Multi-agent system protecting from attacking in elliptic curve cryptography

Research output: A Conference proceeding or a Chapter in BookConference contributionpeer-review

19 Citations (Scopus)


Today’s software applications are mainly characterized by their component-based structures which are usually heterogeneous and distributed. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper first investigated multiagent applying for key exchange. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of them, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. In particularly, for saving pre-computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man-in-the middle attack. Due to the multiagent system (MAS) used the whole system becomes easy to be used. In particularly we designed a hidden generator point that offer a good protection from the man-in-the middle (MinM) attack which becomes one of major worries for the sensor’s networks with MAS
Original languageEnglish
Title of host publicationAdvances in Intelligent Decision Technologies: Proceedings of the Second KES International Symposium IDT 2010
EditorsGloria Phillips-Wren, Lakhmi C. Jain, Kazumi Nakamatsu, Robert J. Howlett
Place of PublicationGermany
Number of pages11
ISBN (Print)9783642146152
Publication statusPublished - 2010
Event2nd International Symposium on Intelligent Decision Technologies, KES IDT 2010 - Baltimore, Maryland, United States
Duration: 28 Jul 201030 Jul 2010


Conference2nd International Symposium on Intelligent Decision Technologies, KES IDT 2010
Country/TerritoryUnited States


Dive into the research topics of 'Multi-agent system protecting from attacking in elliptic curve cryptography'. Together they form a unique fingerprint.

Cite this