A Mechanized Model for CAN Protocols
نویسندگان
چکیده
Formal reasoning on Peer-to-Peer (P2P) systems is an intimidating task. This paper focuses on broadcast algorithms for Content Addressable Network (CAN). Since these algorithms run on top of complex P2P systems, finding the right level of abstraction in order to prove their functional correctness is difficult. This paper presents a mechanized model for both CAN and broadcast protocols over those networks. We demonstrate that our approach is practical by identifying sufficient conditions for a protocol to be correct and efficient. We also prove the existence of a protocol verifying those properties.
منابع مشابه
Computer Aided Verification of Accountability in Electronic Payment Protocol with CryptoVerif
During the past few decades electronic payment protocols has been studied. A lot of electronic payment protocols, for example, 3KP, SET, have been proposed which claimed that have security properties. To our best knowledge, till now analysis of 3KP protocol has not with automatic tool in computational model. Recently owning to the contribution of Meng et al., 3KP protocol can be analyzed with a...
متن کاملSimulation of economic damage at mechanized wheat harvesting in Khuzestan province of Iran
Abstract The aim of this research is to present a simulation model for reducing economic damages of mechanized wheat harvesting in the weather conditions of Khuzestan province and similar areas. The simulated model is composed of three sub-models, for determining of the appropriate working hours, grain losses, and economic sub-model. In order to determine the appropriate working hours, a mathem...
متن کاملTechnical Report: Computationally Sound Secrecy Proofs by Mechanized Flow Analysis
We present a novel approach for proving secrecy properties of security protocols by mechanized flow analysis. In contrast to existing tools for proving secrecy by abstract interpretation, our tool enjoys cryptographic soundness in the strong sense of blackbox reactive simulatability/UC which entails that secrecy properties proven by our tool are automatically guaranteed to hold for secure crypt...
متن کاملMechanized Extraction of Topology Anti-patterns in Wireless Networks
Exhaustive and mechanized formal verification of wireless networks is hampered by the huge number of possible topologies and the large size of the actual networks. However, the generic communication structure in such networks allows for reducing the root causes of faults to faulty (sub-)topologies, called anti-patterns, of small size. We propose techniques to find such anti-patterns using a com...
متن کاملEnergy Flows Modeling and Economic Evaluation of Watermelon Production in Fars Province of Iran
This study aimed to evaluate the efficiency of energy consumption and economic analysis of different watermelon cultivation systems in Fars Province of Iran. Watermelon production systems were classified into five systems, namely, custom tillage (group 1), conservation tillage (group 2), traditional planting (group3), semi mechanized planting (group 4), and mechanized planting (group 5). Data w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013