Formal verification of real-time wireless sensor networks protocols with realistic radio links

  • Authors:
  • Alexandre Mouradian;Isabelle Augé-Blum

  • Affiliations:
  • Université de Lyon, INRIA, INSA-Lyon, France;Université de Lyon, INRIA, INSA-Lyon, France

  • Venue:
  • Proceedings of the 21st International conference on Real-Time Networks and Systems
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many critical applications which rely on Wireless Sensor Networks (WSNs) are proposed. Forest fire detection, landslide detection and intrusion detection are some examples. Critical applications require correct behavior, reliability, and the respect of time constraints. Otherwise, if they fail, consequences on human life and the environment could be catastrophic. For this reason, the WSN protocols used in these applications must be formally verified. Unfortunately the radio link is unreliable, it is thus difficult to give hard guarantees on the temporal behavior of the protocols (on wired systems the link error probability is very low [7], so they are considered reliable). Indeed, a message may experience a very high number of retransmissions. The temporal guarantee has thus to be given with a probability that it is achieved. This probability must meet the requirements of the application. Network protocols have been successfully verified on a given network topology without taking into account unreliable links. Nevertheless, the probabilistic nature of radio links may change the topology (links which appear and disappear). Thus instead of a single topology we have a set of possible topologies, each topology having a probability to exist. In this paper, we propose a method that produces the set of topologies, checks the property on every topology, and gives the probability that the property is verified. This technique is independent from the verification technique, i.e. each topology can be verified using any formal method which can give a "yes" or "no" answer to the question: "Does the model of the protocol respect the property?". In this paper we apply this method on f-MAC [23] protocol. F-MAC is a real-time medium access protocol for WSNs. We use UPPAAL model checker [10] as verification tool. We perform simulations to observe the difference between average and worst case behaviors.