Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node

    Neha Malhotra1,2,*, Manju Bala3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5269-5284, 2022, DOI:10.32604/cmc.2022.020920

    Abstract Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network, potentially resulting in numerous internal network attacks. Most existing techniques use a central base station, which introduces several difficulties into the system due to the network's reliance on a single point, while other ways generate more overhead while jeopardising network lifetime. In this research, an intelligent double hashing-based clone node identification scheme was used, which reduces communication and memory costs while performing the clone detection procedure.… More >

  • Open Access

    ARTICLE

    Database Recovery Technique for Mobile Computing: A Game Theory Approach

    Magda M. Madbouly1, Yasser F. Mokhtar2, Saad M. Darwish1,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3205-3219, 2022, DOI:10.32604/cmc.2022.019440

    Abstract Contact between mobile hosts and database servers presents many problems in the Mobile Database System (MDS). It is harmed by a variety of causes, including handoff, inadequate capacity, frequent transaction updates, and repeated failures, both of which contribute to serious issues with the information system’s consistency. However, error tolerance technicality allows devices to continue performing their functions in the event of a failure. The aim of this paper is to identify the optimal recovery approach from among the available state-of-the-art techniques in MDS by employing game theory. Several of the presented recovery protocols are chosen and evaluated in order to… More >

  • Open Access

    ARTICLE

    Fault-Tolerant Communication Induced Checkpointing and Recovery Protocol Using IoT

    Neha Malhotra1,2,*, Manju Bala3

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 945-960, 2021, DOI:10.32604/iasc.2021.019082

    Abstract In mobile computing systems, nodes in the network take checkpoints to survive failures. Certain characteristics of mobile computing systems such as mobility, low bandwidth, disconnection, low power consumption, and limited memory make these systems more prone to failures. In this paper, a novel minimum process communication-induced checkpointing algorithm that makes full use of the computation ability and implementation of effective stable storage in a mobile computing system is proposed. The said approach initiates by taking spontaneous checkpoints by each node in phase 1 using a logistic function that is specifically used to estimate the time interval between two checkpoints and… More >

Displaying 1-10 on page 1 of 3. Per Page