Coloring unstructured radio networks
Proceedings of the seventeenth annual ACM symposium on Parallelism in algorithms and architectures
Specification and Verification of Dynamic Communication Systems
ACSD '06 Proceedings of the Sixth International Conference on Application of Concurrency to System Design
QEST '06 Proceedings of the 3rd international conference on the Quantitative Evaluation of Systems
Formal modeling and analysis of wireless sensor network algorithms in real-time maude
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Theoretical Computer Science
Query-Based Model Checking of Ad Hoc Network Protocols
CONCUR 2009 Proceedings of the 20th International Conference on Concurrency Theory
Parameterized verification of ad hoc networks
CONCUR'10 Proceedings of the 21st international conference on Concurrency theory
On the power of cliques in the parameterized verification of Ad Hoc networks
FOSSACS'11/ETAPS'11 Proceedings of the 14th international conference on Foundations of software science and computational structures: part of the joint European conferences on theory and practice of software
Statistical model checking for networks of priced timed automata
FORMATS'11 Proceedings of the 9th international conference on Formal modeling and analysis of timed systems
On the verification of timed ad hoc networks
FORMATS'11 Proceedings of the 9th international conference on Formal modeling and analysis of timed systems
Analysis of a clock synchronization protocol for wireless sensor networks
Theoretical Computer Science
Grouping nodes in wireless sensor networks using coalitional game theory
FMOODS'10/FORTE'10 Proceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems
Automated analysis of AODV using UPPAAL
TACAS'12 Proceedings of the 18th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Checking and distributing statistical model checking
NFM'12 Proceedings of the 4th international conference on NASA Formal Methods
Verification of ad hoc networks with node and communication failures
FMOODS'12/FORTE'12 Proceedings of the 14th joint IFIP WG 6.1 international conference and Proceedings of the 32nd IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems
MULE-Based wireless sensor networks: probabilistic modeling and quantitative analysis
IFM'12 Proceedings of the 9th international conference on Integrated Formal Methods
Mechanized extraction of topology anti-patterns in wireless networks
IFM'12 Proceedings of the 9th international conference on Integrated Formal Methods
Proceeings of the 2nd International Workshop on Worst-Case Traversal Time
SensorChecker: reachability verification in mission-oriented sensor networks
Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking
Formal verification of real-time wireless sensor networks protocols with realistic radio links
Proceedings of the 21st International conference on Real-Time Networks and Systems
Topology-Based mobility models for wireless networks
QEST'13 Proceedings of the 10th international conference on Quantitative Evaluation of Systems
Formal development of wireless sensor-actor networks
Science of Computer Programming
Hi-index | 0.00 |
In this paper we report on modelling and verification of a medium access control protocol for wireless sensor networks, the LMAC protocol. Our approach is to systematically investigate all possible connected topologies consisting of four and of five nodes. The analysis is performed by timed automaton model checking using Uppaal. The property of main interest is detecting and resolving collision. Evaluation of this property for all connected topologies requires more than 8000 model checking runs. Increasing the number of nodes would not only lead increase the state space, but to a greater extent cause an instance explosion problem. Despite the small number of nodes this approach gave valuable insight in the protocol and the scenarios that lead to collisions not detected by the protocol, and it increased the confidence in the adequacy of the protocol.