Advertisement

Hardware Protection of Agents in Ubiquitous and Ambient Intelligence Environments

  • Antonio Maña
  • Antonio Muñoz
  • Daniel Serrano
Conference paper
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 55)

Summary

Agent-based computing represents a promising paradigm for distributed computing. Unfortunately the lack of security is hindering the application of this paradigm in real world applications. We focus on a new agent migration protocol that takes advantage of TPM technology. The protocol has been validated using AVISPA model checking toolsuite. In order to facilitate its adoption, we have developed a software library to access TPM functionality from agents and to support their secure migration. This paper presents hardware-based system to protect agent systems. Concretely our work is based on trusted platform module (TPM), which is the cornerstone to build the solution. In order to build our solution on a robust basis, we validate this protocol by means of a model checking tool called AVISPA. Then as final result we provide a library to access to TPM (Trusted Platform Module) functionality from software agents. Along this paper we detail more relevant aspects of this library both in the development stage of it and while we use it to develop a system based agent.

Keywords

Mobile Agent Software Agent Trust Platform Module Trust Computing Destination Agency 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mouratidis, H., Kolp, M., Faulkner, S., Giorgini, P.: A Secure Architectural Description Language for Agent Systems. In: AAMAS 2005, Utrecht, Netherlands, July 25-29 (2005)Google Scholar
  2. 2.
    Wang, H., Wang, C.: Intelligent Agents in the Nuclear Industry. IEEE Computer 30(11), 2834 (1997)Google Scholar
  3. 3.
    Schwuttke, U.M., Quan, A.G.: Enhancing Performance of Cooperating Agents in Real-Time Diagnostic Systems. In: Proceedings of the Thirteenth International Joint Conference on Artificial Intelligence (IJCAI 1993), pp. 332–337. International Joint Conferences on Artificial Intelligence, Menlo Park (1993)Google Scholar
  4. 4.
    Clements, P., Papaioannou, T., Edwards, J.: Aglets: Enabling the Virtual Enterprise. In: The Proc. Of Managing Enterprises - Stakeholders, Engineering, Logistics and Achievement (ME-SELA 1997), p. 425 (1997) ISBN 1 86058 066 1Google Scholar
  5. 5.
    General Magic, Inc. The Telescript Language Reference (1996), http://www.genmagic.comTelescript.TDE.TDEDOCSHTMLtelescript.html
  6. 6.
  7. 7.
    Shepherdson, D.: The JACK Usage Report. In: The Proc Of. Autonomous Agents and Multi Agents Systems (AAMAS 2003) (2003)Google Scholar
  8. 8.
  9. 9.
  10. 10.
    Alechina, N., Alechina, R., Habner, J., Jago, M., Logan, B.: Belief revision for AgentSpeak agents. In: The Proc. Of Autonomous Agents and Multi Agents Systems 2006, Hakodate, Japan, pp. 1288–1290 (2006) ISBN:1-59593-303-4Google Scholar
  11. 11.
    Maña, A.: Protección de Software Basada en Tarjetas Inteligentes. PhD Thesis. University of Málaga (2003)Google Scholar
  12. 12.
    Hachez, G.: A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. PhD Thesis. Universite Catholique de Louvain (2003), http://www.dice.ucl.ac.be/~hachez/thesis_gael_hachez.pdf
  13. 13.
    Necula, G.: Proof-Carrying Code. In: Proceedings of 24th Annual Symposium on Principles of Programming Languages (1997)Google Scholar
  14. 14.
    Yee, B.S.: A Sanctuary for Mobile Agents. Secure Internet Programming (1999)Google Scholar
  15. 15.
    Trusted Computing Group: TCG Specifications (2005), https://www.trustedcomputinggroup.org/specs/
  16. 16.
    Wooldrigde, M.: Agent-based Software Engineering. In: IEE Proceedings on Software Engineering, vol. 144(1), pp. 26–37 (February 1997)Google Scholar
  17. 17.
    Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (2000), http://www.dice.ucl.ac.be/crypto/publications/1999/codemark.pdf CrossRefGoogle Scholar
  18. 18.
    Collberg, C., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. University of Auckland Technical Report 170 (2000)Google Scholar
  19. 19.
    Maña, A., Muñoz, A., Serrano, D.: Towards secure agent computing for ubiquitous computing and ambient intelligence. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 1201–1212. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  20. 20.
    Hussain, M.: Dominique Seret. A Comparative study of Security Protocols Validation Tools: HERMES vs. AVISPA. In: Proceecings of International Conference on Advanced Communication Technology (ICACT). IEEE Communication Society, Los Alamitos (published, 2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Antonio Maña
    • 1
  • Antonio Muñoz
    • 1
  • Daniel Serrano
    • 1
  1. 1.University of Malaga 

Personalised recommendations