A Multi-Agent Security Architecture

Rossilawati Sulaiman, Dharmendra Sharma, Wanli Ma, Dat Tran

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    6 Citations (Scopus)

    Abstract

    This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The multilayer communication approach (MLC) is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the sender's host, agents interact with each other to secure a message to be sent to the recipient, including encryption, digital signature, and hash code. A mobile agent is used to carry the encrypted messages as well as the agent's code to the recipient's host. Our approach also provides mechanisms to verify the authenticity, confidentiality and the integrity of the code and data that arrived at the recipient's host. The message and the code are authenticated, the code is executed to perform tasks to recover the plaintext.
    Original languageEnglish
    Title of host publicationProceedings of the 2009 Third International Conference on Network and System Security (NSS 2009)
    EditorsYang Xiang, Javier Lopez, Haining Wang, Wanlei Zhou
    Place of PublicationGold Coast, Australia
    PublisherIEEE, Institute of Electrical and Electronics Engineers
    Pages184-191
    Number of pages8
    ISBN (Print)9780769538389
    DOIs
    Publication statusPublished - 2009
    Event2009 Third International Conference on Network and System Security (NSS 2009) - Gold Coast, Australia
    Duration: 19 Oct 200921 Dec 2009

    Conference

    Conference2009 Third International Conference on Network and System Security (NSS 2009)
    CountryAustralia
    CityGold Coast
    Period19/10/0921/12/09

    Fingerprint

    Cryptography
    Electronic document identification systems
    Mobile agents
    Communication
    Multilayers
    Network protocols

    Cite this

    Sulaiman, R., Sharma, D., Ma, W., & Tran, D. (2009). A Multi-Agent Security Architecture. In Y. Xiang, J. Lopez, H. Wang, & W. Zhou (Eds.), Proceedings of the 2009 Third International Conference on Network and System Security (NSS 2009) (pp. 184-191). Gold Coast, Australia: IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/NSS.2009.78
    Sulaiman, Rossilawati ; Sharma, Dharmendra ; Ma, Wanli ; Tran, Dat. / A Multi-Agent Security Architecture. Proceedings of the 2009 Third International Conference on Network and System Security (NSS 2009). editor / Yang Xiang ; Javier Lopez ; Haining Wang ; Wanlei Zhou. Gold Coast, Australia : IEEE, Institute of Electrical and Electronics Engineers, 2009. pp. 184-191
    @inproceedings{9dbaecd605724a9aafe4cb78b442a53d,
    title = "A Multi-Agent Security Architecture",
    abstract = "This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The multilayer communication approach (MLC) is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the sender's host, agents interact with each other to secure a message to be sent to the recipient, including encryption, digital signature, and hash code. A mobile agent is used to carry the encrypted messages as well as the agent's code to the recipient's host. Our approach also provides mechanisms to verify the authenticity, confidentiality and the integrity of the code and data that arrived at the recipient's host. The message and the code are authenticated, the code is executed to perform tasks to recover the plaintext.",
    author = "Rossilawati Sulaiman and Dharmendra Sharma and Wanli Ma and Dat Tran",
    year = "2009",
    doi = "10.1109/NSS.2009.78",
    language = "English",
    isbn = "9780769538389",
    pages = "184--191",
    editor = "Yang Xiang and Javier Lopez and Haining Wang and Wanlei Zhou",
    booktitle = "Proceedings of the 2009 Third International Conference on Network and System Security (NSS 2009)",
    publisher = "IEEE, Institute of Electrical and Electronics Engineers",
    address = "United States",

    }

    Sulaiman, R, Sharma, D, Ma, W & Tran, D 2009, A Multi-Agent Security Architecture. in Y Xiang, J Lopez, H Wang & W Zhou (eds), Proceedings of the 2009 Third International Conference on Network and System Security (NSS 2009). IEEE, Institute of Electrical and Electronics Engineers, Gold Coast, Australia, pp. 184-191, 2009 Third International Conference on Network and System Security (NSS 2009), Gold Coast, Australia, 19/10/09. https://doi.org/10.1109/NSS.2009.78

    A Multi-Agent Security Architecture. / Sulaiman, Rossilawati; Sharma, Dharmendra; Ma, Wanli; Tran, Dat.

    Proceedings of the 2009 Third International Conference on Network and System Security (NSS 2009). ed. / Yang Xiang; Javier Lopez; Haining Wang; Wanlei Zhou. Gold Coast, Australia : IEEE, Institute of Electrical and Electronics Engineers, 2009. p. 184-191.

    Research output: A Conference proceeding or a Chapter in BookConference contribution

    TY - GEN

    T1 - A Multi-Agent Security Architecture

    AU - Sulaiman, Rossilawati

    AU - Sharma, Dharmendra

    AU - Ma, Wanli

    AU - Tran, Dat

    PY - 2009

    Y1 - 2009

    N2 - This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The multilayer communication approach (MLC) is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the sender's host, agents interact with each other to secure a message to be sent to the recipient, including encryption, digital signature, and hash code. A mobile agent is used to carry the encrypted messages as well as the agent's code to the recipient's host. Our approach also provides mechanisms to verify the authenticity, confidentiality and the integrity of the code and data that arrived at the recipient's host. The message and the code are authenticated, the code is executed to perform tasks to recover the plaintext.

    AB - This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The multilayer communication approach (MLC) is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the sender's host, agents interact with each other to secure a message to be sent to the recipient, including encryption, digital signature, and hash code. A mobile agent is used to carry the encrypted messages as well as the agent's code to the recipient's host. Our approach also provides mechanisms to verify the authenticity, confidentiality and the integrity of the code and data that arrived at the recipient's host. The message and the code are authenticated, the code is executed to perform tasks to recover the plaintext.

    U2 - 10.1109/NSS.2009.78

    DO - 10.1109/NSS.2009.78

    M3 - Conference contribution

    SN - 9780769538389

    SP - 184

    EP - 191

    BT - Proceedings of the 2009 Third International Conference on Network and System Security (NSS 2009)

    A2 - Xiang, Yang

    A2 - Lopez, Javier

    A2 - Wang, Haining

    A2 - Zhou, Wanlei

    PB - IEEE, Institute of Electrical and Electronics Engineers

    CY - Gold Coast, Australia

    ER -

    Sulaiman R, Sharma D, Ma W, Tran D. A Multi-Agent Security Architecture. In Xiang Y, Lopez J, Wang H, Zhou W, editors, Proceedings of the 2009 Third International Conference on Network and System Security (NSS 2009). Gold Coast, Australia: IEEE, Institute of Electrical and Electronics Engineers. 2009. p. 184-191 https://doi.org/10.1109/NSS.2009.78