Securing Multi-agent Systems: A Survey

  • S. V. Nagaraj
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)

Abstract

We look at various security aspects of multi-agent systems that are often overlooked by developers designing such systems. We look at some of the key security challenges in multi-agent systems. We focus on techniques that help to ensure that security of multi-agent systems is not compromised.

Keywords

Security Multi-agent systems Design Implementation Applications 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Special issue on multi-agent and distributed information security. IET Information Security 4(4), 185–421 (December 2010) ISSN 1751-8709Google Scholar
  2. 2.
    Beautement, P., Allsopp, D.N., Greaves, M., Goldsmith, S., Spires, S.V., Thompson, S.G., Janicke, H.: Autonomous Agents and Multi –agent Systems (AAMAS) for the Military - Issues and Challenges. In: Thompson, S.G., Ghanea-Hercock, R. (eds.) DAMAS 2005. LNCS (LNAI), vol. 3890, pp. 1–13. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  3. 3.
    Becerra, G.: A security pattern for multi-agent systems. In: Proc. of ATS 2003, pp. 142–153 (2003)Google Scholar
  4. 4.
    Bergenti, F., Poggi, A.: Multi-agent systems for e-health: recent projects and initiatives. In: 10th Int. Workshop on Objects and Agents (2009)Google Scholar
  5. 5.
    Bibu, G.D.: Security in the context of multi-agent systems (Extended Abstract). In: Yolum, Tumer, Stone, Sonenberg (eds.) Proc. of 10th Int. Conf. on Autonomous Agents and Multiagent Systems, AAMAS 2011, Taipei, Taiwan, May 26, pp. 1339–1340 (2011)Google Scholar
  6. 6.
    Biskup, J., Kern-Isberner, G., Thimm, M.: Towards Enforcement of Confidentiality in Agent Interactions. In: Proceedings of the Twelfth International Workshop on Non-Monotonic Reasoning (2008)Google Scholar
  7. 7.
    Boella, G., van der Torre, L.W.N.: Permission and Authorization in Policies for Virtual Communities of Agents. In: Moro, G., Bergamaschi, S., Aberer, K. (eds.) AP2PC 2004. LNCS (LNAI), vol. 3601, pp. 86–97. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Borelius, N.: Multi-agent system security for mobile communication, PhD Thesis, Royal Holloway, University of London (2003)Google Scholar
  9. 9.
    Borelius, N.: Mobile agent security. IET Electronics and Communication Engineering Journal 14(5), 211–218 (2002)CrossRefGoogle Scholar
  10. 10.
    Bresciani, P., Giorgini, P., Mouratidis, H.: On security requirements analysis for multi-agent systems. In: Second Int. Workshop on Software Engineering for Large-Scale Multi-Agent Systems, SELMAS, Portland, Oregon (2003)Google Scholar
  11. 11.
    Bresciani, P., Giorgini, P., Mouratidis, H., Manson, G.: Multi-agent Systems and Security Requirements Analysis. In: Lucena, C., Garcia, A., Romanovsky, A., Castro, J., Alencar, P.S.C. (eds.) SELMAS 2003. LNCS, vol. 2940, pp. 35–48. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Chi Wong, H., Sycara, K.: Adding security and trust to multi-agent systems. Applied Artificial Intelligence 14(9), 927–941 (2000)CrossRefGoogle Scholar
  13. 13.
    Cremonini, M., Omicini, A., Zambonelli, F.: Multi-Agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology. In: Garijo, F.J., Boman, M. (eds.) MAAMAW 1999. LNCS, vol. 1647, pp. 77–88. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  14. 14.
    Endusuleit, R., Calmet, J.: A security analysis on JADE(-S) V. 3.2. In: Proceedings of NORDSEC, pp. 20–28 (2005)Google Scholar
  15. 15.
    Endusuleit, R., Mie, T.: Secure multi-agent computations. In: Proc. of Int. Conf. on Security and Management, vol. 1, pp. 149–155 (2003)Google Scholar
  16. 16.
    Endusuleit, R., Wagner, A.: Possible Attacks on and Countermeasures for Secure Multi-Agent Computation. In: Proceedings of the International Conference on Security and Management, SAM 2004, pp. 221–227, Las Vegas, Nevada, USA. CSREA Press (2004) ISBN 1-932415-37-8 Google Scholar
  17. 17.
    Fasli, M.: On agent technology for e-commerce: trust, security, and legal issues. Knowl. Eng. Rev. 22, 3–35 (2007)CrossRefGoogle Scholar
  18. 18.
    Fatih, T.: Developing a security mechanism for software agents, M.Sc Thesis, Izmir Institute of Technology (2006)Google Scholar
  19. 19.
    Ferber, J., Gutknecht, O.: A meta-model for the analysis and design of organizations in multi-agent systems. In: Proc. International Conference on Multi Agent Systems, pp. 128–135 (1998)Google Scholar
  20. 20.
    Ferber, J., Gutknecht, O., Michel, F.: From Agents to Organizations: An Organizational View of Multi-agent Systems. In: Giorgini, P., Müller, J.P., Odell, J.J. (eds.) AOSE 2003. LNCS, vol. 2935, pp. 214–230. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  21. 21.
    Fernandes, D.L., Saboia, V.F.S., De Castro, M.F., De Souza, J.N.: A secure mobile agents platform based on a peer-to-peer infrastructure. In: Int. Conf. on Networking, Systems and Mobile Communications and Learning Technologies, pp. 186–189 (2006)Google Scholar
  22. 22.
    Foner, L.N.: A security architecture for multi-agent matchmaking. In: Proc. of Second International Conference on Multi-Agent System, Mario Tokoro (1996)Google Scholar
  23. 23.
    Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: Multiapplication authentication based on multi-agent system. IAENG Int. J. Comput. Sci. 33(2), 37–42 (2007)Google Scholar
  24. 24.
    Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. In: Ghose, A., Governatori, G., Sadananda, R. (eds.) PRIMA 2007. LNCS, vol. 5044, pp. 339–348. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  25. 25.
    Garrigues, C., Robles, S., Borrell, J., Navarro-Arribas, G.: Promoting the development of secure mobile agent applications. J. Syst. Softw. 83(6), 959–971 (2010)CrossRefGoogle Scholar
  26. 26.
    Gerhard, W. (ed.): Multiagent Systems, A Modern Approach to Distributed Artificial Intelligence. MIT Press (1999) ISBN 0-262-23203-0Google Scholar
  27. 27.
    Gokce, B., Laleci, D.A., Olduz, M., Tasyurt, I., Yuksel, M., Okcan, A.: SAPHIRE: a multi-agent system for remote healthcare monitoring through computerized clini- cal guidelines. In: Series, W. (ed.) Agent Technology and e-Health 2008. Agent Technology and e-Health Whilestan Series in Software Agent Technologies. Springer and Autonomic Computing, pp. 25–44 (2008)Google Scholar
  28. 28.
    Gray, R.S.: Agent Tcl: A flexible and secure mobile-agent system. PhD Thesis, Dartmouth College (June 1997)Google Scholar
  29. 29.
    Gray, R.S., Kotz, D., Cybenko, G., Rus, D.: D’Agents: Security in a Multiple-Language, Mobile-Agent System. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 154–187. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  30. 30.
    Gunupudi, V., Tate, S.R.: SAgent: a security framework for JADE. In: Proc. Fifth Int. Joint Conf. on Autonomous Agents and Multiagent Systems, pp. 1116–1118 (2006)Google Scholar
  31. 31.
    Hu, Y.-J., Tang, C.-W.: Agent Oriented Public Key Infrastructure for Multi-Agent E-service. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol. 2773, pp. 1215–1221. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  32. 32.
    Ismail, L.: A secure mobile agents platform. J. Commun. 3(2), 12 (2008)Google Scholar
  33. 33.
    Jacques, F.: Multi-Agent Systems: An Introduction to Artificial Intelligence. Addison-Wesley (1999) ISBN 0-201-36048-9Google Scholar
  34. 34.
    Jaiswal, A., Kim, Y., Gini, M.: Design and Implementation of a Secure Multi-Agent Marketplace. Electronic Commerce Research and Applications 3(4), 355–368 (2004)CrossRefGoogle Scholar
  35. 35.
    Janicke, H.T.: The development of secure multi-agent systems. PhD Thesis. De Montfort University (2007)Google Scholar
  36. 36.
    Karnick, N.M., Tripathi, A.R.: Security in the Ajanta Mobile Agent System. Software Practice and Experience 31(4), 301–329 (2001)CrossRefGoogle Scholar
  37. 37.
    Karygiannis, T., Jansen, W.: Mobile agent security. Technical Report NIST SP 800-19, National Institute of Standards and Technology (1999)Google Scholar
  38. 38.
    Karygiannis, A., Antonakakis, E.: Security and Privacy Issues in Agent-Based Location-Aware Mobile Commerce. In: Barley, M., Mouratidis, H., Unruh, A., Spears, D., Scerri, P., Massacci, F. (eds.) SASEMAS 2004-2006. LNCS, vol. 4324, pp. 308–329. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  39. 39.
    Laleci, G.B., Dogac, A., Olduz, M., Tasyurt, I., Yusel, M., Okcan, A.: SAPHIRE: A Multi-Agent System for Remote Healthcare Monitoring through Computerized Clinical Guidelines, Project Deliverable. METU, TurkeyGoogle Scholar
  40. 40.
    Liau, C.-J.: Belief, information acquisition and trust in multi-agent systems - A model logic formulation. Artificial Intelligence, 31–60 (2003)Google Scholar
  41. 41.
    Malik, N.S., Kupzog, F., Sonntag, M.: An Approach to Secure Mobile Agents in Automatic Meter Reading. In: Proc. of International Conference on Cyberworlds, pp. 187–193 (2010)Google Scholar
  42. 42.
    Mamadou, T.K., Shimazu, A., Nakajima, T.: The State of the Art in Agent Communication Languages (ACL). Knowledge and Information Systems Journal (KAIS) 2(2), 1–26 (2000)Google Scholar
  43. 43.
    Maña, A., Muñoz, A., Serrano, D.: Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 1201–1212. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  44. 44.
    Martínez-García, C., Navarro-Arribas, G., Borrell, J., Martín-Campillo, A.: An Access Control Scheme for Multi-agent Systems over Multi-Domain Environments. In: Demazeau, Y., Pavón, J., Corchado, J.M., Bajo, J. (eds.) PAAMS 2009. AISC, vol. 55, pp. 401–410. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  45. 45.
    Marques, P., Silva, L., Silva, J.: Security mechanisms for using mobile agents in electronic commerce. In: 18th IEEE Symp. on Reliable Distributed Systems, Lausanne, Switzerland (1999)Google Scholar
  46. 46.
    McDonald, J.T., Yasinsac, A.: Trust in Mobile Agent Systems, Florida State University. Tech. Rep. (2005)Google Scholar
  47. 47.
    Moradian, E., Håkansson, A.: Approach to Solving Security Problems Using Meta-Agents in Multi Agent System. In: Nguyen, N.T., Jo, G.-S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. LNCS (LNAI), vol. 4953, pp. 122–131. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  48. 48.
    Mouratidis, H., Giorgini, P.: Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems. In: Barley, M., Mouratidis, H., Unruh, A., Spears, D., Scerri, P., Massacci, F. (eds.) SASEMAS 2004-2006. LNCS, vol. 4324, pp. 8–26. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  49. 49.
    Mouratidis, H., Giorgini, P., Mason, G.: Modelling secure multiagent systems. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 859–866 (2003)Google Scholar
  50. 50.
    Novák, P., Rollo, M., Hodík, J., Vlcek, T.: Communication Security in Multi-agent Systems. In: Mařík, V., Müller, J.P., Pěchouček, M. (eds.) CEEMAS 2003. LNCS (LNAI), vol. 2691, pp. 454–463. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  51. 51.
    Pechoucek, M., Marik, V.: Industrial deployment of multi-agent technologies: review and selected case studies. Auton. Agent Multi-Agent Syst. 17, 397–431 (2008)CrossRefGoogle Scholar
  52. 52.
    Poslad, S., Charlton, P., Calisti, M.: Specifying Standard Security Mechanisms in Multi-agent Systems. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 163–176. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  53. 53.
    Ramchurn, S.D., Dong, H., Jennings, N.R.: Trust in multiagent systems. The Knowledge Engineering Review 19(01), 1–25 (2004)CrossRefGoogle Scholar
  54. 54.
    Ramchurn, S.D., Jennings, N.R.: Trust in agent-based software. Cyber Trust and Crime Prevention Project, ReviewGoogle Scholar
  55. 55.
    Ramchurn, S.D.: Multi-agent negotiation using trust and persuasion. PhD Thesis, University of Southampton (2004)Google Scholar
  56. 56.
    Rashvand, H.F., Salah, K., Calero, J.M.A., Harn, L.: Distributed security for multi-agent systems - review and applications. IET Inf. Secur. 4(4), 188–201 (2010)CrossRefGoogle Scholar
  57. 57.
    Rindebck, C.: Designing and maintaining trustworthy online services. Blekinge Institute of Technology Licentiate Dissertation Series No 2007:08, Sweden (2007) ISSN 1650-2140, ISBN 978-91-7295-120-4Google Scholar
  58. 58.
    Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-Theoretic and Logical Foundations. Cambridge University Press (2008) ISBN 9780521899437Google Scholar
  59. 59.
    Sulaiman, R., Sharma, D., Ma, W., Tran, D.: A Multi-agent Security Framework for e-Health Services. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol. 4693, pp. 547–554. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  60. 60.
    Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K., Amamiya, M.: Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System. In: Ghose, A., Governatori, G., Sadananda, R. (eds.) PRIMA 2007. LNCS, vol. 5044, pp. 134–145. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  61. 61.
    Tweedalea, J., Ichalkaranjeb, N., Sioutisb, C., Jarvisb, B., Consolib, A., Phillips- Wrenc, G.: Innovations in multi-agent systems. Comput. Appl. 30, 1089–1115 (2007)Google Scholar
  62. 62.
    Van Dyke Parunak, H.: Agents in Overalls: Experiences and Issues in the Development and Deployment of Industrial Agent-Based Systems. Expanded version of invited talk at PAAM (1999)Google Scholar
  63. 63.
    Van Dyke Parunak, H.: A Practitioners’ Review of Industrial Agent Applications. Autonomous Agents and Multi-agent Systems 3(4), 389–407 (2000)CrossRefGoogle Scholar
  64. 64.
    van ’t Noordende, G.J., Brazier, F.M.T., Tanenbaum, A.S., Security in a Mobile Agent System. In: IEEE First Symposium on Multi-Agent Security and Survivability, pp. 35–45 (2004)Google Scholar
  65. 65.
    Vigna, G. (ed.): Mobile Agents and Security. LNCS, vol. 1419, pp. 3–540. Springer, Heidelberg (1998)Google Scholar
  66. 66.
    Vila, X., Schuster, A., Riera, A.: Security for a multi-agent system based on JADE. Comput. Sec. 26, 391–400 (2007)CrossRefGoogle Scholar
  67. 67.
    Vitabile, S., Conti, V., Militello, C., Sorbello, F.: An extended JADE-S based framework for developing secure multiagent systems. Comput. Stand. Interfaces 31, 913–930 (2009)CrossRefGoogle Scholar
  68. 68.
    Webber, C.G., De Fatima, M., Lima, W.P., Casa, M.E., Ribiero, A.M.: Towards securing e-learning applications: A multiagent platform. Journal of Software 2(1), 60–69 (2007)CrossRefGoogle Scholar
  69. 69.
    Woolridge, M.: An Introduction to Multi-agent Systems. John Wiley and Sons (2002) ISBN 0-471-49691-XGoogle Scholar
  70. 70.
    Xiao, L., Peet, A., Lewis, P., et al.: An adaptive security model for multi-agent systems and application to a clinical trials environment. In: 31st IEEE Annual Int. Computer Software and Applications Conf., COMPSAC 2007 (2007)Google Scholar
  71. 71.
    Xu, K.: Mobile agent security through multi-agent cryptographic protocols. PhD Thesis, University of North Texas (2004)Google Scholar
  72. 72.
    Zhao, S., Liu, H., Sun, Z.: Scalable trust in multi-agent e-commerce system. In: Int. Symp. on Electronic Commerce and Security, pp. 990–993 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • S. V. Nagaraj
    • 1
  1. 1.Dept. of Computer ScienceRMK Engineering CollegeKavaraipettaiIndia

Personalised recommendations