Skip to main content

Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

  • 1946 Accesses

Abstract

An efficient fault tolerant algorithm based on movement-based secure checkpointing and logging for mobile computing system is proposed here. The recovery scheme proposed here combines independent checkpointing and message logging. Here we consider mobility rate of the user in checkpointing so that mobile host can manage recovery information such as checkpoints and logs properly so that a mobile host takes less recovery time after failure. Mobile hosts save checkpoints when number of hand-off exceeds a predefined hand-off threshold value. Current approaches save logs in base station. But this approach maximizes recovery time if message passing frequency is large. If a mobile host saves log in its own memory, recovery cost will be less because log retrieval time will be small after failure. But there is a probability of memory crash of a mobile host. In that case logs can not be retrieved if it is saved only in mobile node. Hence in this algorithm mobile hosts also save log in own memory and base station. In case of crash recovery, log will be retrieved from base station and in case of transient failure recovery logs will be retrieved from mobile host. In this algorithm recovery probability is optimized and total recovery time is reduced in comparison to existing works. Logs are very small in size. Hence saving logs in mobile hosts does not cause much memory overhead. This algorithm describes a secure checkpointing technique as a method for providing fault tolerance while preventing information leakage through the checkpoint data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gman, H., Ahn, S.J., Han, S.C., Park, T., Yeom, H.Y., Cho, Y.: Kckpt: Checkpoint and Recovery Facility on UnixWare Kernel. Computers and Applications, 303–308 (2000)

    Google Scholar 

  2. Forman, G.H., Zahorjan, J.: Challenges of Mobile Computing. Journal Computer 27(4), 31–40 (1994)

    Google Scholar 

  3. Schiller, J.: Mobile Communications, 2nd edn. Addison Wesley

    Google Scholar 

  4. Adis, W.: Mobile Computing for Hospitals: Transition Problems. Communications IIMA 5(2), 67–76 (2005)

    Google Scholar 

  5. Nam, H., Kim, J., Hong, S.J., Lee, S.: Secure checkpointing. Journal of Systems Architecture 48, 237–254 (2003)

    Article  Google Scholar 

  6. Agrawal, D.P., Deng, H., Poosarla, R., Sanyal, S.: Secure Mobile Computing. In: Das, S.R., Das, S.K. (eds.) IWDC 2003. LNCS, vol. 2918, pp. 265–278. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Mootaz Elnozahy, E.N., Alvisi, L., Wang, Y.-M., Johnson, D.B.: A Survey of Rollback Recovery Protocol in Message Passing System. ACM Comput. Surv. 34(3), 375–408 (2002)

    Article  Google Scholar 

  8. Kumar, P., Garg, R.: Checkpointing Based Fault Tolerance in Mobile Distributed Systems. International Journal of Research and Reviews in Computer Science (IJRRCS) 1(2), 83–93 (2010)

    Google Scholar 

  9. Prakash, R., Singhal, M.: Low Cost Checkpointing and Failure Recovery in Mobile Computing Systems. IEEE Transacrions on Parallel and Distrinuted Systems 7(10), 1–38 (1996)

    Google Scholar 

  10. Park, T., Woo, N., Yeom, H.Y.: An Efficient recovery scheme for fault-tolerant mobile computing systems. Future Generation Computer System 19(1), 37–53 (2003)

    Article  MATH  Google Scholar 

  11. George, S.E., Chen, I.-R., Jin, Y.: Movement-Based Checkpointing and Logging for Recovery in Mobile Computing Systems. In: MobiDE 2006 Proceedings of the 5th ACM International Workshop on Data Engineering for Wireless and Mobile Access, pp. 51–58 (2006)

    Google Scholar 

  12. Lopez, J., Dahab, R.: An overview of Elliptic Curve Cryptography, Technical Report IC-00-10. State University of Campinas, pp. 1–34 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Dey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dey, P., Biswas, S. (2012). Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics