Skip to main content

Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System

  • Conference paper
Agent Computing and Multi-Agent Systems (PRIMA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5044))

Included in the following conference series:

Abstract

Recently, several community-based systems have been developed; however, almost all such systems have been developed as Web-server-based systems. Thus, server administrator can easily eavesdrop on user communications, since they have to send/receive information through the server. Therefore, we propose multi-agent-based peer-to-peer (P2P) system wherein each peer manages his/her information and exchanges it with other peers directly. This, thus, resolves the problems posed by Web-server-based systems; however, we have to consider attacks from malicious third parties. This study designs and implements security protocols/mechanisms for a hierarchical community-based multi-agent system. Furthermore, if we consider a practical use case, we should be able to demonstrate that the proposed system can be implemented by combining it with existing security techniques for more reliable and rapid deployment. Finally, we evaluate the performance of the proposed security system and present an example application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Berket, K., Essiari, A., Muratas, A.: PKI-Based Security for Peer-to-Peer Information Sharing. In: Proc. of 4th International Conference on Peer-to-Peer Computing, pp. 45–52 (2004)

    Google Scholar 

  2. Business Mall, http://www.b-mall.ne.jp/

  3. Detsch, A., Gaspary, L., Barcellos, M., Cavalheiro, G.: Towards a Flexible Security Framework for Peer-to-Peer based Grid Computing. In: Proc. of the 2nd workshop on Middleware for grid computing, pp. 52–56 (2004)

    Google Scholar 

  4. FIPA MAS Security white paper, http://www.fipa.org/index.html

  5. Groove, http://www.groove.net/

  6. GT Security (GSI), http://www.globus.org/toolkit/security/

  7. Gunupudi, V., Tate, S.R.: SAgent: A Security Framework for JADE. In: Proc. of 5th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1116–1118 (2006)

    Google Scholar 

  8. Java Cryptography Extension (JCE), http://java.sun.com/products/jc

  9. Jetro TTPP, https://www3.jetro.go.jp/ttppoas/indexj.html

  10. McDonald, T., Yasinsac, A.: Application Security Models for Mobile Agent Systems. In: Proc. of International Workshop on Security and Trust Management, pp. 38–53 (2005)

    Google Scholar 

  11. Mine, T., Matsuno, D., Kogo, A., Amamiya, M.: Design and implementation of agent community based peer-to-peer information retrieval method. In: Klusch, M., Ossowski, S., Kashyap, V., Unland, R. (eds.) CIA 2004. LNCS (LNAI), vol. 3191, pp. 31–46. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. mixi, http://mixi.jp/

  13. Poslad, S., Calisti, M., Charlton, P.: Specifying standard security mechanisms in multi-agent systems. In: Falcone, R., Barber, S., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS, vol. 2631, pp. 227–237. Springer, Heidelberg (2003)

    Google Scholar 

  14. Project JXTA, http://www.jxta.org/

  15. Tian, H., Zou, S., Wang, W., Cheng, S.: A group based reputation system for P2P networks. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 342–351. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Tsai, J., Ma, L.: Security Modeling of Mobile Agent Systems. J. of Ubiquitous Computing and Intelligence 1, 73–85 (2007)

    Article  Google Scholar 

  17. Wallach, D.: A survey of peer-to-peer security issues. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 253–258. Springer, Heidelberg (2003)

    Google Scholar 

  18. Zhong, G., Amamiya, S., Takahashi, K., Mine, T., Amamiya, M.: The Design and Implementation of KODAMA System. IEICE Transactions INF. & SYST.  E85-D(4), 637–646 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K., Amamiya, M. (2009). Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System. In: Ghose, A., Governatori, G., Sadananda, R. (eds) Agent Computing and Multi-Agent Systems. PRIMA 2007. Lecture Notes in Computer Science(), vol 5044. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01639-4_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01639-4_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01638-7

  • Online ISBN: 978-3-642-01639-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics