Keywords: IT security, robotic complex, swarm of robots, ant algorithm, group robotics, Police Office Model, protected swarm, vulnerability, attack
References
1. Gubanov D.A. Obzor Onlainovykh Sistem Reputatsii/Doveriya [Overview of Online Reputation/Trust Systems]. 2009. Available at: http://mtas.ru/bitrix/components/bitrix/forum.interface/show_file.php?fid=1671 (accessed 24.03.2014).
2. Zikratov I.A., Zikratova T.V., Lebedev I.S. Doveritel'naya model' informatsionnoi bezopasnosti mul'tiagentnykh robototekhnicheskikh sistem s detsentralizovannym upravleniem [Trust model for information security of multi-agent robotic systems with a decentralized management]. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2014, no. 2(90), pp. 47–52.
3. Neeran K.M., Tripathi A.R. Security in the Ajanta MobileAgent system. Technical Report. Department of Computer Science, University of Minnesota, 1999, 28 p.
4. Xudong G., Yiling Ya., Yinyuan Y. POM-a mobile agent security model against malicious hosts. Proc. 4th International Conference on High Performance Computing in the Asia-Pacific Region, 2000, vol. 2, pp. 1165–1166.
5. Page J., Zaslavsky A., Indrawan M. A buddy model of security for mobile agent communities operating in pervasive scenarios.Proc. 2nd Australasian Information Security Workshop (AISW2004). ACS Dunedin, New Zealand, 2004, vol. 32, pp. 17–25.
6. Page J., Zaslavsky A., Indrawan M. Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities.Proc. 1st International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), 2004, pp. 85–101.
7. Dorigo M., Maniezzo V., Colorni A. Ant system: optimization by a colony of cooperating agents. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 1996, vol. 26, no. 1, pp. 29–41. doi: 10.1109/3477.484436
8. Wooldridge M. Introduction to MultiAgent Systems. John Wiley & Sons Ltd, 2002, 368 p.
9. Zikratov I.A., Kozlova E.V., Zikratova T.V. Analiz uyazvimostei robototekhnicheskikh kompleksov s roevym intellektom [Vulnerability analysis of robotic systems with swarm intelligence]. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2013, no. 5(87), pp. 149–154.
10.Komarov I.I.,Drannik A.L., Yurieva R.A. Modelirovanie problem informatsionnoi bezopasnosti mul'tiagentnykh sistem [Multiagent information security problem’s simulation]. V Mire Nauchnykh Otkrytii, no. 4(52), pp. 61–70.
11.Drannik A.L. Ispol'zovanie programm-simulyatorov povedeniya roevykh robototekhnicheskikh sistem dlya issledovaniya voprosov bezopasnosti [Using program simulators of swarm robotic systems behavior for security studies]. Materialy VIII Sankt-Peterburgskoi Mezhregional'noi Konferentsii Informatsionnaya Bezopasnost' Regionov Rossii (IBRR-2013) [Proc. VIII St. Petersburg Interregional Conference "Information Security of Russian Regions"]. St. Petersburg, 2013, pp. 240–251.
12.Schillo M., Funk P., Rovatsos M. Using trust for detecting deceitful agents in artificial societies. Applied Artificial Intelligence, 2000, vol. 14, no. 8, pp. 825–848. doi: 10.1080/08839510050127579
13.Golbeck J., Parsia B., Hendler J. Trust networks on the semantic web. Lecture Notes in Artificial Intelligence, 2003, vol. 2782, pp. 238–249.
14.Garcia-Morchon O., Kuptsov D., Gurtov A., Wehrle K. Cooperative security in distributed networks. Computer Communications, 2013, vol. 36, no. 12, pp. 1284–1297. doi: 10.1016/j.comcom.2013.04.007
15.Beshta A.A., Kirpo M.A. Postroenie modeli doveriya k ob"ektam avtomatizirovannoi informatsionnoi sistemy dlya predotvrashcheniya destruktivnykh vozdeistvii na sistemu [Building a model of trust to objects of an automated information system in order to prevent the destructive effects on the system]. Bulletin of the Tomsk Polytechnic University, 2013, vol. 322, no. 5, pp. 104–108.
16.Ramchurn S.D., Huynh D., Jennings N.R. Trust in multi-agent systems. Knowledge Engineering Review, 2004, vol. 19, no. 1, pp. 1–25. doi:10.1017/S0269888904000116
17.Gorodetski V., Kotenko I., Karsaev O. Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning. Computer Systems Science and Engineering, 2003, no. 4, pp. 191–200.
18.Masloboev A.V., Putilov V.A. Razrabotka i realizatsiya mekhanizmov upravleniya informatsionnoi bezopasnost'yu mobil'nykh agentov v raspredelennykh mul'tiagentnykh informatsionnykh sistemakh [Development and implementation of mobile agent security control mechanisms in the distributed multi-agent information systems]. Proceedings of the MSTU, 2010, vol. 13, no. 4–2, pp. 1015–1032.