verification of malicious actions slower.
Figure 6: Comparison of attack detection time.
5 CONCLUSIONS
We presented in this paper an approach to protect
ambient agents group, where each agent is
embedded to a device and represents a user.
If a new agent wants to communicate and share
data with agents of this group, it must be verified,
integrated if it is not malicious, and inspected after
integration. These functions are done cooperatively
by the members.
We have detailed the protocol and introduced a
set of encryption keys: CPK (Common Public Key)
shared and known by all members of a group, Cki
(Communication Key for Agent i) sent by the
representative to an agent i. We presented a simple
case study in health domain, and finally we
presented some implementation issues using Jade
platform. Our on-going work is to apply the
proposed approach in a real case and real devices, by
using a professional AmI platform. We would like to
test the reliability in large scale.
REFERENCES
Augusto, J. C., 2008. Ambient Intelligence: Basic
Concepts and Applications. In Computer and
Information Science: Software and Data
Technologies, Volume 10, Part 1. Berlin, Germany:
Springer Berlin Heidelberg.
Bellifemine, F., Caire, G., Trucco, T., Rimassa, G., 2004
Jade Programmer’s Guide, version 3.2 . The book.
Bouchemal, N., Maamri, R., 2012. SGP: Security by
Guaranty Protocol, DCAI 12, AISC 151, pp. 289-296,
© Springer-Verlag Berlin Heidelberg.
Caire, G., 2007. JADE tutorial: JADE programming for
beginners, Telecom Italia Laboratory.
Ferber, J., 1995. Les Systèmes Multi-Agents.
Informatique Intelligence Articielle, The book,
InterEdition.
Gong, L., Mueller, M., Prafullchandra, H., Schemers, R.,
1997. Going Beyond the Sandbox: An Overview of
the New Security Architecture in the Java
Development Kit 1.2, In Proceedings of the USENIX,
California.
Ko, H., Ramos, C., 2009. A Study on Security Framework
for Ambient Intelligence Environment (ISyRAmISF :
ISyRAmI Security Framework)", in Fifth
International Conference on Wireless and Mobile
Communications.
Maña, A., López, J., Ortega, J., Pimentel, E., 2004. A
Framework for Secure Execution of Software.
International Journal of Information Security.
Maña, A., Muñoz, A., 2006. Mutual Protection for
Multiagent Systems. In: proceedings of the Third
International 3rd International Workshop on Safety
and Security in Multiagent Systems (SASEMAS ’06)
Maña, A., Muñoz, A., Serrano, A., 2007. Towards Secure
Agent Computing for Ubiquitous Computing and
Ambient Intelligence. UIC 2007, LNCS 4611, pp.
Springer-Verlag Berlin Heidelberg.
Necula, G., 1997. Proof-Carrying Code. In: Proceedings
of 24th Annual Symposium on Principles of
Programming Languages.
Stajano, F., 2010. Security Issues in Ubiquitous
Computing, Handbook of Ambient Intelligence and
Smart Environments, Springer LLC 2010.
Tapia, D., 2010. Agents and ambient intelligence: case
studies. Journal of Ambient, Intel Human Comput.
TCG, 2005. Trusted Computing Group: TCG
Specifications. Available online at,
https://www.trustedcomputinggroup.org/specs/
Weber, W., Rabaey, JM., Aarts, E., 2005. Ambient
Intelligence. Springer, New York.
Weiser, M., 1991. The Computer for the 21st Century,
Scientific American, 265(3):94–104,
0
1
2
3
4
5
6
7
5 10152025
DetectioTimeins
NumberofAgents
ProtectedComputingApproach
SPIGProtocol
SPIG-SecuritybyPrivileges,InspectionandGuarantyforAmbientAgentsGroup
323