Abstract
Recently, due to the interoperation of distributed information, the task and task analysis requiring the information connection in the distributed environment increases, and the decision support using the system becomes more important. As the centralized structure of the multi-agent based information interoperability system is composed of master and slave, it is vulnerable to impersonation attack, integrity, non-repudiation, and privacy security. Therefore, this paper adopted EMAF for information interoperability to propose an information interoperability system with security. In addition, to overcome the security vulnerability that may happen to the proposed system based on multi-agent, we are going to propose an agent mutual authentication method where certificates and session keys are combined together. When the proposed method is applied to the information interoperation between the national R&D report registration management system and the project management organization research report management system, not only the information interoperations in the distributed environment but also the safe information interoperability are supplied.










Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Temdee, P. (2014). Ubiquitous learning environment: Smart learning platform with multi-agent architecture. Wireless Personal Communications, 76(3), 627–641.
Li, J.-P., Hsu, C.-W., Huang, C.-L., Horng, G.-J., & Cheng, S.-T. (2014). Using ontology and RFID technology to develop an agent-based system for campus-safety management. Wireless Personal Communications, 79(2), 1483–1510.
Kook, Y.-G., Lee, J., Park, M.-W., Choi, K.-S., Kim, J.-S., & Shin, S.-S. (2011). Data quality management based on data profiling in E-government environments. Advanced Communication and Networking, 199, 286–291.
Zakerolhosseini, A., & Nikooghadam, M. (2013). Secure transmission of mobile agent in dynamic distributed environments. Wireless Personal Communications, 70(2), 641–656.
Rahman, M. G., & Imai, H. (2002). Security in wireless communication. Wireless Personal Communications, 22(2), 213–228.
FIPA Agent Message Transport Service Specification. http://www.fipa.org/specs/fipa00067/SC00067F.pdf
FIPA Agent Message Transport Protocol for IIOP Specification. http://www.fipa.org/specs/fipa00075/SC00075G.pdf
FIPA Agent Message Transport Protocol for HTTP Specification. http://www.fipa.org/specs/fipa00084/SC00084F.pdf
Poslad, S., Charlton, P., & Calisti, M. (2003). Specifying standard security mechanisms in multi-agent systems. Trust, Reputation, and Security: Theories and Practice, 2631, 163–176.
FIPA Security WG. (2002). FIPA MAS security white paper. f-out-000113.
Kim, C., Cho, E., & Ine, S. (2004). A study on security weakness and threats in multi-agent infrastructure. In Proceedings of Korean society for internet information, Vol. 5(1), pp. 315–318.
Acknowledgments
This research was supported by Maximize the Value of National Science and Technology by Strengthen Sharing/Collaboration of National R&D information funded by the Korea Institute of Science and Technology Information (KISTI).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chae, CJ., Choi, KN. & Choi, K. Information Interoperability System Using Multi-agent with Security. Wireless Pers Commun 89, 819–832 (2016). https://doi.org/10.1007/s11277-015-3113-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-3113-8