Template of Manuscripts for IREE

5 downloads 89280 Views 1MB Size Report
More in details the add-on provides an interface that allows the ... signs all the certificates for the whole platform, .... operating systems such as IOS, kindle, etc.
International Review on Computers and Software (I.RE.CO.S.), Vol. xx, n. x

Intelligent and pervasive supervising platform for information system security based on multi-agent systems R. Abidar1, K. Moummadi2, F. Moutaouakkil3, H. Medromi4 Abstract – As the development of technology, the mobile phone world also has developed very quickly. Mobile communication and services, over emerging wireless technologies, provide anyone, anytime and anywhere access. Moreover, the intelligence is now often embedded into modern applications, such as surveillance and supervising systems. This work presents an intelligent and a pervasive supervising platform for information system (IS) security based on multi-agent systems (MAS) which detects and classifies malware events that occurs on software and hardware components and sends real time notification to smart phone users. The proposed platform is formed by two components: The first one consists of a Central Software Component (CSC); the supervisor application that manages devices and evaluates logs and alarms of the supervised components. The second one consists of an Embedded Software Component (ESC) on the Mobile Device (MD) with an ANDROID OS. In our platform, we have implemented agents on ESC using JADE-LEAP android, note that the ESC is targeted to smart phones and tablet that run the operating system Android, JADE API on CSC and the communication between these two components is performed using the Secure Socket Layer (SSL) protocol implemented using the JADE-S plug-in. Copyright © 2009 Praise Worthy Prize S.r.l. - All rights reserved.

Keywords: Multi-Agent Systems, JADE-LEAP android, JADE-S, smart phone, network security, ANDROID OS, real-time notification alert, SSL.

I.

Introduction

As the development of technology, the world's mobile smartphone also has developed quite rapidly. It can be used for various purposes in accordance with the needs of the users. Mobile platforms and applications is becoming popular thanks to the continuous increase of the number of smartphones in the world, smartphone users worldwide will total 1.75 billion in 2014. This work presents an intelligent and pervasive supervising platform for IS security based on MAS which detects and classifies malware events that occurs on software and hardware components and sends real time alert to smart phone users. The proposed platform is formed by two components [26][27][28]: a Central Software Component (CSC); the supervisor application that manages devices and evaluates logs and alarms of the supervised components, and an Embedded Software Component (ESC) on the MD with an ANDROID OS. Android platform is selected because it is one of the best operating system for mobile phone right now and the user growth is very promising.

Manuscript received January 2007, revised January 2007

The purpose of a network alert management is to inform user in real time of failures and impending issues so that he can remediate them before they adversely affect the operation of the IS. To transmit real-time information to and from mobile devices, an underlying telecommunication system is needed. There are several choices, and an agreement among coverage, speed and cost must be reached. The personal agents [25] that are running in mobile devices have to be able to communicate wirelessly with serviceproviding agents running in the server. In our platform we implemented personal agents on MD. These devices have an operating system that supports the TCP/IP set of protocols. Concerning the wireless connection, there is a wide range of alternatives; the most popular are 4G, 3G, GPRS, UMTS, Wi-Fi and Bluetooth. Moreover, the code of the agents does not depend on the connection type, so it could be used with any other type of physical connection without any modification. The feedback information from the mobile device to the main system will be transmitted at real-time, or saved in order to be sent again if there is no communication. Another critical issue remained to be addressed is the architecture security. While the advantage of mobility in Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

R. Abidar1, K. Moummadi2, F. Moutaouakkil3, H. Medromi4 the agent paradigm helps to develop distributed systems and reaching a large section of mobile clientele, it also opens the system and makes it vulnerable to be attacked by malicious entities. In this paper we adopted a JADE plug-in JADE-S that allows us to establish security characteristics such as access control and secure communications in the platform, so that it can start to be used in real environments. Finally, note that the system also performs a complete log of all events, each stored with a severity level, a timestamp and a description, so that it will be possible to analyze who, why and when a given notification has been triggered. In the next sections, we describe the multi-agent approach used for the conception and the implementation of our architecture. Then, we explain the different parts of the proposed architecture as well as the conception of the platform elaborated by AUML and finally a case study with an implementation. This article ends by conclusions and perspectives.

II.

Multi Agent Approach II.1.

Agent Technology

The notion of agent has been used in many different research areas. Consequentially, there is no general definition. The Object Management Group defines a software agent as ‗a computer program that acts autonomously on behalf of a person or organization‘ [1][16]. The following properties characterize agents:  Autonomy. An agent is not passively subject to a global, external flow of control in its actions. That is, an agent has its own internal thread of execution, typically oriented to the achievement of a specific task, and it decides for itself what actions it should perform at what time [2].  Situatedness. Agents perform their actions while situated in a particular environment. The environment may be a computational one or a physical one, and an agent can sense and affect some portions it.  Proactivity: In order to accomplish its design objectives in a dynamic and unpredictable environment the agent may need to act to ensure that its set goals are achieved and that new goals are opportunistically pursued whenever appropriate.  mobile: can actively migrate in networks to different systems and move directly to the local resources, like databases or application servers II.2.

Multi-Agent Systems

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

A Multi-Agent System is a distributed system composed of agents. These agents need to interact and cooperate in order to achieve global tasks. One of the main properties of MAS is that it relies rather on the distribution of cooperation algorithms than on centralized processes. The decentralized and loosely coupled nature of the network makes it possible to design applications that are highly flexible, scalable and adaptive. MAS provide decentralized control based on distributed autonomous entities. While a centralized control system is doomed to become increasingly complex and failure prone as the range of possible services and situations extends, a multi-agent methodology appears as a natural way to design truly scalable and robust systems. A MAS consists of a collection of autonomous agents that communicate and collaborate to solve a complex problem. It is expected to be robust, adaptable, autonomous, and sometimes distributed and faulttolerant[4][5][7][8]. MAS offer modularity by having agents as modular components that specialize to solve a specific part of a complex problem. This modularity allows the decomposition of a complex problem and coordination between the modules helps to manage possible interdependencies in the complex problem [6]. MAS offer a new dimension for cooperation and coordination in a distributed collaborative environment. It can provide an effective platform for coordination and cooperation to help team members to manage knowledge. Therefore, MAS are best suited for use in open systems such as distributed knowledge management systems with a large and varying number of agents. One of the most important concepts in a multi-agent system specification is that of communication and interaction among the agents themselves. Several communication frameworks have been presented in the literature. Some of them are based on the fundamentals of logic in artificial intelligence as presented by Ilsson in [8] and others oriented to negotiation between agents as in the case of the contract net protocol used in holonic manufacturing control [3][7]. Another important aspect of a MAS framework is the architecture of the intelligent agents that form the overall system. The concepts from single agents as ―perception and action‖ and ―belief, desire and intention‖ are being extended to the concept of multiagent systems [7]. II.3.

Agent on Mobile Devices

A number of efforts have been made at deploying intelligent agents on mobile devices including PDAs and mobile phones. One example of an agent platform for mobile devices is the Lightweight and Extensible Agent Platform (LEAP) [9]. Developed under the auspices of the European Union‘s Information Society Technology (IST) program, LEAP supports the deployment of agents on a heterogeneous network of fixed and mobile devices. Though capable of operating on normal workstations, International Review on Computers and Software, Vol. xx, n. x

R. Abidar1, K. Moummadi2, F. Moutaouakkil3, H. Medromi4 LEAP has evolved from, and is thus compliant with, the JADE [10] platform. A similar approach has been taken with micro FIPA-OS [11]. This is an extension of the well known open source platform FIPA-OS [12] and, again, agents use almost identical APIs. KSACI [13] proposes a communication infrastructure that facilitates the exchange of information between agents embedded on handheld devices and other embedded agents, or indeed agents operating on desktops. Examples of other systems that have been extended to support mobile devices include Tacoma [14] and Grasshopper [15]. II.4.

Overview of JADE-LEAP ANDROID

JADE is a set of Java classes that allow a developer to build a FIPA-compliant multi-agent system quite easily. It provides a set of graphical tools that facilitate the complex task of implementing a multi-agent system. JADE ANDROID is a JADE add-on that provides support for using JADE-LEAP on Android Platform. Android is the software stack for mobile devices including the operating system released by Google within the Open Handset Alliance. The possibility of combining the expressiveness of FIPA communication supported by JADE agents with the power of the ANDROID platform brings a strong value in the development of innovative applications based on social models and peer-to-peer paradigms. The JADE-ANDROID add-on has been designed to support this kind of applications. By means of it an ANDROID application can easily embed a JADE agent and therefore become part of a wider distributed system possibly including other mobile devices. More in details the add-on provides an interface that allows the application to start a local agent, trigger behaviors and more in general exchange objects with it. II.5.

The JADE-S platform

JADE-S is formed by the combination of the standard version of JADE with the JADE security plug-in [18]: [19]. JADE-S includes security features such as user/agent authentication, authorization and secure communication between agents into the same platform. With more details:  Authentication: a user must be authenticated by providing a username and password, to be able to own or perform actions on a component of the platform.

 Permissions and Policies: a permission is an object that describes the possibility of performing an action on a certain resource such as a piece of code, but also executes that code. A policy specifies which permissions are available for various principals;  Certificates and Certification Authority: the Certification Authority (CA) is the entity that signs all the certificates for the whole platform, using a public/private key pair (PKI infrastructure).  Delegation: this mechanism allows the ―lending‖ of permissions to an agent. Besides the identity certificate, an agent can also own other certificates given to it by other agents;  Secure Communication: communication between agents on different containers/hosts, are performed using the Secure Socket Layer (SSL) protocol. This enables a solid protection against malicious attempts of packet sniffing.

III. Proposed Architecture In order to choose a suitable agent platform that satisfies our requirements to implement the system, the following criteria were considered [18]: 1. Distributed heterogeneous environment: The platform needs to be capable of running on distributed, heterogeneous operating systems and their variations for portable devices. 2. Open architecture and scalability: The platform should facilitate the evolution by providing an open architecture into which new devices and reasoning modules may be added. 3. Secure infrastructure: Distributed systems when deployed in an open environment require a high level of security at both the infrastructure and application levels. Agent‘s autonomy and mobility, requires even greater attention to security notion.

 Authorization: JADE-S uses the concept of Principal as an abstraction for a user account, an agent or a container. A Principal must be authorized by the Java Security Manager. The Security Manager allows or denies the action according to the JADE platform's policy; Fig. 1. Abstract view of proposed architecture Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

International Review on Computers and Software, Vol. xx, n. x

R. Abidar1, K. Moummadi2, F. Moutaouakkil3, H. Medromi4

To answer the first requirement the proposed architecture is modular, it is designed on a multi-tier model, which consists of four layers [28] (see Fig 2):

The architecture of the multi-agent system shown in Fig 3 illustrates various agents, dispatched in two main components, ESC and CSC [28].

1. Connector and user MAS Layer: provides mechanisms to facilitate the connection of different types of MD system and the list of MD GUI. It contains one or more MD agent and the connections controller agent. 2. Communication MAS Layer: that ensures transparent communication between the connector and user MAS Layer and CSC MAS. It consists of a coordinator agent and MD profile agent. The agents are self-contained entities in this layer and do not need to be aware of the physical network. Fig.3. The Security Module and its components.

3. CSC MAS layer : consists of link-agent and CSC agent, it receives the requests of users, and forwards them to the server or model and return back the response if there is any. 4. Security layer (SL): The authentication module that each agent adopts for secure communications. This layer insure the following functions:(see fig 2)  Login Agent: allows the user to provide its username and password and checks if these username and password are valid.  SCA (Security Certification Authority) Agent is an agent which can attribute, renew or revoke agents digital certificates;  ACA (Access Control Authority) Agent to ensure they have the access control rights permissions required for the requested actions;  ACC (Agent Communication Channel) for exchanging critical information through a network using a secure data transmission using SSL.

We implemented the security module by using JADE-S, this last one provides fundamental support for application level security, it is based on the Java security model and leverages the advantages of the following technologies [20]:  JAAS (Java Authentication and Authorization Service) for acquiring access permissions to perform certain operations on a set of predetermined classes, libraries or objects.  JCE (Java Cryptography Extension) for developers to create and manage cryptographic keys with encryption algorithms.  JSSE (Java Secure Socket Extension) for exchanging critical information through a network using a secure data transmission using SSL.

Fig.4. Security Agent structure.

Fig. 2. Proposed architecture

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

International Review on Computers and Software, Vol. xx, n. x

R. Abidar1, K. Moummadi2, F. Moutaouakkil3, H. Medromi4 IV. Designing the model The design of the platform is based on the AUML language. Agent UML is an extension of UML to take into account the agent notions. AUML inherits representations proposed by UML [29]. It thus contains 14 diagrams types symbolizing many different views to represent, inform and describe static and dynamic aspects of information system. They fall into three main groups:  behavioral diagrams,  Structural diagrams,  Interaction diagrams.

 The Administrator can sign in/out of the system, add/delete/configure or view a user, activate or deactivate service.  The mobile device can sign in/out of the system, upload data to server and download data from the server, view data, update data and lunch or stop the service on mobile device.

The design of the proposed architecture is described through the tree Agent diagrams, class diagram which is a structural diagram, use cases diagram which belong to behavioral diagrams and sequence diagram which take place with interaction diagrams.

Fig. 7. Use Cases Diagram

Fig. 5. Agent Class Diagram

Each agent can connect to the system or disconnect voluntarily and can communicate and/or cooperate with other agents in order to accomplish individual or collective tasks (see fig. 8).

A Security Layer (SL) is a set of agents granting resources services, based on access certificates issued by a particular agent called Access Control Authority (ACA). For each SL there is only one ACA that manages access control for protected resources of SL agents [17]. Each certificate contains a list of roles, instead of a list of authorizations. User authorizations through roles allows user grouping and it is generally easier and less error-prone than directly assigning authorizations separately. Each role is mapped to a set of authorizations, expressed as Security Level. It allows resource grouping based on their degree of security. The subject role and role authorization relationships are implemented by policy files. These files are read respectively by the ACA and by each agent providing services belonging to the SL managed by the ACA agent. Administrators have only to specify subjects, roles and roles authorizations mappings that are relatively constants. The UML sequence diagram shows a typical sequence of interactions related to access to a protected service/resource (see fig.10).

Fig. 6. MD Agent class diagram

The use cases diagram, as shown in Fig. 8, consists of two actors and their associated use cases:

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

Fig. 8. Authentication Sequence diagram.

International Review on Computers and Software, Vol. xx, n. x

R. Abidar1, K. Moummadi2, F. Moutaouakkil3, H. Medromi4 Syslog agent

Syslog agent

ESC MAS Syslog agent WIRELESS CONNECTION

Syslog agent

Syslog agent

CSC MAS

SQL LITE

Syslog agent

MYSQL DATABASE

Syslog agent

Syslog agent

Fig. 9. Alert management sequence diagram

V.

Case Study

To validate this architecture we realized a platform of supervision and real time notification alert on the mobile device. We implemented a multi-agent system that allows us to manage efficiently the logs of IS component. Indeed, optimal functioning and protection of the information system require a lot of time, planning and effort. And hence, we concluded that the most reliable strategy for an optimal proactivity is to actively monitor the event logs of IS components and to set up a system for real-time notification of critical events [23][24]. (See Fig 5) The platform consists of two software components:  A client embedded on a mobile under android OS.  A central log management. Has to note that the syslog-ng server was used to insure the centralization, the filtering and the storage of IS files Log.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

Syslog agent

Syslog agent

SQL LITE

ESC MAS

Syslog agent

Fig. 10. Abstract view of the platform management alerts

V.1.

Android Platform:

Android is one of the operating systems used in tablet and Smartphone, and now is in possession of the multinational company, Google. There are other operating systems such as IOS, kindle, etc. However, only Android offers the following advantages:  Allows its use in various devices, because it is open-source;  Is in this mainstream technology branch, holding about 46.9% of users [21];  The development of applications for this operating system is much easier;  Evolution and significant growth, to an increasingly broad range of electronic devices. The Android platform delivers a complete set of software for mobile devices: an operating system, middleware, and key mobile applications. Android offers new possibilities for mobile applications by offering an open development environment built on an open source Linux kernel. Real hardware can be accessed through a series of standard API libraries, allowing the user to manage Wi-Fi, Bluetooth, and GPS devices. As Fig. 6 illustrates, the Open Mobile Alliance [22] and Google support the Android platform and hope to reach the goal of ensuring global mobile services that operate across devices, geographies, service providers, operators, and networks.

International Review on Computers and Software, Vol. xx, n. x

R. Abidar1, K. Moummadi2, F. Moutaouakkil3, H. Medromi4

Fig. 11. Android platform

V.2.

Syslog / Syslog-ng Service

Syslog-ng is a log file manager that implements the new generation of Syslog protocol. It centralizes the logs of the components of an IS. Open source and runs on many systems such as Linux, FreeBSD, HP-UX, Solaris or even AIX, Syslog-ng effectively replaces the basic syslog daemon. It helps to compensate for its many deficiencies, such as:    

Portability, Very advanced basic configuration, Log export receipts to a mySQL server, Ability to encrypt the logs sent via SSL technology,  Use UDP and TCP in the transport of logs,  Ability to sort the logs according to the contents, their origin or even ease, and being able to use regular expressions.

V.3.

Implementation

To implement and develop the supervising platform in discussion, we opted for the tools listed in the table below (see table II).

Fig. 12. Some ESCs GUI

VI. Conclusion and Future work Mobile computing offers considerable scope for the deployment of innovative and imaginative applications. The proposed architecture is based on SMA whose main characteristics are intelligence and autonomy. This platform, which offers remote monitoring and real-time notification, reduces costs by minimizing IS security deployments unnecessary costs to control remote sites, unnecessary phone calls or overtime lost looking for the cause of a very long error in the log files. The system is permanently fed by information describing IS alerts. Besides these tasks, the communication methods will be reviewed to ensure no data is lost, and both the Android application and the Java Client will be evaluated to determine if improvements can be made. We intend to introduce other types of agents related to the localization, is also necessary to carry out the approach to other applications in order to test and to validate the multi agent core.

TABLE II DEVELOPMENT TOOLS

Tool

Description

fedora server SYSLOG-ng GNS3, Dynamips Eclipse IDE and ADT plugin

operating system for server Centralize and filter log files Simulation of network equipment ADT plugin adds functionality to Eclipse specialized in developing Android

Apache Tomcat

An Open Source JSP and Servlet Container from the Apache Foundation Data Persistence Mechanism synchronized data are stored in a mysql database Openssl protocol to encrypt the data stream

HIBERNATE mySQL database Openssl protocol

Below the GUI (graphical user interface) of the application:

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

References [1]

[2]

Crystaliz, Inc., General Magic, Inc., GMD Focus, and I. Coorp. Mobile Agent Facility Specification. Technical report, OMG, 1997. J. Ferber. Multi-Agent Systems: An Introduction to Artificial Intelligence. Addison Wesley Publishing Company, 1999;

[3]

F. S. Hsieh. Model and control of holonic manufacturing systems based on fusion of contract nets and Petri nets. Automatica vol. 40, pp. 51-57, 2004. [4] N. J. Nilsson. Artificial Intelligence: A new synthesis. Morgan Kaufmann 1998. [5] S. J. Russell and P. Norvig. Artificial Intelligence: A modern approach. Prentice Hall 2002. [6] Kavita Sharma, Android: The Possibilities are Endless, IJARCS, Volume 2,N°1, Jan-FEB 2011 [7] G. Weiss, editor. Multi-agent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press, 1999. [8] M. Wooldridge. An Introduction to MultiAgent Systems. John Wiley & Sons 2001. International Review on Computers and Software, Vol. xx, n. x

R. Abidar1, K. Moummadi2, F. Moutaouakkil3, H. Medromi4 [9]

F. Bergenti, A. Poggi, LEAP: a FIPA platform for handheld and mobile devices, in: Proceedings of the 8th International Workshop on Agent Theories, Architectures and Languages (ATAL-2001), Seattle, WA, USA, August 2001. [10] F. Bellifemine, G. Rimassa, A. Poggi, JADE—a FIPA compliant agent framework, in:Proceedings of the 4th International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agents, London, 1999. [11] S. Tarkoma, M. Laukkanen, Supporting software agents on small devices, in: Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS-2002), Bologna, Italy, July 2002. [12] Foundation for Intelligent Physical Agents (FIPA). Available from: . [13] R.L. Albuquerque et al., KSACI: A handheld device infrastructure for agent communication, in: Proceedings of the ATAL 2001 Conference, Seattle, USA, 2001. [14] D. Johansen et al., A tacoma retrospective, Software Practice and Experience 32 (6) (2002) 605–619. [15] C. Ba¨umer et al., Grasshopper—a universal agent platform based on OMG MASIF and FIPA standards, in: Proceedings of the First International Workshop on Mobile Agents for Telecommunication Applications (MATA_99), Ottawa, Canada, October 1999, pp. 1–18. [16] Michael Luck, Peter McBurney, Onn Shehory, Steve Willmott and the AgentLink Community: ―Agent Technology: Computing as Interaction: A Roadmap for Agent Based Computing‖, AgentLink III, September 2005 [17] P. Giorgini, F. Massacci, N. Zannone, Security and trust requirements engineering,Proc. of Foundations of Security Analysis and Design III—Tutorial Lectures, LNCS 3655, SpringerVerlag, 2005, pp. 237–272, GmbH.;

[18] E. Ferreira, et al., Implementing mobile agent design

patterns in the JADE framework, Special Issue on JADE of the TILAB Journal EXP (2003). [19] Agostino Poggi, Giovanni Rimassa, Michele Tomaiuolo, Multiuser and security support for multi-agent systems, Proceedings of WOA 2001 Workshop, Modena, Italy, Sep 2001. [20] A. Moreno, D. Sanchez, D. Isern, Security measures in a medical multi-agent system, in: Frontiers in Artificial Intelligence and Applications, IOS Press, 2003, pp. 244–255. [21] ―Go Gulf Blog‖ Available: http://www.gogulf.com/blog/smartphone/ Accessed 06/05/2013. [22] Open Mobile Alliance Official Site, . [23] K.Moummadi, R.Abidar, H.Medromi, 2012 ―Implementation and integration of an intrusion detection system and an agricultural decision support system based on multi-agent system ―, ICCS‘12, Agadir, morocco [24] K.Moummadi, R.Abidar, H.Medromi, 2011. ―Generic model based on constraint programming and multi ‐agent system for M2M services and agricultural decision support―, ICMCS‘11 , ouarzazate, morocco [25] Pradeep K. Murukannaiah, Munindar P. Singh: Xipho: Extending Tropos to Engineer Context-Aware Personal Agents, Proceedings of the 13 th Inter-national Conferenceon Autonomous Agents and Multiagent Systems (AAMAS 2014) [26] R.Abidar, K.Moummadi, H.Medromi, 2011. ―Mobile device and Multi agent systems An Implemented platform of real time data communication and synchronization―, ICMCS‘11, ouarzazate, morrocco [27] K.Moummadi, R.Abidar, H.Medromi, Distributed Resource Allocation: Generic Model and Solution Based on Constraint Programming and Multi-Agent System for Machine to Machine Services, Volume 4, Issue 2.49-62, April-June 2012 . IGI Global. ISSN: 1937-9412, E-ISSN: 1937-9404. [28] Moummadi Kamal, Abidar Rachida, Moutaouakkil Fouad, Medromi HichamNetwork Alert Management Based on Multi Agent Systems for Surveillance and Supervising Software and Hardware Components, Vol 9, No 6 (2014).

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

[29] M-P. Huget. Agent UML Class Diagrams Revisited. In Proceedings of Agent Technology and Software Engineering (AgeS), Germany, Octobre 2002 [30] Sayouti, H. Medromi, F. Elmariami, A. Belfqih, ―Multi-agent Systems – Modeling, Programming and Application‖, International Journal of Applied Information Systems – ISSN: 2249-0868 Vol.4- N°4, April 2013 [31] F. Moutaouakkil, A. Sayouti, H. Medromi, ―Telerobotic on Internet Case Study: Mobile Robot‖. International Review on Computers and Software (I.RE.CO.S), Vol. 5, N. 4, July 2010.

Authors’ information 1

Team of systems architecture, lab of computer science, systems and renewable energy, National school of electricity and mechanic, Hassan2 University, PO Box 8118 Oasis, Casablanca, Morocco. Email: [email protected] 2

Team of systems architecture, lab of computer science, systems and renewable energy, National school of electricity and mechanic, Hassan2 University, PO Box 8118 Oasis, Casablanca, Morocco. Email: [email protected]

3

Team of systems architecture, lab of computer science, systems and renewable energy, National school of electricity and mechanic, Hassan2 University, PO Box 8118 Oasis, Casablanca, Morocco. Email: [email protected] 4

Team of systems architecture, lab of computer science, systems and renewable energy, National school of electricity and mechanic, Hassan2 University, PO Box 8118 Oasis, Casablanca, Morocco. Email: [email protected]

1

Rachida Abidar Was born in Agadir in 1982, she received his computer engineer in computer science in 2006 at the Hassania (EHTP) School, Casablanca, Morocco. In 2009, she joined, as a PhD student, the System Architecture Team of the National and High School of Electricity and Mechanic (ENSEM), Casablanca, Morocco. She is a member of IEEE. His actual main research interest is about modeling, simulating and implementing, remote control and complex systems based on Multi-agent Systems. 2 Kamal Moummadi Was born in Casablanca in 1981, he received his computer engineer in computer science in 2005 at the National Institute of statistics and applied economy (INSEA) school, Rabat, Morocco. In 2009, he joined, as a PhD student, the System Architecture Team of the National and High School of Electricity and Mechanic (ENSEM), Casablanca, Morocco. He is a member of IEEE. His actual main research interest is about modeling, simulating and implementing, remote control and complex systems based on Multi-agent Systems. 3

Fouad Moutaouakkil received the PhD in computer science from the ENSEM, Hassan II University in November 2010, Casablanca, Morocco in 2005 he obtained the Engineer Degree in industrial automation from the ENSEM, Hassan II University, Casablanca, Morocco. In 2006 he rejoined the system International Review on Computers and Software, Vol. xx, n. x

R. Abidar1, K. Moummadi2, F. Moutaouakkil3, H. Medromi4 architecture team of the EN SEM. His actual main research interests concern Remote Control over Internet Based on Multi agents Systems. 4

Hicham Medromi received his PhD in engineering science from the Sophia Antipolis University in 1996, Nice, France. He is responsible of the system architecture team of the ENSEM Hassan II University, Casablanca, Morocco. His current main research interests concern Control Architecture of Mobile Systems Based on Multi Agents Systems. Since 2003 he is a full professor for automatic productic and computer sciences at the ENSEM School, Hassan II University, Casablanca.

Copyright © 2007 Praise Worthy Prize S.r.l. - All rights reserved

International Review on Computers and Software, Vol. xx, n. x