Today, more and more Internet of Things devices are deployed, and the field of applications for decentralized, self-organizing networks keeps growing. The growth also makes these systems more attractive to attackers. Sybil attacks are a common issue, especially in decentralized networks and networks deployed in scenarios with irregular or unreliable Internet connectivity.

Instructions: 

The main part of the data set is the file "20200623_Rechained--v08.xml", which contains a CPN model for the Rechained protocol. To use this file, it needs to be renamed to "20200623_Rechained--v08.cpn". This file can be used with "CPN Tools", an open source, GPL licenced tool for working with Colored Petri nets. CPN Tools is available on: http://cpntools.org/

 

The file "20200617_Protocol-Semantics.pdf" contains the protocol semantics, CPN token color sets, names and acronyms used.

 

The file "20200623_Rechained--v08--state-space-analysis.txt" contains the results of the state space analysis.

Categories:
38 Views