Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance

Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance

Nardjes Bouchemal, Ramdane Maamri, Mohammed Chihoub
Copyright: © 2013 |Pages: 17
DOI: 10.4018/ijaci.2013070104
(Individual Articles)
No Current Special Offers


Ubiquitous computing and ambient intelligence (or AmI) models raise the need for secured systems, due to increased heterogeneity, intelligence and dynamism. Information in such environments is managed by systems formed mostly of devices with limited capabilities. Indeed, AmI characteristics, difficult to handle by traditional computing concepts, are making the agent paradigm to gain impetus and increasing the interest of researchers and industry in this concept. However, the inherent complexity of information security is bigger in agent-based AmI systems built by gathering distributed information and services that are not under the control of a single entity, and introduce new security and privacy concerns. In fact, securing these systems requires protecting any element from every other. This paper proposes a mechanism for enhancing security and privacy while using agents in AmI environments, based on three main building blocks: verification, judgment and surveillance. Furthermore, the key idea is based on cooperation and collective decision.
Article Preview

Protection works proposed for classical multi agent systems are divided into two broad classes. The first protection mechanisms are oriented to the protection of the host system against malicious agents.

Other mechanisms are oriented towards protecting agents against malicious agents. In the context of AmI environments, we consider that agents are fixed into mobile devices. So, in this section we will focus the protection of agents against malicious agents or entities. Then, we will discuss the insufficiency of these approaches for ambient agents groups.

Sandboxing (Gong, Mueller, Prafullchandra, & Schemers, 1997) is an original and popular security model provided by Java. It is based on the creation of a secure execution environment for non-trusted software. In the agent world, a sandbox is a container that limits, or reduces, the level of access its agents have and provides mechanisms to control the interaction among them.

Complete Article List

Search this Journal:
Volume 14: 1 Issue (2023)
Volume 13: 6 Issues (2022): 1 Released, 5 Forthcoming
Volume 12: 4 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 2 Issues (2016)
Volume 6: 2 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing