Abstract
Communication processes have to be observed because there are possibilities that a different kind of threats will occur in the processes of exchanging information in a network. These threats are connected with: the possibility of decryption, losing jurisdiction, believing in and freshness of information, message interception by intruders, etc. We also consider the run of the communication protocol operation. Security attributes have been introduced to analyze the chosen aspects of security, which are proposed by Burrows, Abadi, Needham [4] and others. They have created the system of rules that defines interrelated parts of communication operations with security aspects. In this research we continued the analysis of security in the direction of building the model of auditing and dynamic modification of chosen factors (adequate to the security aspect) with the possibility to form a prognosis.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. In: Harper, R. (ed.) Logics and Languages for Security, pp. 15–819 (2007)
Zhang, F., Bu, L., Wang, L., Zhao, J., Li, X.: Numerical Analysis of WSN Protocol Using Probabilistic Timed Automata. In: 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems (ICCPS), p. 237 (2012)
Lynch, N.: Timed and Probabilistic I/O Automata. In: 28th Annual IEEE/ACM Symposium on Logic in Computer Science (LICS), p. 12 (2013)
Chen, T., Han, T., Katoen, J.: Time-Abstracting Bisimulation for Probabilistic Timed Automata. In: 2nd IFIP/IEEE International Symposium on Theoretical Aspects of Software Engineering, TASE 2008, pp. 177–184 (2008)
Kwiatkowska, M., Norman, G., Segala, R., Sproston, J.: Automatic Verification of Real-time Systems with Discrete Probability Distribution. Theoretical Computer Science 282, 101–150 (2002)
Kwiatkowska, M., Norman, R., Sproston, J.: Symbolic Model Checking of Probabilistic Timed Automata Using Backwards Reachability. Tech. rep. CSR-03-10, University of Birmingham (2003)
Huang, Y.-S., Chiang, H.-S., Jeng, M.D.: Fault measure of discrete event systems using probabilistic timed automata. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1218–1223 (2011)
Wu, J., Wang, J., Rong, M., Zhang, G., Zhu, J.: Counterexample generation and representation in model checking for probabilistic timed automata. In: 2011 6th International Conference on Computer Science & Education (ICCSE), pp. 1136–1141 (2011)
Thorat, S.S., Markande, S.D.: Reinvented Fuzzy logic Secure Media Access Control Protocol (FSMAC) to improve lifespan of Wireless Sensor Networks. In: 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), pp. 344–349 (2014)
Liu, K., Ye, J.Y., Wang, Y.: The Security Analysis on Otway-Rees Protocol Based on BAN Logic. In: 2012 Fourth International Conference on Computational and Information Sciences (ICCIS), pp. 341–344 (2012)
Zhang, H., Liu, F., Yang, M., Li, W.: Simulation of colored time Petri nets. In: 2013 IEEE International Conference on Information and Automation (ICIA), pp. 637–642 (2013)
Li-Li, W., Xiao-jing, M., Yang, N.: Modeling and verification of Colored Petri Net in stop and wait protocol. In: 2010 International Conference on Computer Design and Applications (ICCDA), vol. 5, pp. V5-24–V5-28 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Piech, H., Grodzki, G., Ptak, A. (2015). The Modeling Algorithm of Communication Run Operations in a Network. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) Theory and Engineering of Complex Systems and Dependability. DepCoS-RELCOMEX 2015. Advances in Intelligent Systems and Computing, vol 365. Springer, Cham. https://doi.org/10.1007/978-3-319-19216-1_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-19216-1_32
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19215-4
Online ISBN: 978-3-319-19216-1
eBook Packages: EngineeringEngineering (R0)