2,674 Hits in 3.8 sec

Hierarchical Coloured Petri-Net Based Multi-Agent System for Flood Monitoring, Prediction, and Rescue (FMPR)

Nadeem Akhtar, Abdul Rehman, Mujtaba Hussnain, Saad Rohail, Malik Saad Missen, Mehwish Nasir, Alina Hayder, Nadeem Salamat, Maruf Pasha
2019 IEEE Access  
As a result, a novel formal system for the specification, analysis, design, modeling, and verification of the FMPR system is proposed. This safety-critical system is distributed based on multi-agents.  ...  Thus, safety and liveness properties are formally specified. After the detailed design phase, the system is formally modeled and verified by Hierarchical Coloured-Petri Nets (CP-Nets).  ...  and role models of the Gaia multi-agent methodology. 5) Formal verification of the multi-agent-based FMPR system by using hierarchical CP-Nets.  ... 
doi:10.1109/access.2019.2958258 fatcat:7hkpawprbvainbvh22o5hxjqve

Composition challenges and approaches for cyber physical systems

Kaiyu Wan, Danny Hughes, Ka Lok Man, Tomas Krilavicius
2010 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications  
This shortcoming necessitates the development of effective methods and tools for analyzing and designing CPS.  ...  Cyber-Physical Systems (CPS) integrate computation with physical processes.  ...  networking, services and support for performance & functional analysis.  ... 
doi:10.1109/nesea.2010.5678065 dblp:conf/nesea/WanHMK10 fatcat:qhaa2nmzujgyzldkyhfafmntka

Testing and Validation of Modbus/TCP Protocol for Secure SCADA Communication in CPS using Formal Methods

Irfan A. Siddavatam, Sachin Parekh, Tanay Shah, Faruk Kazi
2017 Scalable Computing : Practice and Experience  
One of the greatest challenges is security testing of protocols. All CPS systems being live and attached to physical process can not be scheduled for penetration testing and verification.  ...  This paper presents design and implementation of industrial compliant SCADA test bed, the formal analysis of semantics and security of Modbus/TCP protocol using Coloured Petri Nets(CPN) tool.  ...  CPN [29] is the methodology used for modeling and verification of concurrent systems.  ... 
doi:10.12694/scpe.v18i4.1331 fatcat:knaf3bhlhvfivji2rxqd6klgb4

Internet of Medical Things: A Review of Recent Contributions Dealing with Cyber-Physical Systems in Medicine

Arthur Gatouillat, Youakim Badr, Bertrand Massot, Ervin Sejdic
2018 IEEE Internet of Things Journal  
The Internet of Medical Things designates the interconnection of communication-enabled medical-grade devices and their integration to wider-scale health networks in order to improve patients' health.  ...  We describe the practical application of the democratization of medical devices for both patients and health-care providers.  ...  To perform verification of IoMT models, several tools and algorithms were developed for hybrid state machine models [32] , [35] or for Petri net derived models [34] .  ... 
doi:10.1109/jiot.2018.2849014 fatcat:z2oytkgvu5gh5cuziawczhqdfe

Reviewing the Service Specification of the IEEE 802.16 MAC Layer Connection Management: A Formal Approach

Ana Morales, María Villapol
2013 CLEI Electronic Journal  
In most of the communication protocol specification documents, there is little, if any, use of more formal techniques for specifying the protocols, such as state and service primitive tables.  ...  The IEEE 802.16 standard document is responsible for specifying and describing the air interface of the BWA systems (Broadband Wireless Access Systems) point to multipoint fixed and mobile networks, and  ...  After the validation and verification of the protocol specification, and following the protocol verification methodology, we will compare the service specification presented in this paper with the protocol  ... 
doi:10.19153/cleiej.16.2.2 fatcat:cojokwt6tfamhf23i4frrl6k6y

A review of CPS 5 components architecture for manufacturing based on standards

Ahmadzai Ahmadi, Chantal Cherifi, Vincent Cheutet, Yacine Ouzrout
2017 2017 11th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)  
A framework of CPS 5 main components for manufacturing based on standards is proposed.  ...  This paper provides a review of CPS 5 components architecture for manufacturing as well as of CPS components challenges for manufacturing.  ...  The authors would like to thank SmartLink Project and Universite Lumiere Lyon2.  ... 
doi:10.1109/skima.2017.8294091 dblp:conf/skima/AhmadiCCO17 fatcat:y5xre6x2abh4loaz6edvmlbjnm

A Comprehensive Survey on Cyber-Physical Smart Grid Testbed Architectures: Requirements and Challenges

Abdallah A. Smadi, Babatunde Tobi Ajao, Brian K. Johnson, Hangtian Lei, Yacine Chakhchoukh, Qasem Abu Al-Haija
2021 Electronics  
The performance and efficiency of the power grid are enhanced with the incorporation of communication networks, intelligent automation, advanced sensors, and information technologies.  ...  In this paper, a comprehensive review of the advancement of CP-SGs with their corresponding testbeds including diverse testing paradigms has been performed.  ...  In a nutshell, it integrates the methodology of model and replication.  ... 
doi:10.3390/electronics10091043 fatcat:n4vdtq7ue5c5bmyfotityonduu

Model-driven Engineering Tools and Languages for Cyber-physical Systems -A Systematic Literature Review

Mustafa Abshir Mohamed, Geylani Kardas, Moharram Challenger
2021 IEEE Access  
Regarding the development of CPS, there currently exists no standard methodology owing to the complexity of the domain.  ...  Nevertheless, it is always almost challenging, especially for the new researchers in this field, to determine the appropriate tools and languages to perform a particular MDE activity during CPS development  ...  and functionality of the design models for CPS. • DSLs and domain-specific simulation and verification tools specific for CPS are currently rare.  ... 
doi:10.1109/access.2021.3068358 fatcat:7daa32lsgjagdkbryifoqjddra

Cyber-physical systems: Milestones and research challenges

Kyung-Joon Park, Rong Zheng, Xue Liu
2012 Computer Communications  
(2010-0022076), and in part by the DGIST R&D Program of the Ministry of Education, Science and Technology of Korea (12-BD-0404).  ...  Acknowledgements This work was supported in part by the Basic Science Research Program through the National Research Foundation (NRF) of Korea funded by the Ministry of Education, Science and Technology  ...  over networks for integration of communication and control, and sensor and actuator networks for coordination between communication and computation.  ... 
doi:10.1016/j.comcom.2012.09.006 fatcat:iow2gcdzdfcy3j4fogi67dd3ni

A Survey on Formal Verification Approaches for Dependable Systems [article]

Fayhaa Hameedi Khlaif, Shawkat Sabah Khairullah
2022 arXiv   pre-print
This paper focuses on presenting various studies on formal verification approaches and how the V&V can be achieved for developing high dependable digital embedded systems  ...  As a result, any mistake or error made during the design stage of the embedded device can change the overall functionality of the critical system and cause catastrophic consequences.  ...  for the control part of a CPS system by analyzing and verifying it in several times design and verification perform V&V on (non)-functional properties of an and support for Simulink processes autonomous  ... 
arXiv:2204.12913v1 fatcat:y7jyq2gdjrgyxjtyibuknintfq

Formal Specification and Design Techniques for Wireless Sensor and Actuator Networks

Diego Martínez, Apolinar González, Francisco Blanes, Raúl Aquino, José Simo, Alfons Crespo
2011 Sensors  
This paper presents a design and validation method for Wireless Sensor and Actuator Networks (WSAN) which is supported on a minimal set of wireless components represented in Colored Petri Nets (CPN).  ...  However, the nondeterministic and concurrent behavior of distributed systems makes their analysis and design complex, often resulting in less than satisfactory performance in simulation and test bed scenarios  ...  Spanish Government and the SIDERELI project DPI2008-06737-C02-01/02 (Ministerio de Ciencia e Innovación of Spain and European founds FEDER).  ... 
doi:10.3390/s110101059 pmid:22344203 pmcid:PMC3274114 fatcat:f53z52duijdczpkttlykxx2254

Security Analysis for Distributed IoT-Based Industrial Automation [article]

Vuk Lesi, Zivana Jakovljevic, Miroslav Pajic
2020 arXiv   pre-print
to enable system-level verification of safety properties in the presence of network-based attacks.  ...  Specifically, we show how CIPN models of networked industrial IoT controllers can be transformed into Time Petri Net (TPN)-based models, and composed with plant and security-aware channel models in order  ...  It was also partially supported by Serbian Ministry of Education, Science and Technological Development, research grants TR35004 and TR35020.  ... 
arXiv:2006.00044v1 fatcat:bhrkqyau75eldjrn27klehepca

Security, trust and risk in Digital Rights Management ecosystem

Zhiyong Zhang
2010 2010 International Conference on High Performance Computing & Simulation  
scenarios, with an ultimate goal to meet key requirements of security, interoperability and usability.  ...  In order to effectively protect digital assets with copyrights against piracy and misuse, it is necessary for the contents value chain as a whole to investigate on some open issues and advances.  ...  It is a multi-layer framework, and also embodies a methodology of hierarchical analysis.  ... 
doi:10.1109/hpcs.2010.5547093 dblp:conf/ieeehpcs/Zhang10 fatcat:knkl3zsxubfopdjy5pq6ide3nm

An Agent-Based Approach For Hybrid Multi-Cloud Applications

Djamel Benmerzoug
2013 Scalable Computing : Practice and Experience  
Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with a minimal management  ...  We demonstrated the practicability of our approach by embedding it in a Web services language for specifying business protocols, which conducive to reuse, refinement and aggregation of our business protocols  ...  The author would like to thank the anonymous reviewers for their valuable comments and suggestions, which were helpful in improving the paper.  ... 
doi:10.12694/scpe.v14i2.843 fatcat:s3sejvxfgbfx7pj5yef77tbfry

A Coloured Petri Net Methodology and Library for Security Analysis of Network Protocols

San Choosang, Steven Gordon
2014 Journal of Computers  
With Coloured Petri nets as the selected formal method, this paper proposes a methodology to support a modeller in performing security analysis of a protocol.  ...  However for a protocol modeller the techniques available for security analysis often require expert knowledge of the technique.  ...  SECURITY ANALYSIS METHODOLOGY A. Methodology Overview We propose a methodology for modelling and analysing network protocols from a functional and security viewpoint using Coloured Petri nets.  ... 
doi:10.4304/jcp.9.2.243-256 fatcat:urzmfmnkmbdojjl7rp4vnhyx7i
« Previous Showing results 1 — 15 out of 2,674 results