Skip to main content

Secure Multi-Agent System for Multi-Hop Environments

  • Conference paper
Book cover Computer Network Security (MMM-ACNS 2010)

Abstract

Multi-agent systems allow a multitude of heterogenous systems to collaborate in a simple manner. It is easy to provide and gather information, distribute work and coordinate tasks without bothering with the differences of the underlying systems. Unfortunately, multiple networking and security problems arise from the dynamic behavior of multi-agent systems and the distributed heterogeneous environments in which they are used. With our work we provide a solution enabling secure collaboration and agent execution as well as agent mobility in multi-hop environments. We achieve this by using a secure unstructured P2P framework as communication layer and integrate it with a well known multi-agent system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. van Dyke Parunak, H., Brueckner, S., Sauter, J.: Digital pheromone mechanisms for coordination of unmanned vehicles. In: AAMAS 2002: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 449–450. ACM, New York (2002)

    Chapter  Google Scholar 

  2. Maturana, F.P., Staron, R.J., Hall, K.H.: Methodologies and tools for intelligent agents in distributed control. IEEE Intelligent Systems 20(1), 42–49 (2005)

    Google Scholar 

  3. Picard, G., Bernon, C., Gleizes, M.P.: Etto: Emergent timetabling by cooperative self-organization. In: Brueckner, S.A., Di Marzo Serugendo, G., Hales, D., Zambonelli, F. (eds.) ESOA 2005. LNCS (LNAI), vol. 3910, pp. 31–45. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. George, J.P., Gleizes, M.P., Glize, P., Regis, C.: Real-time simulation for flood forecast: an adaptive multi-agent system staff. In: AISB 2003: Proceedings of the 3rd Symposium on Adaptive Agents and Multi-Agent Systems, pp. 7–11 (2003)

    Google Scholar 

  5. Schurr, N., Marecki, J., Tambe, M., Scerri, P.: The future of disaster response: Humans working with multiagent teams using defacto. In: AAAI Spring Symposium on AI Technologies for Homeland Security (2005)

    Google Scholar 

  6. Jansen, W.A.: Countermeasures for mobile agent security. Computer Communications 23(17), 1667–1676 (2000)

    Article  Google Scholar 

  7. Wallach, D.S.: A survey of peer-to-peer security issues. In: International Symposium on Software Security, pp. 42–57 (2002)

    Google Scholar 

  8. Campadello, S.: Peer-to-peer security in mobile devices: A user perspective. In: P2P 2004: Proceedings of the Fourth International Conference on Peer-to-Peer Computing, pp. 252–257. IEEE Computer Society, Los Alamitos (2004)

    Chapter  Google Scholar 

  9. Mondal, A., Kitsuregawa, M.: Privacy, security and trust in p2p environments: A perspective. In: Bressan, S., Küng, J., Wagner, R. (eds.) DEXA 2006. LNCS, vol. 4080, pp. 682–686. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Lundberg, J.: Routing security in ad hoc networks. Technical Report 501, Helsinki University of Technology (2000)

    Google Scholar 

  11. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  12. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986. IEEE, Los Alamitos (2003)

    Google Scholar 

  13. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM, New York (2002)

    Chapter  Google Scholar 

  14. Aberer, K., Datta, A., Hauswirth, M.: A decentralized public key infrastructure for customer-to-customer e-commerce. International Journal of Business Process Integration and Management 1(1), 26–33 (2005)

    Article  Google Scholar 

  15. Lesueur, F., Me, L., Tong, V.: An efficient distributed PKI for structured P2P networks. In: P2P 2009. IEEE Ninth International Conference on Peer-to-Peer Computing, September 2009, pp. 1–10 (2009)

    Google Scholar 

  16. Cholez, T., Chrisment, I., Festor, O.: A distributed and adaptive revocation mechanism for p2p networks. In: ICN 2008: Proceedings of the Seventh International Conference on Networking, pp. 290–295. IEEE Computer Society, Los Alamitos (2008)

    Chapter  Google Scholar 

  17. Kraxberger, S., Payer, U.: Security concept for peer-to-peer systems. In: IWCMC 2009: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pp. 931–936. ACM, New York (2009)

    Google Scholar 

  18. Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wirel. Netw. 13(1), 27–59 (2007)

    Article  Google Scholar 

  19. JADE Board: Jade security add-on guide. Technical report, TILAB S.p.A (2005)

    Google Scholar 

  20. Vila, X., Schuster, A., Riera, A.: Security for a multi-agent system based on jade. Computers and Security 26(5), 391–400 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kraxberger, S., Danner, P., Hein, D. (2010). Secure Multi-Agent System for Multi-Hop Environments. In: Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2010. Lecture Notes in Computer Science, vol 6258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14706-7_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14706-7_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14705-0

  • Online ISBN: 978-3-642-14706-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics