Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System

  • Kenichi Takahashi
  • Yoshiki Mitsuyuki
  • Tsunenori Mine
  • Kouichi Sakurai
  • Makoto Amamiya
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5044)


Recently, several community-based systems have been developed; however, almost all such systems have been developed as Web-server-based systems. Thus, server administrator can easily eavesdrop on user communications, since they have to send/receive information through the server. Therefore, we propose multi-agent-based peer-to-peer (P2P) system wherein each peer manages his/her information and exchanges it with other peers directly. This, thus, resolves the problems posed by Web-server-based systems; however, we have to consider attacks from malicious third parties. This study designs and implements security protocols/mechanisms for a hierarchical community-based multi-agent system. Furthermore, if we consider a practical use case, we should be able to demonstrate that the proposed system can be implemented by combining it with existing security techniques for more reliable and rapid deployment. Finally, we evaluate the performance of the proposed security system and present an example application.


Mobile Agent Mutual Authentication Security Mechanism Secret Information Message Authentication Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Berket, K., Essiari, A., Muratas, A.: PKI-Based Security for Peer-to-Peer Information Sharing. In: Proc. of 4th International Conference on Peer-to-Peer Computing, pp. 45–52 (2004)Google Scholar
  2. 2.
    Business Mall,
  3. 3.
    Detsch, A., Gaspary, L., Barcellos, M., Cavalheiro, G.: Towards a Flexible Security Framework for Peer-to-Peer based Grid Computing. In: Proc. of the 2nd workshop on Middleware for grid computing, pp. 52–56 (2004)Google Scholar
  4. 4.
    FIPA MAS Security white paper,
  5. 5.
  6. 6.
  7. 7.
    Gunupudi, V., Tate, S.R.: SAgent: A Security Framework for JADE. In: Proc. of 5th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1116–1118 (2006)Google Scholar
  8. 8.
    Java Cryptography Extension (JCE),
  9. 9.
  10. 10.
    McDonald, T., Yasinsac, A.: Application Security Models for Mobile Agent Systems. In: Proc. of International Workshop on Security and Trust Management, pp. 38–53 (2005)Google Scholar
  11. 11.
    Mine, T., Matsuno, D., Kogo, A., Amamiya, M.: Design and implementation of agent community based peer-to-peer information retrieval method. In: Klusch, M., Ossowski, S., Kashyap, V., Unland, R. (eds.) CIA 2004. LNCS (LNAI), vol. 3191, pp. 31–46. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
  13. 13.
    Poslad, S., Calisti, M., Charlton, P.: Specifying standard security mechanisms in multi-agent systems. In: Falcone, R., Barber, S., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS, vol. 2631, pp. 227–237. Springer, Heidelberg (2003)Google Scholar
  14. 14.
    Project JXTA,
  15. 15.
    Tian, H., Zou, S., Wang, W., Cheng, S.: A group based reputation system for P2P networks. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 342–351. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  16. 16.
    Tsai, J., Ma, L.: Security Modeling of Mobile Agent Systems. J. of Ubiquitous Computing and Intelligence 1, 73–85 (2007)CrossRefGoogle Scholar
  17. 17.
    Wallach, D.: A survey of peer-to-peer security issues. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 253–258. Springer, Heidelberg (2003)Google Scholar
  18. 18.
    Zhong, G., Amamiya, S., Takahashi, K., Mine, T., Amamiya, M.: The Design and Implementation of KODAMA System. IEICE Transactions INF. & SYST.  E85-D(4), 637–646 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Kenichi Takahashi
    • 1
  • Yoshiki Mitsuyuki
    • 2
  • Tsunenori Mine
    • 2
  • Kouichi Sakurai
    • 1
    • 2
  • Makoto Amamiya
    • 2
  1. 1.Institute of Systems & Information Technologies/KYUSHUFukuokaJapan
  2. 2.Faculty of Information Science and Electrical EngineeringKyushu UniversityFukuokaJapan

Personalised recommendations