2009 IEEE International Symposium on Parallel &Amp; Distributed Processing 2009
DOI: 10.1109/ipdps.2009.5160907
|View full text |Cite
|
Sign up to set email alerts
|

AVR-INJECT: A tool for injecting faults in Wireless Sensor Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 15 publications
0
18
0
Order By: Relevance
“…We claim that an Isolation event cannot occur in a sensor (in lines [16][17][18][19][20][21] if at least one of its neighbor sensors is alive and reachable and is connected with the sensor. Moreover, if a sensor is not reachable, due to a previous isolation, or not alive, it cannot receive another Isolation event again.…”
Section: General Correctness Specificationmentioning
confidence: 99%
“…We claim that an Isolation event cannot occur in a sensor (in lines [16][17][18][19][20][21] if at least one of its neighbor sensors is alive and reachable and is connected with the sensor. Moreover, if a sensor is not reachable, due to a previous isolation, or not alive, it cannot receive another Isolation event again.…”
Section: General Correctness Specificationmentioning
confidence: 99%
“…This fact is typically avoided by main current evaluation platforms given the added difficulty to recreate the presence of faults in systems in a controllable and repeatable way. Despite that fault injection has been widely explored in the dependability domain through frameworks such as NFTAPE [26], XCEPTION [27], or FIAT [28], its application to ad hoc networks is limited to just two frameworks: MINT [19] and AVR-INJECT [29]. Nevertheless, whereas the former just exploits the impact of packet dropping, the latter only focuses on the injection of bitflips within nodes' processor, thus obviating all potential faults affecting the interaction between nodes at the communication layer, such as those listed in Table 1.…”
Section: Recreation Of Threatsmentioning
confidence: 99%
“…Recently, as reported in [9], transient faults have occurred with a probability of approximately 0.1% in a large scale deployment and such transient faults severely impact on the efficiency of the protocols. Also, there exists a tool that is designed specifically for wireless sensors to emulate memory faults to check the reactions of software to these faults [46].…”
Section: Faultsmentioning
confidence: 99%