Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wenmao Liu is active.

Publication


Featured researches published by Wenmao Liu.


international conference on wireless communications, networking and mobile computing | 2009

An Autonomous Road Side Infrastructure Based System in Secure VANETs

Wenmao Liu; Hongli Zhang; Weizhe Zhang

Road side infrastructures with certification and service aid are important in secure vehicular communication. Few road side infrastructure issues have been addressed in former studies. Lacking trusted certification, scalability, efficiency and intrusion detection in vehicle-only network causes various attacks. In this paper we propose an autonomous road side infrastructure network approach. Some road side infrastructures are preselected administratively and the others gather towards the formers autonomously. Road side infrastructures in the same autonomous network cache and forward certificates, which are invisible to other autonomous network. In our approach, CA cluster in different regions comply with corresponding scalability strategy and regional policy. A distributed IDS system integrated with the CA database provide further security protection from malicious vehicles with legal certificates. The certificate caching and forwarding schema accelerates authentication. In our analysis, our approach has a better efficiency, scalability and security guarantee than former road side infrastructure designs.


Archive | 2012

An Efficient Trust Evaluation Approach in Attacker Dominated Networks in Internet of Things

Wenmao Liu; Lihua Yin; Binxing Fang; Xiangzhan Yu

Malicious organizations deploy numerous RFID readers in a partial region with low cost to gain superiority therefore its readers may perform attacks and other conspirators generate false reports to cover such malicious events. In this paper, we first introduce a simple game approach which only achieves Bayes equilibrium in a regular network between combined report readers and a detecting reader, then in the attacker dominated network, we propose an improved cooperative game where detecting nodes cooperate to evaluate trust of an unknown node from its organization reputation, the node’s prior trust and utility function is updated according to a reference report, therefore malicious node weights are reduced meanwhile a new Bayes equilibrium is achieved. The simulations show that the cooperative game improves successful deduction rate and decreases forged reports significantly.


international conference on parallel and distributed systems | 2010

A General Distributed Object Locating Architecture in the Internet of Things

Wenmao Liu; Lihua Yin; Weizhe Zhang; Hongli Zhang

This paper proposes a novel platform for object locating application in the Internet of Things environment. In this platform, objects and inquirers access and query locations using uniform service entry interfaces in heterogeneous services. To build a virtual storage system, services entries integrate enterprise database clusters and a DHT peer-to-peer network built with inquirers’ devices. The DHT network is originally designed for accurate object locating, to enable fuzzy object locating we construct a hierarchical storage overlay network based on the DHT network. This LBS platform simplifies the object locating operation for ordinary inquirers greatly, moreover it provides huge virtual computing and storage resources for small companies and individual developers.


Archive | 2012

Self-organized network (SON) of mobile RFID (radio frequency identification) reader-writers based on Bluetooth technology

Shuang Tan; Li He; Yan Jia; Binxing Fang; Lihua Yin; Weihong Han; Bin Zhou; Hua Fan; Wenmao Liu; Haining Yu; Juan Chen


Chinese Journal of Computers | 2012

A Hierarchical Trust Model for the Internet of Things: A Hierarchical Trust Model for the Internet of Things

Wenmao Liu; Lihua Yin; Binxing Fang; Hongli Zhang


Archive | 2011

Node positioning method in IOT (Internet of things) and node

Lihua Yin; Binxing Fang; Yan Jia; Wenmao Liu; Aiping Li; Hua Fan


Archive | 2012

Hierarchical Chord packet network and organization method thereof in Internet of things

Li He; Shuang Tan; Yan Jia; Binxing Fang; Lihua Yin; Weihong Han; Bin Zhou; Hua Fan; Wenmao Liu; Haining Yu; Juan Chen


Journal of Convergence Information Technology | 2012

Detection of Misbehaving Nodes in Malicious Organization Dominant Networks in Internet of Things

Wenmao Liu; Binxing Fang; Lihua Yin; Xiangzhan Yu


international conference on computer science and network technology | 2011

A small world based routing approach of heterogeneous strategy in the Internet of Things

Wenmao Liu; Binxing Fang; Lihua Yin; Hongli Zhang


Archive | 2011

Method for acquiring location information of terminal, client side, terminal and system

Lihua Yin; Binxing Fang; Yan Jia; Wenmao Liu; Shuqiang Yang; Bin Zhou

Collaboration


Dive into the Wenmao Liu's collaboration.

Top Co-Authors

Avatar

Lihua Yin

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Binxing Fang

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hongli Zhang

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Yan Jia

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Bin Zhou

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Weizhe Zhang

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Xiangzhan Yu

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Juan Chen

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Weihong Han

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Hui He

Harbin Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge