skip to main content
10.1145/2988287.2989148acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Formal Analysis and Verification of the IEEE 802.15.4 DSME Slot Allocation

Published: 13 November 2016 Publication History

Abstract

Providing dependability is still a major issue for wireless mesh networks, which restrains their application in industrial contexts. The widespread CSMA/CA medium access can provide high throughput and low latency, but can not prevent packet loss due to collisions, especially in very large and dense networks. Time slotted medium access techniques together with a distributed slot management, as proposed by the Distributed Synchronous Multi-channel Extension (DSME) of the IEEE 802.15.4 standard, are promising to provide low packet loss, high scalability and bounded end-to-end delays. However, our implementation, openDSME, exposed some weaknesses. While the allocated slots allow for reliable data transmission, the slot management itself is conducted via CSMA/CA and is thus vulnerable to packet loss, eventually leading to an inconsistent slot allocation.
This paper uses the UPPAAL framework for formal analysis and verification of the slot management process. The analysis identifies weaknesses of the slot allocation process under communication and node failures. However, it is shown that inconsistencies are eventually resolved and improvements to the procedure are proposed that reduce the negative impact of failed slot allocation procedures significantly.

References

[1]
IEC 62591:2010 - Industrial communication networks - Wireless communication network and communication profiles - WirelessHART#8482;, 2010.
[2]
IEEE 802.15.4e#8482;-2012 -IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 1: MAC sublayer, 2012.
[3]
IEEE 802.15.4#8482;-2015 - IEEE Standard for Local and metropolitan area networks--Part 15.4: Low-Rate Wireless Personal Area Networks (WPANs), 2016.
[4]
N. Accettura, M. R. Palattella, G. Boggia, L. A. Grieco, and M. Dohler. Decentralized Traffic Aware Scheduling for Multi-hop Low Power Lossy Networks in the Internet of Things. In International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2013.
[5]
M. Al-Mahfoudh, G. Gopalakrishnan, and R. Stutsman. Toward Rigorous Design of Domain-Specific Distributed Systems. In FME Workshop on Formal Methods in Software Engineering (FormaliSE), 2016.
[6]
F. J. R. Barboza, A. M. S. Andrade, F. A. Silva, and G. Lima. Specification and Verification of the IEEE 802.11 Medium Access Control and an Analysis of its Applicability to Real-Time Systems. Electronic Notes in Theoretical Computer Science, 195, Jan. 2006.
[7]
R. Boucebsi, F. Belala, and L. Derdouri. Modeling Channel Allocation via BRS: Case of WMNs. In International Conference on Advanced Aspects of Software Engineering (ICAASE), 2014.
[8]
E. Bres, R. v. Glabbeek, and P. Höfner. A Timed Process Algebra for Wireless Networks with an Application in Routing. In Programming Languages and Systems, number 9632 in Lecture Notes in Computer Science. Springer, Apr. 2016.
[9]
J. Colpo and D. Mols. No strings attached. Hydrocarbon Engineering, 16, Nov. 2011.
[10]
D. De Guglielmo, S. Brienza, and G. Anastasi. IEEE 802.15.4e: A Survey. Computer Communications, 2016. 10.1016/j.comcom.2016.05.004.
[11]
G. Delzanno, A. Sangnier, and G. Zavattaro. Verification of Ad Hoc Networks with Node and Communication Failures. In Formal Techniques for Distributed Systems. Springer, 2012.
[12]
S. Duquennoy, B. Al Nahas, O. Landsiedel, and T. Watteyne. Orchestra: Robust Mesh Networks Through Autonomously Scheduled TSCH. In 13th ACM Conference on Embedded Networked Sensor Systems (SenSys), 2015.
[13]
S. Feo-Arenis, B. Westphal, D. Dietsch, M. Muñiz, and A. S. Andisha. The Wireless Fire Alarm System: Ensuring Conformance to Industrial Standards through Formal Verification. In FM 2014: Formal Methods, number 8442 in Lecture Notes in Computer Science. Springer, May 2014.
[14]
M. Fruth. Formal Methods for the Analysis of Wireless Network Protocols. Ph. D. Thesis, University of Oxford, 2011.
[15]
P. J. Gmytrasiewicz and E. H. Durfee. Decision-theoretic Recursive Modeling and the Coordinated Attack Problem. In International Conference on Artificial Intelligence Planning Systems, 1992.
[16]
J. Y. Halpern and Y. Moses. Knowledge and Common Knowledge in a Distributed Environment. Journal of the ACM, 37(3), July 1990.
[17]
L. Lamport. Specifying Concurrent Systems with TLA
[18]
[19]
K. G. Larsen, P. Pettersson, and W. Yi. Uppaal in a Nutshell. Int. Journal on Software Tools for Technology Transfer, 1(1--2), Oct. 1997.
[20]
Y.-S. Lee and S.-H. Chung. An Efficient Distributed Scheduling Algorithm for Mobility Support in IEEE 802.15.4e DSME-Based Industrial Wireless Sensor Networks. International Journal of Distributed Sensor Networks, Feb. 2016.
[21]
C. McCaffrey. The Verification of a Distributed System. Communications of the ACM, 59(2), Jan. 2016.
[22]
F. Meier and V. Turau. An Analytical Model for Fast and Verifiable Assessment of Large Scale Wireless Mesh Networks. In 11th International Conference on the Design of Reliable Communication Networks (DRCN), Mar. 2015.
[23]
C. Newcombe, T. Rath, F. Zhang, B. Munteanu, M. Brooker, and M. Deardeuff. How Amazon Web Services Uses Formal Methods. Communications of the ACM, 58(4), Apr. 2015.
[24]
M. Paavola and K. Leivisk. Wireless Sensor Networks in Industrial Automation. In Factory Automation. InTech, Mar. 2010.
[25]
P. Panangaden and K. Taylor. Concurrent Common Knowledge: Defining Agreement for Asynchronous Systems. Distributed Computing, 6(2), 1992.
[26]
S. Petersen and S. Carlsen. Performance Evaluation of WirelessHART for Factory Automation. In Conference on Emerging Technologies Factory Automation (ETFA). IEEE, Sept. 2009.
[27]
I. Saha, S. Roy, and S. Ramesh. Formal Verification of Fault-Tolerant Startup Algorithms for Time-Triggered Architectures: A Survey. Proceedings of the IEEE, 104(5), May 2016.
[28]
T. Watteyne, M. R. Palattella, and L. A. Grieco. Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem Statement. RFC 7554, May 2015.
[29]
J. R. Wilcox, D. Woos, P. Panchekha, Z. Tatlock, X. Wang, M. D. Ernst, and T. Anderson. Verdi: A Framework for Implementing and Formally Verifying Distributed Systems. In 36th SIGPLAN Conference on Programming Language Design and Implementation. ACM, 2015.
[30]
B. Yousefi, F. Ghassemi, and R. Khosravi. Modeling and Efficient Verification of Wireless Ad hoc Networks. arXiv:1604.07179 {cs}, Apr. 2016.

Cited By

View all
  • (2023)A Comprehensive Performance Comparison of IEEE 802.15.4 DSME and TSCH in a Realistic IoT Scenario for Industrial ApplicationsACM Transactions on Internet of Things10.1145/35951884:3(1-30)Online publication date: 19-Jun-2023
  • (2022)A Beacon and GTS Scheduling Scheme for IEEE 802.15.4 DSME NetworksIEEE Internet of Things Journal10.1109/JIOT.2021.31108669:7(5162-5172)Online publication date: 1-Apr-2022
  • (2022)A Virtual Sink-based Strategy for Reducing the Funneling Effect in IEEE 802.15.4 DSME Networks2022 18th International Conference on Distributed Computing in Sensor Systems (DCOSS)10.1109/DCOSS54816.2022.00015(21-24)Online publication date: May-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWiM '16: Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
November 2016
370 pages
ISBN:9781450345026
DOI:10.1145/2988287
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 November 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. formal verification
  2. wireless mesh networks

Qualifiers

  • Research-article

Funding Sources

Conference

MSWiM '16
Sponsor:

Acceptance Rates

MSWiM '16 Paper Acceptance Rate 36 of 138 submissions, 26%;
Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)2
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A Comprehensive Performance Comparison of IEEE 802.15.4 DSME and TSCH in a Realistic IoT Scenario for Industrial ApplicationsACM Transactions on Internet of Things10.1145/35951884:3(1-30)Online publication date: 19-Jun-2023
  • (2022)A Beacon and GTS Scheduling Scheme for IEEE 802.15.4 DSME NetworksIEEE Internet of Things Journal10.1109/JIOT.2021.31108669:7(5162-5172)Online publication date: 1-Apr-2022
  • (2022)A Virtual Sink-based Strategy for Reducing the Funneling Effect in IEEE 802.15.4 DSME Networks2022 18th International Conference on Distributed Computing in Sensor Systems (DCOSS)10.1109/DCOSS54816.2022.00015(21-24)Online publication date: May-2022
  • (2021) Modeling and analysis of priority and range‐based‐ deterministic and synchronous multichannel extension ‐ guaranteed time slot allocation in IEEE 802.15.4e medium access control protocol Transactions on Emerging Telecommunications Technologies10.1002/ett.4323Online publication date: 10-Jun-2021
  • (2019)Performance Analysis of the Slot Allocation Handshake in IEEE 802.15.4 DSMEAd-Hoc, Mobile, and Wireless Networks10.1007/978-3-030-31831-4_8(102-117)Online publication date: 25-Sep-2019
  • (2019)openDSME: Reliable Time-Slotted Multi-Hop Communication for IEEE 802.15.4Recent Advances in Network Simulation10.1007/978-3-030-12842-5_15(451-467)Online publication date: 21-May-2019
  • (2017)Modelling and Verification of a Cluster-tree Formation Protocol Implementation for the IEEE 802.15.4 TSCH MAC Operation ModeElectronic Proceedings in Theoretical Computer Science10.4204/EPTCS.244.5244(117-128)Online publication date: 15-Mar-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media