Skip to main content
Log in

The reflective mobile agent paradigm implemented in a smart office environment

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Ubiquitous systems will integrate computers invisibly and unobtrusively in everyday objects. Data will be catched from single or multi-sensor devices and will be used for context extraction. New location-based services will be adapted to user preferences. For this the ubiquitous system needs to know user profiles, likings, and habits. As the user moves, these information must be made available at the new location of the user. Either the user carries the data on wearable or portable computers or the smart environment takes responsibility for transporting them. The amount of new devices and services makes an efficient use by centralized systems very difficult. The idea presented in this paper is that a virtual reflection of the user represented by a mobile agent accompanying in the smart environment. Mobile agents offer a possibility to encapsulate information of a person and the person’s preferences and perform location-based services of the ubiquitous system in the name of the user. Security and privacy are major concerns of such an agent system. This paper describes a ubiquitous mobile agent system named UbiMAS which has security extensions to provide high protection of agents and significant personal data. UbiMAS is applied in the smart doorplate project as part of a smart office environment.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Bagci F, Petzold J, Trumler W, Ungerer T (2003) Ubiquitous mobile agent system in a P2P-network. In: UbiSys—workshop at the fifth annual conference on ubiquitous computing, Seattle, October 2003

  2. Bagci F, Petzold J, Trumler W, Ungerer T (2003) Smart doorplate. In: The first international conference on appliance design (1AD), Bristol, UK, May 2003

  3. Bagci F, Schick H, Petzold J, Trumler W, Ungerer T (2005) Communication and security extensions for a ubiquitous mobile agent system (UbiMAS). In: Proceedings of computing frontiers (CF 2005), Ischia, Italy, 2005

  4. Bagci F, Schick H, Petzold J, Trumler W, Ungerer T (2005) Support of reflective mobile agents in a smart office environment. In: Proceedings of architecture of computer systems (ARCS 2005), Hall, Austria, 2005

  5. Farmer W, Guttmann J, Swarup V (1996) Security for mobile agents: authentication and state appraisal. In: Proceedings of the European symposium on research in computer security (ESORICS), LNCS 1146, Springer, 1996, pp 118–130

  6. Gray RS (1996) Agent Tcl: a flexible and secure mobile-agent system. In: Proceedings of the fourth annual TCL/Tk workshop (TCL 96), 1996

  7. Hightower J, Boriello G (2001) Location systems for ubiquitous computing. IEEE Computer, August 2001, pp 57–66

  8. Hohl F (1998) Mobile agent security and reliability. In: Proceedings of the ninth international symposium on software reliability engineering (ISSRE ’98). IEEE Computer Society, Paderborn, November 1998, p 181

  9. Horn P (2001) Autonomic computing: IBM’s perspective on the state of information technology. http://www.research.ibm.com/autonomic/, October 2001

  10. Kangas K, Roning J (1999) Using code mobility to create ubiquitous and active augmented reality in mobile computing. In: Proceedings of conference on mobile computing and networking (MOBICOM ’99), Seattle, August 1999, pp 48–58

  11. Karjoth G, Lange DB, Oshirma M (1997) The Aglet security model. In: IEEE Internet Comp., July–Aug 1997

  12. Kidd CD, Orr R, Abowd GD, Atkeson CG, Essa IA, MacIntyre B, Mynatt ED, Starner T, Newstetter W (1999) The aware home: a living laboratory for ubiquitous computing research. In: Cooperative buildings, 1999, pp 191–198

  13. Minar N, Gray M, Roup O, Krikorian R, Maes P (1999) Hive: distributed agents for networking things. In: Proceedings of symposium on agent systems and applications/symposium on mobile agents (ASA/MA ’99), IEEE computer society, Palm Springs, October 1999

  14. Mozer MC (2004) Lessons from an adaptive house. In: Smart environments: technologies, protocols, and applications. Wiley, New York

  15. Project JXTA. http://www.jxta.org, August 2004

  16. Rasmusson L, Jansson S (1996) Simulated social control for secure internet commerce. In: New security paradigms ’96. ACM Press

  17. Satoh I (2003) Spatialagents: integrating user mobility and program mobility in ubiquitous computing environments. Wireless communications and mobile computing, 3(4), June 2003

  18. Tanizawa Y, Satoh I, Anzai Y (2002) A mobile agent framework for ubiquitous computing environments. In: Information processing society journal, pp 3774–3784

  19. The ScatterWeb Platform. http://www.scatterweb.net, August 2004

  20. Trumler W, Bagci F, Petzold J, Ungerer T (2004) AMUN—autonomic middleware for ubiquitious eNvironments applied to the smart doorplate project. In: International conference on autonomic computing (ICAC-04), New York, May 2004, pp 274–275

  21. Want R, Hopper A, Falcao V, Gibbons J (1992) The active badge location system. In: ACM transactions on information systems, January 1992, pp 91–102

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to F. Bagci.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bagci, F., Schick, H., Petzold, J. et al. The reflective mobile agent paradigm implemented in a smart office environment. Pers Ubiquit Comput 11, 11–19 (2007). https://doi.org/10.1007/s00779-005-0059-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-005-0059-y

Keywords

Navigation