The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Background/Objectives: In the modern age, there is a need of wireless network protocols verification using suitable techniques and tools to meet the security challenges in Wireless Ad-Hoc sensor networks. Methods/Statistical Analysis: For verification of system like ZigBee protocol stack, formal methods are being used. The latest formal verification method called Event-B is used now a day to frame a model for verification of different wireless security protocols like IEEE 802.11 and IEEE 802.15.4. Findings: To describe specific properties in a suitably rich mathematical logic such as first order logic, we need to limit this expressiveness if we are to automatically verify a property. To verify any system properties, temporal logic are used for safety, correctness, reliability in wireless security protocols. In this paper we developed a model/ framework in Event-B for the formal verification of ZigBee protocol and simulate it using RODIN tool. In this framework, models are specified, analyzed and verified by using formal methods. Application/Improvements: This framework leads toward more secure and reliable model having no inconsistencies in ZigBee.

Keywords

Drawn from Title, 5-6 Words, Word Representing the Work, Formal Model, Network Authentication, Secure Communication, Verification of ZigBee, Wireless Protocol.
User