2022
DOI: 10.1007/978-3-031-05814-1_1
|View full text |Cite
|
Sign up to set email alerts
|

Compositional Verification of Railway Interlockings: Comparison of Two Methods

Abstract: Formal verification of safety of interlocking systems and of their configuration on a specific track layout is conceptually an easy task for model checking. Systems that control large railway networks, however, are challenging due to state space explosion problems. A possible way out is to adopt a compositional approach that allows safety of a large system to be deduced from the formal verification of parts in which the system has been properly decomposed. Two different approaches have been proposed in this re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…For each case, the statistics are shown first for each sub-network, then the global consumption of time and memory of the compositional approach and its reduction are shown in comparison with that of a monolithic verification for the full network. The first three examples have been presented at international conferences [1,2,16]; in particular the first one is the already mentioned EDL line, which has been decomposed in sub-networks related to each station of the line, among which the Køge station maintains its own high complexity. The second example is a single cut of a large network whose layout has been extracted from a portion of the main Florence station, while the third is a Belgian station on which a cluster cut has been applied, with the aim to compare the method with the decompositional approach of [14].…”
Section: Case Studiesmentioning
confidence: 99%
See 2 more Smart Citations
“…For each case, the statistics are shown first for each sub-network, then the global consumption of time and memory of the compositional approach and its reduction are shown in comparison with that of a monolithic verification for the full network. The first three examples have been presented at international conferences [1,2,16]; in particular the first one is the already mentioned EDL line, which has been decomposed in sub-networks related to each station of the line, among which the Køge station maintains its own high complexity. The second example is a single cut of a large network whose layout has been extracted from a portion of the main Florence station, while the third is a Belgian station on which a cluster cut has been applied, with the aim to compare the method with the decompositional approach of [14].…”
Section: Case Studiesmentioning
confidence: 99%
“…It has also been suggested to use bounded model checking to perform kinduction proofs of safety properties expressed as state invariants to avoid exploring the whole state space. In the RobustRailS verification tools [25] for interlocking systems this technique was implemented using the powerful SMT-based bounded model checker of Jan Peleska's RT-Tester tool 1 ; this made it possible to considerably push the bounds of the size of networks that can be verified without state space explosion [25].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A similar approach in [23] uses the specification in UML that is converted to B. In [24], two compositional approaches using RT-Tester and NuSMV are proposed. Checking the violation of safety rules expressed as invariants, performed in SMT solver, is described in [25].…”
Section: Related Workmentioning
confidence: 99%
“…We have based our compositional approach on the RobustRailS verication framework [20], that exploits the powerful SMT-based RT-Tester bounded model checker 3 , although it can be adapted to other verication frameworks: the idea of compositional verication is also shared by the approach described in [1012]. The two approaches are compared in [1], where it turns out that the latter is grounded on pragmatic domain-related criteria for the denition of how and where to perform the cut into two sub-networks.…”
Section: Introductionmentioning
confidence: 99%