Support of Reflective Mobile Agents in a Smart Office Environment
Ubiquitous systems will integrate computers invisibly and unobtrusively in everyday objects. Information will appear in new forms, i.e. data will be catched from single or multi-sensor devices and will be used for context extraction. New location-based services will be adapted to user preferences. For this the ubiquitous system needs to know user profiles, likings, and habits. As the user moves these information have to be sent to the new location of the user. Either the user carries her data on wearable or portable computers or the ubiquitous environment takes responsibility for transporting them. The amount of new devices and services makes an efficient use by centralized systems very difficult.
The idea presented in this paper is that a virtual reflection of the user represented by a mobile agent accompanies her in the ubiquitous environment. Mobile agents offer a possibility to encapsulate information of a person and her preferences and perform location-based services of the ubiquitous system in the name of the user. Because of the personal data security and privacy are major concerns of such an agent system. This paper describes a ubiquitous mobile agent system named UbiMAS which has security extensions to provide high protection of agents and significant personal data. UbiMAS is used in a smart office environment with smart doorplates.
KeywordsMobile Agent Message Type Autonomic Computing Agent Node Ubiquitous System
Unable to display preview. Download preview PDF.
- 1.Bagci, F., Petzold, J., Trumler, W., Ungerer, T.: Ubiquitous Mobile Agent System in a P2P-Network. In: UbiSys-Workshop at the Fifth Annual Conference on Ubiquitous Computing, Seattle (October 2003)Google Scholar
- 2.Bagci, F., Petzold, J., Trumler, W., Ungerer, T.: Smart Doorplate. In: The First International Conference on Appliance Design (1AD), Bristol, UK (May 2003)Google Scholar
- 3.Farmer, W., Guttmann, J., Swarup, V.: Security for Mobile Agents: Authentication and State Appraisal. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 118–130. Springer, Heidelberg (1996)Google Scholar
- 4.Gray, R.S.: Agent Tcl: A Flexible and Secure Mobile-Agent System. In: Proceedings of the Fourth Annual TCL/Tk Workshop, TCL 1996 (1996)Google Scholar
- 5.Hightower, J., Boriello, G.: Location Systems for Ubiquitous Computing. IEEE Computer, 57–66 (August 2001)Google Scholar
- 7.Horn, P.: Autonomic Computing: IBM’s Perspective on the State of Information Technology (October 2001), http://www.research.ibm.com/autonomic/
- 8.Project JXTA (August. 2004), http://www.jxta.org
- 9.Kangas, K., Roning, J.: Using code mobility to create ubiquitous and active augmented reality in mobile computing. In: Proceedings of Conference on Mobile Computing and Networking (MOBICOM 1999), Seattle, August 1999, pp. 48–58 (1999)Google Scholar
- 10.Karjoth, G., Lange, D.B., Oshirma, M.: The Aglet Security Model. IEEE Internet Comp. (July-August 1997)Google Scholar
- 11.Kidd, C.D., Orr, R., Abowd, G.D., Atkeson, C.G., Essa, I.A., MacIntyre, B., Mynatt, E.D., Starner, T., Newstetter, W.: The Aware Home: A Living Laboratory for Ubiquitous Computing Research. Cooperative Buildings, 191–198 (1999)Google Scholar
- 12.Minar, N., Gray, M., Roup, O., Krikorian, R., Maes, P.: Hive: distributed agents for networking things. In: Proceedings of Symposium on Agent Systems and Applications/Symposium on Mobile Agents (ASA/MA 1999), October 1999, IEEE Computer Society, Palm Springs (1999)Google Scholar
- 13.Mozer, M.C.: Lessons from an adaptive house. In Smart environments: Technologies, protocols, and applications. J. Wiley & Sons, Chichester (2004)Google Scholar
- 14.The ScatterWeb Platform (August 2004), http://www.scatterweb.net
- 15.Rasmusson, L., Jansson, S.: Simulated Social Control for Secure Internet Commerce. In: New Security Paradigms 1996, ACM Press, New York (1996)Google Scholar
- 16.Satoh, I.: Spatialagents: integrating user mobility and program mobility in ubiquitous computing environments. Wireless Communications and Mobile Computing 3(4) (June 2003)Google Scholar
- 17.Tanizawa, Y., Satoh, I., Anzai, Y.: A mobile agent framework for ubiquitous computing environments. Information Processing Society Journal, 3774–3784 (2002)Google Scholar
- 18.Trumler, W., Bagci, F., Petzold, J., Ungerer, T.: AMUN - Autonomic Middleware for Ubiquitious eNvironments applied to the Smart Doorplate Project. In: International Conference on Autonomic Computing (ICAC 2004), New York, May 2004, pp. 274–275 (2004)Google Scholar
- 19.Want, R., Hopper, A., Falcao, V., Gibbons, J.: The Active Badge Location System. In: ACM Transactions on Information Systems, January 1992, pp. 91–102 (1992)Google Scholar