CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Formal Specifications of Trusted OLSR Protocol of Ad hoc Network in Z

by Amandeep Verma, Manpreet Singh Gujral
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 2
Year of Publication: 2012
Authors: Amandeep Verma, Manpreet Singh Gujral
10.5120/4581-6500

Amandeep Verma, Manpreet Singh Gujral . Formal Specifications of Trusted OLSR Protocol of Ad hoc Network in Z. International Journal of Computer Applications. 37, 2 ( January 2012), 25-36. DOI=10.5120/4581-6500

@article{ 10.5120/4581-6500,
author = { Amandeep Verma, Manpreet Singh Gujral },
title = { Formal Specifications of Trusted OLSR Protocol of Ad hoc Network in Z },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 2 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 25-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number2/4581-6500/ },
doi = { 10.5120/4581-6500 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:23:16.368660+05:30
%A Amandeep Verma
%A Manpreet Singh Gujral
%T Formal Specifications of Trusted OLSR Protocol of Ad hoc Network in Z
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 2
%P 25-36
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad hoc Network is a network of mobile nodes operating in an infrastructure-less network. These nodes not have the defense rendered by firewalls in infrastructure-based networks. Trust oriented system aids to improvise this situation. So, the incorporation of trust in routing decisions yields a more secure and reliable framework for such type of networks. As if any suggested model does not achieve as projected, it is reduced quality of service. The validation before deployment of any model leads to a more stable model. A good way to confirm a model is to use formal specification and verification techniques. In the present study, with the aim to include trust component in conventional OLSR protocol of ad hoc network and also to rule out invalid actions, formal specifications of the various procedures of trusted OLSR Protocol are given using “Z” specification language. Z is a state-oriented formal specification language based on set theory and predicate logic. Z/EVES, a proof tool based on EVES and ZF set theory that supports the Z notation is used for the formal specifications.

References
  1. Bhalaji, N., Sivaramkrishnan, A. R., Banerjee, S., Sundar, V., and Shanmugam, A. “Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks” World Academy of Science, Engineering and Technology, pp. 1074-1079, 2009
  2. Camara, D., Loureiro, A. A. F., and Filali F., “Methodology for Formal Verification of Routing Protocols for Ad Hoc Wireless Networks”, In Proceedings of the IEEE Conference on Global Communications, pp. 705 – 709. 2007.
  3. Clausen, T. Ed., Jacquet, P. Ed., “Optimized Link State Routing Protocol (OLSR)”, IETF INTERNET DRAFT, RFC 3626, 2003.
  4. Fu, L., Sun, G. and Chen J. “An Approach for Component-Based Software Development” International Forum on Information Technology and Applications. Vol. 1, pp. 22-25, 2010.
  5. Ian Sommerville, “Software engineering”, Addison Wesley 7th edition 2004
  6. Nekkanti, R. K. and Lee, Chung-wei. “Trust Based Adaptive on Demand Ad Hoc Routing Protocol” In Proceedings of the ACM Southeast Regional Conference, pp. 88-93, 2004
  7. Shakeel A., Ramani, A. K. and Nazir A. Z. “Verifying Route Request Procedure of AODV Using Graph Theory and Formal Methods” International Journal On Applications Of Graph Theory In Wireless Ad Hoc Networks And Sensor Network. Vol. 2, No. 2, pp. 1-13. 2011.
  8. Spivey J M, “The Z Notation: A Reference Manual,” Prentice Hall, 1989.
  9. Stéphane, M. and Faitha, Z., “Testing Methodology for an Ad Hoc Routing Protocol”, Proceedings of the ACM international workshop on Performance monitoring, measurement, and evaluation of heterogeneous wireless and wired networks, pp. 48-55, 2006.
  10. Švec, J. and Zahradník, J., “Formal Specification in “Z” Language By Software Z/Eves”, International Journal on Advances in Electrical and Electronic Engineering, pp. 166-168.
  11. Verma, A. and Gujral, M. S., “Impact of Trust Usage in Routing, Authentication and Access Control of Adhoc Network”, International Journal of Advance in Communication Engineering, Vol. 2, No.1, pp. 1-7, 2010
  12. Verma, A., “Formal Verification of Ad Hoc Network Routing Protocols”, International Journal of Advanced Research in Computer Science”, Vol 2, No. 4, pp. 526 -530, July-August 2011.
  13. Verma, A. and Gujral, M S , “Performance Analysis of Routing Protocols for Ad hoc Networks”, International Journal of Computer Science and Emerging Technologies, , Vol 2, No. 4, pp. 484 – 487 , August 2011
  14. Woodcock, J. and Davies, J., “UsingZ: Specification, Refinement and Proof”, www.cs.cmu.edu/~15819/zedbook.pdf
  15. Z/EVES Reference manual, http://www.oracanada.com/pub/doc/97-5493-03d.pdf
Index Terms

Computer Science
Information Sciences

Keywords

Ad hoc Network Formal Specification OLSR Z Specification Language Z Eves