Applying Infinite Petri Nets to the Cybersecurity of Intelligent Networks, Grids and Clouds

Author:

Zaitsev Dmitry A.ORCID,Shmeleva Tatiana R.ORCID,Probert David E.ORCID

Abstract

Correctness of networking protocols represents the principal requirement of cybersecurity. Correctness of protocols is established via the procedures of their verification. A classical communication system includes a pair of interacting systems. Recent developments of computing and communication grids for radio broadcasting, cellular networks, communication subsystems of supercomputers, specialized grids for numerical methods and networks on chips require verification of protocols for any number of devices. For analysis of computing and communication grid structures, a new class of infinite Petri nets has been introduced and studied for more than 10 years. Infinite Petri nets were also applied for simulating cellular automata. Rectangular, triangular and hexagonal grids on plane, hyper cube and hyper torus in multidimensional space have been considered. Composing and solving in parametric form infinite Diophantine systems of linear equations allowed us to prove the protocol properties for any grid size and any number of dimensions. Software generators of infinite Petri net models have been developed. Special classes of graphs, such as a graph of packet transmission directions and a graph of blockings, have been introduced and studied. Complex deadlocks have been revealed and classified. In the present paper, infinite Petri nets are divided into two following kinds: a single infinite construct and an infinite set of constructs of specified size (and number of dimensions). Finally, the paper discusses possible future work directions.

Publisher

MDPI AG

Subject

Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science

Reference51 articles.

1. Modelling and Analysis of Communication and Cooperation Protocols Using Petri Net Based Model;Diaz;Comput. Netw.,1982

2. Petri Nets Theory for the Correctness of Protocols

3. Detection and Modeling of Cyber Attacks with Petri Nets

4. Machine Learning Cyberattack and Defense Strategies

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Automatic Extraction of Petri Nets from RFC Protocol Texts;2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD);2024-05-08

2. Q-Memory Task Routing to Prevent Deadlocks in Ethernet Control with Memory Crossbar Switching;Optical Memory and Neural Networks;2024-03

3. Methodology for International Transport Corridor Macro-Modeling Using Petri Nets at the Early Stages of Corridor Development with Limited Input Data;Modelling;2024-02-17

4. Reenterable colored Petri net model of Ebola virus dynamics;2023 IEEE International Conference on Machine Learning and Applied Network Technologies (ICMLANT);2023-12-14

5. Multi-Factor Authentication Modeling using Petri Nets: Review;2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD);2023-03-08

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3