{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:54Z","timestamp":1750306314837,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905106","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Performance Analysis of Secure Localization Techniques in Wireless Sensor Network"],"prefix":"10.1145","author":[{"given":"Deepak","family":"Prashar","sequence":"first","affiliation":[{"name":"Lovely Professional University, I.K.G Punjab Tech University, Jalandhar, Punjab"}]},{"given":"Dilip","family":"Kumar","sequence":"additional","affiliation":[{"name":"SLIET, Punjab"}]},{"given":"Kiran","family":"Jyoti","sequence":"additional","affiliation":[{"name":"GNDEC, Punjab"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/ICCSN.2010.108"},{"issue":"1","key":"e_1_3_2_1_2_1","first-page":"62","article-title":"Wireless Sensor Networks: Security Issues & Challenges","volume":"2","author":"Jain M. K.","year":"2011","unstructured":"M. K. Jain , \" Wireless Sensor Networks: Security Issues & Challenges ,\" IJCIT , vol. 2 , no. 1 , pp. 62 -- 67 , 2011 . M. K. Jain, \"Wireless Sensor Networks: Security Issues & Challenges,\" IJCIT, vol. 2, no. 1, pp. 62--67, 2011.","journal-title":"IJCIT"},{"key":"e_1_3_2_1_3_1","first-page":"185","article-title":"Security for Wireless Ad hoc Networks","author":"Anjum Farooq","year":"2007","unstructured":"Farooq Anjum and Petros Mouchtaris , \" Security for Wireless Ad hoc Networks ,\" John Wiley & Sons , pp. 185 -- 222 , 2007 . Farooq Anjum and Petros Mouchtaris, \"Security for Wireless Ad hoc Networks,\" John Wiley & Sons, pp. 185--222, 2007.","journal-title":"John Wiley & Sons"},{"key":"e_1_3_2_1_4_1","first-page":"567","volume-title":"ICIA 2008, International Conference","author":"Song W.,G.","year":"2008","unstructured":"Zhuang, W.,G. Song , J. Tan , and A. Song , \" Localization for Hybrid Sensor Networks in Unknown Environments using Received Signal Strength Indicator,\" Information and Automation , ICIA 2008, International Conference , pp. 567 -- 572 , 2008 . Zhuang, W.,G. Song, J. Tan, and A. Song, \"Localization for Hybrid Sensor Networks in Unknown Environments using Received Signal Strength Indicator,\" Information and Automation, ICIA 2008, International Conference, pp. 567--572, 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/TSP.2003.814469"},{"issue":"9","key":"e_1_3_2_1_6_1","first-page":"2239","article-title":"Secure Authentication Technique for Localization in Wireless Sensor Networks","volume":"8","author":"Velumani P. S.","year":"2013","unstructured":"P. S. Velumani and S. Murugappan , \" Secure Authentication Technique for Localization in Wireless Sensor Networks ,\" International Review on Computers and Software (I.RE.CO.S.) , vol. 8 , no. 9 , pp. 2239 -- 2246 , September 2013 . P. S. Velumani and S. Murugappan, \"Secure Authentication Technique for Localization in Wireless Sensor Networks,\" International Review on Computers and Software (I.RE.CO.S.), vol. 8, no. 9, pp. 2239--2246, September 2013.","journal-title":"International Review on Computers and Software (I.RE.CO.S.)"},{"key":"e_1_3_2_1_7_1","first-page":"99","volume-title":"ROPE: Robust Position Estimation in Wireless Sensor Networks,\" Proceeding of the 4th International Symposium on Information Processing in Sensor Network (IPSN'05)","author":"Lazos L.","year":"2005","unstructured":"L. Lazos and R. Poovendran , \" ROPE: Robust Position Estimation in Wireless Sensor Networks,\" Proceeding of the 4th International Symposium on Information Processing in Sensor Network (IPSN'05) , pp. 99 -- 106 , April 2005 . L. Lazos and R. Poovendran, \"ROPE: Robust Position Estimation in Wireless Sensor Networks,\" Proceeding of the 4th International Symposium on Information Processing in Sensor Network (IPSN'05), pp. 99--106, April 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/1077391.1077395"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/JSAC.2005.861381"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/DASC.2006.28"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1016\/j.comnet.2008.04.002"},{"issue":"6","key":"e_1_3_2_1_12_1","first-page":"460","article-title":"Secure Localization in Wireless Sensor Networks: A survey","volume":"6","year":"2011","unstructured":"Jinfang. Jiang, Guangjie. Han, and Chuan. Zhu , \" Secure Localization in Wireless Sensor Networks: A survey ,\" Journal of Communications , vol. 6 , No. 6 , pp. 460 -- 470 , September 2011 . Jinfang. Jiang, Guangjie. Han, and Chuan. Zhu, \"Secure Localization in Wireless Sensor Networks: A survey,\" Journal of Communications, vol. 6, No. 6, pp. 460--470, September 2011.","journal-title":"Journal of Communications"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1002\/sec.178"},{"issue":"6","key":"e_1_3_2_1_14_1","article-title":"Arising Issues in Wireless Sensor Networks: Current Proposals and Future Developments","volume":"8","author":"Ulya Maqbool","year":"2013","unstructured":"Saima. Maqbool and Ulya . Sabeel , \" Arising Issues in Wireless Sensor Networks: Current Proposals and Future Developments ,\" IOSR Journal of Computer Engineering , vol. 8 , No. 6 , February 2013 . Saima. Maqbool and Ulya. Sabeel, \"Arising Issues in Wireless Sensor Networks: Current Proposals and Future Developments,\" IOSR Journal of Computer Engineering, vol. 8, No. 6, February 2013.","journal-title":"IOSR Journal of Computer Engineering"},{"doi-asserted-by":"crossref","unstructured":"Hindwai Publishing Corporation The Scientific World Journal 2014 Reputation Based Secure Localization in Wireless Sensor Networks","key":"e_1_3_2_1_15_1","DOI":"10.1155\/2014\/308341"},{"issue":"1","key":"e_1_3_2_1_16_1","first-page":"308341","article-title":"TROPE: Trust Based Secure Robust Position Estimation in Wireless Sensor Networks","volume":"1","author":"M","year":"2014","unstructured":"Nirmala. M and A. S , \" TROPE: Trust Based Secure Robust Position Estimation in Wireless Sensor Networks ,\" Computer Applications: International Journal (CAIJ) , vol. 1 , No. 1 , DOI: 10.1155\/2014\/ 308341 , August 2014 . 10.1155\/2014 Nirmala. M and A. S, \"TROPE: Trust Based Secure Robust Position Estimation in Wireless Sensor Networks,\" Computer Applications: International Journal (CAIJ), vol. 1, No. 1, DOI: 10.1155\/2014\/308341, August 2014.","journal-title":"Computer Applications: International Journal (CAIJ)"},{"key":"e_1_3_2_1_17_1","first-page":"277","article-title":"Localization in Secvnsor Network: In Handbook of Sensor Networks: Algorithms and Architecture","author":"Taylor Bachrach","year":"2005","unstructured":"Bachrach and C. Taylor , \" Localization in Secvnsor Network: In Handbook of Sensor Networks: Algorithms and Architecture ,\" Wiley Publications , pp. 277 -- 310 , 2005 . Bachrach and C. Taylor, \" Localization in Secvnsor Network: In Handbook of Sensor Networks: Algorithms and Architecture,\" Wiley Publications, pp. 277--310, 2005.","journal-title":"Wiley Publications"},{"key":"e_1_3_2_1_18_1","first-page":"45","volume-title":"Current Approaches and Future Challenges: Network Protocols and Algorithms","author":"Wireless Sensor Network Localization Algorithms","year":"2010","unstructured":"Pal, A., \" Localization Algorithms in Wireless Sensor Network : Current Approaches and Future Challenges: Network Protocols and Algorithms ,\" vol. 2 , pp. 45 -- 73 , 2010 . Pal, A., \" Localization Algorithms in Wireless Sensor Network: Current Approaches and Future Challenges: Network Protocols and Algorithms,\" vol. 2, pp. 45--73, 2010."},{"key":"e_1_3_2_1_19_1","first-page":"299","article-title":"Abdus, \"Bio-Mimic Optimization Strategies in Wireless Sensor Networks Survey","volume":"14","author":"Akhtaruzzamn","year":"2014","unstructured":"Md. Akhtaruzzamn and ohammand. Abdus, \"Bio-Mimic Optimization Strategies in Wireless Sensor Networks Survey ,\" Sensors , ISSN 1424-8220, vol. 14 , pp. 299 -- 345 , 2014 Md.Akhtaruzzamn and ohammand. Abdus, \"Bio-Mimic Optimization Strategies in Wireless Sensor Networks Survey,\" Sensors, ISSN 1424-8220, vol. 14, pp. 299--345, 2014","journal-title":"Sensors"},{"issue":"2","key":"e_1_3_2_1_20_1","first-page":"301","article-title":"Improving Security Connection in Wireless Sensor Networks","volume":"2","author":"Christain Hassan","year":"2014","unstructured":"Abdalraouf. Hassan and Christain . Bach , \" Improving Security Connection in Wireless Sensor Networks ,\" International Journal of Innovation and Scientific Research , vol. 2 , No. 2 , pp. 301 -- 307 , Jun 2014 . Abdalraouf. Hassan and Christain. Bach, \" Improving Security Connection in Wireless Sensor Networks,\" International Journal of Innovation and Scientific Research, vol. 2, No. 2, pp. 301--307, Jun 2014.","journal-title":"International Journal of Innovation and Scientific Research"},{"issue":"2","key":"e_1_3_2_1_21_1","first-page":"2320","article-title":"Secure Localization and Key Distribution in Wireless Sensor Networks","volume":"2","author":"Karthika K.","year":"2014","unstructured":"K. Karthika , R. Arthi , and Dr. K. Murujan , \" Secure Localization and Key Distribution in Wireless Sensor Networks ,\" International Journal of Research in Engineering & Advanced Technology , vol. 2 , No. 2 , ISSN: 2320 - 8791 , May 2014 . K. Karthika, R. Arthi, and Dr. K. Murujan, \"Secure Localization and Key Distribution in Wireless Sensor Networks,\" International Journal of Research in Engineering & Advanced Technology, vol. 2, No. 2, ISSN: 2320-8791, May 2014.","journal-title":"International Journal of Research in Engineering & Advanced Technology"},{"unstructured":"International Journal of Distributed Sensor Networks Hindawi Publishing Corporation Anchor Node Based Distributed Localization with Error Detection in Wireless Sensor Networks 10.1155\/2014","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","article-title":"Improved Grid Scan Localization Algorithm for Wireless Sensor Networks","author":"Veeranjaneyulu Srinivasa","unstructured":"Raghava. Srinivasa and Veeranjaneyulu . Chinta , \" Improved Grid Scan Localization Algorithm for Wireless Sensor Networks ,\" Journal of Engineering, Hindawi Publishing Corporation , DOI: 10.1155\/2012\/975147, September 2014. 10.1155\/2012 Raghava. Srinivasa and Veeranjaneyulu. Chinta, \"Improved Grid Scan Localization Algorithm for Wireless Sensor Networks,\" Journal of Engineering, Hindawi Publishing Corporation, DOI: 10.1155\/2012\/975147, September 2014.","journal-title":"Journal of Engineering, Hindawi Publishing Corporation"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.4236\/wsn.2010.211104"}],"event":{"acronym":"ICTCS '16","name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:03Z","timestamp":1750222443000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":24,"alternative-id":["10.1145\/2905055.2905106","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905106","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}