Formal Verification of Device Discovery Mechanism using UPPAAL
نویسندگان
چکیده
منابع مشابه
Formal Verification of Bluetooth Standard 802.11a Using UPPAAL
The time domain and node connectivity is the most critical analytical approach as an analyser in a real time operating system. The purpose of using AODV routing protocol is to decrease the delay and increase the efficiency of the network. AODV routing protocol and employs the idea of a trust model to protect routing behaviours in the network layer of MANETs. Cooperation between nodes should be ...
متن کاملConfiguration Dynamics Verification Using UPPAAL
Modern software applications can have very complicated internal dynamics. Most of the software tools are written in an imperative programming language which can quickly become impractical for describing complex dynamics. Also, it is very hard to verify that the code actually covers fully all aspects of the tool’s dynamics. Propagation rules are suitable as a means for specification and verifica...
متن کاملCompositional Verification of Sensor Software Using Uppaal
Verification of wireless sensor networks has long been performed for communication protocols and for networklevel behavior over multiple nodes, but not for the basic properties that should hold at a single node. Testing sensor networks, however, is extremely hard due to the lack of controllability, and complex simulation setups are often too expensive to undertake. Thus, verification of propert...
متن کاملVerification of Plan Models Using UPPAAL
This paper describes work on the veriication of HSTS, the planner and sched-uler of the Remote Agent autonomous control system deployed in Deep Space 1 (DS1))8]. The veriication is done using UPPAAL, a real time model checking tool 6]. We start by motivating our work in the introduction. Then we give a brief description of HSTS and UPPAAL. After that, we give a mapping of HSTS models into UPPAA...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2012
ISSN: 0975-8887
DOI: 10.5120/9392-3816