law governed multi agent systems from anarchy to order
play

Law-Governed Multi-Agent Systems: From Anarchy to Order Naftaly - PowerPoint PPT Presentation

wireless Law-Governed Multi-Agent Systems: From Anarchy to Order Naftaly Minsky Rutgers University Example: An ad hoc Mission Team leader Actuation Coordinationto ensure mutual exclusion, say. Monitoring + control = management


  1. wireless Law-Governed Multi-Agent Systems: From Anarchy to Order Naftaly Minsky Rutgers University

  2. Example: An ad hoc Mission Team leader Actuation Coordination—to ensure mutual exclusion, say. Monitoring + control = management Necessary: rules of engagement that are complied with by all N. Minsky---Winlab Security Workshop, may 07 2

  3. The General Problem with Wireless Multi-Agent Systems (MASs) � A wireless MAS consists of inherently autonomous agents, which are increasingly heterogeneous, and thus anarchical. � And anarchical systems tends to be unmanageable, unsafe and insecure—this is particularly true under wireless communication. � But the anarchy of a MAS—like that of a social system—can to be tamed by a regulatory mechanism, that imposes appropriate laws over it. � I will discuss some of the principles of such regulation, and their realization by Law-Governed Interaction (LGI), recently released via http://www.moses.rutgers.edu/ N. Minsky---Winlab Security Workshop, may 07 3

  4. Principles of Regulation of Multi-agent systems � A law of a MAS can only be about the interaction between agents— not about their internal behavior. � High expressive power: a law needs to be, in particular: � Stateful—sensitive to the history of interaction, and � Proactive—able to force actions to be carried out. � Laws should be enforced , so they can be relied upon to be universally observed. � Enforcement of laws should be decentralized—for scalability—and it should be secure . � Multiplicity of laws needs to be supported, and different laws should be able to interoperate, and be organized into “conformance hierarchies”. � This goes far beyond conventional access control (AC) N. Minsky---Winlab Security Workshop, may 07 4

  5. Conventional Access-Control (AC): Two Approaches Recipient-centric AC P1 S P2 S P3 S Centralized AC (with state) P m ==> y I x y Legend: S P---Explicit statement of a policy. Mediator I--- Policy interpreter (a Trusted computing base (TCB)) S---the interaction-state of the community N. Minsky---Winlab Security Workshop, may 07 5

  6. Limitation of Recipient-Centric AC P S Recipient-centric AC P S P S � The state of the sender is not available to the policy of the recipient. � No secure way to ensure that all recipients employ the same policy. � Thus, no support is provided to coordination or management. N. Minsky---Winlab Security Workshop, may 07 6

  7. Limitation of Centralized Access-Control P m ==> y I x Centralized AC (with state) y S Mediator (a Trusted computing base (TCB)) � Lack of scalability —which, for stateful policies, cannot be achieved by replication. � Centralization provides distorted representation of the distributed interaction. � Impractical for wireless communication N. Minsky---Winlab Security Workshop, may 07 7

  8. Distributed Law-Enforcement under LGI L L m m I m ==> y u I v S u S v P I S L L Move(2) Move(2) Moved(2) I x y I actor $9 $7 $1 $3 controller N. Minsky---Winlab Security Workshop, may 07 8

  9. The local nature of laws, and their global sway � A law must be local—to enable decentralized enforcement— although its sway should be global. � The locality of LGI laws. � Laws deals explicitly only with local events—such as the sending or arrival of a message. � the ruling of a law for an event e at agent x is a function of e , and of the local control state CS X of x . � a ruling can mandate only local operations at x . � Under LGI, locality does not reduce the expressive power of laws!! N. Minsky---Winlab Security Workshop, may 07 9

  10. On Interoperability and Hierarchy of Laws � A large and complex MAS is likely to be governed by multiple of laws that regulate different parts of the MAS, or different kinds of activities in it. � This requires laws to be able to interoperate, and be organized into hierarchies. � A case in point is the phenomenon of Coalition… N. Minsky---Winlab Security Workshop, may 07 10

  11. Governance of Dynamic Coalitions (a Case Study) � Consider a coalition C of groups {G 1 ,..., G n }, governed by a coalition-law L C —asssuming that the participation of each G i in this coalition is governed by its own internal-law L i . G 3 L 3 G 2 G 1 L 1 L 2 L C N. Minsky---Winlab Security Workshop, may 07 11

  12. The Main Challenges � The ensemble {L C , L 1 ,. . ., L n } of laws must be consistent, and its formulation and evolution must be flexible, in the following sense: � New groups should be able to join the coalition, and leave it, dynamically—subject only to the coalition law L C � It should be possible to formulate the individual laws L i , and to change them, dynamically, independently of each others. � The decentralized enforcement of this law ensemble—including L C N. Minsky---Winlab Security Workshop, may 07 12

  13. The LGI-based Coalition (Hierarchical Organization of Laws) � Given L C , each group G i would formulate its own law L i as subordinate to L C and thus, in conformance to it–this is done independently of other local laws L j L C superior subordinate L 1 L 2 L n L i -- defined as subordinate to L c -- is built to conform to it. N. Minsky---Winlab Security Workshop, may 07 13

  14. The LGI-based Coalition (Interoperability within a Hierarchy) � Let us focus on the interoperability between G 1 and G 2 G 3 L 3 G 2 G 1 L 1 L 2 L C N. Minsky---Winlab Security Workshop, may 07 14

  15. Interoperability within a Hierarchy controller controller L 1 L 2 export(m,y,L 1 ) imported(x,L 2 ,m) I I m CS x CS y x y C x C y G 2 G 1 N. Minsky---Winlab Security Workshop, may 07 15

  16. Conclusion � As long as a wireless MAS is homogeneous, the conventional access control is quite satisfactory for it. � But an heterogeneous MAS requires the more sophisticated LGI-like control—particularly if it needs to be managed, and if it requires coordination N. Minsky---Winlab Security Workshop, may 07 16

  17. Questions, Or Lunch?

  18. The Conventional Compositions-Based Approach… � Given the set { P C , P 1 ,. . ., P n } of policies (by “policy” I mean, the traditional, less general, analog of a law) � Compose all these policies to a single one: {P = composition ( P C , P 1 ,. . ., P n )} � Provide P to a central controller, which will mediate all coalition-relevant interactions. N. Minsky---Winlab Security Workshop, may 07 18

  19. … and its Problematics � Composition is computationally intractable ( McDaniel & Prakash 2002). � It is unlikely for arbitrary, and independently formulated, policies to be consistent—so such composition is likely to simply fail. � Inflexibility: any change of a single P i --and any change in membership--requires re-composition of the entire ensemble, and is likely to require changes in other local policies, to achieve consitancy. � Our solution rests on: hierarchy & interoperability N. Minsky---Winlab Security Workshop, may 07 19

  20. Conclusion (cont) � A Beta version of LGI is to be released in May 2005, via: http://www.cs.rutgers.edu/moses/ � This release would not include law-hierarchy, and hot- update of laws � Papers about this subject are available through my website: http://www.cs.rutgers.edu/~minsky/ � LGI is very much work-in-progress. There is much work to be done, on both the LGI mechanism itself, and on its various applications and implications. � And I hope some of you will take a look at these issues. N. Minsky---Winlab Security Workshop, may 07 20

  21. Policies Governing a Virtual Enterprise (an Example) Roles: each Ei should have its director Di( * ); A director Di can mint Ei-currency $ i and the coalition C a director D C . needed to pay for services provided by Ei A director D C can distribute some of its $ i and it can give D C some of this currency currency among other directors. E 3 $ i Currency cannot be forged—by anyone! $ 1 Servers at E1 can send their earning in A director D 2 can distribute its $ i $ 1 back to their director $ 1 budget among agents at its enterprise $ 1 $ 1 E 2 E 1 $ 1 $ 1 $ 1 P 1 P 2 P C N. Minsky---Winlab Security Workshop, may 07 21

  22. Beyond Access Control (AC) � Access control is concerned with “who has the right to do what to whom” � But we are also concerned with the dynamic process of interaction. � For analogy: traffic laws require not only than the driver has a license, but also that he stops on a red light. � A regulatory mechanism that N. Minsky---Winlab Security Workshop, may 07 22

  23. Distributed Law-Enforcement under LGI L L m m I m ==> y u I v S u S v P I S L L Move(2) Move(2) Moved(2) I x y I actor $9 $7 $1 $3 controller agent x N. Minsky---Winlab Security Workshop, may 07 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend