{"title":"基于Petri网的IPv4/ IPv6协议转换分析与验证","authors":"Zheng Hong, Sun Ni-gang, G. Ciardo","doi":"10.1109/ICDH.2012.25","DOIUrl":null,"url":null,"abstract":"IPv6 is designed to address the scalability and service shortcomings of the current IPv4 protocol. Unfortunately, IPv6 is not backward-compatible with the IPv4. It is necessary to consider IPv4-IPv6 protocol conversion. To resolve this problem, in the paper, we use Petri nets to simulate and model the IPv4-Pv6 protocol conversion process. By analyzing the bounded ness, activity and reversibility of the model, we prove that the process can both achieve IPv4-IPv6 conversion and satisfy system security requirements.","PeriodicalId":308799,"journal":{"name":"2012 Fourth International Conference on Digital Home","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"The Analysis and Verification of IPv4/ IPv6 Protocol Conversion by Petri Nets\",\"authors\":\"Zheng Hong, Sun Ni-gang, G. Ciardo\",\"doi\":\"10.1109/ICDH.2012.25\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"IPv6 is designed to address the scalability and service shortcomings of the current IPv4 protocol. Unfortunately, IPv6 is not backward-compatible with the IPv4. It is necessary to consider IPv4-IPv6 protocol conversion. To resolve this problem, in the paper, we use Petri nets to simulate and model the IPv4-Pv6 protocol conversion process. By analyzing the bounded ness, activity and reversibility of the model, we prove that the process can both achieve IPv4-IPv6 conversion and satisfy system security requirements.\",\"PeriodicalId\":308799,\"journal\":{\"name\":\"2012 Fourth International Conference on Digital Home\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Fourth International Conference on Digital Home\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDH.2012.25\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Fourth International Conference on Digital Home","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDH.2012.25","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Analysis and Verification of IPv4/ IPv6 Protocol Conversion by Petri Nets
IPv6 is designed to address the scalability and service shortcomings of the current IPv4 protocol. Unfortunately, IPv6 is not backward-compatible with the IPv4. It is necessary to consider IPv4-IPv6 protocol conversion. To resolve this problem, in the paper, we use Petri nets to simulate and model the IPv4-Pv6 protocol conversion process. By analyzing the bounded ness, activity and reversibility of the model, we prove that the process can both achieve IPv4-IPv6 conversion and satisfy system security requirements.