APPLICATION OF JXTA-OVERLAY PLATFORM FOR SECURE ROBOT CONTROL
Keywords:P2P, JXTA-Overlay, robot control, security
In this paper, we present the evaluation and experimental results of secured robot control in a P2P system. The control system is based on JXTA-Overlay platform. We used secure primitives and functions of JXTA-Overlay for the secure control of the robot motors. We investigated the time of robot control for some scenarios with different number of peers connected in JXTA-Overlay network. All experiments are realised in a LAN environment. The experimental results show that with the join of other peers in the network, the average time of robot control is increased, but the difference between the secure and unsecure robot control average time is nearly the same.
F. Xhafa, R. Fernandez, T. Daradoumis, L. Barolli, S. Caballe (2007), Improvement of JXTA
Protocols for Supporting Reliable Distributed Applications in P2P Systems, Proc. of NBiS-2007
(Regensburg, Germany), LNCS, Vol. 4658, pp. 345-354.
P. Caloud, W. Choi, J. C. Latombe, C. L. Pape, M. Yim (1990), Indoor Automation with Many
Mobile Robots, Proc. of the IEEE International Workshop on Intelligent Robots and Systems, pp.
H. Asama, K. Ozaki, A. Matsumoto, Y. Ishida, I. Endo (1992), Development of Task Assign-
ment System Using Communication for Multiple Autonomous Robots, Journal of Robotics and
Mechatronics, pp. 122-127.
C. Le Pape (1990), A Combination of Centralized and Distributed Methods for Multi-agent Plan-
ning and Scheduling, Proc. of the IEEE International Conference on Robotics and Automation,
L. E. Parker (1998), Alliance: An Architecture for Fault Tolerant Multirobot Cooperation, IEEE
Transactions on Robotics and Automation, pp. 220-240.
L. Chaimowicz, T. Sugar, V. Kumar, M. F. M. Campos (2001), An Architecture for Tightly Coupled
Multi-robot Cooperation, Proc. of IEEE International Conference on Robotics and Automation,
L. Inoue, T. Nakajima (2001), Cooperative Object Transportation by Multiple Robots with Their
Own Objective Tasks, Journal of the Robotics Society of Japan, pp. 888-896.
K. Ozaki, H. Asama, Y. Ishida, A. Matsumoto, I. Endo (1996), Collision Avoidance Using Com-
munication Between Autonomous Mobile Robot, Journal of the Robotics Society of Japan, pp.
M. Parnichkun, S. Ozono (1998), CDCSMA-CD Communication Method for Cooperative Robot
Systems, Advanced Robotics, pp. 669-694.
P. E. Rybski, S. A. Stoeter, M. Gini, D. F. Hougen, N. P. Papanikolopoulos (2002), Performance
of a Distributed Robotic System Using Shared Communications Channels, IEEE Transactions on
Robotics and Automation, pp. 713-727.
J. Arai, A. Koyama, and L. Barolli (2008), AR-TDMA: An Adaptive Reservation Time Division
Multiple Access Control Protocol for Robot Inter-communication, International Journal of Wireless
and Mobile Computing (IJWMC), Vol. 3, No. 1/2, pp. 4-11.
S. Wallach (2003), A Survey of Peer-to-Peer Security Issues, Theories and Systems, Springer
Berlin Heidelberg, pp. 253-258.
JXTA 2.5 RC1 (June 2007), http://download.java.net/jxta/build.
D. Bailly (2002), CBJX: Crypto-based JXTA (An Internship Report).
CCITT (1988), The Directory Authentication Framework: Recommendation.
D. Brookshier and D. Govoni and N. Krishnan and J.C Soto (2002), JXTA: Java P2P Program-
ming, Sams Publishing.
SUN Microsystem (2003), Project JXTA v 2.0: Java Programmer’s Guide.
SUN Microsystem (2001), Project JXTA, Available on line at http://www.jxta.org.
D. Sax (2003), DNS Spoofing (Malicious Cache Poisoning), Available on line at
T. Dierks and C. Allen (1999), The TLS Protocol Version 1.0, Available on line at
F. Xhafa, Z. Arrizabalaga, J.M. Bertran, L. Barolli (2009), Parameter Tuning of JXTA-based P2P
Platforms, Proc. of International Conference on Network-Based Information Systems (NBiS-2009),