Skip to main content

A Fuzzy Multi-agent System for Secure Remote Control of a Mobile Guard Robot

  • Conference paper
Advances in Web Intelligence (AWIC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3034))

Included in the following conference series:

Abstract

This paper presents a secure multi-agent architecture running on a Web environment. It is directed at monitoring mobile robots used for surveillance in sensitive environments (nuclear plants, military grounds) and domotic applications in smart buildings. Our Guard Robots are semi-autonomous mobile robots providing video streams encrypted via wireless to existing watchguard systems on Internet. In our Web system the robot movement must be controlled in real time using a joystick while the robot’s position is obtained using a Webcam carried by the robot. The problem arises because the used network is not time deterministic and the bandwidth is limited and evolves dynamically. Although the best image quality is desired, a low-resolution image can be enough to navigate and avoid obstacles. We suggest a solution focused on a multi-agent architecture in which agents have fuzzy controllers and provide the best image quality for the available bandwidth, CPU power, video size and cipher engine.

This work is supported partially by Science and Technology Ministry of Spain under the projects: “A Multi-Agent System Architecture for the automatic and dynamic Implementation of security protocols (TIC2001-3376)” and “Open System of Multimedia Digital Presentation in Real Time (TIC2000-1734-C03-02)”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wang, X., Schulzrinne, H.: Comparison of Adaptive Internet Multimedia Applications. IEICE Transactions on Communications (June 1999)

    Google Scholar 

  2. Kumar, R., Rao, J.S., Chattopadhyay, S., Rao, G.K.: A Protocol to Support QoS for Multimedia Traffic over Internet with Transcoding. In: Trusted Internet Workshop 2002, Taj Residency, Bangalore, India, December 18 (2002)

    Google Scholar 

  3. Chen, S.-C., Shyu, M.-L., Gray, I., Luo, H.: An adaptive multimedia transmission protocol for distributed multimedia applications. In: Proceedings of 23rd International Conference on Distributed Computing Systems Workshops (2003)

    Google Scholar 

  4. Malik, M.A., Gondal, I.: Optimized routing for efficient mobility over IP networks for multimedia transmission. In: Proceedings of ITCC 2003 International Conference on Information Technology: Coding and Computing [Computers and Communications], April 28-30, pp. 244–247 (2003)

    Google Scholar 

  5. Dumitrescu, S., Xiaolin, W.: Optimal variable rate multiplexing of scalable code streams. In: Proceedings of Data Compression Conference, DCC 2003, March 25-27, p. 424 (2003)

    Google Scholar 

  6. RFC 1889. RTP: A Transport Protocol for Real-Time Applications

    Google Scholar 

  7. RFC 2205.Resource ReSerVation Protocol (RSVP)

    Google Scholar 

  8. RFC 1633. Integrated Services in the Internet Architecture

    Google Scholar 

  9. RFC 2474. Definition of the Differentiated Services Field in the IPv4 and IPv6 Headers

    Google Scholar 

  10. Wei, G., Petrushin, V.A., Gershman, A.V.: The Community of Multimedia Agents project. In: Proceedings of IEEE International Conference on Multimedia and Expo, 2002. ICME 2002, August 26-29, vol. 2, pp. 289–292 (2002)

    Google Scholar 

  11. Manvi, S.S., Venkataram, P.: Adaptive bandwidth reservation scheme for multimedia traffic using mobile agents. In: 5th IEEE International Conference on High Speed Networks and Multimedia Communications, July 3-5, pp. 370–374 (2002)

    Google Scholar 

  12. Yoshimura, T., Ohya, T., Kawahara, T., Etoh, M.: Rate and robustness control with RTP monitoring agent for mobile multimedia streaming. In: IEEE International Conference on Communications. ICC 2002, April 28-May 2, vol. 4, pp. 2513–2517 (2002)

    Google Scholar 

  13. Mengual, L., García, J.: Security Architecture For Agents Communication. Upgrade III(6), pp. 52–58 (2002)

    Google Scholar 

  14. Boudaoud, K., McCathieNevile, C.: An intelligent agent-based model for security management. In: Proceedings of Seventh International Symposium on Computers and Communications, ISCC 2002, Taormina, Italy, pp. 877–882 (2002)

    Google Scholar 

  15. Gorodetski, V., Kotenko, I.: The multi-agent systems for computer network security assurance: frameworks and case studies. In: IEEE International Conference on Artificial Intelligence Systems, ICAIS 2002, Divnomorskoe, Russia, pp. 297–302 (2002)

    Google Scholar 

  16. Mengual, L., de la Puente, C.: Secure intelligent agents based on formal description techniques. In: Menasalvas, E., Segovia, J., Szczepaniak, P.S. (eds.) AWIC 2003. LNCS (LNAI), vol. 2663, pp. 134–141. Springer, Heidelberg (2003)

    Google Scholar 

  17. Borselius, N., Hur, N., Kaprynski, M., Mitchell, C.J.: A security architecture for agent-based mobile systems. In: Third International Conference on 3G Mobile Communication Technologies, Vol. 489, London, UK, pp. 312–318 (2002)

    Google Scholar 

  18. http://java.sun.com/products/java-media/jmf/

  19. http://www.cryptix.com/

  20. Birk, A., Kenn, H.: RoboGuard,a Teleoperated Mobile Security Robot. Control Engineering Practice 10(11), 1259–1264 (2002)

    Article  Google Scholar 

  21. Borenstein, J., Koren, Y.: Real-time Obstacle Avoidance for Fast Mobile Robots. IEEE Transactions on Systems, Man, and Cybernetics 19(5) (September/October 1989)

    Google Scholar 

  22. A security guard robot(Secom), http://www.robotslife.com/news/034.shtml

  23. Vaudenay, S.: On the weak keys of Blowfish. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 27–32. Springer, Heidelberg (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mengual, L., Bobadilla, J., Triviño, G. (2004). A Fuzzy Multi-agent System for Secure Remote Control of a Mobile Guard Robot. In: Favela, J., Menasalvas, E., Chávez, E. (eds) Advances in Web Intelligence. AWIC 2004. Lecture Notes in Computer Science(), vol 3034. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24681-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24681-7_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22009-1

  • Online ISBN: 978-3-540-24681-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics