A Trust-based Uncoordinated Checkpointing Algorithm in Mobile Ad hoc Networks (MANETs)

被引:0
作者
Saini, Poonam [1 ]
Aggarwal, Shefali [1 ]
机构
[1] PEC Univ Technol, Chandigarh 160012, India
来源
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS | 2015年 / 70卷
关键词
Distributed Systems; Coordinated Checkpointing; Uncoordinated Chechpointing; Recovery; Trust; MANETs;
D O I
10.1016/j.procs.2015.10.022
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper presents a trust-value based uncoordinated check pointing algorithm in Mobile Ad Hoc Networks (MANETs). We aim to improve the overall check pointing overhead incurred in the execution of recovery protocols. Most check pointing algorithms do not consider the mobility rate of nodes while taking a periodic checkpoint, thereby, resulting in poor utilization of resources and increased latency. However, the proposed trust-value based check pointing scheme captures a check point only after a node has endured certain movements. Hence, whenever a node move from one cluster to another, the node moves from a cluster with high trust value to a cluster with low trust value and vice-versa. Therefore, nodes do not rely on any fixed threshold value in order to take a checkpoint. This is due to dependency of trust value of a node on the previous and current trust value of its cluster. Thus, each time a node moves or change to a new cluster, its cluster_change_count is compared with a fixed threshold value. The information, hence, is restrained for communication ifthe count is greater than threshold in order to maintain its safety. The proposed algorithm comprises of three phases, namely, multi-checkpointing phase, trust node evaluation phase and recovery phase. The analysis shows better performance of the proposed protocol over existing mobility-based protocol in terms of probability of recovery of failed nodes, residual energy and simulation time. (C) 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BV-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:311 / 317
页数:7
相关论文
共 10 条
[1]  
Acharya B. R., 1994, 3 INT C PAR DISTR IN, P73
[2]  
Aggarwal Shefali, 2015, INT J ADV RES COMPUT, V5, P488
[3]   Mutable checkpoints: A new checkpointing approach for mobile computing systems [J].
Cao, GH ;
Singhal, M .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, 12 (02) :157-172
[4]   A survey of rollback-recovery protocols in message-passing systems [J].
Elnozahy, EN ;
Alvisi, L ;
Wang, YM ;
Johnson, DB .
ACM COMPUTING SURVEYS, 2002, 34 (03) :375-408
[5]  
George S. E., 2006, MobiDE 2006. Proceedings of the Fifth ACM International Workshop on Data Engineering for Wireless and Mobile Access, P51, DOI 10.1145/1140104.1140115
[6]  
Jaggi PK, 2011, COMM COM INF SC, V203, P122
[7]  
Juang Tong-Ying, 2001, INT C COMM COMP CIC, P143
[8]  
Macker J. P, 2003, IEEE AD HOC NETWORKI
[9]  
Taesoon Park, 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems, P436, DOI 10.1109/ICDCS.2000.840956
[10]  
Tuli R., 2011, INT J ADHOC NETW SYS, V1, P51