2008
DOI: 10.1016/j.comcom.2007.10.031
|View full text |Cite
|
Sign up to set email alerts
|

A formal validation methodology for MANET routing protocols based on nodes’ self similarity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 8 publications
0
20
0
Order By: Relevance
“…Reader is referred to [25] for a comprehensive survey of formal and informal protocol validation techniques for wireless ad hoc networks. The authors in [31] proposed a formal specification based conformance testing methodology to validate the state-ofthe-art DSR routing protocol for MANET. Ö lveczky and Thorvaldsen have used Real-Time Maude for modeling, performance estimation and model checking of the OGDC algorithm for sensor networks in [32].…”
Section: Formal Methodsmentioning
confidence: 99%
“…Reader is referred to [25] for a comprehensive survey of formal and informal protocol validation techniques for wireless ad hoc networks. The authors in [31] proposed a formal specification based conformance testing methodology to validate the state-ofthe-art DSR routing protocol for MANET. Ö lveczky and Thorvaldsen have used Real-Time Maude for modeling, performance estimation and model checking of the OGDC algorithm for sensor networks in [32].…”
Section: Formal Methodsmentioning
confidence: 99%
“…Since they were provided from a Promela model, they are represented as input/outputs sequences. Therefore, a following work is to formulate them in a executable manner and to apply them on a real implementation under test of OLSR as it is mentioned in a previous work [18] in which we define testing architectures.…”
Section: B Results and Discussionmentioning
confidence: 99%
“…In this way, the recovery process is completed by cascading, that is, backup B of A is moved to position of A and newly backup of B is moved to position of B (lines [34][35][36][37][38][39]. If backup node B is critical and its backup is other than its primary, then it notifies to its backup and moves to position of its primary by cascading (lines [40][41][42][43] [34][35][36][37][38][39]. If the backup is critical and its backup is other than its primary, then the recovery procedure takes time NK (lines [40][41][42][43].…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…38 Routing protocol for mobile ad hoc network (MANET) is validated through testing methodology. 39 Wireless sensor and actuator networks are modeled using colored Petri nets. 40 Algorithm proposed for mobile ad hoc and sensor networks (MAHSNs) is verified using Z and Vienna Development Method (VDM).…”
Section: Related Workmentioning
confidence: 99%