IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference 2007
DOI: 10.1109/glocom.2007.137
|View full text |Cite
|
Sign up to set email alerts
|

Methodology for Formal Verification of Routing Protocols for Ad Hoc Wireless Networks

Abstract: This paper describes a technique to apply formal methods to verify protocols for mobile ad hoc networks. In contrast to other related proposals, our solution does not attempt to model any particular network configuration. Instead, our solution focuses on the possible implications caused by network configurations to the behavior of a routing protocol for MANETs. Following this strategy we were able to find design errors in some well established protocols. The proposed technique uses formal verification, more sp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
1

Year Published

2009
2009
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 8 publications
0
11
0
1
Order By: Relevance
“…Fig. 6 shows the embedded C code (lines [1][2][3][4][5][6][7][8][9][10][11][12][13][14] and an assertion (line 15) for detecting the existence of a loop. This code is executed by every process (i.e., node).…”
Section: Loop Detectionmentioning
confidence: 99%
“…Fig. 6 shows the embedded C code (lines [1][2][3][4][5][6][7][8][9][10][11][12][13][14] and an assertion (line 15) for detecting the existence of a loop. This code is executed by every process (i.e., node).…”
Section: Loop Detectionmentioning
confidence: 99%
“…Formal verification is the process verifying that algorithms work correctly with respect to some formal property [33]. Formally modeling systems helps to analyze the interconnection of components and processes and how the information is processed in the system [34].…”
Section: Formal Modeling and Verification Of The Matfmentioning
confidence: 99%
“…A number of different protocols have been verified using formal modeling. Camara et al [18] applied formal methods using SPIN to verify the design bugs in protocols for MANET networks such as LAR, DREAM and OLSR. Fehnker et al [19] and Henderson et al [20] used UPPAAL to identify flaws in the WSN protocols.…”
Section: Related Workmentioning
confidence: 99%