SlideShare a Scribd company logo
1 of 6
Download to read offline
Formal Modeling and Verification of a Wireless
Body Area Network (WBAN) Protocol: S-TDMA
Protocol
Roua Ben Hamouda
University of Tunis El Manar
Higher Institute of Computer Science (ISI)
Email: benhamoudaroua@gmail.com
Imene Ben Hafaiedh
University of Tunis El Manar
Higher Institute of Computer Science (ISI)
Email: ben.hafaiedh.imen@gmail.com
Abstract—WBANs integrate wearable and implanted devices
with wireless communication and information processing sys-
tems to monitor the well-being of an individual. Various MAC
(Medium Access Control) protocols with different objectives have
been proposed for WBANs. The fact that any flaw in these
critical systems may lead to the loss of one’s life implies that
testing and verifying MAC’s protocols for such systems are on
the higher level of importance. In this paper, we firstly propose
a high-level formal and scalable model with timing aspects for
a MAC protocol particularly designed for WBANs, named S-
TDMA (Statistical frame based TDMA protocol). The protocol
uses TDMA (Time Division Multiple Access) bus arbitration
which requires temporal aspect modeling. Secondly, we propose a
formal validation of several relevant properties such as deadlock
freedom, fairness and mutual exclusion of this protocol at a
high level of abstraction. The protocol was modeled using a
composition of timed automata components, and verification was
performed using a real-time model checker.
Index Terms—Formal Verification, WSN, WBAN, TDMA,
MAC Protocols, model checking, timed automata.
I. INTRODUCTION
Advances in wireless communication, sensor design, and
energy storage technologies make Wireless Sensor Network
(WSN) with pervasive concept rapidly becoming a reality [1].
Pervasive health or patient monitoring systems integrated into
a telemedicine system are novel information technology that
will be able to support early detection of abnormal conditions
and prevention of serious consequences [2].
Recently, WSN is becoming a promising technology for
various applications. One of its potential deployments is
WBAN which signifies emerging technology with the potential
to revolutionize health care by allowing unobtrusive health
monitoring for extended periods of time [3]. A WBAN is
body-centric and it comprises in-body, on-body or around-
body sensor nodes, and a coordinator equipped on human
body.
WBANs are considered as critical system applications as
they are intended to support life saving. Hence reliability,
safety and security of such systems are considered as crucial
metrics. The aforementioned metrics depend considerably on
the efficiency of the channel access and the resource allocation
mechanism. Therefore, providing reliable and efficient MAC
protocols for WBANs becomes mandatory.
MAC layer is used to coordinate the access of the set
of sensor nodes to the shared wireless medium. Indeed,
TDMA is a scheduled-based multiple access technique where
transmission of packets are managed in the form of time
frames and time slots. A time slot can be seen as a dedicated
transmission resource used to carry data with minimum or no
overhead. Since slots are pre-allocated to individual nodes at
initialization, they are collision-free.
Recently, in [4], [5], authors proposed a TDMA-based
protocol called the S-TDMA protocol which is specifically de-
signed to meet WBANs challenges. They claim that, compared
to the traditional protocols, the S-TDMA protocol successfully
meets the delay and transmission efficiency requirements of
WBANs while keeping a low energy consumption. To this
end, they use a beacon frame containing synchronous and
poll information to reduce the possibility of collisions of
request frames. A second frame called the statistical frame
broadcasting the unified scheduling information is adopted to
avoid packet collisions, idle listening and overhearing.
In this paper, we focus on the formal design, analysis and
validation of the S-TDMA protocol. In particular we propose
a rigorous formal description of this protocol using timed
automata. This formal model is based on formal semantics
of a component-based framework called BIP [6]. The model
we propose in this paper is scalable which means that any
validation results could be easily observed for any given
number of sensors. We also propose a verification of our model
using a real-time model checker for different possible network
sizes. Using the BIP toolset, different relevant properties of the
S-TDMA protocol have been verified automatically.
II. RELATED WORK
As far as we know there is no research effort on formal
verification of MAC based WBAN protocols, in particular for
the S-TDMA MAC protocol which is specifically designed
and implemented for WBANs. To verify its feasibility, the
S-TDMA protocol has been fully implemented on an in-
dependently developed Human Body Communication (HBC)978-1-5386-2113-4/17/$31.00 c 2017 IEEE
platform [7] where only four sensor nodes and a coordinator
are fastened on a human body. After having implemented
the MAC protocol tasks on the sensor nodes through pro-
gramming, the authors evaluated the performance of their
MAC protocol in burst traffic scenarios focused on energy-
efficiency, latency and transmission efficiency [4], [5]. Hence,
The validation results are mainly based only on simulations
and test sequences and not on formal validation. Moreover,
these simulation results have been measured for the case of
only four sensor nodes, which means that no results could
be derived for a system with more nodes without a real
implementation.
However, the technology allows us now to make coherent
formal validation of MAC protocols of WSNs and so of
WBANs. Indeed, WBANs are usually tested and simulated for
their performance by measuring the theoretical system perfor-
mance and design parameters, and then providing simulations
for the system under study in a real environment. For example,
in [8] a simulator was built using Java to verify the efficiency
of their security protocol for a WBANs system by simulating
a set of parameters.
Formal methods have been, however, used to verify some
aspects in health-care systems but not in the context of
WBANs. For example, in [9] model checking has been used
to verify the reliability of medical device software that is used
in an infusion pump. A second example, in [10], where they
formalized and verified safety requirements in a commercial
PCA infusion pump.
However, minor researches have been performed on the
formal validation of WBANs related issues. In [11] for exam-
ple, the authors proposed a formal validation based on Event-
B of the functional issue of WBANs sensors, Which means
that they do not take into consideration any communication
protocol between the set of sensor nodes and their coordinator.
Recently, in [12], a formal validation of a WSNs secu-
rity protocol has been proposed using model-checking and
they also propose an extension of their formal model to
the verification of an authentication protocol for WBAN.
However, the proposed verification model only focuses on
node authentication aspects and did not address WBANs at the
functional communication MAC level in order to validate its
critical operations, such as data transmission based on critical
thresholds. Therefore, several functional properties related to
the communication protocol need to be verified in WBANs in
order to increase our trust in their operation.
In this paper, we propose a formal verification methodology
based on model-checking that provides a formal model of a
WBAN architecture and formal property verification results for
the validation of the S-TDMA MAC protocol. The verification
process is performed automatically using a real-time model-
checker provided by BIP.
III. PRELIMINARIES: BIP FRAMEWORK
In this section, we present a high-level modeling formal-
ism for the description of a WBAN architecture and the S-
TDMA protocol. We choose to specify our model using the
BIP (Behavior-Interaction-Priority) component-based frame-
work [6] as it is a framework with formal semantics that relies
on rich interaction models between components. It supports
a component-based modeling methodology based on the as-
sumption that components are obtained as the superposition
of three independent layers, that is:
• Behavior, specified as a set of finite-state machines (basic
components);
• Interactions, used to coordinate the actions of different
behaviors;
• Priorities, used to schedule among multiple enabled in-
teractions.
Real-time (RT) BIP [13] is an extension of the BIP component-
based framework to continuous time model where components
are timed automata and systems are compositions of timed
automata with respect to multi-party interactions.
In practice, an atomic component can be extended with
variables which are used to store (private) local data. Variables
can be exported through ports allowing exchange of data
among components. Moreover, each component transition can
be associated with a boolean condition specifying for which
values of the local variables it is enabled, and an (internal)
update function triggered along with transition execution
which modifies values of variables.
In BIP, interactions are structured by connectors. A con-
nector is a macro notation for representing sets of related
interactions in a compact manner. To specify the interactions
of a connector, two types of synchronizations are defined:
• Strong synchronization or rendez-vous, when the only
interaction of a connector is the maximal one, i.e., it
contains all the ports of the connector.
• Weak synchronization or broadcast, when interactions are
all those containing any port initiating the broadcast.
To characterize these two types of synchronizations, a
connector may associate to the set of ports it connects two
types:
• A trigger port of a connector is a complete port which can
initiate an interaction without synchronizing with other
ports of the connector. It is represented graphically by a
triangle.
• A synchron port of a connector which is an incomplete
port, hence needs synchronization with other ports, and
is denoted by a circle.
IV. A HIGH LEVEL FORMAL MODEL OF S-TDMA
PROTOCOL
In this section, we describe our formal model of WBAN
architecture and in particular for the verification of the S-
TDMA protocol. Thus, we first start by a brief overview about
the considered protocol.
A. Sketch of the S-TDMA protocol
The S-TDMA protocol is a recently proposed MAC protocol
based on TDMA architecture designed to WBANs [4], [5],
and which has been implemented on a HBC (Human Body
Communication) platform. In S-TDMA, the beacon period of
the S-TDMA protocol, which is generally called superframe,
lasts for 1 sec and consists of two types of periods: active
period and inactive period. Active period includes 4 kinds
of frames: beacon frame, request frame, statistical frame and
data frame. S-TDMA is designed for a star network which
is controlled by a coordinator. The beacon frame contains
the necessary information for synchronizing the devices and
it is regularly transmitted from the coordinator to all nodes
in a broadcast manner. The request frame was reserved for
sensor nodes to send their requests to the hub throughout
predetermined time slots which makes sense because the
number of sensor nodes in a WBAN is always limited (64
nodes at most).
After receiving the request frames, the coordinator will add
up all the requested time slots needed by the sensor nodes
to form a statistical frame which contains the total time slot
request and the scheduling information. Three cases can occur
in this state; If no request events occurred after receiving the
statistical frame, sensor nodes set their radios into sleep mode
until the next scheduled active frame; Otherwise, in order to
save energy, each sensor node enters into sleep mode and only
wakes up to send data frame when the granted time slot is
dedicated for it; else the sensor node is in his granted time
slot and so it can send its data packet. The duration of the
data frame is adapted by the hub based on the current traffic
characteristics. In order to save energy, a period of inactivity
is reserved for sensor nodes, allowing them to enter into sleep
mode. Each data frame has a packet number assigned, so
that the received packets are counted, thus to maintain data
integrity.
B. The Formal Model
To describe our formal model, we start by providing a
formal model for the description of the global WBAN archi-
tecture. The model proposed is scalable, which means that the
number of sensor nodes in our model is a variable parameter
named N. We model a coordinator as a BIP atomic component
named C and similarly, a sensor node is also modeled as BIP
atomic component named Ni. Thus, our WBAN model, shown
in Figure 1, is the composition of two types of atomic BIP
components:
1- Coordinator Component: which is responsible for the
control of the other components in the star topology network.
It must be linked to all the other components of the model.
2- Node Component: which is the atomic component repre-
senting the sensor nodes in the network. They are related to the
Coordinator with BIP connectors allowing the synchroniza-
tion, the transmission and the receive of the diverse packets
through ports.
Note that, our model is defined to the description of a network
with N sensor nodes. Thus, the protocol under study could
be analyzed to any given number of sensor nodes. In the
validation phase (Section V), the model has been instantiated
and verified for different values of N.
Now, the modeling of the S-TDMA protocol is performed
through the different behaviors of BIP components and in
particular through connectors relating these components.
The Coordinator Component C: Figure 2 describes the
behavior and the set of ports of the coordinator component.
It has four states namely; Start, Req, Data and Sleep ,
where Start is the initial state. The different transitions of the
component are labeled by one of its ports. These ports define
how components interact with the rest of components. The
set of variables associated with these ports can be read and
updated through connectors.
Fig. 2. The Coordinator component C behaviour
The behavior of the coordinator C can be described as
follows:
- Initially, in state Start, C transmits the beacon frame to all
the model’s components by firing up the transition labeled
by the port SB (Send Beacon) which contains its hardware
clock value. Moreover, by firing this transition, the two clock
variables y and ts (time slot), representing the global time and
a local time respectively, start counting.
- In state Req, the transition labeled by RRi, which models
the receive request procedure, fires up when ts ≡ tsi, with
i ∈ [1..N]. Therefore, C receives a request frame from each
node at its assigned time slot. Likewise, in Req an invariant
Inv1 = (ts ≤ 500µs) is defined, which guarantees that the
coordinator cannot stay receiving from each node his request
frame more than a 500µs period of time, and which is called
the AllocationSlotMin [14].
- After receiving all the request frames, C fires up the
transition labeled by SS which defines the statistical frame
transmission. The scheduling information sent in this frame is
represented as the set of variables: FT (Frame type), IDC
(ID of the coordinator), IDni
(ID of the recipient node),
TTs (Total Time Slots), InfoS (Scheduling Information) and
CRC (Cyclic Redundancy Check). By firing this transition,
the coordinator component resets the counter x, which will
count the number of data packets received.
- In state Data, C chooses to fire one transition over the set
of transitions labeled by {RDi}i∈[1..N] which corresponds to
the receive data procedure of S-TDMA. The choice is done
with respect to the guard associated to each transition. Hence,
the coordinator receives data packets from each node at their
Fig. 1. A Formal model of a WBAN architecture
assigned time slots [ts ≡ tsi] as long as it has packet to send
[x ≤ sizeDi
]. When there is no more time slots assigned to
any node, the transition labeled by SLP spontaneously fires
up and C goes to the state Sleep.
- Finally, when the cycle is finished ([y ≡ 1sec]), the transition
labeled by the internal port END fires up.
The Node Component Ni: Figure 3 describes the behav-
ior and the set of ports of a node component. This component
has five states namely; Start, Req, Stat, Data and Sleep , where
Start is the initial state. All the nodes have the same behavior
thus technically we can easily instantiate as many sensor nodes
as needed. The behavior of a given Node component Ni can
be described as follows:
- First, in state Start, Ni fires up the transition labeled by RBi
which corresponds to the receive beacon procedure of the S-
TDMA protocol, and synchronizes its hardware clock value
with the value of the global time clock y.
- In state Req, Ni can make a request by firing up the transition
labeled by the port SRi at its assigned time slot [t ≡ tsi].
- After sending all request frames, in state Stat, the node fires
up the transition labeled by RSi to receive the scheduling
information from the coordinator.
- In state Data, Ni can send its data frame by firing up the
transition labeled by SDi, in two cases; whether it has the
first time slot in the scheduling information or when it has
a successive granted time slots. In order to save energy, Ni
can enter into sleep mode by firing up the transition labeled by
SLPi and only wakes up to send data frame when the granted
time slot is dedicated for it [t ≡ tsi] and so it executes the
transition SDi from the state Sleep.
- At last, Ni stays in state Sleep until the end of cycle
[y ≡ 1sec] to fire up the transition labeled by the port ENDi.
Note that, the coordinator, as well as all nodes are Radio
devices, which means that they could be in 3 possible Radio
modes namely; a Transmit mode denoted ”T”, a Receive mode
”R” and a Sleep mode ”S”. To model switching from one Ra-
dio mode to another, we define the function Radio(M1, M2),
with M1,M2 ∈ {”R”, ”T”, ”S”}. This function is called as
an action in different transitions of the components behavior,
where Radio(M1, M2) models the fact of switching each
component’s radio transceiver from the mode M1 to the mode
M2.
Fig. 3. The Node component Ni behaviour
The set of the model Connectors: In our model, the set
of BIP components {C, {Ni}i∈[1..N]} interact using a set of
BIP connectors namely {αB,{αRi
}i∈[1..N],αS,{αDi
}i∈[1..N]}
(see Figure 1):
- αB: a multiparty broadcast connector which connects the
set of ports {SB, {RBi}i∈[1..N]}. This connector allows the
coordinator to send the beacon frame to all nodes. Note that,
as the port SB is a trigger port, the coordinator can fire
the corresponding transition even though there is no sensor
nodes ready to receive the beacon. Thus, we can guarantee
the progress of our model.
- {αRi
}i∈[1..N]: a set of binary rendez-vous connectors con-
necting each node Ni to the coordinator. Such a connector
allows each node to send a request to the coordinator. Note
that, when there is no data packets to send, each node Ni has
to send a request through its associated connector αRi with a
number of packets sizeRi equal to 0 .
- αS: a multiparty broadcast connector which connects the set
of ports {SS, {RSi}i∈[1..N]}. It describes the broadcast of the
statistical frame sent from C to all the model’s nodes.
- {αDi }i∈[1..N]: a set of binary rendez-vous connectors linking
the port SDi of each node to the corresponding port RDi of
the coordinator. It describes the transmission of data frame
procedure by each node.
V. FORMAL VERIFICATION AND EXPERIMENTAL RESULTS
In this section, and given the already described model, we
propose to formally verify a set of relevant properties of the
S-TDMA protocol. To this end, we use the set of tools offered
by BIP, in particular, we use RT-DFinder tool [13] to verify the
property of deadlock-freedom. RT-DFinder is a compositional
verification tool based on model-checking for the verification
of safety properties such as invariants and deadlock-freedom.
Note that, given a BIP model an automatically generated
code is provided which means that further analysis could
be performed at the execution level. So, in addition to the
verification of properties at the model level, we also provide
a set of experimental results such as energy consumption
extracted at the execution level.
Deadlock freedom: Using the RT-DFinder tool, we have
proven the property of deadlock-freedom of our model to
different numbers of sensor nodes at a high-level with no need
to code generation. This is very interesting, when one wants
to see how a given protocol may react in the context of more
complex architectures and thus with more conflicts to manage
without having to go into its implementation. Note that, the
S-TDMA protocol has been validated only by executions on
an implementation of a set of only 4 sensors [4]. Numerical
results depicted in Figure 4, shows how the system complexity
increases when increasing the number of sensor nodes. As our
verification is based on model-checking, the verification has
been exhaustive for all the considered possible configurations.
Fig. 4. Verification time for detecting deadlocks
Invariant Verification: We also propose to check
Invariant properties for our model. Such properties are very
important to check, in the case of real systems because they
guarantee the respect of a set of time-constraints associated
to system states. In particular, in the case of the S-TDMA
protocol, a sensor node cannot stay in the state Data more
than the assigned time-slot duration to send its data. Similarly,
the coordinator cannot stay in states Req or Data more than
the predefined time-slot duration. These invariant properties
are formally described using Linear Temporal Logic (LTL)
as follows :
1- AG (Datani =⇒ (tsDni
≤ 500))
2- AG (Reqc =⇒ (tsReqc
≤ 500))
3- AG (Datac =⇒ (tsDc
≤ 500))
The verification of these properties have been performed
automatically and the verification time is depicted in Figure 5
for different models with different number of sensor nodes.
Fig. 5. Verification time (ms) for Mutual-Exclusion and Invariant properties
for S-TDMA
Mutual exclusion: In a given protocol the mutual
exclusion is a crucial property when a set of devices share
a given resource. In particular, in the case of the S-TDMA
protocol, all sensor nodes share the same channel. Thus
mutual exclusion over the channel access has to be verified.
For this purpose our model has to satisfy the following set of
properties:
- ∀i, j ∈ {1, ..., N}i=j , AG ¬(SRi ∧ SRj)
- ∀i, j ∈ {1, ..., N}i=j , AG ¬(SDi ∧ SDj)
Fairness: As the S-TDMA protocol is considered fair, the
verification of fairness property is essential. Ensuring fairness
by a protocol means that all sensor nodes will eventually get
the channel access if they ask for it. Moreover, each node will
eventually get as much frames to send as required. Table I
gives the results related to the fairness property which are ob-
tained based on a real-time execution of our S-TDMA model
for N = 15. We compute for each node the number of access
to the channel to send frames (data frames) for 10 minutes of
real-time executions. Note that, in each cycle, for each node
the number of required data frames namely sizeR is sent to the
coordinator within the request frame. However, the number of
effectively allocated data frames namely sizeD is known in the
received statistical frame. So fairness of S-TDMA, consists of
checking for each node whether sizeRi ≡ sizeDi. In Table I,
we compute and compare for an arbitrary set of chosen nodes,
the two variables sizeRi and sizeDi. The Results show that
all chosen nodes get exactly as much allocated frames as
required. Moreover, What is interesting in our model is that
fairness property could be checked automatically using BIP
Tools. To this end, fairness needs to be formally described
using Temporal Logic as follows:
i = 1 i = 5 i = 10 i = 15
sizeRi 25 10 15 0
sizeDi 25 10 15 0
TABLE I
THE NUMBER OF REQUIRED AND ALLOCATED FRAMES FOR SEVERAL
NODES IN DIFFERENT CYCLES
AG (SRi =⇒ (SDi U (sizeRi == 0)))
Energy analysis: WBANs have an additional interesting
aspect: as sensor nodes are generally battery-operated, energy
consumption is very important. The radio on a sensor node is
usually the device that uses most energy. A radio device could
have four possible modes: listen, transmit, receive and sleep,
and each mode has a different energy consumption level. Note
that the sleep mode has the lowest energy consumption (≈
Negligible). Protocol design for WBAN focuses on minimizing
energy consumption. In the case of the S-TDMA protocol,
the energy consumption depends on the time spent by each
node in a given period, which can be active or inactive. More
precisely, being in the active period for a given node, means
that the 3 radio modes namely listen, transmit and receive
are possible. However, the inactive period of the S-TDMA
protocol corresponds to the sleep mode of a radio device. In
our proposed model, using BIP tools, we can easily measure
the exact time spent by each node in each mode in a real-
time execution and thus compute the energy consumption of
our model for any given configuration and scenarios. The
energy consumption analysis performed in this work, takes
into consideration 3 body states, namely: walking, running
and falling down. Note that, energy consumption changes
dynamically depending on the body state. In [5], authors give
a proof that computing the time spent by each node in the
inactive period is sufficient to have an approximation about
the energy consumption of the protocol. Thus, in Figure 6,
we compute for each body state the time spent in the inactive
period.
Fig. 6. Time spent in the inactive period depending on body states
VI. CONCLUSION
In this paper, we have proposed a high-level and a formal
model for a well-known MAC protocol recently proposed for
WBANs, namely the S-TDMA protocol. The proposed model
provides a way to describe the protocol in an abstract and a
high level manner which allows to easily analyze and verify
different properties without having to implement them in a
concrete system. Moreover, the model we have proposed is
scalable as it has been defined for a network with N sensors
and the set of verification experiments have been applied for
different values of N. However, the only existing validation
proposed for the S-TDMA protocol has been proposed for only
4 nodes. We have taken into account several timing aspects,
to model the TDMA procedure, which makes our model
easily extendable to different TDMA based protocols like
the bodyMAC protocol or those presented in [15]. Different
WBAN protocols, which are not necessarily based on TDMA
could be also modeled and formally verified using the same
methodology.
REFERENCES
[1] S. Borkar, “Design challenges of technology scaling,” IEEE micro,
vol. 19, 1999.
[2] R. S. Istepanian, E. Jovanov, and Y. Zhang, “Guest editorial introduction
to the special section on m-health: Beyond seamless mobility and global
wireless health-care connectivity,” IEEE Transactions on information
technology in biomedicine, vol. 8, 2004.
[3] D. Raskovic, T. Martin, and E. Jovanov, “Medical monitoring applica-
tions for wearable computing,” The Computer Journal, vol. 47, 2004.
[4] Z. Nie, Z. Li, R. Huang, Y. Liu, J. Li, and L. Wang, “A statistical
frame based tdma protocol for human body communication.” BioMedical
Engineering OnLine, vol. 14, 2015.
[5] H. Chen, Z. Nie, K. Ivanov, L. Wang, and R. Liu, “A statistical
mac protocol for heterogeneous-traffic human body communication,” in
Circuits and Systems (ISCAS), 2013 IEEE International Symposium on,
2013, pp. 2275–2278.
[6] A. Basu, M. Bozga, and J. Sifakis, “Modeling heterogeneous real-time
components in BIP,” in SEFM, 2006, pp. 3–12.
[7] N. Cho, J. Yoo, S.-J. Song, J. Lee, S. Jeon, and H.-J. Yoo, “The human
body characteristics as a signal transmission medium for intrabody
communication,” IEEE TRANSACTIONS ON MICROWAVE THEORY
AND TECHNIQUES, vol. 55, no. 5, 2007.
[8] L. Chen, Z. Cao, R. Lu, X. Liang, and X. Shen, “EPF: an event-
aided packet forwarding protocol for privacy-preserving mobile health-
care social networks,” in Proceedings of the Global Communications
Conference, GLOBECOM 2011, 2011, pp. 1–5.
[9] R. P. Jetley, S. P. Iyer, and P. L. Jones, “A formal methods approach
to medical device review,” IEEE Computer, vol. 39, no. 4, pp. 61–67,
2006.
[10] P. Masci, A. Ayoub, P. Curzon, M. D. Harrison, I. Lee, and H. W.
Thimbleby, “Verification of interactive software for medical devices:
PCA infusion pumps and FDA regulation as an example,” in ACM
SIGCHI Symposium on Engineering Interactive Computing Systems,
2013, pp. 81–90.
[11] H. M. N. A. Hamadi, A. Gawanmeh, and M. Al-Qutayri, “A verification
methodology for a wireless body sensor network functionality,” in
Proceedings of IEEE-EMBS International Conference on Biomedical
and Health Informatics, 2014, pp. 635–639.
[12] T. Chen, Z. Yu, S. Li, and B. Chen, “From wireless sensor networks
to wireless body area networks: Formal modeling and verification on
security using PAT,” J. Sensors, pp. 8 797 568:1–8 797 568:11, 2016.
[13] T. Abdellatif, J. Combaz, and J. Sifakis, “Model-based implementation
of real-time applications,” in Proceedings of the tenth ACM international
conference on Embedded software, 2010, pp. 229–238.
[14] A. Astrin et al., “Ieee standard for local and metropolitan area networks
part 15.6: Wireless body area networks: Ieee std 802.15. 6-2012,” The
document is available at IEEE Xplore, 2012.
[15] S. J. Marinkovic, E. M. Popovici, C. Spagnol, S. Faul, and W. P.
Marnane, “Energy-efficient low duty cycle mac protocol for wireless
body area networks,” IEEE Transactions on Information Technology in
Biomedicine, vol. 13, no. 6, pp. 915–925, 2009.

More Related Content

What's hot

An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAlexander Decker
 
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hocSecure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hocIJECEIAES
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsTal Lavian Ph.D.
 
Proposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthProposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthijcsity
 
Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanambitlick
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...IJCNCJournal
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manetAlexander Decker
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manetAlexander Decker
 
Link Adaptation for Microwave Link using both MATLAB and Path-Loss Tool
Link Adaptation for Microwave Link using both MATLAB and Path-Loss ToolLink Adaptation for Microwave Link using both MATLAB and Path-Loss Tool
Link Adaptation for Microwave Link using both MATLAB and Path-Loss Toolijeei-iaes
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...IJCSES Journal
 
Efficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh NetworksEfficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh Networksijceronline
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkeSAT Publishing House
 

What's hot (16)

An ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networksAn ecn approach to congestion control mechanisms in mobile ad hoc networks
An ecn approach to congestion control mechanisms in mobile ad hoc networks
 
Resume
ResumeResume
Resume
 
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hocSecure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc
 
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous DomainsApplications Drive Secure Lightpath Creation Across Heterogeneous Domains
Applications Drive Secure Lightpath Creation Across Heterogeneous Domains
 
Proposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthProposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidth
 
Specifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lanSpecifica‘tion, verification and simulation of a wireless lan
Specifica‘tion, verification and simulation of a wireless lan
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
 
Link Adaptation for Microwave Link using both MATLAB and Path-Loss Tool
Link Adaptation for Microwave Link using both MATLAB and Path-Loss ToolLink Adaptation for Microwave Link using both MATLAB and Path-Loss Tool
Link Adaptation for Microwave Link using both MATLAB and Path-Loss Tool
 
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...
 
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
PERFORMANCE ANALYSIS OF WIRELESS MESH NETWORK USING ADAPTIVE INFORMANT FACTOR...
 
Efficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh NetworksEfficient Load Balancing Routing in Wireless Mesh Networks
Efficient Load Balancing Routing in Wireless Mesh Networks
 
Performance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms networkPerformance analysis of al fec raptor code over 3 gpp embms network
Performance analysis of al fec raptor code over 3 gpp embms network
 

Similar to Article scientifique - IINTEC17

A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...IJCNCJournal
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...ijaia
 
Machine Learning Based 5G Network Channel Quality Prediction
Machine Learning Based 5G Network Channel Quality PredictionMachine Learning Based 5G Network Channel Quality Prediction
Machine Learning Based 5G Network Channel Quality PredictionIRJET Journal
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015TTA_TNagar
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015TTA_TNagar
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127IJMER
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksIJMER
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
Impact of Signaling Load on the UMTS Call.pdf
Impact of Signaling Load on the UMTS Call.pdfImpact of Signaling Load on the UMTS Call.pdf
Impact of Signaling Load on the UMTS Call.pdfdemisse Hailemariam
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...IJCSIS Research Publications
 
Effective Streaming of Clustered Sensor Data in Harsh Environment
Effective Streaming of Clustered Sensor Data in Harsh EnvironmentEffective Streaming of Clustered Sensor Data in Harsh Environment
Effective Streaming of Clustered Sensor Data in Harsh EnvironmentCSCJournals
 
Performance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkPerformance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkEditor Jacotech
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstracttsysglobalsolutions
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksIJARIIT
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...pijans
 

Similar to Article scientifique - IINTEC17 (20)

A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
 
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
A MAC PROTOCOL WITH DYNAMIC ALLOCATION OF TIME SLOTS BASED ON TRAFFIC PRIORIT...
 
Machine Learning Based 5G Network Channel Quality Prediction
Machine Learning Based 5G Network Channel Quality PredictionMachine Learning Based 5G Network Channel Quality Prediction
Machine Learning Based 5G Network Channel Quality Prediction
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Impact of Signaling Load on the UMTS Call.pdf
Impact of Signaling Load on the UMTS Call.pdfImpact of Signaling Load on the UMTS Call.pdf
Impact of Signaling Load on the UMTS Call.pdf
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
 
Effective Streaming of Clustered Sensor Data in Harsh Environment
Effective Streaming of Clustered Sensor Data in Harsh EnvironmentEffective Streaming of Clustered Sensor Data in Harsh Environment
Effective Streaming of Clustered Sensor Data in Harsh Environment
 
Performance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm networkPerformance evaluation of bandwidth optimization algorithm (boa) in atm network
Performance evaluation of bandwidth optimization algorithm (boa) in atm network
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
M1802037781
M1802037781M1802037781
M1802037781
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
A Cellular Bonding and Adaptive Load Balancing Based Multi-Sim Gateway for Mo...
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Article scientifique - IINTEC17

  • 1. Formal Modeling and Verification of a Wireless Body Area Network (WBAN) Protocol: S-TDMA Protocol Roua Ben Hamouda University of Tunis El Manar Higher Institute of Computer Science (ISI) Email: benhamoudaroua@gmail.com Imene Ben Hafaiedh University of Tunis El Manar Higher Institute of Computer Science (ISI) Email: ben.hafaiedh.imen@gmail.com Abstract—WBANs integrate wearable and implanted devices with wireless communication and information processing sys- tems to monitor the well-being of an individual. Various MAC (Medium Access Control) protocols with different objectives have been proposed for WBANs. The fact that any flaw in these critical systems may lead to the loss of one’s life implies that testing and verifying MAC’s protocols for such systems are on the higher level of importance. In this paper, we firstly propose a high-level formal and scalable model with timing aspects for a MAC protocol particularly designed for WBANs, named S- TDMA (Statistical frame based TDMA protocol). The protocol uses TDMA (Time Division Multiple Access) bus arbitration which requires temporal aspect modeling. Secondly, we propose a formal validation of several relevant properties such as deadlock freedom, fairness and mutual exclusion of this protocol at a high level of abstraction. The protocol was modeled using a composition of timed automata components, and verification was performed using a real-time model checker. Index Terms—Formal Verification, WSN, WBAN, TDMA, MAC Protocols, model checking, timed automata. I. INTRODUCTION Advances in wireless communication, sensor design, and energy storage technologies make Wireless Sensor Network (WSN) with pervasive concept rapidly becoming a reality [1]. Pervasive health or patient monitoring systems integrated into a telemedicine system are novel information technology that will be able to support early detection of abnormal conditions and prevention of serious consequences [2]. Recently, WSN is becoming a promising technology for various applications. One of its potential deployments is WBAN which signifies emerging technology with the potential to revolutionize health care by allowing unobtrusive health monitoring for extended periods of time [3]. A WBAN is body-centric and it comprises in-body, on-body or around- body sensor nodes, and a coordinator equipped on human body. WBANs are considered as critical system applications as they are intended to support life saving. Hence reliability, safety and security of such systems are considered as crucial metrics. The aforementioned metrics depend considerably on the efficiency of the channel access and the resource allocation mechanism. Therefore, providing reliable and efficient MAC protocols for WBANs becomes mandatory. MAC layer is used to coordinate the access of the set of sensor nodes to the shared wireless medium. Indeed, TDMA is a scheduled-based multiple access technique where transmission of packets are managed in the form of time frames and time slots. A time slot can be seen as a dedicated transmission resource used to carry data with minimum or no overhead. Since slots are pre-allocated to individual nodes at initialization, they are collision-free. Recently, in [4], [5], authors proposed a TDMA-based protocol called the S-TDMA protocol which is specifically de- signed to meet WBANs challenges. They claim that, compared to the traditional protocols, the S-TDMA protocol successfully meets the delay and transmission efficiency requirements of WBANs while keeping a low energy consumption. To this end, they use a beacon frame containing synchronous and poll information to reduce the possibility of collisions of request frames. A second frame called the statistical frame broadcasting the unified scheduling information is adopted to avoid packet collisions, idle listening and overhearing. In this paper, we focus on the formal design, analysis and validation of the S-TDMA protocol. In particular we propose a rigorous formal description of this protocol using timed automata. This formal model is based on formal semantics of a component-based framework called BIP [6]. The model we propose in this paper is scalable which means that any validation results could be easily observed for any given number of sensors. We also propose a verification of our model using a real-time model checker for different possible network sizes. Using the BIP toolset, different relevant properties of the S-TDMA protocol have been verified automatically. II. RELATED WORK As far as we know there is no research effort on formal verification of MAC based WBAN protocols, in particular for the S-TDMA MAC protocol which is specifically designed and implemented for WBANs. To verify its feasibility, the S-TDMA protocol has been fully implemented on an in- dependently developed Human Body Communication (HBC)978-1-5386-2113-4/17/$31.00 c 2017 IEEE
  • 2. platform [7] where only four sensor nodes and a coordinator are fastened on a human body. After having implemented the MAC protocol tasks on the sensor nodes through pro- gramming, the authors evaluated the performance of their MAC protocol in burst traffic scenarios focused on energy- efficiency, latency and transmission efficiency [4], [5]. Hence, The validation results are mainly based only on simulations and test sequences and not on formal validation. Moreover, these simulation results have been measured for the case of only four sensor nodes, which means that no results could be derived for a system with more nodes without a real implementation. However, the technology allows us now to make coherent formal validation of MAC protocols of WSNs and so of WBANs. Indeed, WBANs are usually tested and simulated for their performance by measuring the theoretical system perfor- mance and design parameters, and then providing simulations for the system under study in a real environment. For example, in [8] a simulator was built using Java to verify the efficiency of their security protocol for a WBANs system by simulating a set of parameters. Formal methods have been, however, used to verify some aspects in health-care systems but not in the context of WBANs. For example, in [9] model checking has been used to verify the reliability of medical device software that is used in an infusion pump. A second example, in [10], where they formalized and verified safety requirements in a commercial PCA infusion pump. However, minor researches have been performed on the formal validation of WBANs related issues. In [11] for exam- ple, the authors proposed a formal validation based on Event- B of the functional issue of WBANs sensors, Which means that they do not take into consideration any communication protocol between the set of sensor nodes and their coordinator. Recently, in [12], a formal validation of a WSNs secu- rity protocol has been proposed using model-checking and they also propose an extension of their formal model to the verification of an authentication protocol for WBAN. However, the proposed verification model only focuses on node authentication aspects and did not address WBANs at the functional communication MAC level in order to validate its critical operations, such as data transmission based on critical thresholds. Therefore, several functional properties related to the communication protocol need to be verified in WBANs in order to increase our trust in their operation. In this paper, we propose a formal verification methodology based on model-checking that provides a formal model of a WBAN architecture and formal property verification results for the validation of the S-TDMA MAC protocol. The verification process is performed automatically using a real-time model- checker provided by BIP. III. PRELIMINARIES: BIP FRAMEWORK In this section, we present a high-level modeling formal- ism for the description of a WBAN architecture and the S- TDMA protocol. We choose to specify our model using the BIP (Behavior-Interaction-Priority) component-based frame- work [6] as it is a framework with formal semantics that relies on rich interaction models between components. It supports a component-based modeling methodology based on the as- sumption that components are obtained as the superposition of three independent layers, that is: • Behavior, specified as a set of finite-state machines (basic components); • Interactions, used to coordinate the actions of different behaviors; • Priorities, used to schedule among multiple enabled in- teractions. Real-time (RT) BIP [13] is an extension of the BIP component- based framework to continuous time model where components are timed automata and systems are compositions of timed automata with respect to multi-party interactions. In practice, an atomic component can be extended with variables which are used to store (private) local data. Variables can be exported through ports allowing exchange of data among components. Moreover, each component transition can be associated with a boolean condition specifying for which values of the local variables it is enabled, and an (internal) update function triggered along with transition execution which modifies values of variables. In BIP, interactions are structured by connectors. A con- nector is a macro notation for representing sets of related interactions in a compact manner. To specify the interactions of a connector, two types of synchronizations are defined: • Strong synchronization or rendez-vous, when the only interaction of a connector is the maximal one, i.e., it contains all the ports of the connector. • Weak synchronization or broadcast, when interactions are all those containing any port initiating the broadcast. To characterize these two types of synchronizations, a connector may associate to the set of ports it connects two types: • A trigger port of a connector is a complete port which can initiate an interaction without synchronizing with other ports of the connector. It is represented graphically by a triangle. • A synchron port of a connector which is an incomplete port, hence needs synchronization with other ports, and is denoted by a circle. IV. A HIGH LEVEL FORMAL MODEL OF S-TDMA PROTOCOL In this section, we describe our formal model of WBAN architecture and in particular for the verification of the S- TDMA protocol. Thus, we first start by a brief overview about the considered protocol. A. Sketch of the S-TDMA protocol The S-TDMA protocol is a recently proposed MAC protocol based on TDMA architecture designed to WBANs [4], [5],
  • 3. and which has been implemented on a HBC (Human Body Communication) platform. In S-TDMA, the beacon period of the S-TDMA protocol, which is generally called superframe, lasts for 1 sec and consists of two types of periods: active period and inactive period. Active period includes 4 kinds of frames: beacon frame, request frame, statistical frame and data frame. S-TDMA is designed for a star network which is controlled by a coordinator. The beacon frame contains the necessary information for synchronizing the devices and it is regularly transmitted from the coordinator to all nodes in a broadcast manner. The request frame was reserved for sensor nodes to send their requests to the hub throughout predetermined time slots which makes sense because the number of sensor nodes in a WBAN is always limited (64 nodes at most). After receiving the request frames, the coordinator will add up all the requested time slots needed by the sensor nodes to form a statistical frame which contains the total time slot request and the scheduling information. Three cases can occur in this state; If no request events occurred after receiving the statistical frame, sensor nodes set their radios into sleep mode until the next scheduled active frame; Otherwise, in order to save energy, each sensor node enters into sleep mode and only wakes up to send data frame when the granted time slot is dedicated for it; else the sensor node is in his granted time slot and so it can send its data packet. The duration of the data frame is adapted by the hub based on the current traffic characteristics. In order to save energy, a period of inactivity is reserved for sensor nodes, allowing them to enter into sleep mode. Each data frame has a packet number assigned, so that the received packets are counted, thus to maintain data integrity. B. The Formal Model To describe our formal model, we start by providing a formal model for the description of the global WBAN archi- tecture. The model proposed is scalable, which means that the number of sensor nodes in our model is a variable parameter named N. We model a coordinator as a BIP atomic component named C and similarly, a sensor node is also modeled as BIP atomic component named Ni. Thus, our WBAN model, shown in Figure 1, is the composition of two types of atomic BIP components: 1- Coordinator Component: which is responsible for the control of the other components in the star topology network. It must be linked to all the other components of the model. 2- Node Component: which is the atomic component repre- senting the sensor nodes in the network. They are related to the Coordinator with BIP connectors allowing the synchroniza- tion, the transmission and the receive of the diverse packets through ports. Note that, our model is defined to the description of a network with N sensor nodes. Thus, the protocol under study could be analyzed to any given number of sensor nodes. In the validation phase (Section V), the model has been instantiated and verified for different values of N. Now, the modeling of the S-TDMA protocol is performed through the different behaviors of BIP components and in particular through connectors relating these components. The Coordinator Component C: Figure 2 describes the behavior and the set of ports of the coordinator component. It has four states namely; Start, Req, Data and Sleep , where Start is the initial state. The different transitions of the component are labeled by one of its ports. These ports define how components interact with the rest of components. The set of variables associated with these ports can be read and updated through connectors. Fig. 2. The Coordinator component C behaviour The behavior of the coordinator C can be described as follows: - Initially, in state Start, C transmits the beacon frame to all the model’s components by firing up the transition labeled by the port SB (Send Beacon) which contains its hardware clock value. Moreover, by firing this transition, the two clock variables y and ts (time slot), representing the global time and a local time respectively, start counting. - In state Req, the transition labeled by RRi, which models the receive request procedure, fires up when ts ≡ tsi, with i ∈ [1..N]. Therefore, C receives a request frame from each node at its assigned time slot. Likewise, in Req an invariant Inv1 = (ts ≤ 500µs) is defined, which guarantees that the coordinator cannot stay receiving from each node his request frame more than a 500µs period of time, and which is called the AllocationSlotMin [14]. - After receiving all the request frames, C fires up the transition labeled by SS which defines the statistical frame transmission. The scheduling information sent in this frame is represented as the set of variables: FT (Frame type), IDC (ID of the coordinator), IDni (ID of the recipient node), TTs (Total Time Slots), InfoS (Scheduling Information) and CRC (Cyclic Redundancy Check). By firing this transition, the coordinator component resets the counter x, which will count the number of data packets received. - In state Data, C chooses to fire one transition over the set of transitions labeled by {RDi}i∈[1..N] which corresponds to the receive data procedure of S-TDMA. The choice is done with respect to the guard associated to each transition. Hence, the coordinator receives data packets from each node at their
  • 4. Fig. 1. A Formal model of a WBAN architecture assigned time slots [ts ≡ tsi] as long as it has packet to send [x ≤ sizeDi ]. When there is no more time slots assigned to any node, the transition labeled by SLP spontaneously fires up and C goes to the state Sleep. - Finally, when the cycle is finished ([y ≡ 1sec]), the transition labeled by the internal port END fires up. The Node Component Ni: Figure 3 describes the behav- ior and the set of ports of a node component. This component has five states namely; Start, Req, Stat, Data and Sleep , where Start is the initial state. All the nodes have the same behavior thus technically we can easily instantiate as many sensor nodes as needed. The behavior of a given Node component Ni can be described as follows: - First, in state Start, Ni fires up the transition labeled by RBi which corresponds to the receive beacon procedure of the S- TDMA protocol, and synchronizes its hardware clock value with the value of the global time clock y. - In state Req, Ni can make a request by firing up the transition labeled by the port SRi at its assigned time slot [t ≡ tsi]. - After sending all request frames, in state Stat, the node fires up the transition labeled by RSi to receive the scheduling information from the coordinator. - In state Data, Ni can send its data frame by firing up the transition labeled by SDi, in two cases; whether it has the first time slot in the scheduling information or when it has a successive granted time slots. In order to save energy, Ni can enter into sleep mode by firing up the transition labeled by SLPi and only wakes up to send data frame when the granted time slot is dedicated for it [t ≡ tsi] and so it executes the transition SDi from the state Sleep. - At last, Ni stays in state Sleep until the end of cycle [y ≡ 1sec] to fire up the transition labeled by the port ENDi. Note that, the coordinator, as well as all nodes are Radio devices, which means that they could be in 3 possible Radio modes namely; a Transmit mode denoted ”T”, a Receive mode ”R” and a Sleep mode ”S”. To model switching from one Ra- dio mode to another, we define the function Radio(M1, M2), with M1,M2 ∈ {”R”, ”T”, ”S”}. This function is called as an action in different transitions of the components behavior, where Radio(M1, M2) models the fact of switching each component’s radio transceiver from the mode M1 to the mode M2. Fig. 3. The Node component Ni behaviour The set of the model Connectors: In our model, the set of BIP components {C, {Ni}i∈[1..N]} interact using a set of BIP connectors namely {αB,{αRi }i∈[1..N],αS,{αDi }i∈[1..N]} (see Figure 1): - αB: a multiparty broadcast connector which connects the set of ports {SB, {RBi}i∈[1..N]}. This connector allows the coordinator to send the beacon frame to all nodes. Note that, as the port SB is a trigger port, the coordinator can fire the corresponding transition even though there is no sensor nodes ready to receive the beacon. Thus, we can guarantee the progress of our model. - {αRi }i∈[1..N]: a set of binary rendez-vous connectors con- necting each node Ni to the coordinator. Such a connector allows each node to send a request to the coordinator. Note that, when there is no data packets to send, each node Ni has to send a request through its associated connector αRi with a number of packets sizeRi equal to 0 . - αS: a multiparty broadcast connector which connects the set of ports {SS, {RSi}i∈[1..N]}. It describes the broadcast of the statistical frame sent from C to all the model’s nodes. - {αDi }i∈[1..N]: a set of binary rendez-vous connectors linking the port SDi of each node to the corresponding port RDi of
  • 5. the coordinator. It describes the transmission of data frame procedure by each node. V. FORMAL VERIFICATION AND EXPERIMENTAL RESULTS In this section, and given the already described model, we propose to formally verify a set of relevant properties of the S-TDMA protocol. To this end, we use the set of tools offered by BIP, in particular, we use RT-DFinder tool [13] to verify the property of deadlock-freedom. RT-DFinder is a compositional verification tool based on model-checking for the verification of safety properties such as invariants and deadlock-freedom. Note that, given a BIP model an automatically generated code is provided which means that further analysis could be performed at the execution level. So, in addition to the verification of properties at the model level, we also provide a set of experimental results such as energy consumption extracted at the execution level. Deadlock freedom: Using the RT-DFinder tool, we have proven the property of deadlock-freedom of our model to different numbers of sensor nodes at a high-level with no need to code generation. This is very interesting, when one wants to see how a given protocol may react in the context of more complex architectures and thus with more conflicts to manage without having to go into its implementation. Note that, the S-TDMA protocol has been validated only by executions on an implementation of a set of only 4 sensors [4]. Numerical results depicted in Figure 4, shows how the system complexity increases when increasing the number of sensor nodes. As our verification is based on model-checking, the verification has been exhaustive for all the considered possible configurations. Fig. 4. Verification time for detecting deadlocks Invariant Verification: We also propose to check Invariant properties for our model. Such properties are very important to check, in the case of real systems because they guarantee the respect of a set of time-constraints associated to system states. In particular, in the case of the S-TDMA protocol, a sensor node cannot stay in the state Data more than the assigned time-slot duration to send its data. Similarly, the coordinator cannot stay in states Req or Data more than the predefined time-slot duration. These invariant properties are formally described using Linear Temporal Logic (LTL) as follows : 1- AG (Datani =⇒ (tsDni ≤ 500)) 2- AG (Reqc =⇒ (tsReqc ≤ 500)) 3- AG (Datac =⇒ (tsDc ≤ 500)) The verification of these properties have been performed automatically and the verification time is depicted in Figure 5 for different models with different number of sensor nodes. Fig. 5. Verification time (ms) for Mutual-Exclusion and Invariant properties for S-TDMA Mutual exclusion: In a given protocol the mutual exclusion is a crucial property when a set of devices share a given resource. In particular, in the case of the S-TDMA protocol, all sensor nodes share the same channel. Thus mutual exclusion over the channel access has to be verified. For this purpose our model has to satisfy the following set of properties: - ∀i, j ∈ {1, ..., N}i=j , AG ¬(SRi ∧ SRj) - ∀i, j ∈ {1, ..., N}i=j , AG ¬(SDi ∧ SDj) Fairness: As the S-TDMA protocol is considered fair, the verification of fairness property is essential. Ensuring fairness by a protocol means that all sensor nodes will eventually get the channel access if they ask for it. Moreover, each node will eventually get as much frames to send as required. Table I gives the results related to the fairness property which are ob- tained based on a real-time execution of our S-TDMA model for N = 15. We compute for each node the number of access to the channel to send frames (data frames) for 10 minutes of real-time executions. Note that, in each cycle, for each node the number of required data frames namely sizeR is sent to the coordinator within the request frame. However, the number of effectively allocated data frames namely sizeD is known in the received statistical frame. So fairness of S-TDMA, consists of checking for each node whether sizeRi ≡ sizeDi. In Table I, we compute and compare for an arbitrary set of chosen nodes, the two variables sizeRi and sizeDi. The Results show that all chosen nodes get exactly as much allocated frames as required. Moreover, What is interesting in our model is that fairness property could be checked automatically using BIP Tools. To this end, fairness needs to be formally described using Temporal Logic as follows:
  • 6. i = 1 i = 5 i = 10 i = 15 sizeRi 25 10 15 0 sizeDi 25 10 15 0 TABLE I THE NUMBER OF REQUIRED AND ALLOCATED FRAMES FOR SEVERAL NODES IN DIFFERENT CYCLES AG (SRi =⇒ (SDi U (sizeRi == 0))) Energy analysis: WBANs have an additional interesting aspect: as sensor nodes are generally battery-operated, energy consumption is very important. The radio on a sensor node is usually the device that uses most energy. A radio device could have four possible modes: listen, transmit, receive and sleep, and each mode has a different energy consumption level. Note that the sleep mode has the lowest energy consumption (≈ Negligible). Protocol design for WBAN focuses on minimizing energy consumption. In the case of the S-TDMA protocol, the energy consumption depends on the time spent by each node in a given period, which can be active or inactive. More precisely, being in the active period for a given node, means that the 3 radio modes namely listen, transmit and receive are possible. However, the inactive period of the S-TDMA protocol corresponds to the sleep mode of a radio device. In our proposed model, using BIP tools, we can easily measure the exact time spent by each node in each mode in a real- time execution and thus compute the energy consumption of our model for any given configuration and scenarios. The energy consumption analysis performed in this work, takes into consideration 3 body states, namely: walking, running and falling down. Note that, energy consumption changes dynamically depending on the body state. In [5], authors give a proof that computing the time spent by each node in the inactive period is sufficient to have an approximation about the energy consumption of the protocol. Thus, in Figure 6, we compute for each body state the time spent in the inactive period. Fig. 6. Time spent in the inactive period depending on body states VI. CONCLUSION In this paper, we have proposed a high-level and a formal model for a well-known MAC protocol recently proposed for WBANs, namely the S-TDMA protocol. The proposed model provides a way to describe the protocol in an abstract and a high level manner which allows to easily analyze and verify different properties without having to implement them in a concrete system. Moreover, the model we have proposed is scalable as it has been defined for a network with N sensors and the set of verification experiments have been applied for different values of N. However, the only existing validation proposed for the S-TDMA protocol has been proposed for only 4 nodes. We have taken into account several timing aspects, to model the TDMA procedure, which makes our model easily extendable to different TDMA based protocols like the bodyMAC protocol or those presented in [15]. Different WBAN protocols, which are not necessarily based on TDMA could be also modeled and formally verified using the same methodology. REFERENCES [1] S. Borkar, “Design challenges of technology scaling,” IEEE micro, vol. 19, 1999. [2] R. S. Istepanian, E. Jovanov, and Y. Zhang, “Guest editorial introduction to the special section on m-health: Beyond seamless mobility and global wireless health-care connectivity,” IEEE Transactions on information technology in biomedicine, vol. 8, 2004. [3] D. Raskovic, T. Martin, and E. Jovanov, “Medical monitoring applica- tions for wearable computing,” The Computer Journal, vol. 47, 2004. [4] Z. Nie, Z. Li, R. Huang, Y. Liu, J. Li, and L. Wang, “A statistical frame based tdma protocol for human body communication.” BioMedical Engineering OnLine, vol. 14, 2015. [5] H. Chen, Z. Nie, K. Ivanov, L. Wang, and R. Liu, “A statistical mac protocol for heterogeneous-traffic human body communication,” in Circuits and Systems (ISCAS), 2013 IEEE International Symposium on, 2013, pp. 2275–2278. [6] A. Basu, M. Bozga, and J. Sifakis, “Modeling heterogeneous real-time components in BIP,” in SEFM, 2006, pp. 3–12. [7] N. Cho, J. Yoo, S.-J. Song, J. Lee, S. Jeon, and H.-J. Yoo, “The human body characteristics as a signal transmission medium for intrabody communication,” IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES, vol. 55, no. 5, 2007. [8] L. Chen, Z. Cao, R. Lu, X. Liang, and X. Shen, “EPF: an event- aided packet forwarding protocol for privacy-preserving mobile health- care social networks,” in Proceedings of the Global Communications Conference, GLOBECOM 2011, 2011, pp. 1–5. [9] R. P. Jetley, S. P. Iyer, and P. L. Jones, “A formal methods approach to medical device review,” IEEE Computer, vol. 39, no. 4, pp. 61–67, 2006. [10] P. Masci, A. Ayoub, P. Curzon, M. D. Harrison, I. Lee, and H. W. Thimbleby, “Verification of interactive software for medical devices: PCA infusion pumps and FDA regulation as an example,” in ACM SIGCHI Symposium on Engineering Interactive Computing Systems, 2013, pp. 81–90. [11] H. M. N. A. Hamadi, A. Gawanmeh, and M. Al-Qutayri, “A verification methodology for a wireless body sensor network functionality,” in Proceedings of IEEE-EMBS International Conference on Biomedical and Health Informatics, 2014, pp. 635–639. [12] T. Chen, Z. Yu, S. Li, and B. Chen, “From wireless sensor networks to wireless body area networks: Formal modeling and verification on security using PAT,” J. Sensors, pp. 8 797 568:1–8 797 568:11, 2016. [13] T. Abdellatif, J. Combaz, and J. Sifakis, “Model-based implementation of real-time applications,” in Proceedings of the tenth ACM international conference on Embedded software, 2010, pp. 229–238. [14] A. Astrin et al., “Ieee standard for local and metropolitan area networks part 15.6: Wireless body area networks: Ieee std 802.15. 6-2012,” The document is available at IEEE Xplore, 2012. [15] S. J. Marinkovic, E. M. Popovici, C. Spagnol, S. Faul, and W. P. Marnane, “Energy-efficient low duty cycle mac protocol for wireless body area networks,” IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 6, pp. 915–925, 2009.