Tcl and the Tk toolkit
Integrating virtual objects into real images for augmented reality
VRST '98 Proceedings of the ACM symposium on Virtual reality software and technology
Seven good reasons for mobile agents
Communications of the ACM
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
The Java Language Specification
The Java Language Specification
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Secure Recording of Itineraries through Co-operating Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Concordia: An Infrastructure for Collaborating Mobile Agents
MA '97 Proceedings of the First International Workshop on Mobile Agents
MASIF: The OMG Mobile Agent System Interoperability Facility
MA '98 Proceedings of the Second International Workshop on Mobile Agents
Is it an Agent, or Just a Program?: A Taxonomy for Autonomous Agents
ECAI '96 Proceedings of the Workshop on Intelligent Agents III, Agent Theories, Architectures, and Languages
Countermeasures for mobile agent security
Computer Communications
Mobile virtual communities research: a synthesis of current trends and a look at future perspectives
International Journal of Web Based Communities
An extended JADE-S based framework for developing secure Multi-Agent Systems
Computer Standards & Interfaces
Security applications of trust in multi-agent systems
Journal of Computer Security
Domino: exploring mobile collaborative software adaptation
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
Self-reliant mobile code: a new direction of agent security
Journal of Network and Computer Applications
Hi-index | 0.00 |
This paper examines the security aspects of different pervasive scenarios involving agent communities evolved using multi agent systems (MAS). It describes the motivation and the objectives behind the development of these agent communities and analyses the security vulnerabilities, which arise within them. To counter these vulnerabilities, the paper proposes a Buddy model of security for the agent community. In this model, every agent protects its neighbour within the community, thereby sharing the responsibilities of the security function. This feature makes it a better option as compared to other hierarchical models of security, which can be brought down by a concerted attack at the controller agent. This paper also demonstrates the applicability and the effectiveness of the Buddy model in different pervasive scenarios and makes a strong case for its adoption.