Analysis of LEACH Protocol(s) using Formal Verification

被引:0
|
作者
Ihsan, A. [1 ]
Saghar, K. [2 ]
Fatima, T. [1 ]
机构
[1] NUST, Islamabad, Pakistan
[2] CESAT, Islamabad, Pakistan
关键词
Wireless Sensor Networks (WSN); Routing Protocol; Formal Modeling; Protocol Verification; Hierarchal Networks; SECURITY PROTOCOLS; SENSOR NETWORKS;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
WSN nodes operate in an unattended environment and thus have irreplaceable batteries. Thus an important concern is the network lifetime; we need to utilize their energy for a longer time otherwise nodes run out of power. For this purpose various protocols have been established and the subject of our matter is the LEACH protocol. The LEACH protocol is self-organizing and is characterized as an adaptive clustering protocol which uses randomly distributes energy load among nodes. By using cluster heads and data aggregation excessive energy consumption is avoided. In this paper we analyzed LEACH and its extensions like LEACH-C and LEACH-F using Formal modeling techniques. Formal modeling is often used by researchers these days to verify a variety of routing protocols. By using formal verification one can precisely confirm the authenticity of results and worst case scenarios, a solution not possible using computer simulations and hardware implementation. In this paper, we have applied formal verification to compare how efficient LEACH is as compared to its extensions in various WSN topologies. The paper is not about design improvement of LEACH but to formally verify its correctness, efficiency and performance as already stated. This work is novel as LEACH and its extensions according to our knowledge have not been analyzed using formal verification techniques.
引用
收藏
页码:254 / 262
页数:9
相关论文
共 50 条
  • [1] AKA Protocol And Its Formal Analysis And Verification Using Ambient Calculus And Logics
    Zhang, Xiaopei
    Li, Xiang
    Luo, Wenjun
    [J]. 2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 194 - 197
  • [2] Formal Verification of the Pastry Protocol Using TLA+
    Lu, Tianxiang
    [J]. DEPENDABLE SOFTWARE ENGINEERING: THEORIES, TOOLS, AND APPLICATIONS, SETTA 2015, 2015, 9409 : 284 - 299
  • [3] Formal verification of communication protocol using type theory
    Zhang, XY
    Xie, XR
    Munro, M
    Harman, M
    Hu, L
    [J]. 2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1585 - 1593
  • [4] Formal Verification of the xDAuth Protocol
    Alam, Quratulain
    Tabbasum, Saher
    Malik, Saif U. R.
    Alam, Masoom
    Ali, Tamleek
    Akhunzada, Adnan
    Khan, Samee U.
    Vasilakos, Athanasios V.
    Buyya, Rajkumar
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (09) : 1956 - 1969
  • [5] Formal Verification of the FDO Protocol
    Bussa, Simone
    Sisto, Riccardo
    Valenza, Fulvio
    [J]. 2023 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING, CSCN, 2023, : 290 - 295
  • [6] Formal verification for a PMQTT protocol
    Elemam, Eman
    Bahaa-Eldin, Ayman M.
    Shaker, Nabil H.
    Sobh, Mohamed
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2020, 21 (03) : 169 - 182
  • [7] Formal Specification and Verification of JXTA's Endpoint Routing Protocol
    Konga, Yannick L. Kala
    Djouani, Karim
    [J]. IEEE AFRICON 2011, 2011,
  • [8] Formal verification of a group membership protocol using model checking
    Rosset, Valerio
    Souto, Pedro F.
    Vasques, Francisco
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPLS, DOA, ODBASE, GADA, AND IS, PT 1, PROCEEDINGS, 2007, 4803 : 471 - 488
  • [9] Improvement of a Service Level Negotiation Protocol using Formal Verification
    Chalouf, Mohamed Aymen
    Krief, Francine
    Mbarek, Nader
    Lemlouma, Tayeb
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [10] Formal Analysis and Verification for an Ultralightweight Authentication Protocol RAPP of RFID
    Li, Wei
    Xiao, Meihua
    Li, Yanan
    Mei, Yingtian
    Zhong, Xiaomei
    Tu, Jimin
    [J]. THEORETICAL COMPUTER SCIENCE, NCTCS 2017, 2017, 768 : 119 - 132