• Title/Summary/Keyword: mobile agents

Search Result 314, Processing Time 0.022 seconds

Mobile Robot Control for Human Following in Intelligent Space

  • Kazuyuki Morioka;Lee, Joo-Ho;Zhimin Lin;Hideki Hashimoto
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.25.1-25
    • /
    • 2001
  • Intelligent Space is a space where many sensors and intelligent devices are distributed. Mobile robots exist in this space as physical agents, which provide human with services. To realize this, human and mobile robots have to approach each other as much as possible. Moreover, it is necessary for them to perform interactions naturally. Thus, it is desirable for a mobile robot to carry out human-affnitive movement. In this research, a mobile robot is controlled by the Intelligent Space through its resources. The mobile robot is controlled to follow walking human as stably and precisely as possible.

  • PDF

Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS (TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법)

  • Jung Chang-Ryul;Yoon Hong-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.651-657
    • /
    • 2006
  • This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

A Multi-Agent Negotiation System with Negotiation Models Changeable According to the Bargaining Environment

  • Ha, Sung-Ho;Kim, Dong-Sup
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.1
    • /
    • pp.1-20
    • /
    • 2009
  • Negotiation is a process of reaching an agreement on the terms of a transaction. such as price, quantity, for two or more parties. Negotiation tries to maximize the benefits for all parties concerned. instead of using human-based negotiation. the e-commerce environment provides such an environment as adopting automated negotiation. Thus. choosing agent technology is appropriate for an automatic electronic negotiation platform. since autonomous software agents strive for the best deal on behalf of the human participants. Negotiation agents need a clear-cut definition of negotiation models or strategies. In reality, most bargaining systems embody nearly one negotiation model. In this article. we present a mobile agent negotiation system with reusable negotiation strategies that allows agents to dynamically embody a user's favorite negotiation strategy which can be preinstalled as a component in the system. We develop a prototype system, which is fully implemented in compliance with FIPA specifications, and then. describe the benefits of using the system.

  • PDF

Bidirectional Platoon Control Using Backstepping-Like Feedback Linearization (역보행 제어 형태의 궤환 선형화를 이용한 양방향 플래툰 제어)

  • Kwon, Ji-Wook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.5
    • /
    • pp.410-415
    • /
    • 2013
  • This paper proposes a bidirectional platoon control law using a coupled distance error based on the backstepping-like feedback linearization control method for an interconnected mobile agent system with a string structure. Unlike the previous results where the single agent was controlled using the only own information without other agents, the proposed control law cannot show the only distance error convergence of each agent, but also the string stability of the whole system. Also, the control performances are improved by the proposed control law in spite of low performance of bidirectional control strategy in the previous results. The proposed bidirectional platoon control algorithm is based on the backstepping-like feedback linearization control method. The position errors between each agent and the preceding and the behind agents are coupled by weighted summation. By the proposed control law, the distance error of each agent can converge to zero while the string stability is guaranteed when the coupled errors can converge to zero. To this end, the back-stepping control method is employed. The pseudo velocity input is determined considering the kinematic relationship between agents and the string stability. Then, the actual dynamic control input is determined to make the actual velocity converge to the pseudo velocity input. The stability analysis and the simulation results of the proposed method are included in order to demonstrate the practical application of the proposed algorithm.

A Migration Technique for Autonomous Mobile Agents in Dynamic Environments (동적 환경에 적합한 자율 이동 에이전트의 이주 기법)

  • Bok, Kyoung-Soo;Yeo, Myung-Ho;Yoo, Jae-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.11
    • /
    • pp.1084-1098
    • /
    • 2005
  • In this paper, we propose a migration technique for autonomous mobile agents suitable to dynamic environments. The proposed migration technique dynamically creates the itinerary of agents that considers states of networks and systems. In the migration of the agent, it first sends prefetching message to the next system. The system receives necessary data for migration in advance. Through this, we reduce the amount of the sending data and save the time for creating the instance of the agent. And it improves the execution efficiency by using the checkpoint-based recovery method that does not execute the agent again and recovers the process states even though the errors take place. To show superiority of the proposed technique, we compare the proposed method with the existing methods through various simulations.

A Nested Token-Based Delegation Scheme for Cascaded Delegation in Mobile Agent Environments (이동 에이전트 환겨에서의 연속된 위임을 위한 내포된 토큰 기반 위임 기법)

  • Kwon, Hyeog-Man;Kim, Moon-Jeong;Eom, Young-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1C
    • /
    • pp.25-34
    • /
    • 2004
  • In mobile agent environments, cascaded delegations among places occur frequently due to the mobility of agents. Cascaded delegation in mobile agent environments can be defined as the process whereby the delegated place delegates the rights of the delegating place further. The representative study for delegation in mobile agent environments is Berkovits et al.'s study. Their study only defines the messages that is sent between the place executing the agent and the place where the agent migrates. Because their study considers only the delegation between two places which participate in migration of an agent, it is inadequate in the situation that the cascaded delegation is necessary. In other words, the relationships among the messages sent from and to places is necessary. However, their study does not exist the relationships. In this paper, we propose a delegation scheme that provides agents with secure cascaded delegation. The proposed scheme achieves the goal by nesting each delegation token within the signed part of the next immediate delegation token. We prove that the proposed scheme is secure against the attack of replaying a message and of substituting a delegation token.

Implementation of Agent Network for Active Responses against Intrusions (적극적 침입 대응을 위한 에이전트 네트워크 구현 방안)

  • Shin, Weon;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1294-1301
    • /
    • 2005
  • In this paper, we investigate the problems of existing solutions for intrusion detection and propose an agent network based on stationary and mobile agents on agent system to solve them. The proposed agent network can detect intrusions, collect their information and execute active responses against intruders by introducing various stationary and mobile agents. It will show a new approach of active responses against more intelligent and distributed intrusions.

An Efficient Mobile Agents Platform Architecture for Network Management (Mobile Agents를 이용한 효율적인 망관리 구조)

  • 이정환;홍충선
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.505-507
    • /
    • 2001
  • 기존의 단순한 객체를 이용한 중앙집중형 망관리 시스템이 가지는 단점들을 극복하고자 분산객체를 이용하는 Dynamic Object플랫폼이 대안으로 제안되었고 다양한 분산객체 기술, 즉 CORBA나 Java-RMI를 이용한 분산 망 관리 시스템들이 구현되었다. 그후 CORBA기반이나 Java-RMI 기반의 시스템들이 가지지 못했던 시스템의 확장성과 유연성을 제공하기 위해 MAs(Mobile Agents) 기반의 플랫폼이 제시되었으나 MAs 사용으로 추가적으로 발샐 할 수 있는 트래픽의 문제, NEI(Network Element)의 리소스 관리 문제 등을 고려 해야 한다. 본 논문의 주제는 바로 이 MAs를 이용한 망관리를 하는데 있어 보다 더 효율적인 구조를 연구했으며 이러한 장점들을 바탕으로 MAs가 이동할 때 발생할 수 있는 트래픽의 최소화 방안, NE의 효율적인 리소스 관리 및 업무 수행 능력의 향상을 위해서 TMN의 Information Architecture를 사용하여 에이전트를 설계하였다.

  • PDF

An Integrated Management Scheme for Wired and Wireless Networks Using Mobile Agents (이동 에이전트를 이용한 유무선 네트워크의 통합관리 기법)

  • Na, Ho-Jin;Cho, Kyung-San
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.117-124
    • /
    • 2010
  • Appling centralized network management architecture SNMP(Simple Network Management Protocol) to wireless networks causes the network overhead, NAT(Network Address Translation) problem on AP, and performance degradation of mobile nodes. In this paper, we propose an integrated management scheme for wired and wireless networks using mobile agents in order to solve above problems. In our proposed scheme, SNMP is applied to manage wired networks and MAs of SNMP are implemented in APs or wireless nodes to manage wireless networks. In addition, we propose a method to reduce the redundant OID information within SNMP response messages. Through the analysis, we show that our proposal resolves the given problems and reduces the processing delay of the wireless nodes.