Skip to main content

Multi-agent Based Software Licensing Model for Embedded Systems

  • Conference paper
Agent and Multi-Agent Systems. Technologies and Applications (KES-AMSTA 2012)

Abstract

Recent growth of the embedded system industry, both in size and complexity, resulted in numerous advantages for the consumer equipment and a few problems for the system designers. One of the problems is the software licensing problem in complex embedded systems. The fact that today’s embedded systems are evolved into fairly large and complex systems presents the need to effectively manage the embedded software functionality, without the need to recompile and rewrite the firmware components. This problem can be avoided by using fully functional software accompanied by a licensing agent to enforce the license permissions granted to an end user. The licensing agent enforces the permissions stored in encrypted license file located on a Secure Digital memory data card. Another advantage is the fact that the permissions can be updated remotely using a license distribution agent located at the manufacturer’s server and uploaded through Ethernet or Internet. Licensing agents applied to various embedded systems have the ability to communicate with other licensing agents and license distribution agent in order to exchange and verify supplied licenses. This paper proposes the software licensing agent model and implements the licensing agent in the existing laboratory based embedded system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Parab, J., Shinde, S.A., Shelake, V.G., Kamat, R.K., Naik, G.M.: Practical Aspects of Embedded System Design using Microcontrollers, vol. XXII, p. 150. Springer (2008)

    Google Scholar 

  2. Karsai, G., Massacci, F., Osterweil, L.J., Schieferdecker, I.: Evolving Embedded Systems. Computer 43(5), 34–40 (2010)

    Article  Google Scholar 

  3. Pavlin, M.: Encription using low cost microcontrollers. In: Proc. of MIDEM - Society for Microelectronics, Electronic Components and Materials, Cop, pp. 189–194 (2006)

    Google Scholar 

  4. Horvat, G., Žagar, D., Šoštarić, D.: Ethernet Data Accessing Method for a Micro-controller Embedded Systems. In: Kando Conference, Science in Practice Budapest (2011)

    Google Scholar 

  5. Wheeler, D.J., Needham, R.M.: TEA, a Tiny Encryption Algorithm. The Computer Laboratory. Cambridge University (1994)

    Google Scholar 

  6. Lu, J.: Cryptanalysis of Block Ciphers. Technical Report RHUL–MA–2008–19, Department of Mathematics Royal Holloway, University of London (2008)

    Google Scholar 

  7. Electronic Equipment Manufacturer. MikroElektronika, http://www.mikroe.com

  8. Lu, J.: Related-key rectangle attack on 36 rounds of the XTEA block cipher. International Journal of Information Security 8(1), 1–11 (2009)

    Article  Google Scholar 

  9. Knežević, M., Rožić, V., Verbauwhede, I.: Design Methods for Embedded Security. TELFOR Journal 1(2) (2009) ISSN 1821-3251

    Google Scholar 

  10. Atmel Corporation, http://www.atmel.com (accessed: January 2012)

  11. Ambrose, J.A., Ragel, R.G., Parameswaran, S.: A smart random code injection to mask power analysis based side channel attacks. In: Proc. of 5th IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, pp. 51–56 (2007)

    Google Scholar 

  12. Ferrante, D.: Software Licensing Models: What’s Out There? IT Professional 8(6), 24–29 (2006) ISBN: 1520-9202

    Article  Google Scholar 

  13. Koopman, P.: Embedded Software Licensing? Carnegie Mellon University (October 2000)

    Google Scholar 

  14. Kaps, J.-P.: Chai-Tea, Cryptographic Hardware Implementations of xTEA. In: Proc. of the 9th International Conference on Cryptology in India, Kharagpur, India

    Google Scholar 

  15. Russell, S.J., Norvig, P.: Artificial Intelligence: A Modern Approach, 2nd edn. Prentice Hall, Upper Saddle River (2003) ISBN 0-13-790395-2

    Google Scholar 

  16. Ma, X., Qu, Y.: Research on Embedded Agent System Architecture. In: International Conference on Embedded Software and Systems Symposia, ICESS Symposia 2008, July 29-31, pp. 142–145 (2008)

    Google Scholar 

  17. Nwana, H.S.: Software Agents: An Overview. Knowledge Engineering Review 11(3), 205–244 (1996)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Horvat, G., Šoštarić, D., Žagar, D. (2012). Multi-agent Based Software Licensing Model for Embedded Systems. In: Jezic, G., Kusek, M., Nguyen, NT., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems. Technologies and Applications. KES-AMSTA 2012. Lecture Notes in Computer Science(), vol 7327. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30947-2_70

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30947-2_70

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30946-5

  • Online ISBN: 978-3-642-30947-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics