One step forward : Linking Wireless Self-Organizing Networks Validation Techniques with Formal Testing approaches

Wireless self-organizing networks (WSONs) have attracted considerable attention from the network research community; however, the key for their success is the rigorous validation of the properties of the network protocols. Applications of risk or those demanding precision (like alert-based systems) require a rigorous and reliable validation of deployed network protocols. While the main goal is to ensure the reliability of the protocols, validation techniques also allow the establishment of their correctness regarding the related protocols' requirements. Nevertheless, even if different communities have carried out intensive research activities on the validation domain, WSONs still raise new issues for and challenging constraints to these communities. We thus, advocate the use of complementary techniques coming from different research communities to efficiently address the validation of WSON protocols. The goal of this tutorial is to present a comprehensive review of the literature on protocol engineering techniques and to discuss difficulties imposed by the characteristics of WSONs on the protocol engineering community. Following the formal and nonformal classification of techniques, we provide a discussion about components and similarities of existing protocol validation approaches. We also investigate how to take advantage of such similarities to obtain complementary techniques and outline new challenges.

[1]  Andreas Mitschele-Thiel,et al.  Performance engineering of SDL/MSC systems , 1999, Comput. Networks.

[2]  F. de Renesse,et al.  Formal verification of ad-hoc routing protocols using SPIN model checker , 2004, Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521).

[3]  Ralf Steinmetz,et al.  A survey on real world and emulation testbeds for mobile ad hoc networks , 2006, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006..

[4]  Arend Rensink,et al.  A formal MDA approach for mobile health systems , 2004 .

[5]  Kishor S. Trivedi Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .

[6]  André Schiper,et al.  On the accuracy of MANET simulators , 2002, POMC '02.

[7]  Basil S. Maglaris,et al.  Throughput Analysis in Multihop CSMA Packet Radio Networks , 1987, IEEE Trans. Commun..

[8]  Edmundo de Souza e Silva,et al.  Traffic engineering using reward models , 2001 .

[9]  Dorina C. Petriu,et al.  Software Performance Models from System Scenarios in Use Case Maps , 2002, Computer Performance Evaluation / TOOLS.

[10]  Deborah Estrin,et al.  EmStar: A Software Environment for Developing and Deploying Wireless Sensor Networks , 2004, USENIX ATC, General Track.

[11]  Martin Mauve,et al.  A survey on real-world implementations of mobile ad-hoc networks , 2007, Ad Hoc Networks.

[12]  Mohammad Reza Matash Borujerdi,et al.  Formal Verification of a Multicast Protocol In Mobile Networks , 2007, International Conference on Computational Intelligence.

[13]  Paolo Giaccone,et al.  Capacity Scaling of Sparse Mobile Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[14]  David Starobinski,et al.  Performance of wireless networks with hidden nodes: a queuing-theoretic analysis , 2005, Comput. Commun..

[15]  Ivar Jacobson,et al.  The Unified Software Development Process , 1999 .

[16]  Dirk P. Kroese,et al.  Simulation and the Monte Carlo Method (Wiley Series in Probability and Statistics) , 1981 .

[17]  Scott F. Midkiff,et al.  A framework for wireless ad hoc routing protocols , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[18]  Ana R. Cavalli,et al.  A passive testing approach based on invariants: application to the WAP , 2005, Comput. Networks.

[19]  C. Petri Kommunikation mit Automaten , 1962 .

[20]  Fatiha Zaïdi,et al.  Testing methodology for an ad hoc routing protocol , 2006, PM2HW2N '06.

[21]  Wei Monin,et al.  Looking for Better Integration of Design and Performance Engineering , 2003, SDL Forum.

[22]  Ana R. Cavalli,et al.  A formal validation methodology for MANET routing protocols based on nodes' self similarity , 2008, Comput. Commun..

[23]  James Martin,et al.  Rapid Application Development , 1991 .

[24]  Michele Garetto,et al.  Modeling per-flow throughput and capturing starvation in CSMA multi-hop wireless networks , 2008, TNET.

[25]  Marta Z. Kwiatkowska,et al.  A Timing Analysis of AODV , 2005, FMOODS.

[26]  Annabelle McIver,et al.  Formal Techniques for the Analysis of Wireless Networks , 2006, Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006).

[27]  Ana R. Cavalli,et al.  A Multi-service and Multi-protocol Validation Platform-Experimentation Results , 2004, TestCom.

[28]  Pascal Raymond,et al.  The Lucky language Reference Manual , 2004 .

[29]  James C. Corbett,et al.  Bandera: extracting finite-state models from Java source code , 2000, ICSE.

[30]  Patrice Godefroid,et al.  Model checking for programming languages using VeriSoft , 1997, POPL '97.

[31]  Marta Z. Kwiatkowska,et al.  Automatic verification of real-time systems with discrete probability distributions , 1999, Theor. Comput. Sci..

[32]  Michele Garetto,et al.  Modeling Per-Flow Throughput and Capturing Starvation in CSMA Multi-Hop Wireless Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[33]  Paolo Ballarini,et al.  Model Checking Medium Access Control for Sensor Networks , 2006, Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006).

[34]  Elke Heck,et al.  Performance evaluation of formally specified systems: the integration of SDL with HIT , 1996 .

[35]  Bruno Gaujal,et al.  Study of the impact of asymmetry and carrier sense mechanism in IEEE 802.11 multi-hops networks through a basic case , 2004, PE-WASUN '04.

[36]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[37]  Marta Z. Kwiatkowska,et al.  Probabilistic Model Checking of the IEEE 802.11 Wireless Local Area Network Protocol , 2002, PAPM-PROBMIV.

[38]  Hans van Vliet,et al.  Software engineering (2nd ed.): principles and practice , 2000 .

[39]  Serge Fdida,et al.  A Prototyping Environment for Wireless Multihop Networks , 2007, AINTEC.

[40]  Gunter Bolch,et al.  Queueing Networks and Markov Chains , 2005 .

[41]  Rajive Bagrodia,et al.  Position Paper on Validation of Network simulation models , 1999 .

[42]  Bengt Jonsson,et al.  A logic for reasoning about time and reliability , 1990, Formal Aspects of Computing.

[43]  Matthias Lott,et al.  SPEET SDL performance evaluation tool , 1997, SDL Forum.

[44]  Mahesh Viswanathan,et al.  Verisim: Formal analysis of network simulations , 2000, ISSTA '00.

[45]  Leah Hoffmann,et al.  In search of dependable design , 2008, CACM.

[46]  Thomas Watteyne,et al.  Formal QoS Validation Approach on a Real-Time MAC Protocol for Wireless Sensor Networks , 2005 .

[47]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[48]  Juan C. Burguillo,et al.  Wireless protocol testing and validation supported by formal methods. A hands-on report , 2005, J. Syst. Softw..

[49]  Ying Wang,et al.  Monte Carlo Simulation of LEACH Protocol for Wireless Sensor Networks , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).

[50]  Massimo Rimondini,et al.  Netkit: easy emulation of complex networks on inexpensive hardware , 2008, TRIDENTCOM.

[51]  Gerard J. Holzmann,et al.  The SPIN Model Checker , 2003 .

[52]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[53]  Klaus Havelund,et al.  Model checking JAVA programs using JAVA PathFinder , 2000, International Journal on Software Tools for Technology Transfer.

[54]  共立出版株式会社 コンピュータ・サイエンス : ACM computing surveys , 1978 .

[55]  Edmund M. Clarke,et al.  Design and Synthesis of Synchronization Skeletons Using Branching-Time Temporal Logic , 1981, Logic of Programs.

[56]  P. S. Thiagarajan,et al.  Message Sequence Charts , 2003, UML for Real.

[57]  Joseph P. Macker,et al.  A low-cost, IP-based mobile network emulator (MNE) , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[58]  Tim Hawkins,et al.  Towards A Game Theoretic Understanding of Ad-Hoc Routing , 2005, GDV@CAV.

[59]  Stephan Merz,et al.  Model Checking , 2000 .

[60]  Doron A. Peled,et al.  Model checking, testing and verification working together , 2005, Formal Aspects of Computing.

[61]  Brigitte Plateau,et al.  Stochastic Automata Network For Modeling Parallel Systems , 1991, IEEE Trans. Software Eng..

[62]  Deborah Estrin,et al.  A system for simulation, emulation, and deployment of heterogeneous sensor networks , 2004, SenSys '04.

[63]  Pieter S. Kritzinger,et al.  Performance Modelling with the Formal Specification Language SDL , 1996, FORTE.

[64]  Massimo Rimondini,et al.  Netkit: easy emulation of complex networks on inexpensive hardware , 2008 .

[65]  Oskar Wibling,et al.  Ad hoc routing protocol validation , 2005 .

[66]  Edmund M. Clarke,et al.  Model Checking , 1999, Handbook of Automated Reasoning.

[67]  Tracy Camp,et al.  MANET simulation studies: the incredibles , 2005, MOCO.

[68]  Hanêne Ben-Abdallah,et al.  Formally specified monitoring of temporal properties , 1999, Proceedings of 11th Euromicro Conference on Real-Time Systems. Euromicro RTS'99.

[69]  Reinhard Gotzhein,et al.  Model-driven Development of a MAC Layer for Ad-hoc Networks with SDL , 2008 .

[70]  Massimo Rimondini,et al.  Emulation of Computer Networks with Netkit , 2007 .

[71]  Anne Mignotte,et al.  SDL and Timed Petri Nets versus UPPAAL for the validation of embedded architecture in automotive , 2004, FDL.

[72]  Marc Pouzet,et al.  ReactiveML: a reactive extension to ML , 2005, PPDP.

[73]  Stephen Pink,et al.  MobiCast: A multicast scheme for wireless networks , 2000, Mob. Networks Appl..

[74]  Dawson R. Engler,et al.  Static Analysis versus Software Model Checking for Bug Finding , 2004, VMCAI.

[75]  Paolo Giaccone,et al.  Capacity scaling in delay tolerant networks with heterogeneous mobile nodes , 2007, MobiHoc '07.

[76]  T. Plagemann,et al.  NEMAN: a network emulator for mobile ad-hoc networks , 2005, Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005..

[77]  J. Michael Spivey,et al.  An introduction to logic programming through Prolog , 1996, Prentice Hall International series in computer science.

[78]  Christian F. Tschudin,et al.  Coping with communication gray zones in IEEE 802.11b based ad hoc networks , 2002, WOWMOM '02.

[79]  Peng Gao,et al.  Formal Verification and Simulation for Performance Analysis for Probabilistic Broadcast Protocols , 2006, ADHOC-NOW.

[80]  Fred Kröger,et al.  Temporal Logic of Programs , 1987, EATCS Monographs on Theoretical Computer Science.

[81]  Srinivasan Keshav,et al.  REAL: A Network Simulator , 1988 .

[82]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[83]  Osman Balci,et al.  Verification, Validation And Accreditation Of Simulation Models , 1997, Winter Simulation Conference Proceedings,.

[84]  Deborah Estrin,et al.  A wireless sensor network For structural monitoring , 2004, SenSys '04.

[85]  Ana Paula Couto da Silva,et al.  An efficient approximate technique for solving fluid models , 2004, PERV.

[86]  Manoj Kumar Tiwari,et al.  A Survey of Simulation in Sensor Networks , 2008, 2008 International Conference on Computational Intelligence for Modelling Control & Automation.

[87]  Qian-Ping Gu,et al.  Formal description and analysis of a distributed location service for mobile ad hoc networks , 2005, Theor. Comput. Sci..

[88]  Wang Yi,et al.  Uppaal in a nutshell , 1997, International Journal on Software Tools for Technology Transfer.

[89]  Shuvendu K. Lahiri,et al.  Unbounded system verification using decision procedure and predicate abstraction , 2004 .

[90]  James L. Peterson,et al.  Petri Nets , 1977, CSUR.

[91]  Biplab Sikdar,et al.  Queueing analysis and delay mitigation in IEEE 802.11 random access MAC based wireless networks , 2004, IEEE INFOCOM 2004.

[92]  Barry W. Boehm,et al.  A spiral model of software development and enhancement , 1986, Computer.

[93]  Leon Sterling,et al.  The Art of Prolog , 1987, IEEE Expert.

[94]  Annabelle McIver,et al.  Graphical Modelling for Simulation and Formal Analysis of Wireless Network Protocols , 2009, Methods, Models and Tools for Fault Tolerance.

[95]  Shuvendu K. Lahiri,et al.  Predicate abstraction with indexed predicates , 2004, TOCL.

[96]  Marta Kwiatkowska,et al.  Probabilistic Model Checking and Power-Aware Computing , 2005 .

[97]  Cindy Eisner,et al.  Formal verification of software source code through semi-automatic modeling , 2005, Software & Systems Modeling.

[98]  Haoyang Che,et al.  Review of "Agile Modeling: Effective Practice for eXtreme Programming and the Unified Process by Scott W. Ambler", John Wiley & Sons, Inc, 2002, 0-471-20282-7 , 2005, ACM SIGSOFT Softw. Eng. Notes.

[99]  E. Kindler Safety and Liveness Properties: A Survey , 2007 .

[100]  Alberto L. Sangiovanni-Vincentelli,et al.  Designing wireless protocols: methodology and applications , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[101]  Carl A. Gunter,et al.  Formal verification of standards for distance vector routing protocols , 2002, JACM.

[102]  Serge Fdida,et al.  ELIP: Embedded Location Information Protocol , 2005, NETWORKING.

[103]  Krishnendu Chatterjee,et al.  Verifying Quantitative Properties Using Bound Functions , 2005, CHARME.

[104]  Leonard Kleinrock,et al.  Theory, Volume 1, Queueing Systems , 1975 .

[105]  S. Wittevrongel,et al.  Queueing Systems , 2019, Introduction to Stochastic Processes and Simulation.

[106]  Bernd Finkbeiner,et al.  An Update on STeP: Deductive-Algorithmic Verification of Reactive Systems , 1998, Tool Support for System Specification, Development and Verification.

[107]  M Matijasevic,et al.  Formal verification of ad-hoc routing protocols using SPIN model checker , 2004 .

[108]  Alan Bundy,et al.  Constructing Induction Rules for Deductive Synthesis Proofs , 2006, CLASE.

[109]  Peter Radford,et al.  Petri Net Theory and the Modeling of Systems , 1982 .

[110]  Jin Suk Kim,et al.  Coverage Ratio in the Wireless Sensor Networks Using Monte Carlo Simulation , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.

[111]  David L. Dill,et al.  Counter-Example Based Predicate Discovery in Predicate Abstraction , 2002, FMCAD.

[112]  E. D. S. E. Silva,et al.  Transient Solutions for Markov Chains , 2000 .

[113]  E. Allen Emerson,et al.  Temporal and Modal Logic , 1991, Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics.

[114]  Timothy J. Robinson,et al.  Sequential Monte Carlo Methods in Practice , 2003 .

[115]  Todd R. Andel,et al.  On the credibility of manet simulations , 2006, Computer.

[116]  Anwar Elwalid,et al.  Fluid models for the analysis and design of statistical multiplexing with loss priorities on multiple classes of bursty traffic , 1992, [Proceedings] IEEE INFOCOM '92: The Conference on Computer Communications.

[117]  Jan J. M. M. Rutten,et al.  Mathematical techniques for analyzing concurrent and probabilistic systems , 2004, CRM monograph series.

[118]  K. Merouane,et al.  A Methodology for Interoperability Testing of a MANET Routing Protocol , 2007, 2007 Third International Conference on Wireless and Mobile Communications (ICWMC'07).

[119]  Reuven Y. Rubinstein,et al.  Simulation and the Monte Carlo method , 1981, Wiley series in probability and mathematical statistics.

[120]  Annabelle McIver,et al.  Quantitative µ-Calculus Analysis of Power Management in Wireless Networks , 2006, ICTAC.

[121]  Ana R. Cavalli,et al.  Network protocol interoperability testing based on contextual signatures and passive testing , 2009, SAC '09.

[122]  Amir Pnueli The Temporal Semantics of Concurrent Programs , 1981, Theor. Comput. Sci..

[123]  Florence Maraninchi,et al.  GLONEMO: global and accurate formal models for the analysis of ad-hoc sensor networks , 2006, InterSense '06.

[124]  Dony Ariyus Sudarmawan RAD (Rapid Application Development) , 2010 .

[125]  W. W. Royce,et al.  Managing the development of large software systems: concepts and techniques , 1987, ICSE '87.

[126]  Luca de Alfaro,et al.  Linear and Branching Metrics for Quantitative Transition Systems , 2004, ICALP.

[127]  David Tse,et al.  Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.