Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Distributed security for multi-agent systems – review and applications

Distributed security for multi-agent systems – review and applications

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

As two major communication technologies, the internet and wireless, are maturing rapidly to dominate our civilised life, the authors urgently need to re-establish users’ confidence to harvest new potential applications of large-scale distributed systems. Service agents and distributed multi-agent systems (MASs) have shown the potential to help with this move as the lack of trust caused by heavily compromised security issues and concerns coupled with the out-of-date solutions are hindering the progress. The authors therefore seek new remedies to ensure that the continuity in developing new economies is maintained through building new solutions to address today's techno-economical problems. Following a scan of the literature the authors discuss the state-of-the-art progress followed by some observations and remarks for the researchers in the field. Here the authors recognise the need for new ‘distributed security’ solutions, as an overlay service, to rejuvenate and exploit the distributed artificial intelligence (AI) techniques for secure MAS as a natural solution to pave the way to enable a long awaited application paradigm of the near future.

References

    1. 1)
      • A. Martin , T.M. Lakshmi , J. Madhusudanan . Multi agent communication system for online auction with decision support system by jade and trace. J. Converg. Inf. Technol. , 154 - 163
    2. 2)
      • C.-M. Ou , C.R. Ou . Multi-agent artificial immune systems (MAAIS) for intrusion detection: abstraction from danger theory. LNCS Agent Multi-Agent Syst.: Technol. Appl. , 11 - 19
    3. 3)
      • X. Vila , A. Schuster , A. Riera . Security for a multi-agent system based on jade. Comput. Sec. , 391 - 400
    4. 4)
      • D.G. Wang , T. Li , S.J. Liu , G. Liang , K. Zhao . An immune multi-agent system for network intrusion detection. Adv. Comput. Intell. , 436 - 445
    5. 5)
      • Carley, K.M.: `Biodefense through city level multi-agent modelling of bio and chemical threats', Biosurveillance Workshop, 2006.
    6. 6)
      • Z. Xu , Y. Xiong , H. Ren . On agent-based strategic architecture of military medical service command system. Appl. Softw. , 90 - 92
    7. 7)
      • S. Poslad , P. Charlton , M. Calisti , R. Falcone , S. Barber , L. Korba , M. Singh . (2003) Specifying standard security mechanisms in multi-agent systems, Trust, reputation, and security: theories and practice.
    8. 8)
      • M. Fasli . On agent technology for e-commerce: trust, security, and legal issues. Knowl. Eng. Rev. , 3 - 35
    9. 9)
      • J. Rosenberg , D. Remy . (2004) Securing web services with WS-Security.
    10. 10)
      • Fernandes, D.L., Saboia, V.F.S., De Castro, M.F., de Souza, J.N.: `A secure mobile agents platform based on a peer-to-peer infrastructure', Int. Conf. on Networking, Systems and Mobile Communications and Learning Technologies, 2006, p. 189.
    11. 11)
      • J.S.C. Borgan . (2009) Trust agents.
    12. 12)
      • W. Shi , I. Jang , H.S. Yoo . An efficient electronic marketplace bidding auction protocol with bid privacy. Prog. WWW Res. Dev. , 297 - 308
    13. 13)
      • J. Tweedalea , N. Ichalkaranjeb , C. Sioutisb , B. Jarvisb , A. Consolib , G. Phillips-Wrenc . Innovations in multi-agent systems. Comput. Appl. , 1089 - 1115
    14. 14)
      • M. Fasli . (2007) Agent technology for e-commerce.
    15. 15)
      • C.J. Su . Mobile multi-agent based, distributed information platform (MADIP) for wide-area e-health monitoring. Comput. Ind. , 1 , 55 - 68
    16. 16)
      • X. Qiu , R. Paterson . An innovative network security vulnerability modeling method and tool. IEEE Commun. Mag. , 104 - 108
    17. 17)
      • Gorodetski, V., Kotenko, I.: `The multi-agent systems for computer network security assurance: frameworks and case studies', IEEE Int. Conf. on Artificial Intelligence Systems, ICAIS, 2002.
    18. 18)
      • J.F. Hbner , J.S. Sichman , O. Boissier . S-Moise+: a middleware for developing organised multi-agent systems. LCNS Coord. Org. Inst. Norms Multi-Agent Syst. , 64 - 78
    19. 19)
      • Burnett, C., Masato, D., McCallum, M.: `Agent support for mission planning under policy constraints', Second Annual Conf. Int. Technology Alliance, 2008, London.
    20. 20)
      • T. Karygiannis , W. Jansen . Mobile agent security. Technical Report NIST SP 800-19, National Institute of Standards and Technology
    21. 21)
      • E. Shakshuki , Z. Luo , J. Gong . An agent-based approach to security service. J. Netw. Comput. Appl. , 183 - 208
    22. 22)
      • E. Mosqueira-Rey , A. Alonso-Betanzos , B. Guijarro-Berdinas , D. Alonso-Rios , J. Lago-Pineiro . A snort-based agent for a JADE multi-agent intrusion detection system. Int. J. Intell. Inf. Database Syst. , 107 - 121
    23. 23)
      • Li, W., Hoang, D.: `A new security scheme for e-health system', Int. Symp. Collaborative Technologies and Systems Maryland, 2009, VA.
    24. 24)
      • P. Beautemen , D. Allsopp , M. Greaves . Autonomous agents and multi-agent systems (AAMAS) for the military: Issues and challenges. LNCS Defence Appl. Multi-Agent Syst. , 1 - 13
    25. 25)
      • Zhao, S., Liu, H., Sun, Z.: `Scalable trust in multi-agent e-commerce system', Int. Symp. on Electronic Commerce and Security, 2008.
    26. 26)
      • N. Asokan , P. Janson , M. Steiner , M. Waidner . The state of the art in electronic payment systems. IEEE Comput. , 28 - 35
    27. 27)
      • G. Nguyen , T.T. Dang , L. Hluchy , M. Laclavik , Z. Balogh , I. Budinska . Agent platform evaluation and comparison. Technical Report 5FP 1st-2001-34519: Institute of Informatics, Slovak Academy of Sciences
    28. 28)
      • Xiao, L., Peet, A., Lewis, P.: `An adaptive security model for multi-agent systems and application to a clinical trials environment', 31stIEEE Annual Int. Computer Software and Applications Conf. (COMPSAC’07), 2007.
    29. 29)
      • D. McKnight , V. Choudhury , C. Kacmar . The impact of initial customer trust on intentions to transact with a web site: a trust building model. J. Strateg. Inf. Syst. , 297 - 323
    30. 30)
      • A. Mana , A. Muñoz , D. Serrano . Towards secure agent computing for ubiquitous computing and ambient intelligence. LNCS Ubiquit. Intell. Comput. , 1201 - 1212
    31. 31)
      • M. d'Inverno , M. Luck , M. Georgeff , D. Kinny , M. Wooldridge . The dMARS architechure: a specification of the distributed multi-agent reasoning system. J. Auton. Agents Multi-Agent Syst. , 5 - 53
    32. 32)
      • C. Hewitt , P. Bishop , R. Steiger . A universal modular ACTOR formalism for artificial intelligence. Proc. of the 3rd International joint conference for artificial intelligence , 235 - 245
    33. 33)
      • A.G.C. Vecchiola , A. Passadore , A. Boccalatte . Agentservice: a framework for distributed multi-agent system development. Int. J. Agent-Oriented Softw. Eng. , 290 - 323
    34. 34)
      • S. Vitabile , V. Conti , C. Militello , F. Sorbello . An extended JADE-S based framework for developing secure multi-agent systems. Comput. Stand. Interfaces , 913 - 930
    35. 35)
      • Moradian, E., Hakansson, A.: `Approach to solving security problems using meta-agents in multi-agent system', Conf. on Agent and Multi-Agent Systems: Technologies and Applications: KES-AMSTA, 2008.
    36. 36)
      • Das, R., Kephart, J.O., Lefurgy, C., Tesauro, G., Levine, D.W., Chan, H.: `Autonomic multi-agent management of power and performance in data centers', Seventh Int. Joint Conf. on Autonomous Agents and Multiagent Systems: Industrial Track, 2008.
    37. 37)
      • Szymczyk, M.: `Detecting botnets in computer networks using multi-agent technology', Fourth Int. Conf. on Dependability of Computer Systems, 2009.
    38. 38)
      • B. Gokce , D.A. Laleci , M. Olduz , I. Tasyurt , M. Yuksel , A. Okcan , W. Series . (2008) SAPHIRE: a multi-agent system for remote healthcare monitoring through computerized clinical guidelines, Agent technology and e-health.
    39. 39)
      • R. Sulaiman , D. Sharma , W. Ma , D. Tran . A multi-agent security framework for e-health services. LNCS Knowl. Based Intell. Inf. Eng. Syst. , 547 - 554
    40. 40)
      • D. Zhang , S. Simofi , S. Aciar , J. Debenham . A multi agent recommender system that utilises consumer reviews in its recommendations. Int. J. Intell. Inf. Database Syst. , 1 , 69 - 81
    41. 41)
      • C. Martinez-Garcia , G. Navarro-Arribas , J. Borrell , A. Martin-Campillo . An access control scheme for multi-agent systems over multi-domain environments. LCNS Adv. Soft Comput. , 401 - 410
    42. 42)
      • A. Ricci , A. Ominici , E. Denit . (2001) Enlightened agents in tucson.
    43. 43)
      • M. Pechoucek , V. Marik . Industrial deployment of multi-agent technologies: review and selected case studies. Auton. Agent Multi-Agent Syst. , 397 - 431
    44. 44)
      • P. Novak , M. Rollo , J. Hodk , T. Vlek . Communication security in multi-agent systems. LCNS Multi-Agent Syst. Appl. III
    45. 45)
      • James, G., Cohen, D., Dodier, R., Platt, G., Palmer, D.: `A deployed multi-agent framework for distributed energy applications', Fifth Int. Joint Conf. on Autonomous Agents and Multiagent Systems, 2006.
    46. 46)
      • M. Minsky . Steps toward artificial intelligence. Proc. IRE , 8 - 30
    47. 47)
      • A. Karygiannis , E. Antonakakis . Security and privacy issues in agent-based location-aware mobile commerce. Saf. Sec. Multi-agent Syst. , 308 - 329
    48. 48)
      • Pedireddy, T., Vidal, J.M.: `A prototype multi-agent network security system', Second Int. Joint Conf. on Autonomous Agents and Multiagent Systems Melbourne, 2003, Australia.
    49. 49)
      • , : `Jack intelligent agents: Jack manual', Technical Report, 2005, release 4.1.
    50. 50)
      • L. Ismail . A secure mobile agents platform. J. Commun. , 2
    51. 51)
      • G.C.F. Bellifemine , A. Poggi , G. Rimassa . JADE: a software framework for developing multi-agent applications. Lessons learned. Inf. Softw. Technol. , 10 - 21
    52. 52)
      • Chelberg, D., Welch, L., Lakshmikumar, A., Gillen, M.: `Meta-reasoning for a distributed agent architecture', South-Eastern Symp. on System Theory Athens, 2001, Ohio.
    53. 53)
      • B. Hartman , D.J. Flinn , K. Beznosov , S. Kawamoto . (2003) Mastering web services security.
    54. 54)
      • Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: `Achieving DRBAC authorization in multi-trust domains with MAS architecture and PMI', Agent Computing and Multi-Agent Systems: 10th Pacific Rim Int. Conf. on Multi-Agent Systems, 2007.
    55. 55)
      • Cranefield, S., Purvis, M.: `Referencing objects in FIPA SL: an analysis and proposal', Proc. Second Int. Workshop on Challenges in Open Agent Environments at AAMAS, 2003.
    56. 56)
      • Bresciani, P., Giorgini, P., Mouratidis, H.: `On security requirements analysis for multi-agent systems', Second Int. Workshop on Software Engineering for Large-Scale Multi-Agent Systems, 2003, SELMAS Portland, Oregon.
    57. 57)
      • U. Manzoor , S. Nefti , H. Hasan , M. Mehmood , B. Aslam , O. Shaukat . A multi-agent model for mine detection – MAMMD, LNCS emerging technologies and information systems for the knowledge society.
    58. 58)
      • I. Cila , M. Malab . A multi-agent architecture for modelling and simulation of small military unit combat in asymmetric warfare. Expert Syst. Appl. , 1331 - 1343
    59. 59)
      • Bergenti, F., Poggi, A.: `Multi-agent systems for e-health: recent projects and initiatives', 10thInt. Workshop on Objects and Agents, 2009.
    60. 60)
      • V.S. Alagar , J. Holliday , P.V. Thiyagarajan , B. Zhou . (2010) An architecture for multi-agent e-commerce transactions.
    61. 61)
      • B. Chen , H.H. Cheng , J. Palen . Integrating mobile agent technology with multi-agent systems for distributed traffic detection and management systems. Transp. Res. C , 1 - 10
    62. 62)
      • Holloway, E.M., Lamont, G.B.: `Self organized multi-agent entangled hierarchies for network security', Eleventh Annual Conf. Companion on Genetic and Evolutionary Computation Conf., 2009.
    63. 63)
      • R. Vaughan , J. Wise , P. Huey . Distributed multi-layered network management for NEC using multi-agent systems. LNCS Agents Peer-to-Peer Comput. , 159 - 166
    64. 64)
      • Aldea, A., Lopez, B., Moreno, A., Riano, D., Valls, A.: `A multi-agent systems for organ transplant co-ordination', Eighth Conf. on AI in Medicine in Europe: Artificial Intelligence Medicine, 2001.
    65. 65)
      • Y.Z. Wei , N.R. Jennings , L. Moreau , W. Hall . User evaluation of a market-based recommender system. Auton. Agents Multi-agent Syst. , 251 - 269
    66. 66)
      • M. Papazoglou . (2008) Web services: principles and technology.
    67. 67)
      • C. Garrigues , S. Robles , J. Borrell , G. Navarro-Arribas . Promoting the development of secure mobile agent applications. J. Syst. Softw. , 6 , 959 - 971
    68. 68)
      • Marques, P., Silva, L., Silva, J.: `Security mechanisms for using mobile agents in electronic commerce', 18thIEEE Symp. on Reliable Distributed Systems, 1999, Lausanne, Switzerland.
    69. 69)
      • M.A. Patricio , J. Carbo , O. Perez , J. Garcia , J.M. Molina . Multi-agent framework in visual sensor networks. EURASIP J. Adv. Signal Process. , 1
    70. 70)
      • Gunupudi, V., Tate, S.R.: `SAgent: a security framework for JADE', Proc. Fifth Int. Joint Conf. on Autonomous Agents and Multiagent Systems, 2006, p. 1116–1118.
    71. 71)
      • Sierhuis, M., Clancey, W.J., van Hoof, R.J.J.: `Nasas OCA mirroring system. An application of multiagent systems in mission control', Eighth Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS), 2009.
    72. 72)
      • S. Fugkeaw , P. Manpanpanich , S. Juntapremjitt . Multi-application authentication based on multi-agent system. IAENG Int. J. Comput. Sci.
    73. 73)
      • E. Moradian , A. Hakansson . Possible attacks on XML web service. Int. J. Comput. Sci. Netw. Sec. , 16 , 154 - 170
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2010.0041
Loading

Related content

content/journals/10.1049/iet-ifs.2010.0041
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address