Skip to main content
Log in

A formal analysis of bluetooth device discovery

  • Special Section on Quantitative Analysis of Real-time Embedded Systems
  • Published:
International Journal on Software Tools for Technology Transfer Aims and scope Submit manuscript

Abstract

This paper presents a formal analysis of the device discovery phase of the Bluetooth wireless communication protocol. The performance of this process is the result of a complex interaction between several devices, some of which exhibit random behaviour. We use probabilistic model checking and, in particular, the tool PRISM to compute the best- and worst-case performance of device discovery: the expected time for the process to complete and the expected power consumption. We illustrate the utility of performing an exhaustive, low-level analysis to produce exact results in contrast to simulation techniques, where additional probabilistic assumptions must be made. We demonstrate an example of how seemingly innocuous assumptions can lead to incorrect performance estimations. We also analyse the effectiveness of improvements made between versions 1.1 and 1.2 of the Bluetooth specification.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Bahar I., Frohm E., Gaona C., Hachtel G., Macii E., Pardo A., Somenzi F. (1997) Algebraic decision diagrams and their applications. Form. Methods Syst. Des.10(2/3): 171–206

    Article  Google Scholar 

  2. Basagni, S., Bruno, R., Petrioli, C.: Device discovery in Bluetooth networks: scatternet perspective. In: Proceedings of Networking 2002, LNCS, vol. 2345, pp. 1087–1092. Springer, Berlin Heidelberg NewYork (2002)

  3. BlueHoc—an open-source Bluetooth simulator.http://www-124.ibm.com/developerworks/opensource/bluehoc

  4. Bluetooth specification, version 1.2, Bluetooth SIG,http://www.bluetooth.com (2003)

  5. Bryant, R.: Binary decision diagrams and beyond: enabling technologies for formal verification. In: Proceedings of International Conference on Computer-Aided Design (ICCAD’95), pp. 236–243 (1995)

  6. Clarke E., Fujita M., McGeer P., McMillan K., Yang J., Zhao X. (1997) Multi-terminal binary decision diagrams: an efficient data structure for matrix representation. Form. Methods Syst. Des. 10(2/3): 149–169

    Article  Google Scholar 

  7. Daws C., Kwiatkowska M., Norman G. (2004) Automatic verification of the IEEE 1394 root contention protocol with KRONOS and PRISM. Int. J. Softw. Tools Technol. Transf. 5(2–3): 221–236

    Article  Google Scholar 

  8. Duflot, M., Fribourg, L., Hérault, T., Lassaigne, R., Magniette, F., Messika, S., Peyronnet, S., Picaronny, C.: Probabilistic model checking of the CSMA/CD protocol using PRISM and APMC. In: Proceedings of the 4th Workshop on Automated Verification of Critical Systems (AVoCS’04). Electronic Notes in Theoretical Computer Science, vol. 128(6), pp. 195–214. Elsevier, Amsterdam (2004)

  9. Kasten, O., Langheinrich, M.: First experiences with Bluetooth in the Smart its distributed sensor network. In: Proceedings of PACT’01 (2001)

  10. Kwiatkowska, M., Norman, G.: Verifying randomized Byzantine agreement. In: Peled, D., Vardi, M. (eds.) Proceedings of Formal Techniques for Networked and Distributed Systems (FORTE’02). LNCS, vol. 2529, pp. 194–209. Springer, Berlin Heidelberg NewYork (2002)

  11. Kwiatkowska, M., Norman, G., Parker, D.: Controller dependability analysis by probabilistic model checking. In: Proceedings of the 11th IFAC Symposium on Information Control Problems in Manufacturing (INCOM’04) (2004)

  12. Kwiatkowska, M., Norman, G., Parker, D.: PRISM 2.0: a tool for probabilistic model checking. In: Proceedings of 1st International Conference on Quantitative Evaluation of Systems (QEST’04), pp. 322–323. IEEE Computer Society Press, Los Alamites(2004)

  13. Kwiatkowska M., Norman G., Parker D., Sproston J. (2003). Performance analysis of probabilistic timed automata using digital clocks. In: Larsen K., Niebert P. (eds). Proceedings Formal Modeling and Analysis of Timed Systems (FORMATS’03). LNCS, vol. 2791, Springer, Berlin Heidelberg NewYork, pp. 105–120

    Google Scholar 

  14. Kwiatkowska M., Norman G., Segala R. (2001). Automated verification of a randomized distributed consensus protocol using Cadence SMV and PRISM. In: Berry G., Comon H., Finkel A. (eds). Proceedings of 13th International Conference on Computer Aided Verification (CAV’01). LNCS, vol. 2102, Springer, Berlin Heidelberg NewYork, pp. 194–206

    Google Scholar 

  15. Kwiatkowska, M., Norman, G., Sproston, J.: Probabilistic model checking of the IEEE 802.11 wireless local area network protocol. In: Hermanns, H., Segala, R. (eds.) Proceedings of 2nd Joint International Workshop on Process Algebra and Probabilistic Methods, Performance Modeling and Verification (PAPM/PROBMIV’02). LNCS, vol. 2399, pp. 169–187. Springer, Berlin Heidelberg NewYork (2002)

  16. Kwiatkowska M., Norman G., Sproston J. (2003) Probabilistic model checking of deadline properties in the IEEE 1394 FireWire root contention protocol. Form. Asp. Comput. 14(3): 295–318

    Article  Google Scholar 

  17. Kwiatkowska M., Norman G., Sproston J., Wang F. (2004). Symbolic model checking for probabilistic timed automata. In: Lakhnech Y., Yovine S. (eds). Joint Conference on Formal Modelling and Analysis of Timed Systems (FORMATS) and Formal Techniques in Real-Time and Fault Tolerant Systems (FTRTFT). LNCS, vol. 3253, Springer,Berlin Heidelberg NewYork, pp. 293–308

    Google Scholar 

  18. Norman G., Parker D., Kwiatkowska M., Shukla S. (2005) Evaluating the reliability of NAND multiplexing with PRISM. IEEE Trans. Comput.Aided Des. Integr. Circuits Syst. 24(10): 1629–1637

    Article  Google Scholar 

  19. Norman G., Parker D., Kwiatkowska M., Shukla S., Gupta R. (2005) Using probabilistic model checking for dynamic power management. Form. Asp. Comput. 17(2): 160–176

    Article  Google Scholar 

  20. Norman G., Shmatikov V. (2003). Analysis of probabilistic contract signing. In: Abdallah A., Ryan P., Schneider S. (eds). Proceedings of BCS-FACS Formal Aspects of Security (FASec’02). LNCS, vol. 2629, Springer,Berlin Heidelberg NewYork, pp. 81–96

    Google Scholar 

  21. ns-2: the Network Simulator. www.isi.edu/nsmam/ns

  22. Peterson, B., Baldwin, R., Kharoufeh, J.: A specification-compatible Bluetooth inquiry simplification. In: Procecdings of Hawaii International Conference on System Sciences (HICSS’04) (2004)

  23. PRISM Web site. www.cs.bham.ac.uk/~dxp/prism

  24. Roy, A., Gopinath, K.: Improved probabilistic models for 802.11 protocol verification. In: Procecdings of the 17th International Conference on Computer Aided Verification (CAV’05). LNCS, vol. 3576, pp. 239–252. Springer,Berlin Heidelberg NewYork (2005)

  25. Rutten J., Kwiatkowska M., Norman G., Parker D. (2004) Mathematical Techniques for analyzing concurrent and probabilistic systems, Panangaden, P., van Breugel,F. (eds.) CRM Monograph Series, vol. 23. American Mathematical Society, NewYork

  26. Salonidis, T., Bhagwat, P., Tassiulas, L., LaMaire, R.: Proximity awareness and ad hoc network establishment in Bluetooth. Technical Report TR 2001-10. Institute of Systems Research, University of Maryland (2001)

  27. Shmatikov V. (2004) Probabilistic model checking of an anonymity system. J. Comput. Secur. 12(3/4): 355–377

    Google Scholar 

  28. Siegemund F., Rohs M. (2002). Rendezvous layer protocols for Bluetooth-enabled smart devices. In: Proceedings of the Conference on Architecture of Computing Systems—Trends in Network and Pervasive Computing (ARCS’02). Springer, Berlin Heidelberg NewYork

  29. Záruba, G., Gupta, V.: Simplified Bluetooth device discovery—analysis and simulation. In: Proceedings of the Hawaii International Conference on System Sciences (HICSS’04) (2004)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marie Duflot.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Duflot, M., Kwiatkowska, M., Norman, G. et al. A formal analysis of bluetooth device discovery. Int J Softw Tools Technol Transfer 8, 621–632 (2006). https://doi.org/10.1007/s10009-006-0014-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10009-006-0014-x

Keywords

Navigation