TY - GEN
T1 - Security analysis based on Petri net for separation mechanisms in smart identifier network
AU - Yao, Linyuan
AU - Dong, Ping
AU - Du, Xiaojiang
AU - Zhang, Hongke
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/9/14
Y1 - 2017/9/14
N2 - Due to the widespread research on Smart Identifier NETwork (SINET), its security has received much attention recently. But most of those attempts consider SINET security from the specific attack perspective. To the best of our knowledge, none so far has paid attention to the security analysis and modeling of separation mechanisms in SINET. Therefore, this paper provides a different approach to security analysis based on Petri net. Our objective is to analyze the separation mechanisms security via the combination of model and state. This method represents the network structure and state transferring by way of Petri net. In addition, it introduces the security analysis method of tokens to explore the potential threatens. Finally, we analyze SINET via the combination of the number, logic, and time series of tokens in Petri net, and present the results. Our results are very promising in using such models to achieve such security objectives.
AB - Due to the widespread research on Smart Identifier NETwork (SINET), its security has received much attention recently. But most of those attempts consider SINET security from the specific attack perspective. To the best of our knowledge, none so far has paid attention to the security analysis and modeling of separation mechanisms in SINET. Therefore, this paper provides a different approach to security analysis based on Petri net. Our objective is to analyze the separation mechanisms security via the combination of model and state. This method represents the network structure and state transferring by way of Petri net. In addition, it introduces the security analysis method of tokens to explore the potential threatens. Finally, we analyze SINET via the combination of the number, logic, and time series of tokens in Petri net, and present the results. Our results are very promising in using such models to achieve such security objectives.
KW - Binding
KW - Model
KW - Petri net
KW - Security
KW - Separation
KW - Smart identifier network
UR - http://www.scopus.com/inward/record.url?scp=85032297218&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85032297218&partnerID=8YFLogxK
U2 - 10.1109/ICCCN.2017.8038510
DO - 10.1109/ICCCN.2017.8038510
M3 - Conference contribution
AN - SCOPUS:85032297218
T3 - 2017 26th International Conference on Computer Communications and Networks, ICCCN 2017
BT - 2017 26th International Conference on Computer Communications and Networks, ICCCN 2017
T2 - 26th International Conference on Computer Communications and Networks, ICCCN 2017
Y2 - 31 July 2017 through 3 August 2017
ER -