Probabilistic Model Checking of Pipe protocol

Kangli He, Min Zhang*, Jia He, Yixiang Chen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

Pipe protocol, proposed by Zhao [1] in early 2013, is one application layer protocol and one way to establish the Internet of Things, under which can different kinds of hardware platforms communicate with each other faster and more safely. As an upper layer protocol, Pipe protocol doesn't define details, but during the implementation, probabilistic and nondeterministic behaviors, such as data loss and external choice, are possible to happen. In this paper, we use probabilistic model checker, PRISM, to construct the probabilistic Pipe protocol as Probabilistic Timed Automata (PTAs), then verify some useful time-bounded properties, written in Probabilistic Computation Tree Logic (PCTL), like, "Maximum probability that the pipe is shut down after Source node sends all 5 data packets within 50 μs". The results show that the data loss probabilities, number of data and deadline should be restricted suitably if we require the maximum probability of the goal reaches some value. Our model is proved to be meaningful and we can give helpful suggestions to improve the implementation of Pipe protocol.

Original languageEnglish
Title of host publicationProceedings - 2015 International Symposium on Theoretical Aspects of Software Engineering, TASE 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages135-138
Number of pages4
ISBN (Electronic)9781467376129
DOIs
StatePublished - 26 Oct 2015
EventInternational Symposium on Theoretical Aspects of Software Engineering, TASE 2015 - Nanjing, China
Duration: 12 Sep 201514 Sep 2015

Publication series

NameProceedings - 2015 International Symposium on Theoretical Aspects of Software Engineering, TASE 2015

Conference

ConferenceInternational Symposium on Theoretical Aspects of Software Engineering, TASE 2015
Country/TerritoryChina
CityNanjing
Period12/09/1514/09/15

Keywords

  • Bounded probabilistic reachability
  • PRISM
  • Pipe protocol
  • Probabilistic model checking

Fingerprint

Dive into the research topics of 'Probabilistic Model Checking of Pipe protocol'. Together they form a unique fingerprint.

Cite this