Fault Tolerance and Security vulnerabilities are related to each other in popularly growing mobile computing systems. Checkpoint-Recovery algorithms to provide fault tolerance has been designed here addressing mobility, handoff, resource limitations and security vulnerabilities of Mobile Cellular and Mobile Adhoc Network (MANET). Checkpointing algorithms using cryptography has been proposed to counter both active and passive attacks in Mobile Cellular network. To reduce encryption-decryption overheads in MANET, without having fixed infrastructure support, trust based checkpoint recovery has been proposed to ensure that only trusted nodes can participate in the process. Two trust models have been proposed, in one trust model nodes' trustworthiness are evaluated based on recommendation from other nodes, failure rate, availability or life time of a node in network,remaining battery power, and the other one is Ant Colony Optimization based trust model to ensure that checkpoints traverses through trusted mobile nodes only at recovery time. The algorithms are supported by theorems, lemmas, proofs, simulations wherever feasible.
"synopsis" may belong to another edition of this title.
Suparna Biswas obtained her ME and Ph.D from Jadavpur University, India. She is an Asst. Prof. in the Dept. of Computer Sc. & Engg., M.A.K.A. University of Technology, W.B., India since 2005. She is a EU research fellow in cLINK project at Northumbria University, UK. Her research interest includes mobile computing, wireless networks, security etc.
"About this title" may belong to another edition of this title.
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Fault Tolerance and Security vulnerabilities are related to each other in popularly growing mobile computing systems. Checkpoint-Recovery algorithms to provide fault tolerance has been designed here addressing mobility, handoff, resource limitations and security vulnerabilities of Mobile Cellular and Mobile Adhoc Network (MANET). Checkpointing algorithms using cryptography has been proposed to counter both active and passive attacks in Mobile Cellular network. To reduce encryption-decryption overheads in MANET, without having fixed infrastructure support, trust based checkpoint recovery has been proposed to ensure that only trusted nodes can participate in the process. Two trust models have been proposed, in one trust model nodes' trustworthiness are evaluated based on recommendation from other nodes, failure rate, availability or life time of a node in network,remaining battery power, and the other one is Ant Colony Optimization based trust model to ensure that checkpoints traverses through trusted mobile nodes only at recovery time. The algorithms are supported by theorems, lemmas, proofs, simulations wherever feasible. 228 pp. Englisch. Seller Inventory # 9783330036222
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Biswas SuparnaSuparna Biswas obtained her ME and Ph.D from Jadavpur University, India. She is an Asst. Prof. in the Dept. of Computer Sc. & Engg., M.A.K.A. University of Technology, W.B., India since 2005. She is a EU research fellow. Seller Inventory # 158421955
Quantity: Over 20 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 228 pages. 8.66x5.91x0.52 inches. In Stock. Seller Inventory # 3330036222
Quantity: 1 available
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Secure and Trusted Checkpointing Recovery in Mobile Computing | On Design of Mobility based Checkpointing Algorithms considering Security and Trust in Mobile Cellular and Adhoc Network | Suparna Biswas (u. a.) | Taschenbuch | 228 S. | Englisch | 2017 | LAP LAMBERT Academic Publishing | EAN 9783330036222 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Seller Inventory # 108395977
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -Fault Tolerance and Security vulnerabilities are related to each other in popularly growing mobile computing systems. Checkpoint-Recovery algorithms to provide fault tolerance has been designed here addressing mobility, handoff, resource limitations and security vulnerabilities of Mobile Cellular and Mobile Adhoc Network (MANET). Checkpointing algorithms using cryptography has been proposed to counter both active and passive attacks in Mobile Cellular network. To reduce encryption-decryption overheads in MANET, without having fixed infrastructure support, trust based checkpoint recovery has been proposed to ensure that only trusted nodes can participate in the process. Two trust models have been proposed, in one trust model nodes' trustworthiness are evaluated based on recommendation from other nodes, failure rate, availability or life time of a node in network,remaining battery power, and the other one is Ant Colony Optimization based trust model to ensure that checkpoints traverses through trusted mobile nodes only at recovery time. The algorithms are supported by theorems, lemmas, proofs, simulations wherever feasible.Books on Demand GmbH, Überseering 33, 22297 Hamburg 228 pp. Englisch. Seller Inventory # 9783330036222
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Fault Tolerance and Security vulnerabilities are related to each other in popularly growing mobile computing systems. Checkpoint-Recovery algorithms to provide fault tolerance has been designed here addressing mobility, handoff, resource limitations and security vulnerabilities of Mobile Cellular and Mobile Adhoc Network (MANET). Checkpointing algorithms using cryptography has been proposed to counter both active and passive attacks in Mobile Cellular network. To reduce encryption-decryption overheads in MANET, without having fixed infrastructure support, trust based checkpoint recovery has been proposed to ensure that only trusted nodes can participate in the process. Two trust models have been proposed, in one trust model nodes' trustworthiness are evaluated based on recommendation from other nodes, failure rate, availability or life time of a node in network,remaining battery power, and the other one is Ant Colony Optimization based trust model to ensure that checkpoints traverses through trusted mobile nodes only at recovery time. The algorithms are supported by theorems, lemmas, proofs, simulations wherever feasible. Seller Inventory # 9783330036222
Seller: Mispah books, Redhill, SURRE, United Kingdom
paperback. Condition: New. NEW. SHIPS FROM MULTIPLE LOCATIONS. book. Seller Inventory # ERICA82933300362226