Improved recovery probability of mobile hosts using energy and mobility-based secure checkpointing-recovery Online publication date: Sat, 21-Feb-2015
by Suparna Biswas; Priyanka Dey; Sarmistha Neogy
International Journal of Trust Management in Computing and Communications (IJTMCC), Vol. 2, No. 4, 2014
Abstract: In this work, we have proposed a mobility-based secure checkpointing and log-based rollback recovery technique to provide fault tolerance to mobile hosts (MHs) in infrastructured wireless/mobile computing system, like, wireless cellular network. This work has been modified accordingly to be applicable in infrastructure less network, i.e., mobile ad hoc network (MANET) in which MHs save checkpoint adaptively based on their energy and mobility. Transient failures in cluster-based mobile ad hoc network (MANET) may be caused by insufficient energy of mobile hosts, among other reasons. To prevent data loss due to transient failure caused by lack of sufficient energy, mobile hosts save checkpoint if remaining energy becomes equal to a predefined threshold. A trust-based recovery technique is used for successful recovery of failed mobile hosts. To make checkpoints secure, only trusted mobile hosts participate in the proposed checkpoint-recovery process.
Online publication date: Sat, 21-Feb-2015
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Trust Management in Computing and Communications (IJTMCC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org