{"id":"https://openalex.org/W2342690304","doi":"https://doi.org/10.1109/jiot.2016.2516102","title":"Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks","display_name":"Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks","publication_year":2016,"publication_date":"2016-01-08","ids":{"openalex":"https://openalex.org/W2342690304","doi":"https://doi.org/10.1109/jiot.2016.2516102","mag":"2342690304"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2016.2516102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2016.2516102","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085757528","display_name":"Xianghui Cao","orcid":"https://orcid.org/0000-0002-6771-0571"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xianghui Cao","raw_affiliation_strings":["School of Automation, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012259366","display_name":"Devu Manikantan Shila","orcid":"https://orcid.org/0000-0001-9882-147X"},"institutions":[{"id":"https://openalex.org/I4401726811","display_name":"Hartford Financial Services (United States)","ror":"https://ror.org/00mwq1g96","country_code":null,"type":"company","lineage":["https://openalex.org/I4401726811"]},{"id":"https://openalex.org/I162281398","display_name":"University of Hartford","ror":"https://ror.org/034gcgd08","country_code":"US","type":"education","lineage":["https://openalex.org/I162281398"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Devu Manikantan Shila","raw_affiliation_strings":["United Technologies Research Center, Hartford, CT, USA"],"affiliations":[{"raw_affiliation_string":"United Technologies Research Center, Hartford, CT, USA","institution_ids":["https://openalex.org/I162281398","https://openalex.org/I4401726811"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084146010","display_name":"Yu Cheng","orcid":"https://orcid.org/0000-0002-4837-3370"},"institutions":[{"id":"https://openalex.org/I180949307","display_name":"Illinois Institute of Technology","ror":"https://ror.org/037t3ry66","country_code":"US","type":"education","lineage":["https://openalex.org/I180949307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yu Cheng","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, IL, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Illinois Institute of Technology, Chicago, IL, USA","institution_ids":["https://openalex.org/I180949307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018052697","display_name":"Zequ Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zequ Yang","raw_affiliation_strings":["Department of Control, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Control, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101619321","display_name":"Yang Zhou","orcid":"https://orcid.org/0000-0001-6993-941X"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Zhou","raw_affiliation_strings":["Department of Control, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Control, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100726041","display_name":"Jiming Chen","orcid":"https://orcid.org/0000-0003-3155-3145"},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiming Chen","raw_affiliation_strings":["Department of Control, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Department of Control, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5085757528"],"corresponding_institution_ids":["https://openalex.org/I76569877"],"apc_list":null,"apc_paid":null,"fwci":15.635,"has_fulltext":false,"cited_by_count":129,"citation_normalized_percentile":{"value":0.99185985,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"3","issue":"5","first_page":"816","last_page":"829"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8328124284744263},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7838857173919678},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.654236376285553},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6436891555786133},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5562887191772461},{"id":"https://openalex.org/keywords/neurfon","display_name":"NeuRFon","score":0.5404172539710999},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.5030755400657654},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.45057398080825806},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4365336000919342},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.43207675218582153},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.32976216077804565},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.2212759256362915},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.1594846546649933},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07652401924133301}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8328124284744263},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7838857173919678},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.654236376285553},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6436891555786133},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5562887191772461},{"id":"https://openalex.org/C161691276","wikidata":"https://www.wikidata.org/wiki/Q7001363","display_name":"NeuRFon","level":5,"score":0.5404172539710999},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.5030755400657654},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.45057398080825806},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4365336000919342},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.43207675218582153},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.32976216077804565},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.2212759256362915},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.1594846546649933},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07652401924133301},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2016.2516102","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2016.2516102","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G204686543","display_name":null,"funder_award_id":"61203036","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3051170823","display_name":null,"funder_award_id":"CNS-1320736","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G373109806","display_name":null,"funder_award_id":"CNS-1117687","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4837342209","display_name":null,"funder_award_id":"61573103","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6076887803","display_name":null,"funder_award_id":"U1401253","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8120546488","display_name":null,"funder_award_id":"CNS-1053777","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1556212265","https://openalex.org/W1661270980","https://openalex.org/W1973160266","https://openalex.org/W1974037141","https://openalex.org/W1980035202","https://openalex.org/W1981040507","https://openalex.org/W1987264479","https://openalex.org/W2000414205","https://openalex.org/W2004235835","https://openalex.org/W2011778831","https://openalex.org/W2048294994","https://openalex.org/W2050452690","https://openalex.org/W2072641892","https://openalex.org/W2094326762","https://openalex.org/W2096890201","https://openalex.org/W2100203838","https://openalex.org/W2106380910","https://openalex.org/W2110936068","https://openalex.org/W2112274222","https://openalex.org/W2117024112","https://openalex.org/W2118521282","https://openalex.org/W2126573700","https://openalex.org/W2127273221","https://openalex.org/W2128585062","https://openalex.org/W2132463147","https://openalex.org/W2142238380","https://openalex.org/W2144576616","https://openalex.org/W2146208975","https://openalex.org/W2147438900","https://openalex.org/W2153517355","https://openalex.org/W2160095256","https://openalex.org/W2163383242","https://openalex.org/W2165381873","https://openalex.org/W2167153513","https://openalex.org/W2340384825","https://openalex.org/W2344743250","https://openalex.org/W2428120229","https://openalex.org/W3016607949","https://openalex.org/W3099618991","https://openalex.org/W3103037814","https://openalex.org/W6659484652","https://openalex.org/W6678935822","https://openalex.org/W6684133396","https://openalex.org/W6684383989","https://openalex.org/W6704259557"],"related_works":["https://openalex.org/W4386482731","https://openalex.org/W2765763546","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W4390188535","https://openalex.org/W2157496457"],"abstract_inverted_index":{"ZigBee":[0,17,40,138,193],"has":[1],"been":[2,163],"widely":[3],"recognized":[4],"as":[5,43],"an":[6],"important":[7],"enabling":[8],"technique":[9],"for":[10],"Internet":[11],"of":[12,29,50,60,68,80,84,97,148,154,171,192],"Things":[13],"(IoT).":[14],"However,":[15],"the":[16,23,47,51,58,61,66,119,131,146,149,152,155,166,169,172,175,181,186,190],"nodes":[18],"are":[19,142],"normally":[20],"resource-limited,":[21],"making":[22],"network":[24],"susceptible":[25],"to":[26,56,114,127,144,188],"a":[27,36,78,94],"variety":[28,79],"security":[30,54,99,191],"threats.":[31],"This":[32],"paper":[33],"closely":[34],"investigates":[35],"severe":[37,116],"attack":[38],"on":[39,125],"networks":[41],"termed":[42],"ghost,":[44],"which":[45],"leverages":[46],"underlying":[48],"vulnerabilities":[49],"IEEE":[52],"802.15.4":[53],"suites":[55],"deplete":[57],"energy":[59],"nodes.":[62],"We":[63,89,121,178],"show":[64,145],"that":[65,74,91,180],"impact":[67,147,173],"ghost":[69,132,150,176],"is":[70],"very":[71],"large":[72],"and":[73,86,129,133,151,165],"it":[75],"can":[76],"facilitate":[77],"threats":[81],"including":[82],"denial":[83],"service":[85],"replay":[87],"attacks.":[88],"highlight":[90],"merely":[92],"deploying":[93],"standard":[95],"suite":[96],"advanced":[98],"techniques":[100],"does":[101],"not":[102],"necessarily":[103],"guarantee":[104],"improved":[105],"security,":[106],"but":[107],"instead":[108],"might":[109],"be":[110],"leveraged":[111],"by":[112,174],"adversaries":[113],"cause":[115],"disruption":[117],"in":[118,137],"network.":[120],"propose":[122],"several":[123],"recommendations":[124],"how":[126],"localize":[128],"withstand":[130],"other":[134],"related":[135],"attacks":[136],"networks.":[139],"Extensive":[140],"simulations":[141],"provided":[143],"performance":[153],"proposed":[156],"recommendations.":[157],"Moreover,":[158],"physical":[159],"experiments":[160],"also":[161],"have":[162],"conducted":[164],"observations":[167],"confirm":[168],"severity":[170],"attack.":[177],"believe":[179],"presented":[182],"work":[183],"will":[184],"aid":[185],"researchers":[187],"improve":[189],"further.":[194]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":18},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":15},{"year":2019,"cited_by_count":21},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":15},{"year":2016,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
