DOI QR코드

DOI QR Code

Q-Learning Based Method to Secure Mobile Agents and Choose the Safest Path in a IoT Environment

  • Badr Eddine Sabir (Laboratory of Watch for Emergent Technologies FST, Hassan I University of Settat) ;
  • Mohamed Youssfi (Laboratory SSDIA, ENSET Mohammedia, Hassan II University of Casablanca) ;
  • Omar Bouattane (Laboratory of Watch for Emergent Technologies FST, Hassan I University of Settat) ;
  • Hakim Allali (Laboratory SSDIA, ENSET Mohammedia, Hassan II University of Casablanca)
  • Received : 2024.10.05
  • Published : 2024.10.30

Abstract

The Internet of Things (IoT) is an emerging element that is becoming increasingly indispensable to the Internet and shaping our current understanding of the future of the Internet. IoT continues to extend deeper into the daily lives of people, offering distributed and critical services. In contrast with current Internet, IoT depends on a dynamic architecture where physical objects with embedded sensors will communicate via cloud to send and analyze data [1-3]. Its security troubles will surely impinge all aspects of civilization. Mobile agents are widely used in the context of the IoT and due to the possibility of transmitting their execution status from one device to another in an IoT network, they offer many advantages such as reducing network load, encapsulating protocols, exceeding network latency, etc. Also, cryptographic technologies, like PKI and Blockchain technology, and Artificial Intelligence are growing rapidly allowing the addition of an approved security layer in many areas. Security issues related to mobile agent migration can be resolved with the use of these technologies, thus allowing increased reliability and credibility and ensure information collecting, sharing, and processing in IoT environments, while ensuring maximum autonomy by relying on the AI to allow the agent to choose the most secure and optimal path between the nodes of an IoT environment. This paper aims to present a new model to secure mobile agents in the context of the Internet of Things based on Public Key Infrastructure (PKI), Ethereum Blockchain Technology and Q-learning. The proposed model provides a secure migration of mobile agents to ensure security and protect the IoT application against malevolent nodes that could infiltrate these IoT systems.

Keywords

References

  1. Alam, Tanweer, and Mohamed Benaida. "CICS: Cloud-Internet Communication Security Framework for the Internet of Smart Devices.", International Journal of Interactive Mobile Technologies (iJIM) 12, No. 6 , pp. 74-84, 2018 
  2. Lake, David, Ammar Rayes, and Monique Morrow. "The Internet of things.", The Internet Protocol Journal, Vol. 15, No. 3, pp. 10-19, 2012 
  3. Lee, Gyu Myoung, and Jeong Yun Kim. "The Internet of Things-A problem statement." International Conference on Information and Communication Technology Convergence (ICTC), South Korea, 2010 
  4. Li, Shancang, Li Da Xu, and Shanshan Zhao. "The internet of things: a survey.", Information Systems Frontiers , Vol. 17, No. 2, pp. 243-259, 2015 
  5. Anithaa, S. K., S. Arunaa, M. Dheepthika, S. Kalaivani, M. Nagammai, M. Aasha, and S. Sivakumari. "The Internet of Things-A survey.", World Scientific News 41, pp. 150, 2016 
  6. Weyrich, Michael, and Christof Ebert. "Reference Architectures for the Internet of Things." IEEE Software, Vol. 33, No. 1, pp. 112-116, 2016 
  7. L. Jarvenpaa, M. Lintinen, A. Mattila, T. Mikkonen, K. Systa and J. Voutilainen, "Mobile agents for the Internet of Things," 17th International Conference on System Theory, Control and Computing (ICSTCC), Sinaia, Romania, October 11-13,2013. 
  8. S. Bosse, "Mobile Multi-agent Systems for the Internet-of-Things and Clouds Using the JavaScript Agent Machine Platform and Machine Learning as a Service,", 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, Italy, August 22-24, 2016. 
  9. Zanella, Andrea, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, and Michele Zorzi. "Internet of things for smart cities.", IEEE Internet of Things journal, Vol. 1, No. 1, pp. 22-32, 2014 
  10. Jin, Jiong, Jayavardhana Gubbi, Slaven Marusic, and Marimuthu Palaniswami. "An information framework for creating a smart city through internet of things." IEEE Internet of Things Journal, Vol. 1, No. 2, pp. 112-121, 2014 
  11. G. Fortino, A. Guerrieri, W. Russo, and C. Savaglio, "Middlewares for Smart Objects and Smart Environments: Overview and Comparison", in : Internet of Things Based on Smart Objects, 2014. 
  12. F. Aiello, G. Fortino, A. Guerrieri, and R. Gravina, "Maps: a mobile agent platform for wsns based on java sun spots", in : Proceedings of the ATSN, 2009 
  13. H. Hasan et al., "Secure lightweight ECC-based protocol for multi-agent IoT systems," 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Rome, Italy, October 9-11, 2017 
  14. H. Yu, Z. Shen, and C. Leung, "From Internet of Things to Internet of Agents", International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, August, 2013 
  15. V. Buterin, A next-generation smart contract and decentralized application platform, 2014. 
  16. Tanweer Alam, "IoT-Fog: A Communication Framework using Blockchain in the Internet of Things", International Journal of Recent Technology and Engineering (IJRTE), Vol. 7, No. 6, 2019 
  17. R. Kumaravelu and N. Kasthuri, "Distribution of Shared Key (Secret Key) using USB Dongle based identity approach for authenticated access in Mobile Agent Security", International Conference on Communication and Computational Intelligence (INCOCCI), India, Erode, December 27-29, 2010 
  18. P. J. Marques, L. M. Silva and J. G. Silva, "Establishing a secure open-environment for using mobile agents in electronic commerce," Proceedings. First and Third International Symposium on Agent Systems Applications, and Mobile Agents, Palm Springs, CA, USA, October 3-6, 1999 
  19. F. Piette, C. Caval, A. El Fallah Seghrouchni, P. Taillibert, and C. Dinont, A multi-agent system for resource privacy: Deployment of ambient applications in smart environments (extended abstract), 2016 
  20. A. Esfandi and A. M. Rahimabadi, "Mobile agent security in multi agent environments using a multi agent-multi key approach," 2nd IEEE 
  21. G. Geetha and C. Jayakumar, "Implementation of trust and reputation management for free-roaming mobile agent security,"IEEE Systems Journal, Vol. 9, No. 2, pp. 556-566, 2015 
  22. A. Das, S. C. Ghosh, N. Das and A. D. Barman, "Q-Learning Based Co-Operative Spectrum Mobility in Cognitive Radio Networks," 2017 IEEE 42nd Conference on Local Computer Networks (LCN), 2017, pp. 502-505, doi: 10.1109/LCN.2017.80. 
  23. Q. Dang, D. Wu and B. Boulet, "An Advanced Framework for Electric Vehicles Interaction with Distribution Grids Based on Q-Learning*," 2019 IEEE Energy Conversion Congress and Exposition (ECCE), 2019, pp. 3491-3495, doi: 10.1109/ECCE.2019.8912298. 
  24. Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 1997. 
  25. I. Purdon, E. Erturk, "Perspectives of Blockchain Technology, its Relation to the Cloud and its Potential Role in Computer Science Education", Engineering, Technology & Applied Science Research, Vol. 7, No. 6, pp. 2340-2344, 2017 
  26. S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2009 
  27. I. Ishita, D. Kulkarni, T. Semwal and S. B. Nair, "On Securing Mobile Agents using Blockchain Technology," Second International Conference on Advanced Computational and Communication Paradigms (ICACCP), Gangtok, India, February 25-28, 2019 
  28. Tanweer Alam, "Blockchain and its Role in the Internet of Things (IoT)", International Journal of Scientific Research in ComputerScience, Engineering and Information Technology, Vol. 5, No. 1, pp. 151-157, 2019 
  29. Xiwei Xu et al., "A Taxonomy of Blockchain-Based Systems for Architecture Design", International Conference on Software Architecture (ICSA), Gothenburg, Sweden, April 3-7, 2017 
  30. Zibin Zheng et al., "An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends", 6th International Congress on Big Data (BigData Congress), Honolulu, Hawaii, USA, June 25-30, 2017. 
  31. Ethereum Community, A Next-Generation Smart Contract and Decentralized Application Platform. 
  32. C. Dannen, Introducing Ethereum and Solidtty: Foundations of Cryptocurrency and Blockchain Programming for Beginner", 2017 
  33. D. Patel, J. Bothra and V. Patel, "Blockchain exhumed," ISEA Asia Security and Privacy (ISEASP), Surat, 29 January - 1 February, 2017 
  34. Chinmay Saraf and Siddharth Sabadra, "Blockchain Platforms: A Compendium," IEEE International Conference on Innovative Research and Development (ICIRD), Jakarta, Indonesia, 2018 
  35. Tapscott Don, Tapscott Alex, The Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World, 2016 
  36. N. Szabo, The Idea of Smart Contracts, 1997 
  37. MySQL Reference Manual, Using Stored Routines (Procedures and Functions), 2016 
  38. Seung Jae Pee, Jong Ho Nang, Ju Wook Jang, A Simple Blockchain-based Peer-to-Peer Water Trading System Leveraging Smart Contracts, 2018 
  39. Maximilian Wohrer and Uwe Zdun, "Smart Contracts: Security Patterns in the Ethereum Ecosystem and Solidity," International Workshop on Blockchain Oriented Software Engineering (IWBOSE), March 20, 2018. 
  40. V. P. Ranganthan, R. Dantu, A. Paul, P. Mears and K. Morozov, "A Decentralized Marketplace Application on the Ethereum Blockchain," IEEE 4th International Conference on Collaboration and Internet Computing (CIC), Philadelphia, PA, USA, October 18-20, 2018.