A Distributed Security Approach for Intelligent Mobile Multiagent Systems

Part of the Studies in Computational Intelligence book series (SCI, volume 486)


Intelligent systems are used for many difficult problems solving, like: clinical decision support, health status monitoring of humans etc. The intelligence could give to a system advantages versus a system that does not have intelligence. Software mobile agents as network-computing technology has been applied for various distributed problems solving like: ubiquitous healthcare, network administration etc. The endowment of mobile agents with intelligence is difficult. Another difficulty in mobile multiagent systems consists in the limited security of mobile agents against networks sources, other agents and hosts. In this chapter a novel mobile agent architecture called IntelligMobAg (Complex Intelligent Mobile Agent Architecture) is proposed. IntelligMobAg represents an extension of a previous mobile agent architecture called ICMA [(Iantovics in A new intelligent mobile multiagent system. IEEE Computer Society Press, Silver Spring, pp. 53–159, 2005), (Iantovics in A novel mobile agent architecture. Acta Universitatis Apulensis, Alba Iulia, vol. 11, pp. 295–306, 2006)]. The purpose of the proposal consists in the limitation of some disadvantages related with security and intelligence of an ICMA agent by including in the static part of an evolutionary subagent. In this chapter we will present some preliminary results related with the increased security and intelligence that emerge in a cooperative multiagent system formed by agents endowed with the proposed architecture.


Computational intelligence Intelligent system Cooperation Evolution Learning Software mobile agent Security in mobile multiagent systems Complex system 



The research was supported by the project “Transnational Network for Integrated Management of Postdoctoral Research in Communicating Sciences. Institutional building (postdoctoral school) and fellowships program (CommScie)”-POSDRU/89/1.5/S/63663, financed under the Sectoral Operational Programme Human Resources Development 2007–2013. The work of Bogdan Crainicu was supported by the Bilateral Cooperation Research Project between Romania and Slovakia (2011–2012) entitled: Hybrid Medical Complex Systems, Institute of Informatics of the Slovak Academy of Sciences and Petru Maior University.


  1. 1.
    Iantovics, B.: A new intelligent mobile multiagent system. In: Proceedings of the IEEE International Workshop on Soft Computing Applications. Szeged-Hungary and Arad-Romania, IEEE Computer Society Press, pp. 53–159 (2005)Google Scholar
  2. 2.
    Iantovics, B.: A novel mobile agent architecture, vol. 11, pp. 295–306. Acta Universitatis Apulensis, Alba Iulia (2006)Google Scholar
  3. 3.
    Iantovics, B.: Cooperative medical diagnoses elaboration by physicians and artificial agents. In: Aziz-Alaoui, M.A., Bertelle C., Cotsaftis M. (eds.) Proceedings of the Conference Emergent Properties in Natural and Artificial Complex Systems. Dresden, Germany, 2007, pp. 181–205. Le Havre University Press, Paris (2007)Google Scholar
  4. 4.
    Weiss, G.: (ed.), Multiagent systems: a modern approach to distributed artificial intelligence. MIT Press, Cambridge Massachusetts London (2000)Google Scholar
  5. 5.
    Ferber, J.: Multi-agent systems, an introduction to distributed artificial intelligence. Addison Wesley (1999)Google Scholar
  6. 6.
    Zamfirescu, C.B.: An Agent-Oriented Approach for Supporting Self-Facilitation in Group Decisions. Studies in informatics and control 12(2), 137–148 (2004)Google Scholar
  7. 7.
    Zamfirescu, C.B., Filip, F.: Supporting self-facilitation in distributed group decisions. In: Proceedings 13th International Workshop on Database and Expert Systems Applications, DEXA’02, Aix-en-Provence, France, pp. 321–325. IEEE Computer Society Press (2002)Google Scholar
  8. 8.
    Wayner, P.: Free agents, Byte, March 105–114 (1995)Google Scholar
  9. 9.
    Kirn, St.: Ubiquitous healthcare: The onkonet mobile agents architecture. In: Aksit, M., Mezini, M., Unland, R. (eds.) Proceedings of the 3.rd International Conference Netobjectdays. Objects, Components, Architectures, Services, and Applications for a Networked World (NODe 2002), vol. LNCS 2591. Springer, Germany (2003)Google Scholar
  10. 10.
    Gulyas, L., Kovacs, L., Micsik, A., Pataki, B., Zsamboki, I.: An overview of mobile software systems, department of distributed systems. In: Computer and Automation Research Institute of the Hungarian Academy of Sciences, Mta Sztaki Technical Report TR 2000–2001 (2001)Google Scholar
  11. 11.
    Yang, K, Galis, A, Guo, X, Liu, D.Y.: Rule-driven mobile intelligent agents for real-time configuration of IP networks. , In: Palade, V and Howlett, RJ and Jain, L, (eds.) Knowledge-Based Intelligent Information and Engineering Systems, Pt 1 Proceedings, pp. 921–928, Springer, Berlin, (2003)Google Scholar
  12. 12.
    McGrath, S., Chacón, D., Whitebread, K.: Intelligent mobile agents in military command and control. Autonomous Agents Workshop (2000)Google Scholar
  13. 13.
    Chen, B., Liu, W.: Mobile agent computing paradigm for building a flexible structural health monitoring sensor network. Comput.-Aid. Civil Infrastruct. Eng., 25(7), 504–516 (2010)Google Scholar
  14. 14.
    Nestinger, S.S., Cheng, H.H.: Flexible vision: mobile agent approach to distributed vision sensor fusion, IEEE Robot. Autom. Mag. 17(3), 66–77 (2010)Google Scholar
  15. 15.
    Chen, B., Cheng, H.H., Palen, J.: Integrating mobile agent technology with multi-agent systems for distributed traffic detection and management systems, Transp. Res. Part C: Emer. Technol., 17(1), February, 1–10 (2009)Google Scholar
  16. 16.
    Nestinger, S.S., Chen, B., Cheng, H.H.: A mobile agent-based framework for flexible control of multi-robotic systems, proceedings of the ASME 31th mechanisms and robotics conference, pp. 4–7. Las Vegas, Nevada (2007)Google Scholar
  17. 17.
    Sander, T., Tschudin, C.F.: Protecting Mobile agents against malicious hosts. In: Vigna G. (ed.), Mobile Agents and Security, pp. 44–60 Springer (1998)Google Scholar
  18. 18.
    Vigna, G.: Protecting mobile agents through tracing. In: Proceedings of the Third ECOOP Workshop on Operating System Support for Mobile Object Systems, Finland, pp. 137–153 (1997)Google Scholar
  19. 19.
    Nwana, H.S.: Software agents: an overview, knowledge engineering review, vol. 11(3), pp. 205–244. Cambridge University Press, Cambridge (1996)Google Scholar
  20. 20.
    Borselius, N.: Mobile agent security. Electron. Commun. Eng. J. 14(5), 211–218 (2002)CrossRefGoogle Scholar
  21. 21.
    Kowalczyk, R., Braun, P., Mueller, I., Rossak, W., Franczyk, B., Speck, A.: Deploying mobile and intelligent agents in interconnected e-marketplaces. J. Int. Des. Process Sci. Trans. SDPS 7(3), 109–123 (2003)Google Scholar
  22. 22.
    Ku, H., Luderer, G.W., Subbiah, B., An intelligent mobile agent framework for distributed network management. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’97), Phoenix USA, November (1997)Google Scholar
  23. 23.
    Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code, In: Proceedings of IEEE Symposium on Security and Privacy, pp. 2–11. Oakland, May (2001) Google Scholar
  24. 24.
    Necula, G.: Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 106–119. New York, Jan (1997)Google Scholar
  25. 25.
    Gong, M., Mueller, H., Prafullchandra, R. Schemers.: Going beyond the sandbox: an overview of the new security architecture in the java development kit 1.2. In: USENIX Symposium on Internet Technologies and Systems, Monterey, December (1997)Google Scholar
  26. 26.
    Wahbe, R., Lucco, S., Anderson, T., Graham, S.: Efficient software based fault isolation. In: Proceedings ACM Symposium on Operating System Principles, Dec, pp. 203–216, (1993)Google Scholar
  27. 27.
    Malik, N.S., Ko, D., Cheng, H.H.: A secure migration process for mobile agents. Softw. Pract. Experience 48(1), 87–101 (2011)CrossRefGoogle Scholar
  28. 28.
    Yee, B.: A sanctuary for mobile agents. In: Vitek J., Jensen C. (eds.), Secure Internet Programming, vol. LNCS 1603, pp. 261–274, Springer, New York (1999)Google Scholar
  29. 29.
    Young, A., Yung, M.: Encryption tools for mobile agents: sliding encryption. In: Biham E. (ed.): Fast Software Encryption. Proceedings of the 4th International Workshop FSE 1997, vol. LNCS 1267, pp. 230–241. Springer, Haifa (1997)Google Scholar
  30. 30.
    Pattee, H.H.: The complementary principle in biological and social structures. J Soc Biol Struct 1, 191–200 (1978)CrossRefGoogle Scholar
  31. 31.
    Riordan, J., Schneier, B.: Environmental key generation towards clueless agents. Vigna G. (ed.) Mobile Agents and Security, pp. 15–24 Springer (1998)Google Scholar
  32. 32.
    Ahmed, T.M.: Using secure-image mechanism to protect mobile agent against malicious hosts. World Acad. Sci. Eng. Technol. 35, 439–444 (2009)Google Scholar
  33. 33.
    Abdelhamid, Q., Samuel, P., Hanifa, B.: A security protocol for mobile agents based upon the cooperation of sedentary agents. J. Network Comput. Appl. 30(3), 1228–1243 (2007)CrossRefGoogle Scholar
  34. 34.
    Karnik, N.M. Tripathi, A.R.: A security architecture for mobile agents in Ajanta, In: Proceedings of the 20th International Conference on Distributed Computing Systems, pp. 402–409 (2000)Google Scholar
  35. 35.
    Iantovics, B., Zamfirescu, C.B.: ERMS: an evolutionary reorganizing multiagent system. Int. J. Innovative Comput. Inf. Control 9(3), 1171–1188 (2013)Google Scholar
  36. 36.
    Back, T., Fogel, D.B., Michalevitz, Z.: Handbook of evolutionary computation. Institute of Physics, Oxford University Press, New York (1997)CrossRefGoogle Scholar
  37. 37.
    Dumitrescu, D., Lazzerini, B., Jain, L., Dumitrescu, A.: Evolutionary computing. CRC Press, Boca Raton (2000)Google Scholar
  38. 38.
    Fogel, D.B.: Evolutionary computation, toward a new philosophy of machine intelligence. IEEE Press, New York (2000)Google Scholar
  39. 39.
    Erfurth, C., Braun, P., Rossak, W.R.: Migration intelligence for mobile agents. In: proceedings of Artificial Intelligence and the Simulation of Behavior Symposium on Software Mobility and Adaptive Behavior (AISB’01), pp. 81–88. University of York, United Kingdom (2001)Google Scholar
  40. 40.
    Erfurth, C., Rossak, W.R.: Autonomous itinerary planning for mobile agents. In: Proceedings of the Third Symposium on Adaptive Agents and Multi-Agent Systems (AISB’03). pp. 120–125. University of Wales, Aberystwyth (2003)Google Scholar
  41. 41.
    Erfurth, C., Rossak, W.R.: Characterization and management of dynamical behavior in a system with mobile agents, in proceedings of the international workshop on innovative internet computing system-second, vol. LNCS, 2346, pp. 109–119. Kühlungsborn Germany (2002)Google Scholar
  42. 42.
    Pfeifer, R., Scheier, C.:. Understanding intelligence. MIT Press, September (1999)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.Department of InformaticsPetru Maior University of TgMuresRomania

Personalised recommendations