{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:43:08Z","timestamp":1740141788924,"version":"3.37.3"},"reference-count":15,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61371135"],"award-info":[{"award-number":["61371135"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,9,1]]},"abstract":"<jats:p> The issue of node localization is a fundamental problem in wireless sensor networks. Recently, the localization problem for mobile sensor networks in hostile environment has received significant attention. Due to the mobility of the sensor nodes, it is more challenging to achieve node localization in attacked sensor networks than in static ones. To address these challenges, the paper presents a novel game-based secure localization algorithm. The nodes' strategy level can be indicated through the results of trust evaluation and then by means of constructing reasonable strategy space and payoff function using game theory; all kinds of nodes within the network can achieve the optimal payoffs. The performance of our algorithm is evaluated by extensive simulation experiments. The simulation results show that the localization error of our proposed algorithm is lower than those of the existing ones in attacked environment. <\/jats:p>","DOI":"10.1155\/2015\/642107","type":"journal-article","created":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T21:34:25Z","timestamp":1441143265000},"page":"642107","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks"],"prefix":"10.1177","volume":"11","author":[{"given":"Tianyue","family":"Bao","sequence":"first","affiliation":[{"name":"School of Instrumentation Science and Optoelectronics Engineering, Beijing University of Aeronautics and Astronautics (Beihang University), Beijing 100191, China"},{"name":"Northeast Petroleum University, Daqing 163318, China"}]},{"given":"Jiangwen","family":"Wan","sequence":"additional","affiliation":[{"name":"School of Instrumentation Science and Optoelectronics Engineering, Beijing University of Aeronautics and Astronautics (Beihang University), Beijing 100191, China"}]},{"given":"Kefu","family":"Yi","sequence":"additional","affiliation":[{"name":"School of Instrumentation Science and Optoelectronics Engineering, Beijing University of Aeronautics and Astronautics (Beihang University), Beijing 100191, China"}]},{"given":"Qiang","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Instrumentation Science and Optoelectronics Engineering, Beijing University of Aeronautics and Astronautics (Beihang University), Beijing 100191, China"}]}],"member":"179","published-online":{"date-parts":[[2015,9,1]]},"reference":[{"key":"B1-2015-642107","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.82"},{"key":"B2-2015-642107","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.06.010"},{"key":"B3-2015-642107","doi-asserted-by":"publisher","DOI":"10.1109\/tsp.2008.2007916"},{"key":"B4-2015-642107","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-011-9564-7"},{"key":"B5-2015-642107","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.151"},{"key":"B6-2015-642107","doi-asserted-by":"publisher","DOI":"10.3390\/s120709055"},{"key":"B7-2015-642107","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2005.1440942"},{"key":"B8-2015-642107","doi-asserted-by":"publisher","DOI":"10.1145\/2422966.2422983"},{"key":"B9-2015-642107","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/107024"},{"key":"B10-2015-642107","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.42"},{"key":"B11-2015-642107","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2202228"},{"key":"B12-2015-642107","doi-asserted-by":"publisher","DOI":"10.3390\/s110201345"},{"key":"B13-2015-642107","doi-asserted-by":"publisher","DOI":"10.1109\/jproc.2012.2208211"},{"key":"B14-2015-642107","doi-asserted-by":"publisher","DOI":"10.1145\/2422966.2422981"},{"key":"B15-2015-642107","doi-asserted-by":"publisher","DOI":"10.1002\/sec.909"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/642107","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/642107","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/642107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T12:36:57Z","timestamp":1620391017000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/642107"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,1]]},"references-count":15,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2015,9,1]]}},"alternative-id":["10.1155\/2015\/642107"],"URL":"https:\/\/doi.org\/10.1155\/2015\/642107","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,9,1]]}}}