A Path-Based Method for Protocol Validation

碩士 === 國立交通大學 === 資訊工程研究所 === 82 === The protocol validation methods to date are based on the reachability analysis technique and suffer from the "state space explosion problem." Therefore, almost no existing methods can be applied to complex pr...

Full description

Bibliographic Details
Main Authors: Jen-Ming Chang, 張仁銘
Other Authors: Chyan-Goei Chung
Format: Others
Language:zh-TW
Published: 1994
Online Access:http://ndltd.ncl.edu.tw/handle/88694815857531982692
id ndltd-TW-082NCTU0392058
record_format oai_dc
spelling ndltd-TW-082NCTU03920582016-07-18T04:09:34Z http://ndltd.ncl.edu.tw/handle/88694815857531982692 A Path-Based Method for Protocol Validation 路徑導向通訊協定驗證方法 Jen-Ming Chang 張仁銘 碩士 國立交通大學 資訊工程研究所 82 The protocol validation methods to date are based on the reachability analysis technique and suffer from the "state space explosion problem." Therefore, almost no existing methods can be applied to complex protocols. Inspecting a normal execution sequence generated within the reachability analysis, we find that every entity progresses a state transition sequence starting from its initial state and ending to its initial state again, referred to a path. The concurrent path is a set of paths each of which is a path of the constituent entity. In this paper, we propose a path-based protocol validation approach applying the reachability analysis to each concurrent path to determine its legality. Futhermore, all the global states and the execution sequences are available and the errors, if any, are also detected. The memory requirement for this approach grows linearly with the complexity of the protocol instead of exponentially, thus the "state space explosion problem" is solved. For a protocol with two entities, we also propose a method to improve the efficiency of validation. This method splits a path into, message sent, message received, and send and receive action sequences. The legality of a current path is determined and the errors, if any, are detected with simple mathematical operations. The major contributions of this research are: (1)The concepts of paths and concurrent paths are proposed to represent the behavior of the protocols. (2)The path-based approach can detect any errors in the protocols and does not suffer from the "state space explosion problem". (3)An improved method without keeping any system state and with better performance is proposed for the protocols with two entities. Chyan-Goei Chung 鍾乾癸 1994 學位論文 ; thesis 63 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 資訊工程研究所 === 82 === The protocol validation methods to date are based on the reachability analysis technique and suffer from the "state space explosion problem." Therefore, almost no existing methods can be applied to complex protocols. Inspecting a normal execution sequence generated within the reachability analysis, we find that every entity progresses a state transition sequence starting from its initial state and ending to its initial state again, referred to a path. The concurrent path is a set of paths each of which is a path of the constituent entity. In this paper, we propose a path-based protocol validation approach applying the reachability analysis to each concurrent path to determine its legality. Futhermore, all the global states and the execution sequences are available and the errors, if any, are also detected. The memory requirement for this approach grows linearly with the complexity of the protocol instead of exponentially, thus the "state space explosion problem" is solved. For a protocol with two entities, we also propose a method to improve the efficiency of validation. This method splits a path into, message sent, message received, and send and receive action sequences. The legality of a current path is determined and the errors, if any, are detected with simple mathematical operations. The major contributions of this research are: (1)The concepts of paths and concurrent paths are proposed to represent the behavior of the protocols. (2)The path-based approach can detect any errors in the protocols and does not suffer from the "state space explosion problem". (3)An improved method without keeping any system state and with better performance is proposed for the protocols with two entities.
author2 Chyan-Goei Chung
author_facet Chyan-Goei Chung
Jen-Ming Chang
張仁銘
author Jen-Ming Chang
張仁銘
spellingShingle Jen-Ming Chang
張仁銘
A Path-Based Method for Protocol Validation
author_sort Jen-Ming Chang
title A Path-Based Method for Protocol Validation
title_short A Path-Based Method for Protocol Validation
title_full A Path-Based Method for Protocol Validation
title_fullStr A Path-Based Method for Protocol Validation
title_full_unstemmed A Path-Based Method for Protocol Validation
title_sort path-based method for protocol validation
publishDate 1994
url http://ndltd.ncl.edu.tw/handle/88694815857531982692
work_keys_str_mv AT jenmingchang apathbasedmethodforprotocolvalidation
AT zhāngrénmíng apathbasedmethodforprotocolvalidation
AT jenmingchang lùjìngdǎoxiàngtōngxùnxiédìngyànzhèngfāngfǎ
AT zhāngrénmíng lùjìngdǎoxiàngtōngxùnxiédìngyànzhèngfāngfǎ
AT jenmingchang pathbasedmethodforprotocolvalidation
AT zhāngrénmíng pathbasedmethodforprotocolvalidation
_version_ 1718351586626895872