2017
DOI: 10.1007/978-3-319-53946-1_6
|View full text |Cite
|
Sign up to set email alerts
|

Formal Probabilistic Analysis of a WSN-Based Monitoring Framework for IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…The following mathematical expression for the intrusion coverage intensity of a given object; V o , has been formally verified in Theorem 9, similarly as in (Elleuch et al, 2016a). • The predicate intrcov_intsty_pt defines the coverage behavior a specific intrusion object, as in Equation (16).…”
Section: The Intrusion Coveragementioning
confidence: 95%
See 2 more Smart Citations
“…The following mathematical expression for the intrusion coverage intensity of a given object; V o , has been formally verified in Theorem 9, similarly as in (Elleuch et al, 2016a). • The predicate intrcov_intsty_pt defines the coverage behavior a specific intrusion object, as in Equation (16).…”
Section: The Intrusion Coveragementioning
confidence: 95%
“…In the previous work when abstracting an object to a point (Elleuch et al, 2011(Elleuch et al, , 2015(Elleuch et al, , 2016a, it has been possible to consider the probability of covering a point as a simple constant value q. Giving the assumptions of size and shape of the intrusion, additional parameters should be involved.…”
Section: The Intrusion Coveragementioning
confidence: 99%
See 1 more Smart Citation
“…Garofalaki et al [24] developed an ADOxx-based modeling tool called SAPnet that enables security evaluation of Internet of Things (IoT) systems modeled as stochastic Petri nets by associating vulnerabilities to model states and quantifying security metrics for assessment during the design phase. Elleuch et al [4] present a formal analysis approach using higher-order logic theorem proving to check coverage properties and performance of wireless sensor networks. It employed randomize node scheduling, and apply it to an IoT-based environmental monitoring framework.…”
Section: Related Workmentioning
confidence: 99%
“…Next, the authors formalized the indicator random variables using HOL4 and used it for the expected time complexity analysis of various algorithms, i.e., the birthday paradox, the hat-check and the hiring problems [42]. Elleuch et al [30] used the probability theory of HOL4 to formally reason about the detection properties of Wireless Sensor Networks (WSNs) and a WSN-based monitoring framework [31]. Moreover, the authors conducted the performance analysis of WSNs [29].…”
Section: Formal Probabilistic and Performance Analysismentioning
confidence: 99%