Formal verification of safety protocol in train control system

被引:0
作者
ZHANG Yan1
TANG Tao1*
LI KePing1
MERA Jose Manuel2
ZHU Li1
ZHAO Lin1 & XU TianHua1 1 State Key Laboratory of Rail Traffic Control and Safety
Beijing Jiaotong University
Beijing 100044
China
2 Railway Technologies Research Centre
Universidad Politécnica de Madrid
Madrid 228006
Spain
机构
关键词
train control system; safety communication protocol; interface automata; verification;
D O I
暂无
中图分类号
TP273 [自动控制、自动控制系统];
学科分类号
080201 ; 0835 ;
摘要
In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the safety protocols may be formidable due to the system complexity.In this paper,interface automata(IA) are used to describe the safety service interface behaviors of safety communication protocol.A formal verification method is proposed to describe the safety communication protocols using IA and translate IA model into PROMELA model so that the protocols can be verified by the model checker SPIN.A case study of using this method to describe and verify a safety communication protocol is included.The verification results illustrate that the proposed method is effective to describe the safety protocols and verify deadlocks,livelocks and several mandatory consistency properties.A prototype of safety protocols is also developed based on the presented formally verifying method.
引用
收藏
页码:3078 / 3090
页数:13
相关论文
共 13 条
[1]   CBTC数据通信系统性能分析模型及应用研究 [J].
张岩 ;
唐涛 ;
燕飞 .
铁道学报, 2011, (05) :60-65
[2]  
Development of a model to generate a risk map in a building fire[J]. CHU YanYan, ZHANG Hui, SHEN ShiFei, YANG Rui & QIAO LiFeng Center for Public Safety Research, Department of Engineering Physics, Tsinghua University, Beijing 100084, China.Science China(Technological Sciences). 2010(10)
[3]  
Risk analysis of flood control operation mode with forecast information based on a combination of risk sources[J]. DIAO YanFang & WANG BenDe School of Faculty of Infrastructure Engineering, Dalian University of Technology, Dalian 116024, China.Science China(Technological Sciences). 2010(07)
[4]   基于交换式以太网安全通信协议的模型和仿真研究 [J].
张岩 ;
唐涛 ;
马连川 ;
徐田华 .
铁道学报, 2010, 32 (03) :43-48
[5]  
Dependability analysis of the data communication system in train control system[J]. XU TianHua,TANG Tao,GAO ChunHai & CAI BaiGen State Key Laboratory of Rail Traffic Control and Safety,Beijing Jiaotong University,Beijing 100044,China.Science in China(Series E:Technological Sciences). 2009(09)
[6]   基于场景规约的构件式系统设计分析与验证 [J].
胡军 ;
于笑丰 ;
张岩 ;
王林章 ;
李宣东 ;
郑国梁 .
计算机学报, 2006, (04) :4513-4525
[7]   基于体系结构模型检查分布式控制系统 [J].
汪洋 ;
魏峻 ;
王振宇 .
软件学报, 2004, (06) :823-833
[8]  
Extending UML sequence diagrams to model trust-dependent behavior with the aim to support risk analysis[J] . Science of Computer Programming . 2008 (1)
[9]   Formal verification of dependable distributed protocols [J].
Sinha, P ;
Ren, DQ .
INFORMATION AND SOFTWARE TECHNOLOGY, 2003, 45 (12) :873-888
[10]   Modeling software architectures in the unified modeling language [J].
Medvidovic, N ;
Rosenblum, DS ;
Redmiles, DF ;
Robbins, JE .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2002, 11 (01) :2-57