Skip to main content
Top

2014 | OriginalPaper | Chapter

A Distributed Security Approach for Intelligent Mobile Multiagent Systems

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Intelligent systems are used for many difficult problems solving, like: clinical decision support, health status monitoring of humans etc. The intelligence could give to a system advantages versus a system that does not have intelligence. Software mobile agents as network-computing technology has been applied for various distributed problems solving like: ubiquitous healthcare, network administration etc. The endowment of mobile agents with intelligence is difficult. Another difficulty in mobile multiagent systems consists in the limited security of mobile agents against networks sources, other agents and hosts. In this chapter a novel mobile agent architecture called IntelligMobAg (Complex Intelligent Mobile Agent Architecture) is proposed. IntelligMobAg represents an extension of a previous mobile agent architecture called ICMA [(Iantovics in A new intelligent mobile multiagent system. IEEE Computer Society Press, Silver Spring, pp. 53–159, 2005), (Iantovics in A novel mobile agent architecture. Acta Universitatis Apulensis, Alba Iulia, vol. 11, pp. 295–306, 2006)]. The purpose of the proposal consists in the limitation of some disadvantages related with security and intelligence of an ICMA agent by including in the static part of an evolutionary subagent. In this chapter we will present some preliminary results related with the increased security and intelligence that emerge in a cooperative multiagent system formed by agents endowed with the proposed architecture.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Iantovics, B.: A new intelligent mobile multiagent system. In: Proceedings of the IEEE International Workshop on Soft Computing Applications. Szeged-Hungary and Arad-Romania, IEEE Computer Society Press, pp. 53–159 (2005) Iantovics, B.: A new intelligent mobile multiagent system. In: Proceedings of the IEEE International Workshop on Soft Computing Applications. Szeged-Hungary and Arad-Romania, IEEE Computer Society Press, pp. 53–159 (2005)
2.
go back to reference Iantovics, B.: A novel mobile agent architecture, vol. 11, pp. 295–306. Acta Universitatis Apulensis, Alba Iulia (2006) Iantovics, B.: A novel mobile agent architecture, vol. 11, pp. 295–306. Acta Universitatis Apulensis, Alba Iulia (2006)
3.
go back to reference Iantovics, B.: Cooperative medical diagnoses elaboration by physicians and artificial agents. In: Aziz-Alaoui, M.A., Bertelle C., Cotsaftis M. (eds.) Proceedings of the Conference Emergent Properties in Natural and Artificial Complex Systems. Dresden, Germany, 2007, pp. 181–205. Le Havre University Press, Paris (2007) Iantovics, B.: Cooperative medical diagnoses elaboration by physicians and artificial agents. In: Aziz-Alaoui, M.A., Bertelle C., Cotsaftis M. (eds.) Proceedings of the Conference Emergent Properties in Natural and Artificial Complex Systems. Dresden, Germany, 2007, pp. 181–205. Le Havre University Press, Paris (2007)
4.
go back to reference Weiss, G.: (ed.), Multiagent systems: a modern approach to distributed artificial intelligence. MIT Press, Cambridge Massachusetts London (2000) Weiss, G.: (ed.), Multiagent systems: a modern approach to distributed artificial intelligence. MIT Press, Cambridge Massachusetts London (2000)
5.
go back to reference Ferber, J.: Multi-agent systems, an introduction to distributed artificial intelligence. Addison Wesley (1999) Ferber, J.: Multi-agent systems, an introduction to distributed artificial intelligence. Addison Wesley (1999)
6.
go back to reference Zamfirescu, C.B.: An Agent-Oriented Approach for Supporting Self-Facilitation in Group Decisions. Studies in informatics and control 12(2), 137–148 (2004) Zamfirescu, C.B.: An Agent-Oriented Approach for Supporting Self-Facilitation in Group Decisions. Studies in informatics and control 12(2), 137–148 (2004)
7.
go back to reference Zamfirescu, C.B., Filip, F.: Supporting self-facilitation in distributed group decisions. In: Proceedings 13th International Workshop on Database and Expert Systems Applications, DEXA’02, Aix-en-Provence, France, pp. 321–325. IEEE Computer Society Press (2002) Zamfirescu, C.B., Filip, F.: Supporting self-facilitation in distributed group decisions. In: Proceedings 13th International Workshop on Database and Expert Systems Applications, DEXA’02, Aix-en-Provence, France, pp. 321–325. IEEE Computer Society Press (2002)
8.
go back to reference Wayner, P.: Free agents, Byte, March 105–114 (1995) Wayner, P.: Free agents, Byte, March 105–114 (1995)
9.
go back to reference Kirn, St.: Ubiquitous healthcare: The onkonet mobile agents architecture. In: Aksit, M., Mezini, M., Unland, R. (eds.) Proceedings of the 3.rd International Conference Netobjectdays. Objects, Components, Architectures, Services, and Applications for a Networked World (NODe 2002), vol. LNCS 2591. Springer, Germany (2003) Kirn, St.: Ubiquitous healthcare: The onkonet mobile agents architecture. In: Aksit, M., Mezini, M., Unland, R. (eds.) Proceedings of the 3.rd International Conference Netobjectdays. Objects, Components, Architectures, Services, and Applications for a Networked World (NODe 2002), vol. LNCS 2591. Springer, Germany (2003)
10.
go back to reference Gulyas, L., Kovacs, L., Micsik, A., Pataki, B., Zsamboki, I.: An overview of mobile software systems, department of distributed systems. In: Computer and Automation Research Institute of the Hungarian Academy of Sciences, Mta Sztaki Technical Report TR 2000–2001 (2001) Gulyas, L., Kovacs, L., Micsik, A., Pataki, B., Zsamboki, I.: An overview of mobile software systems, department of distributed systems. In: Computer and Automation Research Institute of the Hungarian Academy of Sciences, Mta Sztaki Technical Report TR 2000–2001 (2001)
11.
go back to reference Yang, K, Galis, A, Guo, X, Liu, D.Y.: Rule-driven mobile intelligent agents for real-time configuration of IP networks. , In: Palade, V and Howlett, RJ and Jain, L, (eds.) Knowledge-Based Intelligent Information and Engineering Systems, Pt 1 Proceedings, pp. 921–928, Springer, Berlin, (2003) Yang, K, Galis, A, Guo, X, Liu, D.Y.: Rule-driven mobile intelligent agents for real-time configuration of IP networks. , In: Palade, V and Howlett, RJ and Jain, L, (eds.) Knowledge-Based Intelligent Information and Engineering Systems, Pt 1 Proceedings, pp. 921–928, Springer, Berlin, (2003)
12.
go back to reference McGrath, S., Chacón, D., Whitebread, K.: Intelligent mobile agents in military command and control. Autonomous Agents Workshop (2000) McGrath, S., Chacón, D., Whitebread, K.: Intelligent mobile agents in military command and control. Autonomous Agents Workshop (2000)
13.
go back to reference Chen, B., Liu, W.: Mobile agent computing paradigm for building a flexible structural health monitoring sensor network. Comput.-Aid. Civil Infrastruct. Eng., 25(7), 504–516 (2010) Chen, B., Liu, W.: Mobile agent computing paradigm for building a flexible structural health monitoring sensor network. Comput.-Aid. Civil Infrastruct. Eng., 25(7), 504–516 (2010)
14.
go back to reference Nestinger, S.S., Cheng, H.H.: Flexible vision: mobile agent approach to distributed vision sensor fusion, IEEE Robot. Autom. Mag. 17(3), 66–77 (2010) Nestinger, S.S., Cheng, H.H.: Flexible vision: mobile agent approach to distributed vision sensor fusion, IEEE Robot. Autom. Mag. 17(3), 66–77 (2010)
15.
go back to reference Chen, B., Cheng, H.H., Palen, J.: Integrating mobile agent technology with multi-agent systems for distributed traffic detection and management systems, Transp. Res. Part C: Emer. Technol., 17(1), February, 1–10 (2009) Chen, B., Cheng, H.H., Palen, J.: Integrating mobile agent technology with multi-agent systems for distributed traffic detection and management systems, Transp. Res. Part C: Emer. Technol., 17(1), February, 1–10 (2009)
16.
go back to reference Nestinger, S.S., Chen, B., Cheng, H.H.: A mobile agent-based framework for flexible control of multi-robotic systems, proceedings of the ASME 31th mechanisms and robotics conference, pp. 4–7. Las Vegas, Nevada (2007) Nestinger, S.S., Chen, B., Cheng, H.H.: A mobile agent-based framework for flexible control of multi-robotic systems, proceedings of the ASME 31th mechanisms and robotics conference, pp. 4–7. Las Vegas, Nevada (2007)
17.
go back to reference Sander, T., Tschudin, C.F.: Protecting Mobile agents against malicious hosts. In: Vigna G. (ed.), Mobile Agents and Security, pp. 44–60 Springer (1998) Sander, T., Tschudin, C.F.: Protecting Mobile agents against malicious hosts. In: Vigna G. (ed.), Mobile Agents and Security, pp. 44–60 Springer (1998)
18.
go back to reference Vigna, G.: Protecting mobile agents through tracing. In: Proceedings of the Third ECOOP Workshop on Operating System Support for Mobile Object Systems, Finland, pp. 137–153 (1997) Vigna, G.: Protecting mobile agents through tracing. In: Proceedings of the Third ECOOP Workshop on Operating System Support for Mobile Object Systems, Finland, pp. 137–153 (1997)
19.
go back to reference Nwana, H.S.: Software agents: an overview, knowledge engineering review, vol. 11(3), pp. 205–244. Cambridge University Press, Cambridge (1996) Nwana, H.S.: Software agents: an overview, knowledge engineering review, vol. 11(3), pp. 205–244. Cambridge University Press, Cambridge (1996)
20.
go back to reference Borselius, N.: Mobile agent security. Electron. Commun. Eng. J. 14(5), 211–218 (2002)CrossRef Borselius, N.: Mobile agent security. Electron. Commun. Eng. J. 14(5), 211–218 (2002)CrossRef
21.
go back to reference Kowalczyk, R., Braun, P., Mueller, I., Rossak, W., Franczyk, B., Speck, A.: Deploying mobile and intelligent agents in interconnected e-marketplaces. J. Int. Des. Process Sci. Trans. SDPS 7(3), 109–123 (2003) Kowalczyk, R., Braun, P., Mueller, I., Rossak, W., Franczyk, B., Speck, A.: Deploying mobile and intelligent agents in interconnected e-marketplaces. J. Int. Des. Process Sci. Trans. SDPS 7(3), 109–123 (2003)
22.
go back to reference Ku, H., Luderer, G.W., Subbiah, B., An intelligent mobile agent framework for distributed network management. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’97), Phoenix USA, November (1997) Ku, H., Luderer, G.W., Subbiah, B., An intelligent mobile agent framework for distributed network management. In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’97), Phoenix USA, November (1997)
23.
go back to reference Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code, In: Proceedings of IEEE Symposium on Security and Privacy, pp. 2–11. Oakland, May (2001) Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code, In: Proceedings of IEEE Symposium on Security and Privacy, pp. 2–11. Oakland, May (2001)
24.
go back to reference Necula, G.: Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 106–119. New York, Jan (1997) Necula, G.: Proof-carrying code. In: Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 106–119. New York, Jan (1997)
25.
go back to reference Gong, M., Mueller, H., Prafullchandra, R. Schemers.: Going beyond the sandbox: an overview of the new security architecture in the java development kit 1.2. In: USENIX Symposium on Internet Technologies and Systems, Monterey, December (1997) Gong, M., Mueller, H., Prafullchandra, R. Schemers.: Going beyond the sandbox: an overview of the new security architecture in the java development kit 1.2. In: USENIX Symposium on Internet Technologies and Systems, Monterey, December (1997)
26.
go back to reference Wahbe, R., Lucco, S., Anderson, T., Graham, S.: Efficient software based fault isolation. In: Proceedings ACM Symposium on Operating System Principles, Dec, pp. 203–216, (1993) Wahbe, R., Lucco, S., Anderson, T., Graham, S.: Efficient software based fault isolation. In: Proceedings ACM Symposium on Operating System Principles, Dec, pp. 203–216, (1993)
27.
go back to reference Malik, N.S., Ko, D., Cheng, H.H.: A secure migration process for mobile agents. Softw. Pract. Experience 48(1), 87–101 (2011)CrossRef Malik, N.S., Ko, D., Cheng, H.H.: A secure migration process for mobile agents. Softw. Pract. Experience 48(1), 87–101 (2011)CrossRef
28.
go back to reference Yee, B.: A sanctuary for mobile agents. In: Vitek J., Jensen C. (eds.), Secure Internet Programming, vol. LNCS 1603, pp. 261–274, Springer, New York (1999) Yee, B.: A sanctuary for mobile agents. In: Vitek J., Jensen C. (eds.), Secure Internet Programming, vol. LNCS 1603, pp. 261–274, Springer, New York (1999)
29.
go back to reference Young, A., Yung, M.: Encryption tools for mobile agents: sliding encryption. In: Biham E. (ed.): Fast Software Encryption. Proceedings of the 4th International Workshop FSE 1997, vol. LNCS 1267, pp. 230–241. Springer, Haifa (1997) Young, A., Yung, M.: Encryption tools for mobile agents: sliding encryption. In: Biham E. (ed.): Fast Software Encryption. Proceedings of the 4th International Workshop FSE 1997, vol. LNCS 1267, pp. 230–241. Springer, Haifa (1997)
30.
go back to reference Pattee, H.H.: The complementary principle in biological and social structures. J Soc Biol Struct 1, 191–200 (1978)CrossRef Pattee, H.H.: The complementary principle in biological and social structures. J Soc Biol Struct 1, 191–200 (1978)CrossRef
31.
go back to reference Riordan, J., Schneier, B.: Environmental key generation towards clueless agents. Vigna G. (ed.) Mobile Agents and Security, pp. 15–24 Springer (1998) Riordan, J., Schneier, B.: Environmental key generation towards clueless agents. Vigna G. (ed.) Mobile Agents and Security, pp. 15–24 Springer (1998)
32.
go back to reference Ahmed, T.M.: Using secure-image mechanism to protect mobile agent against malicious hosts. World Acad. Sci. Eng. Technol. 35, 439–444 (2009) Ahmed, T.M.: Using secure-image mechanism to protect mobile agent against malicious hosts. World Acad. Sci. Eng. Technol. 35, 439–444 (2009)
33.
go back to reference Abdelhamid, Q., Samuel, P., Hanifa, B.: A security protocol for mobile agents based upon the cooperation of sedentary agents. J. Network Comput. Appl. 30(3), 1228–1243 (2007)CrossRef Abdelhamid, Q., Samuel, P., Hanifa, B.: A security protocol for mobile agents based upon the cooperation of sedentary agents. J. Network Comput. Appl. 30(3), 1228–1243 (2007)CrossRef
34.
go back to reference Karnik, N.M. Tripathi, A.R.: A security architecture for mobile agents in Ajanta, In: Proceedings of the 20th International Conference on Distributed Computing Systems, pp. 402–409 (2000) Karnik, N.M. Tripathi, A.R.: A security architecture for mobile agents in Ajanta, In: Proceedings of the 20th International Conference on Distributed Computing Systems, pp. 402–409 (2000)
35.
go back to reference Iantovics, B., Zamfirescu, C.B.: ERMS: an evolutionary reorganizing multiagent system. Int. J. Innovative Comput. Inf. Control 9(3), 1171–1188 (2013) Iantovics, B., Zamfirescu, C.B.: ERMS: an evolutionary reorganizing multiagent system. Int. J. Innovative Comput. Inf. Control 9(3), 1171–1188 (2013)
36.
go back to reference Back, T., Fogel, D.B., Michalevitz, Z.: Handbook of evolutionary computation. Institute of Physics, Oxford University Press, New York (1997)CrossRef Back, T., Fogel, D.B., Michalevitz, Z.: Handbook of evolutionary computation. Institute of Physics, Oxford University Press, New York (1997)CrossRef
37.
go back to reference Dumitrescu, D., Lazzerini, B., Jain, L., Dumitrescu, A.: Evolutionary computing. CRC Press, Boca Raton (2000) Dumitrescu, D., Lazzerini, B., Jain, L., Dumitrescu, A.: Evolutionary computing. CRC Press, Boca Raton (2000)
38.
go back to reference Fogel, D.B.: Evolutionary computation, toward a new philosophy of machine intelligence. IEEE Press, New York (2000) Fogel, D.B.: Evolutionary computation, toward a new philosophy of machine intelligence. IEEE Press, New York (2000)
39.
go back to reference Erfurth, C., Braun, P., Rossak, W.R.: Migration intelligence for mobile agents. In: proceedings of Artificial Intelligence and the Simulation of Behavior Symposium on Software Mobility and Adaptive Behavior (AISB’01), pp. 81–88. University of York, United Kingdom (2001) Erfurth, C., Braun, P., Rossak, W.R.: Migration intelligence for mobile agents. In: proceedings of Artificial Intelligence and the Simulation of Behavior Symposium on Software Mobility and Adaptive Behavior (AISB’01), pp. 81–88. University of York, United Kingdom (2001)
40.
go back to reference Erfurth, C., Rossak, W.R.: Autonomous itinerary planning for mobile agents. In: Proceedings of the Third Symposium on Adaptive Agents and Multi-Agent Systems (AISB’03). pp. 120–125. University of Wales, Aberystwyth (2003) Erfurth, C., Rossak, W.R.: Autonomous itinerary planning for mobile agents. In: Proceedings of the Third Symposium on Adaptive Agents and Multi-Agent Systems (AISB’03). pp. 120–125. University of Wales, Aberystwyth (2003)
41.
go back to reference Erfurth, C., Rossak, W.R.: Characterization and management of dynamical behavior in a system with mobile agents, in proceedings of the international workshop on innovative internet computing system-second, vol. LNCS, 2346, pp. 109–119. Kühlungsborn Germany (2002) Erfurth, C., Rossak, W.R.: Characterization and management of dynamical behavior in a system with mobile agents, in proceedings of the international workshop on innovative internet computing system-second, vol. LNCS, 2346, pp. 109–119. Kühlungsborn Germany (2002)
42.
go back to reference Pfeifer, R., Scheier, C.:. Understanding intelligence. MIT Press, September (1999) Pfeifer, R., Scheier, C.:. Understanding intelligence. MIT Press, September (1999)
Metadata
Title
A Distributed Security Approach for Intelligent Mobile Multiagent Systems
Authors
Barna Iantovics
Bogdan Crainicu
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-00467-9_15

Premium Partner