Affiliation:
1. University Center of Mila, Algeria & Lire Laboratory, University of Constantine 2, Algeria
2. Lire Laboratory, University of Constantine 2, Algeria
Abstract
Ubiquitous computing and ambient intelligence (or AmI) models raise the need for secured systems, due to increased heterogeneity, intelligence and dynamism. Information in such environments is managed by systems formed mostly of devices with limited capabilities. Indeed, AmI characteristics, difficult to handle by traditional computing concepts, are making the agent paradigm to gain impetus and increasing the interest of researchers and industry in this concept. However, the inherent complexity of information security is bigger in agent-based AmI systems built by gathering distributed information and services that are not under the control of a single entity, and introduce new security and privacy concerns. In fact, securing these systems requires protecting any element from every other. This paper proposes a mechanism for enhancing security and privacy while using agents in AmI environments, based on three main building blocks: verification, judgment and surveillance. Furthermore, the key idea is based on cooperation and collective decision.
Reference25 articles.
1. Alonso, R. S., Saavedra, A., Tapia, D., & Corchado, J. M. (2009). Heterogeneous wireless sensor networks in a telemonitoring system for homecare. In: Proceedings of IWANN (2) (pp. 663–670).
2. Ambient intelligence: Basic concepts and applications;J. C.Augusto;Computer and Information Science: Software and Data Technologies,2008
3. Bellifemine, F., Caire, G., Trucco, T., & Rimassa, G. (2004). Jade programmer’s guide (version 3.2).
4. Bellifemine, F., Poggi, A., & Rimassa, G. (1999). JADE - A FIPA-compliant agent framework. In Proceeding of PAAM'99, London, UK (pp. 97-108).
5. Bouchemal, N., & Maamri, R. (2012). SGP: Security by guaranty protocol. In Proceeding of International Conference on Distributed Computing and Artificial Intelligence (DCAI’12), Spain (pp. 289-296). © Springer-Verlag Berlin Heidelberg.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献