Skip to main content

Security Provision for the Internet of Intelligence Using Autonomous Mobile Agents

  • Chapter
  • First Online:
From Internet of Things to Internet of Intelligence

Abstract

An environment for devices to collect, process, and communicate information is made possible by the Internet of Intelligence. The data that is shared could be private, sensitive, financial, or necessary for regular business operations. Using intrusion detection and prevention techniques is necessary to prevent unauthorized access and ensure the proper operation of the Internet of Intelligence. Intrusion detection is frequently used as a second line of defense to safeguard computer networks, in addition to intrusion prevention techniques such as authentication, firewalls, and cryptography that are used as a first line of defense. The crucial topic of security management is the main emphasis of this chapter. One of the most important issues in network security management today is intrusion detection. A few current systems are reexamined to highlight their benefits and drawbacks. The technology of multi-agent systems can be helpful for effectively developing and maintaining secured networks. Features such as autonomy, adaptability, and flexibility of the intelligent agent system allow the management of wireless network evolution in a more controlled way.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. K. Indermaur, Baby steps. Byte, 97–104 (1995)

    Google Scholar 

  2. G. O’Hares, N. Jennings, Foundations of Distributed Artificial Intelligence (Wiley, 1996)

    Google Scholar 

  3. K. Boudaoud, H. Labiod, J. Labetoulle, Towards a New Approach for Intrusion Detection with Intelligent Agents (Eurecome Institute Corporate and Mobile Communications Laboratories, Sophia- Antipolis, 2000)

    Google Scholar 

  4. K. Alagha, H. Labiod, A new approach towards an adaptive wireless ATM network. ACM MONET J., Baltzer Publishers 4(2) (1999)

    Google Scholar 

  5. R. Heady, G. Luger, A. Maccabe, M. Servilla, The Architecture of a Network Level Intrusion Detection System: Technical Report (University of New Mexico, Department of Computer Science, 1990)

    Book  Google Scholar 

  6. L.T. Heberlein, B. Mukherjee, K.N. Levitt, Network intrusion detection. IEEE Netw. J. 8, 26–41 (1994)

    Article  Google Scholar 

  7. K. Price, Intrusion Detection Pages, Purdue University, http://www.cs.purdue.edu/coast/intrusion-detection/ids.html.1998

  8. G.B. White, E.A. Fisch, U.W. Pooch, Co-operating security managers: A peer-based intrusion detection system. IEEE Netw. J. 10, 20–23 (1996)

    Article  Google Scholar 

  9. N.R. Jennings, K. Sycara, M.J. Wooldridge, A Roadmap of Agent Research and Development: Autonomous Agents and Multi-Agent Systems (1998)

    Google Scholar 

  10. M.N. Huhns, Multi-agent Systems. Tutorial at the European Agent Systems Summer School (EASSS’99) (1999)

    Google Scholar 

  11. I. Satoh, Building reusable mobile agents for network management. IEEE J. (2003)

    Google Scholar 

  12. M. Wooldridge, N.R. Jennings, Intelligent agents: Theory and practice. Knowl. Eng. Rev. 10, 115 (1995)

    Article  Google Scholar 

  13. B. Bieszczad, T. Pagurek, T. White, Mobile agents for network management. IEEE Commun. Surv. 1, 2 (1998)

    Article  Google Scholar 

  14. T.C. Du, E.Y. Li, A.P. Chang, Mobile agents in distributed network management. Commun. ACM 46, 127 (2003)

    Article  Google Scholar 

  15. C. Bohoris, G. Pavlou, H. Cruickshank, Using mobile agents for network performance management, in Proceedings of the IFIP/ IEEE, Network Operations and Management Symposium (NOMS’00), (Hawaii, U.S.A, 2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marcel Ohanga Odhiambo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Odhiambo, M.O., Mwashita, W. (2024). Security Provision for the Internet of Intelligence Using Autonomous Mobile Agents. In: Odhiambo, M.O., Mwashita, W. (eds) From Internet of Things to Internet of Intelligence. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-031-55718-7_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-55718-7_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-55717-0

  • Online ISBN: 978-3-031-55718-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics