IMIST


Vue normale Vue MARC vue ISBD

Modeling and verification of some communication protocols using Event-B Method

par Filali, Rajaa Publié par : Université Mohammed V (Rabat) Détails physiques : 109 pages Année : 2017
Tags de cette bibliothèque : Pas de tags pour ce titre. Connectez-vous pour ajouter des tags.
    Évaluation moyenne : 0.0 (0 votes)
Type de document Site actuel Cote Statut Date de retour prévue Code à barres Réservations
Thèse universitaire La bibliothèque des sciences de l'ingénieur
Th-005.1 FIL (Parcourir l'étagère) Disponible 0000000028642
Total des réservations: 0

PH.D Université Mohammed V 2017

The continuous growth of complex systems across different areas in modern life makes the development of correct software increasingly important. However, software often contains errors. This increases the development costs, and makes software systems vulnerable. Guaranteeing reliability is therefore crucial, especially when the cost of failure is expensive in monetary terms and even more crucial when human safety is at risk. To deal with reliability and correctness, formal methods offer rigorous mathematical techniques to model and verify the systems. Event-B is one of these formal methods. Event-B is a recent formalism for specification and verification of software and hardware systems. It is supported by an extensible tool called Rodin. During recent years, Event-B and Rodin have been increasingly used in the development of systems across different critical and non-critical domains. In this thesis, after an in- depth study of Event-B, we have applied Event-B approach to protocol engineering activities such as protocol specification and verification.
Increasingly numerous and complex communication protocols are being employed in distributed systems and computer networks of various types. Therefore, it is vitally important to ensure that they work correctly and do not contain errors. The use of Event-B supports all relevant phases of protocol development and results in the creation of precise models that can be formally verified early during the development cycle.
In this research, our interest is focused on protocols with Voice over IP (VoIP), ARQ protocols and security protocols. Many protocols are chosen to be modeled and verified to describe how they work and prove their correctness. In our approach, a protocol specification written in a natural language is examined before modeling in order to plan the modeling and refinement strategy. After that, starting from a simple abstract model, concrete

models in several different abstraction levels are constructed by gradually introducing complex structures and concepts. Each refinement step is accompanied by proof obligations which must be discharged in order to verify its correctness.

Il n'y a pas de commentaire pour ce document.

pour proposer un commentaire.
© Tous droits résérvés IMIST/CNRST
Angle Av. Allal Al Fassi et Av. des FAR, Hay Ryad, BP 8027, 10102 Rabat, Maroc
Tél:(+212) 05 37.56.98.00
CNRST / IMIST

Propulsé par Koha