2011
DOI: 10.1007/978-3-642-24559-6_27
|View full text |Cite
|
Sign up to set email alerts
|

Formal Analysis of a Scheduling Algorithm for Wireless Sensor Networks

Abstract: In wireless sensor networks (WSNs), scheduling of the sensors is considered to be the most effective energy conservation mechanism. The random and unpredictable deployment of sensors in many WSNs in the open fields makes the sensor scheduling problem very challenging and randomized scheduling algorithms are thus used. The performance of these algorithms is usually analyzed using simulation techniques, which do not offer 100% accurate results. In this paper, we overcome this limitation by using higher-order-log… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 29 publications
0
17
0
Order By: Relevance
“…Both model checking and theorem proving have been successfully used for the precise probabilistic analysis of a broad range of systems (e.g. [9,10,11,12,13]). However, to the best of our knowledge, no formal analysis approach has been used for the reliability analysis of oil and gas pipelines so far.…”
Section: Introductionmentioning
confidence: 99%
“…Both model checking and theorem proving have been successfully used for the precise probabilistic analysis of a broad range of systems (e.g. [9,10,11,12,13]). However, to the best of our knowledge, no formal analysis approach has been used for the reliability analysis of oil and gas pipelines so far.…”
Section: Introductionmentioning
confidence: 99%
“…Chen et al (2013) provide an extensive review of automated formal verification techniques of ad hoc routing protocols for WSN; Katelman et al (2008) propose a formallybased system redesign methodology used to redesign a version of the LMST topology protocol that ensures network connectivity under realistic deployment conditions. Elleuch et al (2011) apply a probabilistic framework to formally reason about the expected values of coverage intensity in a WSN. In both cases they only check the connectivity of the network without considering data delivery resiliency or connection resiliency to understand the tolerance degree of a WSN.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we give an overview of the formalization of the k-set randomized scheduling algorithm for WSNs using the HOL theorem prover [4]. We will build upon these foundations to formally verify the forest fire detection WSN properties in the next section.…”
Section: Formal Analysis Of the K-set Randomized Scheduling Algorithmmentioning
confidence: 99%
“…In particular, we verify the coverage properties related to the expected values of coverage intensity, the upper bound on the total number of disjoint subsets, for a given coverage intensity, and the lower bound on the total number of nodes. This verification is based on our prior formalization of the k-set randomized algorithm, done in [4], and developed within the probabilistic framework [9] available in the HOL theorem prover.…”
Section: Introductionmentioning
confidence: 99%