Knowledge Based and Intelligent Information and Engineering Systems Security in Multi-Agent Systems

Abstract Multi-agent systems become more and more popular due to successful implementations in different fields. However, there is a number of threats that can compromise security of the agent and jeopardize systems security. Therefore, security issues should be taken into consideration during development of multi-agent systems. However, different existing methodologies that provide guidelines and models for development of multi-agent systems omit security. Therefore, there is a great need in offering security solutions which are integrated with system functionalities. This research presents a model for securing multi-agent systems, which is developed, based on the concepts and models regarding agent's role and communications. Moreover, possible attacks on multi-agent systems are presented and threats are categorized. Furthermore, general security requirements at the agent and the system levels are defined and considered in the proposed model.

[1]  Mohammad Khalid Pandit,et al.  Applying Aspect Oriented Programming on Security , 2015 .

[2]  Chris J. Mitchell,et al.  On Mobile Agent Based Transactions in Moderately Hostile Environments , 2001, Network Security.

[3]  Franco Zambonelli,et al.  Developing multiagent systems: The Gaia methodology , 2003, TSEM.

[4]  Haralambos Mouratidis,et al.  Modelling secure multiagent systems , 2003, AAMAS '03.

[5]  Lars Rasmusson,et al.  Simulated social control for secure Internet commerce , 1996, NSPW '96.

[6]  Gio Wiederhold,et al.  Mediators in the architecture of future information systems , 1992, Computer.

[7]  Esmiralda Moradian,et al.  Software Security Engineering Monitoring and Control , 2011, ICSE 2011.

[8]  Qi He,et al.  Personal security agent: KQML-based PKI , 1998, AGENTS '98.

[9]  Haralambos Mouratidis,et al.  Multi-agent Systems and Security Requirements Analysis , 2003, SELMAS.

[10]  William M. Farmer,et al.  Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.

[11]  Nicholas R. Jennings,et al.  The Gaia Methodology for Agent-Oriented Analysis and Design , 2000, Autonomous Agents and Multi-Agent Systems.

[12]  Nicholas R. Jennings,et al.  Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.

[13]  Stefan Poslad,et al.  The FIPA-OS agent platform: Open Source for Open Standards , 2006 .

[14]  Levente Buttyán,et al.  On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.

[15]  Nicholas R. Jennings,et al.  A methodology for agent-oriented analysis and design , 1999, AGENTS '99.

[16]  Paulo S. C. Alencar,et al.  Software Engineering for Multi-Agent Systems II , 2004 .

[17]  A. Roadmapof A Roadmap of Agent Research and Development , 1995 .

[18]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[19]  Esmiralda Moradian Security of E-Commerce Software Systems , 2013 .

[20]  Katia P. Sycara,et al.  Adding security and trust to multiagent systems , 2000, Appl. Artif. Intell..

[21]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[22]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[23]  J. Galliers A theoretical framework for computer models of cooperative dialogue, acknowledging multiagent conflict , 1988 .

[24]  Tim Finin,et al.  Secret Agents - A Security Architecture for the KQML Agent Communication Language , 1995, CIKM 1995.

[25]  Agostino Poggi,et al.  Developing Multi-agent Systems with JADE , 2007, ATAL.

[26]  所 真理雄,et al.  ICMAS-96 : proceedings Second International Conference on Multi-Agent Systems, December 10-13, 1996, Kyoto, Japan , 1996 .

[27]  M. Bouaziz,et al.  An Introduction to Computer Security , 2012 .

[28]  Niklas Borselius,et al.  Security in Multi-Agent Systems , 2002 .

[29]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[30]  Barr and Feigenbaum Edward A. Avron The Handbook of Artificial Intelligence , 1981 .

[31]  Jeffrey S. Rosenschein,et al.  Deals Among Rational Agents , 1985, IJCAI.

[32]  Bernard Burg,et al.  Towards the deployment of an open Agent World , 2000, JFIADSMA.

[33]  David Stuart Robertson,et al.  A review of attacks and security approaches in open multi-agent systems , 2012, Artificial Intelligence Review.

[34]  M. R. Genesereth,et al.  Knowledge Interchange Format Version 3.0 Reference Manual , 1992, LICS 1992.

[35]  Onn Shehory,et al.  A Framework for Evaluating Agent-Oriented Methodologies , 2003, AOIS.

[36]  Fred B. Schneider,et al.  Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.

[37]  Stefan Poslad,et al.  Towards improved trust and security in FIPA agent platforms , 2004 .

[38]  Vesna Hassler Security Fundamentals for E-Commerce , 2000 .

[39]  Franco Zambonelli,et al.  Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology , 1999, MAAMAW.

[40]  Amirreza Masoumzadeh,et al.  A survey of security issue in multi-agent systems , 2011, Artificial Intelligence Review.

[41]  Fritz Hohl A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.

[42]  Jeffrey M. Bradshaw,et al.  An introduction to software agents , 1997 .