Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhibo Wang is active.

Publication


Featured researches published by Zhibo Wang.


IEEE Transactions on Mobile Computing | 2014

Achieving k-Barrier Coverage in Hybrid Directional Sensor Networks

Zhibo Wang; Jilong Liao; Qing Cao; Hairong Qi; Zhi Wang

Barrier coverage is a critical issue in wireless sensor networks for security applications (e.g., border protection) where directional sensors (e.g., cameras) are becoming more popular than omni-directional scalar sensors (e.g., microphones). However, barrier coverage cannot be guaranteed after initial random deployment of sensors, especially for directional sensors with limited sensing angles. In this paper, we study how to efficiently use mobile sensors to achieve \(k\) -barrier coverage. In particular, two problems are studied under two scenarios. First, when only the stationary sensors have been deployed, what is the minimum number of mobile sensors required to form \(k\) -barrier coverage? Second, when both the stationary and mobile sensors have been pre-deployed, what is the maximum number of barriers that could be formed? To solve these problems, we introduce a novel concept of weighted barrier graph (WBG) and prove that determining the minimum number of mobile sensors required to form \(k\) -barrier coverage is related with finding \(k\) vertex-disjoint paths with the minimum total length on the WBG. With this observation, we propose an optimal solution and a greedy solution for each of the two problems. Both analytical and experimental studies demonstrate the effectiveness of the proposed algorithms.


distributed computing in sensor systems | 2010

A novel mobility management scheme for target tracking in cluster-based sensor networks

Zhibo Wang; Wei Lou; Zhi Wang; Junchao Ma; Honglong Chen

Target tracking is a typical and important application of wireless sensor networks (WSNs). In the consideration of scalability and energy efficiency for target tracking in large scale WSNs, it has been employed as an effective solution by organizing the WSNs into clusters. However, tracking a moving target in cluster-based WSNs suffers the boundary problem when the target moves across or along the boundary among clusters. In this paper, we propose a novel scheme, called hybrid cluster-based target tracking (HCTT), which integrates on-demand dynamic clustering into a cluster-based WSN for target tracking. To overcome the boundary problem, when the target moves close to the boundary among clusters, a dynamic cluster will be constructed for the management of target tracking. As the target moves, static clusters and on-demand dynamic clusters alternately manage the tracking task. Simulation results show that the proposed scheme performs better in tracking the moving target when compared with other typical target tracking protocols.


International Journal of Distributed Sensor Networks | 2013

A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks

Zhibo Wang; Wei Lou; Zhi Wang; Junchao Ma; Honglong Chen

Target tracking is a typical and important application of wireless sensor networks (WSNs). In consideration of the network scalability and energy efficiency for target tracking in large-scale WSNs, it has been employed as an effective solution by organizing the WSNs into clusters. However, tracking a moving target in cluster-based WSNs suffers a boundary problem when the target moves across or along the boundaries of clusters, as the static cluster membership prevents sensors in different clusters from sharing information. In this paper, we propose a novel mobility management protocol, called hybrid cluster-based target tracking (HCTT), which integrates on-demand dynamic clustering into a cluster-based WSN for target tracking. By constructing on-demand dynamic clusters at boundary regions, nodes from different static clusters that detect the target can temporarily share information, and the tracking task can be handed over smoothly from one static cluster to another. As the target moves, static clusters and on-demand dynamic clusters alternately manage the target tracking task. Simulation results show that the proposed protocol performs better in tracking the moving target when compared with other typical target tracking protocols.


Pervasive and Mobile Computing | 2015

Securing DV-Hop localization against wormhole attacks in wireless sensor networks

Honglong Chen; Wei Lou; Zhi Wang; Junfeng Wu; Zhibo Wang; Aihua Xia

Node localization becomes an important issue in the wireless sensor network as its wide applications in environment monitoring, emergency rescue and battlefield surveillance, etc. Basically, the DV-Hop localization scheme can work well with the assistance of beacon nodes that have the capability of self-positioning. However, if the network is invaded by a wormhole attack, the attacker can tunnel the packets via the wormhole link to severely disrupt the DV-Hop localization process. The distance-vector propagation phase during the DV-Hop localization can even aggravate the positioning error, compared to the localization schemes without wormhole attacks. In this paper, we analyze the impacts of wormhole attack on the DV-Hop localization scheme, based on which we propose a label-based DV-Hop secure localization scheme to defend against the wormhole attack. We further theoretically prove the correctness of the proposed scheme. Simulation results illustrate the effectiveness of the proposed label-based DV-Hop secure localization scheme.


european symposium on research in computer security | 2015

CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud

Qian Wang; Shengshan Hu; Kui Ren; Meiqi He; Minxin Du; Zhibo Wang

Biometric identification has been incredibly useful in the law enforcement to authenticate an individual’s identity and/or to figure out who someone is, typically by scanning a database of records for a close enough match. In this work, we investigate the privacy-preserving biometric identification outsourcing problem, where the database owner outsources both the large-scale encrypted database and the computationally intensive identification job to the semi-honest cloud, relieving itself from data storage and computation burden. We present new privacy-preserving biometric identification protocols, which substantially reduce the computation burden on the database owner. Our protocols build on new biometric data encryption, distance-computation and matching algorithms that novelly exploit inherent structures of biometric data and properties of identification operations. A thorough security analysis shows that our solutions are practically-secure, and the ultimate solution offers a higher level of privacy protection than the-state-of-the-art on biometric identification outsourcing. We evaluate our protocols by implementing an efficient privacy-preserving fingerprint-identification system, showing that our protocols meet both the security and efficiency needs well, and they are appropriate for use in various privacy-preserving biometric identification applications.


networking architecture and storages | 2010

Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks

Junfeng Wu; Honglong Chen; Wei Lou; Zhibo Wang; Zhi Wang

Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, etc. Basically, the DV-Hop localization mechanism can work well with the assistance of beacon nodes that have the capability of self-positioning. However, if the network is invaded by a wormhole attack, the attacker can tunnel the packets via the wormhole link to cause severe impacts on the DV-Hop localization process. The distance-vector propagation phase during the DV-Hop localization even aggravates the positioning result, compared to the localization schemes without wormhole attacks. In this paper, we analyze the impacts of wormhole attack on DV-Hop localization scheme. Based on the basic DV-Hop localization process, we propose a label-based secure localization scheme to defend against the wormhole attack. Simulation results demonstrate that our proposed secure localization scheme is capable of detecting the wormhole attack and resisting its adverse impacts with a high probability.


mobile adhoc and sensor systems | 2013

Barrier Coverage in Hybrid Directional Sensor Networks

Zhibo Wang; Jilong Liao; Qing Cao; Hairong Qi; Zhi Wang

Barrier coverage is a critical issue in wireless sensor networks for security applications (e.g., border protection) where directional sensors (e.g., cameras) are becoming more popular and advantageous than omni-directional scalar sensors for the extra dimensional information they provide. However, barrier coverage can not be guaranteed after initial random deployment of sensors, especially for directional sensors with limited sensing angles. In this paper, we study how to efficiently achieve barrier coverage in hybrid directional sensor networks by moving mobile sensors to fill in gaps and form a barrier with stationary sensors. In specific, we introduce the notion of directional barrier graph to model the barrier coverage formation problem. We prove that the minimum number of mobile sensors required to form a barrier with stationary sensors is the length of the shortest path from the source node to the destination node on the directional barrier graph. We then formulate the problem of minimizing the cost of moving mobile sensors to fill in the gaps on the shortest path as a minimum cost bipartite assignment problem, and solve it in polynomial time using the Hungarian algorithm. Both analytical and experimental studies demonstrate the effectiveness of the proposed algorithm.


IEEE Transactions on Mobile Computing | 2016

A Traffic Adaptive Multi-Channel MAC Protocol with Dynamic Slot Allocation for WSNs

Shuguo Zhuo; Zhi Wang; Ye-Qiong Song; Zhibo Wang; Luis Almeida

Using low duty-cycle is the most common technique to extend the system lifetime in WSNs. However, it also implies limited throughput and long delay and the penalty is even higher under variable traffic patterns. In this paper, we present iQueue-MAC, a hybrid CSMA/TDMA MAC that adapts to variable/bursty traffic. With light load, iQueue-MAC uses a contention-based CSMA mechanism that provides low delay with scattered transmissions. When traffic increases, detected by a forming backlog in the sender, iQueue-MAC changes to a contention-free TDMA mechanism allocating transmission slots. Thus, iQueue-MAC mitigates packet buffering and reduces packet delay, combining the best of TDMA and CSMA. In this paper we also show how iQueue-MAC can operate in both single and multi channel modes. We implemented it on SIM32W108 chips together with other reference WSN protocols for comparison. iQueue-MAC exhibits similar figures during light traffic. However, with bursty traffic its throughput can be five times that of CoSenS and Ri-MAC-MC and its delay 20 times lower. Finally, iQueue-MAC is able to effectively use multiple channels, duplicating its throughput when compared to single channel operation.


international conference on computer communications | 2014

Fault tolerant barrier coverage for wireless sensor networks

Zhibo Wang; Honglong Chen; Qing Cao; Hairong Qi; Zhi Wang

Barrier coverage is a critical issue in wireless sensor networks for security applications (e.g., border protection), the performance of which is highly related with locations of sensor nodes. Existing work on barrier coverage mainly assume that sensor nodes have accurate location information, however, little work explores the effects of location errors on barrier coverage. In this paper, we study the barrier coverage problem when sensor nodes have location errors and deploy mobile sensor nodes to improve barrier coverage if the network is not barrier covered after initial deployment. We analyze the relationship between the true distance and the measured distance of two stationary sensor nodes and derive the minimum number of mobile sensor nodes needed to connect them with a guarantee when nodes location errors. Furthermore, we propose a fault tolerant weighted barrier graph, based on which we prove that the minimum number of mobile sensor nodes needed to form barrier coverage with a guarantee is the length of the shortest path on the graph. Simulation results validate the correctness of our analysis.


Computer Networks | 2017

Achieving location error tolerant barrier coverage for wireless sensor networks

Zhibo Wang; Honglong Chen; Qing Cao; Hairong Qi; Zhi Wang; Qian Wang

Barrier coverage is a critical issue in wireless sensor networks deployed in security applications (e.g., border protection), whose performance strongly depends on the locations of sensor nodes. Existing works on barrier coverage typically assume that sensor nodes have accurate location information, which is not reasonable or practical for many real sensor networks. In this paper, we study the barrier coverage problem when sensor nodes have location errors and deploy mobile sensor nodes to improve barrier coverage if the network is not barrier-covered after initial deployment. We analyze the effects of location errors for barrier coverage and propose a fault-tolerant weighted barrier graph to model the barrier coverage formation problem. Based on the graph, we prove that the minimum number of mobile sensor nodes needed to achieve barrier coverage with a guarantee is the length of the shortest path on the graph. Furthermore, we improve the computational efficiency of the fault-tolerant barrier coverage formation algorithm by removing unnecessary edges on the graph. Experimental results validate the correctness of our analysis and the proposed algorithms.

Collaboration


Dive into the Zhibo Wang's collaboration.

Top Co-Authors

Avatar

Honglong Chen

China University of Petroleum

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hairong Qi

University of Tennessee

View shared research outputs
Top Co-Authors

Avatar

Qing Cao

University of Tennessee

View shared research outputs
Top Co-Authors

Avatar

Kui Ren

University at Buffalo

View shared research outputs
Top Co-Authors

Avatar

Feng Xia

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Wei Lou

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yanjun Li

Zhejiang University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge