Abstract
Recent growth of the embedded system industry, both in size and complexity, resulted in numerous advantages for the consumer equipment and a few problems for the system designers. One of the problems is the software licensing problem in complex embedded systems. The fact that today’s embedded systems are evolved into fairly large and complex systems presents the need to effectively manage the embedded software functionality, without the need to recompile and rewrite the firmware components. This problem can be avoided by using fully functional software accompanied by a licensing agent to enforce the license permissions granted to an end user. The licensing agent enforces the permissions stored in encrypted license file located on a Secure Digital memory data card. Another advantage is the fact that the permissions can be updated remotely using a license distribution agent located at the manufacturer’s server and uploaded through Ethernet or Internet. Licensing agents applied to various embedded systems have the ability to communicate with other licensing agents and license distribution agent in order to exchange and verify supplied licenses. This paper proposes the software licensing agent model and implements the licensing agent in the existing laboratory based embedded system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Parab, J., Shinde, S.A., Shelake, V.G., Kamat, R.K., Naik, G.M.: Practical Aspects of Embedded System Design using Microcontrollers, vol. XXII, p. 150. Springer (2008)
Karsai, G., Massacci, F., Osterweil, L.J., Schieferdecker, I.: Evolving Embedded Systems. Computer 43(5), 34–40 (2010)
Pavlin, M.: Encription using low cost microcontrollers. In: Proc. of MIDEM - Society for Microelectronics, Electronic Components and Materials, Cop, pp. 189–194 (2006)
Horvat, G., Žagar, D., Šoštarić, D.: Ethernet Data Accessing Method for a Micro-controller Embedded Systems. In: Kando Conference, Science in Practice Budapest (2011)
Wheeler, D.J., Needham, R.M.: TEA, a Tiny Encryption Algorithm. The Computer Laboratory. Cambridge University (1994)
Lu, J.: Cryptanalysis of Block Ciphers. Technical Report RHUL–MA–2008–19, Department of Mathematics Royal Holloway, University of London (2008)
Electronic Equipment Manufacturer. MikroElektronika, http://www.mikroe.com
Lu, J.: Related-key rectangle attack on 36 rounds of the XTEA block cipher. International Journal of Information Security 8(1), 1–11 (2009)
Knežević, M., Rožić, V., Verbauwhede, I.: Design Methods for Embedded Security. TELFOR Journal 1(2) (2009) ISSN 1821-3251
Atmel Corporation, http://www.atmel.com (accessed: January 2012)
Ambrose, J.A., Ragel, R.G., Parameswaran, S.: A smart random code injection to mask power analysis based side channel attacks. In: Proc. of 5th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, pp. 51–56 (2007)
Ferrante, D.: Software Licensing Models: What’s Out There? IT Professional 8(6), 24–29 (2006) ISBN: 1520-9202
Koopman, P.: Embedded Software Licensing? Carnegie Mellon University (October 2000)
Kaps, J.-P.: Chai-Tea, Cryptographic Hardware Implementations of xTEA. In: Proc. of the 9th International Conference on Cryptology in India, Kharagpur, India
Russell, S.J., Norvig, P.: Artificial Intelligence: A Modern Approach, 2nd edn. Prentice Hall, Upper Saddle River (2003) ISBN 0-13-790395-2
Ma, X., Qu, Y.: Research on Embedded Agent System Architecture. In: International Conference on Embedded Software and Systems Symposia, ICESS Symposia 2008, July 29-31, pp. 142–145 (2008)
Nwana, H.S.: Software Agents: An Overview. Knowledge Engineering Review 11(3), 205–244 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Horvat, G., Šoštarić, D., Žagar, D. (2012). Multi-agent Based Software Licensing Model for Embedded Systems. In: Jezic, G., Kusek, M., Nguyen, NT., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems. Technologies and Applications. KES-AMSTA 2012. Lecture Notes in Computer Science(), vol 7327. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30947-2_70
Download citation
DOI: https://doi.org/10.1007/978-3-642-30947-2_70
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30946-5
Online ISBN: 978-3-642-30947-2
eBook Packages: Computer ScienceComputer Science (R0)