Checkpointing algorithms in mobile computing systems suffer from security attacks. Checkpoint data being stored in stable storage or being transferred over the wireless network is the source of information leakage. Secured Checkpointing comes with computational and storage overhead. In resource constrained mobile computing systems overhead optimization is a challenge. In this paper we propose a secured fault tolerant algorithm which combines movement based checkpointing algorithm with public key cryptography. © 2011 Springer-Verlag.
CITATION STYLE
Biswas, S., & Neogy, S. (2011). Secured fault tolerant mobile computing. In Communications in Computer and Information Science (Vol. 191 CCIS, pp. 417–429). https://doi.org/10.1007/978-3-642-22714-1_43
Mendeley helps you to discover research relevant for your work.