TUHH Open Research
Help
  • Log In
    New user? Click here to register.Have you forgotten your password?
  • English
  • Deutsch
  • Communities & Collections
  • Publications
  • Research Data
  • People
  • Institutions
  • Projects
  • Statistics
  1. Home
  2. TUHH
  3. Publication References
  4. KleeNet: Discovering insidious interaction bugs in wireless sensor networks before deployment
 
Options

KleeNet: Discovering insidious interaction bugs in wireless sensor networks before deployment

Publikationstyp
Conference Paper
Date Issued
2010-07-16
Sprache
English
Author(s)
Sasnauskas, Raimondas
Landsiedel, Olaf  
Alizai, Muhammad Hamad  
Weise, Carsten
Kowalewski, Stefan
Wehrle, Klaus  
TORE-URI
https://hdl.handle.net/11420/53938
Start Page
186
End Page
196
Citation
Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks: 186-196 (2010)
Contribution to Conference
9th International Conference on Information Processing in Sensor Networks, IPSN 2010  
Publisher DOI
10.1145/1791212.1791235
Scopus ID
2-s2.0-77954523986
Publisher
ACM
ISBN
9781605589886
Complex interactions and the distributed nature of wireless sensor networks make automated testing and debugging before deployment a necessity. A main challenge is to detect bugs that occur due to non-deterministic events, such as node reboots or packet duplicates. Often, these events have the potential to drive a sensor network and its applications into corner-case situations, exhibiting bugs that are hard to detect using existing testing and debugging techniques. In this paper, we present KleeNet, a debugging environment that effectively discovers such bugs before deployment. KleeNet executes unmodified sensor network applications on symbolic input and automatically injects non-deterministic failures. As a result, KleeNet generates distributed execution paths at high-coverage, including low-probability corner-case situations. As a case study, we integrated KleeNet into the Contiki OS and show its effectiveness by detecting four insidious bugs in the μIP TCP/IP protocol stack. One of these bugs is critical and lead to refusal of further connections.
Subjects
automated protocol testing | experimentation | failure detection | wireless sensor networks
DDC Class
005: Computer Programming, Programs, Data and Security
TUHH
Weiterführende Links
  • Contact
  • Send Feedback
  • Cookie settings
  • Privacy policy
  • Impress
DSpace Software

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science
Design by effective webwork GmbH

  • Deutsche NationalbibliothekDeutsche Nationalbibliothek
  • ORCiD Member OrganizationORCiD Member Organization
  • DataCiteDataCite
  • Re3DataRe3Data
  • OpenDOAROpenDOAR
  • OpenAireOpenAire
  • BASE Bielefeld Academic Search EngineBASE Bielefeld Academic Search Engine
Feedback