{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T14:59:27Z","timestamp":1648997967047},"reference-count":35,"publisher":"SAGE Publications","issue":"10","license":[{"start":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T00:00:00Z","timestamp":1380585600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<jats:p> Wireless sensor and actor networks are fully automated. Actor nodes are inducted to communicate with sensor nodes directly and reduce the communication delay caused by base station or sink nodes. Sometimes, the actor node is directly accessible without the involvement of any control room. The actor node is responsible for taking a prompt action against the reported event by a sensor node. For secure communication, it is essential that sensor and actor nodes be aware of their existing location and the data must be encrypted before transmission. Due to energy constraints, secure localization in wireless sensor networks is a hot issue. To date, the researchers have proposed many approaches for localization of sensor nodes in the network. In this paper, we provide new insights for secure actor directed localization technique in wireless sensor and actor networks. A secure connectivity based localization (CBL) approach for sensor and actor nodes localization is presented. The proposed approach helps to locate a sensor node efficiently and effectively. We have also decreased the possibility of attacks and the registration of attacker nodes with other legitimate nodes in the network. The proposed technique prevents man-in-the-middle attacks and securely delivers data to the destination. <\/jats:p>","DOI":"10.1155\/2013\/126327","type":"journal-article","created":{"date-parts":[[2013,10,11]],"date-time":"2013-10-11T16:27:28Z","timestamp":1381508848000},"page":"126327","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["Secure Actor Directed Localization in Wireless Sensor and Actor Networks"],"prefix":"10.1177","volume":"9","author":[{"given":"Tamleek","family":"Ali","sequence":"first","affiliation":[{"name":"Institute of Management Sciences, Peshawar, Pakistan"}]},{"given":"Muazzam A.","family":"Khan","sequence":"additional","affiliation":[{"name":"E&ME College, National University of Science and Technology, Islamabad, Pakistan"}]},{"given":"Amir","family":"Hayat","sequence":"additional","affiliation":[{"name":"COMSATS Institute of Information Technology, Islamabad, Pakistan"}]},{"given":"Masoom","family":"Alam","sequence":"additional","affiliation":[{"name":"COMSATS Institute of Information Technology, Islamabad, Pakistan"}]},{"given":"Muhammad","family":"Ali","sequence":"additional","affiliation":[{"name":"Institute of Management Sciences, Peshawar, Pakistan"}]}],"member":"179","published-online":{"date-parts":[[2013,10,10]]},"reference":[{"issue":"12","key":"B1-2013-126327","doi-asserted-by":"crossref","first-page":"3179","DOI":"10.3390\/s7123179","volume":"7","author":"Xia F.","year":"2007","journal-title":"Sensors"},{"issue":"10","key":"B2-2013-126327","doi-asserted-by":"crossref","first-page":"2157","DOI":"10.3390\/s7102157","volume":"7","author":"Xia F.","year":"2007","journal-title":"Sensors"},{"key":"B3-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.4395372"},{"key":"B4-2013-126327","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2004.04.003"},{"key":"B6-2013-126327","volume-title":"Proceedings of International Conference of World Academy of Science, Engineering and Technology Conference","author":"Khan M. A."},{"issue":"10","key":"B7-2013-126327","volume":"19","author":"Khan M. A.","year":"2012","journal-title":"Wulfenia Journal"},{"issue":"9","key":"B8-2013-126327","volume":"4","author":"Khan M. A.","year":"2012","journal-title":"Journal of Computing"},{"key":"B10-2013-126327","volume-title":"Proceedings of International Conference on Computer Communications and Networks (CCN '10)","author":"Khan M. A."},{"key":"B9-2013-126327","first-page":"21","volume-title":"Proceedings of International Conference on Electrical, Computer, Electronics & Communication Engineering","author":"Khan M. A."},{"key":"B11-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2010.5548829"},{"key":"B12-2013-126327","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938995"},{"key":"B13-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.370"},{"key":"B14-2013-126327","doi-asserted-by":"publisher","DOI":"10.3390\/s90402760"},{"key":"B15-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2007.4379664"},{"key":"B16-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2006.278666"},{"key":"B17-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.100"},{"key":"B18-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2007.655"},{"key":"B19-2013-126327","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1004.2008.00344"},{"key":"B20-2013-126327","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0231-0"},{"key":"B21-2013-126327","first-page":"166","volume-title":"Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom '01)","author":"Savvides A."},{"key":"B22-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2005.102"},{"key":"B23-2013-126327","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.01.002"},{"key":"B24-2013-126327","volume-title":"Proceedings of the 1st International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing (FOWANC '08)","author":"Li X."},{"key":"B25-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.70706"},{"key":"B26-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.67"},{"key":"B27-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.510"},{"key":"B28-2013-126327","doi-asserted-by":"publisher","DOI":"10.1145\/1236360.1236368"},{"key":"B29-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440942"},{"key":"B30-2013-126327","first-page":"21","volume-title":"Proceedings of the ACM Workshop on Wireless Security (WiSe '04)","author":"Lazos L."},{"key":"B31-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440903"},{"key":"B32-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440904"},{"key":"B33-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.20"},{"key":"B35-2013-126327","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062167"},{"key":"B36-2013-126327","doi-asserted-by":"publisher","DOI":"10.3390\/s100302450"},{"key":"B37-2013-126327","doi-asserted-by":"publisher","DOI":"10.4103\/0256-4602.50703"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/126327","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/126327","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/126327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T19:02:27Z","timestamp":1621191747000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/126327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":35,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2013,10,1]]}},"alternative-id":["10.1155\/2013\/126327"],"URL":"https:\/\/doi.org\/10.1155\/2013\/126327","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}