Full Text:   <1408>

CLC number: TP393.08

On-line Access: 

Received: 2005-06-20

Revision Accepted: 2005-10-19

Crosschecked: 0000-00-00

Cited: 0

Clicked: 3156

Citations:  Bibtex RefMan EndNote GB/T7714

-   Go to

Article info.
1. Reference List
Open peer comments

Journal of Zhejiang University SCIENCE A 2006 Vol.7 No.4 P.493~501


Cost management based security framework in mobile ad hoc networks

Author(s):  Yang Rui-jun, Xia Qi, Pan Qun-hua, Wang Wei-nong, Li Ming-lu

Affiliation(s):  Department of Computer Science & Engineering, Shanghai Jiao Tong University, Shanghai 200030, China; more

Corresponding email(s):   rjyang@sjtu.edu.cn

Key Words:  Network attacks, Mobile ad hoc, Cost management, Security framework

Yang Rui-jun, Xia Qi, Pan Qun-hua, Wang Wei-nong, Li Ming-lu. Cost management based security framework in mobile ad hoc networks[J]. Journal of Zhejiang University Science A, 2006, 7(4): 493~501.

@article{title="Cost management based security framework in mobile ad hoc networks",
author="Yang Rui-jun, Xia Qi, Pan Qun-hua, Wang Wei-nong, Li Ming-lu",
journal="Journal of Zhejiang University Science A",
publisher="Zhejiang University Press & Springer",

%0 Journal Article
%T Cost management based security framework in mobile ad hoc networks
%A Yang Rui-jun
%A Xia Qi
%A Pan Qun-hua
%A Wang Wei-nong
%A Li Ming-lu
%J Journal of Zhejiang University SCIENCE A
%V 7
%N 4
%P 493~501
%@ 1673-565X
%D 2006
%I Zhejiang University Press & Springer
%DOI 10.1631/jzus.2006.A0493

T1 - Cost management based security framework in mobile ad hoc networks
A1 - Yang Rui-jun
A1 - Xia Qi
A1 - Pan Qun-hua
A1 - Wang Wei-nong
A1 - Li Ming-lu
J0 - Journal of Zhejiang University Science A
VL - 7
IS - 4
SP - 493
EP - 501
%@ 1673-565X
Y1 - 2006
PB - Zhejiang University Press & Springer
ER -
DOI - 10.1631/jzus.2006.A0493

Security issues are always difficult to deal with in mobile ad hoc networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system’s own tasks can be finished in time and the whole network’s security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.

Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article


[1] Aad, I., Hubaux, J.P., Knightly, E.W., 2004. Denial of Service Resilience in Ad Hoc Networks. MobiCom’04, Sept. 26~Oct. 1, 2004, Philadelphia, Pennsylvania, USA, p.43-57.

[2] Akyildiz, I.F., Wang, X.D., Wang, W.L., 2005. Wireless mesh networks: a survey. Computer Networks, 47(4):445-487.

[3] Fan, G., Zhang, J., 2004. Maximizing sensor reuse based on new geometric concepts. Journal of Information Science and Engineering (JISE), Special Issue of Mobile Computing, 20:477-489.

[4] Gao, Y, Rong, H., Tong, F., Luo, Z., Huang, J., 2003. Adaptive job scheduling for a service grid using a genetic algorithm. GCC, (2):65-72.

[5] Hu, Y., Johnson, D., Perrig, A., 2002. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Proceedings of the 4th IEEE (WMCSA), IEEE, Calicoon, NY, p.3-13.

[6] Hu, Y., Perrig, A., Johnson, D., 2005. ARIADNE: a secure on demand routing protocol for ad hoc networks. Wireless Networks, 11(1-2):21-38.

[7] Newport, C., 2004. Simulating Mobile Ad Hoc Networks: A Quantitative Evaluation of Common MANET Simulation Models. Dartmouth College Computer Science Technical Report, TR2004-504.

[8] Papadimitratos, P., Haas, Z.J., 2002. Secure Routing for Mobile Ad Hoc Networks. Proceedings from the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, p.27-31.

[9] Sanzgiri, K., Dahill, B., Levine, B.N., Belding-Royer, E.M., 2002. A Secure Routing Protocol for Ad Hoc Networks. Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP), Paris, France, p.78-89.

[10] Venkatraman, L., Agrawal, D.P., 2003. Strategies for enhancing routing security in protocols for mobile ad hoc networks. J. Parallel Distributed Computing, 63(2):214-227.

[11] Yi, S., Naldurg, P., Kravets, R., 2002. A Security-aware Ad Hoc Routing Protocol for Wireless Networks. The 6th World Multi-Conference on Systemic, Cybernetics and Informatics (SCI 2002), Orlando, Florida.

Open peer comments: Debate/Discuss/Question/Opinion


Please provide your name, email address and a comment

Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - Journal of Zhejiang University-SCIENCE