Abstract
Regarding increasing popularity of Ad hoc networks, the routing protocols employed in these networks should be validated before deployment. Formal methods are used nowadays to find defects in protocols specification. In this paper, we explain different methods of formal modeling and verification of routing protocols of ad hoc networks. We derive the key concepts that are vital in modeling ad hoc network protocols and then modify process algebra, appropriate for verifying protocols at network layer. This process algebra implements mobility behaviors of underlying infrastructure implicitly in the semantics of broadcasting. The semantics of broadcast communication also abstracts away the services provided by MAC layer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
List of ad-hoc routing protocols (last visited 27, October 2007), http://en.wikipedia.org/wiki/List_of_ad-hoc_routing_protocols
Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall International, Englewood Cliffs (1985)
Milner, R.: Communication and Concurrency. Prentice-Hall International, New York (1985)
Bergstra, J.A., Klop, J.W.: Algebra of Communicating Processes with Abstraction. Theor. Comput. Sci. 37, 21–77 (1985)
Gruska, D.P., Maggiolo-Schettini, A.: Process Algebras for Network Communication. Fundamenta Informaticae 45(4), 359–378 (2001)
Prasad, K.V.S.: A Calculus of Broadcasting Systems. Journal of Science of Computer Programming 25(2-3), 285–327 (1995)
de Renesse, R., Aghvani, A.H.: Formal verification of Ad-Hoc Routing Protocols using SPIN Model Checker. In: Proceedings MELECON 2004, Dubrovnik. IEEE Press, Los Alamitos (2004)
Wibling, O., Parrow, J., Pears, A.: Automatized Verification of Ad Hoc Routing Protocols. In: de Frutos-Escrig, D., Núñez, M. (eds.) FORTE 2004. LNCS, vol. 3235. Springer, Heidelberg (2004)
Khengar, P., Aghvami, A.H.: Wrap- a new hybrid routing protocol for mobile ad hoc networks. IEEE Journal on Selected Area in Communications (2004)
Tschudin, C., Gold, R., Rensfelt, O., Wibling, O.: LUNAR:a lightweight underlay network ad-hoc routing protocol and implementation. In: Proc. Next Generation Teletraffic and Wired/Wireless Advanced Networking (NEW2AN) (2004)
Wibling, O., Parrow, J., Pears, A.: Ad Hoc Routing Protocol Verification Through Broadcast Abstraction. In: Wang, F. (ed.) FORTE 2005. LNCS, vol. 3731, pp. 128–142. Springer, Heidelberg (2005)
Godskesen, J.C., Gryn, O.: Modeling and Verification of Security Protocols for Ad Hoc Networks Using UPPAAl. In: Proceeding of the 18th Nordic Workshop on Programming Theory (NWPT 2006), Iceland, October 18-20 (2006)
McIver, A.K., Fehnker, A.: Formal Techniques for Analysis of Wireless Network. In: Margaria, T., Philippou, A., Steffen, B. (eds.) Proc. 2nd Int. Symp. ISOLA (2006)
Holzmann, G.: The SPIN Model Checker, Primer and Reference Manual. Addison-Wesley, Reading (2003)
Larsen, K.G., Pettersson, P., Yi, W.: Uppaal in a Nutshell. Int. Journal on Software Tools for Technology Transfer 1, 134–152 (1997)
Razafindarlambo, T., Valois, F.: Performance Evaluation of Backoff algorithms in 802.11 AdHoc Networks. In: Mobile Computing and Networking, pp. 48–57 (2002)
McIver, A.K., Cohen, E., Morgan, C.C.: Using Probabilistic Kleene Algebra for Protocol Verification. In: Schmidt, R.A. (ed.) RelMiCS/AKA 2006. LNCS, vol. 4136, pp. 296–310. Springer, Heidelberg (2006)
Patsouris, P.A.: Algebraic modeling of an ad Hoc network for mobile computing. Journal of Parallel Distribution and Computing 61(7), 884–897 (2001)
Chiyangwa, S., Kwiatkowska, M.: A Timing Analysis of AODV. In: Steffen, M., Zavattaro, G. (eds.) FMOODS 2005. LNCS, vol. 3535, pp. 306–321. Springer, Heidelberg (2005)
Bhargavan, K., Obradovid, D., Gunter, C.A.: Formal Verification of Standards for Distance Vector Routing Protocols. Journal of the ACM 49(4), 538–576 (2002)
Niamanesh, M., Jalili, R.: Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata. In: Arbab, F., Sirjani, M. (eds.) FSEN 2007. LNCS, vol. 4767, pp. 49–64. Springer, Heidelberg (2007)
Sewell, P., Wojciechowski, P., Pierce, B.: Location Independence for Mobile Agents. In: ICCL-WS 1998. LNCS, vol. 1686. Springer, Heidelberg (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ghassemi, F., Movaghar, A. (2008). Modeling Routing Protocols in Adhoc Networks. In: Sarbazi-Azad, H., Parhami, B., Miremadi, SG., Hessabi, S. (eds) Advances in Computer Science and Engineering. CSICC 2008. Communications in Computer and Information Science, vol 6. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89985-3_52
Download citation
DOI: https://doi.org/10.1007/978-3-540-89985-3_52
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89984-6
Online ISBN: 978-3-540-89985-3
eBook Packages: Computer ScienceComputer Science (R0)