TRUST MODEL FOR INFORMATION SECURITY OF MULTI-AGENT ROBOTIC SYSTEMS WITH A DECENTRALIZED MANAGEMENT

I. A. Zikratov, T. V. Zikratova, I. S. Lebedev


Read the full article  ';
Article in Russian


Abstract

The paper deals with the issues on protection of multi-agent robotic systems against attacks by robots-saboteurs. The operation analysis of such systems with decentralized control is carried out. Concept of harmful information impact (attack) from a robot-saboteur to the multi-agent robotic system is given. The class of attacks is considered using interception of messages, formation and transfer of misinformation to group of robots, and also carrying out other actions with vulnerabilities of multiagent algorithms without obviously identified signs of invasion of robots-saboteurs. The model of information security is developed, in which robots-agents work out trust levels to each other analyzing the events occurring in the system. The idea of trust model consists in the analysis of transferred information by each robot and the executed actions of other members in a group, comparison of chosen decision on iteration step k with objective function of the group. Distinctive feature of the trust model in comparison with the closest analogue - Buddy Security Model in which the exchange between the agents security tokens is done — is involvement of the time factor during which agents have to "prove" by their actions the usefulness in achievement of a common goal to members of the group. Variants of this model realization and ways of an assessment of trust levels for agents in view of the security policy accepted in the group are proposed.


Keywords: information security, group of robots, multi-agent robotic systems, attack, vulnerability, information security model (IT security model)

References
1.     Brambilla M., Ferrante E., Birattari M., Dorigo M. Swarm robotics: a review from the swarm engineering perspective. Swarm Intelligence, 2013, vol. 7, no. 1, pp. 1–41. doi: 10.1007/s11721-012-0075-2
2.     Masloboev A.V., Putilov V.A. Razrabotka i realizatsiya mekhanizmov upravleniya informatsionnoi bezopasnost'yu mobil’nykh agentov v raspredelennykh mul’tiagentnykh informatsionnykh sistemakh [Development and implementation of mobile agent security control mechanisms in the distributed multi-agent information systems]. Proceedings of the MSTU, 2010, vol. 13, no. 4-2, pp. 1015–1032.
3.     Bell D.E., LaPadula L.J. Secure computer systems: Unified exposition and multics interpretation. Bedford, Mass.: MITRE Corp., 1976, 134 p.
4.     Harrison M., Ruzzo W., Ullman J. Protection in operating systems. Communication of the ACM, 1976, vol. 19, no. 8, pp. 461–471. doi:  10.1145/360303.360333
5.     Higgins F., Tomlinson A., Martin K.M. Threats to the Swarm: Security Considerations for Swarm Robotics. International Journal on Advances in Security, 2009, vol. 2, no. 2&3, pp. 288–297.
6.     Koval E.N., Lebedev I.S. Obshchaya model' bezopasnosti robototekhnicheskikh sistem [General model of robotic systems information security]. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 4 (86), pp. 153–154.
7.     Kalyaev I.A., Gaiduk A.R., Kapustyan S.G. Modeli i algoritmy kollektivnogo upravleniya v gruppakh robotov [Models and algorithms of the collective control of robots group]. Moscow, FIZMATLIT Publ., 2009, 280 p.
8.     Kalyaev I.A., Lokhin V.M., Makarov I.M. et. al. Intellektual’nye roboty [Intelligent Robots] Ed. E.I. Yurevich. Moscow, Mashinostroenie Publ., 2007, 360 p.
9.     Zikratov I.A., Kozlova E.V., Zikratova T.V. Analiz uyazvimostei robototekhnicheskikh kompleksov s roevym intellektom [Vulnerability analysis of robotic systems with swarm intelligence]. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 5 (87), pp. 149–154.
10.  Neeran K.M., Tripathi A.R. Security in the Ajanta Mobile Agent System. Technical Report, Department of Computer Science, University of Minnesota, 1999, 28 p.
11.  Sander T., Tschudin Ch.F. Protecting mobile agents against malicious hosts. Mobile Agents and Security, Ser. Lecture Notes in Computer Science, 1998, vol. 1419, pp. 44–60.
12.  Xudong G., Yiling Ya., Yinyuan Y. POM-a mobile agent security model against malicious hosts. Proc. of the 4th International Conference on High Performance Computing in the Asia-Pacific Region, 2000, vol. 2 (14-17), pp. 1165–1166.
13.  Page J., Zaslavsky A., Indrawan M. A buddy model of security for mobile agent communities operating in pervasive scenarios.Proceedings of 2nd Australasian Information Security Workshop (AISW2004). ACS Dunedin, New Zealand, 2004, vol. 32, pp. 17–25.
14.  Page J., Zaslavsky A., Indrawan M. Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities.Proc. of the 1st International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), 2004, pp. 85–101.
15.  Kremlev A.S., Kolyubin S.A., Vrazhevsky S.A. Avtonomnaya mul’tiagentnaya sistema dlya resheniya zadach monitoringa mestnosti [Autonomous multi-agent “robot-guide” system to solve area monitoring problems]. Izv. vuzov. Priborostroenie, 2013, vol. 56, no. 4, pp. 61–65.


Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
Copyright 2001-2024 ©
Scientific and Technical Journal
of Information Technologies, Mechanics and Optics.
All rights reserved.

Яндекс.Метрика