Secure Checkpointing Approach on Ant Colony Optimization in MANET
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 7
Abstract
Mobile ad hoc network (MANET) is a collection of mobile nodes dynamically forming a temporary network without a centralized administration. Failure rate and security attack rate of processes running on mobile hosts in MANET is high due to its characteristics such as open network environment, dynamic topology due to random node movement, lack of centralized control, fixed infrastructure, stable storage etc. Existing secure checkpointing algorithm using cryptography to provide fault tolerance in failure and security attack prone mobile cellular network cannot be applied in MANET due to enhanced overhead. As an alternative solution, we have designed an ant colony based trust model to evaluate trust value of a mobile node in MANET. A trusted node, that will never be a malicious or selfish node, has low or negligible failure and security attack rate, high available battery power which indicates high availability in the network and high positive reference from other nodes. So checkpoint is secure in a trusted mobile node without additional overheads of cryptography.
Authors and Affiliations
Asst. Prof. Vinod Saroha, Annu Malik
Improved De-Duplication Methods to Enhance Performance in Cloud Storage
Cloud computing is the emerging technology that helps in consolidation of resources. Many organizations have their public as well as private clouds. Private clouds can be built from unused resources to store data. But a...
Prime Node: An Optimized System for Data Sharing In Corporate Networks
In this paper, we implemented a technique called optimized system for sharing data in networks; the amount of sensitive data produced by many administrations is out stepping their storage ability. The management of such...
Outlier Detection Using Oversampling PCA for Credit Card Fraud Detection
Credit card fraud detection is an important application of outlier detection in recent years. Many outlier detection techniques are available but they are working in batch mode, due to this those techniques are not appl...
Adolescent’s Perception of Health Hazards caused due to Mobile Usage
In the past decades humanity has moved into a digital era where billions of people are connected via an ever advancing technology boom. The phenomenon of technology usage has taken today’s youth culture by storm. As tec...
Investigation of Biogas Flow Analysis in Mixing Chamber by Using CFD, Performance and Emission Characteristics of Single Cylinder SI Engine
In this work, Design and fabrication of mixing chamber for biogas supply to the engine and CFD analysis of the mixing Chamber. Biogas is used as fuel for SI engine by the help of pressure conversion kit, study of differ...