International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Dynamic Node Recovery in MANET for High Recovery Probability

Author NameAuthor Details

Ravneet Kaur, Neeraj Sharma

Ravneet Kaur[1]

Neeraj Sharma[2]

[1]Research Scholar, CEC Landran, Mohali, Punjab, India.

[2]Department (CSE), CEC Landran, Mohali, Punjab, India.


One of the key design issues in ad hoc networks is the development of rollback recovery model for providing fault-tolerance in MANET. Because the potential problem of MANET is limited energy, probability of fault occurrences is more. Hence, checkpointing is done at trusted nodes when faults are encountered, for successful rollback to the last saved state. This makes trust a vital factor to be determined. The proposed algorithm aims to reduce the rollback recovery time by retrieving the checkpoint data through trusted nodes. Dynamic node recovery technique unfolds the impact of cluster trust on the count variable maintained by each node. This variable is so maintained, to do the checkpointing process when a definite threshold is reached. Such an attack prone node saves its data at the nearest trusted cluster head. Again, based on opinion dynamics, trust of the host cluster markedly influences the trust of the visitor node. Moreover, genetic algorithms are employed to search best optimal recovery path. Performance analysis depicts remarkable results produced by the proposed algorithm.

Index Terms








  1. 1.
    X. Li, M. Yang, C. Men, Y. Jiang, and K. Udagepola, “Access-Pattern Aware Checkpointing data storage scheme for mobile computing environment,” Procedia Computer Science, 34 (2014) 330 – 337, Elsevier, 2014.
  2. 2.
    D. Gavalas, G. Pantziou, C. Konstantopoulos, and B. Mamalis, “Clustering of Mobile Ad Hoc Networks: An Adaptive Broadcast Period Approach,” unpublished.
  3. 3.
    A.K. Singh, and P.K. Jaggi, “Asynchronous Rollback Recovery in cluster based Multi Hop Mobile Ad Hoc Networks,” International Journal of Enhanced Research in Management & Computer Applications, ISSN: 2319-7471, vol. 2 issue 6, June-2013.
  4. 4.
    P. Gera, K. Garg, and M. Misra, “Trust-based Multi-Path Routing for Enhancing Data Security in MANETs,” International Journal of Network Security, vol.16, no.2, pp. 102-111, March 2014.
  5. 5.
    R. Tuli, and P. Kumar, “Asynchronous Checkpointing and Optimistic Message Logging for Mobile Ad Hoc Networks,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 2, no. 10, 2011.
  6. 6.
    C.M. Jadhav, A.R. Shegadar, and S. Shabade, “Dual-Link Failure Resiliency through Backup Link Mutual Exclusion,” International Journal Of Engineering And Computer Science, ISSN:2319-7242, volume 3 issue, December 2014.
  7. 7.
    S. Biswas, P. Dey, and S. Neogy, “Trusted checkpointing based on Ant Colony Optimization in MANET,” Third International Conference on Emerging Applications of Information Technology (EAIT), 2012.
  8. 8.
    P. Sharma and N. Khurana, “Study of Optimal Path Finding Techniques,” International Journal of Advancements in Technology, vol. 4 no. 2, July 2013.
  9. 9.
    K. Govindan, and P. Mohapatra, “Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey,”, IEEE.
  10. 10.
    S. Biswas, S. Neogy, and P. Dey, “Mobility based checkpointing and trust based recovery in MANET,” International Journal of Wireless & Mobile Networks (IJWMN), vol. 4, no. 4, August 2012.
  11. 11.
    S. Biswas, P. Dey, and S. Neogy, “Secure Checkpointing-Recovery using Trusted Nodes in MANET,” 4th International Conference on Computer and Communication Technology (ICCCT), 2013.
  12. 12.
    R. Tuli, and P. Kumar, “Minimum process coordinated checkpointing scheme for ad hoc networks,” International Journal on AdHoc Networking Systems (IJANS), vol. 1, no. 2, October 2011.
  13. 13.
    P. Sharma, and A. Khunteta, “A Survey of Checkpointing Algorithms in Mobile Ad HocNetwork,” Global Journal of Computer Science and Technology Network, Web & Security, (USA), volume 12 issue 12, version 1.0, 2012.
  14. 14.
    S. Behzadi and A.A. Alesheikh, “A Pseudo Genetic Algorithm for solving best path problem,” The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, vol. 3,. part B2, 2008.
  15. 15.
    Z. Ishrat and K.B. Ali, “Optimization of Route in a Network using Genetic Algorithm,” International Journal of Computer Applications (IJCA), ISSN: 0975–8887, 2013
  16. 16.
    R. Kaur and Dr. N. Sharma, “Checkpointing and Trust based Recovery in MANET: A Survey,” Advances in Computer Science and Information Technology (ACSIT), ISSN: 2393-9907, May 2015.
  17. 17.
    P.P. Rewagad, and S.R. Suryawanshi, “Implementation of Trust Aware Routing Framework with Link Failure Consideration and Recovery,” International Journal of Research in Computer and Communication Technology, vol 3, issue 9, September 2014.
  18. 18.
    A. Patnaik, L.K. Awasthi, and K. Dutta, “Analysis on Checkpointing Scheme Paradigms for Mobile Ad-hoc Network: A Review,” IJCSC, vol. 3, no.2, January-June 2012.
  19. 19.
    D. Maheshwari, and A.Dhanalakshmi, “Fault Tolerance in Mobile ad hoc Network: A Survey,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, issue 3, March 2013.
  20. 20.
    R. Dalal, M. Khari, and Y. Singh, “Different ways to achieve Trust in MANET,” International Journal on AdHoc Networking Systems (IJANS), vol. 2, no. 2, April 2012.
  21. 21.
    B. J. Oommen, and L. Rueda, “Fault-Tolerant Routing in Mobile Ad Hoc Networks,”
  22. 22.
    P. Aggarwal, “A Study on achieving Fault Tolerance in Mobile Ad-Hoc Networks (MANETs),” Journal of Global Research in Computer Science, ISSN: 2229-371X, vol. 4, no. 12, December 2013.
  23. 23.
    J.W. Huang, I. Woungang, H.C. Chao, M.S. Obaidat, T.Y. Chi, and S.K. Dhurandher, “Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks,” IEEE Globecom, 2011.
  24. 24.
    R. Li, J. Li, P. Liu, and H.H. Chen, “An Objective Trust Management Framework for Mobile Ad Hoc Networks,” IEEE Vehicular Technology Conference, ISSN: 1550-2252, April, 2007.