Noninterference Analysis of Bounded Petri Nets Using Basis Reachability Graph

被引:1
|
作者
Ran, Ning [1 ]
Nie, Jingyao [1 ]
Meng, Aiwen [1 ]
Seatzu, Carla [2 ]
机构
[1] Hebei Univ, Coll Elect & Informat Engn, Lab Energy Saving Technol, Baoding 071002, Peoples R China
[2] Univ Cagliari, Dept Elect & Elect Engn, I-09124 Cagliari, Italy
基金
中国国家自然科学基金;
关键词
Petri nets; Vectors; Security; Interference; Supervisory control; Monitoring; Automata; Discrete event systems (DESs); noninterference; Petri nets (PNs); security; OPACITY; ENFORCEMENT; DIAGNOSABILITY;
D O I
10.1109/TAC.2024.3397695
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we deal with two problems related to security and privacy of bounded Petri nets, namely, noninterference analysis and enforcement. A system could be monitored by different types of users, high-level and low-level users, who have access to different information even if both know the structure of the system. Low-level users can observe only the occurrence of a subset of events. On the contrary, high-level users can observe the occurrence of all the events affecting the system dynamics. A system is said noninterferent if low-level users cannot infer the occurrence of those events that are observable only by high-level users. In this article, we deal with the problems of analysis and enforcement of a particular noninterference property, namely, strong nondeterministic noninterference (SNNI). In particular, we show that, under the assumption of acyclicity of the high-level subnet, the notions of basis marking and basis reachability graph allow to solve the problems of SNNI analysis and enforcement with clear advantages in terms of computational complexity since they prevent exhaustive marking enumeration.
引用
收藏
页码:7159 / 7165
页数:7
相关论文
共 50 条
  • [1] HIERARCHICAL REACHABILITY GRAPH OF BOUNDED PETRI NETS FOR CONCURRENT-SOFTWARE ANALYSIS
    NOTOMI, M
    MURATA, T
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1994, 20 (05) : 325 - 336
  • [2] Efficient reachability analysis of bounded Petri nets using constraint programming
    Bourdeaud'huy, T
    Yim, P
    Hanafi, S
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 1870 - 1875
  • [3] A reachability graph partitioning technique for the analysis of deadlock prevention methods in bounded Petri nets
    Fumagalli, Ivano
    Piroddi, Luigi
    Cordone, Roberto
    2010 AMERICAN CONTROL CONFERENCE, 2010, : 3365 - 3370
  • [4] Non-Blockingness Verification of Bounded Petri Nets Using Basis Reachability Graphs
    Gu, Chao
    Ma, Ziyue
    Li, Zhiwu
    Giua, Alessandro
    IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 1220 - 1225
  • [5] Noninterference Enforcement via Supervisory Control in Bounded Petri Nets
    Basile, Francesco
    De Tommasi, Gianmaria
    Sterle, Claudio
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3653 - 3666
  • [6] REACHABILITY ANALYSIS OF PETRI NETS USING SYMMETRIES
    STARKE, PH
    SYSTEMS ANALYSIS MODELLING SIMULATION, 1991, 8 (4-5): : 293 - 303
  • [7] Liveness and deadlock-freeness verification and enforcement in bounded Petri nets using basis reachability graphs
    Gu, Chao
    Ma, Ziyue
    Li, Zhiwu
    AUTOMATICA, 2024, 164
  • [8] A symbolic reachability graph for coloured petri nets
    Chiola, G
    Dutheillet, C
    Franceschinis, G
    Haddad, S
    THEORETICAL COMPUTER SCIENCE, 1997, 176 (1-2) : 39 - 65
  • [9] Reachability graph for autonomous continuous Petri nets
    David, R
    Alla, H
    POSITIVE SYSTEMS, PROCEEDINGS, 2003, 294 : 63 - 70
  • [10] Hierarchical Reachability Graph Generation for Petri Nets
    Peter Buchholz
    Peter Kemper
    Formal Methods in System Design, 2002, 21 : 281 - 315