Systematic Mapping Study of Security in Multi-Embedded-Agent Systems

被引:0
|
作者
Baudet, Arthur [1 ]
Aktouf, Oum-El-Kheir [1 ]
Mercier, Annabelle [1 ]
Elbaz-Vincent, Philippe [2 ]
机构
[1] Univ Grenoble Alpes, Grenoble INP, LCIS, F-26000 Valence, France
[2] Univ Grenoble Alpes, Inst Fourier, CNRS, F-38000 Grenoble, France
关键词
Security; Multi-agent systems; Systematics; Wireless sensor networks; Data models; Computer architecture; Wireless communication; Decentralized security; embedded system; multi-agent system; security architecture; systematic mapping study;
D O I
10.1109/ACCESS.2021.3128287
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Context: In this paper, we study distributed and decentralized systems in which each part is modeled as an agent in a multi-agent system. Those systems provide more scalable and easier ways to control complex, distributed and interconnected systems of embedded components. We are particularly interested in methods to secure these systems. Objectives: This study aims to identify the main security properties studied, the parts of a multi-agent architecture that are considered most often in security studies and the technical solutions used to secure those systems. Methods: We conducted a systematic mapping study on research works addressing the security of multi-agent systems with embedded agents. We identified which security features were addressed, and their roles in global security architecture. Results: We identified 70 papers published in journals and conferences. We classified the extracted data reporting a tendency to focus on securing the availability of systems under attack by means of trust schemes, sometimes supported by cryptographic primitives. Conclusion: The use of cryptography appears to be limited in decentralized systems. However, solutions should be provided to overcome those limits as other solutions such as trust schemes do not protect the system from the same type of attacks.
引用
收藏
页码:154902 / 154913
页数:12
相关论文
共 50 条
  • [1] A Case Study of Run-Time Testing of Self Organizations in Multi-Embedded-Agent Systems
    Baudet, Arthur
    Aktouf, Oum-El-Kheir
    Mercier, Annabelle
    Jamont, Jean-Paul
    2021 29TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2021), 2021, : 62 - 66
  • [2] A systematic mapping study on security for systems of systems
    Olivero, Miguel Angel
    Bertolino, Antonia
    Dominguez-Mayo, Francisco Jose
    Escalona, Maria Jose
    Matteucci, Ilaria
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 787 - 817
  • [3] A systematic mapping study on security for systems of systems
    Miguel Angel Olivero
    Antonia Bertolino
    Francisco José Dominguez-Mayo
    María José Escalona
    Ilaria Matteucci
    International Journal of Information Security, 2024, 23 : 787 - 817
  • [4] Ecosystems and Open Innovation for Embedded Systems: A Systematic Mapping Study
    Papatheocharous, Efi
    Andersson, Jesper
    Axelsson, Jakob
    SOFTWARE BUSINESS, ICSOB 2015, 2015, 210 : 81 - 95
  • [5] Vertical Test Reuse for Embedded Systems: A Systematic Mapping Study
    Flemstrom, Daniel
    Sundmark, Daniel
    Afzal, Wasif
    PROCEEDINGS 41ST EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS SEAA 2015, 2015, : 317 - 324
  • [6] Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study
    Iwaya, Leonardo Horn
    Ahmad, Aakash
    Babar, M. Ali
    IEEE ACCESS, 2020, 8 : 150081 - 150112
  • [7] Safety, Security, and Configurable Software Systems: A Systematic Mapping Study
    Kenner, Andy
    May, Richard
    Krueger, Jacob
    Saake, Gunter
    Leich, Thomas
    SPLC '21: PROCEEDINGS OF THE 25TH ACM INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, VOL A, 2021,
  • [8] Security in Multi-Agent Systems
    Hedin, Yaqin
    Moradian, Esmiralda
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 19TH ANNUAL CONFERENCE, KES-2015, 2015, 60 : 1604 - 1612
  • [9] Security Governance in a Multi-Cloud Environment: A systematic Mapping Study
    Witti, Hamad
    Ghedira-Guegan, Chirine
    Disson, Eric
    Boukadi, Khouloud
    PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016, 2016, : 81 - 86
  • [10] Use of Ontologies in Embedded Systems: a Systematic Mapping
    Sousa, Aeda
    Couto, Tarcisio
    Agra, Celso
    Alencar, Fernando
    PROCEEDINGS 2016 10TH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (QUATIC), 2016, : 1 - 8