• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Modeling and Verification of Aircraft Takeoff Through Novel Quantum Nets

    2022-08-24 07:01:16MaryamJamalNazirAhmadZafarAttaurRahmanDhiaaMuslehMohammedGollapalliandSghaierChabani
    Computers Materials&Continua 2022年8期

    Maryam Jamal,Nazir Ahmad Zafar,Atta-ur-Rahman,Dhiaa Musleh,Mohammed A.Gollapalli and Sghaier Chabani

    1School of Systems and Technology,University of Management&Technology(UMT),C-II Block C 2 Phase 1 Johar Town,Lahore,54770,Punjab,Pakistan

    2Department of Computer Science,COMSATS University Islamabad-Sahiwal Campus,Sahiwal,57000,Punjab,Pakistan

    3Department of Computer Science(CS),College of Computer Science and Information Technology(CCSIT),Imam Abdulrahman Bin Faisal University(IAU),Dammam,31441,Saudi Arabia

    4Department of Computer Information System(CIS),College of Computer Science and Information Technology(CCSIT),Imam Abdulrahman Bin Faisal University(IAU),Dammam,31441,Saudi Arabia

    Abstract: The formal modeling and verification of aircraft takeoff is a challenge because it is a complex safety-critical operation.The task of aircraft takeoff is distributed amongst various computer-based controllers,however,with the growing malicious threats a secure communication between aircraft and controllers becomes highly important.This research serves as a starting point for integration of BB84 quantum protocol with petri nets for secure modeling and verification of takeoff procedure.The integrated model combines the BB84 quantum cryptographic protocol with powerful verification tool support offered by petri nets.To model certain important properties of BB84,a new variant of petri nets coined as Quantum Nets are proposed by defining their mathematical foundations and overall system dynamics,furthermore,some important system properties are also abstractly defined.The proposed Quantum Nets are then applied for modeling of aircraft takeoff process by defining three quantum nets:namely aircraft,runway controller and gate controller.For authentication between quantum nets,the use of external places and transitions is demonstrated to describe the encryptiondecryption process of qubits stream.Finally,the developed takeoff quantum network is verified through simulation offered by colored petri-net (CPN)Tools.Moreover,reachability tree (RT) analysis is also performed to have greater confidence in feasibility and correctness of the proposed aircraft takeoff model through the Quantum Nets.

    Keywords: Aircraft takeoff;BB84;quantum cryptography;petri-nets;quantum nets;formal modeling and verification

    1 Introduction

    Takeoff is the initial and critical phase of a flight as it raises the confidence level of overall flight safety.The task of safe aircraft takeoff is also distributed amongst various computer-based controllers.The intense communication between different controllers involved in aircraft takeoff needs to be secure which is perplexed by the dynamic,distributed,and concurrent nature of air traffic control system.These issues make the takeoff process a highly difficult and challenging domain [1].Furthermore,even a minor system error or abnormal system behavior may lead to severe consequences in term loss of precious human lives and heavy monetary penalties.Also,the possible intrusion of an eavesdropper during communication between aircraft and controller may put the whole takeoff process at a high security risk.Therefore,there is need of modeling and verification of aircraft takeoff process while focusing the overall system security.The BB84 quantum protocol was introduced in 1984 by Bennett et al.[2]that offers a secure way of communication by combining the cryptography with quantum principles[3].It is among the strongest techniques which guarantees safe transmission between a transmitter and receiver.The presence of an intrusion attack by an eavesdropper is identified through photon polarization [4].But petri-nets are graphical formal methods which underlies on strong mathematical foundations.Due to their robust expressivity,they are widely used for modeling concurrency and non-determinism.Furthermore,the petri-nets are enriched with strong verification support for inspecting correctness of a system [5].Undergoing research provides an integration of BB84 with petri-nets for formal modeling and verification of aircraft takeoff procedure while incorporating system security.As the BB84 is a quantum cryptographic protocol which provides the maximum level of security,and the petri-nets are a powerful notation for mathematical modeling and verification of distributed concurrent systems.This integration allows a secure and comprehensive mathematical modeling of aircraft takeoff.Moreover,it allows system verification for presence of potential errors and unexpected system behavior.While the errors spotted during modeling are easier and cheaper to be fixed.This research is important as it provides starting point for integration of quantum cryptography with petri-nets to integrate best features of both approaches.Since the petrinets offers only three basic notations (place,transition,and arcs) therefore,they cannot model all concepts of BB84 which is a quantum cryptographic protocol.The existing notations and properties of traditional petri-nets are enriched for quantum concepts through the development of a new variant of traditional petri-nets,named as the“Quantum Nets”.The existing work regarding integration of BB84 with petri-nets is novel in a sense that an existing work is found where the integration was performed at an abstract level [6],whereas some existing work just covers the model checking of BB84 protocol.In this study,the strong static foundations of quantum nets are developed to describe distributed network nodes,concurrent bi-directional communication,and flow of different types of data whereas the dynamic properties such as tokenization,external transitions,transition,enabling,and system dynamics are also formalized.Furthermore,the properties like reachability,boundedness,liveness,safety,and concurrency are abstractly defined in this research.The proposed Quantum Nets are applied to develop a formal model of aircraft takeoff which is composed of three quantum nets namely aircraft,runway controller,ground controller.The authentication process is defined through a public and a quantum channel also the secure communication between the quantum nets is modeled through external places and external transitions.To inspect its behavior,the proposed model is verified through CPN tools simulator.The proposed takeoff model is also verified by using mathematical proof technique of reachability tree (RT) analysis which ensures the correctness of proposed model which further makes the study unique.

    The article is sectioned as:Section 2 covers a thorough literature survey,the mathematical foundations of proposed quantum nets are enclosed in Section 3.The mathematical properties of quantum network are specified in Section 4 and in Section 5,the practical applicability of quantum nets is demonstrated through the case study of an aircraft takeoff.Finally,Section 5 wraps up the articles with concluding remarks.

    2 Literature Survey

    Formal modeling and verification of quantum protocols using various mathematical techniques is among the hottest areas of research.The research in[7,8]focused the verification of B94 protocol through PRISM tool.Similarly,some quantum protocols were verified by using a decision procedure which integrates algebraic logic with operational semantics in[9].The application of a quantum model checker was shown in [10,11].In [12]process calculus was used to model BB84 protocol which was analyzed by concurrency workbench of the new century(CWB-NC)tool.A new language coined as Communicating Quantum Processes was proposed by combining pi-calculus with quantum theory in[13].In [14]a Hoare-style logic was proposed for quantum protocols and a semi-automated formal framework was defined for verification of quantum systems in [15].To analyze the bi-simulation relation of quantum processes a tool was developed in [16]and in [17]an entanglement sampling technique was applied to find the lower bound of entanglement which is required by an eavesdropper for attacking a quantum channel.The measurement in a quantum process calculus was described in[18]by using bi-simulation congruence and protocol equivalency.Distribution-based bi-simulation of quantum process by using process algebra was proposed in [19].The research in [20]presented an automation of unconditional security proof for quantum key distribution and the quantum information system based on B92 protocol.The process was performed by using PRISM tool in[21].In[22]a variant of BB84 was modeled by using discrete time Markov chain and probabilistic computation tree logic and its security properties were verified by using PRISM tool.BB84 and B94 were modeled by using Communicating Quantum Processes in [23]which were translated into PRISM model for its verification.IEEE 802.11 standard was integrated with BB84,and some security properties were analyzed by using PRISM tool in [24].Some important quantum bit commitment approaches were proposed in [25,26]and were reviewed in [27,28].In [29]the analysis of this protocol was done by using model checking to demonstrate its practical applicability.Few basic correctness properties of the protocol were verified in [30]by using PRISM tool to demonstrate the feasibility of automated verification techniques.A new formal execution technique called equivalence checking was presented in [31,32]for analysis of the protocol.It focused on communicating concurrent components which the authors claimed to be applicable on all input states.The use of PRISM tool was shown for identification of an eavesdropper in a quantum system in[33].Few ways to attack the quantum network were modeled and verified by using PRISM tool in [5].Focusing the parameter of eavesdropper and quantum channel,the security of BB84 was analyzed through PRISM tool in [34].Automated model checking PRISM tool was used in[35]and a direct relation was identified between number of transmitted qubits and evasion of an eavesdropper.The channel disturbance of a quantum channel was modeled and verified by using PRISM tool in[36].While the entangled photon pairs of BB84 protocol were focused for verification using PRISM tool in[37]and addressed in[38].Other than cryptosystems,digital watermarking and steganography also used for authentication and verification.Especially,in digital image transmission,the images need to be secure[39].In digital image watermarking mainly,proprietary,and medical images are watermarked for sake of authentication,integrity and information hiding[40-44].Similarly,steganography is used for secrecy[45-48].

    Based on the extensive review of modeling and verification of BB84 quantum key distribution techniques,the undergoing research was conducted.In the literature,several approaches verified certain dimensions of this protocol but all of them mainly use the PRISM toolset for the verification.However,the investigation of petri-nets for modeling and verification of a quantum cryptographic system has been an uncovered arena of research.Only one related publication was found in which the petri nets were used to model quantum communication protocol at an abstract level[6].Since quantum cryptography offers a high level of security and it can detect an intrusion attack as well.Modeling and verification of a quantum cryptographic system has a potential benefit of revealing unexpected system behavior.Also,the errors identified before system implementation are easier and cheaper to be fixed.Therefore,the modeling and verification capabilities of petri nets may be fruitful in modeling of BB84 quantum protocol.

    3 The Extended Petri-Nets

    In this section the extension of Petri-nets is provided.The BB84 is a quantum key distribution protocol which exploits photon polarization state for transmission of qubits.Using this protocol,the sender and receiver are connected through a quantum channel and a classical channel.Both channels are not secure against intruder attack.The encoding of BB84 lays its foundation on the pairs of orthogonal states named as a basis.A basis can either be rectilinear with vertical polarization state or diagonal with horizontal polarization state.The two bases are used in this protocol as both are conjugate to one another.The conjugate pair of basis is known to both sender and receiver prior to their communication.The sender chooses one of the basis to encode a qubit and sends it to receiver,via its quantum channel.The receiver receives the qubit through its quantum channel,and it decodes the basis of a qubit on random guessing.Once the stream of qubit sent by the sender is decrypted by the receiver,it resends the decrypted basis values back to sender through its public channel for matching.If the number of matching decrypted and encrypted qubits is less than or equal to a threshold then the sender verifies the receiver and sends the secret message safely to receiver via its public channel.Petri-nets are robust graphical formal methods widely used by experts for modeling distributed and concurrent systems.The foundations of petri nets are based on firm mathematical semantics,and they offer strong verification techniques like reachability,boundedness etc.Further,they offer simple place-transition notations which can be extended for complex systems modeling.Subsequently,the integration of BB84 cryptography with petri-nets is provided.To model quantum key cryptography,a new variant of traditional petri-nets,coined as the“Quantum Nets”is defined.Basic petri-nets are mathematically enriched with quantum concepts as described in next section.

    3.1 Quantum Nets

    A quantum net is defined as,is the set of places defined aswhere PIis the set of internal places of a net and PEis the set of external places,is the set of transition,defined aswhereis the set of internal transitions of a net andis the set of external transitions.An external transition and an external place are not only visible to its resident quantum net but also to all other nets.They can be accessed by any non-resident quantum nets and can change marking of a quantum net.is the set of connections between place and transition or vice versa such thatand0is the initial marking of a quantum net such that.A flow arc f is an external arc,such that f( ,)3where transition is an external transition and is an external place.

    3.2 Quantum Key Distribution System

    A quantum key distribution system is defined as a tuple namedwhere QID3¤+which is unique identifier of a quantum net,is the source quantum net and its initial markingis the destination quantum net and its initial markingis the qubit interaction channel defined assuch thatandρis the message interaction channel defined assuch thatand

    3.3 System Dynamics

    The arc activation rules make the interaction of quantum net possible.These rules are triggered before transporting qubits and messages on their respective channels.The rules for arc activation within a quantum key distribution system QDS is a pair of marking (M,M’) such that M is the marking of source quantum net,and M’is the marking of destination quantum net,are defined as follows.

    3.4 Quantum Key Distribution Network

    A quantum key distribution network is defined as a tuple namedwhereis the set of all source quantum nets and defined asis the set of all destination quantum netsis defined as a total injective function and defined asψ:QDS?QDS such thatDom(ψ).q3QS andRan(ψ).q3QD.

    3.5 Token Declaration

    A token can be of two types:the qubits and bits.Thequbitis a specialized token meant to travel on a quantum channel.A qubit is defined as Bit2Basis2Polarization2.Abitrepresents a Boolean value of either 1 or 0 and defined as Bit:1|0,Basisis defined as Rectilinear or Diagonal.ARectilinear Basiscan have a value 0 for vertical and 90 for horizontal state.Likewise,aDiagonal Basiscan have a value 45,135 or a circular basis of left and right handedness.A Rectilinear basis is represented as V and a diagonal basis is represented as D.Polarizationrepresents a photon polarization which is generated from bit and basis value.For instance,basis V with bit 0 is represented as North,N and a bit 1 is shown as Right,R.A basis D with bit 0 is marked as North East,NE and a bit 1 is represented as South East,SE.is the time at which the qubit emits from the sender’s quantum channel.A bit token is designed to carry message on a classical public channel.A bit token can carry a stream of bits,so it is defined as ?Bits.At the receiver’s end when a qubit is received via quantum channel it appends the time with a delay factor,γsuch that at receiver’s end

    3.6 External Transition

    A transition of a petri-net allows token movement from one place to another.To allow external communication,we extend the transition with a new one called channel transition.Achannel transitionis a kind of transition which is not only visible to a quantum net to which it belongs to but also to outside nets.Any place can connect with it to transmit its tokens.It is important to note that the same transition is defined to work for incoming and outgoing token flow.Based on the flag,channel transition allows incoming flow if flag is set to true and outgoing flow is achieved if flag is set to false.Moreover,for each quantum net two external transitions are mandatory,i.e.,a quantum and public channel.The channel transition to represent a quantum channel is capable of transporting qubits whereas a channel transition which represents a public channel can carry public data.Any place with a qubit token can access quantum channel transition whereas any place with a bit token can access a public channel transition.

    4 Properties of Quantum Network

    After giving formal foundations to the quantum nets,in this sub-section we define some of its system properties.The system properties help to define overall system behavior.We have defined the following properties for the quantum system.The functions used to define such properties are described in Tab.1.The proof of following properties is left for the future work.

    Table 1:Notations used in safety properties

    4.1 Reachability

    Every quantum net can send message to another quantum net at any time if the sender is idle and receiver is not a sender or receiver of any other communication.

    ?q1,q2:QN;t:¤.

    IsIdle(q1)ù(? IsSender(q2)ú ?IsReceiver(q2))

    4.2 Boundedness

    Each quantum net of a quantum system must be in an idle state or communicating with another net either as a sender or a receiver.

    ?q:QN.q3Q ü

    IsIdle(q)ú IsSender(q)ú IsReceiver(q)

    4.3 Liveness

    Every two quantum nets communicating at any time must end their communication after certain interval of time.

    ?q1,q2:QN;t,k:¤.Com(q1,q2)@

    IsIdle(q1)@t+k ù IsIdle(q2)@t+k ù t ? t+k

    4.4 Safety

    A quantum system is safe if for every sender there is a single receiver and sum of all quantum nets must be equal to idle,sending and receiving nets.

    ?q:QN.|Receiver(q)|=1 ù

    (|QN|=|Idle|+|Senders|+|Receivers|)

    4.5 Concurrency

    In a quantum system any two quantum nets can communicate simultaneously.

    ?q1,q2:QN;t:¤.q13Q ü

    ((IsSender(q1)@t ù IsSender(q2))ú

    (IsReceiver(q1)@t ù IsReceiver(q2)))ùq1μ q2

    5 Air Traffic Control System

    Takeoff is the primary phase of aircraft journey and a safe takeoff raise the confidence level for overall safety.In an earlier study[49]also demonstrated the modeling and analysis of an aircraft takeoff process by using Vienna Development Method Specification Language(VDM-SL).Being the initial flight phase,takeoff should be a secure process to avoid intrusion of any malicious attack.The task of safe aircraft takeoff is also distributed amongst various computer-based controllers and requires secure coordination.Any security loophole may facilitate an intruder to cause immense damage to the whole system.Also,air traffic control system is a complex and highly distributed safety critical system.Its secure modeling and analysis become crucial because even a minor system flaw may lead to catastrophic effects such as monetary loss and risk of human lives.

    5.1 Aircraft Takeoff Quantum Network

    In this section we have developed a quantum network for an aircraft takeoff.To model takeoff process,as explained earlier,three quantum nets are defined.An aircraft is represented by an aircraft quantum net and the controllers of gate and runway are depicted through a gate controller quantum net and runway quantum net respectively as shown in Fig.1.The labels assigned to all transition of each quantum nets are shown in Tab.2.Theaircraft quantum nethas twenty-two internal places(pa1 to pa22) and two external places;qaiofor a quantum channel and paiofor a public channel.Also,the aircraft quantum net has four external transitions (ta1,ta13,ta7 and ta14) and the other nineteen are internal transitions.Thegate controller quantum nethas twenty-four internal places(pa1 to pa24)and two external places;qgiofor a quantum channel and pgiofor a public channel.Also,the gate controller quantum net has four external transitions(tg1,tg13,tg7 and tg14)and the remaining twenty are internal transitions.Therunway controller quantum nethas twenty-five internal places(pa1 to pa25)and two external places;qriofor a quantum channel and priofor a public channel.Also,the runway controller quantum net has four external transitions(tr1,tr13,tr7 and tr14)and the remaining twenty-one are internal transitions.

    Figure 1:A quantum network for an aircraft takeoff

    Table 2:Legends for transitions of the quantum nets defined in aircraft takeoff

    When an aircraft quantum net is ready for takeoff,it contacts the gate controller quantum net.The controller net verifies identity of an aircraft net by encrypting a stream of qubit(tg8 to tg10)and sends them(tr12 to tr13)via its quantum channel qgio.The controller net also stores the basis values of sent qubits in pg5,for later matching.The aircraft net receives the qubits (ta1) via its quantum channel qaioand decrypts them (ta3 to ta4) on random basis.It then sends the decrypted values of qubits(ta6 to ta7)back to the controller net through its public channel paio.After receiving decrypted values (tg14) through its public channel pgio,the controller net matches the decrypted values with the sent qubit values.If the matching entries are less than or equal to a pre-decided threshold(tg15)then the controller net authenticates the aircraft net,otherwise the communication is aborted(tg18).Once an aircraft is successfully authenticated,the controller net looks for favorable weather condition and a vacant ramp.If both conditions are met,then it prepares a ramp route and grant permission to aircraft net (tg21 to tg24) through its public channel pgio.After receiving permission (ta14) via its public channel paio,the aircraft transits the defined area according to the route specified by the controller net(ta22 to ta23).

    When an aircraft quantum net enters the ramp,it ends its communication with the gate controller and then it contacts the runway controller quantum net.The controller net verifies identity of an aircraft net by encrypting a stream of qubits(tr8 to tr10)and sends them(tr12 to tr13)via its quantum channel qrio.The controller net also stores the basis values of sent qubits in pr5,for later matching.The aircraft net receives the qubits(ta1)via its quantum channel qaioand decrypts them(ta3 to ta4)on random basis.It then sends the decrypted values of the qubits(ta6 to ta7)back to the controller net through its public channel paio.After receiving decrypted values(tr14)through its public channel prio,the controller net matches the decrypted values with the sent qubit values.If the matching entries are less than or equal to a pre-decided threshold(tr15)then the controller net authenticates the aircraft net,otherwise the communication is aborted(tr18).Once an aircraft is successfully authenticated,the controller net looks for favorable weather condition,a vacant taxiway,and a vacant runway.If all three conditions are met,then it prepares a runway route and grant permission to aircraft net(tr21 to tr25)through its public channel prio.After receiving permission(ta14)via its public channel paio,the aircraft transits through the defined area according to the route specified by the controller net(ta22 to ta23).Therefore,the visual representation of three communicating quantum nets namely aircraft,runway controller and gate controller are successfully shown in this section.The interaction between the three quantum nets for a successful takeoff is demonstrated through proposed BB84 quantum nets and results are demonstrated in Tab.3.

    First row of Tab.3 shows the interaction between gate controller quantum net and an aircraft quantum net.The controller net being the sender sends an encrypted stream of seven qubits.The aircraft net being the receiver decodes the qubit on random basis and it successfully decrypts four qubit values yielding a result within threshold value.Therefore,the aircraft net is authenticated successfully by the gate controller net.In row two,the sender is a runway controller net,and the receiver is the aircraft net.Out of seven encrypted qubits,the aircraft net successfully decodes five qubits’values,yielding a result within threshold value.Therefore,the aircraft net is authenticated successfully by the runway controller net.In row third,the sender is a gate controller net,and the receiver is the aircraft net.Out of seven encrypted qubits,the aircraft net successfully decodes just two qubits’values,yielding a result out of the threshold value.Therefore,the aircraft net is not authenticated by the gate controller net and their communication is aborted.In row fourth,the sender is a runway controller net,and thereceiver is the aircraft net.Out of seven encrypted qubits,the aircraft net successfully decodes just one qubit value,yielding a result out of the threshold value.Therefore,the aircraft net is not authenticated by the runway controller net and their communication is aborted.The last two rows of Tab.3 show the intrusion detection scenarios.In row fifth,the sender is a gate controller net,and the receiver is the aircraft net.Out of seven encrypted qubits,the aircraft net wrongly decodes the pre-decided polarization values.For instance,the polarization decided for basis V and bit 1 was R which was wrongly decrypted in first qubit of fifth row as NE which shows the presence of an intruder who does not know the pre-set values.Therefore,the last two rows of Tab.3 are unsuccessful authentications,and their respective interactions are aborted.

    5.2 Model Verification

    In this section,the verification results of aircraft takeoff quantum network have been discussed.In the quantum network of an aircraft takeoff the encrypted qubit and decrypted values are matched for authentication purposes,the results are shown in Tab.3.In the takeoff quantum network,two types of communication are involved:firstly,between an aircraft and gate controllerand thenbetween an aircraft and runway controller.Let us assume that for both interactions the pre-decided threshold is 50%.The bit values are 0 and 1;the basis values are D for diagonal and V for vertical;and Polarization represents a photon polarization which is generated from bit and basis value.For instance,basis V with bit 0 is represented as North,N,and basis V with a bit 1 is shown as Right,R.A basis D with bit 0 is marked as North East,NE and basis D with a bit 1 is represented as South East,SE.

    5.3 Reachability Tree(RT)Analysis

    The reachability analysis for quantum network of an aircraft takeoff is presented in this subsection.It helps to find that the system under study is free from any unexpected behavior.The external transitions are also used to represent communication between nets labeled as T1,T2,and so on.First,a RT is constructed in Fig.2 to represent the successful authentication between a gate controller and an aircraft net.The nodes of the tree are based on places and transitions of either an aircraft net or a gate controller net.The external transitions defined are T1 to T3.The marking and labels are also narrated in Fig.2.

    An RT is constructed in Fig.3 to represent the unsuccessful authentication between a gate controller and an aircraft net.The nodes of the tree are based on places and transitions of either an aircraft net or a gate controller net.The external transitions defined are T1 and T3.

    The defined marking of the tree and their labels are also narrated in this Fig.4.An RT is constructed in Figs.4 and 5 to represent the successful and unsuccessful authentication between a runway controller and an aircraft net,respectively.The nodes of the trees are based on places and transitions of either an aircraft net or a gate controller net.The external transitions defined in Fig.4 are T1 to T3 and T1 and T2 in Fig.5,respectively.The defined marking of each tree and their labels are also narrated in their respective figures.Each RT shows that the system exhibits no unexpected error and there are no unreachable markings in the quantum network of an aircraft takeoff.

    Table 3:Results of quantum network for an aircraft model

    Figure 2:RT of successful authentication between aircraft and gate controller nets

    Figure 3:RT of unsuccessful authentication between aircraft and gate controller nets

    Figure 4:RT of successful authentication between aircraft and runway controller nets

    Figure 5:RT of unsuccessful authentication between aircraft and runway controller nets

    Tab.4 shows a qualitative comparison of the proposed approach with the scheme given in[6]and[29-37]in terms of analysis type,protocol properties and tool used for analysis.Mainly it is observed that the types of analysis are performed by means of model checking and model verification.

    Table 4:Comparison

    6 Conclusion

    This research provides an integration of BB84 with petri-nets for formal modeling and verification of aircraft takeoff procedure.A new variant of traditional petri-nets,coined as the“Quantum Nets”are developed to integrate quantum characteristics of BB84.The strong static foundations of quantum nets are developed whereas the dynamic properties such as tokenization,external transitions,transition,enabling,and system dynamics are also formalized.Furthermore,the properties like reachability,boundedness,liveness,safety,and concurrency have been abstractly defined.By using the defined Quantum Nets formal model of aircraft takeoff is developed which constitute of three quantum nets namely aircraft,runway controller,ground controller and secure communication between them is described by using BB84 protocol.The model is checked through simulator of CPN Tools,and it is also verified through proof technique of RT analysis.This research reveals some fruitful outcomes and opens the horizons for future research of quantum cryptography.The expressivity of traditional petri-nets has been enhanced by developing its new variant,coined as a Quantum net,which can be used in future for modeling similar systems.The modeling and verification of a quantum system helps to identify errors and abnormal system behavior from a system to be built long before the system is physically implemented.Identification of errors and bugs spotted during modeling are easier and cheaper to be fixed.In this research only some properties of a quantum system are stated at an abstract level.Many more properties can be defined for further analysis and all the defined properties can also be extended for an intense and comprehensive verification.In this research we have only demonstrated the use of RT for verifying a quantum cryptographic system.Also,some more proof techniques like liveness,deadlock,simulations etc.,can be exploited to analyze various other dimensions of the cryptographic system such as an earlier work demonstrated the strength of agent-based mobile petri-nets in modeling security policy[50].The quantum nets proposed in this research also has some limitations.As the public channel is not secure,it is vulnerable to some kinds of security threats like eavesdrop,integrity etc.,any intruder can access the secure data.So,security of this channel needs to be focused for overall privacy of the system.Other limitation of quantum net is inherent in physical characteristics of a quantum channel.BB84 works on a photon polarization state and a quantum channel is designed to carry photons.Other than an intrusion attack,the state of a photon may change based on the environmental factors such as intense light and noise.It inhibits the receiver to correctly decode the qubits and authentication becomes unsuccessful,and communication is aborted since it takes time when exposed to the factors.More studies can be conducted to overcome these limitations by means of using quantum nets in contrast to CPN tool and RT analysis.

    Acknowledgement:Acknowledged to our families whose unconditional support enabled us to work.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    啦啦啦在线观看免费高清www| 美女中出高潮动态图| kizo精华| 国产精品.久久久| 亚洲精品视频女| 久久久久久久久大av| 夫妻午夜视频| 日韩 亚洲 欧美在线| 高清在线视频一区二区三区| 国产男女超爽视频在线观看| 国产 一区精品| 日本猛色少妇xxxxx猛交久久| 久久 成人 亚洲| 少妇熟女欧美另类| 久久久久久久亚洲中文字幕| 最近中文字幕2019免费版| 免费观看a级毛片全部| 国产视频首页在线观看| 国产美女午夜福利| 久久国产精品男人的天堂亚洲 | 三级国产精品片| 欧美一级a爱片免费观看看| 波野结衣二区三区在线| 亚洲伊人久久精品综合| 性色avwww在线观看| 99热这里只有精品一区| 国产在线视频一区二区| 3wmmmm亚洲av在线观看| 91久久精品国产一区二区成人| 少妇熟女欧美另类| 欧美人与善性xxx| 亚洲精品亚洲一区二区| 我要看日韩黄色一级片| 日本黄色片子视频| 色5月婷婷丁香| 日韩一本色道免费dvd| 亚洲av福利一区| 亚洲综合精品二区| 亚洲第一av免费看| 成人毛片60女人毛片免费| 99热网站在线观看| 最后的刺客免费高清国语| 狠狠精品人妻久久久久久综合| 精品少妇黑人巨大在线播放| 最黄视频免费看| 免费大片18禁| 国产爽快片一区二区三区| 欧美人与善性xxx| av在线观看视频网站免费| 国国产精品蜜臀av免费| 日韩一区二区三区影片| 久久久久久久久久成人| 精品久久久久久久久亚洲| 久久人人爽av亚洲精品天堂| 如何舔出高潮| h日本视频在线播放| 一区在线观看完整版| 9色porny在线观看| 男人狂女人下面高潮的视频| av有码第一页| 国产精品国产三级国产av玫瑰| 精品国产国语对白av| 亚洲不卡免费看| 日韩熟女老妇一区二区性免费视频| 日本av免费视频播放| 一级二级三级毛片免费看| 免费在线观看成人毛片| 国产探花极品一区二区| 亚洲欧美成人综合另类久久久| 啦啦啦中文免费视频观看日本| 免费看av在线观看网站| 夫妻性生交免费视频一级片| 日韩制服骚丝袜av| av不卡在线播放| 一个人免费看片子| av网站免费在线观看视频| 国产精品三级大全| 啦啦啦啦在线视频资源| 亚洲中文av在线| 欧美bdsm另类| 性色avwww在线观看| 中文字幕人妻熟人妻熟丝袜美| 欧美最新免费一区二区三区| 久久99热这里只频精品6学生| 国产视频内射| 精品酒店卫生间| 少妇丰满av| 亚洲欧美日韩卡通动漫| 丁香六月天网| 美女大奶头黄色视频| 大片电影免费在线观看免费| 日韩一区二区三区影片| 久久久久久久久久久免费av| 亚洲精品乱久久久久久| 狂野欧美激情性bbbbbb| 一个人看视频在线观看www免费| 国产精品无大码| 一级毛片久久久久久久久女| 亚洲精品乱码久久久v下载方式| 国产男女超爽视频在线观看| 夫妻午夜视频| 美女视频免费永久观看网站| 精品国产一区二区三区久久久樱花| www.色视频.com| 亚洲精品国产av成人精品| 在线观看一区二区三区激情| 婷婷色麻豆天堂久久| 国产视频首页在线观看| 高清毛片免费看| 国产有黄有色有爽视频| 一级毛片电影观看| 欧美 日韩 精品 国产| 免费大片黄手机在线观看| 99热国产这里只有精品6| 久久国产亚洲av麻豆专区| 熟妇人妻不卡中文字幕| 天天操日日干夜夜撸| 有码 亚洲区| 狂野欧美白嫩少妇大欣赏| 亚洲无线观看免费| 久久久久久久久大av| 老司机亚洲免费影院| 一级毛片aaaaaa免费看小| 国产永久视频网站| 久久97久久精品| 亚洲不卡免费看| 你懂的网址亚洲精品在线观看| 高清av免费在线| 亚洲欧美一区二区三区国产| 成年人免费黄色播放视频 | 性色av一级| 一二三四社区在线视频社区8| 日本一区二区免费在线视频| 国产精品熟女久久久久浪| 精品一品国产午夜福利视频| 亚洲精品日韩在线中文字幕| 国产免费视频播放在线视频| 欧美在线黄色| 欧美日韩成人在线一区二区| 亚洲av片天天在线观看| 1024香蕉在线观看| e午夜精品久久久久久久| 女性被躁到高潮视频| 他把我摸到了高潮在线观看 | 精品少妇久久久久久888优播| 伊人久久大香线蕉亚洲五| 最近中文字幕2019免费版| 美女扒开内裤让男人捅视频| 12—13女人毛片做爰片一| 久久女婷五月综合色啪小说| 欧美精品av麻豆av| 老熟女久久久| 免费看十八禁软件| 国产亚洲精品一区二区www | 亚洲欧美色中文字幕在线| 国产福利在线免费观看视频| 精品少妇久久久久久888优播| 99久久人妻综合| 最近最新中文字幕大全免费视频| 午夜免费鲁丝| 国产精品香港三级国产av潘金莲| av福利片在线| 我要看黄色一级片免费的| h视频一区二区三区| 桃红色精品国产亚洲av| 女人爽到高潮嗷嗷叫在线视频| 久久亚洲精品不卡| 人人妻人人澡人人看| 欧美性长视频在线观看| 大香蕉久久网| 男女高潮啪啪啪动态图| 午夜免费成人在线视频| 久久精品成人免费网站| 午夜日韩欧美国产| 亚洲精品一二三| 热99re8久久精品国产| 国产精品熟女久久久久浪| 久久av网站| 亚洲欧美成人综合另类久久久| 女性被躁到高潮视频| 亚洲视频免费观看视频| 久久精品成人免费网站| 欧美大码av| 欧美大码av| 亚洲精品国产一区二区精华液| 又黄又粗又硬又大视频| 成人av一区二区三区在线看 | 精品欧美一区二区三区在线| 天天躁日日躁夜夜躁夜夜| 曰老女人黄片| 亚洲成人国产一区在线观看| 18禁黄网站禁片午夜丰满| 人妻人人澡人人爽人人| 午夜影院在线不卡| 国产亚洲精品久久久久5区| 亚洲精品国产一区二区精华液| 国产精品一区二区精品视频观看| a级片在线免费高清观看视频| 成人黄色视频免费在线看| 久久国产亚洲av麻豆专区| 三上悠亚av全集在线观看| 岛国毛片在线播放| 18禁黄网站禁片午夜丰满| 精品国产国语对白av| 日韩 欧美 亚洲 中文字幕| 国产伦人伦偷精品视频| 国产亚洲欧美精品永久| 亚洲国产精品成人久久小说| 欧美黄色片欧美黄色片| 亚洲欧美成人综合另类久久久| 丁香六月欧美| 日本91视频免费播放| 大型av网站在线播放| 精品第一国产精品| 成人国产一区最新在线观看| 欧美xxⅹ黑人| 欧美另类一区| 国产亚洲av高清不卡| 亚洲精品粉嫩美女一区| 精品国产乱码久久久久久小说| 91大片在线观看| 麻豆乱淫一区二区| 欧美变态另类bdsm刘玥| 在线观看人妻少妇| 老汉色av国产亚洲站长工具| 成人黄色视频免费在线看| 50天的宝宝边吃奶边哭怎么回事| 精品少妇一区二区三区视频日本电影| 久久狼人影院| 亚洲人成77777在线视频| 久9热在线精品视频| 日本猛色少妇xxxxx猛交久久| 人妻人人澡人人爽人人| 在线观看人妻少妇| 人人妻人人澡人人爽人人夜夜| 亚洲一卡2卡3卡4卡5卡精品中文| 欧美国产精品一级二级三级| 国产精品免费视频内射| 精品人妻一区二区三区麻豆| 亚洲欧美精品自产自拍| 午夜激情久久久久久久| 99久久综合免费| 蜜桃国产av成人99| 男女无遮挡免费网站观看| 国产福利在线免费观看视频| 欧美另类一区| 亚洲精品一卡2卡三卡4卡5卡 | 亚洲欧美一区二区三区黑人| 91麻豆av在线| 国产99久久九九免费精品| 午夜两性在线视频| 老汉色av国产亚洲站长工具| 久久久国产一区二区| 亚洲精品国产av蜜桃| 久久久久国内视频| 亚洲精品一卡2卡三卡4卡5卡 | 亚洲色图综合在线观看| 亚洲成人国产一区在线观看| 欧美少妇被猛烈插入视频| 亚洲伊人色综图| 免费高清在线观看视频在线观看| 国产精品免费视频内射| 交换朋友夫妻互换小说| 欧美乱码精品一区二区三区| 亚洲精品美女久久av网站| 美女扒开内裤让男人捅视频| 精品亚洲乱码少妇综合久久| 91国产中文字幕| 五月天丁香电影| 国产精品.久久久| 精品第一国产精品| 1024香蕉在线观看| 欧美另类一区| 久久精品aⅴ一区二区三区四区| 热99re8久久精品国产| 动漫黄色视频在线观看| 亚洲激情五月婷婷啪啪| 99国产精品一区二区三区| 大香蕉久久网| 一级毛片精品| 99re6热这里在线精品视频| 夫妻午夜视频| 久热这里只有精品99| 色婷婷av一区二区三区视频| 日韩制服丝袜自拍偷拍| 久久精品久久久久久噜噜老黄| 日韩中文字幕欧美一区二区| 亚洲精品久久久久久婷婷小说| 中文字幕精品免费在线观看视频| 国产精品.久久久| 久久久久久久久免费视频了| 午夜免费观看性视频| 爱豆传媒免费全集在线观看| 国产日韩欧美亚洲二区| 国产精品秋霞免费鲁丝片| 国产一级毛片在线| 久久九九热精品免费| 一二三四在线观看免费中文在| 天堂中文最新版在线下载| 亚洲av片天天在线观看| 亚洲av电影在线进入| 淫妇啪啪啪对白视频 | 各种免费的搞黄视频| 三上悠亚av全集在线观看| 久久性视频一级片| 99热全是精品| 国产黄色免费在线视频| 亚洲精品一卡2卡三卡4卡5卡 | 欧美日韩国产mv在线观看视频| 中文字幕人妻丝袜一区二区| 国产成人av激情在线播放| 精品人妻在线不人妻| 各种免费的搞黄视频| 99国产极品粉嫩在线观看| 后天国语完整版免费观看| 欧美成人午夜精品| 亚洲精品久久久久久婷婷小说| 老熟妇乱子伦视频在线观看 | 啦啦啦视频在线资源免费观看| 美女高潮喷水抽搐中文字幕| 国产日韩一区二区三区精品不卡| 另类亚洲欧美激情| 免费av中文字幕在线| 天天影视国产精品| av网站在线播放免费| tube8黄色片| 日本vs欧美在线观看视频| 欧美日韩亚洲高清精品| 亚洲天堂av无毛| 国产日韩欧美视频二区| 又大又爽又粗| 性色av一级| 丝袜人妻中文字幕| 亚洲精品成人av观看孕妇| 永久免费av网站大全| 美国免费a级毛片| 女人久久www免费人成看片| 91老司机精品| 久久久水蜜桃国产精品网| 黄片播放在线免费| 欧美黄色片欧美黄色片| 日本av手机在线免费观看| 美女高潮喷水抽搐中文字幕| 高潮久久久久久久久久久不卡| 国产一卡二卡三卡精品| 久久午夜综合久久蜜桃| 高清视频免费观看一区二区| 黄片播放在线免费| 久久久水蜜桃国产精品网| 黄色怎么调成土黄色| 人人妻人人爽人人添夜夜欢视频| 一级毛片女人18水好多| 五月开心婷婷网| 亚洲精品久久午夜乱码| 美女高潮到喷水免费观看| 啦啦啦在线免费观看视频4| 捣出白浆h1v1| 国产成人a∨麻豆精品| 亚洲精品粉嫩美女一区| 国产成人精品久久二区二区免费| 国产av精品麻豆| 女人爽到高潮嗷嗷叫在线视频| 大陆偷拍与自拍| 少妇猛男粗大的猛烈进出视频| 亚洲国产日韩一区二区| 亚洲成人手机| 黄色视频,在线免费观看| 热re99久久国产66热| 色94色欧美一区二区| 国产成人精品久久二区二区免费| 久久中文字幕一级| 国产精品久久久久成人av| 丝袜美腿诱惑在线| 欧美人与性动交α欧美软件| 交换朋友夫妻互换小说| 国产亚洲av高清不卡| 十八禁人妻一区二区| 黄网站色视频无遮挡免费观看| 大香蕉久久成人网| 精品国产超薄肉色丝袜足j| 一区二区三区精品91| 久热爱精品视频在线9| 久久久久久久久久久久大奶| 国产精品国产三级国产专区5o| 亚洲五月婷婷丁香| 久久久久久人人人人人| 精品国产一区二区久久| 精品人妻一区二区三区麻豆| 亚洲国产欧美在线一区| 国产精品久久久人人做人人爽| 国产精品 欧美亚洲| 另类亚洲欧美激情| 黄色a级毛片大全视频| 亚洲精品美女久久av网站| 啦啦啦视频在线资源免费观看| 国内毛片毛片毛片毛片毛片| 99九九在线精品视频| 亚洲性夜色夜夜综合| 天天躁日日躁夜夜躁夜夜| 少妇裸体淫交视频免费看高清 | 国产免费现黄频在线看| 夜夜骑夜夜射夜夜干| 满18在线观看网站| 99热全是精品| 亚洲av国产av综合av卡| 美女视频免费永久观看网站| 亚洲国产av影院在线观看| 新久久久久国产一级毛片| 中文字幕色久视频| 欧美黑人精品巨大| 国产日韩一区二区三区精品不卡| 亚洲精品粉嫩美女一区| 搡老熟女国产l中国老女人| 日韩欧美免费精品| 曰老女人黄片| 国产色视频综合| 中文字幕制服av| 日本撒尿小便嘘嘘汇集6| 国产精品麻豆人妻色哟哟久久| 老司机福利观看| 久久毛片免费看一区二区三区| 制服人妻中文乱码| 美女高潮到喷水免费观看| 亚洲欧美一区二区三区久久| 99国产精品一区二区蜜桃av | 在线 av 中文字幕| 麻豆av在线久日| 黄网站色视频无遮挡免费观看| 成人黄色视频免费在线看| 伊人久久大香线蕉亚洲五| 欧美黄色淫秽网站| 国产av一区二区精品久久| 亚洲情色 制服丝袜| 精品人妻熟女毛片av久久网站| 91精品伊人久久大香线蕉| 91av网站免费观看| 久久久久国产精品人妻一区二区| 在线观看免费日韩欧美大片| 欧美+亚洲+日韩+国产| e午夜精品久久久久久久| 男人添女人高潮全过程视频| 伦理电影免费视频| 国产在线视频一区二区| 一本久久精品| 啪啪无遮挡十八禁网站| a 毛片基地| 纵有疾风起免费观看全集完整版| 黄色毛片三级朝国网站| 精品一品国产午夜福利视频| 国产精品.久久久| 母亲3免费完整高清在线观看| 老司机在亚洲福利影院| 最近最新免费中文字幕在线| 下体分泌物呈黄色| av超薄肉色丝袜交足视频| 一二三四在线观看免费中文在| 中国美女看黄片| 一二三四在线观看免费中文在| 一级片免费观看大全| 高清欧美精品videossex| 欧美日韩亚洲综合一区二区三区_| 国精品久久久久久国模美| 亚洲精品粉嫩美女一区| 亚洲精品久久午夜乱码| 午夜福利,免费看| 亚洲国产精品一区三区| 99国产精品免费福利视频| 丁香六月欧美| 999久久久精品免费观看国产| 99国产综合亚洲精品| 国产成人精品久久二区二区免费| 亚洲国产日韩一区二区| 久久久久久久久免费视频了| a级片在线免费高清观看视频| 高清在线国产一区| 精品一品国产午夜福利视频| 熟女少妇亚洲综合色aaa.| 国产在线一区二区三区精| 精品国产一区二区久久| 日韩精品免费视频一区二区三区| 精品国产乱子伦一区二区三区 | 看免费av毛片| 俄罗斯特黄特色一大片| 黑人巨大精品欧美一区二区mp4| 欧美日韩一级在线毛片| 欧美精品高潮呻吟av久久| www.熟女人妻精品国产| 欧美激情极品国产一区二区三区| 免费在线观看视频国产中文字幕亚洲 | 99精品久久久久人妻精品| 亚洲少妇的诱惑av| 国产精品 欧美亚洲| 黄色视频不卡| 亚洲午夜精品一区,二区,三区| 久久九九热精品免费| 国产日韩欧美亚洲二区| 欧美大码av| 亚洲人成77777在线视频| 欧美精品亚洲一区二区| 女警被强在线播放| 久久亚洲精品不卡| 国产99久久九九免费精品| 成年美女黄网站色视频大全免费| 亚洲欧美激情在线| 亚洲国产av影院在线观看| 在线观看免费视频网站a站| 精品国内亚洲2022精品成人 | 在线观看一区二区三区激情| 人人澡人人妻人| 老司机影院毛片| 亚洲欧美精品综合一区二区三区| 国产成人av教育| 一区二区日韩欧美中文字幕| 亚洲色图综合在线观看| cao死你这个sao货| 欧美日韩黄片免| av片东京热男人的天堂| a级片在线免费高清观看视频| 亚洲av成人一区二区三| 中亚洲国语对白在线视频| 91字幕亚洲| 多毛熟女@视频| 欧美日韩中文字幕国产精品一区二区三区 | 真人做人爱边吃奶动态| 国产福利在线免费观看视频| 女人被躁到高潮嗷嗷叫费观| 2018国产大陆天天弄谢| 国产一区二区激情短视频 | 亚洲美女黄色视频免费看| 亚洲成人免费av在线播放| 欧美少妇被猛烈插入视频| 国产精品九九99| 欧美人与性动交α欧美软件| 国产精品成人在线| 悠悠久久av| 一本色道久久久久久精品综合| 久久毛片免费看一区二区三区| 精品卡一卡二卡四卡免费| 日韩人妻精品一区2区三区| 纯流量卡能插随身wifi吗| 亚洲国产中文字幕在线视频| 欧美日韩中文字幕国产精品一区二区三区 | 女人爽到高潮嗷嗷叫在线视频| 国产成人影院久久av| videos熟女内射| 黑人欧美特级aaaaaa片| 日韩欧美免费精品| 欧美亚洲日本最大视频资源| 国产亚洲欧美精品永久| 欧美激情极品国产一区二区三区| 水蜜桃什么品种好| 国产成人一区二区三区免费视频网站| 国产又色又爽无遮挡免| 亚洲欧美一区二区三区久久| 成人手机av| 日韩视频在线欧美| 91精品国产国语对白视频| 欧美精品一区二区大全| 999久久久国产精品视频| 黑人猛操日本美女一级片| 亚洲人成77777在线视频| 亚洲成人免费电影在线观看| 狂野欧美激情性xxxx| 在线精品无人区一区二区三| 亚洲一区中文字幕在线| 操出白浆在线播放| 两个人免费观看高清视频| 男男h啪啪无遮挡| 午夜福利在线观看吧| 丁香六月天网| 免费在线观看日本一区| av超薄肉色丝袜交足视频| 日本五十路高清| 青青草视频在线视频观看| 亚洲一码二码三码区别大吗| 下体分泌物呈黄色| 菩萨蛮人人尽说江南好唐韦庄| 亚洲,欧美精品.| 热99国产精品久久久久久7| 两性夫妻黄色片| 久久精品熟女亚洲av麻豆精品| 免费一级毛片在线播放高清视频 | 成年女人毛片免费观看观看9 | 欧美+亚洲+日韩+国产| av天堂久久9| 国产亚洲欧美在线一区二区| 一边摸一边做爽爽视频免费| 老司机午夜福利在线观看视频 | 欧美在线一区亚洲| 亚洲精品一区蜜桃| 淫妇啪啪啪对白视频 | 中文字幕精品免费在线观看视频| 久久久国产成人免费| 亚洲精品久久成人aⅴ小说| 丰满少妇做爰视频| 免费观看a级毛片全部| 午夜福利一区二区在线看| 亚洲欧美清纯卡通| 麻豆国产av国片精品| 久久精品aⅴ一区二区三区四区| 欧美乱码精品一区二区三区| 亚洲天堂av无毛| 国产免费av片在线观看野外av| 亚洲欧美清纯卡通| 精品国产乱码久久久久久小说| 91麻豆精品激情在线观看国产 | 国产av又大| 人妻 亚洲 视频| 我要看黄色一级片免费的| 国产极品粉嫩免费观看在线| 欧美激情 高清一区二区三区| 99国产精品一区二区三区| 午夜老司机福利片| 欧美激情 高清一区二区三区| 一边摸一边抽搐一进一出视频|