Title :
Trusted checkpointing based on ant colony optimization in MANET
Author :
Biswas, Santosh ; Dey, Prasenjit ; Neogy, Sarmistha
Author_Institution :
Dept. of Comput. Sci. & Eng., West Bengal Univ. of Technol., Kolkata, India
fDate :
Nov. 30 2012-Dec. 1 2012
Abstract :
Mobile ad hoc network (MANET) is a collection of mobile nodes dynamically forming a temporary network without a centralized administration. Failure rate and security attack rate of processes running on mobile hosts in MANET is high due to its characteristics such as open network environment, dynamic topology due to random node movement, lack of centralized control, fixed infrastructure, stable storage etc. Existing secure checkpointing algorithm using cryptography to provide fault tolerance in failure and security attack prone mobile cellular network cannot be applied in MANET due to enhanced overhead. As an alternative solution, we have designed an ant colony based trust model to evaluate trust value of a mobile node in MANET. A trusted node, that will never be a malicious or selfish node, has low or negligible failure and security attack rate, high available battery power which indicates high availability in the network and high positive reference from other nodes. So checkpoint is secure in a trusted mobile node without additional overheads of cryptography. Experimental result shows that using proposed mobility and trust model based checkpointing and rollback recovery technique, maximum recovery probability of 0.93 can be achieved.
Keywords :
ant colony optimisation; cellular radio; cryptography; fault tolerance; mobile ad hoc networks; telecommunication network topology; telecommunication security; MANET; andom node movement; ant colony based trust model; ant colony optimization; cryptography; dynamic topology; failure rate; fault tolerance; malicious node; mobile ad hoc network; mobile cellular network; mobile hosts; mobile nodes; rollback recovery technique; security attack rate; selfish node; trusted checkpointing; trusted node; Batteries; Checkpointing; Logic gates; Mobile ad hoc networks; Mobile nodes; Security; Checkpoint; Cluster Head; Fault Tolerance; Gateway Node; MANET; Trust Model;
Conference_Titel :
Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on
Conference_Location :
Kolkata
Print_ISBN :
978-1-4673-1828-0
DOI :
10.1109/EAIT.2012.6408002