Conditional rewriting logic as a unified model of concurrency
Selected papers of the Second Workshop on Concurrency and compositionality
ACM Transactions on Programming Languages and Systems (TOPLAS)
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
GloMoSim: a library for parallel simulation of large-scale wireless networks
PADS '98 Proceedings of the twelfth workshop on Parallel and distributed simulation
Model checking
Lifetime analysis of a sensor network with hybrid automata modelling
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Specification of real-time and hybrid systems in rewriting logic
Theoretical Computer Science - Rewriting logic and its applications
Equational rules for rewriting logic
Theoretical Computer Science - Rewriting logic and its applications
Membership algebra as a logical framework for equational specification
WADT '97 Selected papers from the 12th International Workshop on Recent Trends in Algebraic Development Techniques
PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Integrated coverage and connectivity configuration in wireless sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Formal specification and analysis of performance variation in sensor network diffusion protocols
MSWiM '04 Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
A Graphical Simulation System for Modeling and Analysis of Sensor Networks
ISM '05 Proceedings of the Seventh IEEE International Symposium on Multimedia
VESTA: A Statistical Model-checker and Analyzer for Probabilistic Systems
QEST '05 Proceedings of the Second International Conference on the Quantitative Evaluation of Systems
Semantic foundations for generalized rewrite theories
Theoretical Computer Science
Specification and analysis of the AER/NCA active network protocol suite in Real-Time Maude
Formal Methods in System Design
Semantics and pragmatics of Real-Time Maude
Higher-Order and Symbolic Computation
Evaluating Complex MAC Protocols for Sensor Networks with APMC
Electronic Notes in Theoretical Computer Science (ENTCS)
Abstraction and Completeness for Real-Time Maude
Electronic Notes in Theoretical Computer Science (ENTCS)
Worst-case lifetime computation of a wireless sensor network by model-checking
Proceedings of the 4th ACM workshop on Performance evaluation of wireless ad hoc, sensor,and ubiquitous networks
Model Checking Medium Access Control for Sensor Networks
ISOLA '06 Proceedings of the Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation
PMaude: Rewrite-based Specification Language for Probabilistic Object Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Modelling and verification of the LMAC protocol for wireless sensor networks
IFM'07 Proceedings of the 6th international conference on Integrated formal methods
Formal simulation and analysis of the CASH scheduling algorithm in real-time maude
FASE'06 Proceedings of the 9th international conference on Fundamental Approaches to Software Engineering
Teaching Formal Methods Based on Rewriting Logic and Maude
TFM '09 Proceedings of the 2nd International Conference on Teaching Formal Methods
KleeNet: discovering insidious interaction bugs in wireless sensor networks before deployment
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks
CALCO'09 Proceedings of the 3rd international conference on Algebra and coalgebra in computer science
Formal modeling and verification of sensor network encryption protocol in the OTS/CafeOBJ method
ISoLA'10 Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part I
Models of Rate Restricted Communication for Concurrent Objects
Electronic Notes in Theoretical Computer Science (ENTCS)
Electronic Notes in Theoretical Computer Science (ENTCS)
Probabilistic real-time rewrite theories and their expressive power
FORMATS'11 Proceedings of the 9th international conference on Formal modeling and analysis of timed systems
Grouping nodes in wireless sensor networks using coalitional game theory
FMOODS'10/FORTE'10 Proceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems
Automatic verification of real-time systems with rich data: an overview
TAMC'12 Proceedings of the 9th Annual international conference on Theory and Applications of Models of Computation
MULE-Based wireless sensor networks: probabilistic modeling and quantitative analysis
IFM'12 Proceedings of the 9th international conference on Integrated Formal Methods
Timed CTL model checking in real-time maude
WRLA'12 Proceedings of the 9th international conference on Rewriting Logic and Its Applications
Performance evaluation of sensor networks by statistical modeling and euclidean model checking
ACM Transactions on Sensor Networks (TOSN)
Hi-index | 5.23 |
The purpose of this paper is to show how the rewriting-logic-based Real-Time Maude language and tool can be used to formally model, simulate, and model check advanced wireless sensor network (WSN) algorithms. This is done by first proposing some general techniques for modeling and analyzing WSN algorithms, and then by showing how these techniques have been applied to the modeling, performance estimation, and model checking of the state-of-the-art optimal geographical density control (OGDC) density control algorithm. Wireless sensor networks in general, and the OGDC algorithm in particular, pose many challenges to their formal specification and analysis, including novel communication forms, spatial entities, time-dependent and probabilistic features, and the need to analyze both correctness and performance. We focus on Monte Carlo simulations to evaluate the performance of OGDC. Extensive simulations with up to 800 sensor nodes, and comparison with the ns-2 simulations of OGDC, indicate that Real-Time Maude simulations provide fairly accurate performance estimates of WSN algorithms. As a consequence, simulating the high-level Real-Time Maude model of a WSN algorithm eliminates the need for implementing it on a simulation tool to get a faithful estimate of its performance, while providing much greater flexibility in defining the appropriate simulation scenario; in addition, Real-Time Maude model checking can search for ''corner case'' bugs and evaluate best-case and worst-case performance. Some of the techniques presented in this paper are also used in an ongoing analysis effort of another state-of-the-art WSN algorithm.