Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)

نویسندگان

  • Gustave Anderson
  • Andrew Burnheimer
  • Vincent A. Cicirello
  • David J. Dorsey
  • Saturnino Garcia
  • Moshe Kam
  • Joseph B. Kopena
  • Kris Malfettone
  • Andrew Mroczkowski
  • Gaurav Naik
  • Maxim Peysakhov
  • William C. Regli
  • Joshua Shaffer
  • Evan Sultanik
  • Kenneth Tsang
  • Leonardo F. Urbano
  • Kyle Usbeck
  • Jacob Warren
چکیده

We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-generation wireless mobile agent systems. SWAT is an implemented system that fully integrates: 1) mobile agents, 2) wireless ad hoc multi-hop networks, and 3) security. The demonstration will show the functionality of a number of decentralized agent-based applications, including applications for authentication, collaboration, messaging, and remote sensor monitoring. The demonstration will take place on a live mobile ad hoc network consisting of approximately a dozen nodes (PDAs, tablet PCs, and laptops) and hundreds of mobile software agents. Description of the SWAT The Secure Wireless Agent Testbed (SWAT) is a unique facility developed at Drexel University to study integration, networking and information assurance for next-generation wireless mobile agent systems (Sultanik et al. 2003). It is the only implemented system that fully integrates: 1) mobile agents, 2) wireless ad hoc multi-hop networks, and 3) security. In the SWAT infrastructure, mobile agents manage keys, assess network traffic patterns, analyze host behaviors, revoke access rights for suspicious agents, users, or hosts, adaptively re-route traffic at the network layer to improve the information integrity of the overall system, and provide the implementation framework for a number of decentralized user applications, including authentication, collaboration, messaging, and remote sensor monitoring. SWAT is currently able to support industrial-strength, fielded, mobile agent architectures that include, but are not limited to, the Extendable Mobile Agent Architecture (EMAA) from Lockheed Martin’s Advanced Technology Laboratories (Lentini et al. 1998) and Cougaar (BBN Technologies 2003). The agent-based applications of the SWAT currently include: a group display GUI that shows a list of all members in a user group, and tracks the creation, joining, and leaving of groups; a secure, multi-group whiteboard application that enables users to communicate notes and map annotations ∗Contact author: [email protected] Copyright c © 2004, American Association for Artificial Intelligence (www.aaai.org). All rights reserved. within their groups; an application that employs agents to carry secure audio communications similar to two-way radios; agent-based network and resource monitoring; among others. SWAT enables agents to reason about and react to network dynamics (Artz, Peysakhov, & Regli 2003). It is implemented for ad hoc network environments, in which hosts have the ability to dynamically identify routes and forward packets between hosts that are not within direct wireless range of each other and which may require multi-hop ad hoc routes. In the SWAT framework, agents are able to modify the network state, make decisions about their itineraries based on network topology, and adapt their communication modalities to avoid network congestion. SWAT is not limited to any particular ad hoc routing protocol. Currently, there are few wireless ad hoc routing algorithms that have been deployed live; most have only been simulated. For this reason, SWAT has created the Topology-based Secure Ad hoc Routing (TSAR) Protocol which is an authenticated and encrypted, proactive routing protocol that supports secure multi-hop routes (Artz et al. 2003). SWAT addresses the need for a mobile agent information assurance framework that includes cryptography and the ability for different groups of agents to generate secure communications channels within the overall agent community. Agents must be able to reason about security groups and communications in a manner that allows them to adapt to a dynamic security environment in which hosts may become compromised, networks may get attacked, and malicious agents may need to be identified and contained. SWAT provides agents with secure multi-layer, agent-to-agent group communication on resource-constrained devices. The security framework uses a combination of symmetric and publickey cryptography to support encrypted communication at both the network and the agent application layers, including support for secure group communication. To accomplish this, established security technologies have been integrated into SWAT. SWAT is the first complete integration of tools for key generation and management; secure group communication; user revocation through the use of a security mediator; and en/decryption of traffic on the network layer. The cryptographic tools integrated in the current implementation of SWAT include: CLIQUES, the Tree Group Diffe-Hellman (TGDH) algorithm, Spread (Amir & Stanton 1004 INTELLIGENT SYSTEMS DEMONSTRATIONS 1998), Secure Spread (Amir et al. 2002), a SEcurity Mediator (SEM) (Boneh et al. 2001), and IPSec. Each host in the SWAT is an integration of the agent system, the network, and security infrastructure. The agent framework contains both mobile agents, and static agents (services). The security components of a host include group key management, and group membership revocation, enforced by a security mediator. The agent framework is connected to the security components, enabling an agent (or the whole agent system) to join or leave a group, with the permission to join controlled by the security mediator. The network components enable secure point-to-point communication for the agent framework, as well as reliable group communication for the security components. Point-to-point communication is implemented using standard TCP/IP and is secured using IPSec. All network communication is routed through a multi-hop ad hoc routing protocol on a wireless network. The SWAT infrastructure consists of PDAs (mostly HP iPAQs), tablet PCs, and laptops on an 802.11b wireless network with ad hoc routing. SWAT is developed on the Familiar Linux distribution, using the Intel Strong Arm architecture found within the HP iPAQ h3800 series PDAs. A similarly configured Linux environment exists for the x86 architecture, to incorporate other portable devices to the testbed such as laptop and tablet PCs. SWAT makes use of Cisco Systems’ Aironet 350 series PCMCIA cards across all platforms. We have selected the Aironet cards based on empirical studies, demonstrating that the Aironet cards have the best performance in ad hoc mode compared to network cards of other brands. Demonstration Scenarios SWAT is currently being tested and validated in a number of practical scenarios. The main functional objective of SWAT is to provide users with tools for distributed, mobile, collaborative work and communication. There are many practical applications of such a system (e.g., police personnel at a sports event, medical personnel at an accident scene, emergency responders to a natural disaster). One possible SWAT application may be in the homeland security domain, where first-responders react to civil emergencies and “bring their own network.” Using SWAT they will be able to communicate and transfer information more effectively, and in ways not possible with existing technologies. Throughout the conference Demo Program, SWAT will be demonstrated continuously. A demonstration will begin with a large set of hosts in the staging area, familiarizing the audience with the platforms. After a review of the equipment, we shall demonstrate group functionality through group creation and “join” and “leave” operations. Certain SWAT demonstrators wielding wireless components would leave the area, and demonstrate use of the whiteboard application. The whiteboard application will also show the integration of GPS as a backdrop for notations sent to group members (given adequate GPS radio signal reception inside the building). Two-way radio communication features will be used to show coordination, and for demonstrating secure routing of messages according to group structure. Revocation functionality will be demonstrated through the revocation of agents and users both within the staging area, and away “in the field”. Streaming video and audio will be sent from remote hosts to the staging area, and hosts may be “knocked out of commission” as they suffer power and network failures. Different host topologies will be demonstrated in order to impose network “stresses” on the routing protocol and on the network-aware reasoning agents. A Sharp Zaurus handheld PDA will attempt to decipher transmissions and disturb operation of the secure SWAT network.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Mobile Agents on Ad Hoc Wireless Networks

This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated environment to study information assurance for mobile agent systems on ad hoc wireless networks. The present SWAT consists of dozens of mobile hosts, both PDAs and laptops, and hundreds of both static and mobile software agents. In deploying the testbed, we have developed novel mechanisms for integra...

متن کامل

Intelligent Agents for Seamless Personal Information Networking

Seamless Messaging and intelligent network management. Both applications are agent-driven and share agent behaviours and the messaging agents rely on the network management device diagnostic agents for input. The paper introduces both problem areas in a common testbed. Usercentric seamless messaging assumes heterogeneous communication environments intended to support today’s nomadic users. The ...

متن کامل

Fault reconnaissance agent for sensor networks

One of the key prerequisite for a scalable, effective and efficient sensor network is the utilization of low-cost, low-overhead and high-resilient fault-inference techniques. To this end, we propose an intelligent agent system with a problem solving capability to address the issue of fault inference in sensor network environments. The intelligent agent system is designed and implemented at base...

متن کامل

Secure Communication in Shotgun Cellular Systems

In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...

متن کامل

A DSP-based platform for wireless video compression

With the exponential growth of wireless voice markets, demand for wireless video services is soon to follow. However, bandwidth limited wireless channels coupled with mobility issues pose a great challenge in the hardware, software and algorithm design of communication systems. Raw video transmission is a high bandwidth application due to its spatial and temporal redundancies. Hence effective v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004