Support of Reflective Mobile Agents in a Smart Office Environment

  • Faruk Bagci
  • Holger Schick
  • Jan Petzold
  • Wolfgang Trumler
  • Theo Ungerer
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3432)


Ubiquitous systems will integrate computers invisibly and unobtrusively in everyday objects. Information will appear in new forms, i.e. data will be catched from single or multi-sensor devices and will be used for context extraction. New location-based services will be adapted to user preferences. For this the ubiquitous system needs to know user profiles, likings, and habits. As the user moves these information have to be sent to the new location of the user. Either the user carries her data on wearable or portable computers or the ubiquitous environment takes responsibility for transporting them. The amount of new devices and services makes an efficient use by centralized systems very difficult.

The idea presented in this paper is that a virtual reflection of the user represented by a mobile agent accompanies her in the ubiquitous environment. Mobile agents offer a possibility to encapsulate information of a person and her preferences and perform location-based services of the ubiquitous system in the name of the user. Because of the personal data security and privacy are major concerns of such an agent system. This paper describes a ubiquitous mobile agent system named UbiMAS which has security extensions to provide high protection of agents and significant personal data. UbiMAS is used in a smart office environment with smart doorplates.


Mobile Agent Message Type Autonomic Computing Agent Node Ubiquitous System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bagci, F., Petzold, J., Trumler, W., Ungerer, T.: Ubiquitous Mobile Agent System in a P2P-Network. In: UbiSys-Workshop at the Fifth Annual Conference on Ubiquitous Computing, Seattle (October 2003)Google Scholar
  2. 2.
    Bagci, F., Petzold, J., Trumler, W., Ungerer, T.: Smart Doorplate. In: The First International Conference on Appliance Design (1AD), Bristol, UK (May 2003)Google Scholar
  3. 3.
    Farmer, W., Guttmann, J., Swarup, V.: Security for Mobile Agents: Authentication and State Appraisal. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 118–130. Springer, Heidelberg (1996)Google Scholar
  4. 4.
    Gray, R.S.: Agent Tcl: A Flexible and Secure Mobile-Agent System. In: Proceedings of the Fourth Annual TCL/Tk Workshop, TCL 1996 (1996)Google Scholar
  5. 5.
    Hightower, J., Boriello, G.: Location Systems for Ubiquitous Computing. IEEE Computer, 57–66 (August 2001)Google Scholar
  6. 6.
    Hohl, F.: Mobile Agent Security and Reliability. In: Proceedings of the Ninth International Symposium on Software Reliability Engineering (ISSRE 1998)., Paderborn, Germany, November 1998, p. 181. IEEE Computer Society, Los Alamitos (1998)CrossRefGoogle Scholar
  7. 7.
    Horn, P.: Autonomic Computing: IBM’s Perspective on the State of Information Technology (October 2001),
  8. 8.
    Project JXTA (August. 2004),
  9. 9.
    Kangas, K., Roning, J.: Using code mobility to create ubiquitous and active augmented reality in mobile computing. In: Proceedings of Conference on Mobile Computing and Networking (MOBICOM 1999), Seattle, August 1999, pp. 48–58 (1999)Google Scholar
  10. 10.
    Karjoth, G., Lange, D.B., Oshirma, M.: The Aglet Security Model. IEEE Internet Comp. (July-August 1997)Google Scholar
  11. 11.
    Kidd, C.D., Orr, R., Abowd, G.D., Atkeson, C.G., Essa, I.A., MacIntyre, B., Mynatt, E.D., Starner, T., Newstetter, W.: The Aware Home: A Living Laboratory for Ubiquitous Computing Research. Cooperative Buildings, 191–198 (1999)Google Scholar
  12. 12.
    Minar, N., Gray, M., Roup, O., Krikorian, R., Maes, P.: Hive: distributed agents for networking things. In: Proceedings of Symposium on Agent Systems and Applications/Symposium on Mobile Agents (ASA/MA 1999), October 1999, IEEE Computer Society, Palm Springs (1999)Google Scholar
  13. 13.
    Mozer, M.C.: Lessons from an adaptive house. In Smart environments: Technologies, protocols, and applications. J. Wiley & Sons, Chichester (2004)Google Scholar
  14. 14.
    The ScatterWeb Platform (August 2004),
  15. 15.
    Rasmusson, L., Jansson, S.: Simulated Social Control for Secure Internet Commerce. In: New Security Paradigms 1996, ACM Press, New York (1996)Google Scholar
  16. 16.
    Satoh, I.: Spatialagents: integrating user mobility and program mobility in ubiquitous computing environments. Wireless Communications and Mobile Computing 3(4) (June 2003)Google Scholar
  17. 17.
    Tanizawa, Y., Satoh, I., Anzai, Y.: A mobile agent framework for ubiquitous computing environments. Information Processing Society Journal, 3774–3784 (2002)Google Scholar
  18. 18.
    Trumler, W., Bagci, F., Petzold, J., Ungerer, T.: AMUN - Autonomic Middleware for Ubiquitious eNvironments applied to the Smart Doorplate Project. In: International Conference on Autonomic Computing (ICAC 2004), New York, May 2004, pp. 274–275 (2004)Google Scholar
  19. 19.
    Want, R., Hopper, A., Falcao, V., Gibbons, J.: The Active Badge Location System. In: ACM Transactions on Information Systems, January 1992, pp. 91–102 (1992)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Faruk Bagci
    • 1
  • Holger Schick
    • 1
  • Jan Petzold
    • 1
  • Wolfgang Trumler
    • 1
  • Theo Ungerer
    • 1
  1. 1.Institute of Computer ScienceUniversity of AugsburgAugsburgGermany

Personalised recommendations