An Autonomic Agent Trust Model for IoT systems

Abstract The IoT systems encounter more serious issues of security, reliability and availability. In this paper, we propose an autonomic agent trust model to decrease security concerns, increase reliability and credibility and ensure information collecting, sharing and processing in dynamic IoT environments. In order to build the credibility protection model for IoT systems, agents and agent platforms have to be built on all nodes. Agent-based node in IoT systems is independent, self-governing software and hardware integrated system. Introducing the agent technology to build systems could manage resources and regulate actions of node in order to maximize the benefit of the whole IoT system. Firstly, we analyze on the credibility of IoT systems and explain why IoT systems are difficult to achieve safe and reliable computing and service quality assurance mechanisms. Secondly, we provide the architecture of trustable agent and agency. After that, we propose a novel architecture named TAEC (Trustworthy Agent Execution Chip), which is to use the high-security, cost-effective software and hardware platform for the safe operation of Agent. The proposed approach is to install TAEC on each sensor node, which provides autonomic trusted hardware execution environment for agents.

[1]  Huang Wei Study on the Architecture and Associated Technologies for Internet of Things , 2009 .

[2]  Ciprian Dobre,et al.  Context-Aware Environments for the Internet of Things , 2013, Internet of Things and Inter-cooperative Computational Technologies for Collective Intelligence.

[3]  Zhou Yan,et al.  A Security Transmission Model for Internet of Things , 2011 .

[4]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[5]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[6]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[7]  Xiong Jing-yi Research on Model of Trusted Agent-on-Chip for P2P Networks , 2010 .

[8]  Luming Tan,et al.  Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[9]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[10]  Dipti Srinivasan,et al.  An Introduction to Multi-Agent Systems , 2010 .

[11]  Nik Bessis,et al.  Interconnectedness of Complex Systems of Internet of Things through Social Network Analysis for Disaster Management , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.

[12]  Sujeet Kumar,et al.  Java Agent Development Framework , 2014 .

[13]  Wang Ru Analysis and Research of Mobile Agent System Security Framework Based Network , 2003 .

[14]  Srijith Krishnan Nair,et al.  Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.

[15]  Zhao Li Construction of sand box in computer immune system , 2003 .

[16]  V VasilakosAthanasios,et al.  Security of the Internet of Things , 2014 .

[17]  Jian-Feng Ma,et al.  A Security Transmission Model for Internet of Things: A Security Transmission Model for Internet of Things , 2011 .

[18]  Y. Shoham Introduction to Multi-Agent Systems , 2002 .

[19]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[20]  Wang Ru-chuan Mobile Agent-Based Secure Task Partitioning and Allocation Algorithm for Cloud & Client Computing , 2011 .