{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:42:49Z","timestamp":1765546969482,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031150074"},{"type":"electronic","value":"9783031150081"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15008-1_12","type":"book-chapter","created":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T23:02:47Z","timestamp":1662332567000},"page":"172-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Model-Based Testing of\u00a0Internet of\u00a0Things Protocols"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9333-3917","authenticated-orcid":false,"given":"Xavier Manuel van","family":"Dommelen","sequence":"first","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Machiel van der","family":"Bijl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Andy","family":"Pimentel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocab":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,9,5]]},"reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"727","DOI":"10.1007\/978-3-319-47169-3_55","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications","author":"A Ahmad","year":"2016","unstructured":"Ahmad, A., Bouquet, F., Fourneret, E., Le Gall, F., Legeard, B.: Model-based testing as a service for IoT platforms. In: Margaria, T., Steffen, B. (eds.) ISoLA 2016. LNCS, vol. 9953, pp. 727\u2013742. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47169-3_55"},{"doi-asserted-by":"crossref","unstructured":"Al-Sarawi, S., Anbar, M., Alieyan, K., Alzubaidi, M.: Internet of things (IoT) communication protocols. In: 2017 8th International Conference on Information Technology (ICIT), pp. 685\u2013690. IEEE (2017)","key":"12_CR2","DOI":"10.1109\/ICITECH.2017.8079928"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1016\/j.adhoc.2015.05.013","volume":"36","author":"B Aziz","year":"2016","unstructured":"Aziz, B.: A formal model and analysis of an IoT protocol. Ad Hoc Netw. 36, 49\u201357 (2016)","journal-title":"Ad Hoc Netw."},{"doi-asserted-by":"crossref","unstructured":"Bernard, E., et al.: Model-based testing from UML models. INFORMATIK 2006-Informatik f\u00fcr Menschen-Band 2, Beitr\u00e4ge der 36. Jahrestagung der Gesellschaft f\u00fcr Informatik eV (GI) (2006)","key":"12_CR4","DOI":"10.1007\/s00287-005-0055-7"},{"issue":"2","key":"12_CR5","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/2697399","volume":"58","author":"RV Binder","year":"2015","unstructured":"Binder, R.V., Legeard, B., Kramer, A.: Model-based testing: where does it stand? Commun. ACM 58(2), 52\u201356 (2015)","journal-title":"Commun. ACM"},{"unstructured":"Bluetooth SIG: Core specification 4.2 (2014). https:\/\/www.bluetooth.com\/specifications\/specs\/core-specification-4-2\/. Accessed 28 June 2021","key":"12_CR6"},{"key":"12_CR7","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1007\/978-981-13-1056-0_61","volume-title":"Information Science and Applications 2018","author":"M Bures","year":"2019","unstructured":"Bures, M., Cerny, T., Ahmed, B.S.: Internet of things: current challenges in the quality assurance and testing methods. In: Kim, K.J., Baek, N. (eds.) ICISA 2018. LNEE, vol. 514, pp. 625\u2013634. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-1056-0_61"},{"doi-asserted-by":"crossref","unstructured":"Dalal, S.R., et al.: Model-based testing in practice. In: Proceedings of the 21st International Conference on Software Engineering, pp. 285\u2013294 (1999)","key":"12_CR8","DOI":"10.1145\/302405.302640"},{"doi-asserted-by":"crossref","unstructured":"Dias Neto, A.C., Subramanyan, R., Vieira, M., Travassos, G.H.: A survey on model-based testing approaches: a systematic review. In: Proceedings of the 1st ACM International Workshop on Empirical Assessment of Software Engineering Languages and Technologies: Held in Conjunction with the 22nd IEEE\/ACM International Conference on Automated Software Engineering (ASE) 2007, pp. 31\u201336 (2007)","key":"12_CR9","DOI":"10.1145\/1353673.1353681"},{"unstructured":"Elnashar, A.: IoT evolution towards a super-connected world. arXiv preprint arXiv:1907.02589 (2019)","key":"12_CR10"},{"unstructured":"Ergen, S.C.: ZigBee\/IEEE 802.15.4 summary. UC Berkeley, 10 September 2004","key":"12_CR11"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-31848-4_1","volume-title":"Formal Approaches to Software Testing","author":"L Frantzen","year":"2005","unstructured":"Frantzen, L., Tretmans, J., Willemse, T.A.C.: Test generation based on symbolic specifications. In: Grabowski, J., Nielsen, B. (eds.) FATES 2004. LNCS, vol. 3395, pp. 1\u201315. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31848-4_1"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/11940197_3","volume-title":"Formal Approaches to Software Testing and Runtime Verification","author":"L Frantzen","year":"2006","unstructured":"Frantzen, L., Tretmans, J., Willemse, T.A.C.: A symbolic framework for model-based testing. In: Havelund, K., N\u00fa\u00f1ez, M., Ro\u015fu, G., Wolff, B. (eds.) FATES\/RV -2006. LNCS, vol. 4262, pp. 40\u201354. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11940197_3"},{"key":"12_CR14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546976","volume-title":"Bluetooth Essentials for Programmers","author":"AS Huang","year":"2007","unstructured":"Huang, A.S., Rudolph, L.: Bluetooth Essentials for Programmers. Cambridge University Press, Cambridge (2007)"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"43111","DOI":"10.1109\/ACCESS.2020.2976718","volume":"8","author":"J Hwang","year":"2020","unstructured":"Hwang, J., Aziz, A., Sung, N., Ahmad, A., Le Gall, F., Song, J.: AUTOCON-IoT: automated and scalable online conformance testing for IoT applications. IEEE Access 8, 43111\u201343121 (2020)","journal-title":"IEEE Access"},{"key":"12_CR16","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-319-93797-7_8","volume-title":"Interoperability, Safety and Security in IoT","author":"K Incki","year":"2018","unstructured":"Incki, K., Ari, I.: Observing interoperability of IoT systems through model-based testing. In: Fortino, G., et al. (eds.) InterIoT\/SaSeIoT -2017. LNICST, vol. 242, pp. 60\u201366. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93797-7_8"},{"unstructured":"Statista Inc.: Internet of things (IoT) active device connections installed base worldwide from 2015 to 2025* (2020). https:\/\/www.statista.com\/statistics\/1101442\/iot-number-of-connected-devices-worldwide\/","key":"12_CR17"},{"unstructured":"Janssen, S.: Transforming source code into symbolic transition systems for practical model-based testing (2017)","key":"12_CR18"},{"key":"12_CR19","doi-asserted-by":"publisher","first-page":"15480","DOI":"10.1109\/ACCESS.2018.2802489","volume":"6","author":"H Kim","year":"2018","unstructured":"Kim, H., et al.: IoT-TaaS: towards a prospective IoT testing framework. IEEE Access 6, 15480\u201315493 (2018)","journal-title":"IEEE Access"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/3-540-44854-3_6","volume-title":"Implementation of Functional Languages","author":"P Koopman","year":"2003","unstructured":"Koopman, P., Alimarine, A., Tretmans, J., Plasmeijer, R.: Gast: generic automated software testing. In: Pe\u00f1a, R., Arts, T. (eds.) IFL 2002. LNCS, vol. 2670, pp. 84\u2013100. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-44854-3_6"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-540-24732-6_8","volume-title":"Model Checking Software","author":"M Krichen","year":"2004","unstructured":"Krichen, M., Tripakis, S.: Black-box conformance testing for real-time systems. In: Graf, S., Mounier, L. (eds.) SPIN 2004. LNCS, vol. 2989, pp. 109\u2013126. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24732-6_8"},{"doi-asserted-by":"crossref","unstructured":"Malik, B.H., et al.: IoT testing-as-a-service: a new dimension of automation. Int. J. Adv. Comput. Sci. Appl. 10(5) (2019)","key":"12_CR22","DOI":"10.14569\/IJACSA.2019.0100545"},{"doi-asserted-by":"crossref","unstructured":"Marinissen, E.J., et al.: IoT: source of test challenges. In: 2016 21th IEEE European Test Symposium (ETS), pp. 1\u201310. IEEE (2016)","key":"12_CR23","DOI":"10.1109\/ETS.2016.7519331"},{"key":"12_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/11526841_37","volume-title":"FM 2005: Formal Methods","author":"A Pretschner","year":"2005","unstructured":"Pretschner, A.: Model-based testing in practice. In: Fitzgerald, J., Hayes, I.J., Tarlecki, A. (eds.) FM 2005. LNCS, vol. 3582, pp. 537\u2013541. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11526841_37"},{"doi-asserted-by":"crossref","unstructured":"Pretschner, A., et al.: One evaluation of model-based testing and its automation. In: Proceedings of the 27th International Conference on Software Engineering, pp. 392\u2013401 (2005)","key":"12_CR25","DOI":"10.1145\/1062455.1062529"},{"doi-asserted-by":"crossref","unstructured":"Saleem, J., Hammoudeh, M., Raza, U., Adebisi, B., Ande, R.: IoT standardisation: challenges, perspectives and solution. In: Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, pp. 1\u20139 (2018)","key":"12_CR26","DOI":"10.1145\/3231053.3231103"},{"issue":"1","key":"12_CR27","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MS.2012.13","volume":"29","author":"I Schieferdecker","year":"2012","unstructured":"Schieferdecker, I.: Model-based testing. IEEE Softw. 29(1), 14 (2012)","journal-title":"IEEE Softw."},{"issue":"1","key":"12_CR28","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MS.2017.26","volume":"34","author":"A Taivalsaari","year":"2017","unstructured":"Taivalsaari, A., Mikkonen, T.: A roadmap to the programmable world: software challenges in the IoT era. IEEE Softw. 34(1), 72\u201380 (2017)","journal-title":"IEEE Softw."},{"doi-asserted-by":"crossref","unstructured":"Tappler, M., Aichernig, B.K., Bloem, R.: Model-based testing IoT communication via active automata learning. In: 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST), pp. 276\u2013287. IEEE (2017)","key":"12_CR29","DOI":"10.1109\/ICST.2017.32"},{"key":"12_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-78917-8_1","volume-title":"Formal Methods and Testing","author":"J Tretmans","year":"2008","unstructured":"Tretmans, J.: Model based testing with labelled transition systems. In: Hierons, R.M., Bowen, J.P., Harman, M. (eds.) Formal Methods and Testing. LNCS, vol. 4949, pp. 1\u201338. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78917-8_1"},{"issue":"5","key":"12_CR31","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1002\/stvr.456","volume":"22","author":"M Utting","year":"2012","unstructured":"Utting, M., Pretschner, A., Legeard, B.: A taxonomy of model-based testing approaches. Softw. Test. Verif. Reliab. 22(5), 297\u2013312 (2012)","journal-title":"Softw. Test. Verif. Reliab."},{"doi-asserted-by":"crossref","unstructured":"Vorakulpipat, C., Rattanalerdnusorn, E., Thaenkaew, P., Hai, H.D.: Recent challenges, trends, and concerns related to IoT security: an evolutionary study. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 405\u2013410. IEEE (2018)","key":"12_CR32","DOI":"10.23919\/ICACT.2018.8323774"},{"issue":"9","key":"12_CR33","doi-asserted-by":"publisher","first-page":"1101","DOI":"10.1002\/dac.2417","volume":"25","author":"F Xia","year":"2012","unstructured":"Xia, F., Yang, L.T., Wang, L., Vinel, A.: Internet of things. Int. J. Commun. Syst. 25(9), 1101 (2012)","journal-title":"Int. J. Commun. Syst."},{"doi-asserted-by":"crossref","unstructured":"Yoneyama, J., Artho, C., Tanabe, Y., Hagiya, M.: Model-based network fault injection for IoT protocols. In: Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, pp. 201\u2013209. SCITEPRESS-Science and Technology Publications, Lda (2019)","key":"12_CR34","DOI":"10.5220\/0007618102010209"},{"key":"12_CR35","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-52727-7_7","volume-title":"Interoperability, Safety and Security in IoT","author":"S Ziegler","year":"2017","unstructured":"Ziegler, S., Fdida, S., Viho, C., Watteyne, T.: F-interop \u2013 online platform of interoperability and performance tests for the internet of things. In: Mitton, N., Chaouchi, H., Noel, T., Watteyne, T., Gabillon, A., Capolsini, P. (eds.) InterIoT\/SaSeIoT -2016. LNICST, vol. 190, pp. 49\u201355. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-52727-7_7"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Industrial Critical Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15008-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,4]],"date-time":"2022-09-04T23:09:42Z","timestamp":1662332982000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15008-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031150074","9783031150081"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15008-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"5 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FMICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Methods for Industrial Critical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Warsaw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fmics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fmics2022.fsa.win.tue.nl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}