Skip to main content
Log in

Information Interoperability System Using Multi-agent with Security

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Recently, due to the interoperation of distributed information, the task and task analysis requiring the information connection in the distributed environment increases, and the decision support using the system becomes more important. As the centralized structure of the multi-agent based information interoperability system is composed of master and slave, it is vulnerable to impersonation attack, integrity, non-repudiation, and privacy security. Therefore, this paper adopted EMAF for information interoperability to propose an information interoperability system with security. In addition, to overcome the security vulnerability that may happen to the proposed system based on multi-agent, we are going to propose an agent mutual authentication method where certificates and session keys are combined together. When the proposed method is applied to the information interoperation between the national R&D report registration management system and the project management organization research report management system, not only the information interoperations in the distributed environment but also the safe information interoperability are supplied.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Temdee, P. (2014). Ubiquitous learning environment: Smart learning platform with multi-agent architecture. Wireless Personal Communications, 76(3), 627–641.

    Article  Google Scholar 

  2. Li, J.-P., Hsu, C.-W., Huang, C.-L., Horng, G.-J., & Cheng, S.-T. (2014). Using ontology and RFID technology to develop an agent-based system for campus-safety management. Wireless Personal Communications, 79(2), 1483–1510.

    Article  Google Scholar 

  3. Kook, Y.-G., Lee, J., Park, M.-W., Choi, K.-S., Kim, J.-S., & Shin, S.-S. (2011). Data quality management based on data profiling in E-government environments. Advanced Communication and Networking, 199, 286–291.

    Article  Google Scholar 

  4. Zakerolhosseini, A., & Nikooghadam, M. (2013). Secure transmission of mobile agent in dynamic distributed environments. Wireless Personal Communications, 70(2), 641–656.

    Article  Google Scholar 

  5. Rahman, M. G., & Imai, H. (2002). Security in wireless communication. Wireless Personal Communications, 22(2), 213–228.

    Article  Google Scholar 

  6. FIPA Agent Message Transport Service Specification. http://www.fipa.org/specs/fipa00067/SC00067F.pdf

  7. FIPA Agent Message Transport Protocol for IIOP Specification. http://www.fipa.org/specs/fipa00075/SC00075G.pdf

  8. FIPA Agent Message Transport Protocol for HTTP Specification. http://www.fipa.org/specs/fipa00084/SC00084F.pdf

  9. Poslad, S., Charlton, P., & Calisti, M. (2003). Specifying standard security mechanisms in multi-agent systems. Trust, Reputation, and Security: Theories and Practice, 2631, 163–176.

    Article  MATH  Google Scholar 

  10. FIPA Security WG. (2002). FIPA MAS security white paper. f-out-000113.

  11. Kim, C., Cho, E., & Ine, S. (2004). A study on security weakness and threats in multi-agent infrastructure. In Proceedings of Korean society for internet information, Vol. 5(1), pp. 315–318.

Download references

Acknowledgments

This research was supported by Maximize the Value of National Science and Technology by Strengthen Sharing/Collaboration of National R&D information funded by the Korea Institute of Science and Technology Information (KISTI).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kiseok Choi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chae, CJ., Choi, KN. & Choi, K. Information Interoperability System Using Multi-agent with Security. Wireless Pers Commun 89, 819–832 (2016). https://doi.org/10.1007/s11277-015-3113-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-3113-8

Keywords

Navigation