Skip to main content

The Modeling Algorithm of Communication Run Operations in a Network

  • Conference paper
Theory and Engineering of Complex Systems and Dependability (DepCoS-RELCOMEX 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 365))

Included in the following conference series:

  • 1540 Accesses

Abstract

Communication processes have to be observed because there are possibilities that a different kind of threats will occur in the processes of exchanging information in a network. These threats are connected with: the possibility of decryption, losing jurisdiction, believing in and freshness of information, message interception by intruders, etc. We also consider the run of the communication protocol operation. Security attributes have been introduced to analyze the chosen aspects of security, which are proposed by Burrows, Abadi, Needham [4] and others. They have created the system of rules that defines interrelated parts of communication operations with security aspects. In this research we continued the analysis of security in the direction of building the model of auditing and dynamic modification of chosen factors (adequate to the security aspect) with the possibility to form a prognosis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. In: Harper, R. (ed.) Logics and Languages for Security, pp. 15–819 (2007)

    Google Scholar 

  2. Zhang, F., Bu, L., Wang, L., Zhao, J., Li, X.: Numerical Analysis of WSN Protocol Using Probabilistic Timed Automata. In: 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems (ICCPS), p. 237 (2012)

    Google Scholar 

  3. Lynch, N.: Timed and Probabilistic I/O Automata. In: 28th Annual IEEE/ACM Symposium on Logic in Computer Science (LICS), p. 12 (2013)

    Google Scholar 

  4. Chen, T., Han, T., Katoen, J.: Time-Abstracting Bisimulation for Probabilistic Timed Automata. In: 2nd IFIP/IEEE International Symposium on Theoretical Aspects of Software Engineering, TASE 2008, pp. 177–184 (2008)

    Google Scholar 

  5. Kwiatkowska, M., Norman, G., Segala, R., Sproston, J.: Automatic Verification of Real-time Systems with Discrete Probability Distribution. Theoretical Computer Science 282, 101–150 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  6. Kwiatkowska, M., Norman, R., Sproston, J.: Symbolic Model Checking of Probabilistic Timed Automata Using Backwards Reachability. Tech. rep. CSR-03-10, University of Birmingham (2003)

    Google Scholar 

  7. Huang, Y.-S., Chiang, H.-S., Jeng, M.D.: Fault measure of discrete event systems using probabilistic timed automata. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1218–1223 (2011)

    Google Scholar 

  8. Wu, J., Wang, J., Rong, M., Zhang, G., Zhu, J.: Counterexample generation and representation in model checking for probabilistic timed automata. In: 2011 6th International Conference on Computer Science & Education (ICCSE), pp. 1136–1141 (2011)

    Google Scholar 

  9. Thorat, S.S., Markande, S.D.: Reinvented Fuzzy logic Secure Media Access Control Protocol (FSMAC) to improve lifespan of Wireless Sensor Networks. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 344–349 (2014)

    Google Scholar 

  10. Liu, K., Ye, J.Y., Wang, Y.: The Security Analysis on Otway-Rees Protocol Based on BAN Logic. In: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS), pp. 341–344 (2012)

    Google Scholar 

  11. Zhang, H., Liu, F., Yang, M., Li, W.: Simulation of colored time Petri nets. In: 2013 IEEE International Conference on Information and Automation (ICIA), pp. 637–642 (2013)

    Google Scholar 

  12. Li-Li, W., Xiao-jing, M., Yang, N.: Modeling and verification of Colored Petri Net in stop and wait protocol. In: 2010 International Conference on Computer Design and Applications (ICCDA), vol. 5, pp. V5-24–V5-28 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Henryk Piech .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Piech, H., Grodzki, G., Ptak, A. (2015). The Modeling Algorithm of Communication Run Operations in a Network. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Engineering of Complex Systems and Dependability. DepCoS-RELCOMEX 2015. Advances in Intelligent Systems and Computing, vol 365. Springer, Cham. https://doi.org/10.1007/978-3-319-19216-1_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19216-1_32

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19215-4

  • Online ISBN: 978-3-319-19216-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics