Activities per year
Abstract
In critical computer-based systems, safety and reliability are of principal concern, especially when dealing with concurrent transactions on which mobile systems depend on, such as the emerging Internet of Things (IoT). We present a protocol to ensure safety and reliability of systems where concurrent modification of data on routers in a network is possible, by detecting cycles in the conflict graph and ensuring the system is free of any cycle in an effective manner. The existence of a cycle in a conflict graph means that the schedule of such concurrent transactions cannot be serialized. We use temporal logic in the representation of this protocol model to ensure the safety of systems. Administrative routing protocols benefit significantly from this protocol model.
Original language | English |
---|---|
Title of host publication | Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health |
Subtitle of host publication | International 2019 Cyberspace Congress, CyberDI and Cyberlife, Beijing, China, December 16-19, 2019, Proceedings, Part 11 |
Editors | Huansheng Ning |
Publisher | Springer Singapore |
Pages | 149-168 |
Number of pages | 20 |
Edition | 1st |
ISBN (Electronic) | 9789811519253 |
ISBN (Print) | 9789811519246, 9789811519215 |
DOIs | |
Publication status | Published - 6 Dec 2019 |
Event | International Conference on Cyberspace Data and Intelligence 2019 - Beijing, China Duration: 16 Dec 2019 → 18 Dec 2019 http://www.cybermatics.org/CyberCon/CyberDI2019/ |
Publication series
Name | Communications in Computer and Information Science |
---|---|
Publisher | Springer Singapore |
Volume | 1138 |
ISSN (Electronic) | 1865-0929 |
Conference
Conference | International Conference on Cyberspace Data and Intelligence 2019 |
---|---|
Abbreviated title | CyberDI 2019 |
Country/Territory | China |
City | Beijing |
Period | 16/12/19 → 18/12/19 |
Internet address |
Fingerprint
Dive into the research topics of 'An efficient concurrent system networking protocol specification and verification using linear temporal logic'. Together they form a unique fingerprint.Activities
- 1 Oral presentation
-
An efficient concurrent system networking protocol specification and verification using linear temporal logic
Ra-ed Bani Abdelrahman (Speaker), Hussain Al-Aqrabi (Speaker) & Richard Hill (Speaker)
Dec 2019Activity: Talk or presentation types › Oral presentation