This paper describes the ISUP (ISDN User Part of CCSS7) conformance testing theory and method according to CCITT and China national standards, and presents a successful ISUP protocol conformance testing system in detail.
Globally, traditional power systems are rapidly transforming towards the adoption of smart grid platforms. Substations which are at the center of the electric power transformation from the power plant are changing to ...Globally, traditional power systems are rapidly transforming towards the adoption of smart grid platforms. Substations which are at the center of the electric power transformation from the power plant are changing to IEC 61850 based digital substations. Therefore, within substation, there is a growing demand for the IEC 61850 based Intelligent Electronic Devices (IEDs). The operation of multiple manufacturers of IEDs in a single digital substation network increases the need for IEC 61850 communications specification conformance diagnosis to ensure interoperability for efficient data exchange between IEDs. The IEC 61850-10 presents test items for diagnosing communication specification conformance. There are many test tools available in the market today to test the compliance of the IEC 61850 communications specifications to the IED. In this paper, we propose a model-based diagnostic method for IED communication conformance testing. The proposed model-based software therefore uses the “drag and drop” technique to select the various IEC 61850 communication services (objects) required to design the test case in a user friendly Graphical User Interface (GUI). This makes the service conformance testing more flexible for test engineers and system integrators especially in situations that require test case modifications. Also, the proposed software tool makes it easy to understand the various IEC 61850 services using the friendly GUI.展开更多
This study focuses on testing and quality measurement and analysis of VoIPv6 performance. A client, server codes were developed using FreeBSD. This is a step before analyzing the Architectures of VoIPv6 in the current...This study focuses on testing and quality measurement and analysis of VoIPv6 performance. A client, server codes were developed using FreeBSD. This is a step before analyzing the Architectures of VoIPv6 in the current internet in order for it to cope with IPv6 traffic transmission requirements in general and specifically voice traffic, which is being attracting the efforts of research, bodes currently. These tests were conducted in the application level without looking into the network level of the network. VoIPv6 performance tests were conducted in the current tunneled and native IPv6 aiming for better end-to-end VoIPv6 performance. The results obtained in this study were shown in deferent codec's for different bit rates in Kilo bits per second, which act as an indicator for the better performance of G.711 compared with the rest of the tested codes.展开更多
In this paper, a conformance test platform is built for intelligent electronic devices (IEDs) from different manufacturers based on IEC 61850 communication protocol. A conformance test of time delay of message transmi...In this paper, a conformance test platform is built for intelligent electronic devices (IEDs) from different manufacturers based on IEC 61850 communication protocol. A conformance test of time delay of message transmission between two IEDs, made by the same or different manufacturers, is performed. The conformance test platform, as well as the test results provide a helpful reference for IEC 61850 implementation.展开更多
The stability and robustness of routing protocol implementations (RPI) in a router are becoming more and more important with the growth of Internet scale. A novel approach named stress testing is proposed to test the ...The stability and robustness of routing protocol implementations (RPI) in a router are becoming more and more important with the growth of Internet scale. A novel approach named stress testing is proposed to test the properties of RPI. Compared with some traditional test techniques, stress testing is remarkably necessary to inspect and analyze RPI. The test environment is proposed and the test process of OSPF RPI is illustrated by a stochastic Petri Net model with large-scale route simulation and OSPF protocol emulation. Based on this model, the integrated performance tester (IP-TEST) is designed and developed, with which we test a CISCO2600 router. With mathematical methods, we find that the computational complexity of OSPF implementation in this router is O((lnN) 4)to the number of its routing table entries. This experiment shows that this technique can inspect the stability, the computational complexity and the scalability of RPI. Furthermore, it can also be widely used with other routing protocols, such as RIP and BGP.展开更多
Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the m...Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.展开更多
A new efficient protocol-proving algorithm was proposed for verifying security protocols. This algorithm is based on the improved authentication tests model, which enhances the original model by formalizing the messag...A new efficient protocol-proving algorithm was proposed for verifying security protocols. This algorithm is based on the improved authentication tests model, which enhances the original model by formalizing the message reply attack. With exact causal dependency relations between messages in this model, the protocol-proving algorithm can avoid the state explosion caused by asynchronous. In order to get the straight proof of security protocols, three authentication theorems are exploited for evaluating the agreement and distinction properties. When the algorithm terminates, it outputs either the proof results or the potential flaws of the security protocol. The experiment shows that the protocol-proving algorithm can detect the type flaw attack on Neuman-Stubblebine protocol, and prove the correctness of NSL protocol by exploring only 10 states.展开更多
A novel interoperability test sequences optimization scheme is proposed in which the genetic algorithm (GA) is used to obtain the minimal-length interoperability test sequences. During our work, the basic interopera...A novel interoperability test sequences optimization scheme is proposed in which the genetic algorithm (GA) is used to obtain the minimal-length interoperability test sequences. During our work, the basic interoperability test sequences are generated based on the minimal-complete-coverage criterion, which removes the redundancy from conformance test sequences. Then interoperability sequences minimization problem can be considered as an instance of the set covering problem, and the GA is applied to remove redundancy in interoperability transitions. The results show that compared to conventional algorithm, the proposed algorithm is more practical to avoid the state space explosion problem, for it can reduce the length of the test sequences and maintain the same transition coverage.展开更多
The objective of conformance testing is to determine whether an implementation under test (IUT) conforms to its specification. In distributed test architecture where there are multiple remote testers, the objective ca...The objective of conformance testing is to determine whether an implementation under test (IUT) conforms to its specification. In distributed test architecture where there are multiple remote testers, the objective can be complicated by the fact that testers may encounter controllability and observability problems during the application of a test sequence. A certain amount of work has been done in the area of generating test sequence that is free from these problems. However, few researchers investigate them from the aspect of test execution. This work studies the test execution phase when test sequences are applied to the imple- mentation and it is pointed out that controllability and observability problems can be resolved if and only if the test system im- plements some timing constraints. When determining these constraints, the dynamic time information during test is taken into account, which reduces the test execution time and improves test efficiency further.展开更多
The digital substation system consists of an Intelligent Electronic Device (IED) which requires information for the supervision, protection, and control, as well as a client operating system for substation operation. ...The digital substation system consists of an Intelligent Electronic Device (IED) which requires information for the supervision, protection, and control, as well as a client operating system for substation operation. IEC 61850 communication standard has been defined for information exchange between heterogeneous digital devices in such substations. Currently, the Korea Electric Power Corporation (KEPCO) digital substation system uses unbuffered reporting and Generic Object Oriented Substation Events (GOOSE) communication functions for monitoring, protection and control automation. However, it is expected that the Setting Group function will be needed to operate adaptive intelligent substation system. The Setting Group function is advantageous in that it is possible to change the setting of the IED in one unified way through the client operating system, rather than changing the correction value of an IED through different manufacturer-based engineering tools. In order to utilize the Setting Group function of the IED in real substation scenario, it is necessary to test both the communication function with the host operating device and the electric functional test to ensure that correction value is properly changed. In this paper, we introduce the IEC 61850 Setting Group function, and propose a method that can integrate communication function and electrical function test of an IED conforming to the setting group functionality. We also tested the Setting Group function of the actual IED device through the proposed integrated functional test method and analyzed the results. We were able to simplify the process of testing both the electrical and communication signals in digital substations.展开更多
Variable distributed energy resources (DERs) such as photovoltaic (PV) systems and wind power systems require additional power resources to control the balance between supply and demand. Battery energy storage systems...Variable distributed energy resources (DERs) such as photovoltaic (PV) systems and wind power systems require additional power resources to control the balance between supply and demand. Battery energy storage systems (BESSs) are one such possible resource for providing grid stability. It has been proposed that decentralized BESSs could help support microgrids (MGs) with intelligent control when advanced functionalities are implemented with variable DERs. One key challenge is developing and testing smart inverter controls for DERs. This paper presents a standardized method to test the interoperability and functionality of BESSs. First, a survey of grid-support standards prevalent in several countries was conducted. Then, the following four interoperability functions defined in IEC TR 61850-90-7 were tested: the specified active power from storage test (INV4), the var-priority Volt/VAR test (VV) and the specified power factor test (INV3) and frequency-watt control (FW). This study then out-lines the remaining technical issues related to basic BESS smart inverter test protocols.展开更多
This paper presents an approach for extending the constraint model defined for conformity testing of a given method of class to its overriding method in subclass using inheritance principle. The first objective of the...This paper presents an approach for extending the constraint model defined for conformity testing of a given method of class to its overriding method in subclass using inheritance principle. The first objective of the proposed work is to find the relationship between the test model of an overriding method and its overridden method using the constraint propagation. In this context the approach shows that the test cases developed for testing an original method can be used for testing its overriding method in a subclass and then the number of test cases can be reduced considerably. The second objective is the use of invalid data which do not satisfy the precondition constraint and induce valid output values for introducing a new concept of test called secure testing. The implementation of this approach is based on a random generation of test data and analysis by formal proof.展开更多
ZTE Corporation, a leading global provider of telecommunications equipment and network solutions revealed on July 19, 2010 that it has successfully completed the world's first MultiService Forum (MSF) LTE/EPC Inter...ZTE Corporation, a leading global provider of telecommunications equipment and network solutions revealed on July 19, 2010 that it has successfully completed the world's first MultiService Forum (MSF) LTE/EPC Interoperability tests. ZTE is one of various equipment vendors to participate and succeed in the MSF tests.展开更多
In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of net...In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of network system. Fully understand and grasp of thenetwork protocols for managers is there is a big diffi cult. Network covert channel is the evaluation of intrusion detection system and fi rewallsecurity performance of an important means, the paper will start from the angle of the attacker, the fl aws of the research, and use this kind ofdefect to realize network covert channel, the random walk algorithm will be feasible for dealing with this issue. For achieving this, we integratethe genetic and random walk algorithm for systematic optimization.展开更多
As production automation systems have been and are becoming more and more complex, the task of quality assurance is increasingly challenging. Model-based testing is a research field addressing this challenge and many ...As production automation systems have been and are becoming more and more complex, the task of quality assurance is increasingly challenging. Model-based testing is a research field addressing this challenge and many approaches have been suggested for different applications. The goal of this paper is to review these approaches regarding their suitability for the domain of production automation in order to identify current trends and research gaps. The different approaches are classified and clustered according to their main focus which is either testing and test case generation from some form of model automatons, test case generation from models used within the development process of production automation systems, test case generation from fault models or test case selection and regression testing.展开更多
Korea Electric Power Corporation in charge of the power IT project "Development of Prototype for Advanced Substation Automation System based on the Digital Control Technology", is performing the verification of perf...Korea Electric Power Corporation in charge of the power IT project "Development of Prototype for Advanced Substation Automation System based on the Digital Control Technology", is performing the verification of performance of the substation automation system based on IEC 61850. In order to verify a transformer protective lED that might be operating in substation automation system, the new standardized document and procedures are required in the aspect of the utility like KEPCO. But there is nothing to describe systematically how to verify IEC 6 1850 based lED in the system environment except an individual IED testing way. This paper will present the substation automation system based ways and procedures to verify the protective function of the IED using UML (Unified Modeling Language).展开更多
文摘This paper describes the ISUP (ISDN User Part of CCSS7) conformance testing theory and method according to CCITT and China national standards, and presents a successful ISUP protocol conformance testing system in detail.
文摘Globally, traditional power systems are rapidly transforming towards the adoption of smart grid platforms. Substations which are at the center of the electric power transformation from the power plant are changing to IEC 61850 based digital substations. Therefore, within substation, there is a growing demand for the IEC 61850 based Intelligent Electronic Devices (IEDs). The operation of multiple manufacturers of IEDs in a single digital substation network increases the need for IEC 61850 communications specification conformance diagnosis to ensure interoperability for efficient data exchange between IEDs. The IEC 61850-10 presents test items for diagnosing communication specification conformance. There are many test tools available in the market today to test the compliance of the IEC 61850 communications specifications to the IED. In this paper, we propose a model-based diagnostic method for IED communication conformance testing. The proposed model-based software therefore uses the “drag and drop” technique to select the various IEC 61850 communication services (objects) required to design the test case in a user friendly Graphical User Interface (GUI). This makes the service conformance testing more flexible for test engineers and system integrators especially in situations that require test case modifications. Also, the proposed software tool makes it easy to understand the various IEC 61850 services using the friendly GUI.
文摘This study focuses on testing and quality measurement and analysis of VoIPv6 performance. A client, server codes were developed using FreeBSD. This is a step before analyzing the Architectures of VoIPv6 in the current internet in order for it to cope with IPv6 traffic transmission requirements in general and specifically voice traffic, which is being attracting the efforts of research, bodes currently. These tests were conducted in the application level without looking into the network level of the network. VoIPv6 performance tests were conducted in the current tunneled and native IPv6 aiming for better end-to-end VoIPv6 performance. The results obtained in this study were shown in deferent codec's for different bit rates in Kilo bits per second, which act as an indicator for the better performance of G.711 compared with the rest of the tested codes.
文摘In this paper, a conformance test platform is built for intelligent electronic devices (IEDs) from different manufacturers based on IEC 61850 communication protocol. A conformance test of time delay of message transmission between two IEDs, made by the same or different manufacturers, is performed. The conformance test platform, as well as the test results provide a helpful reference for IEC 61850 implementation.
文摘The stability and robustness of routing protocol implementations (RPI) in a router are becoming more and more important with the growth of Internet scale. A novel approach named stress testing is proposed to test the properties of RPI. Compared with some traditional test techniques, stress testing is remarkably necessary to inspect and analyze RPI. The test environment is proposed and the test process of OSPF RPI is illustrated by a stochastic Petri Net model with large-scale route simulation and OSPF protocol emulation. Based on this model, the integrated performance tester (IP-TEST) is designed and developed, with which we test a CISCO2600 router. With mathematical methods, we find that the computational complexity of OSPF implementation in this router is O((lnN) 4)to the number of its routing table entries. This experiment shows that this technique can inspect the stability, the computational complexity and the scalability of RPI. Furthermore, it can also be widely used with other routing protocols, such as RIP and BGP.
基金The Natural Science Foundation of Jiangsu Province(No.BK2006108)
文摘Based on the authentication tests and the strand space model, the robust email protocol with perfect forward secrecy is formally analyzed, and the security shortcomings of the protocol is pointed out. Meanwhile, the man-in-the-middle attack to the protocol is given, where the attacker forges the messages in the receiving phase to cheat the two communication parties and makes them share the wrong session keys with him. Therefore, the protocol is not ensured to provide perfect forward secrecy. In order to overcome the above security shortcomings, an advanced email protocol is proposed, where the corresponding signatures in the receiving phase of the protocol are added to overcome the man-in-the-middle attack and ensure to provide perfect forward secrecy. Finally, the proposed advanced email protocol is formally analyzed with the authentication tests and the strand space model, and it is proved to be secure in authentication of the email sender, the recipient and the server. Therefore, the proposed advanced email protocol can really provide perfect forward secrecy.
基金The National High Technology Research and Development Program of China(863Pro-gram)(No.2005AA145110)
文摘A new efficient protocol-proving algorithm was proposed for verifying security protocols. This algorithm is based on the improved authentication tests model, which enhances the original model by formalizing the message reply attack. With exact causal dependency relations between messages in this model, the protocol-proving algorithm can avoid the state explosion caused by asynchronous. In order to get the straight proof of security protocols, three authentication theorems are exploited for evaluating the agreement and distinction properties. When the algorithm terminates, it outputs either the proof results or the potential flaws of the security protocol. The experiment shows that the protocol-proving algorithm can detect the type flaw attack on Neuman-Stubblebine protocol, and prove the correctness of NSL protocol by exploring only 10 states.
文摘A novel interoperability test sequences optimization scheme is proposed in which the genetic algorithm (GA) is used to obtain the minimal-length interoperability test sequences. During our work, the basic interoperability test sequences are generated based on the minimal-complete-coverage criterion, which removes the redundancy from conformance test sequences. Then interoperability sequences minimization problem can be considered as an instance of the set covering problem, and the GA is applied to remove redundancy in interoperability transitions. The results show that compared to conventional algorithm, the proposed algorithm is more practical to avoid the state space explosion problem, for it can reduce the length of the test sequences and maintain the same transition coverage.
文摘The objective of conformance testing is to determine whether an implementation under test (IUT) conforms to its specification. In distributed test architecture where there are multiple remote testers, the objective can be complicated by the fact that testers may encounter controllability and observability problems during the application of a test sequence. A certain amount of work has been done in the area of generating test sequence that is free from these problems. However, few researchers investigate them from the aspect of test execution. This work studies the test execution phase when test sequences are applied to the imple- mentation and it is pointed out that controllability and observability problems can be resolved if and only if the test system im- plements some timing constraints. When determining these constraints, the dynamic time information during test is taken into account, which reduces the test execution time and improves test efficiency further.
文摘The digital substation system consists of an Intelligent Electronic Device (IED) which requires information for the supervision, protection, and control, as well as a client operating system for substation operation. IEC 61850 communication standard has been defined for information exchange between heterogeneous digital devices in such substations. Currently, the Korea Electric Power Corporation (KEPCO) digital substation system uses unbuffered reporting and Generic Object Oriented Substation Events (GOOSE) communication functions for monitoring, protection and control automation. However, it is expected that the Setting Group function will be needed to operate adaptive intelligent substation system. The Setting Group function is advantageous in that it is possible to change the setting of the IED in one unified way through the client operating system, rather than changing the correction value of an IED through different manufacturer-based engineering tools. In order to utilize the Setting Group function of the IED in real substation scenario, it is necessary to test both the communication function with the host operating device and the electric functional test to ensure that correction value is properly changed. In this paper, we introduce the IEC 61850 Setting Group function, and propose a method that can integrate communication function and electrical function test of an IED conforming to the setting group functionality. We also tested the Setting Group function of the actual IED device through the proposed integrated functional test method and analyzed the results. We were able to simplify the process of testing both the electrical and communication signals in digital substations.
文摘Variable distributed energy resources (DERs) such as photovoltaic (PV) systems and wind power systems require additional power resources to control the balance between supply and demand. Battery energy storage systems (BESSs) are one such possible resource for providing grid stability. It has been proposed that decentralized BESSs could help support microgrids (MGs) with intelligent control when advanced functionalities are implemented with variable DERs. One key challenge is developing and testing smart inverter controls for DERs. This paper presents a standardized method to test the interoperability and functionality of BESSs. First, a survey of grid-support standards prevalent in several countries was conducted. Then, the following four interoperability functions defined in IEC TR 61850-90-7 were tested: the specified active power from storage test (INV4), the var-priority Volt/VAR test (VV) and the specified power factor test (INV3) and frequency-watt control (FW). This study then out-lines the remaining technical issues related to basic BESS smart inverter test protocols.
文摘This paper presents an approach for extending the constraint model defined for conformity testing of a given method of class to its overriding method in subclass using inheritance principle. The first objective of the proposed work is to find the relationship between the test model of an overriding method and its overridden method using the constraint propagation. In this context the approach shows that the test cases developed for testing an original method can be used for testing its overriding method in a subclass and then the number of test cases can be reduced considerably. The second objective is the use of invalid data which do not satisfy the precondition constraint and induce valid output values for introducing a new concept of test called secure testing. The implementation of this approach is based on a random generation of test data and analysis by formal proof.
文摘ZTE Corporation, a leading global provider of telecommunications equipment and network solutions revealed on July 19, 2010 that it has successfully completed the world's first MultiService Forum (MSF) LTE/EPC Interoperability tests. ZTE is one of various equipment vendors to participate and succeed in the MSF tests.
文摘In this paper, we conduct research on the computer network protocol test model based on genetic and random walk algorithm.Network protocol is the abstract concept, is important in the process of the development of network system. Fully understand and grasp of thenetwork protocols for managers is there is a big diffi cult. Network covert channel is the evaluation of intrusion detection system and fi rewallsecurity performance of an important means, the paper will start from the angle of the attacker, the fl aws of the research, and use this kind ofdefect to realize network covert channel, the random walk algorithm will be feasible for dealing with this issue. For achieving this, we integratethe genetic and random walk algorithm for systematic optimization.
文摘As production automation systems have been and are becoming more and more complex, the task of quality assurance is increasingly challenging. Model-based testing is a research field addressing this challenge and many approaches have been suggested for different applications. The goal of this paper is to review these approaches regarding their suitability for the domain of production automation in order to identify current trends and research gaps. The different approaches are classified and clustered according to their main focus which is either testing and test case generation from some form of model automatons, test case generation from models used within the development process of production automation systems, test case generation from fault models or test case selection and regression testing.
文摘Korea Electric Power Corporation in charge of the power IT project "Development of Prototype for Advanced Substation Automation System based on the Digital Control Technology", is performing the verification of performance of the substation automation system based on IEC 61850. In order to verify a transformer protective lED that might be operating in substation automation system, the new standardized document and procedures are required in the aspect of the utility like KEPCO. But there is nothing to describe systematically how to verify IEC 6 1850 based lED in the system environment except an individual IED testing way. This paper will present the substation automation system based ways and procedures to verify the protective function of the IED using UML (Unified Modeling Language).