Abstract
Multi-agent systems allow a multitude of heterogenous systems to collaborate in a simple manner. It is easy to provide and gather information, distribute work and coordinate tasks without bothering with the differences of the underlying systems. Unfortunately, multiple networking and security problems arise from the dynamic behavior of multi-agent systems and the distributed heterogeneous environments in which they are used. With our work we provide a solution enabling secure collaboration and agent execution as well as agent mobility in multi-hop environments. We achieve this by using a secure unstructured P2P framework as communication layer and integrate it with a well known multi-agent system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
van Dyke Parunak, H., Brueckner, S., Sauter, J.: Digital pheromone mechanisms for coordination of unmanned vehicles. In: AAMAS 2002: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 449–450. ACM, New York (2002)
Maturana, F.P., Staron, R.J., Hall, K.H.: Methodologies and tools for intelligent agents in distributed control. IEEE Intelligent Systems 20(1), 42–49 (2005)
Picard, G., Bernon, C., Gleizes, M.P.: Etto: Emergent timetabling by cooperative self-organization. In: Brueckner, S.A., Di Marzo Serugendo, G., Hales, D., Zambonelli, F. (eds.) ESOA 2005. LNCS (LNAI), vol. 3910, pp. 31–45. Springer, Heidelberg (2006)
George, J.P., Gleizes, M.P., Glize, P., Regis, C.: Real-time simulation for flood forecast: an adaptive multi-agent system staff. In: AISB 2003: Proceedings of the 3rd Symposium on Adaptive Agents and Multi-Agent Systems, pp. 7–11 (2003)
Schurr, N., Marecki, J., Tambe, M., Scerri, P.: The future of disaster response: Humans working with multiagent teams using defacto. In: AAAI Spring Symposium on AI Technologies for Homeland Security (2005)
Jansen, W.A.: Countermeasures for mobile agent security. Computer Communications 23(17), 1667–1676 (2000)
Wallach, D.S.: A survey of peer-to-peer security issues. In: International Symposium on Software Security, pp. 42–57 (2002)
Campadello, S.: Peer-to-peer security in mobile devices: A user perspective. In: P2P 2004: Proceedings of the Fourth International Conference on Peer-to-Peer Computing, pp. 252–257. IEEE Computer Society, Los Alamitos (2004)
Mondal, A., Kitsuregawa, M.: Privacy, security and trust in p2p environments: A perspective. In: Bressan, S., Küng, J., Wagner, R. (eds.) DEXA 2006. LNCS, vol. 4080, pp. 682–686. Springer, Heidelberg (2006)
Lundberg, J.: Routing security in ad hoc networks. Technical Report 501, Helsinki University of Technology (2000)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986. IEEE, Los Alamitos (2003)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM, New York (2002)
Aberer, K., Datta, A., Hauswirth, M.: A decentralized public key infrastructure for customer-to-customer e-commerce. International Journal of Business Process Integration and Management 1(1), 26–33 (2005)
Lesueur, F., Me, L., Tong, V.: An efficient distributed PKI for structured P2P networks. In: P2P 2009. IEEE Ninth International Conference on Peer-to-Peer Computing, September 2009, pp. 1–10 (2009)
Cholez, T., Chrisment, I., Festor, O.: A distributed and adaptive revocation mechanism for p2p networks. In: ICN 2008: Proceedings of the Seventh International Conference on Networking, pp. 290–295. IEEE Computer Society, Los Alamitos (2008)
Kraxberger, S., Payer, U.: Security concept for peer-to-peer systems. In: IWCMC 2009: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pp. 931–936. ACM, New York (2009)
Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wirel. Netw. 13(1), 27–59 (2007)
JADE Board: Jade security add-on guide. Technical report, TILAB S.p.A (2005)
Vila, X., Schuster, A., Riera, A.: Security for a multi-agent system based on jade. Computers and Security 26(5), 391–400 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kraxberger, S., Danner, P., Hein, D. (2010). Secure Multi-Agent System for Multi-Hop Environments. In: Kotenko, I., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2010. Lecture Notes in Computer Science, vol 6258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14706-7_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-14706-7_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14705-0
Online ISBN: 978-3-642-14706-7
eBook Packages: Computer ScienceComputer Science (R0)