Skip to main content

Securing Multi-agent Systems: A Survey

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 176))

Abstract

We look at various security aspects of multi-agent systems that are often overlooked by developers designing such systems. We look at some of the key security challenges in multi-agent systems. We focus on techniques that help to ensure that security of multi-agent systems is not compromised.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Special issue on multi-agent and distributed information security. IET Information Security 4(4), 185–421 (December 2010) ISSN 1751-8709

    Google Scholar 

  2. Beautement, P., Allsopp, D.N., Greaves, M., Goldsmith, S., Spires, S.V., Thompson, S.G., Janicke, H.: Autonomous Agents and Multi –agent Systems (AAMAS) for the Military - Issues and Challenges. In: Thompson, S.G., Ghanea-Hercock, R. (eds.) DAMAS 2005. LNCS (LNAI), vol. 3890, pp. 1–13. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Becerra, G.: A security pattern for multi-agent systems. In: Proc. of ATS 2003, pp. 142–153 (2003)

    Google Scholar 

  4. Bergenti, F., Poggi, A.: Multi-agent systems for e-health: recent projects and initiatives. In: 10th Int. Workshop on Objects and Agents (2009)

    Google Scholar 

  5. Bibu, G.D.: Security in the context of multi-agent systems (Extended Abstract). In: Yolum, Tumer, Stone, Sonenberg (eds.) Proc. of 10th Int. Conf. on Autonomous Agents and Multiagent Systems, AAMAS 2011, Taipei, Taiwan, May 26, pp. 1339–1340 (2011)

    Google Scholar 

  6. Biskup, J., Kern-Isberner, G., Thimm, M.: Towards Enforcement of Confidentiality in Agent Interactions. In: Proceedings of the Twelfth International Workshop on Non-Monotonic Reasoning (2008)

    Google Scholar 

  7. Boella, G., van der Torre, L.W.N.: Permission and Authorization in Policies for Virtual Communities of Agents. In: Moro, G., Bergamaschi, S., Aberer, K. (eds.) AP2PC 2004. LNCS (LNAI), vol. 3601, pp. 86–97. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Borelius, N.: Multi-agent system security for mobile communication, PhD Thesis, Royal Holloway, University of London (2003)

    Google Scholar 

  9. Borelius, N.: Mobile agent security. IET Electronics and Communication Engineering Journal 14(5), 211–218 (2002)

    Article  Google Scholar 

  10. Bresciani, P., Giorgini, P., Mouratidis, H.: On security requirements analysis for multi-agent systems. In: Second Int. Workshop on Software Engineering for Large-Scale Multi-Agent Systems, SELMAS, Portland, Oregon (2003)

    Google Scholar 

  11. Bresciani, P., Giorgini, P., Mouratidis, H., Manson, G.: Multi-agent Systems and Security Requirements Analysis. In: Lucena, C., Garcia, A., Romanovsky, A., Castro, J., Alencar, P.S.C. (eds.) SELMAS 2003. LNCS, vol. 2940, pp. 35–48. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Chi Wong, H., Sycara, K.: Adding security and trust to multi-agent systems. Applied Artificial Intelligence 14(9), 927–941 (2000)

    Article  Google Scholar 

  13. Cremonini, M., Omicini, A., Zambonelli, F.: Multi-Agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology. In: Garijo, F.J., Boman, M. (eds.) MAAMAW 1999. LNCS, vol. 1647, pp. 77–88. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  14. Endusuleit, R., Calmet, J.: A security analysis on JADE(-S) V. 3.2. In: Proceedings of NORDSEC, pp. 20–28 (2005)

    Google Scholar 

  15. Endusuleit, R., Mie, T.: Secure multi-agent computations. In: Proc. of Int. Conf. on Security and Management, vol. 1, pp. 149–155 (2003)

    Google Scholar 

  16. Endusuleit, R., Wagner, A.: Possible Attacks on and Countermeasures for Secure Multi-Agent Computation. In: Proceedings of the International Conference on Security and Management, SAM 2004, pp. 221–227, Las Vegas, Nevada, USA. CSREA Press (2004) ISBN 1-932415-37-8

    Google Scholar 

  17. Fasli, M.: On agent technology for e-commerce: trust, security, and legal issues. Knowl. Eng. Rev. 22, 3–35 (2007)

    Article  Google Scholar 

  18. Fatih, T.: Developing a security mechanism for software agents, M.Sc Thesis, Izmir Institute of Technology (2006)

    Google Scholar 

  19. Ferber, J., Gutknecht, O.: A meta-model for the analysis and design of organizations in multi-agent systems. In: Proc. International Conference on Multi Agent Systems, pp. 128–135 (1998)

    Google Scholar 

  20. Ferber, J., Gutknecht, O., Michel, F.: From Agents to Organizations: An Organizational View of Multi-agent Systems. In: Giorgini, P., Müller, J.P., Odell, J.J. (eds.) AOSE 2003. LNCS, vol. 2935, pp. 214–230. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  21. Fernandes, D.L., Saboia, V.F.S., De Castro, M.F., De Souza, J.N.: A secure mobile agents platform based on a peer-to-peer infrastructure. In: Int. Conf. on Networking, Systems and Mobile Communications and Learning Technologies, pp. 186–189 (2006)

    Google Scholar 

  22. Foner, L.N.: A security architecture for multi-agent matchmaking. In: Proc. of Second International Conference on Multi-Agent System, Mario Tokoro (1996)

    Google Scholar 

  23. Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: Multiapplication authentication based on multi-agent system. IAENG Int. J. Comput. Sci. 33(2), 37–42 (2007)

    Google Scholar 

  24. Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. In: Ghose, A., Governatori, G., Sadananda, R. (eds.) PRIMA 2007. LNCS, vol. 5044, pp. 339–348. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  25. Garrigues, C., Robles, S., Borrell, J., Navarro-Arribas, G.: Promoting the development of secure mobile agent applications. J. Syst. Softw. 83(6), 959–971 (2010)

    Article  Google Scholar 

  26. Gerhard, W. (ed.): Multiagent Systems, A Modern Approach to Distributed Artificial Intelligence. MIT Press (1999) ISBN 0-262-23203-0

    Google Scholar 

  27. Gokce, B., Laleci, D.A., Olduz, M., Tasyurt, I., Yuksel, M., Okcan, A.: SAPHIRE: a multi-agent system for remote healthcare monitoring through computerized clini- cal guidelines. In: Series, W. (ed.) Agent Technology and e-Health 2008. Agent Technology and e-Health Whilestan Series in Software Agent Technologies. Springer and Autonomic Computing, pp. 25–44 (2008)

    Google Scholar 

  28. Gray, R.S.: Agent Tcl: A flexible and secure mobile-agent system. PhD Thesis, Dartmouth College (June 1997)

    Google Scholar 

  29. Gray, R.S., Kotz, D., Cybenko, G., Rus, D.: D’Agents: Security in a Multiple-Language, Mobile-Agent System. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 154–187. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  30. Gunupudi, V., Tate, S.R.: SAgent: a security framework for JADE. In: Proc. Fifth Int. Joint Conf. on Autonomous Agents and Multiagent Systems, pp. 1116–1118 (2006)

    Google Scholar 

  31. Hu, Y.-J., Tang, C.-W.: Agent Oriented Public Key Infrastructure for Multi-Agent E-service. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol. 2773, pp. 1215–1221. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  32. Ismail, L.: A secure mobile agents platform. J. Commun. 3(2), 12 (2008)

    Google Scholar 

  33. Jacques, F.: Multi-Agent Systems: An Introduction to Artificial Intelligence. Addison-Wesley (1999) ISBN 0-201-36048-9

    Google Scholar 

  34. Jaiswal, A., Kim, Y., Gini, M.: Design and Implementation of a Secure Multi-Agent Marketplace. Electronic Commerce Research and Applications 3(4), 355–368 (2004)

    Article  Google Scholar 

  35. Janicke, H.T.: The development of secure multi-agent systems. PhD Thesis. De Montfort University (2007)

    Google Scholar 

  36. Karnick, N.M., Tripathi, A.R.: Security in the Ajanta Mobile Agent System. Software Practice and Experience 31(4), 301–329 (2001)

    Article  Google Scholar 

  37. Karygiannis, T., Jansen, W.: Mobile agent security. Technical Report NIST SP 800-19, National Institute of Standards and Technology (1999)

    Google Scholar 

  38. Karygiannis, A., Antonakakis, E.: Security and Privacy Issues in Agent-Based Location-Aware Mobile Commerce. In: Barley, M., Mouratidis, H., Unruh, A., Spears, D., Scerri, P., Massacci, F. (eds.) SASEMAS 2004-2006. LNCS, vol. 4324, pp. 308–329. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  39. Laleci, G.B., Dogac, A., Olduz, M., Tasyurt, I., Yusel, M., Okcan, A.: SAPHIRE: A Multi-Agent System for Remote Healthcare Monitoring through Computerized Clinical Guidelines, Project Deliverable. METU, Turkey

    Google Scholar 

  40. Liau, C.-J.: Belief, information acquisition and trust in multi-agent systems - A model logic formulation. Artificial Intelligence, 31–60 (2003)

    Google Scholar 

  41. Malik, N.S., Kupzog, F., Sonntag, M.: An Approach to Secure Mobile Agents in Automatic Meter Reading. In: Proc. of International Conference on Cyberworlds, pp. 187–193 (2010)

    Google Scholar 

  42. Mamadou, T.K., Shimazu, A., Nakajima, T.: The State of the Art in Agent Communication Languages (ACL). Knowledge and Information Systems Journal (KAIS) 2(2), 1–26 (2000)

    Google Scholar 

  43. Maña, A., Muñoz, A., Serrano, D.: Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence. In: Indulska, J., Ma, J., Yang, L.T., Ungerer, T., Cao, J. (eds.) UIC 2007. LNCS, vol. 4611, pp. 1201–1212. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  44. Martínez-García, C., Navarro-Arribas, G., Borrell, J., Martín-Campillo, A.: An Access Control Scheme for Multi-agent Systems over Multi-Domain Environments. In: Demazeau, Y., Pavón, J., Corchado, J.M., Bajo, J. (eds.) PAAMS 2009. AISC, vol. 55, pp. 401–410. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  45. Marques, P., Silva, L., Silva, J.: Security mechanisms for using mobile agents in electronic commerce. In: 18th IEEE Symp. on Reliable Distributed Systems, Lausanne, Switzerland (1999)

    Google Scholar 

  46. McDonald, J.T., Yasinsac, A.: Trust in Mobile Agent Systems, Florida State University. Tech. Rep. (2005)

    Google Scholar 

  47. Moradian, E., Håkansson, A.: Approach to Solving Security Problems Using Meta-Agents in Multi Agent System. In: Nguyen, N.T., Jo, G.-S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. LNCS (LNAI), vol. 4953, pp. 122–131. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  48. Mouratidis, H., Giorgini, P.: Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems. In: Barley, M., Mouratidis, H., Unruh, A., Spears, D., Scerri, P., Massacci, F. (eds.) SASEMAS 2004-2006. LNCS, vol. 4324, pp. 8–26. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  49. Mouratidis, H., Giorgini, P., Mason, G.: Modelling secure multiagent systems. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 859–866 (2003)

    Google Scholar 

  50. Novák, P., Rollo, M., Hodík, J., Vlcek, T.: Communication Security in Multi-agent Systems. In: Mařík, V., Müller, J.P., Pěchouček, M. (eds.) CEEMAS 2003. LNCS (LNAI), vol. 2691, pp. 454–463. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  51. Pechoucek, M., Marik, V.: Industrial deployment of multi-agent technologies: review and selected case studies. Auton. Agent Multi-Agent Syst. 17, 397–431 (2008)

    Article  Google Scholar 

  52. Poslad, S., Charlton, P., Calisti, M.: Specifying Standard Security Mechanisms in Multi-agent Systems. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 163–176. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  53. Ramchurn, S.D., Dong, H., Jennings, N.R.: Trust in multiagent systems. The Knowledge Engineering Review 19(01), 1–25 (2004)

    Article  Google Scholar 

  54. Ramchurn, S.D., Jennings, N.R.: Trust in agent-based software. Cyber Trust and Crime Prevention Project, Review

    Google Scholar 

  55. Ramchurn, S.D.: Multi-agent negotiation using trust and persuasion. PhD Thesis, University of Southampton (2004)

    Google Scholar 

  56. Rashvand, H.F., Salah, K., Calero, J.M.A., Harn, L.: Distributed security for multi-agent systems - review and applications. IET Inf. Secur. 4(4), 188–201 (2010)

    Article  Google Scholar 

  57. Rindebck, C.: Designing and maintaining trustworthy online services. Blekinge Institute of Technology Licentiate Dissertation Series No 2007:08, Sweden (2007) ISSN 1650-2140, ISBN 978-91-7295-120-4

    Google Scholar 

  58. Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-Theoretic and Logical Foundations. Cambridge University Press (2008) ISBN 9780521899437

    Google Scholar 

  59. Sulaiman, R., Sharma, D., Ma, W., Tran, D.: A Multi-agent Security Framework for e-Health Services. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol. 4693, pp. 547–554. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  60. Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K., Amamiya, M.: Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System. In: Ghose, A., Governatori, G., Sadananda, R. (eds.) PRIMA 2007. LNCS, vol. 5044, pp. 134–145. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  61. Tweedalea, J., Ichalkaranjeb, N., Sioutisb, C., Jarvisb, B., Consolib, A., Phillips- Wrenc, G.: Innovations in multi-agent systems. Comput. Appl. 30, 1089–1115 (2007)

    Google Scholar 

  62. Van Dyke Parunak, H.: Agents in Overalls: Experiences and Issues in the Development and Deployment of Industrial Agent-Based Systems. Expanded version of invited talk at PAAM (1999)

    Google Scholar 

  63. Van Dyke Parunak, H.: A Practitioners’ Review of Industrial Agent Applications. Autonomous Agents and Multi-agent Systems 3(4), 389–407 (2000)

    Article  Google Scholar 

  64. van ’t Noordende, G.J., Brazier, F.M.T., Tanenbaum, A.S., Security in a Mobile Agent System. In: IEEE First Symposium on Multi-Agent Security and Survivability, pp. 35–45 (2004)

    Google Scholar 

  65. Vigna, G. (ed.): Mobile Agents and Security. LNCS, vol. 1419, pp. 3–540. Springer, Heidelberg (1998)

    Google Scholar 

  66. Vila, X., Schuster, A., Riera, A.: Security for a multi-agent system based on JADE. Comput. Sec. 26, 391–400 (2007)

    Article  Google Scholar 

  67. Vitabile, S., Conti, V., Militello, C., Sorbello, F.: An extended JADE-S based framework for developing secure multiagent systems. Comput. Stand. Interfaces 31, 913–930 (2009)

    Article  Google Scholar 

  68. Webber, C.G., De Fatima, M., Lima, W.P., Casa, M.E., Ribiero, A.M.: Towards securing e-learning applications: A multiagent platform. Journal of Software 2(1), 60–69 (2007)

    Article  Google Scholar 

  69. Woolridge, M.: An Introduction to Multi-agent Systems. John Wiley and Sons (2002) ISBN 0-471-49691-X

    Google Scholar 

  70. Xiao, L., Peet, A., Lewis, P., et al.: An adaptive security model for multi-agent systems and application to a clinical trials environment. In: 31st IEEE Annual Int. Computer Software and Applications Conf., COMPSAC 2007 (2007)

    Google Scholar 

  71. Xu, K.: Mobile agent security through multi-agent cryptographic protocols. PhD Thesis, University of North Texas (2004)

    Google Scholar 

  72. Zhao, S., Liu, H., Sun, Z.: Scalable trust in multi-agent e-commerce system. In: Int. Symp. on Electronic Commerce and Security, pp. 990–993 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nagaraj, S.V. (2012). Securing Multi-agent Systems: A Survey. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31513-8_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31512-1

  • Online ISBN: 978-3-642-31513-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics