Mechanism Analysis of Protocols Based on the FPCPN Model

Wei Wang
April 2012
Journal of Digital Information Management;Apr2012, Vol. 10 Issue 2, p86
Academic Journal
Focusing on the protection of privacy and non- publicity of special networks, the CPN model is extended to PCPN by the protocol factor and the formal model. The FPCPN (Formal Protocol Colored Petri Net) is presented to analyze the operation mechanism of protocols. It is introduced by four steps, such as the whole structure, the network element conversion, the conditions of transition triggers/executions and sub-system partitions. Finally, the feasibility and efficiency of FPCPN is validated by an example.


Related Articles

  • A Coloured Petri Net Methodology and Library for Security Analysis of Network Protocols. San Choosang; Gordon, Steven // Journal of Computers;Feb2014, Vol. 9 Issue 2, p243 

    Formal methods are often used to prove properties of network protocols, including required security properties. However for a protocol modeller the techniques available for security analysis often require expert knowledge of the technique. Also the tight coupling of protocol model and security...

  • Modeling and Analysis of Security Protocols Using Colored Petri Nets. Yang Xu; Xiaoyao Xie // Journal of Computers;Jan2011, Vol. 6 Issue 1, p19 

    Security protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols function correctly. However, it is difficult to design security protocols that are immune to malicious attack, since good analysis techniques are lacking. In this paper, the...

  • The Modeling Method and Analysis Of Online Top-up System Based On Open Petri Net. Xiaomao Li; Xianwen Fang // Applied Mechanics & Materials;2014, Issue 571-572, p453 

    Petri nets have structure and behavior properties, it is convenient to analyze some complex system based on its mathematical analysis methods. Online top-up system is an open network system. The modeling method of this system based on general Petri net has some limitations. A new modeling method...

  • A Petri-Net-Based Modeling and Properties Verification Method for Rules in Interaction Protocol Ontology. Shu-juan Ji; Feng Lei Liu; Yong-quan Liang; Chunjin Zhang // Journal of Convergence Information Technology;Jun2013, Vol. 8 Issue 11, p98 

    Protocols are cores of agent-mediated intelligent systems. Lots of hard-coded protocols are designed and implemented to specify the interaction rules that govern the automated agents. In open distributed domains, the interaction rules may be altered, added, or deleted with the variation of...

  • Concurrent Composition of Secure Protocols in the Timing Model. Kalai, Yael Tauman; Lindell, Yehuda; Prabhakaran, Manoj // Journal of Cryptology;Autumn2007, Vol. 20 Issue 4, p431 

    In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their inputs. In the stand-alone case it has been shown that every efficient function can be securely computed. However, in the setting of concurrent...

  • Formal and Executable Specification of Random Waypoint Mobility Model Using Timed Coloured Petri Nets for WMN. Khan, Naeem Akhtar; Ahmad, Farooq; Khan, Sher Afzal // Abstract & Applied Analysis;2014, p1 

    The wireless mesh network (WMN)is an emerging and cost-effective alternative paradigm for the next generation wireless networks in many diverse applications. In the performance evaluation of routing protocol for the WMN, it is essential that it should be evaluated under realistic conditions. The...

  • Petri Nets based Production System Model Simplification. Zhijian Wang; Yuping Hu; Jun Zhang // Electronics & Electrical Engineering;2012, Issue 123, p113 

    Petri nets own graphical description ability based on solid mathematical foundation, this makes it a possible tool for analyzing complex system such as manufacturing system, but using Petri nets directly in large scale system will lead to state explosion. A Generalized Stochastic Petri Nets...

  • FORMAL THREAT ANALYSIS FOR AD-HOC ROUTING PROTOCOL: MODELLING AND CHECKING THE SYBIL ATTACK. Gui Jing-Jing; Wang Jin-Shuang; Zhang Yu-Sen; Zhang Tao // Intelligent Automation & Soft Computing;Dec2011, Vol. 17 Issue 8, p1035 

    The threat analysis for routing protocol is a significant issue in the ad-hoc network security. In this paper we propose a framework in which the vulnerabilities from the Sybil attack for ad-hoc routing protocol can be modeled in a mathematic approach, and the formal analysis is carried out with...

  • A Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity. Xiufeng Zhao; Qiuliang Xu; Hao Wang; Peng He // Journal of Networks;Oct2011, Vol. 6 Issue 10, p1422 

    Group key establishment is one of the basic building blocks in securing group communication. In this paper, motivated by Desmedt's BD-II protocol, we propose a secure ID-Based group key establishment protocol which has a constant number of rounds and requires only O (log) n computation and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics