A Lightweight C2 Service Invocation Method Based on HTTP Proxy

نویسندگان

  • Heng Wang
  • Guangxia Zhou
  • Shuanghua Zhu
  • Feng Ding
  • Weitai Liang
چکیده

SOA and Web Services technologies have been increasingly applied to network centric C2. In this paper, a service‐oriented C2 software architecture is firstly proposed based on SOA ideas and Web services technology to provide framework and guidance to service integration in future service‐oriented C2 systems, in which software and capability of C2 systems often are wrapped web services so as to implement C2 function and information exchanging through service invocation. Traditional WS invocation is implemented through SOAP via HTTP. Due to security and efficiency problems about SOAP/XML/HTTP, how to implement service invocation satisfying military requirement has become a hotspot problem concerning future C2. Usual methods solving the above invocation problems often have higher complexity, more enormous load and longer develop cycle. Considering security requirement in military WAN environment, a lightweight service invocation method based on HTTP proxy is proposed in this paper. A HTTP proxy is deployed in border of LAN system, in which web services messages are intercepted and SOAP is transported through transport protocol accorded with military standard instead of HTTP in WAN. The experiments demonstrate that proposed method which can meet security and timeliness requirements in military environment is effective and feasible.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

Primary-Backup Object Replications in Java

Service replication is a key to providing high availability, fault tolerance, and good performance in distributed systems. Various replication schemes have been proposed, they are based on two streams of techniques, namely passive replication and active replication. This paper focuses on two implementation approaches of the passive primary-backup scheme, remote method invocation approach and re...

متن کامل

The CoABS Grida

The CoABS Grid integrates heterogeneous agent-based systems, object -based applications, and legacy systems. The CoABS Grid does not mandate the network protocol used to deliver messages to an agent or the agent communication language. A CoABS Grid agent registers a proxy object supporting a well-known message-delivery interface in a lookup service. Default proxy implementations are provided th...

متن کامل

Dynamic Discovery and Invocation of Web services Through Android Mobile

In this paper we are proposing an efficient and novel architecture for dynamic invocation and discovery of web services in mobile. While we are handling with the mobile, we need to consider the resources of the mobile, these battery services are not flexible or optimal like desktops or laptops. We implemented a proxy between service and mobile client for dynamic invocation and discovery of serv...

متن کامل

Reasoning on Context Satisfiability for Service Recommendation in Mobile Network

The Ubiquitous Computing envisions a world of communicating mobile devices. As mobile devices usually have limited resources, it brings up the challenge to search and invoke services at any time and any place in an accurate, efficient and adaptive way. In this paper, we propose to filter services by matchmaking the precondition of service invocation and the context information of service consum...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010