Law-Governed Multi-Agent Systems: From Anarchy to Order Naftaly - - PowerPoint PPT Presentation

law governed multi agent systems from anarchy to order
SMART_READER_LITE
LIVE PREVIEW

Law-Governed Multi-Agent Systems: From Anarchy to Order Naftaly - - PowerPoint PPT Presentation

wireless Law-Governed Multi-Agent Systems: From Anarchy to Order Naftaly Minsky Rutgers University Example: An ad hoc Mission Team leader Actuation Coordinationto ensure mutual exclusion, say. Monitoring + control = management


slide-1
SLIDE 1

Naftaly Minsky Rutgers University

Law-Governed Multi-Agent Systems: From Anarchy to Order

wireless

slide-2
SLIDE 2
  • N. Minsky---Winlab Security Workshop, may 07

2

Example: An ad hoc Mission Team

leader Actuation Coordination—to ensure mutual exclusion, say. Monitoring + control = management Necessary: rules of engagement that are complied with by all

slide-3
SLIDE 3
  • N. Minsky---Winlab Security Workshop, may 07

3

The General Problem with Wireless Multi-Agent Systems (MASs)

A wireless MAS consists of inherently autonomous agents, which are increasingly heterogeneous, and thus anarchical. And anarchical systems tends to be unmanageable, unsafe and insecure—this is particularly true under wireless communication. But the anarchy of a MAS—like that of a social system—can to be tamed by a regulatory mechanism, that imposes appropriate laws over it. I will discuss some of the principles of such regulation, and their realization by Law-Governed Interaction (LGI), recently released via http://www.moses.rutgers.edu/

slide-4
SLIDE 4
  • N. Minsky---Winlab Security Workshop, may 07

4

Principles of Regulation of Multi-agent systems

A law of a MAS can only be about the interaction between agents— not about their internal behavior. High expressive power: a law needs to be, in particular: Stateful—sensitive to the history of interaction, and Proactive—able to force actions to be carried out. Laws should be enforced, so they can be relied upon to be universally observed. Enforcement of laws should be decentralized—for scalability—and it should be secure . Multiplicity of laws needs to be supported, and different laws should be able to interoperate, and be organized into “conformance hierarchies”. This goes far beyond conventional access control (AC)

slide-5
SLIDE 5
  • N. Minsky---Winlab Security Workshop, may 07

5

Conventional Access-Control (AC): Two Approaches

P1 S P2 S P3 S Recipient-centric AC Centralized AC (with state)

Mediator (a Trusted computing base (TCB)) x y m ==> y

P I S Legend: P---Explicit statement of a policy. I--- Policy interpreter S---the interaction-state of the community

slide-6
SLIDE 6
  • N. Minsky---Winlab Security Workshop, may 07

6

Limitation of Recipient-Centric AC

The state of the sender is not available to the policy

  • f the recipient.

No secure way to ensure that all recipients employ the same policy. Thus, no support is provided to coordination or management.

P S P S P S Recipient-centric AC

slide-7
SLIDE 7
  • N. Minsky---Winlab Security Workshop, may 07

7

Limitation of Centralized Access-Control

Lack of scalability —which, for stateful policies, cannot be achieved by replication. Centralization provides distorted representation of the distributed interaction. Impractical for wireless communication

Mediator (a Trusted computing base (TCB)) x y m ==> y

P I S

Centralized AC (with state)

slide-8
SLIDE 8
  • N. Minsky---Winlab Security Workshop, may 07

8

Distributed Law-Enforcement under LGI

P I S

x u v y

L I $9 L I Sv L I $1 L I Su

Move(2) Move(2) Moved(2) m m ==> y m $7 $3 actor controller

slide-9
SLIDE 9
  • N. Minsky---Winlab Security Workshop, may 07

9

The local nature of laws, and their global sway

A law must be local—to enable decentralized enforcement— although its sway should be global. The locality of LGI laws. Laws deals explicitly only with local events—such as the sending or arrival of a message. the ruling of a law for an event e at agent x is a function

  • f e, and of the local control state

CSX of x. a ruling can mandate only local operations at x.

Under LGI, locality does not reduce the expressive power of laws!!

slide-10
SLIDE 10
  • N. Minsky---Winlab Security Workshop, may 07

10

On Interoperability and Hierarchy of Laws A large and complex MAS is likely to be governed by multiple of laws that regulate different parts of the MAS, or different kinds of activities in it. This requires laws to be able to interoperate, and be organized into hierarchies. A case in point is the phenomenon of Coalition…

slide-11
SLIDE 11
  • N. Minsky---Winlab Security Workshop, may 07

11

Governance of Dynamic Coalitions (a Case Study)

Consider a coalition C of groups {G1,..., Gn}, governed by a coalition-law LC—asssuming that the participation of each Gi in this coalition is governed by its own internal-law Li .

G3 G2 G1 L2 L1 L3

LC

slide-12
SLIDE 12
  • N. Minsky---Winlab Security Workshop, may 07

12

The Main Challenges

The ensemble {LC , L1,. . ., Ln} of laws must be consistent, and its formulation and evolution must be flexible, in the following sense: New groups should be able to join the coalition, and leave it, dynamically—subject only to the coalition law LC It should be possible to formulate the individual laws Li, and to change them, dynamically, independently of each others. The decentralized enforcement of this law ensemble—including LC

slide-13
SLIDE 13
  • N. Minsky---Winlab Security Workshop, may 07

13

The LGI-based Coalition (Hierarchical Organization of Laws)

Given LC, each group Gi would formulate its own law Li as subordinate to LC and thus, in conformance to it–this is done independently of

  • ther local laws Lj

LC L1 L2 Ln

superior subordinate

Li -- defined as subordinate to Lc-- is built to conform to it.

slide-14
SLIDE 14
  • N. Minsky---Winlab Security Workshop, may 07

14

The LGI-based Coalition

(Interoperability within a Hierarchy) Let us focus on the interoperability between G1 and G2

G3 G2 G1 L2 L1 L3

LC

slide-15
SLIDE 15
  • N. Minsky---Winlab Security Workshop, may 07

15 imported(x,L2,m)

G2 G1

x y controller controller

L1 L2

Cx Cy

CSx I I CSy

m export(m,y,L1)

Interoperability within a Hierarchy

slide-16
SLIDE 16
  • N. Minsky---Winlab Security Workshop, may 07

16

Conclusion

As long as a wireless MAS is homogeneous, the conventional access control is quite satisfactory for it. But an heterogeneous MAS requires the more sophisticated LGI-like control—particularly if it needs to be managed, and if it requires coordination

slide-17
SLIDE 17

Questions, Or Lunch?

slide-18
SLIDE 18
  • N. Minsky---Winlab Security Workshop, may 07

18

The Conventional Compositions-Based Approach…

Given the set {PC , P1,. . ., Pn} of policies (by “policy” I mean, the traditional, less general, analog of a law) Compose all these policies to a single one: {P = composition (PC , P1,. . ., Pn)} Provide P to a central controller, which will mediate all coalition-relevant interactions.

slide-19
SLIDE 19
  • N. Minsky---Winlab Security Workshop, may 07

19

… and its Problematics

Composition is computationally intractable (McDaniel & Prakash 2002). It is unlikely for arbitrary, and independently formulated, policies to be consistent—so such composition is likely to simply fail. Inflexibility: any change of a single Pi --and any change in membership--requires re-composition of the entire ensemble, and is likely to require changes in other local policies, to achieve consitancy. Our solution rests on: hierarchy & interoperability

slide-20
SLIDE 20
  • N. Minsky---Winlab Security Workshop, may 07

20

Conclusion (cont)

A Beta version of LGI is to be released in May 2005, via: http://www.cs.rutgers.edu/moses/

This release would not include law-hierarchy, and hot- update of laws

Papers about this subject are available through my website: http://www.cs.rutgers.edu/~minsky/ LGI is very much work-in-progress. There is much work to be done, on both the LGI mechanism itself, and on its various applications and implications. And I hope some of you will take a look at these issues.

slide-21
SLIDE 21
  • N. Minsky---Winlab Security Workshop, may 07

21

Policies Governing a Virtual Enterprise (an Example)

E2 E3 E1 Roles: each Ei should have its director Di(*); and the coalition C a director DC. A director Di can mint Ei-currency $i needed to pay for services provided by Ei and it can give DC some of this currency A director DC can distribute some of its $i currency among other directors. $1 $1 Servers at E1 can send their earning in $1 back to their director

PC

P2 P1

$1 $1

$1

$i Currency cannot be forged—by anyone! A director D2 can distribute its $i budget among agents at its enterprise

$1 $1
slide-22
SLIDE 22
  • N. Minsky---Winlab Security Workshop, may 07

22

Beyond Access Control (AC)

Access control is concerned with “who has the right to do what to whom” But we are also concerned with the dynamic process of interaction.

For analogy: traffic laws require not only than the driver has a license, but also that he stops on a red light.

A regulatory mechanism that

slide-23
SLIDE 23
  • N. Minsky---Winlab Security Workshop, may 07

23

Distributed Law-Enforcement under LGI

P I S

x u v y

L I $9 L I Sv L I $1 L I Su

Move(2) Move(2) Moved(2) m m ==> y m $7 $3 actor controller

agent x