Title: Formal probabilistic performance verification of randomly-scheduled wireless sensor networks

Authors: Maissa Elleuch; Osman Hasan; Sofiène Tahar; Mohamed Abid

Addresses: CES Laboratory, National School of Engineers of Sfax, Sfax University, Soukra Street, 3052 Sfax, Tunisia; Digital Research Center of Sfax, Technopark of Sfax, Sfax, Tunisia ' Department of Electrical and Computer Engineering, Concordia University, 1455 de Maisonneuve W., Montreal, Quebec, H3G 1M8, Canada ' Department of Electrical and Computer Engineering, Concordia University, 1455 de Maisonneuve W., Montreal, Quebec, H3G 1M8, Canada ' CES Laboratory, National School of Engineers of Sfax, Sfax University, Soukra Street, 3052 Sfax, Tunisia

Abstract: Energy efficiency in wireless sensor networks (WSN) is one of the most critical issue regardless of the target application. While scheduling sensors by partitions to preserve energy is a simple and intuitive approach in this context, it is also important to not compromise on the main performance requirements of the considered application. For mission-critical WSN applications, different quality of service (QoS) requirements on network performance have to be met. Besides, various assumptions, may effectively impact the sensing performance capabilities of the network. Nevertheless, most analysis techniques focus on the average performance values, and do not consider neither the targeted QoS requirements, nor the probabilistic feature of the algorithm. Based on the theorem proving approach, we first provide, in this paper, an accurate formal analysis of the network lifetime maximisation problem, under QoS constraints, for randomly-scheduled wireless sensor networks. After that, we tackle the higher-order-logic formalisation of the intrusion coverage intensity, for a modified version of the randomised scheduling, with more realistic assumptions for the intrusion object, in a two or three dimensional plane.

Keywords: theorem proving; wireless sensor networks; WSN; node scheduling; performance analysis; network lifetime; intrusion coverage.

DOI: 10.1504/IJCCBS.2018.096438

International Journal of Critical Computer-Based Systems, 2018 Vol.8 No.3/4, pp.311 - 339

Available online: 22 Nov 2018 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article