Security of Multi-Agent Cyber-Physical Systems: A Survey

被引:9
作者
Owoputi, Richard [1 ]
Ray, Sandip [1 ]
机构
[1] Univ Florida, Elect & Comp Engn, Gainesville, FL 32611 USA
基金
美国国家科学基金会;
关键词
Cyber physical system; multi agent systems; resiliency; security; COOPERATIVE MESSAGE AUTHENTICATION; ANOMALY DETECTION; ATTACK DETECTION; RESILIENT; FRAMEWORK; AGENT; TRUST; PROTOCOL; SCHEME; MODEL;
D O I
10.1109/ACCESS.2022.3223362
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Multi-agent systems are becoming increasingly popular due to their successful implementation in several sectors. However, there are a variety of threats that might undermine the agent's security and imperil system security. As a result, security concerns should be addressed during the design of multi-agent systems. This survey reviews different models for securing multi-agent systems, which were developed based on the concepts regarding the agent's role and communications. This paper presents and categorizes the most common attacks on MASs. Then, we study and analyze numerous security strategies in the literature, classifying them as prevention, detection, and resiliency approaches based on reputation and trust. Finally, we recommend which security approach is the best countermeasure for specific types of attacks based on recent advances in the research field.
引用
收藏
页码:121465 / 121479
页数:15
相关论文
共 135 条
[1]  
Agah A., 2007, Int. J. Netw. Secur., V5, P145
[2]  
Amullen EM, 2016, WORLD AUTOMAT CONG
[3]   A game-theoretic framework for dynamic cyber deception in Internet of Battlefield Things [J].
Anwar, Ahmed H. ;
Kamhoua, Charles ;
Leslie, Nandi .
PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, :522-526
[4]  
Bellifemine F, 2001, SOFTWARE PRACT EXPER, V31, P103, DOI 10.1002/1097-024X(200102)31:2<103::AID-SPE358>3.0.CO
[5]  
2-O
[6]   Flexibility measurement model of multi-agent systems [J].
Benaboud, Rohallah ;
Marir, Toufik .
MULTIAGENT AND GRID SYSTEMS, 2020, 16 (03) :309-341
[7]   Anonymous and lightweight secure authentication protocol for mobile Agent system [J].
Berguig, Yousra ;
Laassiri, Jalal ;
Hanaoui, Sanae .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
[8]  
Bijani S., 2012, DECLARATIVE AGENT LA, P33
[9]   A review of attacks and security approaches in open multi-agent systems [J].
Bijani, Shahriar ;
Robertson, David .
ARTIFICIAL INTELLIGENCE REVIEW, 2014, 42 (04) :607-636
[10]  
Boddupalli S., 2019, Internet of Things. A Confluence of Many Disciplines, P105