{"id":"https://openalex.org/W4213217764","doi":"https://doi.org/10.1109/ipsn.2005.1440904","title":"Attack-resistant location estimation in sensor networks","display_name":"Attack-resistant location estimation in sensor networks","publication_year":2005,"publication_date":"2005-06-15","ids":{"openalex":"https://openalex.org/W4213217764","doi":"https://doi.org/10.1109/ipsn.2005.1440904"},"language":"en","primary_location":{"id":"doi:10.1109/ipsn.2005.1440904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipsn.2005.1440904","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062014809","display_name":"Donggang Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Donggang Liu","raw_affiliation_strings":["North Carolina State University, USA","North Carolina State University"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102810546","display_name":"Peng Ning","orcid":"https://orcid.org/0009-0000-1877-7334"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peng Ning","raw_affiliation_strings":["North Carolina State University, USA","North Carolina State University"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047825382","display_name":"Wenliang Du","orcid":"https://orcid.org/0000-0002-9234-0912"},"institutions":[{"id":"https://openalex.org/I70983195","display_name":"Syracuse University","ror":"https://ror.org/025r5qe02","country_code":"US","type":"education","lineage":["https://openalex.org/I70983195"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenliang Kevin Du","raw_affiliation_strings":["Syracuse University, USA"],"affiliations":[{"raw_affiliation_string":"Syracuse University, USA","institution_ids":["https://openalex.org/I70983195"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062014809"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":10.1278,"has_fulltext":false,"cited_by_count":133,"citation_normalized_percentile":{"value":0.98250945,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"99","last_page":"106"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10326","display_name":"Indoor and Outdoor Localization Technologies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7508612871170044},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7255874872207642},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6393992900848389},{"id":"https://openalex.org/keywords/signal-strength","display_name":"Signal strength","score":0.5099393129348755},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5069572925567627},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46132105588912964},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.45136192440986633},{"id":"https://openalex.org/keywords/signal","display_name":"SIGNAL (programming language)","score":0.43003469705581665},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42458534240722656},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4008173942565918},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.158083975315094},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13758796453475952}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7508612871170044},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7255874872207642},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6393992900848389},{"id":"https://openalex.org/C176808163","wikidata":"https://www.wikidata.org/wiki/Q17105794","display_name":"Signal strength","level":3,"score":0.5099393129348755},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5069572925567627},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46132105588912964},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.45136192440986633},{"id":"https://openalex.org/C2779843651","wikidata":"https://www.wikidata.org/wiki/Q7390335","display_name":"SIGNAL (programming language)","level":2,"score":0.43003469705581665},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42458534240722656},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4008173942565918},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.158083975315094},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13758796453475952},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ipsn.2005.1440904","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ipsn.2005.1440904","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4178585397","display_name":"Collaborative Research: Trustworthy and Resilient Location Discovery in Wireless Sensor Networks","funder_award_id":"0430252","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6704025954","display_name":"Collaborative Research: Trustworthy and Resilient Location Discovery in Wireless Sensor Networks","funder_award_id":"0430223","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W66579788","https://openalex.org/W151572038","https://openalex.org/W1581621714","https://openalex.org/W1583345160","https://openalex.org/W1989651117","https://openalex.org/W2019396864","https://openalex.org/W2064757631","https://openalex.org/W2100796177","https://openalex.org/W2101963262","https://openalex.org/W2109228966","https://openalex.org/W2110099156","https://openalex.org/W2117781301","https://openalex.org/W2117984332","https://openalex.org/W2119362555","https://openalex.org/W2130137998","https://openalex.org/W2158442058","https://openalex.org/W2161151370","https://openalex.org/W2164947865","https://openalex.org/W2166237942","https://openalex.org/W2168452204","https://openalex.org/W2290174367","https://openalex.org/W3211513184","https://openalex.org/W4213217764","https://openalex.org/W4231753281","https://openalex.org/W4238162570","https://openalex.org/W4243443630","https://openalex.org/W6602744961","https://openalex.org/W6606142579","https://openalex.org/W6634699991","https://openalex.org/W6634867760","https://openalex.org/W6677374569","https://openalex.org/W6683428164"],"related_works":["https://openalex.org/W1975451135","https://openalex.org/W2989915292","https://openalex.org/W1603736412","https://openalex.org/W2890570089","https://openalex.org/W2098964748","https://openalex.org/W2028665396","https://openalex.org/W3193869263","https://openalex.org/W2766591598","https://openalex.org/W2347771173","https://openalex.org/W2069832942"],"abstract_inverted_index":{"Many":[0],"sensor":[1,17,33,97,198],"network":[2],"applications":[3],"require":[4],"sensors'":[5],"locations":[6],"to":[7,88],"function":[8],"correctly.":[9],"Despite":[10],"the":[11,28,52,57,108,111,118,142,148,153,156,164,175,188,194],"recent":[12],"advances,":[13],"location":[14,43,60,94],"discovery":[15,44,95],"for":[16,32,193],"networks":[18,34],"in":[19,37,79,96],"hostile":[20,38],"environments":[21],"has":[22],"been":[23],"mostly":[24],"overlooked.":[25],"Most":[26],"of":[27,42,70,110,155,166,197],"existing":[29],"localization":[30],"protocols":[31],"are":[35,191],"vulnerable":[36],"environments.":[39],"The":[40,99,183],"security":[41,81],"can":[45,136],"certainly":[46],"be":[47],"enhanced":[48],"by":[49,125],"authentication.":[50],"However,":[51],"possible":[53],"node":[54],"compromises":[55],"and":[56,174,180],"fact":[58],"that":[59,147,187],"determination":[61],"uses":[62],"certain":[63],"physical":[64],"features":[65],"(e.g.,":[66],"received":[67],"signal":[68],"strength)":[69],"radio":[71],"signals":[72,106,124,151],"make":[73],"authentication":[74],"not":[75],"as":[76,78],"effective":[77],"traditional":[80],"applications.":[82],"This":[83,160],"paper":[84,161],"presents":[85,163],"two":[86],"methods":[87,135,190],"tolerate":[89],"malicious":[90,104,122,138],"attacks":[91,139,143],"against":[92],"beacon-based":[93],"networks.":[98,199],"first":[100],"method":[101,120],"filters":[102],"out":[103],"beacon":[105,115,123,150,158],"on":[107,169],"basis":[109],"\"consistency\"":[112],"among":[113],"multiple":[114],"signals,":[116],"while":[117],"second":[119],"tolerates":[121],"adopting":[126],"an":[127],"it":[128],"era":[129],"lively":[130],"refined":[131],"voting":[132],"scheme.":[133],"Both":[134],"survive":[137],"even":[140],"if":[141],"bypass":[144],"authentication,":[145],"provided":[146],"benign":[149],"constitute":[152],"majority":[154],"\"consistent\"":[157],"signals.":[159],"also":[162],"implementation":[165],"these":[167],"techniques":[168],"MICA2":[170],"motes":[171],"running":[172],"TinyOS,":[173],"evaluation":[176],"through":[177],"both":[178],"simulation":[179],"field":[181],"experiments.":[182],"experimental":[184],"results":[185],"demonstrate":[186],"proposed":[189],"promising":[192],"current":[195],"generation":[196]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":11},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":15}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
