A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios

  • Javier López
  • Antonio Maña
  • Antonio Muñoz
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4159)


The increased heterogeneity and dynamism of new computing paradigms and especially of ubiquitous computing models is boosting the need for auto-configurable systems. In these new scenarios, heterogeneity and dynamism are inherent properties and applications are built by aggregating distributed information and services that are not under the control of a single entity. The current trend towards distributed computing poses important problems related to the transmission of large amounts of data between the nodes of the computing system; the control over the information; and the flexibility to adapt to heterogeneous client requirements. These characteristics, difficult to manage by traditional computing models, are making the mobile agent paradigm to gain momentum and increasing the interest of researchers and industry in this paradigm. In this paper we present a solution to provide a secure and auto-configurable environment for mobile agents in ubiquitous computing scenarios, based on two main building blocks: trusted platforms and profiles.


Security Agents Profiles Trusted Computing Ubiquitous computing 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Trusted Computing Group: TCG Specifications (2005), available online at
  2. 2.
    Resnick, P., Varian, H. (eds.): Communications of the ACM: Special Issue on Recommender Systems 46 (1997)Google Scholar
  3. 3.
    Riecken, D. (ed.): Commun. ACM: Special Issue on Personalization 43 (2000)Google Scholar
  4. 4.
    Maybury, M. (ed.): Commun. ACM: Special Issue on News on Demand 43 (2000)Google Scholar
  5. 5.
    Maybury, M., Brusilovsky, P. (eds.): Commun. ACM: The Adaptive Web 45 (2002)Google Scholar
  6. 6.
    Bygrave, L.: Electronic Agents and Privacy: A Cyberspace Odyssey 2001. Intl. Journal of Law and Information Technology 9(3), 280 (2001)Google Scholar
  7. 7.
    Pearson, S.: Trusted Agents that Enhance User Privacy by Self-Profiling. In: Proceedings of the AAMAS Workshop (Special track on privacy) (2002)Google Scholar
  8. 8.
    W3C: Resource Description Framework (RDF): Concepts and Abstract Syntax (2004)Google Scholar
  9. 9.
    W3C: CC/PP: Structure and Vocabularies 1.0 (January 2004), available online at
  10. 10.
    Wireless Application Protocol Forum: Wireless Application Group User Agent Profile Specification (November 1999)Google Scholar
  11. 11.
    Foundation for Intelligent Physical Agents: FIPA Device Ontology Specification (December 2002), available online
  12. 12.
    Chi, E.H.: Transient User Profiling. In: Proceedings of the workshop on User Profiling (2004)Google Scholar
  13. 13.
    Sparacino, F.: Sto(ry)chastics: a Bayesian Network Architecture for User Modelling and Computational Storytelling for Interactive Spaces. In: Proceedings of the Fifth International Conference on Ubiquitous Computing (2003)Google Scholar
  14. 14.
    Berkovits, S., Guttman, J., Swarup, V.: Authentication for Mobile Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 114–136. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  15. 15.
    Maña, A.: Protección de Software Basada en Tarjetas Inteligentes. PhD Thesis. University of Málaga (2003)Google Scholar
  16. 16.
    Hachez, G.: A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. PhD Thesis. Universite Catholique de Louvain (2003)Google Scholar
  17. 17.
    Necula, G.: Proof-Carrying Code. In: Proceedings of 24th Annual Symposium on Principles of Programming Languages (1997)Google Scholar
  18. 18.
    Carl, A.G., Peter, H., Scott, N.: Infrastructure for Proof-Referencing Code. In: Proceedings of the Workshop on Foundations of Secure Mobile Code (March 1997)Google Scholar
  19. 19.
    Yee, B.S.: A Sanctuary for Mobile Agents. Secure Internet Programming (1999)Google Scholar
  20. 20.
    Piller, E., Schaumüller-Bichl, I.: A Method of Protection Based on the Use of Smart Cards and Cryptographic Techniques. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 446–454. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  21. 21.
    Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  22. 22.
    Collberg, C., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. University of Auckland Technical Report #170 (2000)Google Scholar
  23. 23.
    Wayner, P.: Dissapearing Cryptography. In: Information Hiding, Stenography and Watermarking, Morgan Kauffman, San Francisco (2002)Google Scholar
  24. 24.
    Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  25. 25.
    Goldreich, O.: Towards a theory of software protection. In: Proceedings of the 19th Ann. ACM Symposium on Theory of Computing, pp. 182–194 (1987)Google Scholar
  26. 26.
    Sander, T., Tschudin, C.F.: On Software Protection via Function Hiding. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 111–123. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  27. 27.
    Pearson, S., Balacheff, B., Chen, L., Plaquin, D., Proudler, G.: Trusted Computer Platforms. Prentice-Hall, Englewood Cliffs (2003)Google Scholar
  28. 28.
    Arbaugh, W., Farber, D., Smith, J.: A Secure and Reliable Bootstrap Architecture. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy, pp. 65–71 (1997)Google Scholar
  29. 29.
    Ghosh, A., Schwartbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proceedings of the Workshop on Intrusion Detection and Network Monitoring, Usenix (1999)Google Scholar
  30. 30.
    Maña, A., Muñoz, A.: Mutual Protection for Multiagent Systems. In: Proceedings of the Third International Workshop on Safety and Security in Multiagent Systems (SASEMAS 2006) (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Javier López
    • 1
  • Antonio Maña
    • 1
  • Antonio Muñoz
    • 1
  1. 1.GISUM group, Computer Science Department, E.T.S.I. InformáticaUniversity of MalagaSpain

Personalised recommendations