Adding security and trust to multiagent systems

Multiagent systems (MASs) are societies whose individuals are software delegatees (agents) acting on behalf of their owners or delegators (people or organizations). When deployed in an open network such as the Internet, MASs face some trust and security issues. Agents comeand go, and interact with strangers. Assumptions about security and general trustworthiness of agents and their deployers are inadequate in this context. In this paper, the design of a security infrastructure is presented applicable to MASs in general. This design addresses both security threats and trust issues. In this design, there are mechanisms for ensuring secure communication among agents and secure naming and resource location services. And two types of trusts are addressed: trust that agents will not misbehave and trust that agents are really delegatees of whom they claim to be. To establish the first type of trust, deployers of agents are made liable for the actions of their agents; to establish the second type of trust, it is proposed that agents prove that they know secrets that only their delegators know.

[1]  Katia Sycara,et al.  Intelligent agents in portfolio management , 1998 .

[2]  Katia P. Sycara,et al.  Distributed Intelligent Agents , 1996, IEEE Expert.

[3]  David W. Chadwick Understanding X.500 - the directory , 1994 .

[4]  Thomas Y. C. Woo,et al.  Authentication for distributed systems , 1997, Computer.

[5]  Martín Abadi,et al.  Authentication in distributed systems: theory and practice , 1991, SOSP '91.

[6]  Katia P. Sycara,et al.  Middle-Agents for the Internet , 1997, IJCAI.

[7]  Matthew Thompson,et al.  A secure marketplace for mobile Java agents , 1998, AGENTS '98.

[8]  Brian Wellington,et al.  Secure Domain Name System (DNS) Dynamic Update , 2000, RFC.

[9]  Bruce Schneier,et al.  Analysis of the SSL 3.0 protocol , 1996 .

[10]  Tim Finin,et al.  Secret Agents - A Security Architecture for the KQML Agent Communication Language , 1995, CIKM 1995.

[11]  Gita Reese Sukthankar,et al.  Agent aided aircraft maintenance , 1999, AGENTS '99.

[12]  Katia P. Sycara,et al.  Coordination of Multiple Intelligent Software Agents , 1996, Int. J. Cooperative Inf. Syst..

[13]  Pattie Maes,et al.  Agent-mediated electronic commerce: issues, challenges and some viewpoints , 1998, AGENTS '98.

[14]  Leonard N. Foner A Security Architecture for Multi-Agent Matchmaking , 1996 .

[15]  Matthias Klusch,et al.  Interoperability among Heterogeneous Software Agents on the Internet , 1998 .

[16]  Qi He,et al.  Personal security agent: KQML-based PKI , 1998, AGENTS '98.

[17]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.

[18]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.

[19]  Donald E. Eastlake,et al.  Domain Name System Security Extensions , 1997, RFC.

[20]  Carl M. Ellison,et al.  SPKI Requirements , 1999, RFC.

[21]  Alan O. Freier,et al.  The SSL Protocol Version 3.0 , 1996 .

[22]  Rahul Sukthankar,et al.  JGram: rapid development of multi-agent pipelines for real-world tasks , 1999, Proceedings. First and Third International Symposium on Agent Systems Applications, and Mobile Agents.