ech T Press Science Computers, Materials & Continua DOI:10.32604/cmc.2022.019440 Article Database Recovery Technique for Mobile Computing: A Game Theory Approach Magda M. Madbouly 1 , Yasser F. Mokhtar 2 and Saad M. Darwish 1, * 1 Institute of Graduate Studies and Research, Alexandria University, Alexandria, Egypt 2 Assistant General Manager, IT Department, Egyptian Petrochemicals Co., Alexandria, Egypt * Corresponding Author: Saad Darwish. Email: saad.darwish@alexu.edu.eg Received: 13 April 2021; Accepted: 27 June 2021 Abstract: Contact between mobile hosts and database servers presents many problems in the Mobile Database System (MDS). It is harmed by a variety of causes, including handoff, inadequate capacity, frequent transaction updates, and repeated failures, both of which contribute to serious issues with the information system’s consistency. However, error tolerance technicality allows devices to continue performing their functions in the event of a failure. The aim of this paper is to identify the optimal recovery approach from among the available state-of-the-art techniques in MDS by employing game theory. Several of the presented recovery protocols are chosen and evaluated in order to determine the most critical factors affecting the recovery mechanism, such as the number of processes, the time required to deliver messages, and the number of messages logged-in time. Then, using the suggested payout matrix, the game theory strategy is adapted to choose the optimum recovery technique for the specifed environmental variables. The NS2 simulator was used to carry out the tests and apply the chosen recovery protocols. The experiments validate the proposed model’s usefulness in comparison to other methods. Keywords: Mobile computing; game theory; decision making; mobile database recovery 1 Introduction Through the advancement in networking capabilities, mobile communication has been one of the most vital aspects of our lives. Mobile Computing (MC) refers to a variety of nodes or devices that allow citizens to access information or data regardless of their location [1]. However, the mobile environment has a number of shortcomings that make managing mobile data transfers dif fcult, such as periodic disconnections [25]. The primary transaction management issues stem from the versatility of the Mobile Host (MH) and the limited wireless bandwidth [69]. Numerous recovery modules have been created by researchers to ensure that sensitive information can be retrieved after a malfunction. They take into account the dif fculties associated with wireless networking when working with the mobile database, such as electricity shortages, frequent server disconnections, and handoff issues. There are two styles of recovery approaches described in the literature in this regard: forward recovery and backward recovery; for more details, see [9,10]. This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.