© The Institution of Engineering and Technology
As two major communication technologies, the internet and wireless, are maturing rapidly to dominate our civilised life, the authors urgently need to re-establish users’ confidence to harvest new potential applications of large-scale distributed systems. Service agents and distributed multi-agent systems (MASs) have shown the potential to help with this move as the lack of trust caused by heavily compromised security issues and concerns coupled with the out-of-date solutions are hindering the progress. The authors therefore seek new remedies to ensure that the continuity in developing new economies is maintained through building new solutions to address today's techno-economical problems. Following a scan of the literature the authors discuss the state-of-the-art progress followed by some observations and remarks for the researchers in the field. Here the authors recognise the need for new ‘distributed security’ solutions, as an overlay service, to rejuvenate and exploit the distributed artificial intelligence (AI) techniques for secure MAS as a natural solution to pave the way to enable a long awaited application paradigm of the near future.
References
-
-
1)
-
A. Martin ,
T.M. Lakshmi ,
J. Madhusudanan
.
Multi agent communication system for online auction with decision support system by jade and trace.
J. Converg. Inf. Technol.
,
154 -
163
-
2)
-
C.-M. Ou ,
C.R. Ou
.
Multi-agent artificial immune systems (MAAIS) for intrusion detection: abstraction from danger theory.
LNCS Agent Multi-Agent Syst.: Technol. Appl.
,
11 -
19
-
3)
-
X. Vila ,
A. Schuster ,
A. Riera
.
Security for a multi-agent system based on jade.
Comput. Sec.
,
391 -
400
-
4)
-
D.G. Wang ,
T. Li ,
S.J. Liu ,
G. Liang ,
K. Zhao
.
An immune multi-agent system for network intrusion detection.
Adv. Comput. Intell.
,
436 -
445
-
5)
-
Carley, K.M.: `Biodefense through city level multi-agent modelling of bio and chemical threats', Biosurveillance Workshop, 2006.
-
6)
-
Z. Xu ,
Y. Xiong ,
H. Ren
.
On agent-based strategic architecture of military medical service command system.
Appl. Softw.
,
90 -
92
-
7)
-
S. Poslad ,
P. Charlton ,
M. Calisti ,
R. Falcone ,
S. Barber ,
L. Korba ,
M. Singh
.
(2003)
Specifying standard security mechanisms in multi-agent systems, Trust, reputation, and security: theories and practice.
-
8)
-
M. Fasli
.
On agent technology for e-commerce: trust, security, and legal issues.
Knowl. Eng. Rev.
,
3 -
35
-
9)
-
J. Rosenberg ,
D. Remy
.
(2004)
Securing web services with WS-Security.
-
10)
-
Fernandes, D.L., Saboia, V.F.S., De Castro, M.F., de Souza, J.N.: `A secure mobile agents platform based on a peer-to-peer infrastructure', Int. Conf. on Networking, Systems and Mobile Communications and Learning Technologies, 2006, p. 189.
-
11)
-
J.S.C. Borgan
.
(2009)
Trust agents.
-
12)
-
W. Shi ,
I. Jang ,
H.S. Yoo
.
An efficient electronic marketplace bidding auction protocol with bid privacy.
Prog. WWW Res. Dev.
,
297 -
308
-
13)
-
J. Tweedalea ,
N. Ichalkaranjeb ,
C. Sioutisb ,
B. Jarvisb ,
A. Consolib ,
G. Phillips-Wrenc
.
Innovations in multi-agent systems.
Comput. Appl.
,
1089 -
1115
-
14)
-
M. Fasli
.
(2007)
Agent technology for e-commerce.
-
15)
-
C.J. Su
.
Mobile multi-agent based, distributed information platform (MADIP) for wide-area e-health monitoring.
Comput. Ind.
,
1 ,
55 -
68
-
16)
-
X. Qiu ,
R. Paterson
.
An innovative network security vulnerability modeling method and tool.
IEEE Commun. Mag.
,
104 -
108
-
17)
-
Gorodetski, V., Kotenko, I.: `The multi-agent systems for computer network security assurance: frameworks and case studies', IEEE Int. Conf. on Artificial Intelligence Systems, ICAIS, 2002.
-
18)
-
J.F. Hbner ,
J.S. Sichman ,
O. Boissier
.
S-Moise+: a middleware for developing organised multi-agent systems.
LCNS Coord. Org. Inst. Norms Multi-Agent Syst.
,
64 -
78
-
19)
-
Burnett, C., Masato, D., McCallum, M.: `Agent support for mission planning under policy constraints', Second Annual Conf. Int. Technology Alliance, 2008, London.
-
20)
-
T. Karygiannis ,
W. Jansen
.
Mobile agent security.
Technical Report NIST SP 800-19, National Institute of Standards and Technology
-
21)
-
E. Shakshuki ,
Z. Luo ,
J. Gong
.
An agent-based approach to security service.
J. Netw. Comput. Appl.
,
183 -
208
-
22)
-
E. Mosqueira-Rey ,
A. Alonso-Betanzos ,
B. Guijarro-Berdinas ,
D. Alonso-Rios ,
J. Lago-Pineiro
.
A snort-based agent for a JADE multi-agent intrusion detection system.
Int. J. Intell. Inf. Database Syst.
,
107 -
121
-
23)
-
Li, W., Hoang, D.: `A new security scheme for e-health system', Int. Symp. Collaborative Technologies and Systems Maryland, 2009, VA.
-
24)
-
P. Beautemen ,
D. Allsopp ,
M. Greaves
.
Autonomous agents and multi-agent systems (AAMAS) for the military: Issues and challenges.
LNCS Defence Appl. Multi-Agent Syst.
,
1 -
13
-
25)
-
Zhao, S., Liu, H., Sun, Z.: `Scalable trust in multi-agent e-commerce system', Int. Symp. on Electronic Commerce and Security, 2008.
-
26)
-
N. Asokan ,
P. Janson ,
M. Steiner ,
M. Waidner
.
The state of the art in electronic payment systems.
IEEE Comput.
,
28 -
35
-
27)
-
G. Nguyen ,
T.T. Dang ,
L. Hluchy ,
M. Laclavik ,
Z. Balogh ,
I. Budinska
.
Agent platform evaluation and comparison.
Technical Report 5FP 1st-2001-34519: Institute of Informatics, Slovak Academy of Sciences
-
28)
-
Xiao, L., Peet, A., Lewis, P.: `An adaptive security model for multi-agent systems and application to a clinical trials environment', 31stIEEE Annual Int. Computer Software and Applications Conf. (COMPSAC’07), 2007.
-
29)
-
D. McKnight ,
V. Choudhury ,
C. Kacmar
.
The impact of initial customer trust on intentions to transact with a web site: a trust building model.
J. Strateg. Inf. Syst.
,
297 -
323
-
30)
-
A. Mana ,
A. Muñoz ,
D. Serrano
.
Towards secure agent computing for ubiquitous computing and ambient intelligence.
LNCS Ubiquit. Intell. Comput.
,
1201 -
1212
-
31)
-
M. d'Inverno ,
M. Luck ,
M. Georgeff ,
D. Kinny ,
M. Wooldridge
.
The dMARS architechure: a specification of the distributed multi-agent reasoning system.
J. Auton. Agents Multi-Agent Syst.
,
5 -
53
-
32)
-
C. Hewitt ,
P. Bishop ,
R. Steiger
.
A universal modular ACTOR formalism for artificial intelligence.
Proc. of the 3rd International joint conference for artificial intelligence
,
235 -
245
-
33)
-
A.G.C. Vecchiola ,
A. Passadore ,
A. Boccalatte
.
Agentservice: a framework for distributed multi-agent system development.
Int. J. Agent-Oriented Softw. Eng.
,
290 -
323
-
34)
-
S. Vitabile ,
V. Conti ,
C. Militello ,
F. Sorbello
.
An extended JADE-S based framework for developing secure multi-agent systems.
Comput. Stand. Interfaces
,
913 -
930
-
35)
-
Moradian, E., Hakansson, A.: `Approach to solving security problems using meta-agents in multi-agent system', Conf. on Agent and Multi-Agent Systems: Technologies and Applications: KES-AMSTA, 2008.
-
36)
-
Das, R., Kephart, J.O., Lefurgy, C., Tesauro, G., Levine, D.W., Chan, H.: `Autonomic multi-agent management of power and performance in data centers', Seventh Int. Joint Conf. on Autonomous Agents and Multiagent Systems: Industrial Track, 2008.
-
37)
-
Szymczyk, M.: `Detecting botnets in computer networks using multi-agent technology', Fourth Int. Conf. on Dependability of Computer Systems, 2009.
-
38)
-
B. Gokce ,
D.A. Laleci ,
M. Olduz ,
I. Tasyurt ,
M. Yuksel ,
A. Okcan ,
W. Series
.
(2008)
SAPHIRE: a multi-agent system for remote healthcare monitoring through computerized clinical guidelines, Agent technology and e-health.
-
39)
-
R. Sulaiman ,
D. Sharma ,
W. Ma ,
D. Tran
.
A multi-agent security framework for e-health services.
LNCS Knowl. Based Intell. Inf. Eng. Syst.
,
547 -
554
-
40)
-
D. Zhang ,
S. Simofi ,
S. Aciar ,
J. Debenham
.
A multi agent recommender system that utilises consumer reviews in its recommendations.
Int. J. Intell. Inf. Database Syst.
,
1 ,
69 -
81
-
41)
-
C. Martinez-Garcia ,
G. Navarro-Arribas ,
J. Borrell ,
A. Martin-Campillo
.
An access control scheme for multi-agent systems over multi-domain environments.
LCNS Adv. Soft Comput.
,
401 -
410
-
42)
-
A. Ricci ,
A. Ominici ,
E. Denit
.
(2001)
Enlightened agents in tucson.
-
43)
-
M. Pechoucek ,
V. Marik
.
Industrial deployment of multi-agent technologies: review and selected case studies.
Auton. Agent Multi-Agent Syst.
,
397 -
431
-
44)
-
P. Novak ,
M. Rollo ,
J. Hodk ,
T. Vlek
.
Communication security in multi-agent systems.
LCNS Multi-Agent Syst. Appl. III
-
45)
-
James, G., Cohen, D., Dodier, R., Platt, G., Palmer, D.: `A deployed multi-agent framework for distributed energy applications', Fifth Int. Joint Conf. on Autonomous Agents and Multiagent Systems, 2006.
-
46)
-
M. Minsky
.
Steps toward artificial intelligence.
Proc. IRE
,
8 -
30
-
47)
-
A. Karygiannis ,
E. Antonakakis
.
Security and privacy issues in agent-based location-aware mobile commerce.
Saf. Sec. Multi-agent Syst.
,
308 -
329
-
48)
-
Pedireddy, T., Vidal, J.M.: `A prototype multi-agent network security system', Second Int. Joint Conf. on Autonomous Agents and Multiagent Systems Melbourne, 2003, Australia.
-
49)
-
, : `Jack intelligent agents: Jack manual', Technical Report, 2005, release 4.1.
-
50)
-
L. Ismail
.
A secure mobile agents platform.
J. Commun.
,
2
-
51)
-
G.C.F. Bellifemine ,
A. Poggi ,
G. Rimassa
.
JADE: a software framework for developing multi-agent applications. Lessons learned.
Inf. Softw. Technol.
,
10 -
21
-
52)
-
Chelberg, D., Welch, L., Lakshmikumar, A., Gillen, M.: `Meta-reasoning for a distributed agent architecture', South-Eastern Symp. on System Theory Athens, 2001, Ohio.
-
53)
-
B. Hartman ,
D.J. Flinn ,
K. Beznosov ,
S. Kawamoto
.
(2003)
Mastering web services security.
-
54)
-
Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: `Achieving DRBAC authorization in multi-trust domains with MAS architecture and PMI', Agent Computing and Multi-Agent Systems: 10th Pacific Rim Int. Conf. on Multi-Agent Systems, 2007.
-
55)
-
Cranefield, S., Purvis, M.: `Referencing objects in FIPA SL: an analysis and proposal', Proc. Second Int. Workshop on Challenges in Open Agent Environments at AAMAS, 2003.
-
56)
-
Bresciani, P., Giorgini, P., Mouratidis, H.: `On security requirements analysis for multi-agent systems', Second Int. Workshop on Software Engineering for Large-Scale Multi-Agent Systems, 2003, SELMAS Portland, Oregon.
-
57)
-
U. Manzoor ,
S. Nefti ,
H. Hasan ,
M. Mehmood ,
B. Aslam ,
O. Shaukat
.
A multi-agent model for mine detection – MAMMD, LNCS emerging technologies and information systems for the knowledge society.
-
58)
-
I. Cila ,
M. Malab
.
A multi-agent architecture for modelling and simulation of small military unit combat in asymmetric warfare.
Expert Syst. Appl.
,
1331 -
1343
-
59)
-
Bergenti, F., Poggi, A.: `Multi-agent systems for e-health: recent projects and initiatives', 10thInt. Workshop on Objects and Agents, 2009.
-
60)
-
V.S. Alagar ,
J. Holliday ,
P.V. Thiyagarajan ,
B. Zhou
.
(2010)
An architecture for multi-agent e-commerce transactions.
-
61)
-
B. Chen ,
H.H. Cheng ,
J. Palen
.
Integrating mobile agent technology with multi-agent systems for distributed traffic detection and management systems.
Transp. Res. C
,
1 -
10
-
62)
-
Holloway, E.M., Lamont, G.B.: `Self organized multi-agent entangled hierarchies for network security', Eleventh Annual Conf. Companion on Genetic and Evolutionary Computation Conf., 2009.
-
63)
-
R. Vaughan ,
J. Wise ,
P. Huey
.
Distributed multi-layered network management for NEC using multi-agent systems.
LNCS Agents Peer-to-Peer Comput.
,
159 -
166
-
64)
-
Aldea, A., Lopez, B., Moreno, A., Riano, D., Valls, A.: `A multi-agent systems for organ transplant co-ordination', Eighth Conf. on AI in Medicine in Europe: Artificial Intelligence Medicine, 2001.
-
65)
-
Y.Z. Wei ,
N.R. Jennings ,
L. Moreau ,
W. Hall
.
User evaluation of a market-based recommender system.
Auton. Agents Multi-agent Syst.
,
251 -
269
-
66)
-
M. Papazoglou
.
(2008)
Web services: principles and technology.
-
67)
-
C. Garrigues ,
S. Robles ,
J. Borrell ,
G. Navarro-Arribas
.
Promoting the development of secure mobile agent applications.
J. Syst. Softw.
,
6 ,
959 -
971
-
68)
-
Marques, P., Silva, L., Silva, J.: `Security mechanisms for using mobile agents in electronic commerce', 18thIEEE Symp. on Reliable Distributed Systems, 1999, Lausanne, Switzerland.
-
69)
-
M.A. Patricio ,
J. Carbo ,
O. Perez ,
J. Garcia ,
J.M. Molina
.
Multi-agent framework in visual sensor networks.
EURASIP J. Adv. Signal Process.
,
1
-
70)
-
Gunupudi, V., Tate, S.R.: `SAgent: a security framework for JADE', Proc. Fifth Int. Joint Conf. on Autonomous Agents and Multiagent Systems, 2006, p. 1116–1118.
-
71)
-
Sierhuis, M., Clancey, W.J., van Hoof, R.J.J.: `Nasas OCA mirroring system. An application of multiagent systems in mission control', Eighth Int. Conf. on Autonomous Agents and Multiagent Systems (AAMAS), 2009.
-
72)
-
S. Fugkeaw ,
P. Manpanpanich ,
S. Juntapremjitt
.
Multi-application authentication based on multi-agent system.
IAENG Int. J. Comput. Sci.
-
73)
-
E. Moradian ,
A. Hakansson
.
Possible attacks on XML web service.
Int. J. Comput. Sci. Netw. Sec.
,
16 ,
154 -
170
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2010.0041
Related content
content/journals/10.1049/iet-ifs.2010.0041
pub_keyword,iet_inspecKeyword,pub_concept
6
6