Advertisement

Distributed Composition of Highly-Collaborative Services and Sensors in Tactical Domains

  • Alexander PerucciEmail author
  • Marco Autili
  • Massimo Tivoli
  • Alessandro Aloisio
  • Paola Inverardi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 925)

Abstract

Software systems are often built by composing services distributed over the network. Choreographies are a form of decentralized composition that models the external interaction of the services by specifying peer-to-peer message exchanges from a global perspective. When third-party services are involved, usually black-box services to be reused, actually realizing choreographies calls for exogenous coordination of their interaction. Nowadays, very few approaches address the problem of actually realizing choreographies in an automatic way. These approaches are rather static and are poorly suited to the need of tactical domains, which are highly-dynamic networking environments that bring together services and sensors over military radio networks. In this paper, we describe a method to employ service choreographies in tactical environments, and apply it to a case study in the military domain.

Notes

Acknowledgment

This research work has been supported by the EU’s H2020 Programme, GA No. 644178 (project CHOReVOLUTION - Automated Synthesis of Dynamic and Secured Choreographies for the Future Internet), by the Ministry of Economy and Finance, Cipe resolution No. 135/2012 (project INCIPICT - INnovating CIty Planning through Information and Communication Technologies), and by the EDefence Agency, contract No. B 0980 IAP4 GP (project TACTICS - TACTICal Service Oriented Architecture).

References

  1. 1.
    Aloisio A, Autili M, D’Angelo A, Viidanoja A, Leguay J, Ginzler T, Lampe T, Spagnolo L, Wolthusen SD, Flizikowski A, Sliwa J (2015) TACTICS: tactical service oriented architecture. In: 3rd international conference in software engineering for defence applications (SEDA), pp 1–9Google Scholar
  2. 2.
    Andersson J, de Lemos R, Malek S, Weyns D (2009) Modeling dimensions of self-adaptive software systems. In: Software engineering for self-adaptive systems, volume 5525 of LNCS. Springer, Heidelberg, pp 27–47Google Scholar
  3. 3.
    Australian Defence Force Warfare Centre (2009) ADDP 00.1 Command and Control - Department of Defence, CANBERRA ACT 2600Google Scholar
  4. 4.
    Autili M, Di Ruscio D, Di Salle A, Inverardi P, Tivoli M (2013) A model-based synthesis process for choreography realizability enforcement. In: Fundamental approaches to software engineering, volume 7793 of LNCS. Springer, Heidelberg, pp 37–52Google Scholar
  5. 5.
    Autili M, Inverardi P, Tivoli M (2015) Automated synthesis of service choreographies. IEEE Softw 32(1):50–57CrossRefGoogle Scholar
  6. 6.
    Autili M, Inverardi P, Tivoli M (2018) Choreography realizability enforcement through the automatic synthesis of distributed coordination delegates. Sci Comput Program 160:3–29CrossRefGoogle Scholar
  7. 7.
    Autili M, Tivoli M (2014) Distributed enforcement of service choreographies. In: Proceedings of the 13th international workshop on foundations of coordination languages and self-adaptive systems (FOCLASA), pp 18–35Google Scholar
  8. 8.
    Basu S, Bultan T (2011) Choreography conformance via synchronizability. In: Proceedings of the 20th international conference on World Wide Web (WWW), pp 795–804Google Scholar
  9. 9.
    Carbone M, Montesi F (2013) Deadlock-freedom-by-design: multiparty asynchronous global programming. In: Proceedings of the 40th annual ACM SIGPLAN-sigact symposium on principles of programming languages, pp 263–274Google Scholar
  10. 10.
    National Research Council (1999) Realizing the Potential of C4I: Fundamental Challenges. The National Academies PressGoogle Scholar
  11. 11.
    Department of Defense (2010) Department of Defense Dictionary of Military and Associated Terms - Joint Publication 1-02 - as amended through 15 December 2014Google Scholar
  12. 12.
    Diefenbach A, Ginzler T, McLaughlin S, Sliwa J, Lampe TA, Prasse C (2016) TACTICS TSI architecture: a European reference architecture for tactical SOA. In: International conference on military communications and information systems (ICMCIS), pp 1–8Google Scholar
  13. 13.
    Farah Z, Ait-Ameur Y, Ouederni M, Tari K (2017) A correct-by-construction model for asynchronously communicating systems. Int J Softw Tools Technol Transf 19(4):465–485CrossRefGoogle Scholar
  14. 14.
    Güdemann M, Salaün G, Ouederni M (2012) Counterexample guided synthesis of monitors for realizability enforcement. In: Automated technology for verification and analysis, volume 7561 of LNCS. Springer, Heidelberg, pp 238–253Google Scholar
  15. 15.
    Kazhamiakin R, Pistore M (2006) Analysis of realizability conditions for web service choreographies. In: Formal techniques for networked and distributed systems (FORTE). Springer, Heidelberg, pp 61–76Google Scholar
  16. 16.
    Kazhamiakin R, Pistore M (2006) Choreography conformance analysis: asynchronous communications and information alignment. In: WebServices and formal methods, volume 4184 of LNCS. Springer, Heidelberg, pp 227–241Google Scholar
  17. 17.
    Lopes RRF, Wolthusen SD (2015) Distributed security policies for service-oriented architectures over tactical networks. In: IEEE military communications conference (MILCOM), pp 1548–1553Google Scholar
  18. 18.
    Malek S, Beckman N, Mikic-Rakic M, Medvidovic N (2005) A framework for ensuring and improving dependability in highly distributed systems. In: Architecting dependable systems III, volume 3549 of LNCS. Springer, Heidelberg, pp 173–193Google Scholar
  19. 19.
    Małowidzki M, Dalecki T, Bereziński P, Mazur M, Skarżyński P (2016) Adapting standard tactical applications for a military disruption-tolerant network. In: International conference on military communications and information systems (ICMCIS), pp 1–5Google Scholar
  20. 20.
    Seifert H, Franke M, Diefenbach A, Sevenich P (2012) SOA in the CoNSIS coalition environment: extending the WS-I basic profile for using SOA in a tactical environment. In: Military communications and information systems conference (MCC), pp 1–6Google Scholar
  21. 21.
    Suri N, Morelli A, Kovach J, Sadler L, Winkler R (2015) Agile computing middleware support for service-oriented computing over tactical networks. In: IEEE 81st vehicular technology conference (VTC Spring), pp 1–5Google Scholar
  22. 22.
    Tahmoush D, Lofland C (2009) A prototype national emergency deployment system. In: IEEE conference on technologies for homeland security (HST), pp 331–338Google Scholar
  23. 23.
    Trainotti M, Pistore M, Calabrese G, Zacco G, Lucchese G, Barbon F, Bertoli P, Traverso P (2005) ASTRO: Supporting composition and execution of web services. In: Service-oriented computing - ICSOC 2005, volume 3826 of LNCS. Springer, Heidelberg, pp 495–501Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Alexander Perucci
    • 1
    Email author
  • Marco Autili
    • 1
  • Massimo Tivoli
    • 1
  • Alessandro Aloisio
    • 1
  • Paola Inverardi
    • 1
  1. 1.Department of Information Engineering, Computer Science and MathematicsUniversity of L’AquilaL’AquilaItaly

Personalised recommendations