Unlock instant, AI-driven research and patent intelligence for your innovation.

Control method for cooperative safety control of fully distributed subsystem and Petri network model

A technology of safety control and control method, applied in transmission systems, electrical components, etc., can solve the problems of poor flexibility and fault tolerance of global safety diagnosis, inefficient information, poor flexibility and fault tolerance of SNNI, etc., and achieve good scalability. flexibility and adaptability, improving system security, flexibility and fault tolerance

Active Publication Date: 2019-09-06
XIDIAN UNIV
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In terms of accuracy and after reading some of these articles, it is found that there are still many deficiencies, which are as follows: 1. It focuses on checking that the SNNI, ILPs and corresponding linear constraints of any given system may be astronomical in size, resulting in incalculable difficulty
2. Accurate and timely provision of information about SNNI is inefficient
When a system is not SNNI, identifying the corresponding areas of information leakage is time-consuming and error-prone if this approach is used
3. The flexibility and fault tolerance of the global safety diagnosis method are poor
[0005] (1) Existing research on information security issues by establishing a Petri net model, most of which adopt a global diagnostic method after Petri net modeling, poor flexibility and fault tolerance, and complex calculations
[0006] (2) Existing research on the existence of information security by establishing a Petri net model. When the final result of the judgment is that the system is insecure, it is difficult to determine which part of the system is insecure and leads to information leakage, that is, the system is insecure. Maintenance is also inconvenient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method for cooperative safety control of fully distributed subsystem and Petri network model
  • Control method for cooperative safety control of fully distributed subsystem and Petri network model
  • Control method for cooperative safety control of fully distributed subsystem and Petri network model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0094] exist image 3 and Figure 4 Medium N 1 , N 2 , N 3 yes figure 2 The upper-level system N is based on the sub-network decomposed by the place index, and two methods are used to calculate the security of the upper-level system respectively.

[0095] Global SNNI:

[0096] max=l 1 +l 2 +l 3 ;

[0097] 2-2*l 1 >=0;

[0098] 2-2*l 1 -2*l 2 >=0;

[0099] 2-2*l 3 >=0;

[0100] l 1 >=0;

[0101] l 1 +l 2 >=0;

[0102] l 3 >=0;

[0103] @bin(l 1 );

[0104] @bin(l 2 );

[0105] @bin(l 3 );

[0106] Calculated at the initial identity m 0 When enabled, the maximum number of triggers for low-level transitions is as follows:

[0107]

[0108] Plugging the result into gives:

[0109] 2>=2*l 11 ;

[0110] 0>=2*l 11 +2*l 12 ;

[0111] 0>=2*l 13 +2*h 12 ;

[0112] 0>=h 11 ;

[0113] 0>=h 12 ;

[0114] 0>=h 11 ;

[0115] 0>=h 14 ;

[0116] 1>=h 13 ;

[0117] 2-2*l 11 + h 11 >=2*l 21 ;

[0118] -2*l 11 -2*l 12 + h 12 >=2*l 21 +2...

Embodiment 2

[0244] exist Figure 10 Medium N 1 , N 2 , N 3 yes Figure 9 The host system N is based on the sub-network decomposed by the index of the place, and two methods are used to calculate the security of the host system respectively.

[0245] Global SNNI:

[0246] max=l 1 +l 2 ;

[0247] 1-l 1 >=0;

[0248] 1+l 1 -l 2 >=0;

[0249] 1+l 2 >=0;

[0250] l 1 >=0;

[0251] -l 1 +l 2 >=0;

[0252] -l 2 >=0;

[0253] @bin(l 1 );

[0254] @bin(l 2 );

[0255] Calculated at the initial identity m 0 When enabled, the maximum number of triggers for low-level transitions is as follows:

[0256] Variable Value Reduced Ccst

[0257] L1 0.000000-1.000000

[0258] L2 0.000000-1.000000

[0259] Plugging the result into gives:

[0260] 1>=l 11 ;

[0261] 1>=l 12 ;

[0262] 1>=h 12 ;

[0263] 0>=h 11 ;

[0264] 0>=l 11 ;

[0265] 0>=l 12 ;

[0266] 1-l 11 + h 11 >=l 21 ;

[0267] 1+l 11 -l 12 >=l 22 ;

[0268] 1+l 12 -h 12 >=h 22 ;

[0269] l 11...

Embodiment 3

[0356] Host system N such as Figure 11 Shown; the index decomposition based on places is as follows Figure 12 shown;

[0357] Global SNNI:

[0358] max=l 1 +l 2 ;

[0359] 1+l 1 >=0;

[0360] -l 1 >=0;

[0361] 1+l 1 >=0;

[0362] 1+l 2 >=0;

[0363] -l 2 >=0;

[0364] @bin(l 1 );

[0365] @bin(l 2 );

[0366] Calculated at the initial identity m 0 When enabled, the maximum number of triggers for low-level transitions is as follows:

[0367] Variable Value Reduced Cost

[0368] L1 0.000000-1.000000

[0369] L2 0.000000-1.000000

[0370] Through the SIMIPN simulation platform in the laboratory, it can be concluded that the reachable state of the original upper system is 3722, and in the case of the initial state [1, 0, 1, 1, 0], the shortest step to reach all reachable states is 1860. If the global SNNI calculation is used, after calculating the maximum number of initiations of low-order transitions under the initial state conditions, it is necessary to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of cooperative control systems, and discloses a control method for cooperative safety control of a fully distributed subsystem, and a Petri network model.The method comprises: decomposing an upper system into a plurality of lower systems through a decomposition technology based on index decomposition of a library; calculating the reachable state of theith lower system and the shortest step length for reaching each reachable state; and calculating the security of the ith lower system through a distributed security diagnosis algorithm. The distributed diagnosis method provided by the invention has very high reliability. A complex Petri net model is decomposed through various net decomposition methods, and the model can be decomposed into a plurality of subnets, certain properties of an original system can be obtained through research on the subnets, meanwhile, a certain part of the original system can be specifically obtained, the operationtime is shortened and the speed is increased compared with global diagnosis, and later-stage safety maintenance of the system is more convenient.

Description

technical field [0001] The invention belongs to the technical field of cooperative control systems, and in particular relates to a control method and a Petri network model for fully distributed subsystem cooperative safety control. Background technique [0002] Today, with the rapid development of Internet technology, we have entered an era full of information technology. The development of information technology has become an important strategic resource for the development of our society. Therefore, the competition for information among various countries and enterprises has become more and more fierce. . Security is one of the most fundamental properties in information-driven systems, such as database management, e-commerce, and mobile communication networks. For these systems, any important information should not be destroyed or obtained by unauthorized users (called intruders). The concept of interference is to prevent any information leakage, to prevent intruders from...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/20H04L67/10
Inventor 张婷婷胡核算樊一宏
Owner XIDIAN UNIV