Trust Level and Routing Selection for Mobile Agents in a Smart Home

The central security concern for systems where agents roam is how to establish trust in the agent. We present a Fuzzy Logic mechanism to calculate a level of trust and an optimal route for a mobile agent system in a smart home. The mechanism consists of two parts. The first path calculates a trust level at the platform side to decide which actions should be allowed to a visiting mobile agent. The second part calculates an optimal route at the mobile agent side to decide an alternative destination in the case of rejection by a platform. We provide examples from smart home scenarios, showing how flexible the proposed mechanism is. The simulation has been implemented using Matlab Simulink.

[1]  Athanasios V. Vasilakos,et al.  Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[2]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[3]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[4]  Yi Pan,et al.  An adaptive genetic fuzzy multi-path routing protocol for wireless ad-hoc networks , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.

[5]  Joann J. Ordille,et al.  When agents roam, who can you trust? , 1996, Proceedings of COM'96. First Annual Conference on Emerging Technologies and Applications in Communications.

[6]  Brigitte Jaumard,et al.  Distributed and scalable control plane for next generation routers: A case study of OSPF , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[7]  Nur Azman Abu,et al.  The Application of Fuzzy Logic Controller to Compute a Trust Level fo r Mobile Agents in a Smart Home , 2009 .

[8]  Ljiljana Brankovic,et al.  An Overview of Security Issues and Techniques in Mobile Agents , 2004, Communications and Multimedia Security.

[9]  Michael J. Grimley,et al.  Protecting the integrity of agents: an exploration into letting agents loose in an unpredictable world , 1999, CROS.

[10]  M. Ganesh,et al.  Introduction to Fuzzy Sets and Fuzzy Logic , 2006 .

[11]  Jian Lu,et al.  A path-history-sensitive access control model for mobile agent environment , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.