Coordination and Control in Mobile Ubiquitous Computing Applications Using Law Governed Interaction

This paper introduces a mechanism for regulating the interactions between the members of an ad hoc, heterogeneous and mobile multi-agent system, in order to ensure reliable and secure coordination between them. We demonstrate this mechanism, and its importance, by describing its application to a police team whose mission is to manage (i.e., monitor and control) the traffic in an area, by operating on a set of traffic-related devices, such as draw bridges, traffic lights, and road blocks. In particular, we demonstrate how the following critical aspects of the working of such a team are provided for: a) reliable coordination between the team members; b) the ability of the leader of the team to steer its subordinates; c) reliable auditing of the operations of the team; and d) robustness of the team under certain unexpected adverse conditions, such as the unpredictable failure of the team leader. Beyond developing suitable formalisms for local regulation of actions and communications, performance tests have been conducted with the proposed implementation on the ORBIT testbed and the results presented show the viability of this approach. Keywords-Law Governed Interaction; ad hoc coordination; decentralized enforcement; security

[1]  Yubo Liu Performance analysis of optimized link state routing (OLSR) protocol , 2002 .

[2]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[3]  Manpreet Singh,et al.  ORBIT testbed software architecture: supporting experiments as a service , 2005, First International Conference on Testbeds and Research Infrastructures for the DEvelopment of NeTworks and COMmunities.

[4]  Victoria Ungureanu,et al.  Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems , 2000, TSEM.

[5]  Carl M. Ellison,et al.  The nature of a useable PKI , 1999, Comput. Networks.

[6]  Anand R. Tripathi,et al.  Exception Handling in Agent-Oriented Systems , 2000, Advances in Exception Handling Techniques.

[7]  Naftaly H. Minsky,et al.  On conditions for self-healing in distributed software systems , 2003, 2003 Autonomic Computing Workshop.

[8]  Yingying Chen,et al.  The concept of decentralized and secure electronic marketplace , 2008, Electron. Commer. Res..

[9]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[10]  Naftaly H. Minsky,et al.  On Manageability and Robustness of Open Multi-agent Systems , 2003, SELMAS.

[11]  Liang Hong,et al.  Secure OLSR , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[12]  Liviu Iftode,et al.  Trusted Application-Centric Ad-Hoc Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[13]  Timothy W. Finin,et al.  A policy language for a pervasive computing environment , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[14]  Hong Cheng,et al.  Policy-based mobile ad hoc network management , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..

[15]  Santosh K. Shrivastava Satem: Trusted Service Code Execution across Transactions , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).

[16]  Naftaly H. Minsky,et al.  Flexible Regulation of Distributed Coalitions , 2003, ESORICS.

[17]  Yih-Chun Hu,et al.  SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks , 2008, ASIACCS '08.

[18]  Markus Endler,et al.  Ubiquitous Service Regulation Based on Dynamic Rules , 2008, 13th IEEE International Conference on Engineering of Complex Computer Systems (iceccs 2008).