期刊文献+

无线传感器网络的协议再工程与方法研究 被引量:1

Wireless sensor network protocol reengineering and methodology
下载PDF
导出
摘要 基于协议工程和软件再工程的相关概念,提出一种针对无线传感器网络协议定制行为的规范化工作流程,命名为协议再工程。阐明了协议再工程产生的背景、定义、生命周期和工作流程;同时提出一种将统一建模语言和着色Petri网的U-CPN相集成的方法,用于协议再工程中的形式化描述模型的建立与验证,并对U-CPN和统一建模语言模型的等价性作出了基于网射的证明。最后,通过一个Zigbee相关的实例表明,在U-CPN方法基础上使用协议再工程指导协议修改,在可控性和描述力上具有优势,尤其加强了协议再工程中的形式化分析能力,可以很好地保证协议的修改质量。 A novel concept named protocol reengineering was proposed by integrating the fields of Protocol Engineering (PE) and Software Reengineering (SRE), aiming to normalize the process of customization in the existing Wireless Sensor Networks (WSN) protocols. The preliminary knowledge about protocol reengineering like background, definition, lifecycle as well as the workflow were discussed firstly. And the methodology named U-CPN, which combined Unified Model Language (UML) with Colored Petri Network (CPN), was presented to formalize the modeling and analysis of reengineered protocols. Meanwhile, the equality between U-CPN and UML model was proved based on network morphism. Finally, a Zigbee-related case showed that the process of protocol customization, if guided by protocol reengineering and working with U-CPN, could improve controllability, intuition, and especially the strength of formal analysis, which guaranteed the quality of modified protocol as well.
出处 《计算机集成制造系统》 EI CSCD 北大核心 2008年第6期1236-1243,共8页 Computer Integrated Manufacturing Systems
基金 电子信息产业发展基金资助项目(财建[2006]549,信部运[2006]634)。~~
关键词 协议工程 协议再工程 协议逆向工程 统一建模语言 着色PETRI网 无线传感器网络 protocol engineering protocol reengineering protocol reverse engineering unified model language colored Petri net wireless sensor network
  • 相关文献

参考文献8

  • 1HOLZMANN G J. Protocol design: redefining the state of the art[J]. IEEE Software, 1992,9(1) : 17-22.
  • 2GUNAWAN E, TAN T P, SHIN. Survey of formal description techniques (FDTs) for protocol converter design [C]// Proceedings of IEEE Region 10 Conference on Computer, Communieatlon, Control and Power Engineering. Los Alamitos, Cal., USA~ IEEE Computer Society, 1993..422-425.
  • 3AKYILDIZ I F, CAYIRCI E. A survey on sensor networks [J]. IEEE Communieations Magazine, 2002,40(8): 102-114.
  • 4LEE M J, ZHENG J L, KO Y , et al. Emerging standards for wireless mesh technology [ J ]. IEEE Wireless Communications,2006, 13(2): 56-63.
  • 5JARZABEK S. Software reengineering for reusability[C]// Proceedings of the 17th Annual International Computer Software and Applications Conference. Los Alamitos, Cal. , USA: IEEE, 1993 : 100-106.
  • 6SALDHANA A, SHATZ S M. UML diagrams to object Petri net models., an approach for modeling and analysis[C]//Proceedings of the 12th International Conference on Software Engineering and Knowledge Engineering. Amsterdam, The Netherlands: SEKE2000, 2000 : 103-110.
  • 7CPN Group, University of Aarhus. CPNTools community online[EB/OL]. (2006-09-03)[2006-12-01]. http://www. daimi. au. dk/CPNTools.
  • 8SHENG Fu. Tsurrel, Open Zigbee protocol, ZigBuzz [ EB/ OL]. (2007-01-02) [2007-05-05]. http://sourceforge. net/ projects/zigbuzz/.

同被引文献17

  • 1熊志强,黄佳庆,刘威,杨宗凯.无线网络编码综述[J].计算机科学,2007,34(3):6-9. 被引量:23
  • 2Ahlswede R,Cai Ning, Li Shuo yen, et al. Network information flow[J]. IEEE Transactions on Information Theory, 2000, 46 (4) : 1204-1216.
  • 3Kienle H M, MiJller H A. Rigi An environment for software reverse engineering,exploration,visualization,and redocumenta- tion[J]. Science of Computer Programming, 2010, 75 (4) : 247- 263.
  • 4Zhou Hui,Du Wen-cai. How Network Reverse Engineering Dif- fers from Sottware Reverse Engineering[J]. Wireless Communi- cations and Applications , 2012,72 (1) : 33-43.
  • 5Wondracek G, Comparetti M P, Kruegel C, et al. Automatic net- work protocol analysis [C] // Proceedings of the Network and Distributed System Security Symposium, 2008. San Diego, Cali- fornia, USA, 2008.
  • 6Cui Wei-dong, Kannan J, Wang H J. Discoverer: automatic pro- tocol reverse engineering from network traces[C]//SS' 07 Pro- ceedings of 16th USENIX Security Symposium on USENIX Se- curity Symposium, 2007. CA, USA, 2007.
  • 7Antunes J, Neves N, Verissimo P. Reverse Engineering of Proto- cols from Network Traces[C]//2011 18th Working Conference on Reverse Engineering (WCRE). Limerick, Ireland:IEEE, 2011:169-178.
  • 8Pamela S, Suzanne S. Law and Economics of Reverse Enginee- ring[J]. Yale Law Journal, 2002,111 (7) : 1575-1664.
  • 9Madison M J. Some Optimism About Fair Use and Copyright Law[J]. Journal of the Copyright Society of the USA, 2010,57 (3) ,351-370.
  • 10陶少国,黄佳庆,杨宗凯,乔文博,熊志强.网络编码研究综述[J].小型微型计算机系统,2008,29(4):583-592. 被引量:39

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部