References
- N. Wang, J. Wang, and X. Chen, “A trust-based formal model for fault detection in wireless sensor networks,” Sensors (Switzerland), vol. 19, no. 8, pp. 1–20, 2019.
- S. Biswas and S. Neogy, “Secured fault tolerant mobile computing,” Commun. Comput. Inf. Sci., vol. 191 CCIS, no. PART 2, pp. 417–429, 2011.
- C. Men, Z. Xu, and D. Wang, “An efficient Handoff strategy for mobile computing checkpoint system,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 4808 LNCS, pp. 410–421, 2007.
- S. Biswas and S. Neogy, “A Mobility-Based CheckPointing Protocol for Mobile Computing System,” no. February, 2010.
- S. Biswas, P. Dey, and S. Neogy, “Secure checkpointing-recovery using trusted nodes in MANET,” Proc. - 4th IEEE Int. Conf. Comput. Commun. Technol. ICCCT 2013, pp. 174–180, 2013.
- M. Jamshidi, S. S. A. Poor, A. Arghavani, M. Esnaashari, A. A. Shaltooki, and M. R. Meybodi, “A simple, lightweight, and precise algorithm to defend against replica node attacks in mobile wireless networks using neighboring information,” Ad Hoc Networks, vol. 100, p. 102081, 2020. doi: https://doi.org/10.1016/j.adhoc.2020.102081
- “Minimum Process Coordinated Checkpointing Scheme for Ad Hoc,” vol. 1, no. 2, pp. 51–63, 2011.
- H. Mansouri, N. Badache, M. Aliouat, and A. S. K. Pathan, “Checkpointing distributed application running on mobile ad hoc networks,” Int. J. High Perform. Comput. Netw., vol. 11, no. 2, pp. 95–107, 2018. doi: https://doi.org/10.1504/IJHPCN.2018.089888
- G. Cao and M. Singhal, “On coordinated checkpointing in distributed systems,” IEEE Trans. Parallel Distrib. Syst., vol. 9, no. 12, pp. 1213–1225, 1998. doi: https://doi.org/10.1109/71.737697
- I. C. Garcia, G. M. D. Vieira, and L. E. Buzato, “A Rollback in the History of Communication-Induced Checkpointing,” pp. 1–30.
- Z. Abdelhafidi, N. Lagraa, M. B. Yagoubi, and M. Djoudi, “Low overhead communication-induced checkpointing protocols ensuring rollback-dependency trackability property Distributed execution,” no. June, pp. 1–18, 2017.
- A. Guermouche, “Uncoordinated Checkpointing Without Domino Effect for Send-Deterministic MPI Applications,” pp. 989–1000, 2011.
- S. Biswas, S. Neogy, and P. Dey, “M Obility B Ased C Heckpointing and T Rust,” vol. 4, no. 4, pp. 53–69, 2012.
- Z. Rosberg, R. P. Liu, T. Le Dinh, Y. F. Dong, and S. Jha, “Statistical reliability for energy efficient data transport in wireless sensor networks,” Wirel. Networks, vol. 16, no. 7, pp. 1913–1927, 2010. doi: https://doi.org/10.1007/s11276-009-0235-5
- P Kumar and R Garg, Soft-Checkpointing Based Coordinated Checkpointing Protocol for Mobile Distributed Systems, International Journal of Computer Science Issues, Vol. 7, Issue 3, No 5, May 2010.
- P Kumar and R Garg, Soft-Checkpointing Based Hybrid Synchronous Checkpointing Protocol for Mobile Distributed Systems, IGI Global, DOI: https://doi.org/10.4018/978-1-61350-101-6.ch318, Wireless Technologies: Concepts, Methodologies, Tools and Applications, 2011.
- R Garg and P Kumar, A Nonblocking Coordinated Checkpointing Algorithm for Mobile Computing Systems, International Journal of Computer Science Issues, Vol. 7, Issue 3, No 3, May 2010.