On Formal Modeling and Validation of Wireless Sensor Network Protocols

被引:0
|
作者
Rachid Bechar
Mounir Tahar Abbes
Freha Mezzoudj
Ladjel Bellatreche
机构
[1] Hassiba Ben Bouali Uiversity of Chlef,Department of Computer Science, FSEI
[2] University of Poitier,ISAE – ENSMA
来源
关键词
WSN; Event-B method; CPN; Formal methods; Validation;
D O I
暂无
中图分类号
学科分类号
摘要
Formal verification is becoming more and more important in the field of wireless networks (WSN). The general purpose formal method called Event-B is the latest incarnation of the B Method: it is a proof based approach with a formal notation and refinement technique for modeling and verifying systems. Refinement enables implementation level features to be proven correct with respect to an abstract specification of the system. This paper proposes an initial attempt to model and verify consistency and correctness of a WSN operation in its different layers. Several formal models are introduced for this type of networks. In the first time, coloured Petri net are used to elaborate network layer models, then each one will be detailed by an Event-B formalism, while proofs are carried out using the RODIN platform which is an integrated development framework for Event-B.
引用
收藏
页码:2855 / 2888
页数:33
相关论文
共 50 条
  • [1] On Formal Modeling and Validation of Wireless Sensor Network Protocols
    Bechar, Rachid
    Tahar Abbes, Mounir
    Mezoudj, Fareha
    Bellatreche, Ladjel
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (04) : 2855 - 2888
  • [2] Correction to: On Formal Modeling and Validation of Wireless Sensor Network Protocols
    Rachid Bechar
    Mounir Tahar Abbes
    Freha Mezzoudj
    Ladjel Bellatreche
    [J]. Wireless Personal Communications, 2021, 120 : 3443 - 3443
  • [3] On Formal Modeling and Validation of Wireless Sensor Network Protocols (vol 114, pg 2855, 2020)
    Bechar, Rachid
    Abbes, Mounir Tahar
    Mezzoudj, Freha
    Bellatreche, Ladjel
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (04) : 3443 - 3443
  • [4] Application of Formal Modeling to Detect Black Hole Attacks in Wireless Sensor Network Routing Protocols
    Saghar, Kashif
    Kendall, David
    Bouridane, Ahmed
    [J]. PROCEEDINGS OF 2014 11TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES & TECHNOLOGY (IBCAST), 2014, : 191 - 194
  • [5] Formal Reliability Analysis of Wireless Sensor Network Data Transport Protocols using HOL
    Ahmed, Waqar
    Hasan, Osman
    Tahar, Sofiene
    [J]. 2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 217 - 224
  • [6] Linking Simulation with Formal Verification and Modeling of Wireless Sensor Network in TLA
    Martyna, Jerzy
    [J]. COMPUTER NETWORKS, 2010, 79 : 131 - 140
  • [7] Modeling and Evaluation of Wireless Sensor Network Protocols by Stochastic Timed Automata
    Zhang, Fengling
    Bu, Lei
    Wang, Linzhang
    Zhao, Jianhua
    Chen, Xin
    Zhang, Tian
    Li, Xuandong
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2013, 296 : 261 - 277
  • [8] Formal Study of Routing Protocols for Wireless Sensor Networks
    Antonio Mateo, Jose
    del Carmen Ruiz, Maria
    Macia, Hermenegilda
    Jose Pardo, Juan
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2014, 20 (09) : 1373 - 1401
  • [9] Security in Wireless Sensor Networks: A formal verification of protocols
    Nandi, Giann Spilere
    Pereira, David
    Vigil, Martin
    Moraes, Ricardo
    Morales, Analucia Schiaffino
    Araujo, Gustavo
    [J]. 2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 425 - 431
  • [10] FORMAL ANALYSIS OF SECURITY PROTOCOLS FOR WIRELESS SENSOR NETWORKS
    Novotny, Marian
    [J]. CECC '09: 9TH CENTRAL EUROPEAN CONFERENCE ON CRYPTOGRAPHY - TREBIC, 2010, 47 : 81 - 97