Safety Message Verification Using History-Based Relative-Time Zone Priority Scheme
نویسندگان
چکیده
منابع مشابه
Safety Verification of Real Time Systems Serving Periodic Devices
In real-time systems response to a request from a controlled object must be correct and timely. Any late response to a request from such a device might lead to a catastrophy. The possibility of a task overrun, i.e., missing the deadline for completing a requested task, must be checked and removed during the design of such systems. Safe design of real-time systems running periodic tasks under th...
متن کاملUsing Message Sequence Charts for Component-Based Formal Verification
Message sequence charts (MSCs) are are a popular tool to informally explain the behavioral embedding of a component in its environment. In this paper we investigate if MSCs can also serve as a speci cation and reasoning technique for the composition of systems from components. We identify three challenges: (1) Semantic Duality: MSCs express global coordination properties as well as requirements...
متن کاملMESA: Message-Based System Analysis Using Runtime Verification
In this paper, we present a novel approach and framework for run-time verification of large, safety critical messaging systems. This work was motivated by verifying the System Wide Information Management (SWIM) project of the Federal Aviation Administration (FAA). SWIM provides live air traffic, site and weather data streams for the whole National Airspace System (NAS), which can easily amount ...
متن کاملA replay-attack resistant message authentication scheme using time-based keying hash functions and unique message identifiers
Hash-based message authentication codes are an extremely simple yet hugely effective construction for producing keyed message digests using shared secrets. HMACs have seen widespread use as ad-hoc digital signatures in many Internet applications. While messages signed with an HMAC are secure against sender impersonation and tampering in transit, if used alone they are susceptible to replay atta...
متن کاملDigital Signature Scheme with Message Recovery Using Knapsack-based ECC
Digital signature authentication scheme provides secure communication between two users. Digital signatures guarantee end-to-end message integrity and authentication information about the origin of a message. Digital signature schemes reduce transmission costs, because the message is contained in the signature itself and no separate message and signature need be sent again. These schemes are ve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer Networks and Communications
سال: 2019
ISSN: 2090-7141,2090-715X
DOI: 10.1155/2019/8568912