Abstract
We look at various security aspects of multi-agent systems that are often overlooked by developers designing such systems. We look at some of the key security challenges in multi-agent systems. We focus on techniques that help to ensure that security of multi-agent systems is not compromised.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Special issue on multi-agent and distributed information security. IET Information Security 4(4), 185–421 (December 2010) ISSN 1751-8709
Beautement, P., Allsopp, D.N., Greaves, M., Goldsmith, S., Spires, S.V., Thompson, S.G., Janicke, H.: Autonomous Agents and Multi –agent Systems (AAMAS) for the Military - Issues and Challenges. In: Thompson, S.G., Ghanea-Hercock, R. (eds.) DAMAS 2005. LNCS (LNAI), vol. 3890, pp. 1–13. Springer, Heidelberg (2006)
Becerra, G.: A security pattern for multi-agent systems. In: Proc. of ATS 2003, pp. 142–153 (2003)
Bergenti, F., Poggi, A.: Multi-agent systems for e-health: recent projects and initiatives. In: 10th Int. Workshop on Objects and Agents (2009)
Bibu, G.D.: Security in the context of multi-agent systems (Extended Abstract). In: Yolum, Tumer, Stone, Sonenberg (eds.) Proc. of 10th Int. Conf. on Autonomous Agents and Multiagent Systems, AAMAS 2011, Taipei, Taiwan, May 26, pp. 1339–1340 (2011)
Biskup, J., Kern-Isberner, G., Thimm, M.: Towards Enforcement of Confidentiality in Agent Interactions. In: Proceedings of the Twelfth International Workshop on Non-Monotonic Reasoning (2008)
Boella, G., van der Torre, L.W.N.: Permission and Authorization in Policies for Virtual Communities of Agents. In: Moro, G., Bergamaschi, S., Aberer, K. (eds.) AP2PC 2004. LNCS (LNAI), vol. 3601, pp. 86–97. Springer, Heidelberg (2005)
Borelius, N.: Multi-agent system security for mobile communication, PhD Thesis, Royal Holloway, University of London (2003)
Borelius, N.: Mobile agent security. IET Electronics and Communication Engineering Journal 14(5), 211–218 (2002)
Bresciani, P., Giorgini, P., Mouratidis, H.: On security requirements analysis for multi-agent systems. In: Second Int. Workshop on Software Engineering for Large-Scale Multi-Agent Systems, SELMAS, Portland, Oregon (2003)
Bresciani, P., Giorgini, P., Mouratidis, H., Manson, G.: Multi-agent Systems and Security Requirements Analysis. In: Lucena, C., Garcia, A., Romanovsky, A., Castro, J., Alencar, P.S.C. (eds.) SELMAS 2003. LNCS, vol. 2940, pp. 35–48. Springer, Heidelberg (2004)
Chi Wong, H., Sycara, K.: Adding security and trust to multi-agent systems. Applied Artificial Intelligence 14(9), 927–941 (2000)
Cremonini, M., Omicini, A., Zambonelli, F.: Multi-Agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology. In: Garijo, F.J., Boman, M. (eds.) MAAMAW 1999. LNCS, vol. 1647, pp. 77–88. Springer, Heidelberg (1999)
Endusuleit, R., Calmet, J.: A security analysis on JADE(-S) V. 3.2. In: Proceedings of NORDSEC, pp. 20–28 (2005)
Endusuleit, R., Mie, T.: Secure multi-agent computations. In: Proc. of Int. Conf. on Security and Management, vol. 1, pp. 149–155 (2003)
Endusuleit, R., Wagner, A.: Possible Attacks on and Countermeasures for Secure Multi-Agent Computation. In: Proceedings of the International Conference on Security and Management, SAM 2004, pp. 221–227, Las Vegas, Nevada, USA. CSREA Press (2004) ISBN 1-932415-37-8
Fasli, M.: On agent technology for e-commerce: trust, security, and legal issues. Knowl. Eng. Rev. 22, 3–35 (2007)
Fatih, T.: Developing a security mechanism for software agents, M.Sc Thesis, Izmir Institute of Technology (2006)
Ferber, J., Gutknecht, O.: A meta-model for the analysis and design of organizations in multi-agent systems. In: Proc. International Conference on Multi Agent Systems, pp. 128–135 (1998)
Ferber, J., Gutknecht, O., Michel, F.: From Agents to Organizations: An Organizational View of Multi-agent Systems. In: Giorgini, P., Müller, J.P., Odell, J.J. (eds.) AOSE 2003. LNCS, vol. 2935, pp. 214–230. Springer, Heidelberg (2004)
Fernandes, D.L., Saboia, V.F.S., De Castro, M.F., De Souza, J.N.: A secure mobile agents platform based on a peer-to-peer infrastructure. In: Int. Conf. on Networking, Systems and Mobile Communications and Learning Technologies, pp. 186–189 (2006)
Foner, L.N.: A security architecture for multi-agent matchmaking. In: Proc. of Second International Conference on Multi-Agent System, Mario Tokoro (1996)
Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: Multiapplication authentication based on multi-agent system. IAENG Int. J. Comput. Sci. 33(2), 37–42 (2007)
Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. In: Ghose, A., Governatori, G., Sadananda, R. (eds.) PRIMA 2007. LNCS, vol. 5044, pp. 339–348. Springer, Heidelberg (2009)
Garrigues, C., Robles, S., Borrell, J., Navarro-Arribas, G.: Promoting the development of secure mobile agent applications. J. Syst. Softw. 83(6), 959–971 (2010)
Gerhard, W. (ed.): Multiagent Systems, A Modern Approach to Distributed Artificial Intelligence. MIT Press (1999) ISBN 0-262-23203-0
Gokce, B., Laleci, D.A., Olduz, M., Tasyurt, I., Yuksel, M., Okcan, A.: SAPHIRE: a multi-agent system for remote healthcare monitoring through computerized clini- cal guidelines. In: Series, W. (ed.) Agent Technology and e-Health 2008. Agent Technology and e-Health Whilestan Series in Software Agent Technologies. Springer and Autonomic Computing, pp. 25–44 (2008)
Gray, R.S.: Agent Tcl: A flexible and secure mobile-agent system. PhD Thesis, Dartmouth College (June 1997)
Gray, R.S., Kotz, D., Cybenko, G., Rus, D.: D’Agents: Security in a Multiple-Language, Mobile-Agent System. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 154–187. Springer, Heidelberg (1998)
Gunupudi, V., Tate, S.R.: SAgent: a security framework for JADE. In: Proc. Fifth Int. Joint Conf. on Autonomous Agents and Multiagent Systems, pp. 1116–1118 (2006)
Hu, Y.-J., Tang, C.-W.: Agent Oriented Public Key Infrastructure for Multi-Agent E-service. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol. 2773, pp. 1215–1221. Springer, Heidelberg (2003)
Ismail, L.: A secure mobile agents platform. J. Commun. 3(2), 12 (2008)
Jacques, F.: Multi-Agent Systems: An Introduction to Artificial Intelligence. Addison-Wesley (1999) ISBN 0-201-36048-9
Jaiswal, A., Kim, Y., Gini, M.: Design and Implementation of a Secure Multi-Agent Marketplace. Electronic Commerce Research and Applications 3(4), 355–368 (2004)
Janicke, H.T.: The development of secure multi-agent systems. PhD Thesis. De Montfort University (2007)
Karnick, N.M., Tripathi, A.R.: Security in the Ajanta Mobile Agent System. Software Practice and Experience 31(4), 301–329 (2001)
Karygiannis, T., Jansen, W.: Mobile agent security. Technical Report NIST SP 800-19, National Institute of Standards and Technology (1999)
Karygiannis, A., Antonakakis, E.: Security and Privacy Issues in Agent-Based Location-Aware Mobile Commerce. In: Barley, M., Mouratidis, H., Unruh, A., Spears, D., Scerri, P., Massacci, F. (eds.) SASEMAS 2004-2006. LNCS, vol. 4324, pp. 308–329. Springer, Heidelberg (2009)
Laleci, G.B., Dogac, A., Olduz, M., Tasyurt, I., Yusel, M., Okcan, A.: SAPHIRE: A Multi-Agent System for Remote Healthcare Monitoring through Computerized Clinical Guidelines, Project Deliverable. METU, Turkey
Liau, C.-J.: Belief, information acquisition and trust in multi-agent systems - A model logic formulation. Artificial Intelligence, 31–60 (2003)
Malik, N.S., Kupzog, F., Sonntag, M.: An Approach to Secure Mobile Agents in Automatic Meter Reading. In: Proc. of International Conference on Cyberworlds, pp. 187–193 (2010)
Mamadou, T.K., Shimazu, A., Nakajima, T.: The State of the Art in Agent Communication Languages (ACL). Knowledge and Information Systems Journal (KAIS) 2(2), 1–26 (2000)
Maña, A., Muñoz, A., Serrano, D.: Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 1201–1212. Springer, Heidelberg (2007)
Martínez-García, C., Navarro-Arribas, G., Borrell, J., Martín-Campillo, A.: An Access Control Scheme for Multi-agent Systems over Multi-Domain Environments. In: Demazeau, Y., Pavón, J., Corchado, J.M., Bajo, J. (eds.) PAAMS 2009. AISC, vol. 55, pp. 401–410. Springer, Heidelberg (2009)
Marques, P., Silva, L., Silva, J.: Security mechanisms for using mobile agents in electronic commerce. In: 18th IEEE Symp. on Reliable Distributed Systems, Lausanne, Switzerland (1999)
McDonald, J.T., Yasinsac, A.: Trust in Mobile Agent Systems, Florida State University. Tech. Rep. (2005)
Moradian, E., Håkansson, A.: Approach to Solving Security Problems Using Meta-Agents in Multi Agent System. In: Nguyen, N.T., Jo, G.-S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. LNCS (LNAI), vol. 4953, pp. 122–131. Springer, Heidelberg (2008)
Mouratidis, H., Giorgini, P.: Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems. In: Barley, M., Mouratidis, H., Unruh, A., Spears, D., Scerri, P., Massacci, F. (eds.) SASEMAS 2004-2006. LNCS, vol. 4324, pp. 8–26. Springer, Heidelberg (2009)
Mouratidis, H., Giorgini, P., Mason, G.: Modelling secure multiagent systems. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 859–866 (2003)
Novák, P., Rollo, M., Hodík, J., Vlcek, T.: Communication Security in Multi-agent Systems. In: Mařík, V., Müller, J.P., Pěchouček, M. (eds.) CEEMAS 2003. LNCS (LNAI), vol. 2691, pp. 454–463. Springer, Heidelberg (2003)
Pechoucek, M., Marik, V.: Industrial deployment of multi-agent technologies: review and selected case studies. Auton. Agent Multi-Agent Syst. 17, 397–431 (2008)
Poslad, S., Charlton, P., Calisti, M.: Specifying Standard Security Mechanisms in Multi-agent Systems. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 163–176. Springer, Heidelberg (2003)
Ramchurn, S.D., Dong, H., Jennings, N.R.: Trust in multiagent systems. The Knowledge Engineering Review 19(01), 1–25 (2004)
Ramchurn, S.D., Jennings, N.R.: Trust in agent-based software. Cyber Trust and Crime Prevention Project, Review
Ramchurn, S.D.: Multi-agent negotiation using trust and persuasion. PhD Thesis, University of Southampton (2004)
Rashvand, H.F., Salah, K., Calero, J.M.A., Harn, L.: Distributed security for multi-agent systems - review and applications. IET Inf. Secur. 4(4), 188–201 (2010)
Rindebck, C.: Designing and maintaining trustworthy online services. Blekinge Institute of Technology Licentiate Dissertation Series No 2007:08, Sweden (2007) ISSN 1650-2140, ISBN 978-91-7295-120-4
Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-Theoretic and Logical Foundations. Cambridge University Press (2008) ISBN 9780521899437
Sulaiman, R., Sharma, D., Ma, W., Tran, D.: A Multi-agent Security Framework for e-Health Services. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol. 4693, pp. 547–554. Springer, Heidelberg (2007)
Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K., Amamiya, M.: Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System. In: Ghose, A., Governatori, G., Sadananda, R. (eds.) PRIMA 2007. LNCS, vol. 5044, pp. 134–145. Springer, Heidelberg (2009)
Tweedalea, J., Ichalkaranjeb, N., Sioutisb, C., Jarvisb, B., Consolib, A., Phillips- Wrenc, G.: Innovations in multi-agent systems. Comput. Appl. 30, 1089–1115 (2007)
Van Dyke Parunak, H.: Agents in Overalls: Experiences and Issues in the Development and Deployment of Industrial Agent-Based Systems. Expanded version of invited talk at PAAM (1999)
Van Dyke Parunak, H.: A Practitioners’ Review of Industrial Agent Applications. Autonomous Agents and Multi-agent Systems 3(4), 389–407 (2000)
van ’t Noordende, G.J., Brazier, F.M.T., Tanenbaum, A.S., Security in a Mobile Agent System. In: IEEE First Symposium on Multi-Agent Security and Survivability, pp. 35–45 (2004)
Vigna, G. (ed.): Mobile Agents and Security. LNCS, vol. 1419, pp. 3–540. Springer, Heidelberg (1998)
Vila, X., Schuster, A., Riera, A.: Security for a multi-agent system based on JADE. Comput. Sec. 26, 391–400 (2007)
Vitabile, S., Conti, V., Militello, C., Sorbello, F.: An extended JADE-S based framework for developing secure multiagent systems. Comput. Stand. Interfaces 31, 913–930 (2009)
Webber, C.G., De Fatima, M., Lima, W.P., Casa, M.E., Ribiero, A.M.: Towards securing e-learning applications: A multiagent platform. Journal of Software 2(1), 60–69 (2007)
Woolridge, M.: An Introduction to Multi-agent Systems. John Wiley and Sons (2002) ISBN 0-471-49691-X
Xiao, L., Peet, A., Lewis, P., et al.: An adaptive security model for multi-agent systems and application to a clinical trials environment. In: 31st IEEE Annual Int. Computer Software and Applications Conf., COMPSAC 2007 (2007)
Xu, K.: Mobile agent security through multi-agent cryptographic protocols. PhD Thesis, University of North Texas (2004)
Zhao, S., Liu, H., Sun, Z.: Scalable trust in multi-agent e-commerce system. In: Int. Symp. on Electronic Commerce and Security, pp. 990–993 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nagaraj, S.V. (2012). Securing Multi-agent Systems: A Survey. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-642-31513-8_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31512-1
Online ISBN: 978-3-642-31513-8
eBook Packages: EngineeringEngineering (R0)