Secure checkpointing-recovery using trusted nodes in MANET

In this work, we propose a trust based secure checkpointing and recovery technique in Mobile Adhoc Network (MANET). In resource constrained MANET, ensuring secure checkpointing using cryptography increases overhead and consumption of resources. Hence additional overhead of secure checkpointing should be minimized. Here proposed trust model is combined with the technique of encryption for secure checkpointing. Using proposed trust model, if a Mobile Host (MH) is found to be trusted, checkpoint in it is secure hence encryption of checkpoint is not required. Simulation results show that checkpoint encryption in the proposed technique may not be required at all in some cases, if the said checkpoint could be forwarded to the recovery destination via trusted MHs only. Performance analysis and comparison of proposed trust based secure checkpointing with existing secure checkpointing technique is also presented.

[1]  Heon Young Yeom,et al.  An efficient recovery scheme for fault-tolerant mobile computing systems , 2003, Future Gener. Comput. Syst..

[2]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.

[3]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[4]  P. Dey,et al.  Trusted checkpointing based on ant colony optimization in MANET , 2012, 2012 Third International Conference on Emerging Applications of Information Technology.

[5]  Dongsheng Wang,et al.  An Efficient Handoff Strategy for Mobile Computing Checkpoint System , 2007, EUC.

[6]  Jie Wu,et al.  Mobility Reduces Uncertainty in MANETs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[7]  Ruoyu Wu,et al.  Risk-Aware Response for Mitigating MANET Routing Attacks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[8]  Dang Quan Nguyen,et al.  A trust-based security architecture for tactical MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[9]  Awadhesh Kumar Singh,et al.  Staggered Checkpointing and Recovery in Cluster Based Mobile Ad Hoc Networks , 2011 .

[10]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[11]  Xiang Li,et al.  An Efficient Checkpointing and Rollback Recovery Scheme for Cluster-Based Multi-channel Ad Hoc Wireless Networks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.

[12]  Audun J sang,et al.  An Algebra for Assessing Trust in Certi cation Chains , 1998 .

[13]  Sarmistha Neogy,et al.  Checkpointing and Recovery Using Node Mobility among Clusters in Mobile Ad Hoc Network , 2012, ACITY.

[14]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[15]  Sarmistha Neogy,et al.  Secure checkpointing using public key cryptography in mobile computing , 2011, 2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS).

[16]  Nuno Neves,et al.  Adaptive checkpointinng with storage management for mobile environments , 1999 .

[17]  Mukesh Singhal,et al.  Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems , 1996, IEEE Trans. Parallel Distributed Syst..

[18]  Yookun Cho,et al.  Kckpt : Checkpoint and Recovery Facility on UnixWare , 2007 .

[19]  Ing-Ray Chen,et al.  Movement-based checkpointing and logging for recovery in mobile computing systems , 2006, MobiDE '06.

[20]  Jong Kim,et al.  Secure checkpointing , 2003, J. Syst. Archit..

[21]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[22]  Zhifeng Zhao,et al.  Availability based trust model of clusters for MANET , 2010, 2010 7th International Conference on Service Systems and Service Management.

[23]  Michael Gegick Failure-prone components are also attack-prone components , 2008, OOPSLA Companion.