Browse > Article

A Multi-Agent Scheme Considering User's Mobility RFID based on Knowledge Management System  

Seo, Dae-Hee (한국전자통신연구원)
Baek, Jang-Mi (순천향대학교 컴퓨터학부)
Cho, Dong-Sub (이화여자대학교 컴퓨터공학과)
Abstract
The Wireless Ad Hoc network is discussed as a core technology for ubiquitous computing, and the smart tag technology is currently being actively discussed as a part of the sensor network. Thus, considering its security may advance the realization of ubiquitous computing. RFID (Radio Frequency Identification) technology using the smart tag technology as a part of the sensor network is currently in the limelight. In particular, when RFID is applied to a knowledge management system managing various data, data mobility and management convenience are ensured and automated knowledge service can be provided to users. Accordingly, this paper to proposed a secure scheme for mobility knowledge management systems using multi-agents differentiated from the existing knowledge management systems. Specifically, the proposed scheme designates user's authentication and privilege information in multi-agents and provides effective knowledge service through grouping based on user information. Moreover, even user's movement, the proposed scheme ensures service availability and provides continuous information through communication with multi-agent systems.
Keywords
Ubiquitous Environment; Knowledge Management System; RFID Tag; Multi Agent; Availability;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Insu Park, Jinkyu Lee, H. Raghav Rao, Shmbhu J. Upadhyaya, "Emerging Issues for Secure Knowledge Management-Results of Delphi Study," IEEE Trans., vol.36, no.3, pp.421-428, 2006.
2 A. Ferrari, G. Letac, J.-Y. Tourneret, "Exponential families of mixed Poisson distributions," Journal of Multivariate Analysis, volume 98, Issue 6, pp.1283-1292, 2007.   DOI   ScienceOn
3 S. Upadhyaya, H. R. Rao, and G. Padmanabhan, "Secure knowledge management," in Encyclopedia of Knowledge Management, E. D. Swartz, Ed. Hershey, PA: Idea Group Publishing, pp.795-801, 2005.
4 S. Xu and W. Zhang, "PBKM: A secure knowledge management framework," in Proc. Workshop Secure Knowledge Management (SKM), pp.207- 212, 2004.
5 Guofe Gu, Junjie Zhang, and Wenke Lee, "Botsniffer: Detecting Botnet Command and Control Channels in Network Traffic," Network&Distributed System Security Symposium, pp.269-286, 2008.
6 Bringer J., Chabanne H., and Dottax E., "HB++ : a Lightweight Authentication Protocol Secure Against Some Attacks," IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - SecPerU, 2006.