A Multi-agent Security Architecture

被引:0
|
作者
Sulaiman, Rossilawati [1 ]
Sharma, Dharmendra [1 ]
Ma, Wanli [1 ]
Tran, Dat [1 ]
机构
[1] Univ Canberra, Fac Informat Sci & Engn, Canberra, ACT 2601, Australia
关键词
e-health; security; cryptography; multi-agent; mobile agent;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The Multilayer Communication approach (MLC) [1] is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the Sender's host, agents interact with each other to secure a message to be sent to the Recipient, including encryption, digital signature, and hash code. A mobile agent is used to carry the encrypted messages as well as the agent's code to the Recipient's host. Our approach also provides mechanisms to verify the authenticity, confidentiality and the integrity of the code and data that arrived at the Recipient's host. The message and the code are authenticated, the code is executed to perform tasks to recover the plaintext
引用
收藏
页码:184 / 191
页数:8
相关论文
共 50 条
  • [1] A multi-agent architecture for Internet security
    Yuen, JHK
    Leung, FSK
    Wang, HQ
    Liao, SSY
    [J]. ASSOCIATION FOR INFORMATION SYSTEMS - PROCEEDINGS OF THE FIFTH AMERICAS CONFERENCE ON INFORMATION SYSTEMS (AMCIS 1999), 1999, : 91 - 93
  • [2] Multi-agent security service architecture for mobile learning
    Hentea, M
    [J]. ITRE 2004: 2ND INTERNATIONAL CONFERENCE INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, PROCEEDINGS, 2004, : 91 - 95
  • [3] A distributed multi-agent architecture for computer security situational awareness
    Engelhardt, D
    Anderson, M
    [J]. FUSION 2003: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE OF INFORMATION FUSION, VOLS 1 AND 2, 2003, : 193 - 200
  • [4] Improving the security level of the FUSION@ multi-agent architecture
    Pinzon, Cristian I.
    De Paz, Juan F.
    Tapia, Dante I.
    Bajo, Javier
    Corchado, Juan M.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (08) : 7536 - 7545
  • [5] Dynamic security assessment: System architecture based on multi-agent systems
    Jardim, J
    Kwasnicki, W
    Neto, C
    [J]. 2002 IEEE POWER ENGINEERING SOCIETY SUMMER MEETING, VOLS 1-3, CONFERENCE PROCEEDINGS, 2002, : 1305 - 1307
  • [6] Security in Multi-Agent Systems
    Hedin, Yaqin
    Moradian, Esmiralda
    [J]. KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 1604 - 1612
  • [7] Architecture of Multi-Agent System
    Tomasek, M.
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2012), 2012, : 387 - 390
  • [8] A Security Architecture Model of Oil and Gas SCADA Network Based on Multi-Agent
    Zhang, Jian
    Yang, Li
    Liao, Haode
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 449 - 460
  • [9] Communication security in multi-agent systems
    Novák, P
    Rollo, M
    Hodík, J
    Vlcek, T
    [J]. MULTI-AGENT SYSTEMS AND APPLICATIONS III, PROCEEDINGS, 2003, 2691 : 454 - 463
  • [10] A survey of security in multi-agent systems
    Cavalcante, Rodolfo Carneiro
    Bittencourt, Ig Ibert
    da Silva, Alan Pedro
    Silva, Marlos
    Costa, Evandro
    Santos, Roberio
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2012, 39 (05) : 4835 - 4846