Abstract
Distributed processing capabilities of robotic-applications using state-of-the-art component-based middleware and mobile-agent software technologies are continuously helping to develop more powerful intelligent robots. These application development frameworks provide several attractive conceptual solutions for network-based operations, however, these benefits cannot be realized unless the appropriate security mechanisms are in place. In this paper, this important issue is addressed in a systematic way: firstly, by analyzing the key limitations of traditional security models, the new security requirements for agent-based networked robots are pointed out and secondly, an effective defense mechanism is devised by constructing a knowledge-based security-aware robot control model. The main contributions of this work are, to address the security problem in a knowledge-based approach and to show the roles and mechanisms of the proposed security architecture. The feasibility of our approach is examined through a case study on development of robot security-sense using Linux-based reliable security-tools.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Brazier, F.M.T., Jonker, C.M., Treur, J.: Principles of Component-Based Design of Intelligent Agents, http://www.few.vu.nl/wai/Papers/DKE02.princ.pdf
Jansen, W., Karygiannis, T.: NIST Special Publication 800-19 Mobile Agent Security, http://www.mirrors.wiretapped.net/security/info/reference/nist/special-publications/sp-800-19.pdf
Yamada, S., Kamioka, E.: Access Control for Security and Privacy in Ubiquitous Computing Environments. IEICE Trans. Commun. E88-B(3) (March 2005)
Ramakrishnan, R., Srivastava, D., Sudarshan, S., Seshadri, P.: The CORAL deductive system. The VLDB Journal 3, 161–21 (1994)
Widenjus, M., Axmark, D.: MySQL Reference Manual, June 2002. O’Reilly & Associates Inc., Sebastopol (2002)
Botha, M., von Solms, R.: Utilizing Fuzzy Logic and Trend Analysis for Effective Intrusion Detection. Computers and Security 22(5), 423–434 (2003)
Bridges, S.M., Vaughn, R.B.: Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection. In: Proc. 23rd National Information Systems Security Conference (NISSC), Baltimore, MD (October 2000)
Andreasson Oskar: Iptables Tutorial 1.2.0. Available Online: http://iptables-tutorial.frozentux.net/iptables-tutorial.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sarker, M.O.F., Kim, C., You, BJ., Sadi, M.G. (2006). Developing Knowledge-Based Security-Sense of Networked Intelligent Robots. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2006. Lecture Notes in Computer Science(), vol 4251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11892960_105
Download citation
DOI: https://doi.org/10.1007/11892960_105
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46535-5
Online ISBN: 978-3-540-46536-2
eBook Packages: Computer ScienceComputer Science (R0)