[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1023663.1023694acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Formal specification and analysis of performance variation in sensor network diffusion protocols

Published: 04 October 2004 Publication History

Abstract

Discovering a routing tree for gathering or disseminating streams of data is an important operation in many sensor network applications. However, protocols for tree discovery may have significant performance problems for certain configurations of a network and its application task.A Temporal Logic of Actions (TLA) specification of push and pull diffusion is introduced in order to analyse such problems. This specification can be used as a basis for implementation, for visualising protocol behaviours, for simulation experiments, and for formal verification of properties of the protocol.This short paper shows how such a specification is used to understand variations in the routing trees discovered by push and pull diffusion and the effect of their shape and size on protocol performance.

References

[1]
D. Cavin, Y. Sasson, and A. Schiper. On the Accuracy of MANET Simulators. In Principles of Mobile Computing 2002, Toulouse, France, 2002.
[2]
J. Heidemann, F. Silva, and D. Estrin. Matching Data Dissemination Algorithms to Application Requirements. In Proceedings of the First International Conference on Embedded Networked Sensor Systems, pages 218--229. ACM Press, 2003.
[3]
C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networks, 2000.
[4]
B. Krishnamachari, D. Estrin, and S. Wicker. Modelling Data-centric Routing in Wireless Sensor Networks. In Proceedings of IEEE Infocom 2002, 2002.
[5]
L. Lamport. Specifying Concurrent Systems with TLA+. In M.Broy and R.Steinbruecken, editors, Calculational System Design, number 173 in Series F: Computer and Systems Sciences, pages 183--247, Amsterdam, 1999. IOS Press.
[6]
P. Levis, N. Lee, M. Welsh, and D. Culler. TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications. In Proc. Second ACM International Workshop on Wireless Sensor Networks and Applications, 2003.
[7]
S. Nair and R. Cardell-Oliver. Analysis of diffusion in sensor networks, July 2004. {Online} http://www.csse.uwa.edu.au/~sule/diffusion.
[8]
V. Naoumov and T. Gross. Simulation of Large Ad Hoc Networks. In Proc. 6th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 03), 2003.

Cited By

View all
  • (2021)A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networksJournal of Computer Virology and Hacking Techniques10.1007/s11416-021-00392-017:3(249-263)Online publication date: 6-Aug-2021
  • (2016)Formal specifications of Denial of Service attacks in Wireless Sensor Networks2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST)10.1109/IBCAST.2016.7429898(324-333)Online publication date: Jan-2016
  • (2015)Verifying Smart Sensory Systems on Cloud Computing FrameworksProcedia Computer Science10.1016/j.procs.2015.05.13052(1126-1132)Online publication date: 2015
  • Show More Cited By

Index Terms

  1. Formal specification and analysis of performance variation in sensor network diffusion protocols

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MSWiM '04: Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
      October 2004
      334 pages
      ISBN:1581139535
      DOI:10.1145/1023663
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 October 2004

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. directed diffusion
      2. formal specification
      3. sensor network
      4. temporal logic of actions

      Qualifiers

      • Article

      Conference

      MSWiM04
      Sponsor:

      Acceptance Rates

      MSWiM '04 Paper Acceptance Rate 45 of 121 submissions, 37%;
      Overall Acceptance Rate 398 of 1,577 submissions, 25%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 26 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networksJournal of Computer Virology and Hacking Techniques10.1007/s11416-021-00392-017:3(249-263)Online publication date: 6-Aug-2021
      • (2016)Formal specifications of Denial of Service attacks in Wireless Sensor Networks2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST)10.1109/IBCAST.2016.7429898(324-333)Online publication date: Jan-2016
      • (2015)Verifying Smart Sensory Systems on Cloud Computing FrameworksProcedia Computer Science10.1016/j.procs.2015.05.13052(1126-1132)Online publication date: 2015
      • (2015)Petri nets-based model for the analysis of NORIA protocolConcurrency and Computation: Practice & Experience10.1002/cpe.345227:17(4704-4715)Online publication date: 10-Dec-2015
      • (2013)Adding value to WSN simulation through formal modelling and analysis2013 4th International Workshop on Software Engineering for Sensor Network Applications (SESENA)10.1109/SESENA.2013.6612261(24-29)Online publication date: May-2013
      • (2013)Geometry of a Sensor NetworksComputer Aided Systems Theory - EUROCAST 201310.1007/978-3-642-53862-9_64(507-512)Online publication date: 2013
      • (2011)Group Selection by Nodes in Wireless Sensor Networks Using Coalitional Game TheoryProceedings of the 2011 16th IEEE International Conference on Engineering of Complex Computer Systems10.1109/ICECCS.2011.32(253-262)Online publication date: 27-Apr-2011
      • (2010)Grouping nodes in wireless sensor networks using coalitional game theoryProceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems10.1007/978-3-642-13464-7_9(95-109)Online publication date: 7-Jun-2010
      • (2009)Analysis of Wireless Sensor Network Protocols in Dynamic ScenariosProceedings of the 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems10.1007/978-3-642-05118-0_8(105-119)Online publication date: 5-Nov-2009
      • (2008)Early Prototyping of Wireless Sensor Network Algorithms in PVSProceedings of the 27th international conference on Computer Safety, Reliability, and Security10.1007/978-3-540-87698-4_29(346-359)Online publication date: 22-Sep-2008
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media