Security in agent-based automation systems

被引:0
|
作者
Khan, Basit A. [1 ]
Mad, Joergen [1 ]
Treytl, Albert [1 ]
机构
[1] Austrian Acad Sci, Res Unit Integrated Sensor Syst, A-2700 Wiener Neustdat, Austria
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Agent systems are a way to increase flexibility of Manufacturing Execution Systems (MES) by scheduling tasks in. a distributed autonomous way. Usage of autonomous, collaborative agents and off-the-shelf hardware and software components yet introduce vulnerabilities. This article presents a structural security model for protecting a distributed agent system based on the concept of a hierarchical model. In particular the necessary key system is introduced. The developed security model takes into account typical properties of embedded systems (low computation power, real-time capabilities, autarkic operation) used in automation environments(1).
引用
收藏
页码:768 / 771
页数:4
相关论文
共 50 条
  • [31] Agent-Based Modelling for Security Risk Assessment
    Janssen, Stef
    Sharpanskykh, Alexei
    [J]. ADVANCES IN PRACTICAL APPLICATIONS OF CYBER-PHYSICAL MULTI-AGENT SYSTEMS: THE PAAMS COLLECTION, PAAMS 2017, 2017, 10349 : 132 - 143
  • [32] Compositional refinement in agent-based security protocols
    McIver, A. K.
    Morgan, C. C.
    [J]. FORMAL ASPECTS OF COMPUTING, 2011, 23 (06) : 711 - 737
  • [33] SECURITY OF MOBILE AGENT-BASED WEB APPLICATIONS
    Ou, Chung-Ming
    Ou, C. R.
    Wang, Yao-Tien
    [J]. 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 107 - +
  • [34] Agent-based Security System for User Verification
    Dovgan, Erik
    Kaluza, Bostjan
    Tusar, Tea
    Gams, Matjaz
    [J]. 2009 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCES ON WEB INTELLIGENCE (WI) AND INTELLIGENT AGENT TECHNOLOGIES (IAT), VOL 3, 2009, : 331 - 334
  • [35] Security Framework for Agent-Based Cloud Computing
    Venkateshwaran, K.
    Malviya, Anu
    Dikshit, Utkarsha
    Venkatesan, S.
    [J]. INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2015, 3 (03): : 35 - 42
  • [36] Agent-Based Modeling of User Circumvention of Security
    Kothari, Vijay
    Blythe, Jim
    Smith, Sean
    Koppel, Ross
    [J]. 1ST INTERNATIONAL WORKSHOP ON AGENTS & CYBERSECURITY, 2014,
  • [37] An Agent-Based Cloud Platform for Security Services
    De la Prieta, Fernando
    Enrique Corredera, Luis
    Sanchez-Martin, Antonio J.
    Demazeau, Yves
    [J]. HIGHLIGHTS OF PRACTICAL APPLICATIONS OF HETEROGENEOUS MULTI-AGENT SYSTEMS: THE PAAMS COLLECTION, 2014, 430 : 333 - 343
  • [38] Agent-based computing and programming of agent systems
    Luck, M
    McBurney, P
    Gonzalez-Palacios, J
    [J]. PROGRAMMING MULTI-AGENT SYSTEMS, 2006, 3862 : 23 - 37
  • [39] Self-Representation for Self-Configuration and Monitoring in Agent-Based Flexible Automation Systems
    Kaindl, Hermann
    Vallee, Mathieu
    Arnautovic, Edin
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2013, 43 (01): : 164 - 175
  • [40] Poster: Agent-based (BDI) modeling for automation of penetration testing
    Chu, Ge
    Lisitsa, Alexei
    [J]. 2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 327 - 328