5,306 research outputs found
Modeling Wireless Sensor Network Architectures using AADL
International audienceRecent technological advances have enhanced the possibilities of large-scale development and commercial deployment of diverse applications using wireless sensor networks. As this development effort expands, it becomes increasingly important to build tools and formal methodologies that ease large-scale deployments of such networks. In this paper, we advocate the use of an architecture description language called AADL to describe wireless sensor network architectures. We highlight the use of component-connector paradigm of AADL in designing robust, performance-critical, real-time sensor network applications incorporating relevant dependability metrics. By careful analysis and extraction of the common requirements, we describe a case study, that of a simple data collection application using sensor networks, as a proof of concept of the AADL modeling approach. Lastly, we propose several wireless sensor network specific extensions to AADL that will further enhance the richness of such models
Equational Reasonings in Wireless Network Gossip Protocols
Gossip protocols have been proposed as a robust and efficient method for
disseminating information throughout large-scale networks. In this paper, we
propose a compositional analysis technique to study formal probabilistic models
of gossip protocols expressed in a simple probabilistic timed process calculus
for wireless sensor networks. We equip the calculus with a simulation theory to
compare probabilistic protocols that have similar behaviour up to a certain
tolerance. The theory is used to prove a number of algebraic laws which
revealed to be very effective to estimate the performances of gossip networks,
with and without communication collisions, and randomised gossip networks. Our
simulation theory is an asymmetric variant of the weak bisimulation metric that
maintains most of the properties of the original definition. However, our
asymmetric version is particularly suitable to reason on protocols in which the
systems under consideration are not approximately equivalent, as in the case of
gossip protocols
Formal modelling and analysis of denial of services attacks in wireless sensor networks
Wireless Sensor Networks (WSNs) have attracted considerable research attention in recent years because of the perceived potential benefits offered by self-organising, multi-hop networks consisting of low-cost and small wireless devices for monitoring or control applications in di±cult environments. WSN may be deployed in hostile or inaccessible environments and are often unattended. These conditions present many challenges in ensuring that WSNs work effectively and survive long enough to fulfil their functionalities. Securing a WSN against any malicious attack is a particular challenge. Due to the limited resources of nodes, traditional routing protocols are not appropriate in WSNs and innovative methods are used to route data from source nodes to sink nodes (base stations). To evaluate the routing protocols against DoS attacks, an innovative design method of combining formal modelling and computer simulations has been proposed. This research has shown that by using formal modelling hidden bugs (e.g. vulnerability to attacks) in routing protocols can be detected automatically. In addition, through a rigorous testing, a new routing protocol, RAEED (Robust formally Analysed protocol for wirEless sEnsor networks Deployment), was developed which is able to operate effectively in the presence of hello flood, rushing, wormhole, black hole, gray hole, sink hole, INA and jamming attacks. It has been proved formally and using computer simulation that the RAEED can pacify these DoS attacks. A second contribution of this thesis relates to the development of a framework to check the vulnerability of different routing protocols against Denial of Service(DoS) attacks. This has allowed us to evaluate formally some existing and known routing protocols against various DoS attacks iand these include TinyOS Beaconing, Authentic TinyOS using uTesla, Rumour Routing, LEACH, Direct Diffusion, INSENS, ARRIVE and ARAN protocols. This has resulted in the development of an innovative and simple defence technique with no additional hardware cost for deployment against wormhole and INA attacks. In the thesis, the detection of weaknesses in INSENS, Arrive and ARAN protocols was also addressed formally. Finally, an e±cient design methodology using a combination of formal modelling and simulation is propose to evaluate the performances of routing protocols against DoS attacks
A Chemistry-Inspired Framework for Achieving Consensus in Wireless Sensor Networks
The aim of this paper is to show how simple interaction mechanisms, inspired
by chemical systems, can provide the basic tools to design and analyze a
mathematical model for achieving consensus in wireless sensor networks,
characterized by balanced directed graphs. The convergence and stability of the
model are first proven by using new mathematical tools, which are borrowed
directly from chemical theory, and then validated by means of simulation
results, for different network topologies and number of sensors. The underlying
chemical theory is also used to derive simple interaction rules that may
account for practical issues, such as the estimation of the number of neighbors
and the robustness against perturbations. Finally, the proposed chemical
solution is validated under real-world conditions by means of a four-node
hardware implementation where the exchange of information among nodes takes
place in a distributed manner (with no need for any admission control and
synchronism procedure), simply relying on the transmission of a pulse whose
rate is proportional to the state of each sensor.Comment: 12 pages, 10 figures, submitted to IEEE Sensors Journa
Service-oriented wireless sensor networks and an energy-aware mesh routing algorithm
Service-oriented wireless sensor networks (WSNs) are being paid more and more attention because service computing can hide complexity of WSNs and enables simple and transparent access to individual sensor nodes. Existing WSNs mainly use IEEE 802.15.4 as their communication specification, however, this protocol suite cannot support IP-based routing and service-oriented access because it only specifies a set of physical- and MAC-layer protocols. For inosculating WSNs with IP networks, IEEE proposed a 6LoWPAN (IPv6 over LoW Power wireless Area Networks) as the adaptation layer between IP and MAC layers. However, it is still a challenging task how to discover and manage sensor resources, guarantee the security of WSNs and route messages over resource-restricted sensor nodes. This paper is set to address such three key issues. Firstly, we propose a service-oriented WSN architectural model based on 6LoWPAN and design a lightweight service middleware SOWAM (service-oriented WSN architecture middleware), where each sensor node provides a collection of services and is managed by our SOWAM. Secondly, we develop a security mechanism for the authentication and secure connection among users and sensor nodes. Finally, we propose an energyaware mesh routing protocol (EAMR) for message transmission in a WSN with multiple mobile sinks, aiming at prolonging the lifetime of WSNs as long as possible. In our EAMR, sensor nodes with the residual energy lower than a threshold do not forward messages for other nodes until the threshold is leveled down. As a result, the energy consumption is evened over sensor nodes significantly. The experimental results demonstrate the feasibility of our service-oriented approach and lightweight middleware SOWAM, as well as the effectiveness of our routing algorithm EAMR.<br /
A Multi-Criteria Framework to Assist on the Design of Internet-of-Things Systems
The Internet-of-Things (IoT), considered as Internet first real evolution, has become
immensely important to society due to revolutionary business models with the potential
to radically improve Human life. Manufacturers are engaged in developing embedded
systems (IoT Systems) for different purposes to address this new variety of application
domains and services. With the capability to agilely respond to a very dynamic market
offer of IoT Systems, the design phase of IoT ecosystems can be enhanced. However,
select the more suitable IoT System for a certain task is currently based on stakeholder’s
knowledge, normally from lived experience or intuition, although it does not mean that
a proper decision is being made. Furthermore, the lack of methods to formally describe
IoT Systems characteristics, capable of being automatically used by methods is also an
issue, reinforced by the growth of available information directly connected to Internet
spread.
Contributing to improve IoT Ecosystems design phase, this PhD work proposes a
framework capable of fully characterise an IoT System and assist stakeholder’s on the decision
of which is the proper IoT System for a specific task. This enables decision-makers
to perform a better reasoning and more aware analysis of diverse and very often contradicting
criteria. It is also intended to provide methods to integrate energy consumptionsimulation
tools and address interoperability with standards, methods or systems within
the IoT scope. This is addressed using a model-driven based framework supporting a
high openness level to use different software languages and decision methods, but also
for interoperability with other systems, tools and methods
Model-based validation of CANopen systems
International audienceCANopen is an increasingly popular protocol for the design of networked embedded systems. Nonetheless, the large variety of communication and network management functionalities supported in CANopen can increase significantly systems complexity and in turn, the needs for system validation at design time. We present hereafter a rigorous method based on formal modeling and verification techniques, allowing to provide a comprehensive analysis of CANopen systems. Our method uses BIP, a formal framework for modeling, analysis and implementation of real-time, heterogeneous, component-based systems and the associated BIP tools for simulation, performance evaluation and statistical model-checking
- …