Validating and verifying LwM2M clients with event-B

被引:0
作者
Mouakher, Ines [1 ]
Dhaou, Fatma [2 ]
Attiogbe, J. Christian [3 ]
机构
[1] Univ Tunis El Manar, Fac Sci Tunis, Tunis, Tunisia
[2] Univ Tabuk, Fac Business Adm, Tabuk, Saudi Arabia
[3] Univ Nantes, Inst Technol, Nantes, France
关键词
IoT; internet of things; lightweight protocols; device management; OMA LwM2M; verification and validation; V&V; event-B;
D O I
10.1504/IJIPT.2023.131291
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Lightweight Machine to Machine (LwM2M) is an open industry standard built to provide a means to remotely perform service enablement and application management for the Internet of Things (IoT). It is a communication protocol used between a client software on an IoT device, and a server software. Modelling, formal verification and validation are crucial and necessary to increase protocol reliability. In this paper, we propose a refinement-based approach that helps us to model, to validate and to verify gradually the LwM2M specification, which was carried out using Event-B and Rodin/ProB frameworks. We present a formal model of the LwM2M client, and we verify deadlock freedom and some functional safety properties like consistency of its configuration. The verification is ensured by theorem prover and model checking techniques, and the validation is supported by animation and bounded exploration of the client formal model. Moreover, the transformation into Event-B opens several possibilities to analyse existing implementations of the LwM2M client and to derive both test cases and executable code.
引用
收藏
页码:75 / 91
页数:18
相关论文
共 25 条
  • [1] Abrial J.-R., 2010, MODELING EVENT B SYS
  • [2] [Anonymous], 2011, PROCEDIA COMPUTER SC
  • [3] Internet of Things applications: A systematic review
    Asghari, Parvaneh
    Rahmani, Amir Masoud
    Javadi, Hamid Haj Seyyed
    [J]. COMPUTER NETWORKS, 2019, 148 : 241 - 261
  • [4] A Formal Model and Analysis of the MQ Telemetry Transport Protocol
    Aziz, Benjamin
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 59 - 68
  • [5] Diwan Maithily, 2017, Dependable Software Engineering. Theories, Tools, and Applications. Third International Symposium, SETTA 2017. Proceedings: LNCS 10606, P266, DOI 10.1007/978-3-319-69483-2_16
  • [6] Hoang T.S., 2013, Industrial Deployment of System Engineering Methods, P211
  • [7] Towards formal verification of IoT protocols: A Review
    Hofer-Schmitz, Katharina
    Stojanovic, Branka
    [J]. COMPUTER NETWORKS, 2020, 174
  • [8] Junior NF., 2021, PROCEDIA COMPUT SCI, V191, P25, DOI [10.1016/j.procs.2021.07.007, DOI 10.1016/J.PROCS.2021.07.007]
  • [9] Light-weight streaming protocol for the Internet of Multimedia Things: Voice streaming over NB-IoT
    Karaagac, Abdulkadir
    Dalipi, Enri
    Crombez, Pieter
    De Poorter, Eli
    Hoebeke, Jeroen
    [J]. PERVASIVE AND MOBILE COMPUTING, 2019, 59
  • [10] Mart¡n C, 2020, Arxiv, DOI arXiv:2008.06694