Developing Knowledge-Based Security-Sense of Networked Intelligent Robots
Distributed processing capabilities of robotic-applications using state-of-the-art component-based middleware and mobile-agent software technologies are continuously helping to develop more powerful intelligent robots. These application development frameworks provide several attractive conceptual solutions for network-based operations, however, these benefits cannot be realized unless the appropriate security mechanisms are in place. In this paper, this important issue is addressed in a systematic way: firstly, by analyzing the key limitations of traditional security models, the new security requirements for agent-based networked robots are pointed out and secondly, an effective defense mechanism is devised by constructing a knowledge-based security-aware robot control model. The main contributions of this work are, to address the security problem in a knowledge-based approach and to show the roles and mechanisms of the proposed security architecture. The feasibility of our approach is examined through a case study on development of robot security-sense using Linux-based reliable security-tools.
KeywordsIntrusion Detection Fuzzy Inference System Security Policy Dynamic Security Network Robot
Unable to display preview. Download preview PDF.
- 1.Brazier, F.M.T., Jonker, C.M., Treur, J.: Principles of Component-Based Design of Intelligent Agents, http://www.few.vu.nl/wai/Papers/DKE02.princ.pdf
- 2.Jansen, W., Karygiannis, T.: NIST Special Publication 800-19 Mobile Agent Security, http://www.mirrors.wiretapped.net/security/info/reference/nist/special-publications/sp-800-19.pdf
- 3.Yamada, S., Kamioka, E.: Access Control for Security and Privacy in Ubiquitous Computing Environments. IEICE Trans. Commun. E88-B(3) (March 2005)Google Scholar
- 4.Ramakrishnan, R., Srivastava, D., Sudarshan, S., Seshadri, P.: The CORAL deductive system. The VLDB Journal 3, 161–21 (1994)Google Scholar
- 5.Widenjus, M., Axmark, D.: MySQL Reference Manual, June 2002. O’Reilly & Associates Inc., Sebastopol (2002)Google Scholar
- 7.Bridges, S.M., Vaughn, R.B.: Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection. In: Proc. 23rd National Information Systems Security Conference (NISSC), Baltimore, MD (October 2000)Google Scholar
- 8.Andreasson Oskar: Iptables Tutorial 1.2.0. Available Online: http://iptables-tutorial.frozentux.net/iptables-tutorial.html