scispace - formally typeset
Search or ask a question
Author

Zhibin Zhao

Bio: Zhibin Zhao is an academic researcher from Northeastern University (China). The author has contributed to research in topics: Wireless sensor network & Sensor node. The author has an hindex of 1, co-authored 2 publications receiving 38 citations.

Papers
More filters
Proceedings ArticleDOI
Zhibin Zhao1, Bo Wei1, Xiaomei Dong1, Lan Yao1, Fuxiang Gao1 
14 Aug 2010
TL;DR: This paper presents the SA-TC algorithm, based on the on-demand multi-path routings and uses statistical analysis and time constraint to identify the suspected links and shows that it can detect and locate wormhole attacks successfully and efficiently.
Abstract: With the properties of openness and dynamic in topology, wireless sensor networks are challenged with great security threats. In this paper we focus on the wormhole attack which is proved to be particularly dangerous to the resource-limited sensor nodes. We present the SA-TC algorithm for detecting and thus defending against this serious threat. It is based on the on-demand multi-path routings and uses statistical analysis and time constraint to identify the suspected links. It needs neither time synchronization among the sensors nor extra hardwares such as directional antenna and GPS. The simulative experiment shows that SA-TC can detect and locate wormhole attacks successfully and efficiently.

39 citations

Proceedings ArticleDOI
24 Sep 2009
TL;DR: It is proved in this paper that in once query if all the sensed values are within their corresponding empirical value range, at most k+1 sensor nodes need to be visited for the determination of k-NN query result.
Abstract: In this paper we propose an algorithm FAKNN for optimizing approximate k-NN queries in WSNs. We assign an empirical value range to each sensor node according to its samples. It is proved in this paper that in once query if all the sensed values are within their corresponding empirical value range, at most k+1 sensor nodes need to be visited for the determination of k-NN query result. However, it is unavoidable that some sensed data will go out of their empirical range. So, we introduce the probability model into FAKNN. It is a tradeoff between the result accuracy and the query cost. We make several simulative experiments to validate the performance of the FAKNN algorithm.

Cited by
More filters
Journal ArticleDOI
TL;DR: An overview of WSNs is provided and classify the attacks in W SNs based on protocol stack layers and attack detection methods of eleven mainstream attacks are researched for WSN security measurement.
Abstract: Wireless sensor network (WSN) is an indispensible part of Internet of Things that has been applied in many fields to monitor environments and collect data from surroundings. However, WSNs are highly susceptible to attacks due to its unique characteristics: large-scale, self-organization, dynamic topology, and constrained resources. A number of systems have been proposed to effectively detect varieties of attacks in WSNs. However, most previous surveys on WSN attacks focus on detection methods for only one or two types of attacks and lack detailed performance analysis. Additionally, the literature lacks comprehensive studies on security-related data (in short security data) collection in WSNs. In this paper, we first provide an overview of WSNs and classify the attacks in WSNs based on protocol stack layers. For the purpose of WSN security measurement, we then research attack detection methods of eleven mainstream attacks. We extract security data that play an important role for detecting security anomaly toward security measurement. We further elaborate the advantages and disadvantages of the existing detection methods based on a number of evaluation criteria. Finally, we highlight a number of open problems in this paper field based on our thorough survey and conclude this paper with possible future research directions.

130 citations

Proceedings ArticleDOI
01 Mar 2013
TL;DR: This paper discussed about all the attacks on wireless sensor networks, some of the mitigation schemes to defend these attacks, and how to defend against these attacks.
Abstract: Wireless Sensor Network (WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks infeasible to use conventional security solutions. There are lot of attacks on these networks which can be classified as routing attacks and data traffic attacks. Some of the data attacks in sensor nodes are wormhole, jamming, selective forwarding, sinkhole and Sybil attack. In this paper, we discussed about all these attacks and some of the mitigation schemes to defend these attacks.

64 citations

Proceedings ArticleDOI
08 Apr 2011
TL;DR: The modes of wormholes, how wormholes disrupts routing in AODV, DSR, OLSR and then the solutions and countermeasures on wormholes are discussed.
Abstract: A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Their biggest advantage is also one of their biggest disadvantages: Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. The entire routing system in MANET can even be brought down using the wormhole attack. This paper discusses the modes of wormholes, how wormholes disrupts routing in AODV, DSR, OLSR and then discusses the solutions and countermeasures on wormholes.

37 citations

Dissertation
01 Jan 2016
TL;DR: In this paper, the authors present a list of publications with the same title.xviii List of Publications xx list of authors xx list list of titles xx.xvi List of publications
Abstract: xviii List of Publications xx

24 citations

Proceedings ArticleDOI
09 Jul 2009
TL;DR: A set of algorithms are proposed to aggregate the collected evidences, identify colluding nodes, and reconstruct the potential scenarios of wormholes attacks in WSN.
Abstract: Several solutions were proposed by the literature to detect wormhole attacks in wireless sensor networks (WSN)but, to the best of our knowledge, none of them has taken interest to the problem of digital investigation. We propose in this paper a solution for digital investigation of wormhole attacks in WSN. An observed WSN is defined to support generation and secure forwarding of evidences regarding sensor nodes behavior in the network. A set of investigator nodes, called observers, are distributed over the network in charge of monitoring the network topology and datagram forwarding by sensor nodes. A set of algorithms are proposed to aggregate the collected evidences, identify colluding nodes, and reconstruct the potential scenarios of wormholes attacks.

23 citations