2011
DOI: 10.1007/978-3-642-19805-2_30
|View full text |Cite
|
Sign up to set email alerts
|

On the Power of Cliques in the Parameterized Verification of Ad Hoc Networks

Abstract: We study decision problems for parameterized verification of protocols for ad hoc networks. The problem we consider is control state reachability for networks of arbitrary size. We restrict our analysis to topologies that approximate the notion of bounded diameter often used in ad hoc networks for optimizing broadcast communication. We show that restricting to graphs with bounded diameter is not sufficient to make control state reachability decidable, but the problem turns out to be decidable when considering … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
52
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(54 citation statements)
references
References 19 publications
(32 reference statements)
2
52
0
Order By: Relevance
“…We also mention decidability for DTAHN on cliques since, as for bounded paths, it derives from an application of the theory of wsts. Undecidability for DTAHN on graphs with bounded diameter follows instead from the result obtained in the untimed case in [6].…”
Section: Discussionmentioning
confidence: 95%
See 3 more Smart Citations
“…We also mention decidability for DTAHN on cliques since, as for bounded paths, it derives from an application of the theory of wsts. Undecidability for DTAHN on graphs with bounded diameter follows instead from the result obtained in the untimed case in [6].…”
Section: Discussionmentioning
confidence: 95%
“…[8,12,11,5,6]. Ad hoc networks consist of wireless hosts that, in absence of a fixed infrastructure, communicate sending broadcast messages.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Lately, there has been a lot of (ongoing) research in the area of parameterized verification [1,3,9,13,14], which aims to validate a given system independently of the number of processes and the communication topology. A lot of different models of such systems have been proposed (cf.…”
Section: Introductionmentioning
confidence: 99%