A multi-agent security architecture

Rossilawati Sulaiman, Dharmendra Sharma, Wanli Ma, Dat Tran

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The Multilayer Communication approach (MLC) [1] is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the Sender's host, agents interact with each other to secure a message to be sent to the Recipient, including encryption, digital signature, and hash code. A mobile agent is used to carry the encrypted messages as well as the agent's code to the Recipient's host. Our approach also provides mechanisms to verify the authenticity, confidentiality and the integrity of the code and data that arrived at the Recipient's host. The message and the code are authenticated, the code is executed to perform tasks to recover the plaintext.

Original languageEnglish
Title of host publicationNSS 2009 - Network and System Security
Pages184-191
Number of pages8
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event2009 3rd International Conference on Network and System Security, NSS 2009 - Gold Coast, QLD
Duration: 19 Oct 200921 Oct 2009

Other

Other2009 3rd International Conference on Network and System Security, NSS 2009
CityGold Coast, QLD
Period19/10/0921/10/09

Fingerprint

Cryptography
Electronic document identification systems
Mobile agents
Communication
Multilayers
Network protocols

Keywords

  • Cryptography
  • E-health
  • Mobile agent
  • Multi-agent
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Control and Systems Engineering

Cite this

Sulaiman, R., Sharma, D., Ma, W., & Tran, D. (2009). A multi-agent security architecture. In NSS 2009 - Network and System Security (pp. 184-191). [5318910] https://doi.org/10.1109/NSS.2009.78

A multi-agent security architecture. / Sulaiman, Rossilawati; Sharma, Dharmendra; Ma, Wanli; Tran, Dat.

NSS 2009 - Network and System Security. 2009. p. 184-191 5318910.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sulaiman, R, Sharma, D, Ma, W & Tran, D 2009, A multi-agent security architecture. in NSS 2009 - Network and System Security., 5318910, pp. 184-191, 2009 3rd International Conference on Network and System Security, NSS 2009, Gold Coast, QLD, 19/10/09. https://doi.org/10.1109/NSS.2009.78
Sulaiman R, Sharma D, Ma W, Tran D. A multi-agent security architecture. In NSS 2009 - Network and System Security. 2009. p. 184-191. 5318910 https://doi.org/10.1109/NSS.2009.78
Sulaiman, Rossilawati ; Sharma, Dharmendra ; Ma, Wanli ; Tran, Dat. / A multi-agent security architecture. NSS 2009 - Network and System Security. 2009. pp. 184-191
@inproceedings{cb37f12100ec485489b4c34087122914,
title = "A multi-agent security architecture",
abstract = "This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The Multilayer Communication approach (MLC) [1] is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the Sender's host, agents interact with each other to secure a message to be sent to the Recipient, including encryption, digital signature, and hash code. A mobile agent is used to carry the encrypted messages as well as the agent's code to the Recipient's host. Our approach also provides mechanisms to verify the authenticity, confidentiality and the integrity of the code and data that arrived at the Recipient's host. The message and the code are authenticated, the code is executed to perform tasks to recover the plaintext.",
keywords = "Cryptography, E-health, Mobile agent, Multi-agent, Security",
author = "Rossilawati Sulaiman and Dharmendra Sharma and Wanli Ma and Dat Tran",
year = "2009",
doi = "10.1109/NSS.2009.78",
language = "English",
isbn = "9780769538389",
pages = "184--191",
booktitle = "NSS 2009 - Network and System Security",

}

TY - GEN

T1 - A multi-agent security architecture

AU - Sulaiman, Rossilawati

AU - Sharma, Dharmendra

AU - Ma, Wanli

AU - Tran, Dat

PY - 2009

Y1 - 2009

N2 - This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The Multilayer Communication approach (MLC) [1] is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the Sender's host, agents interact with each other to secure a message to be sent to the Recipient, including encryption, digital signature, and hash code. A mobile agent is used to carry the encrypted messages as well as the agent's code to the Recipient's host. Our approach also provides mechanisms to verify the authenticity, confidentiality and the integrity of the code and data that arrived at the Recipient's host. The message and the code are authenticated, the code is executed to perform tasks to recover the plaintext.

AB - This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The Multilayer Communication approach (MLC) [1] is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the Sender's host, agents interact with each other to secure a message to be sent to the Recipient, including encryption, digital signature, and hash code. A mobile agent is used to carry the encrypted messages as well as the agent's code to the Recipient's host. Our approach also provides mechanisms to verify the authenticity, confidentiality and the integrity of the code and data that arrived at the Recipient's host. The message and the code are authenticated, the code is executed to perform tasks to recover the plaintext.

KW - Cryptography

KW - E-health

KW - Mobile agent

KW - Multi-agent

KW - Security

UR - http://www.scopus.com/inward/record.url?scp=72849107363&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=72849107363&partnerID=8YFLogxK

U2 - 10.1109/NSS.2009.78

DO - 10.1109/NSS.2009.78

M3 - Conference contribution

AN - SCOPUS:72849107363

SN - 9780769538389

SP - 184

EP - 191

BT - NSS 2009 - Network and System Security

ER -