Formal probabilistic analysis of detection properties in wireless sensor networks

被引:5
作者
Elleuch, Maissa [1 ,2 ]
Hasan, Osman [2 ]
Tahar, Sofiene [2 ]
Abid, Mohamed [1 ]
机构
[1] Sfax Univ, Natl Sch Engineers Sfax, CES Lab, Sfax 3052, Tunisia
[2] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
关键词
Theorem proving; Wireless sensor networks; Scheduling; Performance analysis; Detection probability; Detection delay; COVERAGE; EXPECTATION; ALGORITHMS;
D O I
10.1007/s00165-014-0304-0
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the context of wireless sensor networks (WSNs), the ability to detect an intrusion event is the most desired characteristic. Due to the randomness in nodes scheduling algorithm and sensor deployment, probabilistic techniques are used to analyze the detection properties of WSNs. However traditional probabilistic analysis techniques, such as simulation and model checking, do not ensure accurate results, which is a severe limitation considering the mission-critical nature of most of the WSNs. In this paper, we overcome these limitations by using higher-order-logic theorem proving to formally analyze the detection properties of randomly-deployed WSNs using the randomized scheduling of nodes. Based on the probability theory, available in the HOL theorem prover, we first formally reason about the intrusion period of any occurring event. This characteristic is then built upon to develop the fundamental formalizations of the key detection metrics: the detection probability and the detection delay. For illustration purposes, we formally analyze the detection performance of a WSN deployed for border security monitoring.
引用
收藏
页码:79 / 102
页数:24
相关论文
共 43 条
  • [1] Abrams Z, P 3 INT S INF PROC S, P424
  • [2] FAULTLESS SYSTEMS: YES WE CAN!
    Abrial, Jean-Raymond
    [J]. COMPUTER, 2009, 42 (09) : 30 - 36
  • [3] PMaude: Rewrite-based Specification Language for Probabilistic Object Systems
    Agha, Gul
    Meseguer, Jose
    Sen, Koushik
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 153 (02) : 213 - 239
  • [4] [Anonymous], 2008, THESIS CONCORDIA U M
  • [5] [Anonymous], 2002, THESIS U CAMBRIDGE C
  • [6] A line in the sand: a wireless sensor network for target detection, classification, and tracking
    Arora, A
    Dutta, P
    Bapat, S
    Kulathumani, V
    Zhang, H
    Naik, V
    Mittal, V
    Cao, H
    Demirbas, M
    Gouda, M
    Choi, Y
    Herman, T
    Kulkarni, S
    Arumugam, U
    Nesterenko, M
    Vora, A
    Miyashita, M
    [J]. COMPUTER NETWORKS, 2004, 46 (05) : 605 - 634
  • [7] Proofs of randomized algorithms in COQ
    Audebaud, Philippe
    Paulin-Mohring, Christine
    [J]. SCIENCE OF COMPUTER PROGRAMMING, 2009, 74 (08) : 568 - 589
  • [8] Bernardeschi C, 2009, LECT NOTES COMPUT SC, V5873, P105, DOI 10.1007/978-3-642-05118-0_8
  • [9] Bernardeschi C, 2008, LECT NOTES COMPUT SC, V5219, P346, DOI 10.1007/978-3-540-87698-4_29
  • [10] Bogachev V. I., 2006, Measure Theory