they are compliant with Enabler Test Specification for
Lightweight M2M (v1.0). Then, it is proved that both
models are synchronized using the concept of weak
bisimulation. The considered behavioral models of
LwM2M server and client are at a very abstract level.
In our work, we provided a formal semantics for
the LwM2M protocol by using Event-B method. We
analyzed and verified the behavior of LwM2M client
with The Rodin tool and the ProB model checker. We
intend to generate automatically the code from the
Event-B models that we have defined for the LwM2M
protocol.
6 CONCLUSION
To better understand and trust the LwM2M enabler,
formally derived and verified models should be de-
fined. In this paper, we presented an approach of
modelisation and verification for the specification of
the IOT systems by exploiting the OMA lightweight
M2M enabler. We focused on the behavior of the
LwM2M client. We followed a refinement-based ap-
proach by building several formal models by using
the Event-B method. Indeed, we proposed systematic
rules for the translation of the LwM2M enabler to-
ward Event-B. The refinement-based approach allows
us to master the complexity of the model and facili-
tates the proof and the correction of the sub-models.
The proof of the correctness of models, and the check-
ing of consistency properties are made with the pow-
erful tools of the Event-B platform.
We are conducting more experimentations on
modelling with Event-B. We project to define an ap-
proach for providing code generation. A possible
perspective consists to consider the modelisation of
LwM2M server side and then to consider both sides
(client and server). In the latest case, the checking
of the compatibility between client and server must
be established. Our future work will focus on valida-
tion, which includes running scenarios in the form of
model acceptance test.
REFERENCES
A. Nikolov, E. P. and Atanasov, I. (2016). Formal veri-
fication of connectivity management models in m2m
communications. In 2016 IEEE International Black
Sea Conference on Communications and Networking
(BlackSeaCom), pages 1–4.
Abrial, J.-R. (2010). Modeling in Event-B: System and Soft-
ware Engineering. Cambridge University Press, 1st
edition.
Aziz, B. (2014). A formal model and analysis of the
mq telemetry transport protocol. In Ninth Interna-
tional Conference, Availability, Reliability and Secu-
rity (ARES), pages 59–68, Fribourg.
Che, X. and Maag, S. (2013). A passive testing approach for
protocols in internet of things. In Green Computing
and Communications (GreenCom), IEEE and Inter-
net of Things (iThings/CPSCom), IEEE International
Conference on and IEEE Cyber, Physical and Social
Computing, pages 678–684.
de C. Silva, J., Rodrigues, J. J. P. C., Al-Muhtadi, J., Rab
ˆ
elo,
R. A. L., and Furtado, V. (2019). Management plat-
forms and protocols for internet of things: A survey.
Sensors, 19(3):676.
Diwan, M. and D’Souza, M. (2017). A framework for mod-
eling and verifying iot communication protocols. In
Dependable Software Engineering. Theories, Tools,
and Applications, SETTA 2017, volume 10606 of
LNCS, pages 266–280. Springer.
Open Mobile Alliance (2018a). Lightweight machine to
machine technical specification: Core.
Open Mobile Alliance (2018b). Lightweight machine to
machine technical specification: Transport layer.
Said, M. Y., Butler, M., and Snook, C. (2015). A method of
refinement in uml-b. Softw. Syst. Model., 14(4):1557–
1580.
Schmelzer, P. and Akelbein, J.-P. (2019). Evaluation
of hardware requirements for device management of
constrained nodes based on the lwm2m standard. In
Proceedings of the 5th Collaborative European Re-
search Conference (CERC 2019), pages 103–110.
Snook, C. (2014). iUML-B statemachines. In Proceed-
ings of the Rodin Workshop 2014, SE’08, pages 29–
30, Toulouse, France.
Snook, C. and Butler, M. (2006). Formal modeling and de-
sign aided by UML. ACM Transactions on Software
Engineering and Methodology (TOSEM), 15(1):92–
122.
Snook, C. F., Hoang, T. S., and Butler, M. J. (2017).
Analysing security protocols using refinement in
iuml-b. In NASA Formal Methods - 9th International
Symposium, NFM 2017, volume 10227 of LNCS,
pages 84–98. Springer.
Thangavel, D., Ma, X., Valera, A., Tan, H., and Tan, C. K.
(2014). Performance evaluation of mqtt and coap via
a common middleware. In 2014 IEEE Ninth Interna-
tional Conference on Intelligent Sensors, Sensor Net-
works and Information Processing (ISSNIP), pages 1–
6. IEEE Press.
Thramboulidis, K. and Christoulakis, F. (2016). UML4IoT
- A UML-based approach to exploit IoT in cyber-
physical manufacturing systems. Computers in Indus-
try, 82:259–272.
Toward a Correct Implementation of LwM2M Client with Event-B
179