2008 Seventh IEEE International Symposium on Network Computing and Applications 2008
DOI: 10.1109/nca.2008.24
|View full text |Cite
|
Sign up to set email alerts
|

On the Application of Formal Methods for Specifying and Verifying Distributed Protocols

Abstract: In this paper we consider the frameworks of Process Algebra and I/O Automata and we apply both towards the verification of a distributed leader-election protocol. Based on the two experiences we evaluate the approaches and draw initial conclusions with respect to their relative capabilities, strengths and usability. To the best of our knowledge, this is the first hands-on evaluation of the two models, and we view it as the cornerstone for a wider investigation of the strengths and weaknesses of the two methodo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…1. In addition, a number of formal methods approaches to MANET analysis also consider the stationary (mobility) model, in which the nodes do not move at all (see, e.g., [8,13,31,28]). Note that the random direction model can be regarded as a special case of the random waypoint model (where the set of possible next destinations are restricted to points on the area boundary).…”
Section: Models Of Node Mobilitymentioning
confidence: 99%
See 1 more Smart Citation
“…1. In addition, a number of formal methods approaches to MANET analysis also consider the stationary (mobility) model, in which the nodes do not move at all (see, e.g., [8,13,31,28]). Note that the random direction model can be regarded as a special case of the random waypoint model (where the set of possible next destinations are restricted to points on the area boundary).…”
Section: Models Of Node Mobilitymentioning
confidence: 99%
“…Although many papers (e.g., [47,13,43,16,42,21,44,45,28,14]) have studied LE, it seems that very little is known by way of formal analysis about how it behaves with unidirectional connections and under realistic mobility scenarios. We analyze LE under four different settings:…”
Section: Formal Analysis Of Lementioning
confidence: 99%
“…We consider both static and dynamic topologies, and also analyze a system with two connected components that repeatedly merge and partition because of node movement. Although many papers (e.g., [32,7,27,9,26,12,28,29,16,8]) have studied LE, little is known by way of formal analysis about how it behaves with unidirectional connections or under realistic mobility scenarios. We are also not aware of any study taking into account the joint effects of communication delay and mobility.…”
Section: Formal Analysis Of the Le Protocolmentioning
confidence: 99%
“…Gelastou et al [7] specify and verify LE using both I/O automata and process algebra. They only consider static bidirectional topologies with non-lossy channels, and communication delay is not taken into consideration.…”
Section: Related Work and Conclusionmentioning
confidence: 99%
“…The work in [31] presents a semantic-based comparison of the two frameworks; the work in [32] evaluates and compares the applicability and usability of a value-passing version of CCS with I/O automata on specifying and verifying distributed algorithms. Cleaveland et al have developed a series of tools based on the CCS process algebra.…”
Section: Related Workmentioning
confidence: 99%