Fault Tolerance and Security vulnerabilities are related to each other in popularly growing mobile computing systems. Checkpoint-Recovery algorithms to provide fault tolerance has been designed here addressing mobility, handoff, resource limitations and security vulnerabilities of Mobile Cellular and Mobile Adhoc Network (MANET). Checkpointing algorithms using cryptography has been proposed to counter both active and passive attacks in Mobile Cellular network. To reduce encryption-decryption overheads in MANET, without having fixed infrastructure support, trust based checkpoint recovery has been proposed to ensure that only trusted nodes can participate in the process. Two trust models have been proposed, in one trust model nodes' trustworthiness are evaluated based on recommendation from other nodes, failure rate, availability or life time of a node in network,remaining battery power, and the other one is Ant Colony Optimization based trust model to ensure that checkpoints traverses through trusted mobile nodes only at recovery time. The algorithms are supported by theorems, lemmas, proofs, simulations wherever feasible.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Suparna Biswas obtained her ME and Ph.D from Jadavpur University, India. She is an Asst. Prof. in the Dept. of Computer Sc. & Engg., M.A.K.A. University of Technology, W.B., India since 2005. She is a EU research fellow in cLINK project at Northumbria University, UK. Her research interest includes mobile computing, wireless networks, security etc.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 23,00 per la spedizione da Germania a U.S.A.
Destinazione, tempi e costiDa: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Fault Tolerance and Security vulnerabilities are related to each other in popularly growing mobile computing systems. Checkpoint-Recovery algorithms to provide fault tolerance has been designed here addressing mobility, handoff, resource limitations and security vulnerabilities of Mobile Cellular and Mobile Adhoc Network (MANET). Checkpointing algorithms using cryptography has been proposed to counter both active and passive attacks in Mobile Cellular network. To reduce encryption-decryption overheads in MANET, without having fixed infrastructure support, trust based checkpoint recovery has been proposed to ensure that only trusted nodes can participate in the process. Two trust models have been proposed, in one trust model nodes' trustworthiness are evaluated based on recommendation from other nodes, failure rate, availability or life time of a node in network,remaining battery power, and the other one is Ant Colony Optimization based trust model to ensure that checkpoints traverses through trusted mobile nodes only at recovery time. The algorithms are supported by theorems, lemmas, proofs, simulations wherever feasible. 228 pp. Englisch. Codice articolo 9783330036222
Quantità: 2 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. Codice articolo 26394682505
Quantità: 4 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. Print on Demand. Codice articolo 401727318
Quantità: 4 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Biswas SuparnaSuparna Biswas obtained her ME and Ph.D from Jadavpur University, India. She is an Asst. Prof. in the Dept. of Computer Sc. & Engg., M.A.K.A. University of Technology, W.B., India since 2005. She is a EU research fellow. Codice articolo 158421955
Quantità: Più di 20 disponibili
Da: Biblios, Frankfurt am main, HESSE, Germania
Condizione: New. PRINT ON DEMAND. Codice articolo 18394682499
Quantità: 4 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. Neuware -Fault Tolerance and Security vulnerabilities are related to each other in popularly growing mobile computing systems. Checkpoint-Recovery algorithms to provide fault tolerance has been designed here addressing mobility, handoff, resource limitations and security vulnerabilities of Mobile Cellular and Mobile Adhoc Network (MANET). Checkpointing algorithms using cryptography has been proposed to counter both active and passive attacks in Mobile Cellular network. To reduce encryption-decryption overheads in MANET, without having fixed infrastructure support, trust based checkpoint recovery has been proposed to ensure that only trusted nodes can participate in the process. Two trust models have been proposed, in one trust model nodes' trustworthiness are evaluated based on recommendation from other nodes, failure rate, availability or life time of a node in network,remaining battery power, and the other one is Ant Colony Optimization based trust model to ensure that checkpoints traverses through trusted mobile nodes only at recovery time. The algorithms are supported by theorems, lemmas, proofs, simulations wherever feasible.Books on Demand GmbH, Überseering 33, 22297 Hamburg 228 pp. Englisch. Codice articolo 9783330036222
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Fault Tolerance and Security vulnerabilities are related to each other in popularly growing mobile computing systems. Checkpoint-Recovery algorithms to provide fault tolerance has been designed here addressing mobility, handoff, resource limitations and security vulnerabilities of Mobile Cellular and Mobile Adhoc Network (MANET). Checkpointing algorithms using cryptography has been proposed to counter both active and passive attacks in Mobile Cellular network. To reduce encryption-decryption overheads in MANET, without having fixed infrastructure support, trust based checkpoint recovery has been proposed to ensure that only trusted nodes can participate in the process. Two trust models have been proposed, in one trust model nodes' trustworthiness are evaluated based on recommendation from other nodes, failure rate, availability or life time of a node in network,remaining battery power, and the other one is Ant Colony Optimization based trust model to ensure that checkpoints traverses through trusted mobile nodes only at recovery time. The algorithms are supported by theorems, lemmas, proofs, simulations wherever feasible. Codice articolo 9783330036222
Quantità: 1 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Paperback. Condizione: Brand New. 228 pages. 8.66x5.91x0.52 inches. In Stock. Codice articolo 3330036222
Quantità: 1 disponibili