Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Credibility modeling and verification method for industrial control network protocol

An industrial control network and verification method technology, applied in the field of reliability modeling and verification oriented to industrial control network protocols, can solve the problem that there is no credibility modeling and verification method, no credibility verification, industrial control Network untrustworthiness and other issues, to achieve the effect of verifying credibility and reducing difficulty

Active Publication Date: 2022-06-21
DALIAN UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Different companies customize different industrial control network types and protocols according to their own software and hardware characteristics, and most of them have not passed the credibility verification. The untrustworthiness of industrial control networks is an important issue affecting the development of industrial control network protocols.
[0003] There are many other credibility verification mechanisms at this stage, but limited to the logical structure of the modeling tool, the credibility verification mechanism cannot exert an excellent verification effect; and there is no perfect credibility modeling and Verification method, it is difficult to comprehensively discover the flaws and loopholes in the design of network communication protocols

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credibility modeling and verification method for industrial control network protocol
  • Credibility modeling and verification method for industrial control network protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] A reliability modeling and verification method for industrial control network protocols, such as figure 1 The detailed implementation steps are as follows:

[0040] S1, the protocol state, event and process variable characteristics are abstracted from the detailed description of the protocol (such as protocol specification or protocol exchange process), and the event is divided into internal events and external events. All events are interpreted as Boolean variables, meaning the event The trigger state, event variable and process variable definition statements are stored in the ram file, the first letter of the external event variable name begins with x, and the other variable names begin with non-x letters.

[0041] S2, fill in the abstracted protocol features into the table, and divide the cell in the form of an N-S graph if there is an alternative branch in a certain cell. The cell is divided into two parts: the execution interval and the state jump interval. The e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a credibility modeling and verification method for an industrial control network protocol, comprising: step 1: obtaining a detailed description of the industrial control network protocol; step 2: constructing a tabular model of the protocol according to a tabular state machine; step 3: Check the basic errors and exceptions of the tabular model; Step 4: Extract the event, protocol status and variable attributes to generate a verifiable attribute table; Step 5: Use linear Temporal logic LTL description, to obtain the attribute verification formula; Step 6: check the syntax of the attribute verification formula to determine whether the attribute verification formula is correct; Step 7: use the attribute verification formula to verify the tabular model, if If there is a situation in the model that does not conform to the attribute verification formula, the situation is output as a counterexample path, and the counterexample path is gradually fed back to the table state machine. By analyzing the counterexample path, protocol design defects are fully discovered.

Description

technical field [0001] The invention relates to the technical field of industrial control networks, in particular to a reliability modeling and verification method oriented to industrial control network protocols. Background technique [0002] In recent years, with the development of the interconnection of industrial control networks, industrial control networks have gradually developed towards the direction of cloud-edge-device collaboration. The credibility of the industrial control network system is a major strategic issue related to the national economy and people's livelihood, while the ecological environment in the field of industrial automation is relatively closed, and the credibility of the protocol faces great challenges in the process of protocol communication and interconnection. Different enterprises customize different industrial control network types and protocols according to their own software and hardware characteristics, and most of them have not undergone...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L41/14H04L43/18
CPCH04L41/145H04L43/18
Inventor 王洁高昊宇李鹏飞吴鑫涛陈志超高骜侯刚孔维强
Owner DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products