TY - GEN
T1 - Probabilistic Model Checking of Pipe protocol
AU - He, Kangli
AU - Zhang, Min
AU - He, Jia
AU - Chen, Yixiang
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/10/26
Y1 - 2015/10/26
N2 - Pipe protocol, proposed by Zhao [1] in early 2013, is one application layer protocol and one way to establish the Internet of Things, under which can different kinds of hardware platforms communicate with each other faster and more safely. As an upper layer protocol, Pipe protocol doesn't define details, but during the implementation, probabilistic and nondeterministic behaviors, such as data loss and external choice, are possible to happen. In this paper, we use probabilistic model checker, PRISM, to construct the probabilistic Pipe protocol as Probabilistic Timed Automata (PTAs), then verify some useful time-bounded properties, written in Probabilistic Computation Tree Logic (PCTL), like, "Maximum probability that the pipe is shut down after Source node sends all 5 data packets within 50 μs". The results show that the data loss probabilities, number of data and deadline should be restricted suitably if we require the maximum probability of the goal reaches some value. Our model is proved to be meaningful and we can give helpful suggestions to improve the implementation of Pipe protocol.
AB - Pipe protocol, proposed by Zhao [1] in early 2013, is one application layer protocol and one way to establish the Internet of Things, under which can different kinds of hardware platforms communicate with each other faster and more safely. As an upper layer protocol, Pipe protocol doesn't define details, but during the implementation, probabilistic and nondeterministic behaviors, such as data loss and external choice, are possible to happen. In this paper, we use probabilistic model checker, PRISM, to construct the probabilistic Pipe protocol as Probabilistic Timed Automata (PTAs), then verify some useful time-bounded properties, written in Probabilistic Computation Tree Logic (PCTL), like, "Maximum probability that the pipe is shut down after Source node sends all 5 data packets within 50 μs". The results show that the data loss probabilities, number of data and deadline should be restricted suitably if we require the maximum probability of the goal reaches some value. Our model is proved to be meaningful and we can give helpful suggestions to improve the implementation of Pipe protocol.
KW - Bounded probabilistic reachability
KW - PRISM
KW - Pipe protocol
KW - Probabilistic model checking
UR - https://www.scopus.com/pages/publications/84958149189
U2 - 10.1109/TASE.2015.15
DO - 10.1109/TASE.2015.15
M3 - 会议稿件
AN - SCOPUS:84958149189
T3 - Proceedings - 2015 International Symposium on Theoretical Aspects of Software Engineering, TASE 2015
SP - 135
EP - 138
BT - Proceedings - 2015 International Symposium on Theoretical Aspects of Software Engineering, TASE 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - International Symposium on Theoretical Aspects of Software Engineering, TASE 2015
Y2 - 12 September 2015 through 14 September 2015
ER -