Fast Game Verification for Safety- and Security-Critical Distributed Applications

被引:1
作者
Luo, Wei [1 ,2 ]
Xie, Guoqi [1 ,2 ]
Liu, Yao [3 ]
Xiao, Xiongren [1 ,2 ]
Li, Renfa [1 ,2 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Key Lab Embedded & Network Comp Hunan Prov, Changsha 410082, Hunan, Peoples R China
[2] Hunan Univ, Res Inst, Chongqing 401120, Peoples R China
[3] Guilin Tourism Univ, Sch Tourism Data, Guilin 541006, Guangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Safety; Games; Reliability; Nash equilibrium; Redundancy; Explosions; Co-verification; non-cooperative game theory; safety and security;
D O I
10.1109/TDSC.2024.3417022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The co-verification of safety and security is a necessary process for safety- and security-critical distributed applications, but conflicts exist between safety and security. The state-of-the-art Block-based Vulnerability Pre-assignment (BVP) and Reversed Block-based Time Pre-assignment (RBTP) co-verification techniques of safety and security have three main limitations: 1) only co-verifying the boundary values and ignoring the verification of non-boundary values; 2) algorithm redundancy (i.e., BVP and RBTP must be used simultaneously) makes the verification process complex and cumbersome; and 3) only one safety attribute and one security attribute participate in the co-verification. In this study, we explore the causal mechanisms for the mutual influence between safety and security: 1) they compete with each other in relation to Worst Case Execution Time (WCET); 2) there is a lack of cooperation between the two; and 3) both are pursuing maximum performance for each individual. Above causal mechanisms precisely conforms to the problem of maximizing benefits in non-cooperative games (i.e., Nash equilibrium). Therefore, we propose the Fast Game Verification (FGV) based on non-cooperative game to co-verify reliability in safety and confidentiality in security. FGV achieves non-boundary value co-verification and avoids redundancy. We develop Fast Game Verification plus plus (FGV++) algorithm to co-verify multiple safety attributes and multiple security attributes. We conduct actual cases of distributed applications. In terms of the co-verification of two attributes, FGV demonstrates average acceptance rate of 59.96% within 0.638 s, surpassing both BVP&RBTP by 6.94% (within 0.812 s); FGV++ achieves average acceptance rate of 58.73% within 0.663 s, exhibiting a 4.53% advantage over BVP and RBTP. In the co-verification of four attributes, the average acceptance rate of FGV++ has increased to 61.07% within 1.34102 s.
引用
收藏
页码:870 / 887
页数:18
相关论文
共 34 条
[1]  
Ahmed HEH, 2007, 2007 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, P67
[2]  
Bhushan R. C., 2022, Recent Adv. Comput. Sci. Commun., V15, P850
[3]   The Frame Packing Problem for CAN-FD [J].
Bordoloi, Urunesh D. ;
Samii, Soheil .
2014 IEEE 35TH REAL-TIME SYSTEMS SYMPOSIUM (RTSS 2014), 2014, :284-293
[4]  
Chatterjee B., 2009, Methods and Models in Computer Science, P1, DOI DOI 10.1109/ICM2CS.2009.5397970
[5]   Hardware and Software Co-Verification from Security Perspective [J].
Chen, Kejun ;
Deng, Qingxu ;
Hou, Yumin ;
Jin, Yier ;
Guo, Xiaolong .
2019 20TH INTERNATIONAL WORKSHOP ON MICROPROCESSOR/SOC TEST, SECURITY AND VERIFICATION (MTV 2019), 2019, :50-55
[6]  
DiNatale M, 2012, UNDERSTANDING AND USING THE CONTROLLER AREA NETWORK COMMUNICATION PROTOCOL: THEORY AND PRACTICE, P1, DOI 10.1007/978-1-4614-0314-2
[7]   Non-Cooperative Game Based Optimal Dispatch Model for Integrated Energy Systems [J].
Duan, Jiandong ;
Sun, Qian ;
Wu, Chen ;
Yang, Yao ;
Tu, Siyu .
CSEE JOURNAL OF POWER AND ENERGY SYSTEMS, 2024, 10 (03) :1195-1207
[8]   Efficiently Encrypting Color Images With Few Details Based on RC6 and Different Operation Modes for Cybersecurity Applications [J].
Faragallah, Osama S. ;
Afifi, Ashraf ;
El-Shafai, Walid ;
El-Sayed, Hala S. ;
Alzain, Mohammed A. ;
Al-Amri, Jehad F. ;
Abd El-Samie, Fathi E. .
IEEE ACCESS, 2020, 8 :103200-103218
[9]  
He J., 2021, Front. Hardware Secur. Trust
[10]  
Jensen A. B., 2022, Lecture Notes in Networks and Systems, P1