Secure and Trusted Checkpointing Recovery in Mobile Computing / Najlacnejšie knihy
Secure and Trusted Checkpointing Recovery in Mobile Computing

Code: 15980035

Secure and Trusted Checkpointing Recovery in Mobile Computing

by Suparna Biswas, Sarmistha Neogy

Fault Tolerance and Security vulnerabilities are related to each other in popularly growing mobile computing systems. Checkpoint-Recovery algorithms to provide fault tolerance has been designed here addressing mobility, handoff, r ... more

67.09

RRP: 74.25 €

You save 7.16 €


In stock at our supplier
Shipping in 8 - 10 days
Add to wishlist

You might also like

Give this book as a present today
  1. Order book and choose Gift Order.
  2. We will send you book gift voucher at once. You can give it out to anyone.
  3. Book will be send to donee, nothing more to care about.

Book gift voucher sampleRead more

More about Secure and Trusted Checkpointing Recovery in Mobile Computing

You get 166 loyalty points

Book synopsis

Fault Tolerance and Security vulnerabilities are related to each other in popularly growing mobile computing systems. Checkpoint-Recovery algorithms to provide fault tolerance has been designed here addressing mobility, handoff, resource limitations and security vulnerabilities of Mobile Cellular and Mobile Adhoc Network (MANET). Checkpointing algorithms using cryptography has been proposed to counter both active and passive attacks in Mobile Cellular network. To reduce encryption-decryption overheads in MANET, without having fixed infrastructure support, trust based checkpoint recovery has been proposed to ensure that only trusted nodes can participate in the process. Two trust models have been proposed, in one trust model nodes' trustworthiness are evaluated based on recommendation from other nodes, failure rate, availability or life time of a node in network,remaining battery power, and the other one is Ant Colony Optimization based trust model to ensure that checkpoints traverses through trusted mobile nodes only at recovery time. The algorithms are supported by theorems, lemmas, proofs, simulations wherever feasible.

Book details

67.09

Trending among others



Collection points Bratislava a 2642 dalších

Copyright ©2008-24 najlacnejsie-knihy.sk All rights reservedPrivacyCookies


Account: Log in
Všetky knihy sveta na jednom mieste. Navyše za skvelé ceny.

Shopping cart ( Empty )

For free shipping
shop for 59,99 € and more

You are here: