{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T23:26:59Z","timestamp":1770593219087,"version":"3.49.0"},"reference-count":35,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2017,4,24]]},"DOI":"10.3233\/jifs-169303","type":"journal-article","created":{"date-parts":[[2017,4,25]],"date-time":"2017-04-25T11:02:36Z","timestamp":1493118156000},"page":"3695-3710","source":"Crossref","is-referenced-by-count":0,"title":["Robust positioning algorithm based on\u00a0relative location map for mobile wireless\u00a0sensor networks"],"prefix":"10.1177","volume":"32","author":[{"given":"Hua","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Northeastern University, Shenyang, Liaoning, China"}]},{"given":"Yingyou","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Northeastern University, Shenyang, Liaoning, China"},{"name":"State Key Laboratory of Software Architecture, Neusoft Corporation, Shenyang, China"}]},{"given":"Dazhe","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Northeastern University, Shenyang, Liaoning, China"},{"name":"Key Laboratory of Medical Image Computing, Ministry of Education, Northeastern University, Shenyang, China"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-169303_ref1","first-page":"1","article-title":"SecAT-dist: A novel secure AT-dist localization scheme for wireless sensor network","author":"Abdelkarim","year":"2012","journal-title":"Proceedings of the 2012 Vehicular Technology Conference"},{"key":"10.3233\/JIFS-169303_ref2","doi-asserted-by":"crossref","first-page":"1869","DOI":"10.1109\/ICASSP.2012.6288267","article-title":"A gradient descent based approach to secure localization in mobile sensor networks","author":"Garg","year":"2012","journal-title":"Proceedings of the 2012 IEEE International Conference on Acoustics, Speech, and Signal Processing"},{"key":"10.3233\/JIFS-169303_ref3","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/1023720.1023726","article-title":"Localization for mobile sensor networks","author":"Hu","year":"2004","journal-title":"Proceedings of the 10th ACM Annual Intl Conf on Mobile Computing and Networking"},{"key":"10.3233\/JIFS-169303_ref4","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/1102219.1102239","article-title":"Coordinated sensor deployment for improving secure communications and sensing coverage","author":"Mao","year":"2005","journal-title":"Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks"},{"issue":"4","key":"10.3233\/JIFS-169303_ref5","first-page":"2302","article-title":"Sensor relocation in mobile sensor networks","author":"Wang","year":"2005","journal-title":"Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies"},{"key":"10.3233\/JIFS-169303_ref6","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1145\/1062689.1062728","article-title":"Mobility improves coverage of sensor networks","author":"Liu","year":"2005","journal-title":"Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing"},{"issue":"10","key":"10.3233\/JIFS-169303_ref7","doi-asserted-by":"crossref","first-page":"2529","DOI":"10.1016\/j.comnet.2006.11.018","article-title":"Wireless sensor network localization techniques","volume":"51","author":"Mao","year":"2007","journal-title":"Computer Networks"},{"issue":"78","key":"10.3233\/JIFS-169303_ref8","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1016\/j.procs.2016.02.107","article-title":"Secure localisation of wireless devices with application to sensor networks using steganography","author":"Tondwalkar","year":"2016","journal-title":"Procedia Computer Science"},{"issue":"7","key":"10.3233\/JIFS-169303_ref9","doi-asserted-by":"crossref","first-page":"1050","DOI":"10.1109\/TPDS.2008.166","article-title":"Design, Verification of enhanced secure localization scheme in wireless sensor networks","volume":"20","author":"He","year":"2009","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"7","key":"10.3233\/JIFS-169303_ref10","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.3390\/s16071041","article-title":"An MEF-based localization algorithm against outliers in wireless sensor networks","volume":"16","author":"Wang","year":"2016","journal-title":"Sensors"},{"issue":"4","key":"10.3233\/JIFS-169303_ref11","doi-asserted-by":"crossref","first-page":"693","DOI":"10.3233\/AIC-150673","article-title":"Agent based trusted neighbor identification in Wireless Sensor Networks","volume":"28","author":"Geetha","year":"2015","journal-title":"Ai Communications"},{"issue":"3","key":"10.3233\/JIFS-169303_ref12","doi-asserted-by":"crossref","first-page":"1480","DOI":"10.1109\/TVT.2008.926616","article-title":"Secure and robust localization in a wireless ad hoc environment","volume":"58","author":"Misra","year":"2009","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"10.3233\/JIFS-169303_ref13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.jpdc.2016.06.001","article-title":"Path planning algorithms for mobile anchors towards range-free localization","volume":"97","author":"Mondal","year":"2016","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"10.3233\/JIFS-169303_ref14","doi-asserted-by":"crossref","first-page":"1650100","DOI":"10.1142\/S0218126616501000","article-title":"Transceiver optimization for ToA-based localization of mobile WSN","author":"Taheri","year":"2016","journal-title":"Journal of Circuits, Systems and Computers"},{"key":"10.3233\/JIFS-169303_ref15","first-page":"37","article-title":"Locating nodes in mobile sensor networks more accurately and faster","author":"Zhang","year":"2008","journal-title":"Proceedings of 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks"},{"key":"10.3233\/JIFS-169303_ref16","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/iThings\/CPSCom.2011.67","article-title":"An algorithm of weighted Monte Carlo localization based on smallest enclosing circle","author":"Xu","year":"2011","journal-title":"Proceedings of the 2011 IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing"},{"key":"10.3233\/JIFS-169303_ref17","first-page":"164","article-title":"Range-based localization in mobile sensor networks","author":"DiI","year":"2006","journal-title":"Proceedings of European Workshop on Wireless Sensor Networks"},{"issue":"5","key":"10.3233\/JIFS-169303_ref18","doi-asserted-by":"crossref","first-page":"718","DOI":"10.1016\/j.adhoc.2007.06.004","article-title":"Monte carlo localization for mobile wireless sensor networks","volume":"6","author":"Baggio","year":"2008","journal-title":"Ad Hoc Networks"},{"key":"10.3233\/JIFS-169303_ref19","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/IPSN.2007.4379664","article-title":"Localization in wireless sensor networks","author":"Rudafshani","year":"2007","journal-title":"Proceedings of 6th International Symposium on Information Processing in Sensor Networks"},{"key":"10.3233\/JIFS-169303_ref20","first-page":"587","article-title":"Dynamic localization protocols for mobile sensor networks","author":"Tilak","year":"2005","journal-title":"Proceedings of the IEEE International Workshop on Strategies for Energy Efficiency in Ad-hoc and Sensor Networks"},{"issue":"1","key":"10.3233\/JIFS-169303_ref21","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/TMC.2008.84","article-title":"Energy-efficient boundary detection for RF-based localization systems","volume":"8","author":"Lin","year":"2009","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"7","key":"10.3233\/JIFS-169303_ref22","doi-asserted-by":"crossref","first-page":"1041","DOI":"10.3390\/s16071041","article-title":"An MEF-based localization algorithm against outliers in wireless sensor networks","volume":"16","author":"Wang","year":"2016","journal-title":"Sensors"},{"issue":"11","key":"10.3233\/JIFS-169303_ref23","doi-asserted-by":"crossref","first-page":"1945","DOI":"10.1002\/sec.909","article-title":"A novel D\u2013S based secure localization algorithm for wireless sensor networks","volume":"7","author":"Yu","year":"2014","journal-title":"Security and Communication Networks"},{"issue":"2","key":"10.3233\/JIFS-169303_ref24","doi-asserted-by":"crossref","first-page":"229","DOI":"10.3390\/s16020229","article-title":"A collaborative secure localization algorithm based on trust model in underwater wireless sensor networks","volume":"16","author":"Han","year":"2016","journal-title":"Sensors"},{"key":"10.3233\/JIFS-169303_ref25","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.pmcj.2014.01.007","article-title":"Securing DV-Hop localization against wormhole attacks in wireless sensor networks","volume":"16","author":"Chen","year":"2015","journal-title":"Pervasive and Mobile Computing"},{"issue":"3","key":"10.3233\/JIFS-169303_ref26","first-page":"723","article-title":"Secure and lightweight localization method for wireless sensor networks","volume":"96","author":"Myung-Ho","year":"2013","journal-title":"IEICE Transactions on Information and Systems"},{"key":"10.3233\/JIFS-169303_ref27","first-page":"673","article-title":"Secure Localization and Location Verification of Wireless Sensor Network","author":"Edake","year":"2014","journal-title":"Proceedings of the 4th International Conference on Communication Systems and Network Technologies"},{"key":"10.3233\/JIFS-169303_ref28","first-page":"1054","article-title":"SecMCL: A secure monte carlo localization algorithm for mobile sensor networks","author":"Zeng","year":"2009","journal-title":"Proceedings of the 6th International Conference on Mobile Adhoc and Sensor Systems"},{"key":"10.3233\/JIFS-169303_ref29","first-page":"189","article-title":"A game-based secure localization algorithm for mobile wireless sensor networks","author":"Bao","year":"2015","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"10.3233\/JIFS-169303_ref30","first-page":"455","article-title":"The effect of pruning stage in secure localization in wireless sensor networks","author":"Mofarreh-Bonab","year":"2012","journal-title":"Proceedings of the 6th International Symposium on"},{"key":"10.3233\/JIFS-169303_ref31","first-page":"85","article-title":"Game theoretic secure localization in wireless sensor networks","author":"Jha","year":"2014","journal-title":"Proceedings of the International Conference on the Internet of Things"},{"key":"10.3233\/JIFS-169303_ref32","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optimization","author":"Boyd","year":"2004"},{"key":"10.3233\/JIFS-169303_ref33","unstructured":"Yuan Y. and Sun W. , Theory and methods for optimization, Beijing: Science Press, 2001."},{"issue":"10","key":"10.3233\/JIFS-169303_ref34","doi-asserted-by":"crossref","first-page":"3754","DOI":"10.1109\/JSEN.2013.2258905","article-title":"A distributed RSS-based localization using a dynamic circle expanding mechanism","volume":"13","author":"Jiang","year":"2013","journal-title":"IEEE Sensors Journal"},{"issue":"5","key":"10.3233\/JIFS-169303_ref35","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1002\/wcm.72","article-title":"A survey of mobility models for ad hoc network research","volume":"2","author":"Camp","year":"2002","journal-title":"Wireless Communications and Mobile Computing"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-169303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T02:17:06Z","timestamp":1770517026000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-169303"}},"subtitle":[],"editor":[{"given":"K.K.","family":"Mishra","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2017,4,24]]},"references-count":35,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/jifs-169303","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,24]]}}}