A Decision Procedure for Solving Constraint Systems in Presence of Multiple Independent Intruders
نویسندگان
چکیده
We consider a model of multiple independent intruders that have no ability to share knowledge between each other. We use this model to analyze security in wireless ad-hoc networks, where each intruder has a local control in the network, i.e., he can read and send messages only to his direct neighbors. Another application is the mobile ambient calculus where several intruder processes are not able to exchange their knowledge. Both these security problems can be reduced to satisfiability of lazy intruder constraint systems, for a bounded number of steps of the honest agents. However, the constraint-based verification method usually relies on a well-formedness property of constraints. This well-formedness entails that the constraints can be ordered so that the intruder knowledge is monotonically growing. This does not hold for several intruders that learn independent of each other. For the resulting generalized class of weak-well-formed constraints, we give a novel constraint reduction procedure and prove that it is sound, complete and terminating. We also prove that it is NP-complete. KeywordsMultiple independent intruders, constraint-based deduction, routing protocols, mobile code.
منابع مشابه
A Fuzzy Based Mathematical Model for Vendor Selection and Procurement Planning with Multiple Discounts in the Presence of Supply Uncertainty
Supplier selection and material procurement planning are the most important issues in supply chain management. This decision is complicated when the buyers face with discount price schemes. In real situation, each supplier may apply different methods such as different types of discount schedules and various types of payment in order to increase market share. In this situation, buyers try to sel...
متن کاملMultiple Independent Lazy Intruders
We consider a model of multiple independent intruders that have no ability to share knowledge between each other. We use this model to analyze security in wireless ad-hoc networks, where each intruder has a local control in the network, i.e., he can read and send messages only to his direct neighbors. Another application is the mobile ambient calculus where several intruder processes are not ab...
متن کاملA dynamic programming approach for solving nonlinear knapsack problems
Nonlinear Knapsack Problems (NKP) are the alternative formulation for the multiple-choice knapsack problems. A powerful approach for solving NKP is dynamic programming which may obtain the global op-timal solution even in the case of discrete solution space for these problems. Despite the power of this solu-tion approach, it computationally performs very slowly when the solution space of the pr...
متن کاملSolving product mix problem in multiple constraints environment using goal programming
The theory of constraints is an approach to production planning and control that emphasizes on the constraints to increase throughput by effectively managing constraint resources. One application in theory of constraints is product mix decision. Product mix influences the performance measures in multi-product manufacturing system. This paper presents an alternative approach by using of goal pro...
متن کاملTruck scheduling problem in a cross-docking system with release time constraint
In a supply chain, cross-docking is one of the most innovative systems for ameliorating the operational performance at distribution centers. Cross-docking is a logistics strategy in which freight is unloaded from inbound trucks and (almost) directly loaded into outbound trucks, with little or no storage in between, thus no inventory remains at the distribution center. In this study, we consider...
متن کامل