{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:43:20Z","timestamp":1759092200374,"version":"3.37.3"},"reference-count":27,"publisher":"Wiley","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2017]]},"abstract":"<jats:p>Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes.<\/jats:p>","DOI":"10.1155\/2017\/3243570","type":"journal-article","created":{"date-parts":[[2017,2,26]],"date-time":"2017-02-26T16:00:41Z","timestamp":1488124841000},"page":"1-12","source":"Crossref","is-referenced-by-count":9,"title":["A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks"],"prefix":"10.1155","volume":"2017","author":[{"given":"Gulshan","family":"Kumar","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1724-0636","authenticated-orcid":true,"given":"Mritunjay Kumar","family":"Rai","sequence":"additional","affiliation":[{"name":"School of Electronics and Communication Engineering, Lovely Professional University, Phagwara, Punjab, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6705-4423","authenticated-orcid":true,"given":"Hye-jin","family":"Kim","sequence":"additional","affiliation":[{"name":"Business Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of Korea"}]},{"given":"Rahul","family":"Saha","sequence":"additional","affiliation":[{"name":"School of Computer Applications, Lovely Professional University, Phagwara, Punjab, India"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00005-2"},{"first-page":"507","volume-title":"Localization in wireless ad hoc networks","year":"2005","key":"3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.12.004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.11.013"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.3724\/sp.j.1001.2008.00879"},{"key":"8","first-page":"123","volume":"6","year":"2011","journal-title":"Journal of Communication"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.3390\/s16020229"},{"first-page":"126","volume-title":"A survey on secure localization in wireless sensor networks","year":"2007","key":"10"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2005.861381"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861380"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1325651.1325654"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.863855"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.phpro.2012.05.060"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2184094"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2010.20"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.12.008"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2015.2478881"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1002\/sec.278"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-011-0127-4"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/642107"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3281-1"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1177\/1687814016642385"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.185"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.7.24"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/3405264"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.01.007"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2006.1637931"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/3243570.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/3243570.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/3243570.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,2,26]],"date-time":"2017-02-26T16:00:42Z","timestamp":1488124842000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2017\/3243570\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":27,"alternative-id":["3243570","3243570"],"URL":"https:\/\/doi.org\/10.1155\/2017\/3243570","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"type":"print","value":"1574-017X"},{"type":"electronic","value":"1875-905X"}],"subject":[],"published":{"date-parts":[[2017]]}}}