Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/4387
Title: | Formal frameworks for protocol behavior in mobile and embedded systems |
Researcher: | Poroor, Jayaraj |
Guide(s): | Bharat, Jayaraman Ramachandra, Kaimal |
Keywords: | Computer Science mobile and embedded systems |
Upload Date: | 22-Aug-2012 |
University: | Amrita Vishwa Vidyapeetham (University) |
Completed Date: | May 2012 |
Abstract: | We investigate formal frameworks for de_ning and analyzing the behavior of network protocols in mobile and embedded systems. Such systems are typically networked for the purposes of remote monitoring and control. Hence understanding and analyzing their protocol behavior becomes important. Moreover, formal approaches are necessitated since such devices often perform safety-critical functions such as medical drug-delivery or automotive control. The protocol behavior in mobile and embedded systems are de_ned by the three distinct phases of their implementation, namely, speci_cation, construction, and embedded execution. Developing formal approaches covering these three phases are, therefore, important for establishing robust protocol behavior. Hence, the main contributions of the thesis are three-fold: (1) A new language _Z is introduced that o_ers a principled combination of mobile channels of the _-calculus and stateful abstract types of the Z language. We de_ne formal semantics of the _Z language and establish important properties of the semantics. The _Z language can be used for specifying a number of problems in mobile embedded systems and we illustrate its use with the speci_cation of the hidden node problem in wireless networks. (2) A novel veri_cation technique called split veri_cation is introduced for verifying security properties of protocol stacks constructed in a subset of C++. The split veri_cation is a strategy for verifying security properties wherein tactical operation-level properties are expressed as data re_nement conditions and veri_ed using theorem-proving and global control ow properties are expressed using temporal logic and veri_ed using model-checking. (3) A novel analysis method for the performance of protocol stacks, based on the notion of operation traces, is introduced for analyzing the performance of real-time protocol stacks under contention-based attacks. We also introduce metrics to evaluate the performance based on the operation trace concept. |
Pagination: | 115p. |
URI: | http://hdl.handle.net/10603/4387 |
Appears in Departments: | Department of Computer Science and Engineering (Amrita School of Engineering) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 258.69 kB | Adobe PDF | View/Open |
02_certificate.pdf | 255.28 kB | Adobe PDF | View/Open | |
03_declaration.pdf | 21.86 kB | Adobe PDF | View/Open | |
04_dedication.pdf | 14.3 kB | Adobe PDF | View/Open | |
05_contents.pdf | 32.1 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 32.24 kB | Adobe PDF | View/Open | |
07_list of figures.pdf | 48.94 kB | Adobe PDF | View/Open | |
08_abstract.pdf | 30.58 kB | Adobe PDF | View/Open | |
09_chapter 1.pdf | 828.21 kB | Adobe PDF | View/Open | |
10_chapter 2.pdf | 146.83 kB | Adobe PDF | View/Open | |
11_chapter 3.pdf | 329.92 kB | Adobe PDF | View/Open | |
12_chapter 4.pdf | 199.15 kB | Adobe PDF | View/Open | |
13_chapter 5.pdf | 1.25 MB | Adobe PDF | View/Open | |
14_chapter 6.pdf | 41.16 kB | Adobe PDF | View/Open | |
15_bibliography.pdf | 74.8 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: