Systematic Mapping Study of Security in Multi-Embedded-Agent Systems

被引:0
作者
Baudet, Arthur [1 ]
Aktouf, Oum-El-Kheir [1 ]
Mercier, Annabelle [1 ]
Elbaz-Vincent, Philippe [2 ]
机构
[1] Univ Grenoble Alpes, Grenoble INP, LCIS, F-26000 Valence, France
[2] Univ Grenoble Alpes, Inst Fourier, CNRS, F-38000 Grenoble, France
关键词
Security; Multi-agent systems; Systematics; Wireless sensor networks; Data models; Computer architecture; Wireless communication; Decentralized security; embedded system; multi-agent system; security architecture; systematic mapping study;
D O I
10.1109/ACCESS.2021.3128287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: In this paper, we study distributed and decentralized systems in which each part is modeled as an agent in a multi-agent system. Those systems provide more scalable and easier ways to control complex, distributed and interconnected systems of embedded components. We are particularly interested in methods to secure these systems. Objectives: This study aims to identify the main security properties studied, the parts of a multi-agent architecture that are considered most often in security studies and the technical solutions used to secure those systems. Methods: We conducted a systematic mapping study on research works addressing the security of multi-agent systems with embedded agents. We identified which security features were addressed, and their roles in global security architecture. Results: We identified 70 papers published in journals and conferences. We classified the extracted data reporting a tendency to focus on securing the availability of systems under attack by means of trust schemes, sometimes supported by cryptographic primitives. Conclusion: The use of cryptography appears to be limited in decentralized systems. However, solutions should be provided to overcome those limits as other solutions such as trust schemes do not protect the system from the same type of attacks.
引用
收藏
页码:154902 / 154913
页数:12
相关论文
共 35 条
  • [1] ACM, 2020, ACM DIG LIB ADV SEAR
  • [2] Internet of Things: Evolution and technologies from a security perspective
    Ande, Ruth
    Adebisi, Bamidele
    Hammoudeh, Mohammad
    Saleem, Jibran
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2020, 54
  • [3] [Anonymous], 2013, P 4 INT C COMP COMM
  • [4] [Anonymous], 2018, P 10 INT C AG ART IN, DOI DOI 10.5220/0006594802240235
  • [5] Toward an Embedded Multi-Agent System Methodology and Positioning on Testing
    Banner, Camille
    Aktouf, Oum-El-Kheir
    Mercier, Annabelle
    Jamont, Jean-Paul
    [J]. 2017 IEEE 28TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW 2017), 2017, : 239 - 244
  • [6] Baudet A., 2021, SYSTEMATIC MAPPING S
  • [7] Bellifemine Fabio., 2001, Intelligent Agents VII Agent Theories Architectures and Languages, volume 1986 of Lecture Notes in Computer Science, V1986, P42, DOI DOI 10.1007/3-540-44631-1_7
  • [8] A review of attacks and security approaches in open multi-agent systems
    Bijani, Shahriar
    Robertson, David
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2014, 42 (04) : 607 - 636
  • [9] Biolchini J., 2005, Technical Report, ES 679.05, P45, DOI DOI 10.1145/2372233.2372235
  • [10] Dimensions in programming multi-agent systems
    Boissier, Olivier
    Bordini, Rafael H.
    Hubner, Jomi F.
    Ricci, Alessandro
    [J]. KNOWLEDGE ENGINEERING REVIEW, 2019, 34