International Journal of Soft Computing

Year: 2015
Volume: 10
Issue: 2
Page No. 99 - 109

Attacks and Security Solutions for Agent Communication in Multi-Agent Systems

Authors : Olumide Simeon Ogunnusi and Shukor Abd Razak

References

Ahmed, T.M., 2010. Generate secure mobile agent by using SMS to protect Hosts. Proceedings of the IEEE/ACS International Conference on Computer Systems and Applications, May 16-19, 2010, Hammamet, Tunisia, pp: 1-4.

Becerra, G., 2003. A security pattern for multi-agent systems. Proceedings of Agent Based Technologies and Systems, August 2003, Calgary, Canada, pp: 142-153.

Bijani, S. and D. Robertson, 2012. A review of attacks and security approaches in open multi-agent systems. Artif. Intell. Rev., 10.1007/s10462-012-9343-1

Borselius, N. and C.J. Mitchell, 2003. Securing FIPA agent communication. Proceedings of the International Conference on Security and Management, June 23-26, 2003, Las Vegas, USA., pp: 135-141.

Burg, B., 2002. Foundation for intelligent physical agents. FIPA, Geneva, Switzerland. http://pegasus.javeriana.edu.co/~mad/Fipa%20Presentacion.pdf.

Cavalcante, R.C., I.I. Bittencourt, A.P. da Silva, M. Silva, E. Costa and R. Santos, 2012. A survey of security in multi-agent systems. Expert Syst. Appl., 39: 4835-4846.
CrossRef  |  Direct Link  |  

Chopra, A.K., A. Artikis, J. Bentahar, M. Colombetti and F. Dignum et al., 2013. Research directions in agent communication. ACM Trans. Intell. Syst. Technol., Vol. 4. 10.1145/2438653.2438655

Constantinescu, N. and C.I. Popirlan, 2011. Authentication model based on multi-agent system. Ann. Univ. Craiova-Math. Comput. Sci. Ser., 38: 59-68.
Direct Link  |  

Dadhich, P., K. Dutta and M.C. Govil, 2011. On the approach of combining trust and security for securing mobile agents: Trust enhanced security. Proceedings of the 2nd International Conference on Computer and Communication Technology, September 15-17, 2011, Allahabad, India, pp: 379-384.

Farkas, C. and M.N. Huhns, 2002. Making agents secure on the semantic web. IEEE Internet Comput., 6: 76-79.
CrossRef  |  

Guan, H., H. Zhang, X. Meng and J. Zhang, 2010. A communication security protocol of mobile agent system. Wuhan Univ. Nat. Sci., 15: 117-120.
CrossRef  |  

Hu, Y.J. and C.W. Tang, 2003. Agent-Oriented Public Key Infrastructure for Multi-Agent E-Service. In: Knowledge-Based Intelligent Information and Engineering Systems, Palade, V., R.J. Howlett and L. Jain (Eds.). Springer, Berlin, Heidelberg, ISBN-13: 9783540408031, p: 1215-1221.

JADE Board, 2004. JADE security guide. http://jade.cselt.it/doc/tutorials/JADE_Security.pdf.

Jung, Y., M. Kim, A. Masoumzadeh and J.B. Joshi, 2012. A survey of security issue in multi-agent systems. Artif. Intell. Rev., 37: 239-260.
CrossRef  |  

Karthik, S., R.M. Bhavatharini and V.P. Arunachalam, 2008. Analyzing interaction between denial of service (DOS) attacks and threats. Proceedings of the International Conference on Computing, Communication and Networking, December 18-20, 2008, Tamil Nadu, India, pp: 1-9.

Li, S. and M.M. Kokar, 2013. Agent Communication Language. In: Flexible Adaptation in Cognitive Radios, Springer, Berlin, Heidelberg, ISBN-13: 9781461409670, pp: 37-44.

Lin, D. and T. Huang, 2010. A mobile-agent security architecture. Proceedings of the 2nd International Conference on e-Business and Information System Security, May 22-23, 2010, Wuhan, China, pp: 1-4.

Loulou, M., M. Jmaiel, A. Hadj Kacem and M. Mosbah, 2006. A conceptual model for secure mobile agent systems. Proceedings of the International Conference on Computational Intelligence and Security, November 3-6, 2006, Guangzhou, China, pp: 524-527.

Lu, F. and M. Huang, 2006. Research and design of security in multi-agent system. Proceedings of the IET International Conference on Wireless Mobile and Multimedia Networks, November 6-9, 2006, Hangzhou, China -.

Mishra, S. and P. Xie, 2003. Interagent communication and synchronization support in the DaAgent mobile agent-based computing system. IEEE Trans. Parallel Distrib. Syst., 14: 290-306.
CrossRef  |  

Mishra, S., Y. Huang and H. Kuntur, 1999. DaAgent: A dependable mobile agent system. Proceedings of the 29th IEEE International Symposium on Fault-Tolerant Computing, June 15-18, 2009, Madison, WI., USA -.

Novak, P., M Rollo, J. Hodik and T. Vlcek, 2003. Communication Security in Multi-Agent Systems. In: Multi-Agent Systems and Applications III, Springer, Berlin, Heidelberg, pp: 454-463.

Oey, M.A., M Warnier and F.M.T. Brazier, 2010. Security in large-scale open distributed multi-agent systems. Autonomous Agents, 6: 108-130.

Poggi, A., G. Rimassa and M. Tomaiuolo, 2001. Multi-user and security support for multi-agent systems. Proceedings of the joint workshop on Dagli Oggetti Agli Agenti: Tendenze Evolutive Dei Sistemi Software, September 4-5, 2001, Modena, Italy -.

Poslad, S. and M. Calisti, 2000. Towards improved trust and security in FIPA agent platforms. Proceedings of the Workshop on Deception, Fraud and Trust in Agent Societies, June 3-7, 2000, Barcelona, Spain, pp: 1-6.

Pozo, S., R.M Gasca and M.T. Gomez-Lopez, 2004. Secure tunnels for mobile multi-agent systems. Proceedings of the Iberoamerican Workshop on Multi-Agent Systems, November 22-26, 2004, Puebla, Mexico -.

Singh, P. and S. Malhotra, 2013. Trends in mobile agent communication for mobile networks. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 1313-1317.
Direct Link  |  

Subalakshmi, R.J., A. Das and N.C.S. Iyengar, 2011. A small e-health care information system with agent technology. Proceedings of the International Conference on Computational Intelligence and Communication Networks, October 7-9, 2011, Gwalior, India, pp: 68-72.

Sulaiman, R. and D. Sharma, 2011. Enhancing security in e-health services using agent. Proceedings of the International Conference on Electrical Engineering and Informatics, July 17-19, 2011, Bandung, Indonesia, pp: 1-6.

Sulaiman, R., X. Huang and D. Sharma, 2009. E-health services with secure mobile agent. Proceedings of the 7th Annual Communication Networks and Services Research Conference, May 11-13, 2009, Moncton, NB., Canada, pp: 270-277.

Usman, M., V. Muthukkumarasamy, X.W. Wu and S. Khanum, 2012. Securing mobile agent based wireless sensor network applications on middleware. Proceedings of the International Symposium on Communications and Information Technologies, October 2-5, 2012, Gold Coast, Australia, pp: 707-712.

Vieira-Marques, P.M., S. Robles, J. Cucurull, R.J. Cruz-Correia, G. Navarro and R. Marti, 2006. Secure integration of distributed medical data using mobile agents. IEEE Intell. Syst., 21: 47-54.
CrossRef  |  

Vila, X., A. Schuster and A. Riera, 2007. Security for a multi-agent system based on JADE. Comput. Secur., 26: 391-400.
CrossRef  |  Direct Link  |  

Wagner, G., 1997. Multi-level Security in Multiagent Systems. In: Cooperative Information Agents, Kandzia, P. and M. Klusch (Eds.). Springer, Berlin, Heidelberg, ISBN-13: 9783540625919, pp: 272-285.

Wang, H., V. Varadharajan and Y. Zhang, 1999. A Secure Communication Scheme for Multiagent Systems. In: Multiagent Platforms, Ishida, T. (Ed.). Springer, Berlin, Heidelberg, ISBN-13: 9783540659679, pp: 174-185.

Wen, W. and F. Mizoguchi, 2000. An authorization-based trust model for multiagent systems. Applied Artif. Intell., 14: 909-925.
CrossRef  |  Direct Link  |  

Wong, H.C. and K. Sycara, 2000. Adding security and trust to multiagent systems. Applied Artif. Intell., 14: 927-941.
CrossRef  |  

Xiao, L., A. Peet, P. Lewis, S. Dashmapatra and C. Saez et al., 2007. An adaptive security model for multi-agent systems and application to a clinical trials environment. Proceedings of the 31st Annual International Computer Software and Applications Conference, Volume 2, July 24-27, 2007, Beijing, China, pp: 261-268.

Xu, X.L., J.Y. Xiong and C.L. Cheng, 2010. The model and the security mechanism of the information retrieval system based on mobile multi-agent. Proceedings of the 12th IEEE International Conference on Communication Technology, November 11-14, 2010, Nanjing, China, pp: 25-28.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved