A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hierarchical Coloured Petri-Net Based Multi-Agent System for Flood Monitoring, Prediction, and Rescue (FMPR)
2019
IEEE Access
As a result, a novel formal system for the specification, analysis, design, modeling, and verification of the FMPR system is proposed. This safety-critical system is distributed based on multi-agents. ...
Thus, safety and liveness properties are formally specified. After the detailed design phase, the system is formally modeled and verified by Hierarchical Coloured-Petri Nets (CP-Nets). ...
and role models of the Gaia multi-agent methodology. 5) Formal verification of the multi-agent-based FMPR system by using hierarchical CP-Nets. ...
doi:10.1109/access.2019.2958258
fatcat:7hkpawprbvainbvh22o5hxjqve
Composition challenges and approaches for cyber physical systems
2010
2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications
This shortcoming necessitates the development of effective methods and tools for analyzing and designing CPS. ...
Cyber-Physical Systems (CPS) integrate computation with physical processes. ...
networking, services and support for performance & functional analysis. ...
doi:10.1109/nesea.2010.5678065
dblp:conf/nesea/WanHMK10
fatcat:qhaa2nmzujgyzldkyhfafmntka
Testing and Validation of Modbus/TCP Protocol for Secure SCADA Communication in CPS using Formal Methods
2017
Scalable Computing : Practice and Experience
One of the greatest challenges is security testing of protocols. All CPS systems being live and attached to physical process can not be scheduled for penetration testing and verification. ...
This paper presents design and implementation of industrial compliant SCADA test bed, the formal analysis of semantics and security of Modbus/TCP protocol using Coloured Petri Nets(CPN) tool. ...
CPN [29] is the methodology used for modeling and verification of concurrent systems. ...
doi:10.12694/scpe.v18i4.1331
fatcat:knaf3bhlhvfivji2rxqd6klgb4
Internet of Medical Things: A Review of Recent Contributions Dealing with Cyber-Physical Systems in Medicine
2018
IEEE Internet of Things Journal
The Internet of Medical Things designates the interconnection of communication-enabled medical-grade devices and their integration to wider-scale health networks in order to improve patients' health. ...
We describe the practical application of the democratization of medical devices for both patients and health-care providers. ...
To perform verification of IoMT models, several tools and algorithms were developed for hybrid state machine models [32] , [35] or for Petri net derived models [34] . ...
doi:10.1109/jiot.2018.2849014
fatcat:z2oytkgvu5gh5cuziawczhqdfe
Reviewing the Service Specification of the IEEE 802.16 MAC Layer Connection Management: A Formal Approach
2013
CLEI Electronic Journal
In most of the communication protocol specification documents, there is little, if any, use of more formal techniques for specifying the protocols, such as state and service primitive tables. ...
The IEEE 802.16 standard document is responsible for specifying and describing the air interface of the BWA systems (Broadband Wireless Access Systems) point to multipoint fixed and mobile networks, and ...
After the validation and verification of the protocol specification, and following the protocol verification methodology, we will compare the service specification presented in this paper with the protocol ...
doi:10.19153/cleiej.16.2.2
fatcat:cojokwt6tfamhf23i4frrl6k6y
A review of CPS 5 components architecture for manufacturing based on standards
2017
2017 11th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)
A framework of CPS 5 main components for manufacturing based on standards is proposed. ...
This paper provides a review of CPS 5 components architecture for manufacturing as well as of CPS components challenges for manufacturing. ...
The authors would like to thank SmartLink Project and Universite Lumiere Lyon2. ...
doi:10.1109/skima.2017.8294091
dblp:conf/skima/AhmadiCCO17
fatcat:y5xre6x2abh4loaz6edvmlbjnm
A Comprehensive Survey on Cyber-Physical Smart Grid Testbed Architectures: Requirements and Challenges
2021
Electronics
The performance and efficiency of the power grid are enhanced with the incorporation of communication networks, intelligent automation, advanced sensors, and information technologies. ...
In this paper, a comprehensive review of the advancement of CP-SGs with their corresponding testbeds including diverse testing paradigms has been performed. ...
In a nutshell, it integrates the methodology of model and replication. ...
doi:10.3390/electronics10091043
fatcat:n4vdtq7ue5c5bmyfotityonduu
Model-driven Engineering Tools and Languages for Cyber-physical Systems -A Systematic Literature Review
2021
IEEE Access
Regarding the development of CPS, there currently exists no standard methodology owing to the complexity of the domain. ...
Nevertheless, it is always almost challenging, especially for the new researchers in this field, to determine the appropriate tools and languages to perform a particular MDE activity during CPS development ...
and functionality of the design models for CPS. • DSLs and domain-specific simulation and verification tools specific for CPS are currently rare. ...
doi:10.1109/access.2021.3068358
fatcat:7daa32lsgjagdkbryifoqjddra
Cyber-physical systems: Milestones and research challenges
2012
Computer Communications
(2010-0022076), and in part by the DGIST R&D Program of the Ministry of Education, Science and Technology of Korea (12-BD-0404). ...
Acknowledgements This work was supported in part by the Basic Science Research Program through the National Research Foundation (NRF) of Korea funded by the Ministry of Education, Science and Technology ...
over networks for integration of communication and control, and sensor and actuator networks for coordination between communication and computation. ...
doi:10.1016/j.comcom.2012.09.006
fatcat:iow2gcdzdfcy3j4fogi67dd3ni
A Survey on Formal Verification Approaches for Dependable Systems
[article]
2022
arXiv
pre-print
This paper focuses on presenting various studies on formal verification approaches and how the V&V can be achieved for developing high dependable digital embedded systems ...
As a result, any mistake or error made during the design stage of the embedded device can change the overall functionality of the critical system and cause catastrophic consequences. ...
for the control part of a CPS system by analyzing and verifying it in several times design and verification perform V&V on (non)-functional properties of an and support for Simulink processes autonomous ...
arXiv:2204.12913v1
fatcat:y7jyq2gdjrgyxjtyibuknintfq
Formal Specification and Design Techniques for Wireless Sensor and Actuator Networks
2011
Sensors
This paper presents a design and validation method for Wireless Sensor and Actuator Networks (WSAN) which is supported on a minimal set of wireless components represented in Colored Petri Nets (CPN). ...
However, the nondeterministic and concurrent behavior of distributed systems makes their analysis and design complex, often resulting in less than satisfactory performance in simulation and test bed scenarios ...
Spanish Government and the SIDERELI project DPI2008-06737-C02-01/02 (Ministerio de Ciencia e Innovación of Spain and European founds FEDER). ...
doi:10.3390/s110101059
pmid:22344203
pmcid:PMC3274114
fatcat:f53z52duijdczpkttlykxx2254
Security Analysis for Distributed IoT-Based Industrial Automation
[article]
2020
arXiv
pre-print
to enable system-level verification of safety properties in the presence of network-based attacks. ...
Specifically, we show how CIPN models of networked industrial IoT controllers can be transformed into Time Petri Net (TPN)-based models, and composed with plant and security-aware channel models in order ...
It was also partially supported by Serbian Ministry of Education, Science and Technological Development, research grants TR35004 and TR35020. ...
arXiv:2006.00044v1
fatcat:bhrkqyau75eldjrn27klehepca
Security, trust and risk in Digital Rights Management ecosystem
2010
2010 International Conference on High Performance Computing & Simulation
scenarios, with an ultimate goal to meet key requirements of security, interoperability and usability. ...
In order to effectively protect digital assets with copyrights against piracy and misuse, it is necessary for the contents value chain as a whole to investigate on some open issues and advances. ...
It is a multi-layer framework, and also embodies a methodology of hierarchical analysis. ...
doi:10.1109/hpcs.2010.5547093
dblp:conf/ieeehpcs/Zhang10
fatcat:knkl3zsxubfopdjy5pq6ide3nm
An Agent-Based Approach For Hybrid Multi-Cloud Applications
2013
Scalable Computing : Practice and Experience
Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with a minimal management ...
We demonstrated the practicability of our approach by embedding it in a Web services language for specifying business protocols, which conducive to reuse, refinement and aggregation of our business protocols ...
The author would like to thank the anonymous reviewers for their valuable comments and suggestions, which were helpful in improving the paper. ...
doi:10.12694/scpe.v14i2.843
fatcat:s3sejvxfgbfx7pj5yef77tbfry
A Coloured Petri Net Methodology and Library for Security Analysis of Network Protocols
2014
Journal of Computers
With Coloured Petri nets as the selected formal method, this paper proposes a methodology to support a modeller in performing security analysis of a protocol. ...
However for a protocol modeller the techniques available for security analysis often require expert knowledge of the technique. ...
SECURITY ANALYSIS METHODOLOGY A. Methodology Overview We propose a methodology for modelling and analysing network protocols from a functional and security viewpoint using Coloured Petri nets. ...
doi:10.4304/jcp.9.2.243-256
fatcat:urzmfmnkmbdojjl7rp4vnhyx7i
« Previous
Showing results 1 — 15 out of 2,674 results