{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:19:35Z","timestamp":1753885175196,"version":"3.41.2"},"reference-count":42,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T00:00:00Z","timestamp":1626307200000},"content-version":"vor","delay-in-days":195,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572306"],"award-info":[{"award-number":["61572306"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2021,1]]},"abstract":"<jats:p>Ensuring the consistency of protocol implementation and protocol specification is the basic premise of wireless communication. With the application of wireless communication in more and more fields, the wireless communication environment becomes more and more complex, and the fault coverage of wireless protocol conformance testing is also facing more and more challenges. To solve this problem, this paper uses Finite State Machine (FSM) as a formal description tool for wireless protocols and presents a combining test method based on two test methods with complementary characteristics in the test technologies based on structural coverage and state identification. Then, the paper evaluates the effectiveness of the method based on 14 empirical cases. The experimental results show that the fault coverage of each empirical case can be effectively improved to 100% when the average test cost is only increased by 17.99%.<\/jats:p>","DOI":"10.1155\/2021\/6378139","type":"journal-article","created":{"date-parts":[[2021,7,15]],"date-time":"2021-07-15T20:50:07Z","timestamp":1626382207000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Combining Method for Wireless Protocol Conformance Testing: A Empirical Case"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3133-5669","authenticated-orcid":false,"given":"Lin","family":"Wei-Wei","sequence":"first","affiliation":[]},{"given":"Zeng","family":"Hong-Wei","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2396-9514","authenticated-orcid":false,"given":"Jung Yoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2021,7,15]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3723691"},{"key":"e_1_2_10_2_2","first-page":"547","article-title":"Applying probabilistic model checking to path planning in an intelligent transportation system using mobility trajectories and their statistical data","volume":"25","author":"Gao H. H.","year":"2019","journal-title":"Intelligent Automation and Soft Computing"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9083956"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.04.064"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2013.23"},{"key":"e_1_2_10_6_2","doi-asserted-by":"crossref","unstructured":"RamadaM. S. De LimaT. W. SimaoA. andSoaresA. D. Generating reduced tests for FSMs using a search-based testing approach 2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI) November 4-6 2019 Portland OR USA 400\u2013407 https:\/\/doi.org\/10.1109\/ICTAI.2019.00063.","DOI":"10.1109\/ICTAI.2019.00063"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2011.00965"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/app10103397"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.11897\/SP.J.1016.2016.02236"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1142\/S021819401750022X"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2018.2865217"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194018500390"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.533956"},{"key":"e_1_2_10_14_2","doi-asserted-by":"crossref","unstructured":"PortoF. R. EndoA. T. andSimaoA. Generation of checking sequences using identification sets In 15th International Conference on Formal Engineering Methods (ICFEM) October 29-November 1 2013 Berlin Heidelberg 115\u2013130 https:\/\/doi.org\/10.1007\/978-3-642-41202-8_9 2-s2.0-84889590117.","DOI":"10.1007\/978-3-642-41202-8_9"},{"key":"e_1_2_10_15_2","doi-asserted-by":"crossref","unstructured":"HodaK.andYvanL. On FSM-based testing: An empirical study: complete round-trip versus transition trees 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE) October 23-26 2017 Toulouse France 305\u2013315 https:\/\/doi.org\/10.1109\/ISSRE.2017.34 2-s2.0-85040566965.","DOI":"10.1109\/ISSRE.2017.34"},{"key":"e_1_2_10_16_2","doi-asserted-by":"crossref","unstructured":"GaudelM. C. Formal methods for software testing In International Symposium on Theoretical Aspects of Software Engineering (TASE) September 13-15 2017 Sophia Antipolis France 1\u20133.","DOI":"10.1109\/TASE.2017.8285622"},{"key":"e_1_2_10_17_2","unstructured":"LiangS. R. Fuzzy Test Algorithm of ZigBee Protocol Based on FSM [M.S. Thesis] 2014 BUPT Beijing China."},{"key":"e_1_2_10_18_2","doi-asserted-by":"crossref","unstructured":"Sim\u00e3oA. PetrenkoA. andMaldonadoJ. C. Experimental evaluation of coverage criteria for FSM-based testing In the 21st Simp\u00f3sio Brasileiro de Engenharia de Software (SBES) January 13-15 2007 Joao Pessoa Brazil 359\u2013374.","DOI":"10.5753\/sbes.2007.21316"},{"volume-title":"Introduction to Software Testing","year":"2018","author":"Ammann P.","key":"e_1_2_10_19_2"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106272"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.31"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxv122"},{"key":"e_1_2_10_23_2","first-page":"14","article-title":"Testing of data gathering protocol for wireless sensor networks based on FSM model","volume":"16","author":"Liu C. C.","year":"2017","journal-title":"Software Guide"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.03.001"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1984.1096074"},{"key":"e_1_2_10_26_2","first-page":"47","article-title":"Path overlapped method for protocol conformance test generation","volume":"20","author":"Wang Z. B.","year":"2011","journal-title":"Computer Systems & Applications"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/90.222912"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/318951.319003"},{"key":"e_1_2_10_29_2","doi-asserted-by":"crossref","unstructured":"TangJ. HuangX. QianJ. andVihoC. A FSM-based test sequence generation method for RPL conformance testing 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber Physical and Social Computing August 20-23 2013 Beijing China 591\u2013597 https:\/\/doi.org\/10.1109\/GreenCom-iThings-CPSCom.2013.111 2-s2.0-84893444584.","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.111"},{"key":"e_1_2_10_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2922684"},{"key":"e_1_2_10_31_2","doi-asserted-by":"crossref","unstructured":"FragalV. H. SimaoA. EndoA. T. andMousaviM. R. Reducing the concretization effort in FSM-based testing of software product lines 2017 IEEE International Conference on Software Testing Verification and Validation Workshops (ICSTW) March 13-17 2017 Tokyo Japan 329\u2013336 https:\/\/doi.org\/10.1109\/ICSTW.2017.61 2-s2.0-85018410007.","DOI":"10.1109\/ICSTW.2017.61"},{"key":"e_1_2_10_32_2","doi-asserted-by":"crossref","unstructured":"LiuP. LiY. D. andLiZ. J. Some thoughts on model-based test optimization 2019 IEEE 19th International Conference on Software Quality Reliability and Security Companion (QRS-C) July 22-26 2019 Sofia Bulgaria 268\u2013274 https:\/\/doi.org\/10.1109\/QRS-C.2019.00058 2-s2.0-85073876870.","DOI":"10.1109\/QRS-C.2019.00058"},{"key":"e_1_2_10_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2019.05.005"},{"key":"e_1_2_10_34_2","doi-asserted-by":"crossref","unstructured":"ZhouT. L. SunH. Y. LiuJ. ChenX. H. andDuD. H. Improving testing coverage for safety-critical system by mutated specification 2014 21st Asia-Pacific Software Engineering Conference 2014 Jeju South Korea 43\u201346 https:\/\/doi.org\/10.1109\/APSEC.2014.15 2-s2.0-84951267205.","DOI":"10.1109\/APSEC.2014.15"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-011-0190-1"},{"key":"e_1_2_10_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.80"},{"key":"e_1_2_10_37_2","doi-asserted-by":"crossref","unstructured":"UralH.andZhangF. Reducing the lengths of checking sequences by overlapping In International Conference on Testing of Communicating Systems May 16-18 2006 New York NY USA 274\u2013288.","DOI":"10.1007\/11754008_18"},{"key":"e_1_2_10_38_2","doi-asserted-by":"crossref","unstructured":"DuanL. H.andChenJ. Reducing test sequence length using invertible sequences In 9th International Conference on Formal Engineering Methods (ICFEM) November 14-15 2007 Boca Raton FL USA 171\u2013190.","DOI":"10.1007\/978-3-540-76650-6_11"},{"key":"e_1_2_10_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2015.01.002"},{"key":"e_1_2_10_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.32"},{"key":"e_1_2_10_41_2","doi-asserted-by":"crossref","unstructured":"HutchinsM. FosterH. GoradiaT. andOstrandT. Experiments on the effectiveness of data-flow and control-flow-based test adequacy criteria In Proceedings of 16th International conference on Software engineering (ICSE) 1994 Sorrento Italy 191\u2013200 https:\/\/doi.org\/10.1109\/ICSE.1994.296778.","DOI":"10.1109\/ICSE.1994.296778"},{"key":"e_1_2_10_42_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.79"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6378139.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2021\/6378139.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2021\/6378139","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T10:43:51Z","timestamp":1723027431000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2021\/6378139"}},"subtitle":[],"editor":[{"given":"Xiaoxian","family":"Yang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["10.1155\/2021\/6378139"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6378139","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"2021-05-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-06-18","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"6378139"}}