7,538 research outputs found

    A Java Simulation-Based Performance Evaluation of Mobile Agent Platforms.

    Get PDF
    Mobile agents are emerging as a promising paradigm for the design and implementations of distributed applications .Manyof these Mobile Agent platforms have been developed, new one, and new versions of old agents, kept on appearing everyyear, so choosing the right or most suitable platform for a particular application area; based on their performance is achallenge for both the developers and the users. This paper carried out a qualitative comparison across three selected, Javabased Mobile Agent System, Aglet Tracy, and JADE. Two of them (Aglets and JADE) were selected for quantitativeevaluation on their time of transfer/retrieval of compressed data files. In our implementation, Aglet version 2.02 and JADE3.4.1 were used. A java simulation program was developed and used in measuring the performance of the two mobileagents, using transmission time and compressed time as performance metrics. In this paper work, a unique portnumber(2080) was chosen for the loading of classes and mobility of agents. Ten dummy data files (also refer to as Load orMessage) were created with sizes ranges from 100Kb to 1 Mb. A gzip compression tool was used to compress each of thesefiles and sent through the Aglet and JADE enabled network. The transmission time (in milliseconds) for each correspondingfiles size (in Bytes) in the two Mobile agents were recorded. We deduced from our qualitative results that, Tracy plug-infeatures give users room for reusability and extension. Aglets provide weak security and poorly scalable. JADE has astrong security, scalable and its multi agent feature will enrich its usage on the internet. Our quantitative results show thattransferring/retrieving of compressed data file is faster in JADE than in Aglets. The integrity of the files are also kept safe, inboth mobile agents, that is after decompressions they can still be reused.Keywords: Aglet, Gzip, JADE, Compression ratio, Mobile Agent Networ

    Security for a multi-agent cyber-physical conveyor system using machine learning

    Get PDF
    One main foundation of Industry 4.0 is the connectivity of devices and systems using Internet of Things (IoT) technologies, where Cyber-physical systems (CPS) act as the backbone infrastructure based on distributed and decentralized structures. This approach provides significant benefits, namely improved performance, responsiveness and reconfigurability, but also brings some problems in terms of security, as the devices and systems become vulnerable to cyberattacks. This paper describes the implementation of several mechanisms to increase the security in a self-organized cyber-physical conveyor system, based on multi-agent systems (MAS) and build up with different individual modular and intelligent conveyor modules. For this purpose, the JADE-S add-on is used to enforce more security controls, also an Intrusion Detection System (IDS) is created supported by Machine Learning (ML) techniques that analyses the communication between agents, enabling to monitor and analyse the events that occur in the system, extracting signs of intrusions, together they contribute to mitigate cyberattacks.info:eu-repo/semantics/publishedVersio

    Adding X-security to Carrel: security for agent-based healthcare applications

    Get PDF
    The high growth of Multi-Agent Systems (MAS) in Open Networks with initiatives such as Agentcities1 requires development in many different areas such as scalable and secure agent platforms, location services, directory services, and systems management. In our case we have focused our effort on security for agent systems. The driving force of this paper is provide a practical vision of how security mechanisms could be introduced for multi-agent applications. Our case study for this experiment is Carrel [9]: an Agent-based application in the Organ and Tissue transplant domain. The selection of this application is due to its characteristics as a real scenario and use of high-risk data for example, a study of the 21 most visited health-related web sites on the Internet discovered that personal information provided at many of the sites was being inadvertently leaked for unauthorized persons. These factors indicate to us that Carrel would be a suitable environment in order to test existing security safeguards. Furthermore, we believe that the experience gathered will be useful for other MAS. In order to achieve our purpose we describe the design, architecture and implementation of security elements on MAS for the Carrel System.Postprint (published version

    Architecture and negotiation protocols for a smart parking system

    Get PDF
    Mestrado de dupla diplomação com a UTFPR - Universidade Tecnológica Federal do ParanáSmart City uses emerging technologies to improve citizens’ quality of life. A branch of this topic is the Smart Parking, where the parking system implements intelligent mechanisms to simplify to the searching of parking spots and consequently decrease the traffic of cars. This work proposes an architecture using Multi-Agent System (MAS), enhanced with some holonic systems principles, that is capable to be applied to different range of parking systems, e.g., considering trucks, cars, or bicycles. Being a distributed architecture, a special attention is devoted to study the negotiation protocols that will regulate the behavior of autonomous and cooperative actors in the system, namely drivers and parking spots, during allocation process of parking spots to drivers. For this purpose, the Contract Net Protocol (CNP), English Auction, Dutch Auction and Faratin Auction were the tested, being the CNP the selected protocol for this problem. Also addressing the distributed nature of the system, some efforts were focused on the security of the messages exchanged between the agents was proposed using Secure Socket Layer (SSL). The proposed multi-agent systems architecture was implemented using JADE (Java Agent DEvelopment Framework), which is a FIPA-compliant agent development framework that simplifies the development of agent-based applications. The exchange of messages follows the FIPA-ACL protocol using the CNP protocol for the negotiation. The communication between the agents and the User Interface is performed through the use of Message Queuing Telemetry Transport (MQTT) protocol

    CRiBAC: Community-centric role interaction based access control model

    Get PDF
    As one of the most efficient solutions to complex and large-scale problems, multi-agent cooperation has been in the limelight for the past few decades. Recently, many research projects have focused on context-aware cooperation to dynamically provide complex services. As cooperation in the multi-agent systems (MASs) becomes more common, guaranteeing the security of such cooperation takes on even greater importance. However, existing security models do not reflect the agents' unique features, including cooperation and context-awareness. In this paper, we propose a Community-based Role interaction-based Access Control model (CRiBAC) to allow secure cooperation in MASs. To do this, we refine and extend our preliminary RiBAC model, which was proposed earlier to support secure interactions among agents, by introducing a new concept of interaction permission, and then extend it to CRiBAC to support community-based cooperation among agents. We analyze potential problems related to interaction permissions and propose two approaches to address them. We also propose an administration model to facilitate administration of CRiBAC policies. Finally, we present the implementation of a prototype system based on a sample scenario to assess the proposed work and show its feasibility. © 2012 Elsevier Ltd. All rights reserved
    • …
    corecore