2021
DOI: 10.1007/978-3-030-78288-7_8
|View full text |Cite
|
Sign up to set email alerts
|

Verification of the Boundedness Property in a Petri Net-Based Specification of the Control Part of Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Petri nets naturally reflect concurrency relations in the modeled system [69][70][71][72][73]. Moreover, they are strongly supported by the set of various analysis techniques, including formal verification methods [74][75][76][77][78][79][80][81][82][83][84][85]. On the other hand, the analysis of the blockchain techniques (presented earlier in this paper) shows that the system ought to be properly prepared, especially focusing on computational efficiency (also in terms of security features), adequate communication, and proper functionality.…”
Section: Modeling and Analysis Of Cps Oriented On The Concurrency Asp...mentioning
confidence: 97%
“…Petri nets naturally reflect concurrency relations in the modeled system [69][70][71][72][73]. Moreover, they are strongly supported by the set of various analysis techniques, including formal verification methods [74][75][76][77][78][79][80][81][82][83][84][85]. On the other hand, the analysis of the blockchain techniques (presented earlier in this paper) shows that the system ought to be properly prepared, especially focusing on computational efficiency (also in terms of security features), adequate communication, and proper functionality.…”
Section: Modeling and Analysis Of Cps Oriented On The Concurrency Asp...mentioning
confidence: 97%
“…Such a verification (of liveness and safeness) can be performed within the modeling tools (e.g., PIPE). However, in the case of more complex concurrent control systems, advanced methods and tools can be applied, such as Hippo [19,20,29,31], GreatSPN [85], and IOPT-Tools [19,83,86,87].…”
Section: Modeling Of the Petri Net-based Concurrent Control Systemmentioning
confidence: 99%
“…This means that in each place, in any state, there can be at most only one token. This restriction is especially useful in the case of binary control systems, where safeness assures the accurate logical behavior of the system [30,31].…”
Section: Introduction and Problem Formulationmentioning
confidence: 99%
“…Furthermore, another method which allows the safeness checking of the control part of a Petri netbased CPS was proposed, respectively in [19] and [20]. It was based on the computation of the state machine cover in the Petri net-based system.…”
Section: Related Workmentioning
confidence: 99%
“…The idea relies on the obtaining of the particular state machine components from the subsequent place invariants, computed and examined at each step of the algorithm. Therefore, the check of the boundedness of a net in a more effective and efficient way is achieved [20]. In the same thought, [21] proposed a novel analysis algorithm of the control part of CPS specified by an interpreted Petri net.…”
Section: Related Workmentioning
confidence: 99%