Multi-agent system protecting from attacking in elliptic curve cryptography

Xu Huang, Pritam Shah, Dharmendra Sharma

Research output: A Conference proceeding or a Chapter in BookConference contribution

19 Citations (Scopus)

Abstract

Today’s software applications are mainly characterized by their component-based structures which are usually heterogeneous and distributed. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper first investigated multiagent applying for key exchange. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. In particularly, for saving pre-computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man-in-the middle attack. Due to the multiagent system (MAS) used the whole system becomes easy to be used. In particularly we designed a hidden generator point that offer a good protection from the man-in-the middle (MinM) attack which becomes one of major worries for the sensor’s networks with MAS
Original languageEnglish
Title of host publicationAdvances in Intelligent Decision Technologies: Proceedings of the Second KES International Symposium IDT 2010
EditorsGloria Phillips-Wren, Lakhmi C. Jain, Kazumi Nakamatsu, Robert J. Howlett
Place of PublicationGermany
PublisherSpringer
Pages121-131
Number of pages11
ISBN (Print)9783642146152
DOIs
Publication statusPublished - 2010
Event2nd International Symposium on Intelligent Decision Technologies, KES IDT 2010 - Baltimore, Maryland, United States
Duration: 28 Jul 201030 Jul 2010

Conference

Conference2nd International Symposium on Intelligent Decision Technologies, KES IDT 2010
CountryUnited States
CityMaryland
Period28/07/1030/07/10

Fingerprint

Multi agent systems
Cryptography
Sensor networks
Sensors
Security systems
Application programs
Decision making
Availability
Bandwidth
Data storage equipment
Communication

Cite this

Huang, X., Shah, P., & Sharma, D. (2010). Multi-agent system protecting from attacking in elliptic curve cryptography. In G. Phillips-Wren, L. C. Jain, K. Nakamatsu, & R. J. Howlett (Eds.), Advances in Intelligent Decision Technologies: Proceedings of the Second KES International Symposium IDT 2010 (pp. 121-131). Germany: Springer. https://doi.org/10.1007/978-3-642-14616-9_11
Huang, Xu ; Shah, Pritam ; Sharma, Dharmendra. / Multi-agent system protecting from attacking in elliptic curve cryptography. Advances in Intelligent Decision Technologies: Proceedings of the Second KES International Symposium IDT 2010. editor / Gloria Phillips-Wren ; Lakhmi C. Jain ; Kazumi Nakamatsu ; Robert J. Howlett. Germany : Springer, 2010. pp. 121-131
@inproceedings{682dacc9b11b4001a396dcfe1228930f,
title = "Multi-agent system protecting from attacking in elliptic curve cryptography",
abstract = "Today’s software applications are mainly characterized by their component-based structures which are usually heterogeneous and distributed. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper first investigated multiagent applying for key exchange. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. In particularly, for saving pre-computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man-in-the middle attack. Due to the multiagent system (MAS) used the whole system becomes easy to be used. In particularly we designed a hidden generator point that offer a good protection from the man-in-the middle (MinM) attack which becomes one of major worries for the sensor’s networks with MAS",
author = "Xu Huang and Pritam Shah and Dharmendra Sharma",
year = "2010",
doi = "10.1007/978-3-642-14616-9_11",
language = "English",
isbn = "9783642146152",
pages = "121--131",
editor = "Gloria Phillips-Wren and Jain, {Lakhmi C.} and Kazumi Nakamatsu and Howlett, {Robert J.}",
booktitle = "Advances in Intelligent Decision Technologies: Proceedings of the Second KES International Symposium IDT 2010",
publisher = "Springer",
address = "Netherlands",

}

Huang, X, Shah, P & Sharma, D 2010, Multi-agent system protecting from attacking in elliptic curve cryptography. in G Phillips-Wren, LC Jain, K Nakamatsu & RJ Howlett (eds), Advances in Intelligent Decision Technologies: Proceedings of the Second KES International Symposium IDT 2010. Springer, Germany, pp. 121-131, 2nd International Symposium on Intelligent Decision Technologies, KES IDT 2010, Maryland, United States, 28/07/10. https://doi.org/10.1007/978-3-642-14616-9_11

Multi-agent system protecting from attacking in elliptic curve cryptography. / Huang, Xu; Shah, Pritam; Sharma, Dharmendra.

Advances in Intelligent Decision Technologies: Proceedings of the Second KES International Symposium IDT 2010. ed. / Gloria Phillips-Wren; Lakhmi C. Jain; Kazumi Nakamatsu; Robert J. Howlett. Germany : Springer, 2010. p. 121-131.

Research output: A Conference proceeding or a Chapter in BookConference contribution

TY - GEN

T1 - Multi-agent system protecting from attacking in elliptic curve cryptography

AU - Huang, Xu

AU - Shah, Pritam

AU - Sharma, Dharmendra

PY - 2010

Y1 - 2010

N2 - Today’s software applications are mainly characterized by their component-based structures which are usually heterogeneous and distributed. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper first investigated multiagent applying for key exchange. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. In particularly, for saving pre-computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man-in-the middle attack. Due to the multiagent system (MAS) used the whole system becomes easy to be used. In particularly we designed a hidden generator point that offer a good protection from the man-in-the middle (MinM) attack which becomes one of major worries for the sensor’s networks with MAS

AB - Today’s software applications are mainly characterized by their component-based structures which are usually heterogeneous and distributed. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper first investigated multiagent applying for key exchange. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. In particularly, for saving pre-computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man-in-the middle attack. Due to the multiagent system (MAS) used the whole system becomes easy to be used. In particularly we designed a hidden generator point that offer a good protection from the man-in-the middle (MinM) attack which becomes one of major worries for the sensor’s networks with MAS

U2 - 10.1007/978-3-642-14616-9_11

DO - 10.1007/978-3-642-14616-9_11

M3 - Conference contribution

SN - 9783642146152

SP - 121

EP - 131

BT - Advances in Intelligent Decision Technologies: Proceedings of the Second KES International Symposium IDT 2010

A2 - Phillips-Wren, Gloria

A2 - Jain, Lakhmi C.

A2 - Nakamatsu, Kazumi

A2 - Howlett, Robert J.

PB - Springer

CY - Germany

ER -

Huang X, Shah P, Sharma D. Multi-agent system protecting from attacking in elliptic curve cryptography. In Phillips-Wren G, Jain LC, Nakamatsu K, Howlett RJ, editors, Advances in Intelligent Decision Technologies: Proceedings of the Second KES International Symposium IDT 2010. Germany: Springer. 2010. p. 121-131 https://doi.org/10.1007/978-3-642-14616-9_11