Path-based protocol verification approach

被引:1
|
作者
Liu, WC [1 ]
Chung, CG [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30050, Taiwan
关键词
protocol verification; concurrent path; path-based verification;
D O I
10.1016/S0950-5849(99)00061-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protocol verification is one of the most challenging tasks in the design of protocols. Among the various proposed approaches, the one based on reachability analysis (or known as state enumeration approach) is of the most: simple, automatic and effective. However, the state explosion problem is a principle obstacle toward successful and complete verifications of complex protocols. To overcome this problem, we proposed a new approach, the "path-based approach." The idea is to divide a protocol into a collection of individual execution record, denoted as: concurrent paths, a partial order representation recording the execution paths of individual entities. Then, the verification of the protocol is, thus, replaced by that of individual concurrent paths. Since concurrent paths can be automatically generated through Cartesian product:of the execution paths of all modules, and verified independently, the memory requirement is limited to the complexity of individual concurrent path rather than the whole protocol. Thus, the state explosion problem is alleviated from such "divide and conquer" approach. Furthermore, we propose an algorithm, making the trade-off on memory requirement to generate the concurrent paths more efficiently; and utilize the technique of symmetric verification, parallel computing to improve the efficiency of verification. Eventually, our experience of verifying real protocols shows that our approach uses much less memory:and time than reachability analysis. (C) 2000 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:229 / 244
页数:16
相关论文
共 50 条
  • [31] Path-Based Program Repair
    Riener, Heinz
    Ehlers, Ruediger
    Fey, Goerschwin
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2015, (178): : 22 - 32
  • [32] Path-Based range query processing using sorted path and rectangle intersection approach
    Ng, HK
    Leong, HW
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2004, 2973 : 184 - 189
  • [33] Path-based morphological openings
    Heijmans, H
    Buckley, M
    Talbot, H
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 3085 - 3088
  • [34] Path-based supports for hypergraphs
    Brandes, Ulrik
    Cornelsen, Sabine
    Pampel, Barbara
    Sallaberry, Arnaud
    JOURNAL OF DISCRETE ALGORITHMS, 2012, 14 : 248 - 261
  • [35] Bagging for path-based clustering
    Fischer, B
    Buhmann, JM
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2003, 25 (11) : 1411 - 1415
  • [36] Path-based buffer insertion
    Sze, C. N.
    Alpert, Charles J.
    Hu, Jiang
    Shi, Weiping
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2007, 26 (07) : 1346 - 1355
  • [37] PATH-BASED SCHEDULING FOR SYNTHESIS
    CAMPOSANO, R
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 1991, 10 (01) : 85 - 93
  • [38] Tractability of path-based inheritance
    1600, Morgan Kaufmann Publ Inc, San Mateo, CA, USA (02):
  • [39] Path-based multicasting in multicomputers
    Harutyunyan, H.
    Wang, S.
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2007, : 220 - +
  • [40] Path-based system optimal dynamic traffic assignment: A subgradient approach
    Zhang, Pinchao
    Qian, Sean
    TRANSPORTATION RESEARCH PART B-METHODOLOGICAL, 2020, 134 : 41 - 63