Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Research on the Security of NC-Link Numerical Control Equipment Protocol Based on Colored Petri Net
by
Wu, Yi
, Shi, Jianming
, Zheng, Lu
, Feng, Tao
in
Access control
/ Analysis
/ Authentication
/ Communication
/ Communications equipment
/ Computer network protocols
/ Control algorithms
/ Control equipment
/ Cost analysis
/ Data transmission
/ Efficiency
/ Investment analysis
/ Machine tools
/ Machinists' tools
/ Manufacturing
/ Methods
/ Middleware
/ Network security
/ Numerical controls
/ Petri nets
/ Product quality
/ Safety and security measures
/ Security
/ System reliability
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Research on the Security of NC-Link Numerical Control Equipment Protocol Based on Colored Petri Net
by
Wu, Yi
, Shi, Jianming
, Zheng, Lu
, Feng, Tao
in
Access control
/ Analysis
/ Authentication
/ Communication
/ Communications equipment
/ Computer network protocols
/ Control algorithms
/ Control equipment
/ Cost analysis
/ Data transmission
/ Efficiency
/ Investment analysis
/ Machine tools
/ Machinists' tools
/ Manufacturing
/ Methods
/ Middleware
/ Network security
/ Numerical controls
/ Petri nets
/ Product quality
/ Safety and security measures
/ Security
/ System reliability
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Research on the Security of NC-Link Numerical Control Equipment Protocol Based on Colored Petri Net
by
Wu, Yi
, Shi, Jianming
, Zheng, Lu
, Feng, Tao
in
Access control
/ Analysis
/ Authentication
/ Communication
/ Communications equipment
/ Computer network protocols
/ Control algorithms
/ Control equipment
/ Cost analysis
/ Data transmission
/ Efficiency
/ Investment analysis
/ Machine tools
/ Machinists' tools
/ Manufacturing
/ Methods
/ Middleware
/ Network security
/ Numerical controls
/ Petri nets
/ Product quality
/ Safety and security measures
/ Security
/ System reliability
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Research on the Security of NC-Link Numerical Control Equipment Protocol Based on Colored Petri Net
Journal Article
Research on the Security of NC-Link Numerical Control Equipment Protocol Based on Colored Petri Net
2024
Request Book From Autostore
and Choose the Collection Method
Overview
The NC-Link protocol, as an integrated communication protocol in the Computerized Numerical Control (CNC) machine tool industry, has drawn significant attention regarding its security since its inception. Although there have been studies proposing improvements to address security issues related to key management and message transmission, systematic security analysis of the protocol remains relatively weak. To better investigate and enhance the security of the NC-Link protocol, our research introduces a formal modeling and analysis method based on Colored Petri Nets (CPN). By establishing a CPN model of the protocol, we analyze the security issues present during communication and propose improvement measures for verification and analysis. First, we developed a CPN model for the NC-Link protocol and verified the model’s feasibility through simulation analysis. Subsequently, we introduced an attacker model to analyze the protocol’s authentication interaction process, revealing security issues, such as authentication vulnerabilities and key management flaws. Finally, we proposed an improved scheme addressing these issues and conducted a security validation and cost analysis of this scheme. The results show that the improved protocol reduces the computational overhead by 75% during the connection and interaction phases. This indicates that the improved protocol can achieve interactions at a faster speed while maintaining higher security and reliability. The implementation of this scheme provides new reference ideas for related research.
Publisher
MDPI AG
Subject
This website uses cookies to ensure you get the best experience on our website.