Use case scenarios and preliminary reference model

Keyword list: HIDENETS, dependability, communication systems, ad hoc networks, wireless, middleware solutions, car-to-car communication, applications, use cases, business impact, preliminary reference model This document provides the starting point for the development of dependability solutions in the HIDENETS project with the following contents: (1) A conceptual framework is defined that contains the relevant terminology, threats and general requirements. This framework is a HIDENETS relevant subset of existing state-of-the-art views in the scientific dependability community. Furthermore, the dependability framework contains a first list of relevant functionalities in the communication and middleware level, which will act as input for the architectural discussions in HIDENETS work packages (WPs) 2 and 3. (2) A set of 17 applications with HIDENETS relevance is identified and their corresponding dependability requirements are derived. These applications belong mostly to the class of car-tocar and car-to-infrastructure services and have been selected due to their different types of dependability needs. (3) The applications have been grouped in six HIDENETS use cases, each consisting of a set of applications. The use cases will be the basis for the development of the dependability solutions in all other WPs. Together with a description of each use-case, application-specific architectural aspects are identified and corresponding failure modes and challenges are listed. (4) The business impact of dependability solutions for these use cases is analysed. (5) A preliminary definition of a HIDENETS reference model is provided, which contains highlevel architectural assumptions. This HIDENETS reference model will be further developed in the course of the HIDENETS projects in close cooperation with the other WPs, which is the reason why the preliminary version also contains a collection of potential contributions from other WPs that shall be developed and investigated in the course of the HIDENETS project. In summary, the identified use-cases and their requirements clearly show the large number of dependability related challenges. First steps towards technical solutions have been made in this report in the preliminary reference model, whereas the other work-packages have started in the meanwhile to develop such solutions further based on ‘middleware technology’ (WP2), ‘communication protocols’ (WP3), ‘quantitative analysis methodology’ (WP4), and ‘design and testing methodology’ (WP5).

[1]  Christoph Schroth,et al.  Simulating the traffic effects of vehicle-to-vehicle messaging systems , 2005 .

[2]  John Moy,et al.  OSPF Version 2 , 1998, RFC.

[3]  Hrushikesha Mohanty,et al.  MOBICHARTS: a notation to specify mobile computing applications , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[4]  Charles E. Perkins,et al.  IP Mobility Support for IPv4 , 2002, RFC.

[5]  Vincenzo Grassi,et al.  A UML Profile to Model Mobile Systems , 2004, UML.

[6]  Hrushikesha Mohanty,et al.  Specifying a Mobile Computing Infrastructure and Services , 2004, ICDCIT.

[7]  Ieee . Wg Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification , 2003 .

[8]  Nigel Davies,et al.  Evaluating a location-based application: a hybrid test and simulation environment , 2004, IEEE Pervasive Computing.

[9]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[10]  Joseph Kee-Yin Ng,et al.  Embedded program testing in untestable mobile environment: an experience of trustworthiness approach , 2004, 11th Asia-Pacific Software Engineering Conference.

[11]  Ivan Stojmenovic Geocasting in Ad Hoc and Sensor Networks , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.

[12]  A. Avizienis,et al.  Dependable computing: From concepts to design diversity , 1986, Proceedings of the IEEE.

[13]  Randall R. Stewart,et al.  Stream Control Transmission Protocol , 2000, RFC.

[14]  Robert L. Glass,et al.  User satisfaction , 1994 .

[15]  Flaviu Cristian,et al.  The Timed Asynchronous Distributed System Model , 1998, IEEE Trans. Parallel Distributed Syst..

[16]  Eranga Perera,et al.  Survey on network mobility support , 2004, MOCO.

[17]  Jeff Ahrenholz OSPFv2 Wireless Interface Type , 2004 .

[18]  Ivan Stojmenovic,et al.  Broadcasting and Topology Control in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.

[19]  Paulo Veríssimo,et al.  Distributed Systems for System Architects , 2001, Advances in Distributed Computing and Middleware.

[20]  Christoph Schroth,et al.  Car-to-Car Communication , 2006 .

[21]  Ross W. Callon,et al.  Use of OSI IS-IS for routing in TCP/IP and dual environments , 1990, RFC.

[22]  Hermann Kopetz,et al.  Dependability: Basic Concepts and Terminology , 1992 .

[23]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[24]  Tsong Yueh Chen,et al.  A metamorphic approach to integration testing of context-sensitive middleware-based applications , 2005, Fifth International Conference on Quality Software (QSIC'05).

[25]  W. Enkelmann FleetNet - applications for inter-vehicle communication , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).

[26]  Stephen S. Yau,et al.  Testing context-sensitive middleware-based software applications , 2004, Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004..

[27]  D. de Bruin,et al.  Design and test of a cooperative adaptive cruise control system , 2004, IEEE Intelligent Vehicles Symposium, 2004.

[28]  Martin Mauve,et al.  A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..

[29]  Yves Crouzet,et al.  Software Statistical Testing , 1995 .

[30]  Sam Toueg,et al.  Unreliable failure detectors for reliable distributed systems , 1996, JACM.

[31]  Nora Koch,et al.  UML for Global Computing , 2003, Global Computing.

[32]  Yakov Rekhter,et al.  A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.

[33]  SCHMID-LAMBERG [Or the like]. , 1952, Hippokrates.

[34]  George Coulouris,et al.  A Generic Location Event Simulator , 2002, UbiComp.

[35]  J. Rosenberg,et al.  Session Initiation Protocol , 2002 .

[36]  Boris Beizer,et al.  Software Testing Techniques , 1983 .

[37]  Carl E. Landwehr,et al.  Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.

[38]  Antonio Casimiro,et al.  The Timely Computing Base Model and Architecture , 2002, IEEE Trans. Computers.