{"title":"两种真实WSN应用中可靠MAC协议的综合研究","authors":"Evgeny Osipov, Laurynas Riliskis","doi":"10.1109/BCFIC-RIGA.2011.5733217","DOIUrl":null,"url":null,"abstract":"Currently, when matter comes to engineer a communication system for a new WSN application with a unique set of dependability requirements, the developer should undergo a lengthy process of analysing the existing solutions in order to select appropriate functionality. In this article we argue that because of variety of wireless sensor network applications there is a clear need for a systematic approach to develop application-tailored communication solutions. The core of this methodology constitute functional components with known reliability and security properties and the rules of combining these components in a communication system. On the example of engineering MAC protocol for two real world applications, we demonstrate a line of dependable reasoning and identify components satisfying the dependability requirements of the applications.","PeriodicalId":428618,"journal":{"name":"2011 Baltic Congress on Future Internet and Communications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"On synthesis of dependable MAC protocol for two real-world WSN applications\",\"authors\":\"Evgeny Osipov, Laurynas Riliskis\",\"doi\":\"10.1109/BCFIC-RIGA.2011.5733217\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Currently, when matter comes to engineer a communication system for a new WSN application with a unique set of dependability requirements, the developer should undergo a lengthy process of analysing the existing solutions in order to select appropriate functionality. In this article we argue that because of variety of wireless sensor network applications there is a clear need for a systematic approach to develop application-tailored communication solutions. The core of this methodology constitute functional components with known reliability and security properties and the rules of combining these components in a communication system. On the example of engineering MAC protocol for two real world applications, we demonstrate a line of dependable reasoning and identify components satisfying the dependability requirements of the applications.\",\"PeriodicalId\":428618,\"journal\":{\"name\":\"2011 Baltic Congress on Future Internet and Communications\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-03-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 Baltic Congress on Future Internet and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BCFIC-RIGA.2011.5733217\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Baltic Congress on Future Internet and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BCFIC-RIGA.2011.5733217","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On synthesis of dependable MAC protocol for two real-world WSN applications
Currently, when matter comes to engineer a communication system for a new WSN application with a unique set of dependability requirements, the developer should undergo a lengthy process of analysing the existing solutions in order to select appropriate functionality. In this article we argue that because of variety of wireless sensor network applications there is a clear need for a systematic approach to develop application-tailored communication solutions. The core of this methodology constitute functional components with known reliability and security properties and the rules of combining these components in a communication system. On the example of engineering MAC protocol for two real world applications, we demonstrate a line of dependable reasoning and identify components satisfying the dependability requirements of the applications.