Skip to main content
Log in

Using formal methods to increase confidence in a home network system implementation: a case study

  • Original Paper
  • Published:
Innovations in Systems and Software Engineering Aims and scope Submit manuscript

Abstract

A home network system consists of multiple networked appliances, intended to provide more convenient and comfortable living for home users. Before being deployed, one has to guarantee the correctness, the safety, and the security of the system. Here, we present the approach chosen to validate the Java implementation of a home network system. We rely on the Java Modelling Language to formally specify and validate an abstraction of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ahrendt W, Baar T, Beckert B, Bubel R, Giese M, Hähnle R, Menzel W, Mostowski W, Roth A, Schlager S, Schmitt PH (2005) The KeY Tool. Softw Syst Model 4: 32–54

    Article  Google Scholar 

  2. Balfe S, Li S, Zhou J (2006) Pervasive trusted computing. In: 2nd international workshop on security, privacy and trust in pervasive and ubiquitous computing (SecPerU), pp 88–94. IEEE Computer Society, Lyon

  3. Bartetzko D, Fischer C, Möller M, Wehrheim H (2001) Jass-Java with Assertions. Electr Notes Theor Comput Sci 55(2)

  4. Beckert B, Hähnle R, Schmitt PH (eds) (2007) Verification of object-oriented software: the KeY approach. LNCS 4334. Springer

  5. Bohn J, Coroama V, Langheinrich M, Mattern F, Rohs M (2005) Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. In: Weber W, Rabaey J, Aarts E (eds) Ambient intelligence. Springer, Berlin, pp 5–29

    Chapter  Google Scholar 

  6. Bousquet L, Ledru Y, Maury O, Oriat C, Lanet JL (2004) A case study in JML-based software validation (short paper). In: Proceedings of 19th Int. IEEE Conf. on Automated Sofware Engineering (ASE’04), pp 294–297

  7. Burdy L, Cheon Y, Cok DR, Ernst MD, Kiniry JR, Leavens GT, Leino KRM, Poll E (2005) An overview of JML tools and applications. STTT 7(3): 212–232

    Article  Google Scholar 

  8. Busi N, Gorrieri R, Guidi C, Lucchi R, Zavattaro G. (2005) Towards a formal framework for choreography. In: Enabling technologies: infrastructure for collaborative enterprise. 14th IEEE international workshops on 13–15 June 2005, pp 107–112

  9. Candolin C (2007) A security framework for service oriented architectures. In: Military communications conference, 2007. MILCOM. IEEE, pp 1–6, 29–31 Oct 2007

  10. Canfora G, Di Penta M (2006) Testing services and service-centric systems: challenges and opportunities. IT Prof 8(2): 10–17

    Article  Google Scholar 

  11. Cheon Y, Leavens G (2002) A simple and practical approach to unit testing: the JML and JUnit way. In: ECOOP 2002. LNCS, vol 2474. Springer, pp 231–255

  12. Cohen D, Dalal S, Parelius J, Patton G (1996) The combinatorial design approach to automatic test generation. IEEE Softw 13(5): 83–88

    Article  Google Scholar 

  13. Controneo D, Di Flora C, Russo S (2003) Improving dependability of service oriented architectures for pervasive computing. Object-oriented real-time dependable systems, 2003. (WORDS 2003). In: Proceedings of the eighth international workshop on 15–17 Jan 2003, pp 74–81

  14. Dai G, Bai X, Wang F, Dai F (2007) Contract-based testing for web services. In: 31st annual international computer software and applications conference (COMPSAC). IEEE Computer Society, Beijing, China, pp 517–526

  15. Dragoni N, Massacci F, Naliuka K, Siahaan I (2007) Security- by-contract: toward a semantics for digital signatures on mobile code. In: 4th European public key infrastructure workshop: theory and practice (EuroPKI). LNCS, vol 4582. Springer, Palma de Mallorca, Spain, pp 297–312

  16. du Bousquet L (1999) Feature interaction detection using testing and model-checking, experience report. In: World congress on formal methods. LNCS, vol 1708, Springer, Toulouse, pp 622–641

  17. Flanagan C, Leino KRM, Lillibridge M, Nelson G, Saxe JB, Stata R (2002) Extended static checking for Java. In: Proc. of the ACM SIGPLAN 2002 conference on programming language design and implementation. ACM Press, pp 234–245

  18. Foster H, Uchitel S, Magee J, Kramer J (2003) Model-based verification of Web service compositions. In: Automated software engineering, 2003. Proceedings. 18th IEEE international conference on 6–10 Oct 2003, pp 152–161

  19. Geer D (2006) Nanotechnology: the growing impact of shrinking computers. Pervasive Comput 5(1): 7–11

    Article  MathSciNet  Google Scholar 

  20. Jackson M (1999) The role of formalism in method. In: Formal methods, world congress on formal methods in the development of computing systems (FM99). LNCS, vol 1708. Springer, Toulouse, p 56

  21. The JML Home Page (2005). http://www.jmlspecs.org

  22. Karaorman M, Abercrombie P (2005) Contractor: introducing design-by-contract to java using reflective bytecode instrumentation. Form Methods Syst Des 27(3): 275–312

    Article  MATH  Google Scholar 

  23. Karaorman M, Holzle U, Bruno J (1999) Contractor: a reflective java library to support design by contract. Tech. rep., Santa Barbara

  24. Kolberg M, Magill E, Wilson M (2003) Compatibility issues between services supporting networked appliances. IEEE Commun Mag 41: 136–147

    Article  Google Scholar 

  25. Lamparter S, Luckner S, Mutschler S (2007) Formal specification of web service contracts for automated contracting and monitoring. In: 40th Hawaii international conference on systems science (HICSS). IEEE Computer Society, Big Island, p 63

  26. Langheinrich M, Coroama V, Bohn J, Mattern F (2005) Living in a smart environment—implications for the coming ubiquitous information society. Telecommun Rev 15(1): 132–143

    Google Scholar 

  27. Leavens G, Baker A, Ruby C (1999) JML: a notation for detailed design. In: Kilov H, Rumpe B, Simmonds I (eds) Behavioral specifications of businesses and systems. Kluwer, Dordrecht, pp 175–188

    Google Scholar 

  28. Ledru Y, du Bousquet L, Maury O, Bontron P (2004) Filtering TOBIAS combinatorial test suites. In: Fundamental approaches to software engineering (FASE’04). LNCS, vol (to appear). Springer, Barcelona

  29. Loke SW (2003) Service-oriented device ecology workflows. In: First international conference on service-oriented computing (ICSOC 2003). LNCS, vol 2910. Springer, Trento, pp 559–574

  30. Matsushita Electric Industrial Co., L Kurashi Net (jp). http://national.jp/appliance/product/kurashi-net/

  31. Meyer B Object-oriented software construction, 2nd edn

  32. Meyer B (1992) design by contract. Computer 25(10): 40–51

    Article  Google Scholar 

  33. Nakajima S (2002) Model-checking verification for reliable web services. In: Workshop on Object-Oriented Web Services, collocated with OOPSLA

  34. Nakamura M, Tanaka A, Igaki H, Tamada H, Matsumoto K (2006) Adapting legacy home appliances to home network systems using web services. In: Int. Conf. on Web Services (ICWS 2006). IEEE, pp 849–858

  35. Nakamura M, Tanaka A, Igaki H, Tamada H, Matsumoto K (2008) Constructing home network systems and integrated services using legacy home appliances and web services. Int J Web Serv Res, to appear

  36. Papazoglou MP, Georgakopoulos D (2003) Special issue: service-oriented computing. Introduction. Commun ACM 46(10): 24–28

    Article  Google Scholar 

  37. Pfadenhauer K, Dustdar S, Kittl B (2005) Challenges and solutions for model-driven Web service composition. Enabling technologies: infrastructure for collaborative enterprise, 2005. In: 14th IEEE international workshops on 13–15 June 2005, pp 126–131

  38. Plath M, Ryan MD (2000) The feature construct for SMV: semantics. In: Feature interactions in telecommunications and software systems VI. Glasgow, pp 129–144

  39. Rushby JM (1999) Mechanized formal methods: where next? In: Formal methods, world congress on formal methods in the development of computing systems (FM99). LNCS, vol 1708. Springer, Toulouse, pp 48–51

  40. TOSHIBA: Toshiba home network: feminity. http://www3.toshiba.co.jp/feminity/feminity_eng/

  41. Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7): 74–84

    Article  Google Scholar 

  42. Yan B, Nakamura M, du Bousquet L, ichi Matsumoto K (2007) Characterizing safety of integrated services in home network system. In: 5th international conference on smart homes and health telematics (ICOST), LNCS, vol. 4541. Springer, Nara, pp 130–140

  43. Yi X, Kochut K (2004) A CP-nets-based design and verification framework for Web services composition. IEEE int. conf. on web services, 6–9 July 2004, pp 756–760

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lydie du Bousquet.

Additional information

This is a substantially revised version of our paper that appeared in the proceedings of the Workshop On Leveraging Applications of Formal Methods, Verification and Validation (ISoLA), Poitiers-Futuroscope, France, December 2007.

Rights and permissions

Reprints and permissions

About this article

Cite this article

du Bousquet, L., Nakamura, M., Yan, B. et al. Using formal methods to increase confidence in a home network system implementation: a case study. Innovations Syst Softw Eng 5, 181–196 (2009). https://doi.org/10.1007/s11334-009-0092-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11334-009-0092-5

Keywords

Navigation