Simulation of P2P resource access control protocols in Petri-net

Chang You Zhang*, Yu Zhang, Yuan Da Cao, Gui Hong Li, Shu Feng Duan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

To guarantee the rationality of the resource access and the correctness of the protocol design, an access control protocol is proposed and the designed protocol is modeled in Petri-net. Firstly, the protocol is analyzed by means of the properties of Petri-net to prove its correctness. Then, the protocol model is created, run and debugged using CPN Tools. The performance is simulated by means of observing the running steps of the protocol. The experiment results show that stepping into the protocol is very helpful to discover or eliminate the designing bug and to optimize the protocol design for meeting the given goal.

Original languageEnglish
Pages (from-to)925-929
Number of pages5
JournalBeijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology
Volume30
Issue number8
Publication statusPublished - Aug 2010
Externally publishedYes

Keywords

  • Access control
  • P2P network
  • Petri-net
  • Protocol simulation

Fingerprint

Dive into the research topics of 'Simulation of P2P resource access control protocols in Petri-net'. Together they form a unique fingerprint.

Cite this