mobile grid
Recently Published Documents


TOTAL DOCUMENTS

188
(FIVE YEARS 9)

H-INDEX

12
(FIVE YEARS 0)

Author(s):  
Grantej Vinod Otari ◽  
Vijay Ram Ghorpade

Mobile Grid network connects large number of mobile devices like smartphones, tablets, PDAs, wireless digital medical equipment’s etc for the purpose of sharing their resources and performing the task collaboratively and cooperatively. The mobile nodes participating in the mobile grid are autonomous and open in nature making them more vulnerable to data and control attacks made by malicious or selfish nodes. Preventing these malicious or selfish nodes and identifying the trusted nodes to participate in the network is an NP-hard problem. To recognize trusted nodes in the mobile grid system a novel trust management model is proposed in this paper by applying an elitist multi objective optimization algorithm Non-dominated Sorting Genetic Algorithm-II (NSGA-II). The proposed trust management model assesses the trust index of each mobile node in the network using various evaluation factors or attributes and then obtains the non-dominated set of trusted nodes in each front. Comparative analysis of the proposed trust model shows that the proposed model can be a potential candidate for implementing trust management in mobile grid network.


Mobile Grid is the inter-networking of heterogeneous physical as well as virtualdevices. Each device transfer and share the information with each other. Trust management plays a significant role in network based applications for information collection, data mining, qualified services with context-awareness, upgraded client protection and data security. It assists individuals with beating impression of vulnerability, threat and participates in client acknowledgment to utilization on grid services and applications. In this paper a unique trust management protocol is proposed for network based mobile grid application to manage misbehaving nodes whose status or performance may change dynamically. Trust plays an important role for handling the security in the community based system. Trust management provides facilitate to identify malfunctions and also make legitimate collaboration and enhance the user privacy and information security.


Mobile Grid is a crossbreed technology formed by amalgamation of the two prominent technologies namely mobile technology and grid technology that enable sharing and collaboration of mobile resources cooperatively, transparently, efficiently, reliably and securely. Mobile Grid considers the mobility issues and overcomes the constraints and deficiencies in both the technologies. However, this heterogeneous, dynamic and open mobile grid network is more prone to malicious and selfish nodes inside and outside the network. Hence, a vigorous security mechanism is needed that considers different security threats and pro-vide different levels of security services. Here, we propose one such preventive security service based on Trust Management. The proposed trust management service uses a novel fuzzy lattice approach for trust estimation of the nodes in the network. A node with high trust value is allowed to participate in the network. A malicious node having low trust value is prevented from performing the task. A fuzzy lattice approach can compute incrementally the same intervals in the training data independent of the order of presentation within a short period. Experimental analysis of the fuzzy lattice approach shows that the proposed approach outperforms most of the existing approaches based on fuzzy logic


With the widespread availability of smartphones and advancement in communication technologies, Dew Computing paradigm(DCp) has emerged as a state-of-the-art computing paradigm. DCp provides an ecosystem to execute computationally intensive tasks which comprise of several subtasks. Each subtask is allocated for execution to an available and capable mobile device by taking into consideration its features like mobility, processing power, remaining battery, etc. This kind of “on-the-spot” paradigm comprises of mobile devices only which are part of mobile grid and it doesn’t use the fixed infrastructure based computing systems for computational purposes. Being resource constrained, such a paradigm needs an efficient scheme for allocation of resources. Here we propose a scheme called MGRA for allocation of computing nodes which takes into account challenging issues like mobility of users, inefficient resource allocation and handling of failure situations. Experimentation was carried out using a DCp testbed comprising Android devices connected with Wi-Fi Direct protocol. MGRA exhibited significant improvement in terms of time for application completion, amount of battery usage and time required for recovering from failure as compared to present-day approaches.


2019 ◽  
Vol 11 (2) ◽  
pp. 50-62
Author(s):  
Amit Sadanand Savyanavar ◽  
Vijay Ram Ghorpade

A mobile grid (MG) consists of interconnected mobile devices which are used for high performance computing. Fault tolerance is an important property of mobile computational grid systems for achieving superior arrangement reliability and faster recovery from failures. Since the failure of the resources affects task execution fatally, fault tolerance service is essential to achieve QoS requirement in MG. The faults which occur in MG are link failure, node failure, task failure, limited bandwidth etc. Detecting these failures can help in better utilisation of the resources and timely notification to the user in a MG environment. These failures result in loss of computational results and data. Many algorithms or techniques were proposed for failure handling in traditional grids. The authors propose a checkpointing based failure handling technique which will improve arrangement reliability and failure recovery time for the MG network. Experimentation was conducted by creating a grid of ubiquitously available Android-based mobile phones.


2019 ◽  
Vol 15 (4) ◽  
pp. 357-366
Author(s):  
Zhiyuan Cheng ◽  
Yulan Wang ◽  
Yingang Wang ◽  
Qiong Nie

Author(s):  
Ayedh Almutairi ◽  
Heimir Thorisson ◽  
John P. Wheeler ◽  
David L. Slutzky ◽  
James H. Lambert
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document