CPC G06F 21/577 (2013.01) [G06N 7/00 (2013.01); H04L 63/08 (2013.01); H04L 67/12 (2013.01)] | 5 Claims |
1. A method of verifying a drone included in an industrial Internet of things (IIoT) system using petri net modeling, the method comprising:
a modeling step of modeling the industrial Internet of things system into a hierarchical type petri net; and
a verification step of verifying whether security vulnerability is present in the drone based on a hierarchical type petri net model,
wherein the verification step comprises determining that the security vulnerability is present in the drone when at least one of a plurality of determination factors included as places in the hierarchical type petri net model determines an operation of the drone to be abnormal;
wherein the IIoT system comprises:
a user terminal supporting a user;
a first access point connected to the user terminal;
a core connected to the first access point and interconnecting the user and an Internet of Things (IoT) apparatus;
a drone connected to the core in a way to communicate with the core and provided in plural;
a second access point connected to the drone;
a first IoT apparatus connected to the second access point and provided to be capable of bidirectional communication with the user; and
a second IoT apparatus connected to the first IoT apparatus, and
wherein the hierarchical type petri net model comprises:
a first layer provided as a petri net modeled from the user terminal;
a second layer provided as a petri net modeled from the first access point;
a third layer provided as a petri net modeled from the core;
a fourth layer provided as a petri net modeled from the drone;
a fifth layer provided as a petri net modeled from the second access point;
a sixth layer provided as a petri net modeled from the first IoT apparatus; and
a seventh layer provided as a petri net modeled from the second IoT apparatus.
|