skip to main content
10.1145/1062261.1062302acmconferencesArticle/Chapter ViewAbstractPublication PagescfConference Proceedingsconference-collections
Article

Communication and security extensions for a ubiquitous mobile agent system (UbiMAS)

Published: 04 May 2005 Publication History

Abstract

Future computers will be integrated in objects of everyday life. The number of processors in the environment will increase and data will be distributed over different nodes. New classes of information and devices will appear, i.e. data will be catched from environmental sensors and will be used for context extraction. The amount of new devices and services makes an efficient use by centralized systems very difficult.Mobile agents provide an eminent method by virtualizing the user and performing actions on her behalf. They offer a possibility to encapsulate information of a person and her preferences, likings, and habits and perform location-based services of the ubiquitous system in the name of the user. This paper presents a mobile agent system application, where a mobile user-agent follows the user while she moves in the physical space. The user-agent knows personal information and communicates with service-agents in the name of its user to perform special tasks. Because of the personal data security and privacy are major concerns of such an agent system. The paper describes the communication of agents and agent nodes and focuses on the security extensions required by this approach

References

[1]
F. Bagci, H. Schick, J. Petzold, W. Trumler, and T. Ungerer. Support of Reflective Mobile Agents in a Smart Office Environment. To be published in 18th International Conference on Architecture of Computing Systems - System Aspects in Organic and Pervasive Computing, Innsbruck, March 2005.
[2]
F. Bagci, J. Petzold, W. Trumler, and T. Ungerer. Ubiquitous Mobile Agent System in a P2P-Network. In UbiSys-Workshop at the Fifth Annual Conference on Ubiquitous Computing, Seattle, October 2003.
[3]
Faruk Bagci, Jan Petzold, Wolfgang Trumler, and Theo Ungerer. Smart doorplate. In The First International Conference on Appliance Design (1AD), Bristol, UK, May 2003.
[4]
W. Farmer, J. Guttmann, and V. Swarup. Security for Mobile Agents: Authentication and State Appraisal. In Proceedings of the Europea Symposium on Research in Computer Security (ESORICS), LNCS 1146, pages 118--130. Springer-Verlag, 1996.
[5]
S. Fischmeister and W. Lugmayr. The Supervisor-Worker Pattern. In Proceedings of Pattern Languages of Programs '99 (PLoP99), Urbana, IL, USA, 1999.
[6]
R. S. Gray. Agent Tcl: A Flexible and Secure Mobile-Agent System. In Proceedings of the Fourth Annual TCL/Tk Workshop (TCL 96), 1996.
[7]
F. Hohl. Mobile Agent Security and Reliability. In Proceedings of the Ninth International Symposium on Software Reliability Engineering (ISSRE '98). IEEE Computer Society, page 181, Paderborn, Germany, November 1998.
[8]
P. Horn. Autonomic Computing: IBM's Perspective on the State of Information Technology. http://www.research.ibm.com/autonomic/, October 2001.
[9]
Project JXTA. http://www.jxta.org, August 2004.
[10]
K. Kangas and J. Roning. Using code mobility to create ubiquitous and active augmented reality in mobile computing. In Proceedings of Conference on Mobile Computing and Networking (MOBICOM '99), pages 48--58, Seattle, August 1999.
[11]
G. Karjoth, D. B. Lange, and M. Oshirma. The Aglet Security Model. In IEEE Internet Comp., July--Aug 1997.
[12]
C. D. Kidd, R. Orr, G. D. Abowd, C. G. Atkeson, I. A. Essa, B. MacIntyre, E. D. Mynatt, T. Starner, and W. Newstetter. The Aware Home: A Living Laboratory for Ubiquitous Computing Research. In Cooperative Buildings, pages 191--198, 1999.
[13]
N. Minar, M. Gray, O. Roup, R. Krikorian, and P. Maes. Hive: distributed agents for networking things. In Proceedings of Symposium on Agent Systems and Applications/Symposium on Mobile Agents (ASA/MA '99), IEEE Computer Society, Palm Springs, CA, October 1999.
[14]
M. C. Mozer. Lessons from an adaptive house. In Smart environments: Technologies, protocols, and applications. J. Wiley & Sons, 2004.
[15]
L. Rasmusson and S. Jansson. Simulated Social Control for Secure Internet Commerce. In New Security Paradigms '96. ACM Press, 1996.
[16]
I. Satoh. Spatialagents: integrating user mobility and program mobility in ubiquitous computing environments. Wireless Communications and Mobile Computing, 3(4), June 2003.
[17]
Project JXTA. http://www.jxta.org, August 2004.
[18]
Y. Tanizawa, I. Satoh, and Y. Anzai. A mobile agent framework for ubiquitous computing environments. In Information Processing Society Journal, pages 3774--3784, 2002.
[19]
W. Trumler, F. Bagci, J. Petzold, and T. Ungerer. AMUN - Autonomic Middleware for Ubiquitious eNvironments applied to the Smart Doorplate Project. In International Conference on Autonomic Computing (ICAC-04), pages 274--275, New York, NY, May 2004.
[20]
R. Want, A. Hopper, V. Falcao, and J. Gibbons. The Active Badge Location System. In ACM Transactions on Information Systems, pages 91--102, January 1992.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CF '05: Proceedings of the 2nd conference on Computing frontiers
May 2005
467 pages
ISBN:1595930191
DOI:10.1145/1062261
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 May 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. flexible office
  2. mobile agents
  3. privacy
  4. ubiquitous system

Qualifiers

  • Article

Conference

CF05
Sponsor:
CF05: Computing Frontiers Conference
May 4 - 6, 2005
Ischia, Italy

Acceptance Rates

Overall Acceptance Rate 273 of 785 submissions, 35%

Upcoming Conference

CF '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Mobile Agents for a Mobile WorldHandbook of Research on Innovations in Systems and Software Engineering10.4018/978-1-4666-6359-6.ch025(664-681)Online publication date: 2015
  • (2012)Mobile Software Agents for Mobile ApplicationsHandbook of Research on Mobile Software Engineering10.4018/978-1-61520-655-1.ch039(725-740)Online publication date: 2012
  • (2010)Experiences with a Smart Office ProjectMobile Intelligence10.1002/9780470579398.ch14(294-319)Online publication date: 22-Feb-2010
  • (2006)The reflective mobile agent paradigm implemented in a smart office environmentPersonal and Ubiquitous Computing10.1007/s00779-005-0059-y11:1(11-19)Online publication date: 23-Oct-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media