18,483 research outputs found
Modelling Probabilistic Wireless Networks
We propose a process calculus to model high level wireless systems, where the
topology of a network is described by a digraph. The calculus enjoys features
which are proper of wireless networks, namely broadcast communication and
probabilistic behaviour. We first focus on the problem of composing wireless
networks, then we present a compositional theory based on a probabilistic
generalisation of the well known may-testing and must-testing pre- orders.
Also, we define an extensional semantics for our calculus, which will be used
to define both simulation and deadlock simulation preorders for wireless
networks. We prove that our simulation preorder is sound with respect to the
may-testing preorder; similarly, the deadlock simulation pre- order is sound
with respect to the must-testing preorder, for a large class of networks. We
also provide a counterexample showing that completeness of the simulation
preorder, with respect to the may testing one, does not hold. We conclude the
paper with an application of our theory to probabilistic routing protocols
Model checking medium access control for sensor networks
We describe verification of S-MAC, a medium access control protocol designed for wireless sensor networks, by means of the PRISM model checker. The S-MAC protocol is built on top of the IEEE 802.11 standard for wireless ad hoc networks and, as such, it uses the same randomised backoff procedure as a means to avoid collision. In order to minimise energy consumption, in S-MAC, nodes are periodically put into a sleep state. Synchronisation of the sleeping schedules is necessary for the nodes to be able to communicate. Intuitively, energy saving obtained through a periodic sleep mechanism will be at the expense of performance. In previous work on S-MAC verification, a combination of analytical techniques and simulation has been used to confirm the correctness of this intuition for a simplified (abstract) version of the protocol in which the initial schedules coordination phase is assumed correct. We show how we have used the PRISM model checker to verify the behaviour of S-MAC and compare it to that of IEEE 802.11
Formal analysis techniques for gossiping protocols
We give a survey of formal verification techniques that can be used to corroborate existing experimental results for gossiping protocols in a rigorous manner. We present properties of interest for gossiping protocols and discuss how various formal evaluation techniques can be employed to predict them
2D Time-frequency interference modelling using stochastic geometry for performance evaluation in Low-Power Wide-Area Networks
In wireless networks, interferences between trans- missions are modelled
either in time or frequency domain. In this article, we jointly analyze
interferences in the time- frequency domain using a stochastic geometry model
assuming the total time-frequency resources to be a two-dimensional plane and
transmissions from Internet of Things (IoT) devices time- frequency patterns on
this plane. To evaluate the interference, we quantify the overlap between the
information packets: provided that the overlap is not too strong, the packets
are not necessarily lost due to capture effect. This flexible model can be used
for multiple medium access scenarios and is especially adapted to the random
time-frequency access schemes used in Low-Power Wide-Area Networks (LPWANs). By
characterizing the outage probability and throughput, our approach permits to
evaluate the performance of two representative LPWA technologies
Sigfox{\textsuperscript \textregistered} and LoRaWA{\textsuperscript
\textregistered}
Context Aware Computing for The Internet of Things: A Survey
As we are moving towards the Internet of Things (IoT), the number of sensors
deployed around the world is growing at a rapid pace. Market research has shown
a significant growth of sensor deployments over the past decade and has
predicted a significant increment of the growth rate in the future. These
sensors continuously generate enormous amounts of data. However, in order to
add value to raw sensor data we need to understand it. Collection, modelling,
reasoning, and distribution of context in relation to sensor data plays
critical role in this challenge. Context-aware computing has proven to be
successful in understanding sensor data. In this paper, we survey context
awareness from an IoT perspective. We present the necessary background by
introducing the IoT paradigm and context-aware fundamentals at the beginning.
Then we provide an in-depth analysis of context life cycle. We evaluate a
subset of projects (50) which represent the majority of research and commercial
solutions proposed in the field of context-aware computing conducted over the
last decade (2001-2011) based on our own taxonomy. Finally, based on our
evaluation, we highlight the lessons to be learnt from the past and some
possible directions for future research. The survey addresses a broad range of
techniques, methods, models, functionalities, systems, applications, and
middleware solutions related to context awareness and IoT. Our goal is not only
to analyse, compare and consolidate past research work but also to appreciate
their findings and discuss their applicability towards the IoT.Comment: IEEE Communications Surveys & Tutorials Journal, 201
A fast ILP-based Heuristic for the robust design of Body Wireless Sensor Networks
We consider the problem of optimally designing a body wireless sensor
network, while taking into account the uncertainty of data generation of
biosensors. Since the related min-max robustness Integer Linear Programming
(ILP) problem can be difficult to solve even for state-of-the-art commercial
optimization solvers, we propose an original heuristic for its solution. The
heuristic combines deterministic and probabilistic variable fixing strategies,
guided by the information coming from strengthened linear relaxations of the
ILP robust model, and includes a very large neighborhood search for reparation
and improvement of generated solutions, formulated as an ILP problem solved
exactly. Computational tests on realistic instances show that our heuristic
finds solutions of much higher quality than a state-of-the-art solver and than
an effective benchmark heuristic.Comment: This is the authors' final version of the paper published in G.
Squillero and K. Sim (Eds.): EvoApplications 2017, Part I, LNCS 10199, pp.
1-17, 2017. DOI: 10.1007/978-3-319-55849-3\_16. The final publication is
available at Springer via http://dx.doi.org/10.1007/978-3-319-55849-3_1
Modelling Clock Synchronization in the Chess gMAC WSN Protocol
We present a detailled timed automata model of the clock synchronization
algorithm that is currently being used in a wireless sensor network (WSN) that
has been developed by the Dutch company Chess. Using the Uppaal model checker,
we establish that in certain cases a static, fully synchronized network may
eventually become unsynchronized if the current algorithm is used, even in a
setting with infinitesimal clock drifts
BigraphER: rewriting and analysis engine for bigraphs
BigraphER is a suite of open-source tools providing an effi-
cient implementation of rewriting, simulation, and visualisation for bigraphs,
a universal formalism for modelling interacting systems that
evolve in time and space and first introduced by Milner. BigraphER consists
of an OCaml library that provides programming interfaces for the
manipulation of bigraphs, their constituents and reaction rules, and a
command-line tool capable of simulating Bigraphical Reactive Systems
(BRSs) and computing their transition systems. Other features are native
support for both bigraphs and bigraphs with sharing, stochastic reaction
rules, rule priorities, instantiation maps, parameterised controls, predicate
checking, graphical output and integration with the probabilistic
model checker PRISM
- ā¦