{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T22:41:51Z","timestamp":1654123311327},"reference-count":14,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1,1]]},"abstract":"<p>Secure node localization in wireless sensor networks (WSN) has become an important research topic. Although, Global Positioning System (GPS) based node localization has got significant attention from researchers, GPS-free node localization trend is evolving in recent times. GPS-free node localization in mobile sensor networks can be constructed in two ways: Beacon based (BB) and Without Beacon based (WBB). The BB approach has been studied extensively under adversarial model and many algorithms based on BB approach have been proposed in literature in order to localize nodes in a secure manner. In contrast, WBB approach for node localization under adversarial model has not received substantial attention from researchers. In this paper, the authors discuss WBB approach for node localization under adversarial model. The authors discuss static and dynamic key settings for node localization using WBB approach. The authors present an improved protocol for node localization in mobile sensor networks, aiming at minimizing the impact of node capture threats. The authors consider the LEAP (Localized Encryption and Authentication Protocol) (Zhu, Setia, &amp; Jajodia, 2003) and the LOCK (Localized Combinatorial Keying) (Eltoweissy, Moharrum, &amp; Mukkamala, 2006) as the building blocks of their proposed scheme. The authors show that the improved protocol provides effective node localization in a secure manner with minimal node capture threats.<\/p>","DOI":"10.4018\/ijwnbt.2014010102","type":"journal-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T16:36:16Z","timestamp":1396370176000},"page":"18-33","source":"Crossref","is-referenced-by-count":0,"title":["Secure Node Localization in Mobile Sensor Networks"],"prefix":"10.4018","volume":"3","author":[{"given":"Rachit","family":"Mittal","sequence":"first","affiliation":[{"name":"Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, Gujarat, India"}]},{"given":"Manik Lal","family":"Das","sequence":"additional","affiliation":[{"name":"Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, Gujarat, India"}]}],"member":"2432","reference":[{"key":"ijwnbt.2014010102-0","doi-asserted-by":"crossref","unstructured":"Capkun, S., & Hubaux, J. P. (2005). Secure positioning of wireless devices with application to sensor networks. In Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (Vol. 3, pp. 1917\u20131928).","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"ijwnbt.2014010102-1","unstructured":"Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symp. Security and Privacy (pp. 197\u2013213)."},{"key":"ijwnbt.2014010102-2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1632659"},{"key":"ijwnbt.2014010102-3","doi-asserted-by":"crossref","unstructured":"Lazos, L., & Poovendran, R. (2004). SeRLoc: Secure range-independent localization for wireless sensor networks. In Proceedings of the Third ACM Workshop on Wireless Security (pp. 21\u201330).","DOI":"10.1145\/1023646.1023650"},{"key":"ijwnbt.2014010102-4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861381"},{"key":"ijwnbt.2014010102-5","doi-asserted-by":"crossref","unstructured":"Lazos, L., Poovendran, R., & Capkun, S. (2005). Rope: Robust position estimation in wireless sensor networks. In Proceedings of the Fourth International Conference on Information Processing in Sensor Networks (pp. 324\u2013331).","DOI":"10.1109\/IPSN.2005.1440942"},{"key":"ijwnbt.2014010102-6","doi-asserted-by":"crossref","unstructured":"Liu, D., & Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 52\u201361).","DOI":"10.1145\/948109.948119"},{"key":"ijwnbt.2014010102-7","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380570"},{"key":"ijwnbt.2014010102-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.12.008"},{"key":"ijwnbt.2014010102-9","doi-asserted-by":"crossref","unstructured":"Rasmussen, K. B., Capkun, S., & Cagalj, M. (2007). SecNav: Secure broadcast localization and time synchronization in wireless networks. In Proceedings of the ACM International Conference on Mobile Computing and Networking (pp. 310\u2013313).","DOI":"10.1145\/1287853.1287892"},{"key":"ijwnbt.2014010102-10","unstructured":"Savarese, C., Rabaey, J., & Beutel, J. (2001). Locationing in distributed ad-hoc wireless sensor networks. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (pp. 2037\u20132040)."},{"key":"ijwnbt.2014010102-11","unstructured":"Srinivasan, A., & Wu, J. (2007). A survey on secure localization in wireless sensor networks. Encyclopedia of wireless and mobile communications. CRC Press, Taylor and Francis Group."},{"key":"ijwnbt.2014010102-12","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications Special issue on Security on Wireless Ad-hoc and Sensor Networks, 30(11-12), 2314\u20132341.","DOI":"10.1016\/j.comcom.2007.04.009"},{"key":"ijwnbt.2014010102-13","doi-asserted-by":"crossref","unstructured":"Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communications Security (pp.62\u201372).","DOI":"10.1145\/948109.948120"}],"container-title":["International Journal of Wireless Networks and Broadband Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=104628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T21:58:24Z","timestamp":1654120704000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijwnbt.2014010102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,1,1]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijwnbt.2014010102","relation":{},"ISSN":["2155-6261","2155-627X"],"issn-type":[{"value":"2155-6261","type":"print"},{"value":"2155-627X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1,1]]}}}