Dark Think Security: Enhancing the Security for the Autonomous Architecture over a Restricted Domain
Abstract
This paper describes a security scheme called Dark Thing Security, to be used in the autonomous architecture model over a restricted domains. Such a scheme provides strong security due to its ability to hide intelligent agents from the implementation of the model. Several intelligent agents are distributed in the environment of an Autonomous System, being accessed only through agents of the upper layer. Such upper layer agents, called controllers, are replaced by more enabled agents, over time, making it difficult for unauthorized agents to gain access from other domains.
References
Braga, J. (2015b). Objetos de Aprendizagem: Metodologia de Desenvolvimento. Editora da UFABC, São Paulo, 1 edition.
Braga, J., Omar, N., and Granville, L. Z. (2015). Uma proposta para o uso de elementos inteligentes em domínios restritos da infraestrutura da internet. In Anais CSBC 2015 - WPIETFIRTF, Recife, Pernambuco, Brasil.
Hachem, S., Teixeira, T., and Issarny, V. (2011). Ontologies for the internet of things. In Proceedings of the 8th Middleware Doctoral Symposium, page 3. ACM.
Hawkinson, J. and Bates, T. (March 1996). Report on MD5 Performance. Technical report, RFC Editor. RFC1930. [link].
Horn, P. (2001). Autonomic computing: Ibm’s perspective on the state of information technology.
Insaurralde, C. C. and Vassev, E. (2015). Autonomic computing software for autonomous space vehicles. In Nature of Computation and Communication, pages 33–41. Springer.
Mitchell, J. (July 2013). Autonomous System (AS) Reservation for Private Use. Technical report, RFC Editor. RFC6996. [link].
Movahedi, Z., Ayari, M., Langar, R., and Pujolle, G. (2012). A survey of autonomic network architectures and evaluation criteria. Communications Surveys & Tutorials, IEEE, 14(2):464–490.
Nadeau, T. D. and Gray, K. (2013). SDN: Software Defined Networks. O’Reilly, USA, 1 edition.
Saltzer, J. H., Reed, D. P., and Clark, D. D. (1984). End-to-end arguments in system design. ACM Transactions on Computer Systems (TOCS), 2(4):277–288.
Shukla, V. (2014). Introduction to Software Defined Networking. Amazon, USA, 1 edition.
Sterritt, R. and Hinchey, M. (2005). Engineering ultimate self-protection in autonomic agents for space exploration missions. In Engineering of Computer-Based Systems, 2005. ECBS’05. 12th IEEE International Conference and Workshops on the, pages 506–511. IEEE.
Wickboldt, J. A., De Jesus, W. P., Isolani, P. H., Bonato Both, C., Rochol, J., and Zambenedetti Granville, L. (2015). Software-defined networking: management requirements and challenges. Communications Magazine, IEEE, 53(1):278–285.
