{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:42:34Z","timestamp":1740141754444,"version":"3.37.3"},"reference-count":18,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2014,3,1]],"date-time":"2014-03-01T00:00:00Z","timestamp":1393632000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Provincial Natural Science Foundation, China","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Open Project in Zhejiang Provincial Key Lab of Intelligent Processing Research of Visual Media","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}]},{"DOI":"10.13039\/501100011311","name":"State Key Laboratory of Industrial Control Technology","doi-asserted-by":"crossref","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}],"id":[{"id":"10.13039\/501100011311","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100011311","name":"State Key Laboratory of Industrial Control Technology","doi-asserted-by":"crossref","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}],"id":[{"id":"10.13039\/501100011311","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Hong Kong GRF","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}]},{"name":"Hong Kong GRF","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}]},{"name":"HKPU","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}]},{"name":"HKPU","award":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"],"award-info":[{"award-number":["61309023","61273079","61272463","ZR2013FQ032","13CX02100A","2012008","ICT1206","ICT1207","PolyU-524308","PolyU-521312","A-PL16","A-PL84"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2014,3,1]]},"abstract":"<jats:p> Wormhole attack is a severe attack that can be easily launched by a pair of external attackers in hostile wireless sensor networks. In the wormhole attack, an attacker sniffs packets at one point in the network, and tunnels them through the wormhole link to the other attacker at another point of the network, which broadcasts them to its neighbors. Such kind of procedure can easily deteriorate the normal functionality of the networks. In this paper, we propose a novel wormhole attackers detection and positioning scheme based on mobile beacon, which can not only detect the existence of wormhole attacks, but also accurately localize the attackers for the system to eliminate them out of the network. The main idea is to detect whether the communication between the mobile beacon and each of the static beacons violates the communication properties and then the attacker can be estimated as the center of its communication area by determining the intersection point of the chords\u2019 perpendicular bisector. The simulation results illustrate that our proposed scheme can obtain a high wormhole attack detection probability as well as a high attackers positioning accuracy. <\/jats:p>","DOI":"10.1155\/2014\/910242","type":"journal-article","created":{"date-parts":[[2014,3,30]],"date-time":"2014-03-30T21:06:10Z","timestamp":1396213570000},"page":"910242","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks"],"prefix":"10.1177","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0739-6338","authenticated-orcid":false,"given":"Honglong","family":"Chen","sequence":"first","affiliation":[{"name":"College of Information and Control Engineering, China University of Petroleum, Qingdao 266580, China"},{"name":"The Hong Kong Polytechnic University and Shenzhen Research Institute, Shenzhen 518057, China"},{"name":"Department of Computing, The Hong Kong Polytechnic University, Kowloon 999077, Hong Kong"}]},{"given":"Wendong","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, East China Jiaotong University, Nanchang 330013, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5804-3279","authenticated-orcid":false,"given":"Zhibo","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Computer Science, University of Tennessee, Knoxville, TN 37934, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0490-2031","authenticated-orcid":false,"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou 310027, China"}]},{"given":"Yanjun","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University of Technology, Hangzhou 310014, China"}]}],"member":"179","published-online":{"date-parts":[[2014,3,30]]},"reference":[{"key":"B1-2014-910242","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861380"},{"key":"B2-2014-910242","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2010.41"},{"key":"B3-2014-910242","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861394"},{"key":"B4-2014-910242","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.292"},{"first-page":"21","volume-title":"Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor networks (in association with 10th ACM Conference on Computer and Communications Security)","author":"\u010capkun S.","key":"B5-2014-910242"},{"first-page":"30","volume-title":"Proceedings of the 2003 ACM Workshop on Wireless Security (WiSec '03)","author":"Hu Y. C.","key":"B6-2014-910242"},{"key":"B7-2014-910242","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320200"},{"key":"B8-2014-910242","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-75462-8_19"},{"key":"B9-2014-910242","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"},{"key":"B10-2014-910242","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359564"},{"key":"B11-2014-910242","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2008.016198"},{"key":"B12-2014-910242","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.21"},{"key":"B13-2014-910242","doi-asserted-by":"publisher","DOI":"10.1145\/2107502.2107519"},{"key":"B14-2014-910242","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2163730"},{"volume-title":"Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '10)","author":"Dimitriou T.","key":"B15-2014-910242"},{"key":"B16-2014-910242","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2010.5682340"},{"journal-title":"Pervasive and Mobile Computing","year":"2014","author":"Chen H.","key":"B17-2014-910242"},{"journal-title":"Wireless Communications and Mobile Computing","year":"2014","author":"Chen H.","key":"B18-2014-910242"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/910242","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2014\/910242","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2014\/910242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T16:31:16Z","timestamp":1621182676000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2014\/910242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,1]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,3,1]]}},"alternative-id":["10.1155\/2014\/910242"],"URL":"https:\/\/doi.org\/10.1155\/2014\/910242","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2014,3,1]]}}}