Model-Based Approaches for Dependability in Ad-Hoc Mobile Networks and Services

  • Gergely Pintér
  • Zoltán Micskei
  • András Kövi
  • Zoltán Égel
  • Imre Kocsis
  • Gábor Huszerl
  • András Pataricza
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5135)


This paper presents our results in the field of Model Driven Design (MDD) gained in dependable, distributed application development communicating over ad-hoc mobile networks. The context of the discussion is the Highly Dependable IP-based Networks and Services (Hidenets) research project. Our efforts involve (i) construction of the platform’s UML model, (ii) construction of a metamodel illustrating the intended organization of applications running on the platform, (iii) defining a UML profile on the basis of the metamodel facilitating the integration of the basic services provided by the Hidenets platform to support high availability of the application and (iv) providing a set of dependability enforcing design patterns to support the implementation of applications built for the Hidenets platform using our profile. The paper highlights the benefits of applying model-based approaches in the context of complex dependability frameworks.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Object Management Group: UML Profile for Schedulability, Performance and Time (January 2005)Google Scholar
  2. 2.
    Service Availability Forum: Application Interface Specification (2007),
  3. 3.
    Object Management Group: Unified Modeling Language: Superstructure (2007)Google Scholar
  4. 4.
    Radimirsch, M., Matthiesen, E.V., Huszerl, G., Reitenspiess, M., Kaâniche, M., Svinnset, I.E., Casimiro, A., Falai, L.: Use Case Scenarios and Preliminary Reference Model (Deliverable of the Hidenets Project – D-1.1) (2006)Google Scholar
  5. 5.
    Object Management Group: UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics (2006)Google Scholar
  6. 6.
    Object Management Group: UML Profile for Modeling and Analysis of Real-Time and Embedded Systems (MARTE) (2007)Google Scholar
  7. 7.
    Kövi, A., Pataricza, A., Rákosi, B., Pintér, G., Micskei, Z.: UML Profile and Design Patterns Library (Deliverable of the Hidenets Project – D-5.1)Google Scholar
  8. 8.
    Moniz, H., Neves, N.F., Correia, M., Casimiro, A., Verissimo, P.: Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. In: PRDC 2007: 13th IEEE Pacific Rim International Symposium on Dependable Computing, Melbourne, Australia (2007)Google Scholar
  9. 9.
    Courtes, L., Killijian, M.O., Powell, D.: Security Rationale for a Cooperative Backup Service for Mobile Devices. In: 3rd Latin-American Symposium on Dependable Computing (LADC), Morelia, Mexico (2007)Google Scholar
  10. 10.
    Matthiesen, E.V., Schwefel, H.P., Renier, T.J.: A Selection Metric for Backup Group Creation in Inter-Vehicular Networks. In: IST Mobile and Wireless Communications Summit, Budapest, Hungary (2007)Google Scholar
  11. 11.
    Bondavalli, A., Ceccarelli, A., Falai, L.: A Self-Aware Clock for Pervasive Computing Systems. In: 15th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2007) (2007)Google Scholar
  12. 12.
    Hansen, A.F., Lysne, O., Cicic, T., Gjessing, S.: Fast Proactive Recovery from Concurrent Failures. In: IEEE International Conference on Communications (ICC 2007) (2007)Google Scholar
  13. 13.
    Object Management Group: MDA Guide. OMG (June 2003)Google Scholar
  14. 14.
    Douglass, B.P.: Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems. Addison-Wesley, Boston (2002)Google Scholar
  15. 15.
    Object Management Group: UML Testing Profile (2005)Google Scholar
  16. 16.
    de Bruin, I.: Specification of the HIDENETS Laboratory Set-up Scenario and Components (Deliverable of the Hidenets Project – D-6.1)Google Scholar
  17. 17.
    Waeselynck, H., Micskei, Z., Nguyen, M.D., Riviere, N.: Mobile Systems from a Validation Perspective: a Case Study. In: ISPDC 2007: Proc. of the Sixth Int. Symp. on Parallel and Distributed Computing, Hagenberg, Austria, July 5–8, 2007, IEEE, Los Alamitos (2007)Google Scholar
  18. 18.
    Avizienis, A., Laprie, J., Randell, B., Landwehr, C.: Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Transactions on Dependable and Secure Computing 1(1), 11–33 (2004)CrossRefGoogle Scholar
  19. 19.
    Pataricza, A.: Model Based Design of Dependability. Dissertation for the Degree of Doctor of Sciences from the Hungarian Academy of Sciences (2006)Google Scholar
  20. 20.
    Tsang, E.: Foundations of Constraint Satisfaction. Academic Press, San Diego (1993)Google Scholar
  21. 21.
    Jaffar, J., Maher, M.J.: Constraint Logic Programming: A Survey. Journal of Logic Programming 19/20, 503–581 (1994)MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Gergely Pintér
    • 1
  • Zoltán Micskei
    • 1
  • András Kövi
    • 1
  • Zoltán Égel
    • 1
  • Imre Kocsis
    • 1
  • Gábor Huszerl
    • 1
  • András Pataricza
    • 1
  1. 1.Department of Measurement and Information SystemsBudapest University of Technology and EconomicsHungary

Personalised recommendations