Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2023

01-12-2023

Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods

Authors: S. V. Bezzateev, S. G. Fomicheva, A. F. Suprun

Published in: Automatic Control and Computer Sciences | Issue 8/2023

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown that when using such schemes, a significant part of the agents’ lifetime is spent on authentication processes. In order to increase the efficiency of multiagent systems by reducing the number of agent authentication processes, a method of access differentiation based on Goppa codes is justified and proposed. For the proposed methodology, an assessment of the security level of agents' information is given.
Literature
2.
go back to reference QRadar SIEM. http://q1labs.com/Products/QRadarâ-SIEM.aspx. Cited January 25, 2020. QRadar SIEM. http://​q1labs.​com/​Products/​QRadarâ-SIEM.​aspx.​ Cited January 25, 2020.
3.
go back to reference ArcSight ESM Enterprise Security Manager. https://www.microfocus.com/en-us/products/siem-security-information-event-management/overview. Cited January 25, 2020. ArcSight ESM Enterprise Security Manager. https://​www.​microfocus.​com/​en-us/​products/​siem-security-information-event-management/​overview.​ Cited January 25, 2020.
4.
go back to reference MaxPatrol SIEM. https://www.ptsecurity.com/ru-ru/products/mpsiem/?utm_source=yandex&utm_medium= cpc&utm_campaign=max_patrol_poisk&utm_term=siem&yclid=352061133734568534. Cited January 25, 2020. MaxPatrol SIEM. https://​www.​ptsecurity.​com/​ru-ru/​products/​mpsiem/​?​utm_​source=​yandex&​utm_​medium=​ cpc&utm_campaign=max_patrol_poisk&utm_term=siem&yclid=352061133734568534. Cited January 25, 2020.
5.
go back to reference Kotenko, I.V., Multiagent technologies for analyzing vulnerabilities and detecting intrusions in computer networks, Zashch. Inf., 2004, no. 3, pp. 72–76. Kotenko, I.V., Multiagent technologies for analyzing vulnerabilities and detecting intrusions in computer networks, Zashch. Inf., 2004, no. 3, pp. 72–76.
6.
go back to reference Masloboev, A.V. and Putilov, V.A., Development and implementation of mechanisms for information security management of mobile agents in distributed multiagent information systems, Vestn. Mosk. Gos. Tekh. Univ., no. 4/2, pp. 1015–1032. Masloboev, A.V. and Putilov, V.A., Development and implementation of mechanisms for information security management of mobile agents in distributed multiagent information systems, Vestn. Mosk. Gos. Tekh. Univ., no. 4/2, pp. 1015–1032.
7.
go back to reference Kotenko, I.V. and Ulanov, A.V., Multiagent modeling of protection mechanisms against distributed computer attacks, Inf. Tekhnol., 2009, no. 2, pp. 38–44. Kotenko, I.V. and Ulanov, A.V., Multiagent modeling of protection mechanisms against distributed computer attacks, Inf. Tekhnol., 2009, no. 2, pp. 38–44.
8.
9.
go back to reference Kannammal, A. and Iyengar, N.Ch.S.N., A model for mobile agent security in e-business applications, Int. J. Business Inf., 2007, vol. 2, no. 2, pp. 185–197. Kannammal, A. and Iyengar, N.Ch.S.N., A model for mobile agent security in e-business applications, Int. J. Business Inf., 2007, vol. 2, no. 2, pp. 185–197.
12.
go back to reference Bezzateev, S.V., Elina, T.N., Popkova, A.A., and Fomicheva, S.G., Metody zashchishchennogo upravleniya informatsionno-obrazovatel’nymi fondami vuzov (Methods of Protected Management of Information-Educational Foundations at Universities), Norilsk: Noril’skii Ind. Inst., 2012. Bezzateev, S.V., Elina, T.N., Popkova, A.A., and Fomicheva, S.G., Metody zashchishchennogo upravleniya informatsionno-obrazovatel’nymi fondami vuzov (Methods of Protected Management of Information-Educational Foundations at Universities), Norilsk: Noril’skii Ind. Inst., 2012.
13.
go back to reference Masloboev, A.V., Approaches to providing information security in open distributed multiagent virtual business environments, Nauchn.-Tekh. Vestn. S.-Peterb. Gos. Univ. Inf. Tekhnol., Mekh. Opt., 2010, no. 6, pp. 98–103. Masloboev, A.V., Approaches to providing information security in open distributed multiagent virtual business environments, Nauchn.-Tekh. Vestn. S.-Peterb. Gos. Univ. Inf. Tekhnol., Mekh. Opt., 2010, no. 6, pp. 98–103.
14.
go back to reference Fomicheva, S.G., Approaches to evaluate and improve system performance security of mobile agents, Nauchn. Vestn. Arktiki, 2017, no. 2, pp. 27–32. Fomicheva, S.G., Approaches to evaluate and improve system performance security of mobile agents, Nauchn. Vestn. Arktiki, 2017, no. 2, pp. 27–32.
17.
go back to reference Bezzateev, S.V., Multilevel access control system based on the Mac Elis scheme, Probl. Inf. Bezopasnosti. Komp’yuternye Sist., 2010, no. 3, pp. 42–44. Bezzateev, S.V., Multilevel access control system based on the Mac Elis scheme, Probl. Inf. Bezopasnosti. Komp’yuternye Sist., 2010, no. 3, pp. 42–44.
18.
go back to reference Fomicheva, S.G., Information protection in distributed hierarchical systems, Nauchn.-Tekh. Vedomosti SPbGT-U. Inf., Telekommunikatsii, Upr., 2008, no. 2, pp. 91–97. Fomicheva, S.G., Information protection in distributed hierarchical systems, Nauchn.-Tekh. Vedomosti SPbGT-U. Inf., Telekommunikatsii, Upr., 2008, no. 2, pp. 91–97.
22.
Metadata
Title
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods
Authors
S. V. Bezzateev
S. G. Fomicheva
A. F. Suprun
Publication date
01-12-2023
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2023
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411623080035

Other articles of this Issue 8/2023

Automatic Control and Computer Sciences 8/2023 Go to the issue