author":"dimitriou","year":"2010","journal-title":"IEEE DCOSS"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2004.1313145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1077391.1077395"},{"key":"ref7","first-page":"1666","article-title":"Organizing a Global Coordinate System from Local Information on an Amorphous Computer","author":"nagpa","year":"1999"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814469"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1356988"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938995"},{"key":"ref20","article-title":"Robust Statistical Methods for Securing Wireless Localization in Sensor Networks","author":"li","year":"2005","journal-title":"IEEE IPSN"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.292"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320200"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/941315.941317"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2008.016198"},{"key":"ref25","article-title":"An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks","author":"wang","year":"2007","journal-title":"the 31th Annual International Computer Software and Applications Conference"}],"event":{"name":"2010 29th IEEE International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2010,12,9]]},"location":"Albuquerque, NM, USA","end":{"date-parts":[[2010,12,11]]}},"container-title":["International Performance Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5678852\/5682287\/05682340.pdf?arnumber=5682340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T18:08:45Z","timestamp":1497895725000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5682340\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/pccc.2010.5682340","relation":{},"subject":[],"published":{"date-parts":[[2010,12]]}}}