2016
DOI: 10.1007/978-3-319-49806-5_23
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification of a Cross-Layer, Trustful Space-Time Protocol for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…To draw more conclusions about the efficiency of the method, more results from other application domains shall be provided. Silva et al [76] proposed formal verification methods for cross-layer protocols used in IoT systems. However, the method is primarily designed for WSN systems, and the study does not discuss possible applicability to other IoT domains.…”
Section: Principal Testing Techniques Have Been Previously Studiedmentioning
confidence: 99%
See 1 more Smart Citation
“…To draw more conclusions about the efficiency of the method, more results from other application domains shall be provided. Silva et al [76] proposed formal verification methods for cross-layer protocols used in IoT systems. However, the method is primarily designed for WSN systems, and the study does not discuss possible applicability to other IoT domains.…”
Section: Principal Testing Techniques Have Been Previously Studiedmentioning
confidence: 99%
“…The methods are varying here. For instance, statistical verification [75], formal verification [76], conformance testing [77], or randomness testing [78].…”
Section: Principal Testing Techniques Have Been Previously Studied (Rq4)mentioning
confidence: 99%
“…In [28,29], the authors showed that most of the popular formal approaches are based on theoretical models such as finite state machine, timed automata and process algebra. Finite state machine approaches have been pointed out for the difficulty in dealing with hierarchical models.…”
Section: Related Workmentioning
confidence: 99%
“…As a standalone area, the IoT protocol testing can be identified. Variety of the methods is used here, for instance, conformance testing [32], randomness testing [33], statistical verification [34], or formal verification [35]. Previous work related to IoT usability testing can be also identified, for instance, an IoT-specific usability testing framework [36].…”
Section: Iot Testbeds 38mentioning
confidence: 99%