{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:45:36Z","timestamp":1755693936129,"version":"3.37.0"},"reference-count":14,"publisher":"Academy Publisher","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.7.1.187-194","type":"journal-article","created":{"date-parts":[[2012,1,31]],"date-time":"2012-01-31T23:27:47Z","timestamp":1328052467000},"source":"Crossref","is-referenced-by-count":4,"title":["A Robust Localization in Wireless Sensor Networks against Wormhole Attack"],"prefix":"10.4304","volume":"7","author":[{"given":"Yanchao","family":"Niu","sequence":"first","affiliation":[]},{"given":"Deyun","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Chen","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2012,1,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2004.1316758"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023650"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-008-0041-9"},{"key":"ref4","first-page":"1976","volume-title":"C et al. Packet leashes: a defense against wormhole attacks in wireless networks.","volume":"3","author":"Hu","year":"2003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.35"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1023403323460"},{"key":"ref7","first-page":"344","article-title":"Analysis of Range-Free Anchor-Free Localization in a WSN under Wormhole Attack","volume-title":"Proceedings of the 10th ACM\/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'07)","author":"Xu"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2006.010837"},{"first-page":"8","volume-title":"Hop-distance estimation in wireless sensor networks with applications to resources allocation.","year":"2007","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2006.012472"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.03.008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(90)90358-O"},{"key":"ref13","first-page":"2065","article-title":"Towards a theory of robust localization against malicious beacon nodes.","volume":"1-5","author":"Zhong","year":"2008","journal-title":"INFOCOM"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1145\/381677.381693","article-title":"Dynamic fine-grained localization in ad-hoc networks of sensors.","volume-title":"Proc. 7th Ann. Intl. Conf. on Mobile Computing and Networking","author":"Savvides","year":"2001"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:12:42Z","timestamp":1738775562000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,1]]},"references-count":14,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2012,1,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.7.1.187-194","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2012,1,1]]}}}