A survey of security in multi-agent systems

被引:39
作者
Cavalcante, Rodolfo Carneiro [1 ]
Bittencourt, Ig Ibert [1 ]
da Silva, Alan Pedro [2 ]
Silva, Marlos [1 ]
Costa, Evandro [1 ]
Santos, Roberio [1 ]
机构
[1] Univ Fed Alagoas UFAL, Inst Comp, GrOW Grp Otimizacao Web, BR-57072970 Maceio, AL, Brazil
[2] Inst Fed Alagoas IFAL, Palmeira Dos Indios, AL, Brazil
关键词
Agents; Multi-agent systems; Security; Security in MAS; Multi-agents;
D O I
10.1016/j.eswa.2011.09.130
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multi-agent systems (MAS) are a relatively new software paradigm that is being widely accepted in several application domains to address large and complex tasks. However, with the use of MAS in open, distributed and heterogeneous applications, the security issues may endanger the success of the application. The goal of this research is to identify the security issues faced by MAS and to survey the current state of the art of this field of knowledge. In order to do it, this paper examines the basic concepts of security in computing, and some characteristics of agents and multi-agent systems that introduce new threats and ways to attack. After this, some models and architectures proposed in the literature are presented and analyzed. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:4835 / 4846
页数:12
相关论文
共 49 条
[1]  
Anderson J., 2001, Security Engineering: A Guide to Building Dependable Distributed Systems
[2]  
[Anonymous], 1999, RFC2693
[3]  
Becerra G., 2003, P AG BAS TECHN SYST, P142
[4]  
Bellifemine F. L., 2007, Developing MultiAgent Systems with JADE
[5]   A security-aware metamodel for multi-agent systems (MAS) [J].
Beydoun, G. ;
Low, G. ;
Mouratidis, H. ;
Henderson-Sellers, B. .
INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (05) :832-845
[6]  
Bishop M, 2003, Computer security: art and science
[7]  
Borselius N., 2002, Proceedings of the 2002 International Conference on Security and Management (SAM'02), June, Las Vegas, Nevada, 2002, P31
[8]  
Brainard John, 2006, Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS'06, P168, DOI 10.1145/1180405.1180427
[9]  
Bresciani P, 2004, LECT NOTES COMPUT SC, V2940, P35
[10]  
Delfs H., 2007, Introduction to cryptography: principles and applications