Applying an Unified Access Control for IoT-based Intelligent Agent Systems

The rise of the Internet of Things (IoT) paradigm has allowed the design and development of new services interconnecting heterogeneous devices. However, the complexity of these new systems hasn't been followed by the increase of intelligence and reasoning of the devices connected. On the other hand, intelligent agent systems have developed precisely these characteristics so the combination of both paradigms by modelling intelligent agents in IoT devices is a very promising approach that will enable a more powerful and smart IoT. The interconnection of agents through a Internet-based network implies addressing critical issues that affect all network communications, such as security, privacy and access control, specially given the sensitivity of the information exchanged by agents. In this paper, we propose the application of User-Managed Access (UMA) to provide an unified access control schema for an heterogeneous hybrid architecture of IoT devices and intelligent agents.

[1]  Alicia Y. C. Tang,et al.  Agents of Things (AoT): An intelligent operational concept of the Internet of Things (IoT) , 2013, 2013 13th International Conference on Intellient Systems Design and Applications.

[2]  Abdelkader Gouaïch,et al.  REST-A: An Agent Virtual Machine Based on REST Framework , 2010, PAAMS.

[3]  Alicia Y. C. Tang,et al.  Computing hardware analysis for Agents of Things (AoT) applications , 2014, Proceedings of the 6th International Conference on Information Technology and Multimedia.

[4]  Dick Hardt,et al.  The OAuth 2.0 Authorization Framework , 2012, RFC.

[5]  Mariacristina Roscia,et al.  Smart City by multi-agent systems , 2013, 2013 International Conference on Renewable Energy Research and Applications (ICRERA).

[6]  V. G. Gaitan,et al.  An internet of things-based distributed intelligent system with self-optimization for controlling traffic-light intersections , 2012, 2012 International Conference on Applied and Theoretical Electricity (ICATE).

[7]  Peter Leong,et al.  Multiagent Web for the Internet of Things , 2014, 2014 International Conference on Information Science & Applications (ICISA).

[8]  Maciej P. Machulak,et al.  User-Managed Access (UMA) Profile of OAuth 2.0 , 2016 .

[9]  Pattie Maes,et al.  Hive: distributed agents for networking things , 2000, IEEE Concurr..

[10]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[11]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[12]  Zhiqi Shen,et al.  From Internet of Things to Internet of Agents , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[13]  Thomas Hardjono,et al.  OAuth 2.0 Resource Set Registration , 2016 .

[14]  Jose M. Such,et al.  Magentix2: A privacy-enhancing Agent Platform , 2013, Eng. Appl. Artif. Intell..

[15]  Giancarlo Fortino,et al.  Integration of agent-based and Cloud Computing for the smart objects-oriented IoT , 2014, Proceedings of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[16]  Barbara Messing,et al.  An Introduction to MultiAgent Systems , 2002, Künstliche Intell..