Abstract
Ubiquitous systems will integrate computers invisibly and unobtrusively in everyday objects. Data will be catched from single or multi-sensor devices and will be used for context extraction. New location-based services will be adapted to user preferences. For this the ubiquitous system needs to know user profiles, likings, and habits. As the user moves, these information must be made available at the new location of the user. Either the user carries the data on wearable or portable computers or the smart environment takes responsibility for transporting them. The amount of new devices and services makes an efficient use by centralized systems very difficult. The idea presented in this paper is that a virtual reflection of the user represented by a mobile agent accompanying in the smart environment. Mobile agents offer a possibility to encapsulate information of a person and the person’s preferences and perform location-based services of the ubiquitous system in the name of the user. Security and privacy are major concerns of such an agent system. This paper describes a ubiquitous mobile agent system named UbiMAS which has security extensions to provide high protection of agents and significant personal data. UbiMAS is applied in the smart doorplate project as part of a smart office environment.
Similar content being viewed by others
References
Bagci F, Petzold J, Trumler W, Ungerer T (2003) Ubiquitous mobile agent system in a P2P-network. In: UbiSys—workshop at the fifth annual conference on ubiquitous computing, Seattle, October 2003
Bagci F, Petzold J, Trumler W, Ungerer T (2003) Smart doorplate. In: The first international conference on appliance design (1AD), Bristol, UK, May 2003
Bagci F, Schick H, Petzold J, Trumler W, Ungerer T (2005) Communication and security extensions for a ubiquitous mobile agent system (UbiMAS). In: Proceedings of computing frontiers (CF 2005), Ischia, Italy, 2005
Bagci F, Schick H, Petzold J, Trumler W, Ungerer T (2005) Support of reflective mobile agents in a smart office environment. In: Proceedings of architecture of computer systems (ARCS 2005), Hall, Austria, 2005
Farmer W, Guttmann J, Swarup V (1996) Security for mobile agents: authentication and state appraisal. In: Proceedings of the European symposium on research in computer security (ESORICS), LNCS 1146, Springer, 1996, pp 118–130
Gray RS (1996) Agent Tcl: a flexible and secure mobile-agent system. In: Proceedings of the fourth annual TCL/Tk workshop (TCL 96), 1996
Hightower J, Boriello G (2001) Location systems for ubiquitous computing. IEEE Computer, August 2001, pp 57–66
Hohl F (1998) Mobile agent security and reliability. In: Proceedings of the ninth international symposium on software reliability engineering (ISSRE ’98). IEEE Computer Society, Paderborn, November 1998, p 181
Horn P (2001) Autonomic computing: IBM’s perspective on the state of information technology. http://www.research.ibm.com/autonomic/, October 2001
Kangas K, Roning J (1999) Using code mobility to create ubiquitous and active augmented reality in mobile computing. In: Proceedings of conference on mobile computing and networking (MOBICOM ’99), Seattle, August 1999, pp 48–58
Karjoth G, Lange DB, Oshirma M (1997) The Aglet security model. In: IEEE Internet Comp., July–Aug 1997
Kidd CD, Orr R, Abowd GD, Atkeson CG, Essa IA, MacIntyre B, Mynatt ED, Starner T, Newstetter W (1999) The aware home: a living laboratory for ubiquitous computing research. In: Cooperative buildings, 1999, pp 191–198
Minar N, Gray M, Roup O, Krikorian R, Maes P (1999) Hive: distributed agents for networking things. In: Proceedings of symposium on agent systems and applications/symposium on mobile agents (ASA/MA ’99), IEEE computer society, Palm Springs, October 1999
Mozer MC (2004) Lessons from an adaptive house. In: Smart environments: technologies, protocols, and applications. Wiley, New York
Project JXTA. http://www.jxta.org, August 2004
Rasmusson L, Jansson S (1996) Simulated social control for secure internet commerce. In: New security paradigms ’96. ACM Press
Satoh I (2003) Spatialagents: integrating user mobility and program mobility in ubiquitous computing environments. Wireless communications and mobile computing, 3(4), June 2003
Tanizawa Y, Satoh I, Anzai Y (2002) A mobile agent framework for ubiquitous computing environments. In: Information processing society journal, pp 3774–3784
The ScatterWeb Platform. http://www.scatterweb.net, August 2004
Trumler W, Bagci F, Petzold J, Ungerer T (2004) AMUN—autonomic middleware for ubiquitious eNvironments applied to the smart doorplate project. In: International conference on autonomic computing (ICAC-04), New York, May 2004, pp 274–275
Want R, Hopper A, Falcao V, Gibbons J (1992) The active badge location system. In: ACM transactions on information systems, January 1992, pp 91–102
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bagci, F., Schick, H., Petzold, J. et al. The reflective mobile agent paradigm implemented in a smart office environment. Pers Ubiquit Comput 11, 11–19 (2007). https://doi.org/10.1007/s00779-005-0059-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-005-0059-y