期刊文献+

一种兼顾协议正确性验证和性能评估的Petri网方法 被引量:2

Protocol Validation and Performance Evaluates Based on Petri Nets
下载PDF
导出
摘要 基于Petri网的协议形式化分析方法由于其精炼、简洁和无二义性逐步成为分析协议的一条可靠和准确的途径,但是协议的形式化分析目前研究还不够深入,协议分析的两个重点内容正确性验证和性能评估所需要的模型不同,一种模型只能解决一方面的工作。为了有效地解决这一问题,文中提出了一种用原型Petri网作为协议验证模型的思路和方法,在不改变原型Petri网结构的基础上对变迁赋予发生时延,解决了协议的性能评估问题。本文还给出了协议验证内容与Petri网分析方法的对应关系,并对0-1停止等待协议进行了详细的分析,最后把0-1停止等待协议的原型Petri网模型转化为时延Petri网,对协议的性能进行了评估。 Formal methods for the analysis of protocol based on Petri nets have been looked on a credible and exact way in protocol analysis. But now, the research on formal analysis of protocol is not thorough. Particularly, there is some conflict between protocol validation and evaluates. In this paper, we make a summary of the methods on protocol analysis based on Petri nets. Then we investigate the relationship between the protocol behavior and the properties of Petri nets. The most important is that we propose a new method about protocol analysis. This method gives a detail validation of protocol using prototype Petri net. We change prototype Petri net into Timed Petri net, so the protocol performance evaluates problem can be solved. As an example, we makea detail analysis of 0-1 stop-anawait protocol using Petri nets model and give evaluates the performance of it using TPN.
出处 《计算机科学》 CSCD 北大核心 2005年第12期48-52,共5页 Computer Science
基金 国家自然科学基金资助课题(60173053)
关键词 协议验证 形式化分析 时延PETRI网 协议性能评估 0-1停止等待协议 Protocol validation, Formal analysis, Timed Petri Net, Protocol performance evaluates, 0-1 stop and wait protocol
  • 相关文献

参考文献9

  • 1Avresky D R.Formal verification and testing of protocol[J].Computer Communications,1999,22:681-690.
  • 2卿斯汉.安全协议的设计与逻辑分析[J].软件学报,2003,14(7):1300-1309. 被引量:69
  • 3Tarigan A.Survey in Formal Analysis of Security Properties ofcryptngraphic Protocol[J].IEEE,2002.5.
  • 4Shiu-Kai Chin Susan Older.Formal methods for assuring securityprotocols[J].In the Computer Journal,volume British computer Society,2002,45:46-54.
  • 5沈俊,罗军舟,顾冠群.EPr/TN网可达性分析的冗余并发后继标识[J].计算机研究与发展,1998,35(3):251-254. 被引量:3
  • 6Wang Junfeng ,Yang Jianhua ,Xie Gaogang ,Zhou Mingtian.OSFPv3 Protocol Simulation with Colored Petri Nets[C].In:Proc.of ICCT 2003.
  • 7Kelling C,et al.Modeling priorities in token protocols with timed petri ets[J].International Journal of Mini and Microcomputers,1995,17 (1):35-41.
  • 8张广胜,吴哲辉,逄玉叶.基于时间Petri网的密码协议分析[J].系统仿真学报,2003,15(z1):11-16. 被引量:6
  • 9Murata T.Petri nets:properties,analysis and applications[A].Proc,IEEE,1989,77(4):541-580.

二级参考文献23

  • 1[1]Needham R M, Schroeder M D. Using encryption for anthentication in large networks for computers [J]. Commun ACM, 1979, 21(11):993-999.
  • 2[2]Denning D E, Sacco G M. Timestamps in key distributeon protocols[J]. Common ACM, 1981,24(8): 533-536.
  • 3[3]Burrows M,Abadi M,Needham R. A logic of authentication [A].Proceedings of the Royal Socity of London, 1989, A(426):233-271.
  • 4[5]Gavin L. Breaking and Fixing the Needham Schroeder public key protocols using FDR [A]. In Proc of TACAS, Springer Verlag, 1996,1055: 147-166.
  • 5[7]Nieh B B, Tavares S E. Modelling and analyzing cryptographic protocols using Petri nets [M]. Advances in Cryptology. 1992, LNCS 718, Springer Verlag, 1992: 275-295.
  • 6[8]Ayda Basyouni. Analysis of wireless cryptographic protocols [M].Master's Thesis Electrical Engin,Queen's Univ, Kingston, Ontario,Canada, 1997.
  • 7[9]Ramchandani C. Analysis of asynchronous concurrent systems by timed Petri nets [R]. Massachusetts Inst, Technol, Project MAC, Tech,Rep120, 1974.
  • 8[10]Zuberek W M. Timed Petri nets and preliminary performance evalution [A]. In proc, 7th Annu, Syrp. Computer Architecture, May 6-8, 1990: 88-96.
  • 9[11]Murata T. Petri nets: properties, analysis and applications [A]. Proc,IEEE, 1989, 77(4): 541-580.
  • 10[12]Ghezzi C, et al. Fundamentals of software Engineering [M]. PrenticeHall, N.J, 1991.

共引文献75

同被引文献14

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部