Formal Verification of Real-Time Wireless Sensor Networks

Formal Verification of Real-Time
Wireless Sensor Networks Protocols
with Realistic Radio Links
Alexandre Mouradian
Isabelle Augé-Blum
RTNS 2013 ---- 18/10/2013
Alexandre Mouradian - RTNS 13 - 18/10/2013
1 / 12
Wireless Sensor Networks
Small battery-powered electronic devices
Adhoc multi-hops large scale networks
Unreliable links
Alexandre Mouradian - RTNS 13 - 18/10/2013
2 / 12
Anomaly detection
Critical applications:
Forest fire detection
Landslide detection
...
sink
Required:
Timeliness
"Does the alarm reach the sink before the deadline?"
There is a need for
Formal verification
Alexandre Mouradian - RTNS 13 - 18/10/2013
3 / 12
WSN verification in the
literature
Model Checking:
[1] Tschirner, S., Xuedong, L., and Yi, W. (2008). Model-based validation of qos properties
of biomedical sensor networks. ACM EMSOFT, pages 69–78, Atlanta, USA.
[2] Watteyne, T., Augé-Blum, I., and Ubéda, S. (2006). Dual-mode real-time mac protocol
for wireless sensor networks : a validation/simulation approach. InterSense, page 2, Nice, France.
[3] Fehnker, A., Van Hoesel, L., and Mader, A. (2007). Modelling and verification of the lmac
protocol for wireless sensor networks. IFM, pages 253–272, Oxford, UK.
.
Senor Network Calculus
[4] Schmitt, J. B., Zdarsky, F. a., and Thiele, L. (2007). A Comprehensive Worst-Case Calculus for
Wireless Sensor Networks with In-Network Processing. IEEE RTSS, Tucson, USA.
.
Probabilistic Model Checking:
[4] Fruth, M. (2011). Formal Methods for the Analysis of Wireless Network Protocols. PhD thesis, Oxford University.
Alexandre Mouradian - RTNS 13 - 18/10/2013
4 / 12
WSN verification in the
literature
Model Checking:
[1] Tschirner, S., Xuedong, L., and Yi, W. (2008). Model-based validation of qos properties
of biomedical sensor networks. ACM EMSOFT, pages 69–78, Atlanta, USA.
[2] Watteyne, T., Augé-Blum, I., and Ubéda, S. (2006). Dual-mode real-time mac protocol
for wireless sensor networks : a validation/simulation approach. InterSense, page 2, Nice, France.
[3] Fehnker, A., Van Hoesel, L., and Mader, A. (2007). Modelling and verification of the lmac
protocol for wireless sensor networks. IFM, pages 253–272, Oxford, UK.
.
Senor Network Calculus
[4] Schmitt, J. B., Zdarsky, F. a., and Thiele, L. (2007). A Comprehensive Worst-Case Calculus for
Wireless Sensor Networks with In-Network Processing. IEEE RTSS, Tucson, USA.
.
Probabilistic Model Checking:
[4] Fruth, M. (2011). Formal Methods for the Analysis of Wireless Network Protocols. PhD thesis, Oxford University.
Alexandre Mouradian - RTNS 13 - 18/10/2013
4 / 12
Analysis of the problem(1):
Radio link
E
R
Alexandre Mouradian - RTNS 13 - 18/10/2013
5 / 12
Analysis of the problem(1):
Radio link
E
R
Alexandre Mouradian - RTNS 13 - 18/10/2013
5 / 12
Analysis of the problem(1):
Radio link
E
R
Alexandre Mouradian - RTNS 13 - 18/10/2013
5 / 12
Analysis of the problem(1):
Radio link
E
R
Alexandre Mouradian - RTNS 13 - 18/10/2013
5 / 12
Analysis of the problem(1):
Radio link
E
R
Alexandre Mouradian - RTNS 13 - 18/10/2013
5 / 12
Analysis of the problem(1):
Radio link
E
R
Alexandre Mouradian - RTNS 13 - 18/10/2013
5 / 12
Analysis of the problem(1):
Radio link
E
R
Alexandre Mouradian - RTNS 13 - 18/10/2013
5 / 12
Analysis of the problem(1):
Radio link
E
R
Alexandre Mouradian - RTNS 13 - 18/10/2013
5 / 12
Analysis of the problem(1):
Radio link
E
R
Alexandre Mouradian - RTNS 13 - 18/10/2013
Modulation
5 / 12
Analysis of the problem(1):
Radio link
E
R
Alexandre Mouradian - RTNS 13 - 18/10/2013
Modulation
Signal
attenuation
5 / 12
Analysis of the problem(2):
Topology dynamics
sink
Alexandre Mouradian - RTNS 13 - 18/10/2013
6 / 12
Analysis of the problem(2):
Topology dynamics
sink
'
Alexandre Mouradian - RTNS 13 - 18/10/2013
6 / 12
Analysis of the problem(2):
Topology dynamics
sink
'
Alexandre Mouradian - RTNS 13 - 18/10/2013
6 / 12
Analysis of the problem(2):
Topology dynamics
sink
'
"With wich topologies the protocol can
provide real-time communications ? "
Reliability
Alexandre Mouradian - RTNS 13 - 18/10/2013
6 / 12
Verification algorithm
Output: probability that the real-time property holds
Generate logical topologies: T
Select topologies: T'
verify topology in T'
Does the
Property
hold ?
yes
PPv=PPv+Ptopo
no
yes
Not verified
topology in T' ?
no
Output: PPv
Alexandre Mouradian - RTNS 13 - 18/10/2013
7 / 12
Verification algorithm
Output: probability that the real-time property holds
Generate logical topologies: T
There are 2N topologies !!!
Select topologies: T'
verify topology in T'
Does the
Property
hold ?
yes
PPv=PPv+Ptopo
no
yes
Not verified
topology in T' ?
no
Output: PPv
Alexandre Mouradian - RTNS 13 - 18/10/2013
7 / 12
Verification algorithm
Output: probability that the real-time property holds
Generate logical topologies: T
There are 2N topologies !!!
Depends on the property to be verified
Select topologies: T'
verify topology in T'
Does the
Property
hold ?
yes
PPv=PPv+Ptopo
no
yes
Not verified
topology in T' ?
no
Output: PPv
Alexandre Mouradian - RTNS 13 - 18/10/2013
7 / 12
Verification algorithm
Output: probability that the real-time property holds
Generate logical topologies: T
There are 2N topologies !!!
Depends on the property to be verified
Select topologies: T'
Check that real-time deadline
is met or not on a model of
the network (protocol and topology)
verify topology in T'
Does the
Property
hold ?
yes
PPv=PPv+Ptopo
no
yes
Not verified
topology in T' ?
no
Output: PPv
Alexandre Mouradian - RTNS 13 - 18/10/2013
7 / 12
Case study
f-MAC protocol
Topology
Property
Alexandre Mouradian - RTNS 13 - 18/10/2013
8 / 12
Case study
framelet
f-MAC protocol
data
data
data
data
Topology
Property
Alexandre Mouradian - RTNS 13 - 18/10/2013
8 / 12
Case study
f-MAC protocol
n1
n2
X
X
t'
t1
t2
t'
Topology
Property
Alexandre Mouradian - RTNS 13 - 18/10/2013
8 / 12
Case study
f-MAC protocol
Topology
Topology A
Property
Alexandre Mouradian - RTNS 13 - 18/10/2013
Topology B
8 / 12
Case study
f-MAC protocol
Topology
Property
"All nodes successfuly send a packet to
the sink (node 0) before the deadline"
Alexandre Mouradian - RTNS 13 - 18/10/2013
8 / 12
Network model
1
0
1
1
1
0
0 1 1 1 0
1 0 1 1 1 0
1 0 1 0 1
0 1 11 0 00 1 11 1 01 1 11 0 0
0 1 1 0 0
1 0 00 1111 0010 1101 0100 11 1
1 1 1 0 1
1 1 11 0010 1111 1001 0110 00 0
0 0 0 1 1
1 1 01 1101 1001 1111 0110 10 1
1 0 1 1 1
0 1 11 0100 0110 0110 1111 10 1
0 11 00 10 10 11
0 1 0 1 1 1
0 1 0 1 1
0
1
0
1
1
1
A[] z>deadline imply rcvd==Nn
Alexandre Mouradian - RTNS 13 - 18/10/2013
9 / 12
Verification results
N umber of
nodes
3
4
5
6
N umber of
topologies
8
64
1024
1073741824
N umber of
verified topologies
2
8
64
1024
Alexandre Mouradian - RTNS 13 - 18/10/2013
D uration (s)
A
B
0.30
0.21
0.32
0.33
15.11
15.22
69066.86 69173.25
P pv
A
0.931
0.918
0.875
0.771
B
0.746
0.368
0.323
0.268
10/ 12
Comparison with simulations
Alexandre Mouradian - RTNS 13 - 18/10/2013
11/ 12
Conclusions and future works
Conclusions on the proposed method:
Estimation of topologies probabilities
Timed verification on the topologies
Verification tool independant
Tested with a case study
Alexandre Mouradian - RTNS 13 - 18/10/2013
12/ 12
Conclusions and future works
Conclusions on the proposed method:
Estimation of topologies probabilities
Timed verification on the topologies
Verification tool independant
Tested with a case study
Future works:
Application to a more realistic protocol
Consider asymetric links
Scalability problem ...
Alexandre Mouradian - RTNS 13 - 18/10/2013
12/ 12