Wenmao Liu
Harbin Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Wenmao Liu.
international conference on wireless communications, networking and mobile computing | 2009
Wenmao Liu; Hongli Zhang; Weizhe Zhang
Road side infrastructures with certification and service aid are important in secure vehicular communication. Few road side infrastructure issues have been addressed in former studies. Lacking trusted certification, scalability, efficiency and intrusion detection in vehicle-only network causes various attacks. In this paper we propose an autonomous road side infrastructure network approach. Some road side infrastructures are preselected administratively and the others gather towards the formers autonomously. Road side infrastructures in the same autonomous network cache and forward certificates, which are invisible to other autonomous network. In our approach, CA cluster in different regions comply with corresponding scalability strategy and regional policy. A distributed IDS system integrated with the CA database provide further security protection from malicious vehicles with legal certificates. The certificate caching and forwarding schema accelerates authentication. In our analysis, our approach has a better efficiency, scalability and security guarantee than former road side infrastructure designs.
Archive | 2012
Wenmao Liu; Lihua Yin; Binxing Fang; Xiangzhan Yu
Malicious organizations deploy numerous RFID readers in a partial region with low cost to gain superiority therefore its readers may perform attacks and other conspirators generate false reports to cover such malicious events. In this paper, we first introduce a simple game approach which only achieves Bayes equilibrium in a regular network between combined report readers and a detecting reader, then in the attacker dominated network, we propose an improved cooperative game where detecting nodes cooperate to evaluate trust of an unknown node from its organization reputation, the node’s prior trust and utility function is updated according to a reference report, therefore malicious node weights are reduced meanwhile a new Bayes equilibrium is achieved. The simulations show that the cooperative game improves successful deduction rate and decreases forged reports significantly.
international conference on parallel and distributed systems | 2010
Wenmao Liu; Lihua Yin; Weizhe Zhang; Hongli Zhang
This paper proposes a novel platform for object locating application in the Internet of Things environment. In this platform, objects and inquirers access and query locations using uniform service entry interfaces in heterogeneous services. To build a virtual storage system, services entries integrate enterprise database clusters and a DHT peer-to-peer network built with inquirers’ devices. The DHT network is originally designed for accurate object locating, to enable fuzzy object locating we construct a hierarchical storage overlay network based on the DHT network. This LBS platform simplifies the object locating operation for ordinary inquirers greatly, moreover it provides huge virtual computing and storage resources for small companies and individual developers.
Archive | 2012
Shuang Tan; Li He; Yan Jia; Binxing Fang; Lihua Yin; Weihong Han; Bin Zhou; Hua Fan; Wenmao Liu; Haining Yu; Juan Chen
Chinese Journal of Computers | 2012
Wenmao Liu; Lihua Yin; Binxing Fang; Hongli Zhang
Archive | 2011
Lihua Yin; Binxing Fang; Yan Jia; Wenmao Liu; Aiping Li; Hua Fan
Archive | 2012
Li He; Shuang Tan; Yan Jia; Binxing Fang; Lihua Yin; Weihong Han; Bin Zhou; Hua Fan; Wenmao Liu; Haining Yu; Juan Chen
Journal of Convergence Information Technology | 2012
Wenmao Liu; Binxing Fang; Lihua Yin; Xiangzhan Yu
international conference on computer science and network technology | 2011
Wenmao Liu; Binxing Fang; Lihua Yin; Hongli Zhang
Archive | 2011
Lihua Yin; Binxing Fang; Yan Jia; Wenmao Liu; Shuqiang Yang; Bin Zhou