Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Novel abstraction methods for TDMA based MAC protocols: Case of IIoT MAC Wireless HART Verification

Published: 14 November 2023 Publication History

Abstract

All Internet of Things application layer protocols are built on top of the Medium Access Control layer (MAC layer). The MAC Layer’s primary goal is to limit or eliminate packet collisions. The technique of checking a protocol’s behavior that is represented by formal models is known as formal verification. Model checkers are used by protocol developers to automate the formal verification process because the human procedure of formal verification requires a great deal of mathematical concepts. This method uses model specification language to create formal models for the formal verification of protocols. The formal models’ temporal claims are used to specify the properties that need to be proved. If the property provided using temporal claims is not satisfied, the model checker uses these formal model and temporal claims and outputs a violating trace. There are only a few works that support the formal verification of MAC protocols. It’s because their behavior is difficult to abstract using model specification language. This paper suggests new abstraction methods in the form of algorithms for designing and modeling Time Division Multiple Access (TDMA) based scheduled MAC protocol using model specification language. Modeling links, superframes, multiple superframes, device schedules, and TDMA protocol abstraction are among the methods proposed. In order to support the applicability of the proposed methods, a TDMA-based formal model that meets the Wireless Highway Addressable Remote Transducer protocol specification requirements was created using PROMELA, a model specification language for SPIN model checker. In normal and constrained channel environments, the reachability of various marked states added into the model using temporal claims is verified. The verification result shows that the protocol performs as expected in a non-lossy channel environment. However, the protocol exhibits reliability issues due to message loss in a constrained channel environment. Finally, the model is checked for errors in design and message collisions. The results of the verification show that the model is free of design flaws and message collisions. The abstraction schemes proposed in this work help to quickly develop formal models for the verification of TDMA-based scheduled MAC protocols using model-checking tools.

References

[1]
Punnoose, R. J., Armstrong, R. C., Wong, M. H., & Jackson, M. (2014). Survey of existing tools for formal verification. Sandia National Lab.(SNL-CA), Livermore
[2]
Câmara, D. (2009). Formal verification of communication protocols for wireless networks. Universidade Federal de Minas Gerais.
[3]
Oliveira L, Rodrigues JJPC, Kozlov SA, Rabêlo RAL, and Albuquerque VHC MAC layer protocols for Internet of Things: A survey Future Internet 2019 11 1 16
[4]
Karn, P. (1990). MACA-a new channel access method for packet radio. In ARRL/CRRL Amateur radio 9th computer networking conference, vol. 140. pp. 134–140.
[5]
Bharghavan V, Demers A, Shenker S, and Zhang L MACAW: A media access protocol for wireless LAN’s ACM SIGCOMM Computer Communication Review 1994 24 4 212-225
[6]
Talucci, F. & Gerla, M. (1997). MACA-BI (MACA by invitation). A wireless MAC protocol for high speed ad hoc networking. In IEEE Proceedings of ICUPC 97-6th international conference on universal personal communications (vol. 2, pp. 913–917)
[7]
Cuzdan, H. (2002). Wireless multiple access control protocols. IEEE Internet Computing, IEEE.
[8]
Ye, W., Heidemann, J. & Estrin, D. (2002). An energy-efficient MAC protocol for wireless sensor networks. In Proceedings. Twenty-first annual joint conference of the IEEE computer and communications societies, IEEE,3, 1567–1576.
[9]
Georgiadis, L. (2003). Carrier-sense multiple access (CSMA) protocols. In Encyclopedia of telecommunications.
[10]
Ye, W. & Heidemann, J. (2004). Medium access control in wireless sensor networks. Wireless Sensor Networks, pp. 73–91.
[11]
Ballarini, P. & Miller, A. (2006). Model checking medium access control for sensor networks. In Second international symposium on leveraging applications of formal methods, verification and validation (isola 2006) (pp. 255–262). IEEE
[12]
Kredo K II and Mohapatra P Medium access control in wireless sensor networks Computer Networks 2007 51 4 961-994
[13]
Yadav R, Varma S, and Malaviya N A survey of MAC protocols for wireless sensor networks UbiCC Journal 2009 4 3 827-833
[14]
Valkonen, J., Björkman, K., Frits, J., Niemelä, I. (2010). Model checking methodology for verification of safety logics. In 6th international conference on safety of industrial automation systems SIAS 2010, Finnish Society of Automation.
[15]
Saifullah, A., Xu, Y., Lu, C., & Chen, Y. (2010). Real-time scheduling for WirelessHART networks. In 2010 31st IEEE Real-Time Systems Symposium (pp. 150–159). IEEE
[16]
Kaur S and Mahajan L Power saving MAC protocols for WSNs and optimization of S-MAC protocol International Journal of Radio Frequency Identification & Wireless Sensor Networks 2011 1 1 1-8
[17]
Han, S., Zhu, X., Mok, A. K., Chen, D., & Nixon, M. (2011). Reliable and real-time communication in industrial wireless mesh networks. In 2011 17th IEEE real-time and embedded technology and applications symposium (pp 3–12). IEEE.
[18]
Dang K, Shen J-Z, Dong L-D, and Xia Y-X A graph route-based superframe scheduling scheme in Wireless HART mesh networks for high robustness Wireless Personal Communications 2013 71 4 2431-2444
[19]
Zhang, S., Zhang, G., Yan, A., Xiang, Z., & Ma, T. (2013). A highly reliable link scheduling strategy for wireless HART networks. In 2013 international conference on advanced technologies for communications (ATC 2013) (pp 39–4). IEEE
[20]
Doudou M, Djenouri D, Badache N, and Bouabdallah A Synchronous contention-based MAC protocols for delay-sensitive wireless sensor networks: A review and taxonomy Journal of Network and Computer Applications 2014 38 1 172-184
[21]
Ramya R, Saravanakumar G, and Ravi S MAC protocols for wireless sensor networks Indian Journal of Science and technology, Indian Society for Education and Environment 2015 8 34 1
[22]
Coskun V, Ozdenizci B, and Ok K The survey on near field communication Sensors, Multidisciplinary Digital Publishing Institute 2015 15 6 13348-13405
[23]
Ihsan, A., Saghar, K., & Fatima, T. (2015). Analysis of LEACH protocol (s) using formal verification. In 2015 12th International Bhurban conference on applied sciences and technology (IBCAST) (pp. 254–262). IEEE
[24]
Carlos-Mancilla M, López-Mellado E, and Siller M Wireless sensor networks formation: Approaches and techniques Journal of Sensors 2016 2016 561-578
[25]
Aziz B A formal model and analysis of an IoT protocol Ad Hoc Networks 2016
[26]
Udoh, E., & Getov, V. (2018). Proactive energy-efficiency: Evaluation of duty-cycled MAC protocols in wireless sensor networks. In 2018 International conference on computer, information and telecommunication systems (CITS) (pp. 1–5). IEEE
[27]
Kochhar A, Kaur P, Sharma S, and Singh P Protocols for wireless sensor networks: A survey Journal of Telecommunications and Information Technology 2018
[28]
Hähnle, R., & Huisman, M. (2019). Deductive software verification: From pen-and-paper proofs to industrial tools (pp. 345–373). Computing and Software Science, Springer.
[29]
Elemam E, Bahaa-Eldin AM, Shaker NH, and Sobh M Formal verification for a PMQTT protocol Egyptian Informatics Journal 2020 21 3 169-182
[30]
Chousidis C, Pisca I, and Huang Z A modified IEEE 802.11 MAC for optimizing broadcasting in wireless audio networks Journal of Network and Systems Management 2020 28 58-80
[31]
Aziz B Modeling and analyzing an industry 4.0 communication protocol IEEE Internet of Things Journal 2020 7 10 10120-10127
[32]
Ben Hafaiedh I, Ben Hamouda R, and Robbana R A model-based approach for formal verification and performance analysis of dynamic load-balancing protocols in cloud environment Cluster Computing 2021 24 4 2977-2994
[33]
Xiao M, Zhao H, Yang K, Ouyang R, and Song W A formal analysis method for composition protocol based on model checking Scientific Reports 2022 12 1 1-18
[34]
Hafaiedh IB and Slimane MB A distributed formal-based model for self-healing behaviors in autonomous systems: From failure detection to self-recovery The Journal of Supercomputing 2022 78 17 18725-18753
[35]
Aziz B Detecting data anomalies from their formal specifications: A case study in IoT systems Electronics 2023 12 3 630
[36]
Suresh Kumar N and Santhosh Kumar G Abstracting IoT protocols using timed process algebra and SPIN model checker Cluster Computing 2023 26 2 1611-1629
[37]
Fehnker, A., van Hoesel, L., & Mader, A. (2007). Modelling and verification of the LMAC protocol for wireless sensor networks. In International conference on integrated formal methods (pp. 253-272). Springer
[38]
Haines, R., Munro, A., & Clemo, G. (2006). Toward formal verification of 802.11 MAC protocols: A case study of applying Petri-nets to modeling the 802.11 PCF. In: 2006 IEEE 63rd vehicular technology conference (pp. 1171–1175). IEEE
[39]
He X, Kumar R, Mu L, Gjøsæter T, and Li FY Formal verification of a Cooperative Automatic Repeat reQuest MAC protocol Computer Standards & Interfaces 2012 34 4 242-254
[40]
Smed J and Hakonen H Algorithms and networking for computer games 2017 John Wiley & Sons
[41]
Carlson, D., Shamsi, M., Schnaare, T., Daugherty, D., Potter, J., & Nixon, M. (2012). Iec 62591 wirelesshart® system engineering guide. Revision 3.0 ed.: Emerson Process Management.
[42]
Holzmann, G. J., & Lieberman, W. S. (1991). Design and validation of computer protocols (vol. 512). Prentice hall Englewood Cliffs
[43]
Ben-Ari M A primer on model checking ACM Inroads 2010 1 1 40-47
[44]
Piyare R, Murphy AL, Magno M, and Benini L On-demand LoRa: Asynchronous TDMA for energy efficient and low latency communication in IoT Sensors 2018 18 11 3718
[45]
Kosunalp, S., & Kaya, Y. (2022). IoT-TDMA: A performance evaluation of TDMA scheme for wireless sensor networks with Internet of Things. Wiley Online Library, pp. 7063.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Telecommunications Systems
Telecommunications Systems  Volume 85, Issue 1
Jan 2024
185 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 14 November 2023
Accepted: 16 October 2023

Author Tags

  1. Formal verification
  2. Internet of Things
  3. PROMELA
  4. Protocol verification
  5. SPIN model checker
  6. Wireless HART

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media